Cypress CY62167EV18 Bedienungsanleitung Seite 15

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 30
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 14
US
8,121,078
B2
effective
system.
Video
recording
can
be
done
at
the
central
location,
providing
the
bene?ts
of
immediate
access
to
secu
rity
of?cials,
elimination
of
daily
video
transfer
for
historical
recordkeeping
and
leveraging
lower
storage
costs
at
the
cen
tral
facility.
Military
and
Border
Patrol
In a
war
zone,
there
is
no
time
and
too
much
risk
to
install
video
surveillance
systems. In
terms
of
security,
there
is
no
greater
need
than
in
military
applications
for
quick,
reliable
and
secure
mobile
video
security
systems
that
can be cen
trally
monitored. Lives
can
be
saved
in
identifying
rogue
activity
and
quickly
responding
to
potentially
dangerous
sce
narios
before
an
enemy
can
act.
In
most
regions
of
interest,
there
is
no
power
availability
and
the
lack
of
a
surveillance
capability
can be
detrimental
to
securing
the
perimeter.
If
a
security
threat
cannot
be
identi?ed
and
responded
to
before
it
is
too
late,
then
the
effort
for
enforcing
barriers
and
prevent
ing
unauthorized
access
can
be
severely
hampered.
Using
the
wireless
network
camera
systems
described
herein,
the
perimeter
can be
visually
monitored
without
risk
to
military
personnel.
With
the
vast
expanses
that
a
border
patrol
monitors,
it
is
impossible
to
visually
monitor
all
activity
using
border
patrol
agents.
Using
the
wireless
network
camera
systems
described
herein,
remote
monitoring
of
border
regions
can
be
achieved.
A
larger
number
of
vital
regions
of
the
border
can
be
moni
tored
for
unauthorized
access
using
the
same
number
of
bor
der
agents,
providing
cost
savings
while
improving
e?i
ciency.
By
integrating
internal
video
analytics
software,
dynamic
frame
and
bit
rate
control
(e.g.,
allowing
for
slower
frame
and
bit
rates
when
nothing
is
happening,
but
switching
to
faster
frame
and
bit
rates
for
improved
video
quality
during
critical
events),
and
satellite
IP access
into
the
base
station,
border
regions
can
be
covered.
Mining
and
Underground
Applications
Underground
mine
safety
has
emerged
as
a
pressing
issue
worldwide.
Various
countries
and
states
have
begun
using
communication
technologies
to
improve
mine
safety.
One
primary
objective
is
to
maintain
and
ascertain
the
health
and
well-being
of
mining
personnel during
normal
and
emer
gency
conditions.
New
technologies
are
applied
to
address
voice
communications,
however,
video
surveillance
and
monitoring
can
provide
additional
avenues
to
increase
safety.
Furthermore,
video
surveillance
can be
used
to
gather
infor
mation
and
improve
the
e?iciency
and
reduce
down
time
for
mining
production.
However,
the
inherent
nature
of
mining
is
not
conducive
to
wired
camera
deployment.
The
wireless
camera
system
described
herein
can
be
implemented
to
moni
tor
underground
and mining
by
video
surveillance.
Dif?cult
Environments
In
many
environments
(e. g.,
near
or
under
water
or
hazard
ous
chemical
environments),
access
to
wired
power
supplies
can
be
dif?cult
if
not
impossible.
One
example
can
be
the
environment
in
and
around
swimming
pools.
In
such
envi
ronment,
wireless
camera
systems
described
herein
can
be
implemented
to
monitor
pool
safety
by
video
surveillance.
Additionally,
in
a
chemical
plant
or
processing
plants
where
caustic
or
hazardous
material
conditions
may
not allow
power
cabling
to
exist
or
where
the
installation
of
power
cabling
may
be
impractical,
the
wireless
camera
system
described
herein
can
be
implemented
to
monitor
plant
safety
by
video
surveillance.
Alarm
Veri?cation
Due
to
the
number
of
false
alarms
created
by
security
systems,
many
police
departments
are
reluctant
to
respond
to
alarms
unless
there
has
been
“visual
veri?cation”
that
the
situation
merits
a
response.
The
wireless
network
