摘要:
A product managing system and method using RFID technology is provided. The product managing system includes an RFID tag, an RFID reader, and a server. The RFID tag is set on a product for providing a tag ID, an object type and attribute, and an event content. The RFID reader reads the RFID tag. The server obtains various information provided by the RFID tag set on the product from the RFID reader, determines the product ID according to the tag ID, determines a class of the product and whether the product is correctly combined with another product according to the object type and attribute, and determines whether a processing procedure of the product is correctly conducted according to the event content. The server finally determines whether the product is normal according to the aforementioned determinations.
摘要:
A product managing system and method using RFID technology is provided. The product managing system includes an RFID tag, an RFID reader, and a server. The RFID tag is set on a product for providing a tag ID, an object type and attribute, and an event content. The RFID reader reads the RFID tag. The server obtains various information provided by the RFID tag set on the product from the RFID reader, determines the product ID according to the tag ID, determines a class of the product and whether the product is correctly combined with another product according to the object type and attribute, and determines whether a processing procedure of the product is correctly conducted according to the event content. The server finally determines whether the product is normal according to the aforementioned determinations.
摘要:
An executing system and executing method of intelligent rule base service (IRBS) is provided. The executing system uses a rule base service interface for receiving a service request content which includes a header from a rule base service module, and obtains a proper rule from the rule base according to the header when a rule component receives the service request content. Finally, a rule application component applies the received rule on a part of the service request content needed to be processed to obtain and output a processing result.
摘要:
A ubiquitous proxy mobile service method and system is disclosed. When a mobile device is near a dissemination medium, group data and individual data transmitted by at least one ubiquitous proxy transmission interface of the dissemination medium are read by a ubiquitous proxy receiving interface of the mobile device. A screen of the mobile device displays an interaction icon corresponding to the ubiquitous proxy according to the group data and the individual data. Uniform resource locator data in the individual data of the ubiquitous proxy corresponding to the interaction icon is read when the interaction icon is activated. A redirect operation is performed according to the uniform resource locator data to obtain a corresponding network service.
摘要:
Exemplary embodiments of the present invention illustrate a probability time division multiplexing polling method and a wireless identifier reader controller thereof. The probability time division multiplexing polling method is used to control a plurality of wireless identifier readers to be turned on or off. First, one of the wireless identifier readers is randomly selected according to a probability model, wherein the probability model presents the probabilities for detecting an identifier tag of the wireless identifier readers. Then, the selected wireless identifier reader is turned on for a predetermined time period.
摘要:
Exemplary embodiments of the present invention illustrate a probability time division multiplexing polling method and a wireless identifier reader controller thereof. The probability time division multiplexing polling method is used to control a plurality of wireless identifier readers to be turned on or off. First, one of the wireless identifier readers is randomly selected according to a probability model, wherein the probability model presents the probabilities for detecting an identifier tag of the wireless identifier readers. Then, the selected wireless identifier reader is turned on for a predetermined time period.
摘要:
A security mechanism for one-time secured data access, using re-writable/readable contactless tags with corresponding software and hardware implementations to provide a multi-layered one-time secured trading/service for various business transaction modes, such as business-to-business (B2B), business-to-consumer (B2C), and homo/hetero-business, so that information security of a company, a government department, or even a person can be enhanced while the complexity of data security control is greatly reduced.
摘要:
A method for integrating enterprise collaborative operations in the product lifecycle management (PLM) and a system thereof are proposed. The system comprises at least a message server, at least a web server, a system engineering service platform server, at least a PLM application system server and an enterprise portal server. The system can build a system integration environment between customers, central manufacturers, and providers and offer a collaborative platform between enterprises. Information can thus be interchanged in real time in this system integration environment in the whole PLM from idea through specification requirement, design, development, manufacturing to termination, thereby providing a system integration method and environment for collaborative management, development, manufacturing and marketing between enterprises, providers and customers.
摘要:
If an active smart node detects that an object leaves a center region of a FOV for a boundary region, the active smart node predicts a possible path of the object. When the object gets out of the FOV, the active smart node predicts the object appears in a FOV of another smart node according to the possible path and a spatial relation between cameras. The active smart node notifies another smart node to become a semi-active smart node which determines an image characteristic similarity between the object and a new object and returns to the active smart node if a condition is satisfied. The active smart node compares the returned characteristic similarity, an object discovery time at the semi-active smart node, and a distance between the active smart node and the semi-active smart node to calculate possibility.
摘要:
If an active smart node detects that an object leaves a center region of a FOV for a boundary region, the active smart node predicts a possible path of the object. When the object gets out of the FOV, the active smart node predicts the object appears in a FOV of another smart node according to the possible path and a spatial relation between cameras. The active smart node notifies another smart node to become a semi-active smart node which determines an image characteristic similarity between the object and a new object and returns to the active smart node if a condition is satisfied. The active smart node compares the returned characteristic similarity, an object discovery time at the semi-active smart node, and a distance between the active smart node and the semi-active smart node to calculate possibility.