摘要:
Methods and apparatuses for authenticating a biometric scanner, such as swipe type finger print scanners, involves estimating unique intrinsic characteristics of the scanner (scanner pattern), that are permanent over time, and can identify a scanner even among scanners of the same manufacturer and model. Image processing and analysis are used to extract a scanner pattern from images acquired with the scanner. The scanner pattern is used to verify whether the scanner that acquired a particular image is the same as the scanner that acquired one or several images during enrollment of the biometric information. Authenticating the scanner can prevent subsequent security attacks using counterfeit biometric information on the scanner, or on the user authentication system.
摘要:
Methods and apparatuses for authenticating a biometric scanner, such as area type finger print scanners, involves estimating unique intrinsic characteristics of the scanner (scanner pattern), that are permanent over time, and can identify a scanner even among scanners of the same manufacturer and model. Image processing and analysis are used to extract a scanner pattern from images acquired with the scanner. The scanner pattern is used to verify whether the scanner that acquired a particular image is the same as the scanner that acquired one or several images during enrollment of the biometric information. Authenticating the scanner can prevent subsequent security attacks using counterfeit biometric information on the scanner, or on the user authentication system.
摘要:
Disclosed is a method for managing mobility of mobile nodes between heterogeneous networks in an IP-based mobile communication system including a plurality of access nodes for providing an IP service to mobile nodes located in their service areas and a neighbor graph server for supporting connection to the access nodes by the mobile nodes. The method includes classifying the access nodes according to available service level; classifying the mobile nodes according to required service level, generating service level neighbor graphs each including access nodes supporting the same service level; generating a mapping table for mapping the mobile nodes to the neighbor graphs according to service level required by the mobile node; and supporting movement of a mobile node between networks using the neighbor graph and the mapping table.
摘要:
A continuous process for the separation of small particles from larger particles in a biological preparation passes a liquid stream of the preparation through a first filter or screen, which retains larger particles, passing smaller particles in the liquid. The large particles have retained on their surfaces wetting water, in which are entrained some of the small particles. The large particles are directed to a liquid having a concentration of smaller particles lower than the concentration of smaller particles in the wetting water, and mixed therein. The smaller particles separate from the larger particles in the mixed suspension, which is then directed to a second filter or screen, for further separation. The smaller particle/liquid stream may be recycled to the biological preparation stage, the liquid suspension for the large particles, or to a separator means where the smaller particles are separated off from the liquid stream. As the system is susceptible of being practiced as a continuous closed system, given an adequate liquid supply, the filtering steps may be repeated any number of times. When separated at the filters or screens, at least a portion of the stream of small particles and liquid must be directed to the separation means, so that said small particles may be eventually separated.
摘要:
Described herein are methods and systems, including computer program products, for optimizing and controlling the energy consumption of a building. A computing device generates thermal response coefficients for the building based on energy characteristics of the building and weather data associated with the location of the building. The computing device an energy response for each of a plurality of different points in time based on the thermal response coefficients and forecasted weather conditions. The computing device selects minimal energy requirements based on an energy consumption cost. The computing device determines a series of temperature set points based on the corresponding energy response and the minimal energy requirements. The computing device transmits the series of temperature set points to a thermostat, which adjusts operating parameters using each series of temperature set points when a time value matches the point in time associated with each series of temperature set points.
摘要:
Methods and apparatuses for authenticating a biometric scanner, such as area type finger print scanners, involves estimating unique intrinsic characteristics of the scanner (scanner pattern), that are permanent over time, and can identify a scanner even among scanners of the same manufacturer and model. Image processing and analysis are used to extract a scanner pattern from images acquired with the scanner. The scanner pattern is used to verify whether the scanner that acquired a particular image is the same as the scanner that acquired one or several images during enrollment of the biometric information. Authenticating the scanner can prevent subsequent security attacks using counterfeit biometric information on the scanner, or on the user authentication system.
摘要:
A system and method for determining a location of a mobile object is provided. The system determines the location of the mobile object by determining distances between a plurality of sensors provided on a first and second movable parts of the mobile object. A stride length, heading, and separation distance between the first and second movable parts are computed based on the determined distances and the location of the mobile object is determined based on the computed stride length, heading, and separation distance.
摘要:
The invention relates to data warehouses and the ability to create and maintain data cubes of multi-dimensional data. More specifically, the invention pertains to data cube architectures that permit significant reduction of storage, exhibit very efficient retrieval and provide a very efficient incremental update of the data cubes.
摘要:
Provided is a probing method for handoff including constructing a group of neighbor access points of a current access point with which the station associated, generating subgroups of the neighbor access points by the channel assigned to the access points, probing the access points by subgroup in a subgroup selection order, and selecting the neighbor access point having best link quality as a target access point to handoff. The probing method of the present invention is implemented with a novel non-overlap graph for constructing the neighbor graph such that the probing latency is dramatically reduced, resulting in reduction of handoff delay.
摘要:
A method for minimizing handoff latencies when a handoff is performed in a wireless network. An access point (AP) or base station associated to a current wireless station (STA) allows information required for a reassociation to the STA to be propagated to handoff-capable neighboring APs or base stations. When the STA moves, a neighboring AP or base station performs the reassociation to the STA on the basis of context. When a handoff procedure is performed, the time taken to receive context of a corresponding STA is reduced, such that a fast handoff can be implemented.