Thu, 23 Feb 2017 08:00:00 ESTA wireless sensor reader is provided to interface with a wireless sensor. The wireless sensor reader transmits an excitation pulse to cause the wireless sensor to generate a ring signal. The wireless sensor reader receives and amplifies the ring signal and sends the signal to a phase-locked loop. A voltage-controlled oscillator in the phase-locked loop locks onto the ring signal frequency and generates a count signal at a frequency related to the ring signal frequency. The voltage-controlled oscillator is placed into a hold mode where the control voltage is maintained constant to allow the count signal frequency to be determined. The reader uses an ambient reading or other information to select a subset of the possible ring signal frequencies, and tunes or adjusts its circuits and algorithms to focus on that subset.
Thu, 23 Feb 2017 08:00:00 ESTConcepts and technologies are disclosed herein for acoustic representations of environments. A processor can execute an acoustic representation service. The processor can receive a request to provide acoustic representation data to a device. The processor can obtain input data from the device. The input data can include captured data. The processor can analyze the input data to recognize an object represented in or by the input data and a path associated with the object. The processor can generate acoustic representation data representing the object and the path, and provide the acoustic representation data to the device.
Thu, 23 Feb 2017 08:00:00 ESTTechniques for transmitting vehicle information messages among a plurality of vehicles are disclosed. In an aspect, a transceiver of a vehicle transmits a first set of vehicle information messages over a wireless medium at a first periodic rate, the first set of vehicle information messages including information related to the vehicle. One or more sensors of the vehicle detect an event related to operation of the vehicle. A processor of the vehicle generates a second set of vehicle information messages each including an event flag and information about the event, the event flag indicating that the second set of vehicle information messages is reporting the event. The transceiver of the vehicle transmits a first vehicle safety message of the second set of vehicle information messages over the wireless medium as soon as the first vehicle safety message is generated.
Thu, 23 Feb 2017 08:00:00 ESTA central device 4 includes: a measurement processing unit 410 that acquires an inflow traffic volume at a first intersection Ci-1; an estimation processing unit 411 that estimates an inflow traffic volume at a second intersection Ci-2 on the basis of at least one of the inflow traffic volume at the first intersection Ci-1 and probe data obtained from a traveling vehicle 5; a control processing unit 412 that generates signal control parameters for the first intersection Ci-1 on the basis of the inflow traffic volume at the first intersection Ci-1, and generates signal control parameters for the second intersection Ci-2 on the basis of the estimated inflow traffic volume at the second intersection Ci-2; and a communication unit 403 that transmits the generated signal control parameters for the first intersection Ci-1 to a traffic signal controller 1a at the first intersection Ci-1, and transmits the generated signal control parameters for the second intersection Ci-2 to a traffic signal controller 1a at the second intersection Ci-2.
Thu, 23 Feb 2017 08:00:00 ESTMethods, apparatus, systems and articles of manufacture are disclosed to audit process control alarms. An example disclosed method includes identifying components in the process control system that correspond to alarms to be audited. The example method also includes if a query to request a status of a particular one of the alarms to be audited is not in a status update queue, generating a query associated with the audit report request to request the status of the particular one of the alarms from the corresponding component. Otherwise, if the query to request the status of a particular one of the alarms to be audited is in the status update queue, associating the audit report request to the query. The example method also includes transmitting, via a process control system bus, the queries to be designated as low priority.
Thu, 23 Feb 2017 08:00:00 ESTEnergy harvesting devices provide power to devices of emergency equipment stations (e.g., fire extinguisher station, fire alarm pull station, defibrillator station, etc.) distributed throughout a facility to monitor one or more internal or external conditions (e.g., identifiable objects detected near the station, presence of an obstruction restricting access to the station, etc.) and relay information about the monitored conditions to a central station.
