摘要:
Techniques are described herein for utilizing power requirements of a device in order to schedule wireless power delivery in wireless power delivery environments. In some embodiments, the techniques can alternatively or additionally employ advanced usage based power models to schedule wireless power delivery in wireless power delivery environments. For embodiments where device usage information is utilized, various means of collecting and analyzing the usage data may be employed. Furthermore, in some embodiments, some of the usage data may be ignored in order to ensure that the usage models for the device are not polluted with abnormal or detrimental data.
摘要:
Techniques are described herein for utilizing power requirements of a device in order to schedule wireless power delivery in wireless power delivery environments. In some embodiments, the techniques can alternatively or additionally employ advanced usage based power models to schedule wireless power delivery in wireless power delivery environments. For embodiments where device usage information is utilized, various means of collecting and analyzing the usage data may be employed. Furthermore, in some embodiments, some of the usage data may be ignored in order to ensure that the usage models for the device are not polluted with abnormal or detrimental data.
摘要:
A method for communicating utility-related data over at least one network is described. The method includes: receiving utility-related data from one or more premise units at a hub device during a first predetermined period of time, wherein utility-related data includes one or more of utility meter reading data, premise unit alarm data, premise unit event data, premise unit status data or firmware upgrade status data; securing the utility-related data at the hub device; and sending the utility-related data secured at the hub device to a designated server starting at a second time, where the second time is scheduled by the designated server and communication control information representative of the schedule is sent by the designated server to the hub device to establish a future WAN data connection between the hub device and the designated server. Further, a system for communicating utility-related data over at least one network is described.
摘要:
A system (200) for detecting false data injection attacks includes one or more sensors (205) configured to each monitor a component and generate signals representing measurement data associated with the component. The system (200) also includes a fault detection computer device (210) configured to: receive the signals representing measurement data from the one or more sensors (205), receive a fault indication of a fault associated with the component, generate a profile for the component based on the measurement data, and determine an accuracy of the fault indication based upon the generated profile.
摘要:
The Invention provides an intelligent imaging identification system comprising an intelligent chip, a mini picture-taking lens and a display screen that are connected to the intelligent chip, and a pest-catching device installed with the intelligent imaging identification system; the pest-catching device and the intelligent imaging identification system are arranged on a fixed board with a lamp cover; the pest-catching device comprises a piece of adhering paper, a collecting reel and a holder for adhering paper; the intelligent imaging identification system is below the pest-catching device. The Invention solves the technical defects of existing products through the intelligent imaging identification system. Using the pest-catching device installed with the intelligent imaging identification system can significantly reduce the costs for maintenance and consumables, enable the managers to remotely know the conditions of building sealing, sanitation and personnel specification on site, and bring more convenient management and economic benefits to enterprises authentically.
摘要:
Methods and synthesizing entities for synthesizing data feeds. The method includes registering the synthesizing entity with a registrar computer. Once the synthesizing entity is registered it can transmit a data feed request to the registrar computer for a data feed associated with a virtual device also registered with the registrar computer. The synthesizing entity then receives the requested data feed from the virtual device. The received data feed is then modified to generate a modified data feed. Once the modified data feed has been created the synthesizing entity can receive requests for the modified data feed from a virtual requestor device via the registrar. In response to receiving a request for the modified data feed the synthesizing entity provides the modified data feed to the virtual requestor device.
摘要:
Methods and synthesizing entities for synthesizing data feeds. The method includes registering the synthesizing entity with a registrar computer. Once the synthesizing entity is registered it can transmit a data feed request to the registrar computer for a data feed associated with a virtual device also registered with the registrar computer. The synthesizing entity then receives the requested data feed from the virtual device. The received data feed is then modified to generate a modified data feed. Once the modified data feed has been created the synthesizing entity can receive requests for the modified data feed from a virtual requestor device via the registrar. In response to receiving a request for the modified data feed the synthesizing entity provides the modified data feed to the virtual requestor device.
摘要:
A method is disclosed for preventing malicious settings changes to IEDs in a power transmission and distribution network. Attempted changes to the protection settings of an IED is detected and transmitted to one or more neighboring IEDs. The neighboring IEDs check for consistency of the new settings and return conformance or nonconformance signals. If a nonconformance signal is received, the attempted setting change is not allowed.