camera
20
25
30
35
40
45
50
55
60
65
10
systems
described
herein
can
provides
an
easy
to
install
(no
power
needed)
camera
system
to
allow
for
remote
visual
alarm
veri?cation
FIG.
1
is
a
block
diagram
of
a
battery
powered
wireless
camera 100
for
a
wireless
network
camera
system.
One
energy-saving
feature
of
the
battery
powered
wireless
camera
100
is
that
the
web
server
has
been
removed
from
the
camera
100
itself
By
not
having
the
web
server
functionality
in
the
wireless
camera
100,
the
camera
100
need
not
constantly
be
ready
to
respond
to
access
from
remote
clients,
which
access
the
web
server
to
initiate
data
transmission.
In
one
implemen
tation,
the
wireless
network
camera
100
can
be
powered
for
many
months
using
an
internal
battery
102.
The
battery
102
can
include,
e.g.,
solar
cells,
galvanic
cells,
?ow
cells,
fuel
cells,
kinetic
power
generators,
or
other
environmental
energy
sources.
Battery
powered
wireless
network
camera
operation
can
be
achieved,
for
example,
at
full-motion
frame
rates
in
excess
of
10 frames
per
second
at
a resolution
of
320x240
pixels.
The
wireless
camera
100
can
be
connected
through
a
wireless
network
150
with
a
base
station
160.
The
wireless
camera
100
includes
a
high-bandwidth
radio
frequency
(RF)
transceiver
104
and
a
low-bandwidth
RF
transceiver
106
for
communi
cating
with
the
base
station
160
through
the
wireless
link
150.
The
wireless
camera
100
also
includes
a
central
processing
unit
(CPU)
110
for
controlling
various
functionalities
asso
ciated
with
the
camera.
In
certain
implementations,
the
CPU
110
can
be
replaced
by
a
simpli?ed
micro-coded
engine
or
state
machine,
or
a
hard-coded
state
machine.
For
example,
the
micro-coded
engine
or
state
machine
can
be
similar
to that
of
an
RF
ID
tag
with
limited
response
to
input.
This
is
because
the
wireless
camera 100
can
perform
a limited
number
of
prede?ne
func
tions
and
those
functions
can
be
programmed
into
the
micro
coded
engine
or
hard-coded
state
machine.
In
this
manner,
the
power
requirement
and
the
cost
of
the
camera
can be
reduced.
In
an
alternative
implementation,
various
components
of
the
CPU
110
can
be
combined
into
a
single
ASIC, which
inte
grates
the
entire
active
and
some
passive
components
and
memory
in
order
to
achieve
power
savings.
Flash
memory
or
other
memory
components
can
be
the
only
exceptions
to
this
integration.
The
CPU
110
includes
a
general
purpose
microcontroller
112
running
a
light
real
time
operating
system.
Alternatively,
in
order
to
reduce
overhead
the
microcontroller
112
may
not
use
an
operation
system.
The
microcontroller
112
can
execute
programs
from
an
external
memory
such
as
a
?ash
memory
114
external
to
the
microcontroller
112
or
from
memory
internal
to
the
microcontroller
112.
The
CPU
110
also
includes
an
image/video
compression
engine
116,
which
can
perform
proprietary
compression
algorithms
or
a
standard
algorithms
such
as
MPEG2, MPEG4,
MJPEG,
J
PEG,
and
JPEG2000,
and
the
like.
Memory
contained
in
the
CPU
110
(e.g.,
?ash
memory
114
or
other
memory
devices)
can
store
both
compressed
and
uncompressed
video.
In
one
implementation,
the
compression
algorithm
can
generate
data
that
relates
to
the
relative
visual
importance
of
the
compressed
data
bits.
This
data
can be
utilized
by
the
forward
error
correction
(FEC)
section
of
the
wireless
radio
(e.g.
the
high-bandwidth
radio
104).
The
FEC
section
of
the
wireless
radio
can
provide
“un-equal
protection”
(UEP)
to
the
transmission
of
the
compressed
data
as
dictated
by
its
impor
tance.
The
complementary
decoder
can
be
implemented
in
the
base
station
160.
This
transmission
scheme
can
achieve
increased
ef?ciency
for
the
transmission
of
the
image
data.
One
example
of
such
transmission
scheme
is
a
publication
by
Seitenansicht 14
1 2 ... 10 11 12 13 14 15 16 17 18 19 20 ... 29 30

Kommentare zu diesen Handbüchern

Keine Kommentare