首页> 外国专利> IMAGE ANALYSIS METHOD AND APPARATUS IN A NETWORK THAT IS STRUCTURED WITH MULTIPLE LAYERS AND DIFFERENTIALLY WEIGHTED NEURONS

IMAGE ANALYSIS METHOD AND APPARATUS IN A NETWORK THAT IS STRUCTURED WITH MULTIPLE LAYERS AND DIFFERENTIALLY WEIGHTED NEURONS

机译:多层多层加权神经元构成的网络中的图像分析方法和装置

摘要

Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches. In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of “no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian's responsiveness to real or fabricated security breaches. Among other things, systems and methods are disclosed herein for facilitating (a) the registration of monitored sites, (b) the registration of Guardians, and (c) the management of monitoring sessions, including the routing of real and fabricated images to Guardians, the rating of Guardians, and the compensation of Guardians. Many additional and alternative embodiments are contemplated, including the following example of one embodiment.
机译:本文公开了用于促进在线劳动力的使用的系统和方法,以远程监视安全敏感站点并报告潜在的安全漏洞。在一些实施例中,照相机被配置为监视关键的民用基础设施,例如供水和核反应堆。照相机可操作地连接到中央计算机或一系列计算机,并且由照相机捕获的图像被传输到中央计算机。在最初向中央计算机注册后,Guardians“登录”到由中央计算机托管的中央网站并监视图像,从而获得了补偿。在一个实施例中,将“无人”区域的图像(不应该存在或监视人类或车辆的区域)发送给监护人,以简单确定图像中是否存在人类。站点所有者为此监视服务补偿计算机系统的运营商,然后运营商又根据例如(i)花费的监视时间和/或(ii)给定Guardian的响应程度来补偿Guardians。真实或人为的安全漏洞。除其他事项外,本文公开了用于促进(a)监视站点的注册,(b)监护人的注册和(c)监视会话的管理的系统和方法,其中包括将实际图像和虚构图像路由到监护人,监护人的等级和监护人的补偿。考虑了许多附加和替代实施例,包括一个实施例的以下示例。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号