Wireless sensor networks are characterized by its easiness to be deployed, programmability, and ability to be dynamically reconfigured. It is suitable for deployment in an environment where it is difficult or impossible to establish a pre-built network system, such as battlefields, disaster scenes, etc. For example, the Carnegie Mellon University in the United States is conducting a bio-war research program to develop a large and extensible wireless sensor network detection and analysis tool to detect the spread of biological warfare infectious disease and assist in the development of a rescue strategy. This program has been experimented in three U.S. cities. In addition, wireless sensor network can also replace the traditional sensor applications for home community security monitoring, factory equipment and automatic monitoring and maintenance, medical care, traffic monitoring and so on. Wireless sensor networks also bring new applications and markets, such as building energy monitoring, climate and earthquake monitoring.
技術現況敘述-英文: Wireless sensor networks are characterized by its easiness to be deployed, programmability, and ability to be dynamically reconfigured. It is suitable for deployment in an environment where it is difficult or impossible to establish a pre-built network system, such as battlefields, disaster scenes, etc. For example, the Carnegie Mellon University in the United States is conducting a bio-war research program to develop a large and extensible wireless sensor network detection and analysis tool to detect the spread of biological warfare infectious disease and assist in the development of a rescue strategy. This program has been experimented in three U.S. cities. In addition, wireless sensor network can also replace the traditional sensor applications for home community security monitoring, factory equipment and automatic monitoring and maintenance, medical care, traffic monitoring and so on. Wireless sensor networks also bring new applications and markets, such as building energy monitoring, climate and earthquake monitoring.
In the future, the communication between men and computers will be more natural. With a variety of context awareness technologies being used, smart computers will automatically collect all kinds of information from the context and analyze the information to provide mankind with the most appropriate service. The central idea of the context awareness platform technology is that these universal devices do not require consumers to operate, but automatically provide services and reduce operation by the users based on the user's surroundings, preferences, etc. This is a goal which must be achieved for computing to become popular. Humanization technology on the one hand can enhance the operational use through the user interface research and on the other hand can automatically obtain the user and environment related information to reduce operation.
技術規格
People finding system (802.15.4/Zigbee compliant based & WLAN based);Automatic equipment control ;感測網路與企業/家庭gateway聯結技術(uPNP, Zigbee,etc.)
技術現況敘述-英文: In the future, the communication between men and computers will be more natural. With a variety of context awareness technologies being used, smart computers will automatically collect all kinds of information from the context and analyze the information to provide mankind with the most appropriate service. The central idea of the context awareness platform technology is that these universal devices do not require consumers to operate, but automatically provide services and reduce operation by the users based on the user's surroundings, preferences, etc. This is a goal which must be achieved for computing to become popular. Humanization technology on the one hand can enhance the operational use through the user interface research and on the other hand can automatically obtain the user and environment related information to reduce operation.
技術規格: People finding system (802.15.4/Zigbee compliant based & WLAN based);Automatic equipment control ;感測網路與企業/家庭gateway聯結技術(uPNP, Zigbee,etc.)
A system for using priority to send interactive message is disclosed, which comprises: a message editor to gradually adjust the interactive-sensing range of plural interactive messages when the network bandwidth of a server is insufficient, and also encoding a first interactive message in a corresponding a message encoding format based on the transmission priority of the first interactive message to generate a second interactive message; and a message distribution module to receive and temporarily store the second interactive message and to transmit the second interactive message to the corresponding subscriber end based on the transmission priority of the second interactive message.
技術摘要-英文: A system for using priority to send interactive message is disclosed, which comprises: a message editor to gradually adjust the interactive-sensing range of plural interactive messages when the network bandwidth of a server is insufficient, and also encoding a first interactive message in a corresponding a message encoding format based on the transmission priority of the first interactive message to generate a second interactive message; and a message distribution module to receive and temporarily store the second interactive message and to transmit the second interactive message to the corresponding subscriber end based on the transmission priority of the second interactive message.
A kind of gradual bit compression method for network-caricature browsing habit is disclosed in the present invention. The caricature document is cut according to the caricature frame; and each frame is numbered according to the browsing sequence. When compressing the caricature document, the caricature frame with a smaller serial number has the priority to be compressed; and the region can have the priority to be displayed when decompressing.
技術摘要-英文: A kind of gradual bit compression method for network-caricature browsing habit is disclosed in the present invention. The caricature document is cut according to the caricature frame; and each frame is numbered according to the browsing sequence. When compressing the caricature document, the caricature frame with a smaller serial number has the priority to be compressed; and the region can have the priority to be displayed when decompressing.
A digital content protection method applied in a digital rights management (DRM) system is provided. A software identification certification authority issues an identification certification for the player and the user agent and embeds a verification program in the digital content provided by a content provider. When an end user executes the digital content, the verification program will be started to verify the validity of the player and the user agent. When all elements are verified, the user agent can control the player to execute the digital content according to the definition of the right permission to protect the right and interest for the content provider.