Thu, 23 Feb 2017 08:00:00 ESTA system for detecting sensor failure and/or operating with a failed sensor in an electrical machine includes an electrical machine, three or more sensors configured to connect to the electrical machine, and a sensor module operatively connected to each sensor to receive sensor signals from the sensors. The sensor module includes a failure detection module operatively connected to each sensor and configured to determine if each sensor is a failed sensor or a functioning sensor. The sensor module also includes a virtual sensor module operatively connected to the failure detection module and configured to output simulated sensor signals for the failed sensor, wherein the sensor module is configured to output the sensor signals for each functioning sensor. The system includes a control module operatively connected to the sensor module and the electrical machine to receive sensor signals and simulated sensor signals to control operation of the electrical machine.
Thu, 23 Feb 2017 08:00:00 ESTAn alarm monitoring device (10) includes a portable monitor (100). A user interface (102) and a display screen (104) are coupled thereto. A sensor (108) and a memory (112) are disposed within the monitor. A processor (110) is disposed within the monitor and in electric communication with the user interface, display, sensor and memory. The processor has program instructions to receive data from the sensor and display on the display screen time remaining until an alarm is triggered.
Thu, 23 Feb 2017 08:00:00 ESTSystems and methods for take-over protection for a system are provided. Methods can include a module of the system storing, in a memory device of the module, a control panel identifier of a control panel of the system, the module requesting that the control panel communicates the control panel identifier to the module, the module receiving the control panel identifier from the control panel, the module comparing the control panel identifier received from the control panel with the control panel identifier stored in the memory device, and the module initiating communications with the control panel when the control panel identifier received from the control panel matches the control panel identifier stored in the memory device.
Thu, 23 Feb 2017 08:00:00 ESTSystems and methods of a smart card based mobile pull station are provided. For example, a smart card can include control circuitry and an activation mechanism. In some methods, the smart card can receive user input to activate the activation mechanism of the smart card, and upon activation of the activation mechanism, the control circuitry of the smart card can transmit an emergency signal. In some methods, a wireless device can receive the emergency signal from the smart card, the wireless device can transmit the emergency signal to a remote device, and the remote device can identify a location of the smart card based on a location of the wireless device.
Thu, 23 Feb 2017 08:00:00 ESTSystems and methods for automated posting of alarm information to a news feed are provided. Some methods can include configuring a plurality of surveillance devices, configuring a notification platform, configuring a plurality of alarm types, and providing a remote notification to a mobile handheld device via the notification platform when an alarm that is at least one of the plurality of alarm types occurs in at least one of the plurality of surveillance devices.
Thu, 23 Feb 2017 08:00:00 ESTSystems and methods for automated posting of alarm information to a news feed are provided. Some methods can include receiving a first alarm and associated first alarm information from a first surveillance device, determining whether posting to a social networking or microblogging service is configured for the first alma or the first surveillance device, and responsive to the determining, automatically posting the first alarm and the associated first alarm information to the social networking or microblogging service immediately after the first alarm occurs. A user can subscribe to receive posts from the social networking or microblogging service in real time, and the user can receive the posts from the social networking or microblogging service immediately after the first alarm and the associated first alarm information is posted to the social networking or microblogging service.
Thu, 23 Feb 2017 08:00:00 ESTA self-contained alarm unit for use in a network comprising a plurality of similar self-contained alarm units together with at least one sensor unit for sensing an alarm event and a remote control unit, the alarm unit comprising an enclosure in which is provided an alert generator for generating an audible or visual alert, a power supply, a receiver for receiving an alarm signal from the sensor unit, an alert signal from another alarm unit, and a disarm signal from another alarm unit or the remote control unit, a transmitter for transmitting an alert signal to another self-contained alarm unit, or the remote control unit and a disarm signal to another self-contained alarm unit; and a control module comprising a processor, wherein the processor is adapted to execute instructions so as to: control the alert generator so as to generate a continuous or repeating alert in response to the alarm signal or the alert signal being received by the receiver, control the alert generator to stop generating the continuous or repeating alert in response to the disarm signal being received by the receiver, control the transmitter to transmit the alert signal in response to the alarm signal being received by the receiver; and control the transmitter to transmit the disarm signal in response to the disarm signal being received by the receiver.
