Abstract:
Coded light has been proposed to enable advanced control of light sources and transmit information using light sources. It is based on invisibly embedding of data and identifiers in their light output. Methods, devices and systems configured to efficient assignment of addresses in a coded lighting system, still allowing for unique identification, are proposed. More specifically, the assignment of addresses occurs in two phases, where in the initial phase wide area unique addresses are used, while in the second phase only local area unique addresses are used. Also, methods, devices and systems configured to efficiently distribute a set of addresses over a set of light sources in this second phase, to maximize the performance of the illumination contribution estimation, and positioning, are disclosed.
Abstract:
Controlling a lighting system, which comprises a controller (2, 10), lighting units (6), and a sensing device. Each lighting unit comprises a lighting source (12) and a modulated light source (14). A single light source may be used to function as both the lighting source and the modulated light source. Each modulated light source emits uniquely modulated light. A radiation pattern of each modulated light source coincides substantially with a radiation pattern of a lighting source of the same lighting unit. The sensing device is suitable to sense modulated light in a viewing area. Lighting units from which the sensing device senses modulated light are identified from the modulation of that modulated light. The sensing device measures the intensity of the modulated light from the identified lighting unit. The lighting sources are controlled dependent on control data which comprises measuring values of measured light intensities.
Abstract:
The invention is directed to the reception of high rate radio signals (for example DVB-T signals) while the receiver is moving at a high speed (for example in or with a car). Two or more antennas (12, 16) are closely spaced and arranged behind each other in the direction of motion (v) for receiving the radio signals. A difference (S 2 (t)-S 1 (t)) of a signal (S 1 (t)) obtained via the first antenna (12) and a signal (S 2 (t)) obtained via the second antenna (16) serves as an estimation of the spatial derivative of the receiving channel transfer function. This spatial derivative is interpreted as a temporal derivative and exploited to cancel or at least reduce distortions (for example ICI) due to rapid receiving channel variations.
Abstract:
It is presented a method for transmitting lighting device data. The method comprises the steps of obtaining, in a lighting device, a subset of lighting device data, the lighting device data containg information of the lighting device, transmitting, from the lighting device, using light, the subset of lighting device data, and repeating the above steps until all subsets jointly corresponding to the complete lighting device data have been transmitted. A corresponding lighting device and lighting system are also presented.
Abstract:
A communication network (10) comprising communication nodes (20, 20a, 40, 60, 70, 80, 90) operable to communicate data therebetween. The nodes (20, 20a, 40, 60, 70, 80, 90) include a mobile station (80) being operable to cooperate with first and second corresponding access points (70, 90), the first access point (70) being operable to provide a first communication route to the mobile station (80), and the second access point (90) being operable to sense operation of the first access point (70). The second access point (90) is operable to provide a second communication route to said at least one station (80) in an event of the first access point (70) ceasing to provide said first communication route. The sensing occurs in operation during slot periods (310, 320, 330, 340) individually assigned to the access points (70, 90). Moreover, the slot periods arise within signals (300) communicated within the network (10) for the access points (70, 90) to acknowledge receipt of messages from or to the mobile station (80).
Abstract:
A method and arrangement for detecting a watermark in an information signal is disclosed. The method comprises the steps of computing (24-28, 30) the correlation (dk) of said watermark (Wi) and said information signal (e.g. an image Q) for a plurality of positions (k) of said watermark with respect to said information signal, and detecting (29) whether at least one of the respective correlation values exceeds a given threshold. The step of detecting (29) comprises determining the standard deviation ( sigma d) of the respective correlation values (dk), and setting the threshold to a given multiple (T) of said standard deviation. The multiple (T) is derived from a desired false alarm rate (watermark detected when there is none, or no watermark detected when there is one).
Abstract:
Transmitters (116) for transmitting information and receivers (126) for receiving the information are defined by the information comprising a primary message and a secondary message combined in a same transmission or a same reception, which primary and secondary messages comprise communication protocol signaling messages, to avoid that a protocol conversion arrangement needs to be added to and to be placed between the transmitter (116) and the receiver (126). This increases the efficiency of the transmitter (116) and the receiver (126). The primary and secondary communication protocol messages are in accordance with first and second standards such as 802.11 a and later standards such as 802.11 n. The receiver (126) is able to detect the primary or secondary communication protocol message in case of the receiver (126) being in accordance with the first or second standard. The secondary message is embedded in the primary message via a modulation or via a selection of a subset of a set of a modulation constellation.
Abstract:
Methods for exchanging signals via a network with nodes (11-15) improve the performance of the network by letting a destination node (12) s receive the signals originating from a source node (11) via different first and second signal routes, and by processing and correlating these signals in the destination node (12). In dependence of a correlation result, a process for processing a signal in a node (11-15) is adjusted. This process may be situated in the destination node (12), or in the source node (11) or an io intermediate node (13-15), in which case a control signal is to be exchanged. A learning algorithm for the adjusting of the process can be run in the nodes (11-15).. Label switched routing can be introduced, whereby the label signal is sent from the source node (11) to the destination node via a third signal route different from the first and second signal route, to improve the efficiency of the nodes (11-15).
Abstract:
PHNL031053 An apparatus for processing data from an optical disk (20) generates a data signal by decoding information from the track (21) and a track position signal that is indicative of the radial position and/or depth of the track (21), and/or jitter in the position of edges of bit signals from the track (21). From the track position signal, values of plurality of characteristic measures are computed so that the computed values are substantially invariant under a phase of disk rotation, for example by determining the absolute values of Fourier transform components at multiples of the revolution frequency. Conditional use of the data signal is controlled dependent on the values computed for the characteristic measures. In one embodiment access is granted when the computed values match predetermined values for the disk. In another embodiment it is ensured that the disk is not removed from the apparatus during a session, by comparing a values that is sensitive to eccentricity with a value determined at the start of the session.
Abstract:
A system for authenticating a physical object includes an enrolment device, an authentication device, and a storage for storing authentication data. The enrolment device includes an input for receiving a property set Y of the object measured using a measurement procedure. A processor is used for creating a property set I from the measured property set Y that meet a predetermined robustness criterion. It then creating a property setA from the property set I that includes less information on the actual properties than property set Y, and finally generates a control value Vin dependence on properties of the property set A. An output is used for supplying the control value to the storage as part of the authentication data. The enrolment device operates in an analogous way.