Abstract:
Security in a mobile ad hoc network is maintained by using various forms of encryption, various encryption schemes, and various multi-phase keying techniques. In one configuration, an over the air, three-phase, re-keying technique is utilized to ensure that no authorized nodes are lost during re-keying and that nodes that are intended to be excluded from re-keying are excluded. In another configuration, an over the air, two-phase keying technique, is utilized to maintain backwards secrecy.
Abstract:
Media is distributed via a scalable ad hoc geographic routing/broadcast protocol. Media can be transmitted from a mobile device to a cluster of mobile devices that are geographically located in a particular region. Devices that are located between the source and the intended target can act as routers with the ability to forward data packets toward the intended destination. In essence, a geocast network cloud is established, allowing any device within the cloud to communicate with any other device in the cloud. Devices in the network can constantly change position and the transmission path through the network can be constantly changing. The geocast protocol adapts to the changing conditions.
Abstract:
Disclosed is a wireless terminal that determines whether to retransmit a received packet. The wireless terminal is configured to determine a first distance from the wireless terminal to a point (e.g., the center point) in a geocast region. The wireless terminal is also configured to determine a plurality of distances between the point and each of a plurality of wireless terminals from which the wireless terminal has previously received a packet having an identifier that is the same as an identifier of the received packet. The wireless terminal is configured to retransmit the received packet if the first distance is less than each of the plurality of distances.
Abstract:
Methods and apparatus for configuring process, environmental, industrial and other control systems generate and/or utilize models representing configurations of control systems and/or the systems controlled by them. Records of changes to the models or the configurations represented by them are maintained, thereby, for example, providing bases for determining current states, prior states and histories of changes. Objects in the model have characteristics, such as an object type characteristic and an area characteristic. Users can have corresponding permissions. A security mechanism apparatus controls access by users to the objects. Composite objects are defined by definition objects and are displayed in encapsulated or expanded formats. Objects can include an edit control type identifier that determines how they are presented for editing. Functionality responds to user commands by transferring characteristics of a first object depicted by the graphical user interface to a second object. Configuration-time formulas contained objects are evaluated to constants prior to downloading to the control system.
Abstract:
Methods and apparatus for configuring process, environmental, industrial and other control systems generate and/or utilize models representing configurations of control systems and/or the systems controlled by them. Records of changes to the models or the configurations represented by them are maintained, thereby, for example, providing bases for determining current states, prior states and histories of changes. Objects in the model have characteristics, such as an object type characteristic and an area characteristic. Users can have corresponding permissions. A security mechanism apparatus controls access by users to the objects. Composite objects are defined by definition objects and are displayed in encapsulated or expanded formats. Objects can include an edit control type identifier that determines how they are presented for editing. Functionality responds to user commands by transferring characteristics of a first object depicted by the graphical user interface to a second object. Configuration-time formulas contained objects are evaluated to constants prior to downloading to the control system.
Abstract:
Methods and apparatus for configuring process, environmental, industrial and other control systems generate and/or utilize models representing configurations of control systems and/or the systems controlled by them. Records of changes to the models or the configurations represented by them are maintained, thereby, for example, providing bases for determining current states, prior states and histories of changes. Objects in the model have characteristics, such as an object type characteristic and an area characteristic. Users can have corresponding permissions. A security mechanism apparatus controls access by users to the objects. Composite objects are defined by definition objects and are displayed in encapsulated or expanded formats. Objects can include an edit control type identifier that determines how they are presented for editing. Functionality responds to user commands by transferring characteristics of a first object depicted by the graphical user interface to a second object. Configuration-time formulas contained objects are evaluated to constants prior to downloading to the control system.
Abstract:
Methods and apparatus for configuring process, environmental, industrial and other control systems generate and/or utilize models representing configurations of control systems and/or the systems controlled by them. Records of changes to the models or the configurations represented by them are maintained, thereby, for example, providing bases for determining current states, prior states and histories of changes. Objects in the model have characteristics, such as an object type characteristic and an area characteristic. Users can have corresponding permissions. A security mechanism apparatus controls access by users to the objects. Composite objects are defined by definition objects and are displayed in encapsulated or expanded formats. Objects can include an edit control type identifier that determines how they are presented for editing. Functionality responds to user commands by transferring characteristics of a first object depicted by the graphical user interface to a second object. Configuration-time formulas contained objects are evaluated to constants prior to downloading to the control system.
Abstract:
Methods and apparatus for configuring process, environmental, industrial and other control systems generate and/or utilize models representing configurations of control systems and/or the systems controlled by them. Records of changes to the models or the configurations represented by them are maintained, thereby, for example, providing bases for determining current states, prior states and histories of changes. Objects in the model have characteristics, such as an object type characteristic and an area characteristic. Users can have corresponding permissions. A security mechanism apparatus controls access by users to the objects. Composite objects are defined by definition objects and are displayed in encapsulated or expanded formats. Objects can include an edit control type identifier that determines how they are presented for editing. Functionality responds to user commands by transferring characteristics of a first object depicted by the graphical user interface to a second object. Configuration-time formulas contained objects are evaluated to constants prior to downloading to the control system.
Abstract:
A log transport device comprises an elongate base frame supported on wheels. A boom is pivotally supported on the base frame and supports a boom pulley supported thereon spaced from a pivot axis of the boom for pivotal movement with the boom relative to the base frame from a rear position in which the boom pulley is spaced above the rear end of the base frame, through an intermediate position in which the boom pulley is spaced upwardly and forwardly in relation to the rear position, to a forward position in which the boom pulley is spaced forwardly in relation to the intermediate position. A winch cable, coupled to a winch at a first end of the frame, extends over the boom pulley for connection to a load at the free end of the cable to permit lifting and pulling of a log forwardly onto the frame of the transport device without any costly hydraulically powered equipment or hydraulic pumps and the like being required.
Abstract:
A system and method for detecting mass based on a frequency differential of a resonating micromachined structure, such as a cantilever beam. A high aspect ratio cantilever beam is coated with an immobilized binding partner that couples to a predetermined cell or molecule. A first resonant frequency is determined for the cantilever having the immobilized binding partner. Upon exposure of the cantilever to a solution that binds with the binding partner, the mass of the cantilever beam increases. A second resonant frequency is determined and the differential resonant frequency provides the basis for detecting the target cell or molecule. The cantilever may be driven externally or by ambient noise. The frequency response of the beam can be determined optically using reflected light and two photodetectors or by interference using a single photodetector.