Thu, 23 Feb 2017 08:00:00 ESTA device and method to remind parents to regularly alternate the head position of a sleeping baby in order to prevent or minimize positional plagiocephaly. The device comprises a display area displaying a plurality of suggested head positions and at least one user-selectable indicator for selecting a first one of said plurality of suggested head positions. The user-selectable indicator is coupled with a source of illumination for maintaining visual indication of said first head position until the user manually selects a second head position or the device is turned off. The device further comprises a processor coupled with memory configured to store the user-selected head position which is visually indicated upon deactivation of said source illumination. The processor can then be configured to cause said source of illumination to blink indicating the user-selected head position stored in said memory upon the device being powered on.
Thu, 23 Feb 2017 08:00:00 ESTA bootie application device that provides booties that slide along a rail system on tabs that releasably connect the booties to the rail system. A sensor detects when booties are not disposed at a position along the rail system and issues a bootie level signal. An alert indicates when the bootie level signal has been issued.
Thu, 23 Feb 2017 08:00:00 ESTThe present disclosure relates to controlling a mobile device to provide a reminder even when the mobile device experiences a shutdown state. By controlling the mobile device to provide the reminder even when the mobile device experiences a shutdown state, the reminder may still be presented on the mobile device when an operating system of the mobile device has not been initiated.
Thu, 23 Feb 2017 08:00:00 ESTThe disclosure relates to a method and device for generating information. The method includes acquiring first information related to an amount of at least one food item remaining in a refrigerator; acquiring a rate of consumption of the at least one food item; calculating a number of meal servings of the at least one food item based on the first information and the rate of consumption; and generating a reminder message when the number of meal servings is less than a threshold number of meal servings.
Thu, 23 Feb 2017 08:00:00 ESTA selectable lost item retriever locator system to locate the predetermined lost and/or stolen items, comprising a hand-held receiver or locator unit and chips applied to items the user desires to locate, is disclosed. The receiver or locator unit is a hand held device, either a smartphone app or a component that picks up signals like a remote or a key clicker device. The receiver or locator unit would retrieve the item as the user get close to it either by beeping or flashing the light. The chips act as the tracking unit, where the tracking module may be a global positioning system (GPS) for longer distances and remote or clicker device to locate the lost and/or stolen items at 0.1 to 200 feet distances.
Thu, 23 Feb 2017 08:00:00 ESTAspects of the present disclosure involve an apparatus, systems, and methods for soiled garment detection and notification. The method may include receiving a measure of odor being released from a garment from a soiled garment detection apparatus. The method may further include determining that the measure of odor exceeds an acceptable odor threshold. A message may then be sent to a user device associated with the garment (e.g. a device of the owner of the garment) in response to determining that the measure of odor exceeds the threshold. The message may include a notification that the garment is soiled, and a suggested course of action to improve the measure of odor released by the garment.
Thu, 23 Feb 2017 08:00:00 ESTA method for alertness control of a vehicle operator includes obtaining, by an apparatus, physiological status data of a person acquired using at least one sensor including at least a biosignal sensor; determining, based on at least the physiological status data, at least one alertness value being indicative of alertness level of the person; determining, by comparing the at least one alertness value to at least one alertness reference value, whether the alertness level of the person is below a threshold alertness level for operating the vehicle; and as a response to the determining that the alertness level is below the threshold alertness level, causing an output of a control signal.
Thu, 23 Feb 2017 08:00:00 ESTThis document relates to systems and techniques for providing response to emergency situations, such as traffic accidents, cardiac arrest, or other medical emergencies.
Thu, 23 Feb 2017 08:00:00 ESTA system and method are described herein for a sensor device which biomechanically detects in real-time a user's movement state and posture and then provides real-time feedback to the user based on the user's real-time posture. The feedback is provided through immediate sensory feedback through the sensor device (e.g., a sound or vibration) as well as through an avatar within an associated application with which the sensor device communicates.
Thu, 23 Feb 2017 08:00:00 ESTA system and method for monitoring the presence of a child while in a child or infant restraint.
