Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

606results about How to "Minimal impact" patented technology

Automatic energy management and energy consumption reduction, especially in commercial and multi-building systems

Automatic energy management is provided, in even the most complex multi-building system. The necessity of a human operator for managing energy in a complex, multi-building system is reduced and even eliminated. Computer-based monitoring and computer-based recognition of adverse energy events (such as the approach of a new energy peak) is highly advantageous in energy management. Immediate automatic querying of energy users within a system of buildings for energy curtailment possibilities is provided. Such immediate, automatic querying may be answered by the energy users through artificial intelligence and / or neural network technology provided to or programmed into the energy users, and the queried energy users may respond in real-time. Those real-time computerized responses with energy curtailment possibilities may be received automatically by a data processing facility, and processed in real-time. Advantageously, the responses from queried energy users with energy curtailment possibilities may be automatically processed into a round-robin curtailment rotation which may be implemented by a computer-based control system. Thus, impact on occupants is minimized, and energy use and energy cost may be beneficially reduced in an intelligent, real-time manner. The invention also provides for early-recognition of impending adverse energy events, optimal response to a particular energy situation, real-time analysis of energy-related data, etc.
Owner:INTERCAP CAPITAL PARTNERS

Automatic energy management and energy consumption reduction, especially in commercial and multi-building systems

Automatic energy management is provided, in even the most complex multi-building system. The necessity of a human operator for managing energy in a complex, multi-building system is reduced and even eliminated. Computer-based monitoring and computer-based recognition of adverse energy events (such as the approach of a new energy peak) is highly advantageous in energy management. Immediate automatic querying of energy users within a system of buildings for energy curtailment possibilities is provided. Such immediate, automatic querying may be answered by the energy users through artificial intelligence and / or neural network technology provided to or programmed into the energy users, and the queried energy users may respond in real-time. Those real-time computerized responses with energy curtailment possibilities may be received automatically by a data processing facility, and processed in real-time. Advantageously, the responses from queried energy users with energy curtailment possibilities may be automatically processed into a round-robin curtailment rotation which may be implemented by a computer-based control system. Thus, impact on occupants is minimized, and energy use and energy cost may be beneficially reduced in an intelligent, real-time manner. The invention also provides for early-recognition of impending adverse energy events, optimal response to a particular energy situation, real-time analysis of energy-related data, etc.
Owner:INTERCAP CAPITAL PARTNERS

System and method for dynamic distribution of intrusion signatures

A system and method for the dynamic distribution of intrusion signatures to aid in protecting a network system from harmful activities. An analysis function includes means for identifying one or more intrusion signatures to be dynamically distributed to an intrusion detection function for monitoring. The analysis function and/or the intrusion detection function may be centralized or distributed. Monitoring may be prioritized, localized, and made operational or non-operational. The intrusion detection function may be embodied in either or both of an appliance and a network forwarding device. The analysis function may distribute the intrusion detection function in addition to the intrusion signatures. In one embodiment of the invention, the system includes an intrusion detection function and a dynamic intrusion signatures function. The intrusion detection function monitors for and reports detected intrusion signatures. The dynamic intrusion signatures function determines whether reported intrusion signatures exist in a library of signatures associated with a particular intrusion detection function. If the reported signature does not exist in the library, the library is updated. Detected intrusion signatures are reported to similarly enabled devices for library analysis and updating, if necessary. The related method includes the steps of monitoring for intrusion signatures or other triggering events, analyzing the events and updating IDS signature libraries as necessary. Optional steps of the method include verifying that reported information has been received and acted upon, and recording of the detection, reporting, and updating information in a central repository. The system and method enable dynamic distribution of IDS signatures enabling improved network IDS coverage while limiting the processing and storage requirements of network devices, particularly forwarding devices such as switches and routers that may include the IDS function. That capability enables broader coverage, faster and better tuned responses to harmful activities.
Owner:EXTREME NETWORKS INC

Dynamic anomalous pixel detection and correction

A method and a system for dynamically detecting and correcting anomalous pixels in the raw data taken from an image sensor array such as a CCD or a CMOS sensor array, thus allowing the use of dumb cameras to capture digital images for subsequent use by an intelligent host—such as being displayed on a computer monitor. This invention uses software algorithms running on an intelligent host processor to dynamically correct the anomalous pixels in the raw data taken from an image sensor array typical of those in a digital still or a video camera. Using the combination of a dumb camera which provides raw data to an intelligent host, which does all the subsequent image processing, the system works by scanning an image frame for pixels that vary more than a specified amount in their brightness value from their neighboring pixels and designating those as defective pixels. The location and frequency of the photosites sending the defective pixels are stored in a statistical database in the computer's memory. The brightness value of a defective pixel is then replaced by a local brightness value obtained from the defective pixel's neighboring pixels. The process includes video subsampling, meaning that the defective pixel detection is carried out and repeated at a pre-specified frame rate to ensure optimum detection and correction at a minimal level of scanning. A statistical database is kept so that truly anomalous pixels can over time be distinguished from false detection of true anomalies in the target image, lighting or other environmentally induced anomalies.
Owner:LOGITECH EURO SA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products