Abstract:
The proposed system employs one or more steps and an architectural arrangement of a plurality of relevant functional element to enable a security. A USB device is arranged to enable secure access of a computing device. A first cloud server is arranged to receive an ID, a cryptographic key, an authentication PIN and a pre-stored data from the computing device. The first cloud server encrypts the received pre-stored data using the received cryptographic key and subsequently transmits the ID, the cryptographic key and the authentication PIN, to a second cloud server. Further, the second cloud server performs a plurality of sequential functional operation, critical to the motive and objective of deploying the proposed system.
Abstract:
The proposed system employs an architectural arrangement of a plurality of relevant functional element to enable a secure communication. An artificial intelligence (AI) server is communicably coupled with a first local network server, a second local network server, a first computing device and a second computing device over a communication network interface. The AI server, first local network server, the second local network server is arranged to perform one or more security orchestration before transmission of the received encrypted data packet. The first computing device is arranged to receive the transmitted encryption key and the first self-destruction code, from the AI server, associated with the first communication request. Similarly, the second computing device receive the communicated acquired TEDP, the decryption key and the second self-destruction code, perform decryption, execution of the second self-destruction code to destroy the decryption key and triggers an execution command to execute the first self-destruction code to destroy the encryption key.
Abstract:
The proposed system employs one or more steps and an architectural arrangement of a plurality of relevant functional element to enable a security. A USB device is arranged to enable secure access of a computing device. A first cloud server is arranged to receive an ID, a cryptographic key, an authentication PIN and a pre-stored data from the computing device. The first cloud server encrypts the received pre-stored data using the received cryptographic key and subsequently transmits the ID, the cryptographic key and the authentication PIN, to a second cloud server. Further, the second cloud server performs a plurality of sequential functional operation, critical to the motive and objective of deploying the proposed system.
Abstract:
The present disclosure provides a method of dynamic region of interest adaptation and image capture device providing same. In one embodiment, there is a method of operating an image capture device. One or more regions within a real-time image may be used to set one or more user-defined regions of interest (ROIs) within the real-time image for applying one or more first image acquisition parameters. The one or more user-defined ROIs are cancelled and one or more default ROIs within the real-time image for applying one or more second image acquisition parameters are set when a position of the image capture device has changed by an amount which exceeds a threshold amount. Digital image data is acquired by the digital image sensor in accordance with one of the one or more user-defined ROIs and the one or more default ROIs.
Abstract:
The present disclosure provides a method of dynamic region of interest adaptation and image capture device providing same. In one embodiment, there is a method of operating an image capture device. One or more regions within a real-time image may be used to set one or more user-defined regions of interest (ROIs) within the real-time image for applying one or more first image acquisition parameters. The one or more user-defined ROIs are cancelled and one or more default ROIs within the real-time image for applying one or more second image acquisition parameters are set when a position of the image capture device has changed by an amount which exceeds a threshold amount. Digital image data is acquired by the digital image sensor in accordance with one of the one or more user-defined ROIs and the one or more default ROIs.
Abstract:
A method and apparatus for conducting simultaneous drilling and production are provided. The apparatus can include a ship shape floating vessel, wherein the ship shape floating vessel includes at least two drilling derricks, at least two drilling modules, and at least one production module, all situated on the upper surface of the ship shape floating vessel. The drilling modules are adapted for conducting drilling operations; the production module is adapted for conducting production operations. The apparatus can include at least two marine risers, wherein each marine riser depends from a drilling or production module toward a hydrocarbon bearing zone or sea floor and is adapted for conducting drilling and/or production operations; at least one production turret located on the lower surface of the ship shape floating vessel; and at least one production riser, wherein the production riser depends from the production turret, extends toward the sea floor, and is adapted for conducting production operations.
Abstract:
The present invention relates to management of network security of a computing environment. The method may include; utilizing an Artificial intelligence (AI) node to enable management of one or more physical assets and one or more digital assets of the CE, wherein the management comprises automatic control of at least one task related to access of data and communications thereof, wherein the at least one task is selected from: locking, unlocking, encryption, decryption, activation, and deactivation; detecting a non-desired event, which occurred at one or more physical assets and one or more digital assets; analysing the detected non-desired event through a machine learning technique to determine a customized recovery plan and a tailored protection protocol against the detected non-desired event.
Abstract:
Protective structures for offshore installations and methods for using same are provided. The protective structure can include a body adapted to be disposed at least partially about a primary structure of an offshore installation, and a support system can be disposed on the body. One or more protrusions can be disposed about an outer surface of the body. The protrusions can have a first end adapted to break ice. The support system can be adapted to isolate the one or more bodies from the primary structure such that the one or more bodies can absorb at least a portion of ice generated vibrations.
Abstract:
The present disclosure provides for processing of data captured by an image sensor in bust mode at two different quality levels. The data processed at the higher quality level is stored in a buffer memory until the higher quality processing is performed.
Abstract:
The technology includes processor-implemented methods, computer program products, and electronic devices for media module control. Media module zoom specifications are requested. Media module zoom specifications comprising zoom range are received. The received zoom range is divided into n discrete steps. A zoom bar is presented comprises an indicator of increasing zoom direction, an indicator of decreasing zoom direction, and a slider bar is presented. The slider bar is disposed substantially between the indicators. The slider bar displays zoom level as one of the n discrete steps from a first step equal to no zoom level, and an nth step equal to full zoom level. User input regarding a zoom level is received. Zoom is performed on the displayed image. The relative zoom level is displayed in the zoom bar.