技術摘要-英文: A digital content protection method applied in a digital rights management (DRM) system is provided. A software identification certification authority issues an identification certification for the player and the user agent and embeds a verification program in the digital content provided by a content provider. When an end user executes the digital content, the verification program will be started to verify the validity of the player and the user agent. When all elements are verified, the user agent can control the player to execute the digital content according to the definition of the right permission to protect the right and interest for the content provider.
The invention relates to the memory utilization method for highly efficient JAVA application manager (JAM) and installation method thereof, which primarily allocate a preset stack space after initializing JAM. The preset stack space is used for proceeding at least an application program. If the space required by the at least one application program is less than other available space, then use those available space. If the space required by the at least one application program is more than other available space, then use the preset stack space and mark the preset stack space.
技術摘要-英文: The invention relates to the memory utilization method for highly efficient JAVA application manager (JAM) and installation method thereof, which primarily allocate a preset stack space after initializing JAM. The preset stack space is used for proceeding at least an application program. If the space required by the at least one application program is less than other available space, then use those available space. If the space required by the at least one application program is more than other available space, then use the preset stack space and mark the preset stack space.
對於無線感測網路系統而言,主要是以主節點(Coordinator)作為系統核心,往外開始生成完整的隨意網路(Mesh Network)。因此主節點將會擔任整個系統所有管理工作,包含網路的形成、網路位置的配置,安全金鑰的管理等等,所以有許多系統管理有關的資料,全部會集中傳送至主節點。儘管可能以較高階的嵌入式系統作為主節點(Coordinator),但要以這樣的硬體資源來執行較大的WSN系統的管理工作依舊顯得吃力。本項工作即是將傳統上需要由嵌入式系統來實作之主節點,改由一個 PC 上運作的程式來代替,以增進整體之效能與彈性。
技術現況敘述-英文
Wireless sensor network systems are mainly centered around the coordinator as the core for forming a complete mesh network. Therefore, the coordinator will be responsible for the management of the entire system of all management, including the formation of the network, the configuration of network locations and security key management, etc., as much system management related information will be sent to the coordinator. Although a higher order embedded system may be used as the coordinator, it is still touch for such a hardware resource to manage a larger WSN system. This task is to replace a coordinator which traditionally needs an imbedded system with a program running on a PC to enhance the overall performance and flexibility.
技術現況敘述-中文: 對於無線感測網路系統而言,主要是以主節點(Coordinator)作為系統核心,往外開始生成完整的隨意網路(Mesh Network)。因此主節點將會擔任整個系統所有管理工作,包含網路的形成、網路位置的配置,安全金鑰的管理等等,所以有許多系統管理有關的資料,全部會集中傳送至主節點。儘管可能以較高階的嵌入式系統作為主節點(Coordinator),但要以這樣的硬體資源來執行較大的WSN系統的管理工作依舊顯得吃力。本項工作即是將傳統上需要由嵌入式系統來實作之主節點,改由一個 PC 上運作的程式來代替,以增進整體之效能與彈性。
技術現況敘述-英文: Wireless sensor network systems are mainly centered around the coordinator as the core for forming a complete mesh network. Therefore, the coordinator will be responsible for the management of the entire system of all management, including the formation of the network, the configuration of network locations and security key management, etc., as much system management related information will be sent to the coordinator. Although a higher order embedded system may be used as the coordinator, it is still touch for such a hardware resource to manage a larger WSN system. This task is to replace a coordinator which traditionally needs an imbedded system with a program running on a PC to enhance the overall performance and flexibility.
The application service value chain of IMS includes network operators, content providers, mobile phone manufacturers and so on. The network operator is responsible for providing the IMS core network architecture, the content provider is responsible for designing the user's application or service, and the handset maker manufactures the standard IMS terminal equipment. The role of the project is to provide SIP-based IMS application interface reference implementation for mobile terminal operators to integrate IMS capable intermediary software while the application or service providers can develop a variety of value-added services based on this technology.
技術規格
‧Conform to JSR-281 IMS service API Ver.0.9_x000D_‧Conform to 3GPP IMS:TS 24.228, R5/6–IMS call control with SIP & SDP_x000D_‧Conform to 3GPP IMS: TS 24.229, R6–IMS SIP, SDP usage_x000D_
技術現況敘述-英文: The application service value chain of IMS includes network operators, content providers, mobile phone manufacturers and so on. The network operator is responsible for providing the IMS core network architecture, the content provider is responsible for designing the user's application or service, and the handset maker manufactures the standard IMS terminal equipment. The role of the project is to provide SIP-based IMS application interface reference implementation for mobile terminal operators to integrate IMS capable intermediary software while the application or service providers can develop a variety of value-added services based on this technology.
技術規格: ‧Conform to JSR-281 IMS service API Ver.0.9_x000D_‧Conform to 3GPP IMS:TS 24.228, R5/6–IMS call control with SIP & SDP_x000D_‧Conform to 3GPP IMS: TS 24.229, R6–IMS SIP, SDP usage_x000D_