摘要:
According to some example embodiments, systems, apparatus, methods and computer program products are provided for monitoring articles, such as in a commercial environment.
摘要:
A security apparatus and method for protecting merchandise items is presented. In the preferred embodiment, a merchandise security device includes a housing with an access door that has an open position and a closed position, a primary power source, a secondary power source and alarm system. The alarm system determines when a voltage of the primary power source drops below a threshold value. When the voltage drops below the threshold value, the alarm system switches to the secondary power source for its power. When the alarm system is in a standby mode, it will not generate alarms when operating on the secondary power source. However, when the alarm system has not been placed into a standby mode, the alarm system will generate alarms when operating on the secondary power source and the access door is in the open position.
摘要:
According to some example embodiments, systems, apparatus, methods, computer readable media, and computer program products are provided for implementing a wireless shelf pusher activity detection system. One example apparatus is a monitoring device for monitoring theft or sales activity associated with a product pusher device. The monitoring device may include a sensor configured to detect movement of a pusher member of the product pusher device, a wireless communications interface, and a processor. The processor may be configured to receive at least one sensor signal from the sensor indicating movement of the pusher member, determine a product movement activity type based on characteristics of the at least one sensor signal, and generate, for transmission via the wireless communications interface, a pusher activity message indicating the product movement activity type.
摘要:
Technology creates a better visual perception of PMI data in a three dimensional representation of an object by adjusting the opacity of elements not normal to the view of the user.
摘要:
According to some example embodiments, systems, apparatus, methods and computer program products are provided for triggering an alarm. In this regard, one example apparatus includes means for receiving an instruction to alarm a security gate device, and means for tuning a security resonator at a location such that a field generated by the security gate device interacts with the security resonator to cause the security gate device to trigger an alarm in response to at least receiving the instruction to alarm the security gate device.
摘要:
Technology is disclosed for improving the rendering of a three-dimensional (3D) object. In one aspect, the technology applies multi-scale visibility patches and adjacency heuristics to restore proper face and normals orientation at a per-object and per-polygon level; and target where best to apply ray-casting metrics to refine visibility determination.
摘要:
According to some example embodiments, systems, apparatus, methods and computer program products are provided for triggering an alarm. In this regard, one example apparatus includes means for receiving an instruction to alarm a security gate device, and means for tuning a security resonator at a location such that a field generated by the security gate device interacts with the security resonator to cause the security gate device to trigger an alarm in response to at least receiving the instruction to alarm the security gate device.
摘要:
A near field antenna is disclosed which is configured to read an RFID label such that a localized electric E field emitted by the antenna at an operating wavelength resides substantially within a zone defined by the near field. The localized E field directs a current distribution along an effective length of the antenna corresponding to a half-wave to a full-wave structure.
摘要:
A method and system for increasing the read range of a security tag by supplying an additional antenna system to the tag in order to provide power to a radio frequency identification (“RFID”) chip without the need to rely solely on power from the RFID reader. The security tag includes an RFID chip and a first antenna circuit coupled to the RFID chip where the first antenna circuit is adapted to decode interrogation signals from an RFID reader. The security tag also includes a second antenna circuit coupled to the RFID chip. The second antenna circuit is adapted to induce power from signals received from at least an alternate power source, such as an EAS transmitter, so that the RFID chip can be powered up and activated during an RFID interrogation round.