Thu, 23 Feb 2017 08:00:00 ESTVarious arrangements for using multiple wavelengths of electromagnetic radiation to detect smoke by a smoke detector are present. Multiple modes of the smoke detector may be used in which a first wavelength of electromagnetic radiation is emitted into a smoke chamber while a second electromagnetic radiation emitter is disabled, a period of time is waited, and a second wavelength of electromagnetic radiation is emitted into the smoke chamber while the first emitter is disabled. Depending on the mode of the smoke detector, the period of wait time may be varied.
Thu, 23 Feb 2017 08:00:00 ESTTechniques are described for tracking intruders of a monitored property by the unique identifying characteristics or “digital fingerprints” of electronic devices carried by the intruders. A system detects an alarm event at a monitored property based on output from at least one sensor located at the monitored property. In response to detecting the alarm event at the monitored property, the system initiates a process to gather electronic identifiers for mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. The system determines electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. The system stores in electronic storage, information indicating the determined electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event.
Thu, 23 Feb 2017 08:00:00 ESTSecurity tag and method of using same facilitates authorized removal of items from a controlled area where the items have been marked with an item identification code. The method involves providing a transaction software application to facilitate use of a PMCD to obtain the item identification code and participate in a wireless communication session with a transaction server to receive an authorization for release of the item from the controlled area. The application uses the PMCD to access from the security tag certain security tag information available from the security tag. The security tag information is used at the PMCD to determine an unlock code for the security tag. The PMCD is then used to wirelessly communicate the unlock code to the security tag after the authorization for release has been received.
Thu, 23 Feb 2017 08:00:00 ESTRadio frequency identification (RFID) tags that pass through a portal in a venue are read by a portal RFID reader, and identified as being tags having a higher priority as compared to other RFID tags in the venue that have a lower priority. The identities of the high-priority tags are transmitted to an overhead RFID reader, which preferentially reads the high-priority tags over the low-priority tags in the venue. Only the high-priority RFID tags are located and tracked in the venue.
Thu, 23 Feb 2017 08:00:00 ESTMethods and systems for planning evacuation paths are provided to identify an optimum path for evacuation of every evacuee from a region of interest. Methods of the instant disclosure ensure that for each suggested evacuation path, the capacity of any edge on the path is not exceeded and the evacuation time is minimum. A path once identified is maintained. A randomized behavior model is employed to re-distribute evacuees in emergency situations. This provides optimum evacuation time that employs an improved technique with optimized run time and evacuation time after taking into consideration herd behavior.
Thu, 23 Feb 2017 08:00:00 ESTIn each of the various embodiments, a haptic driver is configured to attenuate a drive signal of an actuator. In particular, the haptic drivers described herein are configured to identify the resonance frequency of the actuator and to attenuate the haptic drive signal within a range of frequencies, the range being based on the identified resonance frequency. As a result, the strength of haptic effects produced by the actuator may be more uniform along a wider frequency range.
Thu, 23 Feb 2017 08:00:00 ESTA communication apparatus that can be driven with a battery includes: an authentication unit arranged to authenticate a battery attached to the communication apparatus; and a wireless communication unit arranged to communicate with an external apparatus via a wireless network. The wireless communication unit of the communication apparatus is arranged to output a result of authentication by the authentication unit to the external apparatus via the wireless network.
Thu, 23 Feb 2017 08:00:00 ESTA method to learn and then pair with a pre-installed access control system of a vehicle is discussed. Communication is exchanged between the access control system and a backend cloud-based system. Required data of the access control system including its particular authentication code is extracted by a learning device. A vehicle matching data is sent to the backend cloud-based system and the vehicle is registered with the backend cloud-based system. The learning device is registered to the access control system in accordance with learning procedures implemented in the vehicle as remote entry key. The learning device is coupled to a Radio Frequency signal transmitter that has Application-Specific Integrated Circuits to generate stable RF signals at multiple frequency wavelengths. Registration of learning device includes, receiving a first access control telegram message, transmitting the first access control telegram message to the access control system, pairing the learning device with the access control system.
