ASYNCHRONOUS POWER MANAGEMENT METHODS AND SYSTEMS FOR WIRELESS NETWORKS |
USA
|
Abstract
Asynchronous power management methods and systems for a first station and a second station in a wireless network. The second station dynamically tunes a SRI (Schedule Repetition Interval Awake Beacon Intervals)” within an SRI. An ABI-set defined as the positions of ABIs in an SRI forms a cyclic difference set comprising at least two consecutive BIs. The second station transmits a beacon frame within a beacon window. When the first station has recently received the beacon frame from the second station, the first station predicts the awake/sleep schedule of the second station, and transmits data frames to the second station at the ABI of the second station.
|
COMMUNICATION APPARATUS, METHOD, AND COMPUTER READABLE MEDIUM THEREOF FOR SWITCHING CHANNELS IN A BEACON NETWORK |
USA
|
Abstract
A communication apparatus originally transmits data packets via a first channel based on a first beacon interval. A memory thereof records the first beacon interval. A receiving interface thereof receives information of a second channel. A processor thereof determines whether the second channel has been used according to the information. If not, a transmission interface thereof switches the communication channel to the second channel, and transmits data based on the first beacon interval via the second channel in order to solve the problem that packets are delay for transmission or even abandoned due to overload of the beacon network.
|
WIRELESS COMMUNICATION SYSTEM, METHOD FOR ENHANCING NETWORK EFFICIENCY, AND COMPUTER PROGRAM PRODUCT THEREFOR |
USA
|
Abstract
A wireless communication system, a method for enhancing network efficiency, and a computer program product therefor are provided. The wireless communication system includes a transmitting apparatus and a receiving apparatus. The method and the computer program product therefor perform the following steps. The transmitting apparatus transmits a request-to-send packet to the receiving apparatus. After receiving the request-to-send packet, the receiving apparatus measures a request-to-send power of the received request-to-send packet to calculate a clear-to-send power. The receiving apparatus then uses the clear-to-send power to broadcast a clear-to-send packet. All neighboring transmitting apparatuses that can hear this clear-to-send packet should prohibit themselves from sending packets during the period specified in the clear-to-send packet to avoid colliding with a data packet that will soon be sent from the transmitting apparatus to the receiving apparatus.
|
METHOD FOR PROTECTING CONTENT OF VECTOR GRAPHICS FORMATS |
USA
|
Abstract
A method for protecting content of vector graphics formats is provided. A first vector graphics is scrambled to generate a second vector graphics. Then a plurality of pixel samplings are performed by the first vector graphics which generating at least a recovery information object according to a predetermined graphics. The predetermined graphics is watermarked to generate a watermark object. And the recovery information object is encoded and embedded in the watermark object to generate a recovery information watermark. Finally, the second vector graphics, the recovery information watermark, and the recovery code are combined to generate a protected first vector graphics.
|
POWER MANAGEMENT METHODS AND SYSTEMS |
USA
|
Abstract
Power management methods and systems for a first station and a second station in an ad-hoc network. Each station enters the normal beacon interval (NBI BIs LI BBIs RBI NBI BIs LI BBIs RBI)” within a beacon window. Once the first station correctly receives the beacon frame from the second station, the first station predicts the NBI of the second station according to the RBI. At the NBI of the second station, the first station transmits data frames to the second station.
|
VIDEO DECODING METHODS AND DEVICES |
USA
|
Abstract
A video decoding method. The first frame of video data is acquired, the first frame is assigned to the backward reference frame and the forward reference frame respectively, and a frame buffer is emptied. Next, the next frame of the video data is acquired, and frame type is then determined. If the frame is a B-frame, corresponding decoding operations are implemented according to the determining result, and the frame is temporarily stored in the frame buffer.
|
WIRELESS COMMUNICATION SYSTEM USING CHANNEL ACCESS BASED ON A CONTENTION APPROACH AND METHOD THEREOF |
USA
|
Abstract
A wireless communication system using channel access based on a contention approach and method thereof is disclosed, which allocates plural sets of time slots in a predetermined contention interval, wherein each set of time slots further includes plural adjacent overlapped time slots. A channel requester transmits a contention message to a channel allocator at a time slot based on an interleaved method after the channel requester completes count down of a predetermined time, so that the positions of the headers of the contention messages in the adjacent time slots of each set of time slot are different. Thus, if the contention message transmitted by the channel requester collides with the contention message of the adjacent time slot, the channel allocator can parse the headers of the collided contention messages and respectively allocate plural special channel times for communicating with the channel requesters.
|
ADAPTIVE COMMUNICATION METHOD AND MODULE EMPLOYING DIFFERENT LAYERS FOR DIFFERENT PROTOCOLS |
USA
|
Abstract
Adaptive communication method and apparatus are provided for third generation mobile transmission system (UMTS). A third layer module is provided to dominate transmission resources. A second layer module is provided to perform quality control. A first layer module is provided to perform signal transmission and reception. It is detected whether the first layer module supports a high speed protocol. If the first layer module supports the high speed protocol, the high speed protocol is used for transmission. If the first layer module does not support the high speed protocol, a conventional protocol is used for the transmission.
|
METHOD AND SYSTEM FOR DISCOVERING COMMUNICATION DEVICE CAPABILITIES |
USA
|
Abstract
A method for discovering capabilities of a communication device, including updating the capabilities of the communication device, generating update information corresponding to the communication device after updating the capabilities of the communication device, and transferring the URL of user agent profile and the update information of the communication device to a first server, when the communication device connects to the Internet.
|
PUPIL POSITION ACQUISITION SYSTEM, METHOD THEREFOR, AND DEVICE CONTAINING COMPUTER SOFTWARE |
USA
|
Abstract
A system and pupil position acquisition method and a device containing computer software for executing the same are provided. The system includes a shooting module, a scanning module, a signal transformation module, and a signal analysis module. The shooting module shoots an eyeball image using an image shooting device, such as a charge-coupled device (CCD) camera. The scanning module scans the eyeball image to acquire an eyeball signal. The signal transformation module performs a wavelet transform on the eyeball signal. The signal analysis module analyzes the eyeball signal after the wavelet transform to acquire a signal interval, and analyzes and acquires a position of a pupil with respect to the eyeball image according to the signal interval.
|