Abstract:
An improved imprint device is disclosed. It comprises a drive component, an imprinting object, and at least one mold, stacked together within a chamber, a fluid supplier is used for providing the solvent fluid into the chamber through a pipe. The solvent fluid will permeate the imprinting object, and the imprinting object will be plasticized at the temperature lower than the glass transition temperature. The drive component is used for driving the mold to the plasticized imprinting object, so that the pattern on the mold will be imprinted on the imprinting object. It is the advantage of the present invention to reduce the process temperature, prevent the pattern distortion, and save the process time. Furthermore, by using the fluid and a barrier film as a pressing medium, the pressure can be applied to the object and the mold uniformly, such that a large area imprint can be achieved.
Abstract:
A roller imprinting apparatus avoiding the drawbacks of deformation of the imprinting apparatus, incomplete imprint and side collapse upon mold stripping is disclosed to include a plurality of transmission rollers respectively spaced from one another at a distance, an imprinting belt extending around the transmission rollers and carrying one or a number of imprint structures and defining a imprinting zone and adapted for imprinting the imprint structures in a substrate, and a curer disposed corresponding to the imprinting zone and adapted for curing the substrate being imprinted with the imprinting belt.
Abstract:
Disclosed is a method of recognizing a user of at least one mobile device by using an imaging device. The method comprises a first obtainment step of obtaining first positional information of the user of the at least one mobile device by using the imaging device; a second obtainment step of obtaining both second positional information and ID information of the at least one mobile device; a comparison step of comparing the first and second positional information so as to obtain a comparison result; and a determination step of determining, based on the comparison result, whether or not to let the ID information of the at least one mobile device be associated with the user of the at least one mobile device.
Abstract:
Disclosed is a method of estimating the distance between two nodes. The method includes obtaining an original real-time strength sequence, its elements being strengths of signals between the two nodes at respective time slots of a first time period; conducting multi-scale transform with respect to the original real-time strength sequence so as to acquire plural real-time strength component sequences which are results of the original real-time strength sequence projected onto plural scales; removing at least one burst noise element in each real-time strength component sequence so as to get plural updated real-time strength component sequences; estimating, based on the plural updated real-time strength component sequences and a multi-scale empirical mapping relationship, an empirical real-time distance, the multi-scale empirical mapping relationship being used for expressing correspondence relations between strength components and distance components; and determining, based on at least the empirical real-time distance, a real-time distance between the two nodes.
Abstract:
Disclosed is an access control method of an area restricted network system including a central control device and at least one area restricted network. Each area restricted network includes at least a master node. The method comprises a detection step of detecting that an access device has entered into an area restricted network in the area restricted network system; a receipt step of receiving, by a master node in the area restricted network, an authentication information request sent by the access device; a sending step of, in response to the authentication information request, generating and sending the authentication information for the access device by the master node in the area restricted network; and a request step of, by the access device, receiving the authentication information, and then utilizing the authentication information so as to send an authentication request to the central control device.
Abstract:
Disclosed are a wireless network area limiting method and a wireless network area limiting system based on NFC. The wireless network area limiting method includes a step of adopting a plurality of first NFC hot spot sensors to seamlessly define a limited area having any shape; a step of periodically generating and transmitting an area secret key by a first central control part respectively connected to the plurality of first NFC hot spot sensors; and a step of conducting handshake with the first central control part by a WLAN user equipment, which has a NFC function and is located in the limited area, based on the area secret key received by the WLAN user equipment, so that the first central control part establishes area-limited network communications in the limited area.
Abstract:
A transmitting device, a receiving device, a wireless communication system and a method for controlling the wireless communication system are used for creating a secure wireless communication network of a limited area. The transmitting device comprises: one or more transmitters configured to transmit wireless signals, and create the limited area by a coverage scope of the wireless signals; a cryptography key generating unit configured to generate a cryptography key for the wireless signals; a cryptography key encoding unit configured to encode the cryptography key to a cryptography key frame; and a cryptography key scheduling unit configured to schedule the cryptography key frame so as to control the transmitter to transmit the wireless signals including the cryptography key frame.
Abstract:
A method and a system for allocating a radio channel are disclosed. The method includes the steps of determining one or more priority radio channels exclusively for transmitting priority data; determining whether there is a condition of allocating the one or more priority radio channels in an organized wireless group (OWG); and allocating one of the one or more priority radio channels, when the one or more priority radio channels are empty.
Abstract:
Disclosed is a method of estimating the distance between two nodes. The method includes obtaining an original real-time strength sequence, its elements being strengths of signals between the two nodes at respective time slots of a first time period; conducting multi-scale transform with respect to the original real-time strength sequence so as to acquire plural real-time strength component sequences which are results of the original real-time strength sequence projected onto plural scales; removing at least one burst noise element in each real-time strength component sequence so as to get plural updated real-time strength component sequences; estimating, based on the plural updated real-time strength component sequences and a multi-scale empirical mapping relationship, an empirical real-time distance, the multi-scale empirical mapping relationship being used for expressing correspondence relations between strength components and distance components; and determining, based on at least the empirical real-time distance, a real-time distance between the two nodes.
Abstract:
Disclosed are an area-limited self-organized wireless network management method, a communication apparatus, and a system. The method comprises a step of, when a communications apparatus which is entering the limited area receives area signals for indicating a specific area in which network nodes are located, determining by the communications apparatus whether the master node exists in the limited area; a step of, if it is determined that the master node exists, performing identity authentication with regard to the master node and letting the communications apparatus itself be a sub node by the communications apparatus; and a step of, if it is determined that the master node does not exist, letting the communications apparatus itself be the master node by the communications apparatus, wherein, the master node is in charge of entering of a new sub node and synchronization of shared secret keys between the network nodes.