摘要:
A method and apparatus for communicating information. In particular, a method of communicating data between a plurality of applications, comprising the following steps. A first list is encoded. The first encoded list includes a first set of data objects. Each of the data objects includes data to be communicated. Next, the first encoded list is transmitted to a first of the plurality of applications and decoded for the first application. The first application accesses a first subset of data objects from the first encoded list. The first subset of data objects does not necessarily include all data objects in the first set of data objects. Next, the first application generates a second encoded list, where the second encoded list corresponds to the first encoded list. Then, the first application causes the second encoded list to be transmitted to a second application and decoded for the second application. The second application then accesses a second subset of data objects corresponding to the second encoded list, the second subset of data objects not necessarily including the same data objects in the first subset of data objects. The first application and the second of the plurality of applications exchange data type information for the second subset of data objects corresponding to the second encoded list.
摘要:
Method for detecting bearing defect severity based on bearing rotation speed and at least one data sample of sensor data obtained to measure vibrations of a bearing ring is provided. The method includes converting the data sample from time domain to frequency domain to obtain a signal frequency spectrum; determining a defect center frequency of the bearing using the rotation speed; and identifying a predetermined number of frequency peaks of the signal frequency spectrum. A total vibration energy in an overall frequency band including the predetermined number of frequency peaks is first determined; next, for each of the frequency peaks, a peak energy as a spectral energy of signal components giving rise to the frequency peaks is determined; calculating a bearing defect spectral energy using the peak energies; and finally a ratio of the bearing defect spectral energy and a total vibration energy to assess a defect severity is obtained.
摘要:
In an example embodiment, a wireless client sends a probe request frame and waits for responses to the probe frame. The responses to the probe request from comprise encrypted data representative of the signal strength of the client as measured by the respondent that are digitally signed by the respondent's certificate. The client aggregates the responses and forwards them to a location based server.
摘要:
Mesh access point fault reporting. In particular implementations, a method includes receiving a fault indication indicating one or more failures; collecting fault data related to the one or more failures or a state of the mesh access point; and passing the fault data to the RFID tag, which wirelessly transmits messages relating to the fault.
摘要:
A device whose location is to be determined (target device) generates a plurality of frames (messages) and time of departure (TOD) timestamp information indicating when the target device transmits the plurality of frames in a sequence or burst. The target device transmits the plurality of frames and the TOD information, wherein the plurality of frames are transmitted such that at least two of the frames are on different radio frequency (RF) channels. Within a sequence or burst (or across multiple sequences or bursts), multiple widely spaced transmissions on the same channel are included to allow for estimation of the crystal frequency offset of the transmitting device. The TOD information included in the transmitted packets allows devices that receive the packets not to change their channels of operation solely for the purpose of receiving packets from the device to be located.
摘要:
Described herein in an example embodiment, is a mechanism to distribute and implement secure credentials on a WLAN (wireless local area network) employing radio frequency identification (RFID) tags. Symmetric keys are provisioned to the tag in a manner that allows for optimized re-association and secure announcements. The provisioned keys are derived in a way that enables the controller to operate without having to maintain the key state for every tag. In an example embodiment, the controller generates keys for the RFID tags that are derived from a master key associated with the controller, an identifier assigned to the RFID tag and an address associated with the RFID tag.
摘要:
Technology generally directed to operation of loading dock equipment such as vehicle restraints, dock levelers, overhead doors/openers, barrier gates, lights, and linked or unlinked control systems is disclosed herein. The disclosed technology may be employed to power electrical loading dock systems from batteries and/or alternative power sources, including “green” power sources. For example, the technology may be employed at new, temporary, and/or mobile facilities having any number of loading docks where reliable commercial power may not be readily available. Further, the technology may also be employed at warehouses in remote and/or developing areas where electrical infrastructure is not available and/or reasonably priced. The technology may be embodied as methods, apparatuses, manufactures (e.g., computer- and/or processor-readable storage and/or other mediums), and/or the like.
摘要:
In one embodiment, a method includes identifying a plurality of network elements for reinitiation, wherein the network elements are operative to manage at least one child element; selecting a first network element from the plurality of network elements, transmitting a disable message to the first network element; determining whether the at least one child element has migrated to one or more alternate network elements; and conditionally transmitting a reinitiation message to the first network element.
摘要:
Described in an example embodiment herein is a Mobility Service Engine (MSE) cluster comprising an MSE Cluster Master and at least one MSE Cluster Slave. The MSE Master is configured to define Network Service Segments. The MSE Master of the cluster distributes the Network Service Segments to slaves within the cluster. The network is configured to forward data to the correct Network Service Segment.
摘要:
In one embodiment, a method includes storing, in a data store, a physical network model of a network environment, the network environment comprising one or more central controllers and one or more access points each operative to associate with a central controller, the physical network model comprising one or more region objects, each region object corresponding to a physical region of the network environment, each region object further including one or more radio frequency (RF) coverage maps, each RF coverage map defining a location of one or more access points and RF properties of a physical space; receiving a first mapping definition between a location server and a one or more region objects of the physical network model; receiving a second mapping definition between the location server and one or more central controllers; transmitting the one or more region objects in the first mapping definition to the location server; and configuring the location server and the one or more central controllers in the second mapping definition to interoperate.