摘要:
An ECU of a night vision system stores small obtained images of provisional targets as six templates depending on the distance from infrared cameras, and selects one of the templates depending on the distance up to an actual object. Using the selected template, the ECU performs template matching on images obtained by the infrared cameras, and calculates coordinates of the inspection target. The ECU compares the calculated coordinates of the inspection target and stored reference coordinates with each other, and determines mounted angles of the infrared cameras.
摘要:
An ECU of a night vision system stores small obtained images of provisional targets as six templates depending on the distance from infrared cameras, and selects one of the templates depending on the distance up to an actual object. Using the selected template, the ECU performs template matching on images obtained by the infrared cameras, and calculates coordinates of the inspection target. The ECU compares the calculated coordinates of the inspection target and stored reference coordinates with each other, and determines mounted angles of the infrared cameras.
摘要:
A mobile terminal prompts a user to make a voice message upon detection of an abnormally interrupted call, and records the message. Then, the mobile terminal converts the recorded voice data and a telephone number of a communication partner's terminal into a format suitable for data communication. Next, the mobile terminal transmits the converted data to a mobile data communication relay base station. The mobile data communication relay base station forwards the converted data to a data communication network storage device via a data communication network. A stored message transmitter retrieves the telephone number of the communication partner's terminal from the data communication network storage device and calls the communication partner's terminal via a fixed telephone network. When communication is established between the stored message transmitter and the communication partner's terminal, the stored message transmitter reproduces the voice data retrieved from the data communication network storage device in response to a request from the communication partner's terminal.
摘要:
A battery control system that communicates by way of a communication network with a plurality of batteries that are connected to an electric power system includes: communication characteristics detection means that detects characteristics of communication paths between the batteries and the battery control system for each of the plurality of batteries; selection means that, based on the detection results of the communication characteristics detection means, selects from among the plurality of batteries each battery that uses a communication path having characteristics within a predetermined range of communication characteristics as a candidate of a regulating battery that is to be used for regulating the electric power of the electric power system, and that selects regulating batteries from among candidates of regulating batteries based on predetermined conditions; and control means that supplies operation instructions that instruct the regulating batteries to charge or discharge.
摘要:
The content distribution system of the invention changes over the content distribution destination between terminals which have different content receiving formats. The terminals comprise means for requesting, while viewing content from a broadcasting station, changeover of distribution of this content to another terminal. The broadcasting station comprises means for changing over the content distribution destination on the basis of the aforesaid request. The content distribution system of the invention also comprises means for deciding on the distribution format of content in accordance with the type of aforesaid other terminal, which corresponds to the destination to which content distribution is to be changed over to by the changeover means. The means for deciding on distribution format comprises for example means which distributes content by scrambled broadcast when the aforesaid other terminal is a set-top box, and which encrypts content by means of codec conversion when the other terminal is a terminal connected in a broadband environment.
摘要:
A mobile terminal prompts a user to make a voice message upon detection of an abnormally interrupted call, and records the message. Then, the mobile terminal converts the recorded voice data and a telephone number of a communication partner's terminal into a format suitable for data communication. Next, the mobile terminal transmits the converted data to a mobile data communication relay base station. The mobile data communication relay base station forwards the converted data to a data communication network storage device via a data communication network. A stored message transmitter retrieves the telephone number of the communication partner's terminal from the data communication network storage device and calls the communication partner's terminal via a fixed telephone network. When communication is established between the stored message transmitter and the communication partner's terminal, the stored message transmitter reproduces the voice data retrieved from the data communication network storage device in response to a request from the communication partner's terminal.
摘要:
A mobile terminal transmits an N-th authentication key to an authentication server when the mobile terminal has moved from a coverage area under a certain radio access point to a coverage area under another radio access point. The N-th authentication key is generated by applying a hash function to a random number a number of times one smaller than an (N−1)th authentication key which was transmitted when the mobile terminal moved to the coverage area under the certain radio access point. Upon receipt of the N-th authentication key from the mobile terminal, the authentication server applies the hash function once to the N-th authentication key, and compares the result with the (N−1)th authentication key. Then, the authentication server determines that the authentication is successful when there is a match between both keys.
摘要:
A method for detecting an unauthorized or illicit traffic through a network comprises the steps of storing the expected values of a behavior for each type of the traffic in advance, separating individual traffics when performing communications through the network, measuring the behavior of the individually separated traffic, comparing the measured behavior with the expected values of the behavior, and determining the unauthorized or illicit traffic from the measured result.
摘要:
A wireless communication system has a packet switch, a position management table, and a position detector. Based on the fact that a position registration packet including the MAC address of a mobile terminal is received from a certain port, the position detector recognizes that the mobile terminal is present in the service area of a wireless base station connected to the port. Then, the position detector registers the MAC address of the mobile terminal and the port number of the port in the position management table 12. When the packet switch receives a data packet, the packet switch extracts the MAC address of a destination from the data packet, and searches the position management table based on the extracted MAC address. If a port number is hit in the searching of the position management table, then the packet switch recognizes the hit port number as an output destination, and transfers the data packet to the port represented by the port number.
摘要:
Provided is a data supply apparatus including a transmission device that sends data to another data supply apparatus; a reception device that receives data from another data supply apparatus; a data storing device that stores data in a storage device; and a data storage determination device that determines whether or not the received data should be stored in the storage device, based on a predetermined supply probability. In a typical example, the reception device receives the data to which supply probability information which indicates the supply probability has been appended; and the data storage determination device determines whether or not the received data should be stored in the storage device, based on the supply probability indicated by the supply probability information.