摘要:
1. ImageRank is an heuristic methodology for incorporating user interaction with the results of a search for images in order to enhance the relevance of future search results. 2. ImageRank incorporates several other derivative factors such as user history, image history, image-source history, temporal data and the relationship between the image and the successful terminology used to locate that image. Success is iterative-based and determined by (1) above and its derivatives. 3. ImageRank provides for a methodology that records all of the successful and unsuccessful search criteria ever deployed to locate an image described in (1) above and its derivatives as described in (2) above. This recorded history is exploited in order to track the changing use and meaning of words in languages to provide an
摘要:
The present invention relates to systems and methods to locate and recover objects equipped with tracking devices by determining the location information of the object. The system employs multiple radio direction finding (RDF) devices, which is capable of determining the angle of arrival of a radio signal. The MSC sends a request along with radio information to a location processor, which controls the RDF devices. The system also employs a theft detection device, which is capable of placing a wireless telephone call to a monitoring center. The theft detection device connects to and receives instructions from the monitoring center, which retrieves the instructions from a primary database server. If the primary database server is unavailable, the request for information is sent to a secondary database server.
摘要:
The present invention relates to systems and methods to locate and recover objects equipped with tracking devices by determining the location information of the object. The system employs multiple radio direction finding (RDF) devices, which is capable of determining the angle of arrival of a radio signal. The MSC sends a request along with radio information to a location processor, which controls the RDF devices. The system also employs a theft detection device, which is capable of placing a wireless telephone call to a monitoring center. The theft detection device connects to and receives instructions from the monitoring center, which retrieves the instructions from a primary database server. If the primary database server is unavailable, the request for information is sent to a secondary database server.