摘要:
Embodiments of the invention employ a distributed algorithm to enable sensor nodes in a sensor network to adaptively self-configure into sensor clusters to provide a desired higher-level functionality.
摘要:
Methods and systems of the present invention employ perturbation techniques for configuring RFID-tag-reader networks in order to achieve increased overall efficiency of a network of RFID-tag readers. According to described embodiments of the present invention, individual RFID-tag readers within a multi-RFID-tag-reader network may be removed or shut down, or RFID-tag readers may be displaced relative to one another, in order to remove interferences between RFID-tag readers and to increase the interrogation efficiency of the multi-RFID-tag-reader network.
摘要:
Methods and systems of the present invention are directed to clustering RFID-tag readers of a multi-RFID-tag-reader network in order to obtain a set of RFID-tag readers with high probability of detecting an event, but with low probability of collisions and with an acceptable cost. The cost may be determined by any of numerous cost functions of the RFID-tag readers in the set of RFID-tag readers, and may represent a cost in power, long-term reliability, and other such metrics that may be applied to an RFID-tag network.
摘要:
Methods and systems of the present invention employ perturbation techniques for configuring RFID-tag-reader networks in order to achieve increased overall efficiency of a network of RFID-tag readers. According to described embodiments of the present invention, individual RFID-tag readers within a multi-RFID-tag-reader network may be removed or shut down, or RFID-tag readers may be displaced relative to one another, in order to remove interferences between RFID-tag readers and to increase the interrogation efficiency of the multi-RFID-tag-reader network.
摘要:
Methods and systems of the present invention are directed to clustering RFID-tag readers of a multi-RFID-tag-reader network in order to obtain a set of RFID-tag readers with high probability of detecting an event, but with low probability of collisions and with an acceptable cost. The cost may be determined by any of numerous cost functions of the RFID-tag readers in the set of RFID-tag readers, and may represent a cost in power, long-term reliability, and other such metrics that may be applied to an RFID-tag network.
摘要:
Systems and methods for configuring behaviors of sensors and actuators in a sensor network include receiving behavior ID tag information uniquely identifying a behavior, and configuring behavior in the sensor network according to the identified behavior. Behavior configuration may be effected by programming the sensors and actuators directly, or by programming a computing node connected to the sensors and actuators.
摘要:
An embodiment of a synchronizer for a mobile device comprises memory for containing identification data and message data. The synchronizer is operative at least part of the time when the mobile device is inactive to establish communication with a base station, to provide from memory identification data enabling the base station to establish communication between the synchronizer and a server and, where message data is waiting to be transferred between the server and the mobile device, to enable transfer of message data waiting to be transferred. The synchronizer is operative when the mobile device is active to transfer message data between the mobile device and the memory of the synchronizer.
摘要:
In a computerized method of identifying and displaying messages containing an identifier, where the messages are privately stored for restricted access by a user, the identifier of a document displayed in a navigation area result window is identified. In addition, the message store is scanned to identify messages containing the identifier and the messages identified as containing the identifier are displayed in a messaging area window.
摘要:
A position for a beacon in a location system is determined based on distances measured from positions in a local coordinate system for the location system and from intersection points of circles. The circles each have a center point of one of the positions in the local coordinate system and a radius of one of the measured distances.
摘要:
In a computerized method of identifying and displaying messages containing an identifier, where the messages are privately stored for restricted access by a user, the identifier of a document displayed in a navigation area result window is identified. In addition, the message store is scanned to identify messages containing the identifier and the messages identified as containing the identifier are displayed in a messaging area window.