摘要:
A method for verifying operation of a first component in a single fault tolerant system is provided. The method includes monitoring for an expected action of the system that indirectly identifies the operating condition of the first component to a second component of the system, when the monitored expected action indicates a faulty operating condition, isolating the first component's errant behavior, and when the monitored expected action indicates a proper operating condition, proceeding with normal operation of the system.
摘要:
A method for arbitrating access to a time slot in a time division multiple access network in an asynchronous hub with a bus guardian is provided. The method including receiving signals from competing nodes claiming access to the same time slot at the bus guardian of the asynchronous hub, selecting one of the nodes based on a priority scheme, and relaying a message from the selected node and blocking the message from the non-selected node.
摘要:
A multi-channel TDMA network having priority based is provided. A network includes a plurality of channels, and a plurality of nodes adapted to transmit and received data. Through each channel, every node is coupled to communicate data with every other node. Within each channel, each node is assigned a unique priority rank. Only the node with the highest priority rank is permitted to transmit data during a time slot. For each channel of the multi-channel network, the plurality of nodes are ranked in a different priority direction.
摘要:
In one embodiment, a network comprises a plurality of linear bus nodes and a plurality of ring interface units. Each of the linear bus nodes is communicatively coupled to each of a plurality of rings using at least one of the plurality of ring interface units. In another embodiment, a network comprises a ring and a plurality of nodes. Each of the plurality of nodes is adapted to communicate data over a linear bus. The network further comprises a plurality of ring interface units. Each of the ring interface units communicatively couples a respective node to the ring.
摘要:
A portable radio-frequency identifier (RFID) reading terminal can comprise a microprocessor, a memory, an RFID reading device, and a display. The portable EIR terminal can be configured, responsive to successfully reading a plurality of RFID tags attached to a plurality of items sustained by a physical structure, to group the plurality of read RFID tags into zero or more clusters, by correlating quantities of RFID tags read within several time periods to spatial positions of the coverage shapes of the RF signals transmitted by the RFID reading device during the several time periods. The EIR terminal can be further configured to determine the spatial positions of the RFID signal coverage shapes based on the spatial positions and orientations of the portable EIR terminal during the several time periods. The EIR terminal can be further configured to display a quantity of RFID tags within each cluster overlaid over an image.
摘要:
A portable radio-frequency identifier (RFID) reading terminal can comprise a microprocessor, a memory, an RFID reading device, and a display. The portable EIR terminal can be configured, responsive to successfully reading a plurality of RFID tags attached to a plurality of items sustained by a physical structure, to group the plurality of read RFID tags into zero or more clusters, by correlating quantities of RFID tags read within several time periods to spatial positions of the coverage shapes of the RF signals transmitted by the RFID reading device during the several time periods. The EIR terminal can be further configured to determine the spatial positions of the RFID signal coverage shapes based on the spatial positions and orientations of the portable EIR terminal during the several time periods. The EIR terminal can be further configured to display a quantity of RFID tags within each cluster overlaid over an image.
摘要:
A method of mapping the location of at least one object in three dimensional space, relative to an initial point in three dimensional space by an EIR terminal which contains a microprocessor, memory, a scanning device, a motion sensing device, and a communication interface. The method includes scanning a signal of decodable indicia located at a pre-defined area of a physical object, locating the decodable indicia within this signal, decoding the decodable indicia into a decoded message. The decoded message is an identifier for said physical object, which is then displayed. After receiving an interface command, the EIR terminal is placed in mechanical contact with the pre-defined area of the physical object and a first spatial position is stored as a point of origin in the EIR terminal.
摘要:
A system and method to detect PASS-type device audio alarm signals and to locate such devices in alarm in a public building, airport, sports stadium or other structure which can include a system to measure speech intelligibility. Time and frequency domain analysis are carried out to establish the pressure of PASS-type device audio output signals.
摘要:
A measurement system and method combine an audio announcement system with a plurality of spaced apart sensors to evaluate intelligibility of audio output from loudspeakers of the audio announcement system. Processing can take place at some or all of the sensors as well as at a common control element. Evaluations can be based on use of an appropriate speech intelligibility index method.
摘要:
A system and method for laser source detection. An exemplary embodiment of the system includes a first array of lenses, a second array of opto devices (including light sources and light detectors), and at least one processor. By positioning the array of lenses to determine the lens position at which energy from an incoming laser is greatest on the light detectors, the approximate location of the laser source may be determined. Upon determining the source, responsive action may be taken. If the incoming laser is from a friendly party, a friendly-party notification may be provided. If the incoming laser is from an enemy, reciprocal targeting or false reflections may be employed.