会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Security system with distributed computing
    • 具有分布式计算的安全系统
    • US07734066B2
    • 2010-06-08
    • US10993929
    • 2004-11-19
    • Paul DeLiaJohn J. Reilly
    • Paul DeLiaJohn J. Reilly
    • G06K9/00G01N23/04G01N37/00G06Q10/00
    • B64F1/368G06Q10/02
    • A security system with a processor that receives information from multiple sources. The system is illustrated by a network of inspection machines at multiple locations in an airport, such as at check-in desks. These machines provide data to the processor for threat detection processing. The processor provides a central control and data integration point. Centralized control may be used to readily adapt threat detection programs and data integration may allow more accurate or more thorough threat determinations to be made. Moreover, centralized processing of computation intensive operations, such as image reconstruction, may provide for more efficient processor utilization throughout the system, providing a lower total processing cost. Additionally, centralized processing allows for human decision makers to be readily integrated into the system.
    • 具有从多个源接收信息的处理器的安全系统。 该系统由机场的多个位置的检查机器网络(例如在值机台)示出。 这些机器向处理器提供数据进行威胁检测处理。 处理器提供了一个中央控制和数据集成点。 集中控制可以用于容易地适应威胁检测程序,并且数据集成可以允许进行更准确或更彻底的威胁确定。 此外,诸如图像重建的计算密集型操作的集中处理可以提供整个系统中更有效的处理器利用,从而提供较低的总处理成本。 此外,集中处理允许人类决策者容易地集成到系统中。
    • 4. 发明申请
    • Security system with distributed computing
    • 具有分布式计算的安全系统
    • US20050198226A1
    • 2005-09-08
    • US10993929
    • 2004-11-19
    • Paul DeLiaJohn Reilly
    • Paul DeLiaJohn Reilly
    • B64F1/36G06F20060101G06F15/177G06K9/54G06K9/60
    • B64F1/368G06Q10/02
    • A security system with a processor that receives information from multiple sources. The system is illustrated by a network of inspection machines at multiple locations in an airport, such as at check-in desks. These machines provide data to the processor for threat detection processing. The processor provides a central control and data integration point. Centralized control may be used to readily adapt threat detection programs and data integration may allow more accurate or more thorough threat determinations to be made. Moreover, centralized processing of computation intensive operations, such as image reconstruction, may provide for more efficient processor utilization throughout the system, providing a lower total processing cost. Additionally, centralized processing allows for human decision makers to be readily integrated into the system.
    • 具有从多个源接收信息的处理器的安全系统。 该系统由机场的多个位置的检查机器网络(例如在值机台)示出。 这些机器向处理器提供数据进行威胁检测处理。 处理器提供了一个中央控制和数据集成点。 集中控制可以用于容易地适应威胁检测程序,并且数据集成可以允许进行更准确或更彻底的威胁确定。 此外,诸如图像重建的计算密集型操作的集中处理可以提供整个系统中更有效的处理器利用,从而提供较低的总处理成本。 此外,集中处理允许人类决策者容易地集成到系统中。
    • 5. 发明申请
    • Mmw contraband screening system
    • Mmw违禁品筛选系统
    • US20050110672A1
    • 2005-05-26
    • US10962693
    • 2004-10-12
    • Apostle CardiasmenosPaul DeLia
    • Apostle CardiasmenosPaul DeLia
    • G01N22/00G01S13/89G01V8/00G01S13/00G01N23/04G02F1/01H01L31/00
    • G01V8/005G01N21/3581G01N22/00G01S13/887G01S13/89
    • An inspection system that can detect contraband items concealed on, in or beneath an individual's clothing. The system employs mm wave radiation to detect contraband items. The system is described in connection with a check point security system that includes temperature controlled walls to enhance imaging of contraband items. Also, a mm wave camera is used in conjunction with a camera that forms visible images. To address privacy concerns of displaying images of people made with mm wave cameras that effectively “see through” clothes, the mm wave images are not displayed directly. Rather, computer processing produces indications of suspicious items from the underlying raw mm wave images. The indications of suspicious items are overlaid on the visible image.
    • 一个检测系统,可以检测隐藏在个人服装上或之下的违禁品。 该系统采用毫米波辐射检测违禁物品。 该系统与包括温度控制壁的检查点安全系统相结合来描述,以增强违禁物品的成像。 另外,毫米波相机与形成可见图像的相机结合使用。 为了解决隐私问题,展示了通过毫米波相机制作的人物的图像,这些照片可以有效地“透过”衣服,毫米波图像不会直接显示出来。 相反,计算机处理从底层的原始毫米波图像产生可疑物品的指示。 可疑物品的显示被覆盖在可见图像上。