Thu, 23 Feb 2017 08:00:00 ESTA wireless access control system is provided to lock or unlock a first door at a dwelling of a user. A user remote access device accepts input based on haptic feedback or motion. The user remote access device is in communication with an intelligent door lock system at the dwelling with the first door. The intelligent door lock system including: a position sensing device configured to be coupled to a drive shaft of a lock device with a bolt, the position sensing device sensing position of the drive shaft to assist in locking and unlocking the first lock of the lock device, an engine with a memory coupled to the position sensing device, the engine configured to execute software instructions relative to the positioning sensing device and an energy source coupled to the circuit. In response to the user remote access device accepting input based on haptic feedback or motion the bolt is caused to move and the first lock is locked or unlocked. The intelligent door lock system allows controlled access to the dwelling that includes an occupant of the dwelling as well as a designated third person granted access rights by the occupant. The user remote access device is in communication with a second lock at a vehicle of the user or at an office of the user. In response to the user remote access device accepting input based on haptic feedback or motion the second lock is locked or unlocked. The remote access device has a controller for using haptic motion to lock or unlock locks.
Thu, 23 Feb 2017 08:00:00 ESTA wireless access control system is provided to lock or unlock a first door at a dwelling. A remote access device transmits a first signal and a second signal. The user remote access device is configured to be in communication with: an apparatus that controls transmission of displacement or rotational mechanical energy, a bolt coupled to the first door with the bolt coupled to an input rod and an output rod, where in operation the bolt locks and unlocks the first door, an energy source coupled to the apparatus that controls transmission of displacement or rotational mechanical energy, a wireless communication device to communicate with the user remote access device, a drive shaft associated with the first door that assists in locking and unlocking the bolt in response to communication with the user's user remote access device and receiving the first signal. The user remote access device is configured to be in communication with a second lock at a vehicle of the user or at an office of the user. The user remote access device is configured to communicate with the second lock with the second signal to cause the second lock to lock or be unlocked. The remote access device has a controller for generating the first and second signals.
Thu, 23 Feb 2017 08:00:00 ESTSystems and methods for providing secure locks having redundant access channels are disclosed. In some embodiments of the invention, the smart lock has a hardware processor, a power source, a cylinder, a button that forms a rose knob, and a rose protector. The rose knob and rose protector protect and conceal the hardware processor, the power source, and the cylinder. The rose protector forms an annular groove that slidably interlocks with the rose knob. The rose knob has a plurality of redundant access channels for receiving authentication information. The redundant access channels may include a biometric scanner for receiving biometric information, a passcode keypad for entering a token, or a wireless transceiver for receiving a token from a mobile device and transmitting a response to the mobile device. When the user cannot open the lock through the first redundant access channel, the smart lock is configured to allow access through a second access channel.
Thu, 23 Feb 2017 08:00:00 ESTAn identity token based access control system and method is disclosed. A distributed security system that manages access to business and/or governmental entities creates an identity credential for a user and obtains or generates a globally unique identity token for the user, and loads the identity credential and the identity token onto a user device. The user then presents the user device including the identity credential and the identity token to an access control system (ACS) of the security system of the business entity that generated the identity token to obtain access to its security system, or to an ACS of a security system of one or more third party business entities that support the use of identity tokens to obtain access to the security systems of the third party business entities. The identity tokens are preferably random numbers or strings. The identity credentials typically include biometric information for users.
Thu, 23 Feb 2017 08:00:00 ESTSystems and methods of security enhancement in a security panel are provided. Some systems can include a security system and a keyfob. The security system can identifies the keyfob, receive user input identifying a valid user pass code, and transmit the valid user pass code to the keyfob. The keyfob can save the received valid user pass code, receive user input identifying a first user input mechanism, receive user input identifying a sequence of user input mechanisms, determine whether the received sequence of user input mechanisms corresponds to the saved valid user pass code, and responsive to a valid correspondence, transmit a signal to the security system with instructions to execute an action associated with the first user input mechanism.
