Method and apparatus for analyzing sensor data
First Claim
Patent Images
1. A method of operating multiple differently-configured signal detectors in a battery-preserving manner, comprising the acts:
- receiving a set of audio and/or image content data in a battery-powered device;
for each of N differently-configured signal detectors, where N>
2, generating a probability datum indicating an estimate of whether that signal detector will achieve a positive detection result if applied to the received set of content data; and
based at least in part on said probability data, selecting M of said N differently-configured signal detectors, where 1<
M<
N, and invoking the selected signal detectors on the received set of content data;
wherein the method includes limiting processing resources employed by the invoked M detectors so that, in the aggregate, a previously-established processing budget is not exceeded.
1 Assignment
0 Petitions
Accused Products
Abstract
Mobile devices, such as smartphones, are severely battery-limited. The capabilities of mobile device processors have increased at exponential rates, but battery technologies have improved at much slower rates. As a consequence, it is ever more important that mobile devices be operated in battery-preserving manners. An aspect of the present technology concerns methods and arrangements enabling on-going recognition-processing of imagery and audio by different detectors, without the high battery drain that has characterized the prior art. A variety of other features and arrangements are also detailed.
13 Citations
18 Claims
-
1. A method of operating multiple differently-configured signal detectors in a battery-preserving manner, comprising the acts:
-
receiving a set of audio and/or image content data in a battery-powered device; for each of N differently-configured signal detectors, where N>
2, generating a probability datum indicating an estimate of whether that signal detector will achieve a positive detection result if applied to the received set of content data; andbased at least in part on said probability data, selecting M of said N differently-configured signal detectors, where 1<
M<
N, and invoking the selected signal detectors on the received set of content data;wherein the method includes limiting processing resources employed by the invoked M detectors so that, in the aggregate, a previously-established processing budget is not exceeded. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of applying N different detectors, D1 . . . DN, to different frames of image content data, where N is at least three, comprising the acts:
-
in a round “
A”
of signal processing;(a) processing between 1 and N of said different frames of image content data by applying, collectively, all N of the detectors thereto, wherein no detector is applied to more than one buffered frame; (b) identifying at least two of said detectors, including D1 and D2, that succeed in extracting information in act (a); and (c) identifying at least one of said detectors, DN, that fail in extracting information in act (a); in a subsequent round “
B”
of signal processing;(d) applying said at least two detectors, including D1 and D2, that succeeded in extracting information in round “
A”
to a single further buffer of content data; and(e) applying detector, DN, which failed in extracting information in round “
A,”
to a different further buffer of content data;wherein the foregoing acts are performed by a hardware processor. - View Dependent Claims (13, 14, 15)
-
-
16. A method of applying N different detectors, D1 . . . DN, to buffered frames of image content data, comprising the acts:
-
in a phase “
A”
of signal processing, processing a single buffered frame of image content with between 2 and N−
1 of said N detectors;in a phase “
B”
of signal processing that immediately follows phase “
A,”
processing a different single buffered frame of image content with plural of said detectors, including all of the detectors that succeeded in extracting information in phase “
A,”
together with one detector that was not applied—
or did not succeed in extracting information, in phase “
A,”wherein the foregoing acts are performed by a hardware processor. - View Dependent Claims (17, 18)
-
Specification