1460707062-6914b458-f178-463d-b387-2bfc375c5a71

1. A method comprising:
storing a timer tick value in a register accessible to a power management controller in a processing device, wherein the timer tick value indicates when an interrupt is to occur in the processing device.
2. The method of claim 1, further comprising:
instructing at least one component of the processing device to transition out of a power gated state at a transition time indicated by the timer tick value stored in the register.
3. The method of claim 2, wherein instructing the at least one component of the processing device to transition out of the power gated state comprises instructing the at least one component of the processing device to transition from the power gated state to an active state sufficiently prior to the interrupt occurring in the processing device so that the at least one component is in the active state prior to the interrupt.
4. The method of claim 1, further comprising:
comparing costs and benefits of power gating at least one component of the processing device for a time interval between a current time and a time indicated by the timer tick value; and
power gating the at least one component in response to the benefits of power gating exceeding the costs.
5. The method of claim 1, further comprising:
setting a timer based on the timer tick value stored in the register, wherein the timer is started in response to at least one component of the processing device entering an idle state, and wherein the at least one component of the processing device is power gated in response to the timer expiring.
6. The method of claim 1, wherein storing the timer tick value in the register comprises storing the timer tick value in the register in response to the timer tick value being modified by at least one of an operating system, an application, and software implemented on the processing device.
7. The method of claim 1, further comprising
configuring at least one of a rendering rate and a video frame buffer used by a graphics processing unit in the processing device based on the timer tick value stored in the register.
8. An apparatus comprising:
a power management controller to control power management states of a processing device; and
a register to store a timer tick value accessible to the power management controller, wherein the timer tick value indicates when an interrupt is to occur in the processing device.
9. The apparatus of claim 8, further comprising:
at least one component of the processing device, and wherein the power management controller is to instruct the at least one component to transition out of a power gated state at a transition time indicated by the timer tick value stored in the register.
10. The apparatus of claim 9, wherein the power management controller is to instruct the at least one component of the processing device to transition from the power gated state to an active state sufficiently prior to the interrupt occurring in the processing device so that the at least one component is in the active state prior to the interrupt.
11. The apparatus of claim 8, wherein the power management controller is to compare costs and benefits of power gating at least one component of the processing device for a time interval between a current time and a time indicated by the timer tick value, and wherein the power management controller is to power gate the at least one component in response to the benefits of power gating exceeding the costs.
12. The apparatus of claim 8, wherein the power management controller is to set a timer based on the timer tick value stored in the register, wherein the timer is started in response to at least one component of the processing device entering an idle state, and wherein the at least one component of the processing device is power gated in response to the timer expiring.
13. The apparatus of claim 8, wherein the timer tick value is stored in the register in response to the timer value being modified by at least one of an operating system, an application, and software implemented on the processing device.
14. The apparatus of claim 8, further comprising
a graphics processing unit in the processing device, wherein at least one of a rendering rate and a video frame buffer used by the graphics processing unit is to be configured based on the timer tick value stored in the register.
15. A non-transitory computer readable medium embodying a set of executable instructions, the set of executable instructions to manipulate at least one processor to:
store a timer tick value in a register accessible to a power management controller in a processing device, wherein the timer tick value indicates when an interrupt is to occur in the processing device.
16. The non-transitory computer readable medium of claim 15, the set of executable instructions to manipulate the at least one processor to:
instruct at least one component of the processing device to transition out of a power gated state at a transition time indicated by the timer tick value stored in the register.
17. The non-transitory computer readable medium of claim 15, the set of executable instructions to manipulate the at least one processor to:
compare costs and benefits of power gating at least one component of the processing device for a time interval between a current time and a time indicated by the timer tick value; and
power gate the at least one component in response to the benefits of power gating exceeding the costs.
18. The non-transitory computer readable medium of claim 15, the set of executable instructions to manipulate the at least one processor to:
set a timer based on the timer tick value stored in the register, wherein the timer is started in response to at least one component of the processing device entering an idle state, and wherein the at least one component of the processing device is power gated in response to the timer expiring.
19. The non-transitory computer readable medium of claim 15, the set of executable instructions to manipulate the at least one processor to:
store the timer tick value in the register in response to the timer tick value being modified by at least one of an operating system, an application, and software implemented on the processing device.
20. The non-transitory computer readable medium of claim 15, the set of executable instructions to manipulate the at least one processor to:
configure at least one of a rendering rate and a video frame buffer used by a graphics processing unit in the processing device based on the timer tick value stored in the register.
The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.

1. A human body security inspection method, comprising the steps of:
retrieving in real-time scanning row or column image data of a personal to be inspected;
transmitting in real-time the image data to an algorithm processing module and processing these image data by the algorithm processing module;
automatically recognizing a suspicious matter by a suspicious matter automatic target recognition technique, after retrieving image data of an entire scanning image of the personal to be inspected; and
giving a corresponding alarm based on the recognition result of the suspicious matter, without displaying any image of the personal to be inspected.
2. The human body security inspection method of claim 1, further comprising:
after the scanning is finished, transmitting an entire original scanning image of the personal to be inspected to the algorithm processing module, so as to optimize the retrieved entire scanning image of the personal to be inspected.
3. The human body security inspection method of claim 1, further comprising:
after retrieving in real-time scanning row or column image data of personal to be inspected, displaying in real-time a privacy protection image and an outline image of the personal to be inspected on an equipment end display and a remote operation end display in the human body security inspection system, respectively, based on the image obtained by processing the scanning row or column image data;
recognizing the suspicious matter on basis of the outline image by means of a suspicious matter automatic target recognition technique; and
correspondingly displaying a suspected mark in the privacy protection image based on the suspicious matter recognized in the outline image.
