Abstract:
Described embodiments include a device, a method, and a system. A described device includes a closed-cycle heat transfer device. The device includes a hollow member configured to be thermally coupled with and to be disposed substantially parallel to a length of a live transmission line of an overhead power transmission system. The power transmission system is configured to transport electric power from one place to another. The device includes a working fluid contained within the hollow member and tuned to transport heat received from the live transmission line to a heat removal structure. The device includes the heat removal structure configured to dissipate the transported heat.
Abstract:
An electrochemical device (such as a battery) includes at least one electrode having a fluid surface, which may employ a surface energy effect to maintain a position of the fluid surface and/or to modulate flow within the fluid. Fluid-directing structures may also modulate flow or retain fluid in a predetermined pattern. An electrolyte within the device may also include an ion-transport fluid, for example infiltrated into a porous solid support.
Abstract:
According to various embodiments, a mobile device continuously and/or automatically scans a user environment for tags containing non-human-readable data. The mobile device may continuously and/or automatically scan the environment for tags without being specifically directed at a particular tag. The mobile device may be adapted to scan for audio tags, radio frequency tags, and/or image tags. The mobile device may be configured to scan for and identify tags within the user environment that satisfy a user preference. The mobile device may perform an action in response to identifying a tag that satisfies a user preference. The mobile device may be configured to scan for a wide variety of tags, including tags in the form of quick response codes, steganographic content, audio watermarks, audio outside of a human audible range, radio frequency identification tags, long wavelength identification tags, near field communication tags, and/or a Memory Spot device.
Abstract:
System and methods for identifying one or more out-of-network camera systems of interest and for enabling dynamic bidding for access to the one or more out-of-network camera systems are disclosed. In certain embodiments, identifying one or more out-of-network camera systems may include receiving a search query from a user, comparing search parameters included in the search query with information stored in a database and, based on the comparison, identify one or more camera systems satisfying the search query. In embodiments enabling bidding for access to one or more out-of-network camera systems, a bid management system may receive a plurality of bids for accessing one or more camera systems, determine at least one winning bid and corresponding winning bidder from the plurality of bids, and provide access to the one or more camera systems to the winning bidder.
Abstract:
Exemplary methods, systems and components enable detection and/or monitoring and/or control of electromagnetic radiation (EMR) exposure of target body-related portions of a user operating a telecommunication device. In some embodiments a risk-assessment output is provided based on a safety threshold or predetermined intrusion level of EMR exposure.
Abstract:
Exemplary methods, systems and components enable detection and/or monitoring and/or control of electromagnetic radiation (EMR) exposure of target body-related portions of a user operating a telecommunication device. In some embodiments a risk-assessment output is provided based on a safety threshold or predetermined intrusion level of EMR exposure. A further aspect may include interaction with external EMR sources regarding possible modification of emissions as well as possible arrangements for other types of remedial action. Some embodiments may provide travel route mapping data indicative of EMR source locations and/or irradiation values in a given locale.
Abstract:
Exemplary methods, systems and components enable detection and/or monitoring and/or control of electromagnetic radiation (EMR) exposure of target body-related portions of a user operating a telecommunication device. In some embodiments a risk-assessment output is provided based on a safety threshold or predetermined intrusion level of EMR exposure.
Abstract:
One or more human attributes extracted from a micro-impulse radar (MIR) signal is correlated to a temporary identity or phenotypic identity of a person.
Abstract:
A beam power source transmits a signal indicating power availability, receives a request for power in response, and beams power in response to the request.