Abstract:
A drone equipped with a camera, a wireless communication module, an acoustic sensor, a GPS receiver, software and collapsible floatation device patrols above swimmers. The camera and acoustic sensor capture the video and audio of the swimmers. The information is either streamed to a command center or processed by the onboard software. With audio and video analysis capabilities, software is used to detect a swimmer in distress (SID). Alternatively the information is streamed to lifeguard or volunteers all over the world to spot SID. Another detection method is to let swimmer wear a wearable emergency notification device, which sends wireless signals comprising GPS location data. A SID presses a button to indicate rescue request and the drones fly over by GPS signal guidance. Solar power is used as the optional power source of the drones, which would allow the to sustain operation for a prolonged period of time. Once a SID is identified, the drone or drones fly over the SID and drops the collapsible floatation device.
Abstract:
The present invention detects the movements or the open/close status of a door. After detection it flashes warning lights for approaching people or vehicles. In the primary embodiment, the lighting elements are displaced at the edge of the door panel to clearly indicate the edges. In another embodiment, the lighting element is displaced in a door knob that can warn the people of the opening of the door.
Abstract:
Virtual objects may generate recurring cash flows. Based on when, where, who and how the cash flows are generated, the virtual objects may be further divided into different tradable securities. A securitization document is established for a virtual object or a securitized package. The owner of the security is entitled to cash flows identified in the securitization document. A secondary market may be established for such securitized virtual objects, or virtual object ownership.
Abstract:
A drone equipped with a camera, a wireless communication module, an acoustic sensor, a GPS receiver, software and collapsible floatation device patrols above swimmers. The camera and acoustic sensor capture the video and audio of the swimmers. The information is either streamed to a command center or processed by the onboard software. With audio and video analysis capabilities, software is used to detect a swimmer in distress (SID). Alternatively the information is streamed to lifeguard or volunteers all over the world to spot SID. Another detection method is to let swimmer wear a wearable emergency notification device, which sends wireless signals comprising GPS location data. A SID presses a button to indicate rescue request and the drones fly over by GPS signal guidance. Solar power is used as the optional power source of the drones, which would allow the to sustain operation for a prolonged period of time. Once a SID is identified, the drone or drones fly over the SID and drops the collapsible floatation device.
Abstract:
A drone equipped with a camera, a wireless communication module, an acoustic sensor, a GPS receiver, software and collapsible floatation device patrols above swimmers. The camera and acoustic sensor capture the video and audio of the swimmers. The information is either streamed to a command center or processed by the onboard software. With audio and video analysis capabilities, software is used to detect a swimmer in distress (SID). Alternatively the information is streamed to lifeguard or volunteers all over the world to spot SID. Another detection method is to let swimmer wear a wearable emergency notification device, which sends wireless signals comprising GPS location data. A SID presses a button to indicate rescue request and the drones fly over by GPS signal guidance. Solar power is used as the optional power source of the drones, which would allow the to sustain operation for a prolonged period of time. Once a SID is identified, the drone or drones fly over the SID and drops the collapsible floatation device.
Abstract:
The present invention comprises a plurality of UUVs, tethers and tethered devices. The devices that are tethered comprise explosive devices or acoustic devices. The UUV provides mobility and controllability for the tethers and the tethered devices. The tether is also used as a means to entangle target vessel's propeller. The entangled propeller's revolution moves the explosive device closer to the target vessel for denotation. The tether is made with high strength material whereby once entangled, it is difficult for the propeller itself or intervention to disentangle. The system has a detachable housing with fluid dynamic shape. The whole system is designed to submerge during operation. The system can be wirelessly controlled by a remote command center via satellite link, or by a nearby command center directly.
Abstract:
A drone equipped with a camera, a wireless communication module, an acoustic sensor, a GPS receiver, software and collapsible floatation device patrols above swimmers. The camera and acoustic sensor capture the video and audio of the swimmers. The information is either streamed to a command center or processed by the onboard software. With audio and video analysis capabilities, software is used to detect a swimmer in distress (SID). Alternatively the information is streamed to lifeguard or volunteers all over the world to spot SID. Another detection method is to let swimmer wear a wearable emergency notification device, which sends wireless signals comprising GPS location data. A SID presses a button to indicate rescue request and the drones fly over by GPS signal guidance. Solar power is used as the optional power source of the drones, which would allow the to sustain operation for a prolonged period of time. Once a SID is identified, the drone or drones fly over the SID and drops the collapsible floatation device.
Abstract:
A system includes an unmanned aerial vehicle having a body with a hollow cavity, a plurality of rotary assemblies secured to the body and configured to provide lift, a control system disposed within the hollow cavity, a deterrent device secured to the body, a remote communication device operably associated with the control system. The method includes providing tracking location of a user upon activation of the remote control device, autonomously flying the unmanned aerial vehicle to a location of the remote communication device, and delivering a payload.
Abstract:
In a query-response model system of network communication, to protect user data privacy, a plurality of Camouflage Queries are automatically generated to be sent along with Intended Queries. The mix of intended queries and the Camouflage Queries masks and obscures the intended queries. Camouflage Messages or queries create a noisy background and thus lower the signal to noise ratio (SNR) for a server or interceptor to detect the intended queries.
Abstract:
In a query-response model system of network communication, to protect user data privacy, a plurality of Camouflage Queries are automatically generated to be sent along with Intended Queries. The mix of intended queries and the Camouflage Queries masks and obscures the intended queries. Camouflage Messages or queries create a noisy background and thus lower the signal to noise ratio (SNR) for a server or interceptor to detect the intended queries.