Abstract:
Methods, computer-readable media, and devices are disclosed for providing an access restriction of a second person to a location associated with a first person in a managed environment in connection with a physiological state of the second person. For example, a method may include a processing system having a processor receiving a security plan for a first person that pertains to a second person. The security plan may define an access restriction of the second person to a location associated with the first person in a managed environment in connection with a physiological state of the second person. The processing system may further detect the second person in the managed environment, detect the physiological state of the second person, and control an automated barrier in the managed environment in accordance with the security plan to provide the access restriction when the physiological state of the second person is detected.
Abstract:
In one example, the present disclosure describes a device, computer-readable medium, and method for dynamically adapting advertising based on real-time data relating to consumer emotions. For instance, in one example, a method includes inferring a present emotional state of a user of a content distribution network from a set of information collected by devices in the content distribution network, determining, based at least in part on the present emotional state, a time at which to present an advertisement to the user, and dynamically adapting an advertisement presented to the user at the time in response to the present emotional state.
Abstract:
A method includes receiving, at a media device, media content from a media content server. A portion of the media content includes a first item concurrently depicted with a second item. The method includes receiving an input indicating a selection of the second item within the media content. The method includes, in response to the input, sending an identification request for information corresponding to the second item to an identification server in response to the input. The identification request includes data relating to a depiction of the second item. The method also includes receiving the information from the identification server in response to the identification request.
Abstract:
Systems and methods for monitoring a monitored space include producing a first audio signal from received acoustic energy. The first audio signal is then processed against a whitelist of acoustic profiles and, based on lack of substantial correspondence with any of the acoustic profiles, a drone is navigated toward an apparent position of an apparent source. While in-flight, additional acoustic energy is received and a second audio signal is produced from the additional acoustic energy. The second audio signal is processed against the whitelist and, based on lack of substantial correspondence with any of the acoustic profiles of the whitelist, an investigate mode of the drone is initiated. The investigate mode includes notifying a remote monitor and supplying the remote monitor with an audiovisual feed. Responsive to a characterization by the remote monitor, an entry of the whitelist may be updated, added or replaced.
Abstract:
Systems may provide feedback that may include antenna selection or mobile device configuration. Antennas may be automatically configured throughout the device or the orientation or location of the mobile device may be altered to increase performance. Historical performance information of the mobile device may be maintained in order to determine proactive manipulations of the mobile device. In addition, multiple mobile devices may cooperatively determine the orientation or location that may increase performance.
Abstract:
An Internet Protocol television system includes a set-top box that receives requests to display video streams being transmitted to a household. In response to the request, the set-top box provides a list of the video streams to a display device. The list includes options to terminate transmission of one or more of the streams. This allows a user to determine which video streams should be transmitted when bandwidth limitations are reached.
Abstract:
An Internet Protocol television system includes a set-top box that receives requests to display video streams being transmitted to a household. In response to the request, the set-top box provides a list of the video streams to a display device. The list includes options to terminate transmission of one or more of the streams. This allows a user to determine which video streams should be transmitted when bandwidth limitations are reached.
Abstract:
Systems and methods for monitoring a monitored space include producing a first audio signal from received acoustic energy. The first audio signal is then processed against a whitelist of acoustic profiles and, based on lack of substantial correspondence with any of the acoustic profiles, a drone is navigated toward an apparent position of an apparent source. While in-flight, additional acoustic energy is received and a second audio signal is produced from the additional acoustic energy. The second audio signal is processed against the whitelist and, based on lack of substantial correspondence with any of the acoustic profiles of the whitelist, an investigate mode of the drone is initiated. The investigate mode includes notifying a remote monitor and supplying the remote monitor with an audiovisual feed. Responsive to a characterization by the remote monitor, an entry of the whitelist may be updated, added or replaced.
Abstract:
A method and system for programming a universal remote control (URC) to operate with a new remote controlled device having a digital mark is disclosed. A digital representation of the mark is generated and sent to a multimedia content distribution network (MCDN) server, along with MCDN account information. The digital mark may be used to retrieve programming codes, which are sent to client-premises equipment (CPE) at an MCDN client identified by the MCDN account information. The CPE may be instructed to reprogram the URC to control the new device using the programming codes. The digital mark may be scanned and sent to the server using wireless telephony service provided by the MCDN service provider.
Abstract:
Facilitating notification and corrective actions related to endpoint quality of service losses in advanced networks (e.g., 5G, 6G, and beyond) is provided herein. Operations of a method can comprise determining, by a system comprising a processor, that a quality of service level for a mobile device within a communications network has degraded below a threshold quality of service level. The method also can comprise in response to the determining, selecting, by the system, an action to be performed at a mobile device. The action can increase the quality of service level for the mobile device above the threshold quality of service level. Further, the method can comprise providing, by the system and to the mobile device, information indicative of the action.