Thu, 23 Feb 2017 08:00:00 ESTA method and system for detecting an accident of a vehicle, the method including: receiving a movement dataset collected at least at one of a location sensor and a motion sensor arranged within the vehicle, during a time period of movement of the vehicle, extracting a set of movement features associated with at least one of a position, a velocity, and an acceleration characterizing the movement of the vehicle during the time period, detecting a vehicular accident event from processing the set of movement features with an accident detection model, and in response to detecting the vehicular accident event, automatically initiating an accident response action.
Thu, 23 Feb 2017 08:00:00 ESTA wireless (e.g., near field or RF) communication device, and methods of manufacturing and using the same are disclosed. The wireless communication device includes a receiver and/or transmitter, a substrate with an antenna thereon, an integrated circuit, and one or more protection lines. The antenna receives and/or transmits or broadcasts a wireless signal. The integrated circuit processes the wireless signal and/or information therefrom, and/or generates the wireless signal and/or information therefor. The integrated circuit has a first set of terminals electrically connected to the antenna. The protection line(s) are on a common or different substrate as the antenna. The protection line(s) sense or determine a continuity state of a package or container on which the communication device is placed or to which the communication device is fixed or adhered, and are electrically connected to a second set of terminals of the integrated circuit different from the first set of terminals.
Thu, 23 Feb 2017 08:00:00 ESTThe invention relates to a device for monitoring physical objects that comprises one or more short-range remote readers, memory elements to be attached to physical objects, and a controller adapted for executing a reading function capable of interaction with the one or more remote readers in order to acquire data contained in adjacent memory elements, and for executing an integrity validation function capable of distinguishing, from the acquired data, individual identifiers particular to each of the memory elements as well as group description data stored in at least some of said memory elements, and of checking the sufficiency of group description data while checking the compliance of individual identifiers with corresponding group description data.
Thu, 23 Feb 2017 08:00:00 ESTA networked radio frequency identification system includes a plurality of radio frequency identification (RFID) tag readers, a computer in signal communication with the RFID tag readers over a network, and a software module for storage on and operable by the computer that localizes RFID tags based on information received from the RFID tag readers using a network model having endpoints and oriented links. In an additional example, at least one of the RFID tag readers includes an adjustable configuration setting selected from RF signal strength, antenna gain, antenna polarization, and antenna orientation. In a further aspect, the system localizes RFID tags based on hierarchical threshold limit calculations. In an additional aspect, the system controls a locking device associated with an access point based on localization of an authorized RFID tag at the access point and reception of additional authorizing information from an input device.
Thu, 23 Feb 2017 08:00:00 ESTAccording to various embodiments, a mobile device continuously and/or automatically scans a user environment for tags containing non-human-readable data. The mobile device may continuously and/or automatically scan the environment for tags without being specifically directed at a particular tag. The mobile device may be adapted to scan for audio tags, radio frequency tags, and/or image tags. The mobile device may be configured to scan for and identify tags within the user environment that satisfy a user preference. The mobile device may perform an action in response to identifying a tag that satisfies a user preference. The mobile device may be configured to scan for a wide variety of tags, including tags in the form of quick response codes, steganographic content, audio watermarks, audio outside of a human audible range, radio frequency identification tags, long wavelength identification tags, near field communication tags, and/or a Memory Spot device.
Thu, 23 Feb 2017 08:00:00 ESTA system and method for bulk encoding medical items in a tracking system in a healthcare facility comprises attaching to each of a plurality of identical medical items a blank RFID tag. When activated simultaneously, the serial numbers of all RFID tags on all the identical medical items are read and their serial numbers are associated with the pre-stored characteristics of the medical item in a data base. The RFID tags are blank in that they include no human-readable data concerning the medical article to which the RFID tag is attached. A data mining system and method are provided for mining the database.
Thu, 23 Feb 2017 08:00:00 ESTHazard detection systems and methods according to embodiments described herein are operative to enable a user to interface with the hazard detection system by performing a touchless gesture. The touchless gesture can be performed in a vicinity of the hazard detection system without requiring physical access to the hazard detection system. This enables the user to interact with the hazard detection system even if it is out of reach. The hazard detection system can detect gestures and perform an appropriate action responsive to the detected gesture. In one embodiment, the hazard detection system can silence its audible alarm or pre-emptively turn off its audible alarm in response to a detected gesture. Gestures can be detected by processing sensor data to determine whether periodic shapes are detected.
