Patent classifications
H04L69/325
Information processing apparatus
An information processing apparatus including a control unit. In a case where a first physical layer network identifier for identifying a first network to which an apparatus in question belongs is determined to match a second physical layer network identifier for identifying a second network to which the apparatus in question does not belong, the control unit changes a first physical layer network identifier. Then, the control unit transmits the change information relating to the change to another information processing apparatus. Further, in a case where change information for changing a first physical layer network identifier for identifying a first network to which the apparatus in question belongs is received from another information processing apparatus which belongs to the first network, the control unit changes a condition for terminating reception processing of a packet on the basis of the change information in a middle of the reception processing.
Speaker with automatic volume control
An example speaker for providing alerts includes: a housing and a cover forming an integrated unit; a microphone configured to sense an ambient noise level; and a processor configured to adjust a volume of the speaker based upon the ambient noise level. A hinge can be positioned between the housing and the cover to allow the cover to be pivoted relative to the housing from a close position to an open position.
Speaker with automatic volume control
An example speaker for providing alerts includes: a housing and a cover forming an integrated unit; a microphone configured to sense an ambient noise level; and a processor configured to adjust a volume of the speaker based upon the ambient noise level. A hinge can be positioned between the housing and the cover to allow the cover to be pivoted relative to the housing from a close position to an open position.
Method and device for intrusion detection in a computer network
Device and method for intrusion detection in a computer network. A data packet is received at an input of a hardware switch unit, an output of the hardware switch unit being selected for sending the data packet or a copy as a function of data link layer information from the data packet and of a hardware address from a memory of the hardware switch unit. An actual value from a field of the data packet is compared by a hardware filter with a setpoint value for values from this field, the field including data link layer data or network layer data, and the data packet or a copy of the data packet being provided to a computing device as a function of a result of the comparison. The analysis for detecting an intrusion pattern in a network traffic in the computer network id carried out by the computing device.
Method and device for intrusion detection in a computer network
Device and method for intrusion detection in a computer network. A data packet is received at an input of a hardware switch unit, an output of the hardware switch unit being selected for sending the data packet or a copy as a function of data link layer information from the data packet and of a hardware address from a memory of the hardware switch unit. An actual value from a field of the data packet is compared by a hardware filter with a setpoint value for values from this field, the field including data link layer data or network layer data, and the data packet or a copy of the data packet being provided to a computing device as a function of a result of the comparison. The analysis for detecting an intrusion pattern in a network traffic in the computer network id carried out by the computing device.
SYSTEMS AND METHODS FOR SUPPORTING MULTI-ACCESS EDGE COMPUTING USING APPLICATION-BASED QUALITY OF SERVICE FLOWS
A network device may select a first user plane function for establishing, with a user equipment, a protocol data unit session with a single flow and may receive an application function trigger associated with a first new flow for a first application of the user equipment. The network device may select a second user plane function for the first new flow and may create a first traffic filter for the first new flow. The network device may cause the first traffic filter to be provided to the user equipment so that first application traffic is routed, based on the first traffic filter, to the second user plane function and a first multi-access edge computing device associated with the second user plane function.
Systems and methods for advanced energy settlements, network-based messaging, and applications supporting the same on a blockchain platform
Systems and methods for financial settlement of transactions within an electric power grid network are disclosed. A multiplicity of active grid elements are constructed and configured for electric connection and network-based communication over a blockchain-based platform. The multiplicity of active grid elements are operable to make peer-to-peer transactions based on their participation within the electric power grid by generating and executing a digital contract. The multiplicity of active grid elements generate messages autonomously and/or automatically within a predetermined time interval. The messages comprise energy related data and settlement related data. The energy related data of the multiplicity of active grid elements are based on measurement and verification. The energy related data and the settlement related data are validated and recorded on a distributed ledger with a time stamp and a geodetic reference.
Systems and methods for advanced energy settlements, network-based messaging, and applications supporting the same on a blockchain platform
Systems and methods for financial settlement of transactions within an electric power grid network are disclosed. A multiplicity of active grid elements are constructed and configured for electric connection and network-based communication over a blockchain-based platform. The multiplicity of active grid elements are operable to make peer-to-peer transactions based on their participation within the electric power grid by generating and executing a digital contract. The multiplicity of active grid elements generate messages autonomously and/or automatically within a predetermined time interval. The messages comprise energy related data and settlement related data. The energy related data of the multiplicity of active grid elements are based on measurement and verification. The energy related data and the settlement related data are validated and recorded on a distributed ledger with a time stamp and a geodetic reference.
Multi-person pose recognition method and apparatus, electronic device, and storage medium
In a multi-person pose recognition method, a to-be-recognized image is obtained, and a circuitous pyramid network is constructed. The circuitous network pyramid includes parallel phases, and each phase includes downsampling network layers, upsampling network layers, and a first residual connection layer to connect the downsampling and upsampling network layers. The phases are interconnected by a second residual connection layer. The circuitous pyramid network is traversed, by extracting a feature map for each phase, and the feature map of the last phase is determined to be the feature map of the to-be-recognized image. Multi-pose recognition is then performed on the to-be-recognized image according to the feature map to obtain a pose recognition result for the to-be-recognized image.
Multi-person pose recognition method and apparatus, electronic device, and storage medium
In a multi-person pose recognition method, a to-be-recognized image is obtained, and a circuitous pyramid network is constructed. The circuitous network pyramid includes parallel phases, and each phase includes downsampling network layers, upsampling network layers, and a first residual connection layer to connect the downsampling and upsampling network layers. The phases are interconnected by a second residual connection layer. The circuitous pyramid network is traversed, by extracting a feature map for each phase, and the feature map of the last phase is determined to be the feature map of the to-be-recognized image. Multi-pose recognition is then performed on the to-be-recognized image according to the feature map to obtain a pose recognition result for the to-be-recognized image.