摘要:
Technologies for generating a warning based on environmental conditions sensed in a vehicle include an in-vehicle warning system for determining whether an operator of the vehicle is present, determining whether a non-operator occupant is present in the vehicle, and determining whether environmental conditions sensed within the vehicle satisfy a reference condition threshold. Such technologies may also include performing an emergency action in response to determining that the environmental conditions sensed within the vehicle satisfy the reference condition threshold, determining that the operator of the vehicle is not present, and determining that the non-operator occupant is present in the vehicle.
摘要:
Apparatuses, methods and storage medium associated with computerized assist or autonomous driving (CA/AD) of vehicles are disclosed herein. In various embodiments, an apparatus may include a CA/AD system to: receive an identifier identifying a driver/passenger of a vehicle; request or retrieve, using the identifier, individual driving preferences of the driver/passenger; and apply the individual driving preferences of the driver/passenger to policies for CA/AD of the vehicle, to customize the policies for CA/AD of the vehicle for the driver/passenger. The CA/AD system may further receive data for policy parameters of the customized policies; and CA/AD the vehicle, in a manner that is adapted for the individual, in accordance with the customized policies, based at least in part on the data for the policy parameters of the customized policies. Other embodiments may be described and claimed.
摘要:
The present disclosure relates to computer-implemented methods and systems for intelligent task management. An example method may include identifying one or more authorized entities. The method may further include broadcasting at least one task associated with a user to one or more devices associated with the one or more authorized entities. The method may further include receiving from the one or more authorized entities, via the one or more devices, an indication of acceptance of the at least one task. The method may further include selecting at least one trusted entity among the one or more authorized entities. The method may further include issuing at least one digital certificate to the at least one trusted entity to perform the at least one task.
摘要:
Apparatuses, methods and storage medium associated with computerized assist or autonomous driving of vehicles are disclosed herein. In embodiments, a method may include receiving, by a computing device, a plurality of data associated with vehicles driving at various locations within a locality; and generating, by the computing device, one or more locality specific policies for computerized assisted or autonomous driving of vehicles at the locality, based at least in part on the data associated with vehicles driving at various locations within the locality. Other embodiments may be described and claimed.
摘要:
Technologies for optimized vehicle parking include a parking management computing device and a number of advanced vehicles, each having an in-vehicle computing system. The parking management computing device establishes a secure control channel with each of the in-vehicle computing systems. Each of the in-vehicle computing systems may send a parking request to park or access the vehicle to the parking management computing device. The parking management computing device queries a number of the advanced vehicles that are already parked for positional or sensor data and determines an optimized parking configuration based on the parking request. The parking management computing device transmits movement requests to the in-vehicle computing systems to implement the optimized parking configuration. Each in-vehicle computing system may perform the movement request by using an autonomous driving capability, by using a remote control capability, or by notifying an operator. Other embodiments are described and claimed.
摘要:
Systems and methods to request and collect evidence elements from one or more evidence systems responsive to a triggering event are disclosed. An evidence request beacon may be generated based at least in part on information associated with the triggering event. The evidence request beacon may be received by one or more evidence systems and may be evaluated to determine if potentially relevant evidence is available from the evidence system. If potentially relevant evidence elements are available from the one or more evidence systems, then the potentially relevant evidence elements may be provided to the requesting system.
摘要:
The present disclosure relates to computer-implemented methods and systems for intelligent task management. An example method may include identifying one or more authorized entities. The method may further include broadcasting at least one task associated with a user to one or more devices associated with the one or more authorized entities. The method may further include receiving from the one or more authorized entities, via the one or more devices, an indication of acceptance of the at least one task, The method may further include selecting at least one trusted entity among the one or more authorized entities. The method may further include issuing at least one digital certificate to the at least one trusted entity to perform the at least one task.
摘要:
Technologies for determining a threat assessment based on fear responses comprises monitoring sensor data received from a sensor array located at a monitored site. The sensor data may include behavioral sensor data indicative of a physical behavior of individuals within the monitored site and physiological sensor data indicative of physiological characteristics of individuals within the monitored site. The threat assessment may be based on the behavioral sensor data and physiological sensor data. In some embodiments, context data related to the monitored site may be utilized analyze the behavioral sensor data and physiological sensor data and determine a threat assessment based thereon.
摘要:
Technologies for determining a threat assessment based on fear responses comprises monitoring sensor data received from a sensor array located at a monitored site. The sensor data may include behavioral sensor data indicative of a physical behavior of individuals within the monitored site and physiological sensor data indicative of physiological characteristics of individuals within the monitored site. The threat assessment may be based on the behavioral sensor data and physiological sensor data. In some embodiments, context data related to the monitored site may be utilized analyze the behavioral sensor data and physiological sensor data and determine a threat assessment based thereon.
摘要:
Various embodiments are directed to cooperation among communications devices having microphones to employ their microphones in unison to provide voice detection with noise reduction for voice communications. A first communications device comprises a processor circuit; a first microphone; an interface operative to communicatively couple the processor circuit to a network; and a storage communicatively coupled to the processor circuit and arranged to store a sequence of instructions operative on the processor circuit to store a first detected data that represents sounds detected by the first microphone; receive a second detected data via the network that represents sounds detected by a second microphone of a second communications device; subtractively sum the first and second data to create a processed data; and transmit the processed data to a third communications device. Other embodiments are described and claimed herein.