Thu, 23 Feb 2017 08:00:00 ESTA haptic representation system is provided that generates a haptic effect in response to sensor input. The sensor input is mapped to a haptic signal. The haptic signal is sent to an actuator configured to receive the haptic signal. The actuator utilizes the haptic signal to generate the haptic effect.
Thu, 23 Feb 2017 08:00:00 ESTProvided is an apparatus and method for controlling a vibration transfer between vibration devices. The apparatus for controlling a vibration transfer may change vibration values of a plurality of vibration devices according to a movement of a virtual vibration body, thereby providing a user with a sense of touch of a movement of the virtual vibration body.
Thu, 23 Feb 2017 08:00:00 ESTA consumption meter 100 for measuring consumption data of a supplied utility is provided, the consumption meter comprising: a housing 110 with an opening 112, where the housing 110 forms a closed compartment when the opening 112 of the housing 110 is closed with a cover 120; a communication module 130 provided in the closed compartment; a front plate 140 provided in the closed department and arranged adjacent to the cover 120, wherein the front plate 140 has a first front plate surface 142 facing the cover 120, and a second front plate surface 144 facing opposite; and an antenna comprising an antenna body 150 with an antenna conductive element 154, which is connected to the communication module 130; wherein the front plate 140 has an indentation 146 arranged between the first and the second front plate surfaces 142, 144, and wherein the antenna body 150 is arranged in the indentation 146. The consumption meter 100 provides an antenna with a high transmission performance. Further, the antenna is mechanically supported, and is arranged inside the closed compartment, eliminating the need of any feedthrough across the housing wall.
Thu, 23 Feb 2017 08:00:00 ESTThe security system comprises a plurality of cylindrical locks that includes a motorized lock configured for local actuation by a mechanical key and/or for remote actuation by an electric signal. The cylindrical lock can operate in a variety of lock functions including classroom security and storeroom operations.
Thu, 23 Feb 2017 08:00:00 ESTA sensor, a wireless transceiver and a battery that energizes the transceiver are installed together in a cavity formed in a frame of a door. They are displaced together in the cavity in accordance with the deadbolt position in a direction of displacement of a door deadbolt. A spring that is installed in the cavity accommodates differences among travel distances and differences in lengths of different deadbolts and also differences in gaps between doors and door frames.
Thu, 23 Feb 2017 08:00:00 ESTThe present disclosure relates to a method of determining whether a frame of a work machine is approaching a tip over point. First and second loads upon respective first and second support arrangements of the frame are detected using respective first and second sensing means. Signals are generated indicative of the first and second loads and communicated to a controller. The controller is configured to generate an alert based upon the first and second loads when the first and/or second load signals indicate that the orientation of the work machine is approaching a tip over point.
Thu, 23 Feb 2017 08:00:00 ESTMethods and systems for processing communication with electronics associated with a vehicle and with a portable device to provide access to the vehicle. One method includes receiving, at a server, a request from a user via the portable device to grant access to use the vehicle via an electronic key (e-key). The vehicle is pre-associated to a user account that defines use options of the vehicle. The server is configured to generate a unique access code for the request, and the unique access code is configured with privileges for use of the vehicle. The privileges are defined for the unique access code based on an identity of the user and the privileges being active for use of the vehicle. The server is configured to encrypt the unique access code. The encrypting is predefined for decryption by the electronics associated with of the vehicle. The unique access code is sent as an encrypted unique access code to the portable device over a wireless network. The encrypted unique access code is configured for local wireless transmission to the electronics associated with said vehicle. The electronics associated with said vehicle is configured to decrypt the encrypted access code and enable access to use said vehicle in accordance with the privileges for use defined by said unique access code. The privileges for use further defining a period of time during which the unique access code is to remain active for use of the vehicle. The unique access code when active operates as the e-key for the vehicle to enable one or more functions of unlocking of the vehicle, starting the vehicle, driving the vehicle, or locking the vehicle.