摘要:
Systems and methods for surveillance in a mobile environment. In some cases, the systems and methods utilize a variety of image and/or audio sensors to record activity ongoing a mobile environment. In one particular embodiment, the activity is temporarily recorded in a first tier memory implemented as a volatile FIFO. Where a trigger input is detected, the activity is recorded in a second tier memory that can be configured as a non-volatile memory. Further, in some cases the recorded activity can be transmitted wirelessly to a remote location.
摘要:
Systems and methods for surveillance in a mobile environment. In some cases, the systems and methods utilize a variety of image and/or audio sensors to record activity ongoing in a mobile environment. In one particular embodiment, the activity is temporarily recorded in a first tier memory implemented as a volatile FIFO. Where a trigger input is detected, the activity is recorded in a second tier memory that can be configured as a non-volatile memory. Further, in some cases the recorded activity can be transmitted wirelessly to a remote location.
摘要:
Described herein is an apparatus and method of detecting bruxism. The method includes the steps of: capturing a video of a subject, performing by circuitry included in the apparatus, spatial filtering of each image frame included in the captured video. Further, the method includes generating by circuitry, a filtered image by temporally filtering the spatially filtered image frames, the temporally filtered image including data belonging in a first frequency range, and wherein a subset of data is associated with a predetermined color variation to indicate presence of bruxism in the subject.
摘要:
An improved method for controlling a computer device user's email accessibility to an email receiver includes the steps of: (a) providing software configured to generate a unique email address link for use by the email sender, (b) configuring this email address link to include code that causes any email message created by the email sender to have included within it a token which identifies the email sender and causes the email server handling this message to communicate with the server on which the software is running for the purpose of receiving authorization from this server as to whether to deliver the email message to its intended receiver, and (c) establishing a set of rules which seeks to restrict the email message of spammers from being authorized for delivery to the email receiver.
摘要:
Computer system, method and program for determining which support team to assign a security problem. Two or more of the following determinations are made: (a) determining if the support team has responsibility for a security policy for a computer system in which the security problem resides, (b) determining if the support team has responsibility for a subsystem in which the security problem resides within the computer system, (c) determining if the support team has responsibility for a TCP or UDP port for an application associated with the security problem within the computer system, and (d) determining if the support team has responsibility for a type of the security problem by checking for predetermined key words or phrase within a text description of the security problem. The security problem can be a security policy violation or a network based vulnerability.
摘要:
System, method and program for controlling a mute function on a telephone device. While the mute function is active, sound reaching a telephone or other communication device is sensed, and a determination is made if the sound includes a word. If so, an alarm is activated to alert a user that the mute function is active. If not, the alarm is not activated. In accordance with an optional feature of the present invention, speech recognition software is trained to recognize the voice or speech pattern of a specific user, and the alarm is activated only if the word was spoken by the specific user.
摘要:
A method and system for a PCI-Express device is provided. The PCI-Express device includes a buffer memory placed in a receive path for receiving an incoming data stream from a Fibre Channel network, wherein the buffer memory is written in a first clock domain and read in a second clock domain using at least two read pointers that are generated by a read pointer logic module, and read pointer values are adjusted based on whether a character is inserted or deleted to avoid buffer memory underflow and/or overflow conditions.
摘要:
System, method and program product for determining if a first web page returned to a web browser is a redirected web page. A dummy URL is created by appending one or more characters to a URL of the first web page. The one or more characters are chosen such that the dummy URL is likely to elicit a redirected web page. The request for the dummy URL is sent. A second web page is received in response to the request. The second web page is a redirected web page. The content of the second web page is compared to content of the first web page to determine if the first web page is a redirected web page. The request for the dummy URL is sent to a same application that returned the second web page. If the content of the second web page matches the content of the first web page, a record is made that the first web page is a redirected web page, and if the content of the second web page does not match the content of the first web page, a record is made that the first web page was not determined to be a redirected web page. Also, the content of the first web page is scanned for a text phrase indicative of a redirected web page. The text phrase can include “page not found” or the like.
摘要:
A search and rescue training simulator and method. The training simulator comprises a first generating means, a second generating means, a third generating means, and a fourth generating means. The first generating means generates a simulated vehicle in motion performing a search and rescue function. The simulated vehicle includes a vehicular control panel. The second generating means generates a simulated environment. The third generating means generates a simulated receiver apparatus within the vehicular control panel. The fourth generating means generates a simulated transmitter apparatus within the simulated environment. The simulated transmitter apparatus is adapted to generate and transmit a signal. The simulated receiver apparatus is adapted to receive the signal and assist a user in locating the simulated transmitter apparatus in the simulated environment.