摘要:
Systems and methods are described relating to detecting an indication of a person within a specified proximity to at least one mobile device; and presenting an indication of location of the at least one mobile device at least partially based on the indication of the person within the specified proximity. Additionally, systems and methods are described relating to means for detecting an indication of a person within a specified proximity to at least one mobile device; and means for presenting an indication of location of the at least one mobile device at least partially based on the indication of the person within the specified proximity.
摘要:
Methods and systems for a secure robotic operational system include but are not limited to receiving an authorization associated with a directive to perform robotic operational tasks regarding one or more objects; verifying the authorization associated with the directive; and controlling operation of the robotic operational system via controlling a plurality of robotic elements, each robotic element of the plurality of robotic elements individually and/or in combination performing one or more functions in accordance with the authorization.
摘要:
Systems and methods are described relating to accepting an indication of an inertial impact associated with at least one mobile device; and presenting an indication of location of the at least one mobile device at least partially based on accepting the indication of the inertial impact associated with the at least one mobile device. Additionally, systems and methods are described relating to means for accepting an indication of an inertial impact associated with at least one mobile device; and means for presenting an indication of location of the at least one mobile device at least partially based on accepting the indication of the inertial impact associated with the at least one mobile device.
摘要:
Various methods and systems include exemplary implementations for a security-activated operational component involved in creating or producing or duplicating or processing or testing one or more objects. Possible embodiments include but are not limited to verifying an authorization code to control a task or function of a robotic operation system, and responsive to the verification, enabling or disabling one or more operational components of the robotic operation system.
摘要:
Structures and protocols are presented for configuring an unmanned aerial device to participate in the performance of tasks, for using data resulting from such a configuration or performance, or for facilitating other interactions with such devices.
摘要:
Structures and protocols are presented for configuring an unmanned aerial device to perform a task, alone or in combination with other entities, or for using data resulting from such a configuration or performance.
摘要:
According to various embodiments, a mobile device continuously and/or automatically scans a user environment for tags containing non-human-readable data. The mobile device may continuously and/or automatically scan the environment for tags without being specifically directed at a particular tag. The mobile device may be adapted to scan for audio tags, radio frequency tags, and/or image tags. The mobile device may be configured to scan for and identify tags within the user environment that satisfy a user preference. The mobile device may perform an action in response to identifying a tag that satisfies a user preference. The mobile device may be configured to scan for a wide variety of tags, including tags in the form of quick response codes, steganographic content, audio watermarks, audio outside of a human audible range, radio frequency identification tags, long wavelength identification tags, near field communication tags, and/or a Memory Spot device.
摘要:
According to various embodiments, a mobile device continuously and/or automatically scans a user environment for tags containing non-human-readable data. The mobile device may continuously and/or automatically scan the environment for tags without being specifically directed at a particular tag. The mobile device may be adapted to scan for audio tags, radio frequency tags, and/or image tags. The mobile device may be configured to scan for and identify tags within the user environment that satisfy a user preference. The mobile device may perform an action in response to identifying a tag that satisfies a user preference. The mobile device may be configured to scan for a wide variety of tags, including tags in the form of quick response codes, steganographic content, audio watermarks, audio outside of a human audible range, radio frequency identification tags, long wavelength identification tags, near field communication tags, and/or a Memory Spot device.
摘要:
Structures and protocols are presented for signaling a decision (processing or transmitting a medical record or other resource, e.g.) conditionally, at least partly based on one or more performance indicia (excess hospital readmissions, e.g.) or therapeutic determinants (prior success, e.g.) or privacy considerations (patient consent, e.g.).
摘要:
Structures and protocols are presented for signaling a decision (processing or transmitting a medical record or other resource, e.g.) conditionally, at least partly based on one or more performance indicia (excess hospital readmissions, e.g.) or therapeutic determinants (prior success, e.g.) or privacy considerations (patient consent, e.g.).