摘要:
A method and apparatus for selective transmission of color information to a remote recognition system is provided herein. During operation, a central server may determine that at least one region in an image is ambiguously recognized, or unrecognized. In response, the central server will send a request for the image/video to be provided in color, or alternatively for a portion of the image/video to be provided in color. Because only selective images, or portions of images will be transmitted in color, the above transmission scheme enables reduction of bandwidth, and hence cost, required for transmitting images to the analytics server, without compromising the accuracy of the analytics.
摘要:
An inventory monitoring controller maintains information reflecting a current inventory of articles based on radio frequency identification (RFID) tag identifying information received from one or more RFID tag readers in the context of inventory polling operations. In an embodiment, the controller also adjusts an operational parameter (e.g., a missing article detection threshold or a variable polling parameter) based on an analysis of the RFID tag identifying information. For example, a variable polling parameter may be adjusted in response to an occurrence of a triggering event (e.g., an inventory change indicated by the RFID tag identifying information or an occurrence of a temporal event), and a missing article detection threshold may be adjusted based on historical information relating to the detection of (or failure to detect) a particular RFID tag.
摘要:
A radio frequency identification (RFID) system used to perform electronic article surveillance comprises a RFID tag and a RFID reader. The RFID tag is affixed to an object, and the RFID reader, having a plurality of antennas, is in radio frequency (RF) communication with the RFID tag. The plurality of antennas are arranged to have a spatial relationship with one another to monitor and communicate with the RFID tag such that a likelihood of a security breach of the RFID tag is determined. Determining the likelihood of the security breach is based, at least in part, on a signal strength of a read of the RFID tag at each antenna relative to the plurality of antennas.