摘要:
An automated generation method of hardware/software interface for SIP development is provided. The method comprises establishing a template wherein an interface template is established for enabling a user to quickly generate a system architecture, designing a hardware access program wherein a driver is provided for a model of the interface template so that a user is able to run the driver to verify the correctness of a designed IP, designing a driver for creating a driver complying with a driver of an OS, and repeatedly verifying a created design module and a management module so as to determine the correctness of codes created by an interface module.
摘要:
The method for managing power includes the steps of: setting up a wake up time; checking the power supply status of the mobile communication device during the wake up time, and setting up the power supply status as an initial status; waking up the mobile communication device as the unattended mode, if the initial status is the suspended mode or the off mode, making the mobile communication device connect to the remote server, if the initial status is the on mode; connecting to the remote server and accessing data to the remote server; renewing the wake up time; and shifting the power supply status of the mobile communication device into the initial status and waiting for next-time wake up time.
摘要:
The method for managing power includes the steps of: setting up a wake up time; checking the power supply status of the mobile communication device during the wake up time, and setting up the power supply status as an initial status; waking up the mobile communication device as the unattended mode, if the initial status is the suspended mode or the off mode, making the mobile communication device connect to the remote server, if the initial status is the on mode; connecting to the remote server and accessing data to the remote server; renewing the wake up time; and shifting the power supply status of the mobile communication device into the initial status and waiting for next-time wake up time.
摘要:
A method for acquiring information is implemented in a hand-held mobile communications device to access information in a remote information server through the Internet. The method includes enabling the communications device to acquire information from the information server at predetermined times, to filter the acquired information according to a filtering rule, and to display information complying with the filtering rule or a notification message relating to the information complying with the filtering rule according to a user setting. The method and device permits user convenience and ensures information confidentiality, without incurring extra fees.
摘要:
A disk brake assembly includes a brake disk connected a wheel hub and a wheel shaft extends through a hole in the brake disk. A connection member is mounted to the wheel shaft and positions the brake disk is located between the connection member and the wheel hub. The connection member has two connection ports and a clamp device is connected to the two connection ports. A bicycle frame such as a front fork or a chain stay has a slot in which the wheel shaft is engaged. The connection member is securely positioned between the brake disk and the bicycle frame.
摘要:
A brake lever assembly includes a frame having a lever pivotably connected to a first end of the frame and a fastening device connected to a bottom of the frame. Two engaging slots are defined in a first end of the brake lever so as to engage two brake cables. A bolt member threadedly engaged with a second end of the frame and includes a head and a threaded shank. The threaded shank has two grooves defined longitudinally in an outside thereof so as to received the two brake cables and the head has two passages communicating with the two grooves so that the brake cables extend through the passages.
摘要:
An elastic seat of a bicycle brake device comprises a shaft sleeve, a bushing, a torsion spring, an adjustment cap, and a fastening bolt. The shaft sleeve is mounted in its entirety on a brake seat fastened at one end thereof with a fork of the bicycle. The shaft sleeve is provided with a retaining groove engageable with a retaining projection of the axial hole of the bushing. The bushing is further provided with a protruded ring engageable with a ring-shaped slot of the adjustment cap. The torsion spring is shielded by the bushing and the adjustment cap.
摘要:
A method for detecting dead pixels obtains a downsampling set formed by a plurality of sample pixels by downsampling a to-be-tested image, and computes a moving average for each sample pixel to determine whether the sample pixel is a dead pixel candidate. If so, all pixels in a neighborhood of the dead pixel candidate are determined as to-be-detected pixels. For each to-be-detected pixel, a compensated value and a weighted average under a mask are estimated. A hypothetic dead pixel value is obtained by comparing an original pixel value of each to-be-detected pixel and the moving average of the dead pixel candidate. Whether the to-be-detected pixel is a dead pixel is determined by using the original pixel value, the compensated value, the weighted average and the hypothetic dead pixel value.
摘要:
A dynamic decoding lookup table generation method is provided. The generation method includes: receiving a variable length coding (VLC) table; and dynamically establishing an adaptive decoding lookup table from the VLC table according to a target decoding rate and a free system memory resource.
摘要:
Methods for detecting an attempt to perpetrate fraud on a user utilizing a client-supplied link and a client-supplied IP address from a user computer. The method ascertains a first autonomous system number (“first AS number”) from the client-supplied IP address and a second autonomous system number (“second AS number”) from the client-supplied link. If the first AS number and the second AS number are not AS group peers, a pharming attempt is detected. Alternatively or additionally, the method includes analyzing a content of a webpage that is accessed using the client-supplied IP address to ascertain an identity of an apparent owner of the webpage and ascertaining a third autonomous system number (“third AS number”) from the identity of the apparent owner of the webpage. If the first AS number and the third AS number are not AS group peers, a phishing attempt is detected.