摘要:
A method for locating a user in a wireless network is disclosed. A mobile computer seeking to determine its location within a building detects the signal strength of one or more wireless base stations placed at known locations throughout the building. The mobile computer uses this measured signal strength to determine its location via a signal-strength-to-location table look-up. A table of known locations within the building and the base station signal strength at those locations is searched to find the most similar stored signal strength to the signal strength detected. The location corresponding to the most similar stored signal strength is determined to be the current location of the mobile computer. Alternatively, a number of signal strengths from the table can be used and the corresponding locations can be spatially averaged to determine the location of the mobile computer. The table can be derived empirically, by placing a mobile computer at the known locations and detecting the signal strength of the wireless base stations at those locations, or the table can be derived mathematically by taking into account a reference signal strength, the distance between the reference point and the known location, and the number of walls between the reference point and the known location. As an alternative, the base stations can detect the signal strength of the mobile computer. In such a case, the table would relate a known position of the mobile computer to the signal strength of the mobile computer at that location as detected by the one or more base stations.
摘要:
A method for locating a user in a wireless network is disclosed. A mobile computer which seeks to determine its location within a building detects the signal strength of one or more wireless base stations placed at known locations throughout the building. An environmentally profiled table of known locations within the building and the base station signal strength at those locations is searched to find the stored signal strength most similar to the signal strength detected. The location corresponding to the most similar stored signal strength is determined to be the current location of the mobile computer. The table can be derived empirically, by placing a mobile computer at the known locations and measuring the signal strength of the wireless base stations at those locations, or it can be derived mathematically by taking into account a reference signal strength, the distance between the reference point and the known location, and the number of intervening walls between the reference point and the known location. As an alternative, the base stations can measure the signal strength of the mobile computer. In such a case, the table would relate a known position of the mobile computer to the signal strength of the mobile computer as measured by the one or more base stations. Environmental profiling is achieved by comparing several different tables, corresponding to several different environments, and using the table that minimizes the error. Environmental profiling can be applied to tables determined empirically or mathematically.
摘要:
A mobile computer establishes a wireless communication session with a wireless access point of a computer network. The location of each wireless access point is known and obtainable either from a database on the network or from the access points themselves. The strengths of wireless signals passing between the mobile computer and multiple wireless access points of the network, including the access point with which the mobile computer has established the session are measured at multiple time intervals. The measurements may be taken at the mobile computer itself or at the wireless access points. The measured strength values are then weighted according to such factors as whether the mobile computer has already established a communication session with the access point from which the sample was taken, and how old the sample is. For each location, the weighted strength values obtained for access points in that location are summed. The location having the highest sum is deemed to be the location of the mobile computer.
摘要:
A slot assignment technique for assigning slots to a video communiction source in a slotted communication channel entails, in embodiments, using a slot from the channel to issue a coded request message containing a bit pattern indicative of a number of other slots that the video communication source requires for transmitting video information. At the receiver, the number of slots that the video communication source requires for transmitting video information is identified from the coded request via a lookup table. The requiste number of slots in the communication channel can then be allocated to the video commuinication source to transmit the video information. The bit pattern indicative of the number of slots that the video communication source requires generally comprises less data than would an uncoded request for the same number of slots. In this way, request limitations imposed by request slot size may be overcome.
摘要:
A full service channel access protocol that supports the integrated transport of voice, video and data communications is provided by dividing a communication channel into a plurality of frames, dividing each of the frames into a plurality of slots, and dividing some of the plurality of slots into a plurality of mini-slots. The mini-slots are provided for use by the multiple communication sources to request the establishment of a new voice, data, or video transmission connection over the communication channel. Additionally, a second one of the plurality of slots is divided into a plurality of second mini-slots for use by the multiple communication sources to request the establishment of a new voice, data, or video transmission connection over the communication channel and for use by the multiple communication sources to augment an existing video connection over the communication channel. The method enables timely and power efficient communications over communication network.
摘要:
A full service channel access protocol that supports the integrated transport of voice, video and data communications is provided by dividing a communication channel into a plurality of frames, dividing each of the frames into a plurality of slots, and dividing some of the plurality of slots into a plurality of mini-slots. The mini-slots are provided for use by the multiple communication sources to request the establishment of a new voice, data, or video transmission connection over the communication channel. Additionally, a second one of the plurality of slots is divided into a plurality of second mini-slots for use by the multiple communication sources to request the establishment of a new voice, data, or video transmission connection over the communication channel and for use by the multiple communication sources to augment an existing video connection over the communication channel. The method enables timely and power efficient communications over communication network
摘要:
Systems and methods are described relating to detecting an indication of a person within a specified proximity to at least one mobile device; and presenting an indication of location of the at least one mobile device at least partially based on the indication of the person within the specified proximity. Additionally, systems and methods are described relating to means for detecting an indication of a person within a specified proximity to at least one mobile device; and means for presenting an indication of location of the at least one mobile device at least partially based on the indication of the person within the specified proximity.
摘要:
Techniques for ability enhancement are described. Some embodiments provide an ability enhancement facilitator system (“AEFS”) configured to enhance a user's ability to operate or function in a transportation-related context as a pedestrian or a vehicle operator. In one embodiment, the AEFS is configured to perform vehicular threat detection based on information received at a road-based device, such as a sensor or processor that is deployed at the side of a road. An example AEFS receives, at a road-based device, information about a first vehicle that is proximate to the road-based device. The AEFS analyzes the received information to determine threat information, such as that the vehicle may collide with the user. The AEFS then informs the user of the determined threat information, such as by transmitting a warning to a wearable device configured to present the warning to the user.
摘要:
Techniques for ability enhancement are described. Some embodiments provide an ability enhancement facilitator system (“AEFS”) configured to enhance voice conferencing among multiple speakers. Some embodiments of the AEFS enhance voice conferencing by recording, translating and presenting voice conference history information based on speaker-related information, wherein the translation is based on language identification using multiple speech recognizers and GPS information. The AEFS receives data that represents utterances of multiple speakers who are engaging in a voice conference with one another. The AEFS then determines speaker-related information, such as by identifying a current speaker, locating an information item (e.g., an email message, document) associated with the speaker, or the like. The AEFS records conference history information (e.g., a transcript) based on the determined speaker-related information. The AEFS then informs a user of the conference history information, such as by presenting a transcript of the voice conference and/or related information items on a display of a conferencing device associated with the user.
摘要:
Techniques for ability enhancement are described. Some embodiments provide an ability enhancement facilitator system (“AEFS”) configured to enhance a user's ability to operate or function in a transportation-related context as a pedestrian or a vehicle operator. In one embodiment, the AEFS is configured perform vehicular threat detection based at least in part on analyzing audio signals. An example AEFS receives data that represents an audio signal emitted by a vehicle. The AEFS analyzes the audio signal to determine vehicular threat information, such as that the vehicle may collide with the user. The AEFS then informs the user of the determined vehicular threat information, such as by transmitting a warning to a wearable device configured to present the warning to the user.