4. The human body security inspection method of claim 3, wherein
the suspected mark matched with the suspicious matter is correspondingly displayed on the privacy protection image, based on a sort of the recognized suspicious matter and its position and size in the outline image.
5. The human body security inspection method of claim 4, wherein
the suspected mark is a suspected frame, and a colour of the suspected frame represents the sort of the suspected matter.
6. The human body security inspection method of claim 5, wherein
a suspected blue frame represents a metal article, a suspected green frame represents a non-metal article, and a suspected red frame represents explosives or drugs.
7. The human body security inspection method of claim 6, wherein
the privacy protection image is fully matched with an outline of the personal to be inspected, but does not contain detailed features of the personal to be inspected.
8. The human body security inspection method of claim 7, wherein
the privacy protection image and the outline image of the personal to be inspected are simultaneously obtained from the original scanning image, by means of the algorithm processing module in the human body security inspection system.
9. The human body security inspection method of claim 8, wherein
the physical profile image is obtained by removing the detailed features of the personal to be inspected with algorithm of the algorithm processing module.
10. The human body security inspection method of claim 9, wherein
during the removing step, mending and removing roughness of edges of the privacy protection image andor holes in an interior of the privacy protection image caused by presence of the suspicious matter, by means of the algorithm.
11. The human body security inspection method of claim 8, wherein
the outline image is obtained by performing denoising and contour extracting process on the original scanning image.
12. The human body security inspection method of claim 3, wherein
a remote operator performs a modifying operation of the suspicious matter on the outline image displayed on the remote operation end display, and confirms and submits the modifying operation;
it is determined whether an alarm should be given in accordance with a result after operation of the operator, and the modified suspected mark which is matched with the suspicious matter is correspondingly displayed on the privacy protection image.
13. The human body security inspection method of claim 12, wherein
the modifying operation comprises any one of addition of the suspected mark, deletion of the suspected mark, change of its size and change of its colour, or any combination thereof, and the privacy protection image is a puppet image or a physical profile image.
14. A human body security inspection system, which performs an inspection in a manner of combining a suspicious matter automatic target recognition technique, a privacy protection image and human-computer interaction during the human body security inspection, comprising:
an image retrieving device for retrieving scanning images of a personal to be inspected within a scanning region;
an automatic recognition device for implementing a suspicious matter automatic target recognition technique;
a human-computer interaction device for implementing a human-computer interaction operation;
a generating device for generating an outline image, a privacy protection image and a suspected mark of the recognized suspicious matter;
a warning device for giving an alarm whether the suspicious matter is present or not; and
a device for displaying the privacy protection image and the outline image on an equipment end display and a remote operation end display of the human body security inspection system respectively in a form of split-display.
15. The human body security inspection system of claim 14, wherein
the human body security inspection system is capable of performing any of the following inspection modes based on selection of a remote operator on the human-computer interaction device for implementing the human-computer interaction:
(1) determining whether to give an alarm that the suspicious matter is present or not, without displaying any image, directly from an automatic recognition result of the suspicious matter;
(2) using the split-display technique to display the privacy protection image and the outline image on the equipment end display and the remote operation end display of the human body security inspection system, respectively and determining whether to give an alarm from the automatic recognition result of the suspicious matter and showing the suspicious matter in a form of a suspected mark respectively in the privacy protection image and the outline image;
(3) using the split-display technique to display the privacy protection image and the outline image on the equipment end display and the remote operation end display of the human body security inspection system, respectively and showing the suspicious matter on the privacy protection image and the outline image in a form of a suspected mark,
performing the modifying operation of the suspected mark on the outline image by a remote operator and confirming to submit this modifying operation,
determining whether to give an alarm from the result obtained by the operation of the operator, and displaying the modified suspected mark on the privacy protection image.
16. The human body security inspection system of claim 15, wherein
the suspected mark is a suspected frame, and the modifying operation comprises any one of addition of the suspected mark, deletion of the suspected frame, change of its size and change of its colour, or any combination thereof.
17. The human body security inspection system of claim 15, wherein
a display on a scanning apparatus of the human body security inspection system is the equipment end display, and the privacy protection image displayed on the equipment end display is matched with the outline image displayed on the remote operation end display,
if the suspected mark on the outline image is modified, then a suspected mark on the privacy protection image displayed on the equipment end display is automatically modified so as to match to the suspected mark of the outline image.
18. A human body security inspection method, comprising the steps of:
retrieving in real-time scanning row or column image data of a personal to be inspected;
transmitting in real-time the image data to an algorithm processing module and processing these data by the algorithm processing module;
automatically recognizing a suspicious matter by a suspicious matter automatic target recognition technique, after retrieving an image data of an entire scanning image of the personal to be inspected;
any of the following three inspection modes is selected based on the selection of a remote operator, so as to perform a further processing on basis of the recognition result of the suspicious matter,
(1) determining whether to give an alarm that the suspicious matter is present or not, without displaying any image, directly from an automatic recognition result of the suspicious matter;
(2) using the split-display technique to display the privacy protection image and the outline image on the equipment end display and the remote operation end display of the human body security inspection system respectively, and determining whether to give an alarm from the automatic recognition result of the suspicious matter and showing the suspicious matter in a form of a suspected mark in the privacy protection image and the outline image respectively;
(3) using the split-display technique to display the privacy protection image and the outline image on the equipment end display and the remote operation end display of the human body security inspection system respectively, and showing the suspicious matter on the privacy protection image and the outline image in a form of a suspected mark,
performing the modifying operation of the suspected mark on the outline image by the remote operator and confirming to submit this modifying operation,
determining whether to give an alarm from the results by the operation of the operator, and displaying the modified suspected mark on the privacy protection image.