摘要:
A process for determining the location of entities carrying transmitters (TXs) that transmit TX ID messages to at least one receiver (RX) connected to a computer, in a network of computers. Each RX sends data messages to its associated computer which includes an identifier identifying the TX transmitting the TX ID message, the signal strength of the received TX ID message, and a RX identifier. Each RX computer generates badge hit messages from each data message, and provides them to a centralized computer of the network. The centralized computer generates a badge hit table having a separate entry for each badge hit message, which has fields including the information received in the badge hit message and a hit time indicating the time the entry was added to the table. The badge hit table data is used to determining the location of the TXs, and so the entities.
摘要:
A process for determining the location of entities carrying transmitters (TXs) that transmit TX ID messages to at least one receiver (RX) connected to a computer, in a network of computers. Each RX sends data messages to its associated computer which includes an identifier identifying the TX transmitting the TX ID message, the signal strength of the received TX ID message, and a RX identifier. Each RX computer generates badge hit messages from each data message, and provides them to a centralized computer of the network. The centralized computer generates a badge hit table having a separate entry for each badge hit message, which has fields including the information received in the badge hit message and a hit time indicating the time the entry was added to the table. The badge hit table data is used to determining the location of the TXs, and so the entities.
摘要:
A process for measuring the location of people and objects carrying radio frequency (RF) transmitters (TXs) that transmit messages to a plurality of RF receivers (RXs) located in a space. Each RX is in communication with a computer of a computer network and forwards data received from the TXs to the network via its associated computer, along with a value indicating the signal strength of the received TX transmission. The signal strengths attributable to the same transmission are used to form a locating signal strength vector which is then compared to exemplary vectors generated from signal strength readings gathered in a calibration procedure from a set of representative locations in the space. In comparing the locating vector to the exemplary vectors, constraints are enforced on movements between locations (e.g., cannot pass through walls) and to probabilistically enforce expectations on transitions between locations.
摘要:
A process for measuring the location of people and objects carrying radio frequency (RF) transmitters (TXs) that transmit messages to a plurality of RF receivers (RXs) located in a space. Each RX is in communication with a computer of a computer network and forwards data received from the TXs to the network via its associated computer, along with a value indicating the signal strength of the received TX transmission. The signal strengths attributable to the same transmission are used to form a locating signal strength vector which is then compared to exemplary vectors generated from signal strength readings gathered in a calibration procedure from a set of representative locations in the space. In comparing the locating vector to the exemplary vectors, constraints are enforced on movements between locations (e.g., cannot pass through walls) and to probabilistically enforce expectations on transitions between locations.
摘要:
A process for determining the location of entities carrying transmitters (TXs) that transmit TX ID messages to at least one receiver (RX) connected to a computer, in a network of computers. Each RX sends data messages to its associated computer which includes an identifier identifying the TX transmitting the TX ID message, the signal strength of the received TX ID message, and a RX identifier. Each RX computer generates badge hit messages from each data message, and provides them to a centralized computer of the network. The centralized computer generates a badge hit table having a separate entry for each badge hit message, which has fields including the information received in the badge hit message and a hit time indicating the time the entry was added to the table. The badge hit table data is used to determining the location of the TXs, and so the entities.
摘要:
A process for determining the location of entities carrying transmitters (TXs) that transmit TX ID messages to at least one receiver (RX) connected to a computer, in a network of computers. Each RX sends data messages to its associated computer which includes an identifier identifying the TX transmitting the TX ID message, the signal strength of the received TX ID message, and a RX identifier. Each RX computer generates badge hit messages from each data message, and provides them to a centralized computer of the network. The centralized computer generates a badge hit table having a separate entry for each badge hit message, which has fields including the information received in the badge hit message and a hit time indicating the time the entry was added to the table. The badge hit table data is used to determining the location of the TXs, and so the entities.
摘要:
A process for measuring the location of people and objects carrying radio frequency (RF) transmitters (TXs) that transmit messages to a plurality of RF receivers (RXs) located in a space. Each RX is in communication with a computer of a computer network and forwards data received from the TXs to the network via its associated computer, along with a value indicating the signal strength of the received TX transmission. The signal strengths attributable to the same transmission are used to form a locating signal strength vector which is then compared to exemplary vectors generated from signal strength readings gathered in a calibration procedure from a set of representative locations in the space. In comparing the locating vector to the exemplary vectors, constraints are enforced on movements between locations (e.g., cannot pass through walls) and to probabilistically enforce expectations on transitions between locations.
摘要:
A example method includes receiving, at a cell broadcast center (CBC) an alert request providing information for distribution to at least one user equipment, identifying a broadcast area based on the alert request, one or more cells within the broadcast area, determining a warning area list (WAL) for a message and transmitting the message with the WAL. The WAL may be a list of one or more Tracking Area Identity (TAIs) or a list of cell identifiers depending on various conditions.
摘要:
Sound barrier panels that are made from various waste materials, including scrap fiberglass reinforced plastic (FRP), scrap carpet fibers, recyclable plastics and mineral wool.
摘要:
System and method are provided where a plurality of luminaires, control switches, occupancy detectors, and photocells are connected to a central control module including a user interface which is used for setting up, testing, commissioning and maintaining the system; a memory card interface and associated memory card which can be used to load and save configuration data, update firmware, and log system operation. Lighting system can be set up and tested and then the configuration saved in a portable memory, such as on a memory card which can be transferred to another system where it is read to facilitate faster and easier configuring of the other system to parallel, or to be exactly like, the original system. Data stored on a portable memory can be automatically recognized to perform appropriate actions such as, for example: update configuration, or update firmware. Also provided is switching between different mutually exclusive lighting modes where the lighting of each mode is sequenced such that the second lighting mode is initiated before the first mode is terminated, resulting in a continuity of lighting in the controlled area. Other features include daylight harvesting control with multiple zone dimming and switching, programmable attack and decay dimming rates, the ability to return a system to its previous dimming level after the lights have been turned off, and the ability to start the controlled lights at full light level then dim down to the previous level to ensure the lighting ballast have sufficient voltage to start up.