Abstract:
Disclosed are a memory control method and an electronic device for performing same. The electronic device according to various embodiments comprises: a processor; and memory that is electrically connected to the processor and stores instructions executable by the processor. When the instructions are executed, the processor can: determine a use state pertaining to a usable area of the memory; identify the temperature of the electronic device; determine, on the basis of the use state and the temperature, memory parameters, related to size, for converting a used area of the memory to a usable area; and convert the used area of the memory to the usable area on the basis of the memory parameters.
Abstract:
An electronic device according to an embodiment may comprise: a display module including a flexible display; a driving unit for changing a size of a display screen where the flexible display is exposed to the outside of the electronic device; and a power management module for supplying power to the electronic device. The electronic device may determine whether a condition for restricted booting for controlling the driving unit is satisfied in case that power is applied to the electronic device, operate in a restricted booting state in which an operation system is not booted in case that the condition for restricted booting is satisfied, and adjust the size of the display screen of the flexible display by controlling the driving unit through the power management module in the restricted booting state. Various other embodiments may also be possible.
Abstract:
An electronic device configured to operate as a radio access network (RAN) intelligent controller (RIC) of an open RAN is disclosed. The electronic device may comprise: a communication interface including a communication circuit configured to support an E2 interface; and a processor operatively connected to the communication interface. The processor may store a routing table for managing connectivity between a first application and a plurality of RAN nodes configured to communicate with the RIC through the E2 interface, detect overload of the first application, create a second application configured to perform the same function as that of the first application, update the routing table so as to include connectivity between at least one RAN node of the plurality of RAN nodes and the second application, and cause the communication interface to deliver messages from the plurality of RAN nodes to the first application and the second application by using the updated routing table.
Abstract:
Described systems and methods enable performing software audits remotely and automatically, on a relatively large number of client systems (e.g., a corporate network, a virtual desktop infrastructure system, etc.) An audit engine executes on each client system, in a hardware virtualization configuration wherein the audit engine executes outside an audited virtual machine. When receiving an audit request from an audit server, some embodiments of the audit engine drop an audit agent into the audited virtual machine, and remove the audit agent upon completion of the audit.
Abstract:
In a system having a cluster of system components interconnected by a cluster interconnect fabric, the system components include out-of-band management network interfaces to an out-of-band management network. The system is configured to use the cluster interconnect fabric and the out-of-band management network interfaces to determine the overall connectivity and status of the cluster.
Abstract:
An in-vehicle communication network comprising: a bus and at least one node connected to the bus; an in-vehicle network operating system (OS) that manages OS processes, a secondary memory in which process codes for the processes are stored, and a primary memory, into which the OS loads a copy of a process code of a process to enable a processor to run the process and execute the process code; and a module hosted in the OS and having a hook in at least one position of the OS that provides information to the module responsive to operation of the OS that the module processes in accordance with executable instructions that the module comprises to determine if the in-vehicle OS is operating properly.
Abstract:
A cyber security module for providing security to an in-vehicle communication network having a bus, at least one node connected to the bus, and at least one communications device coupled to the in-vehicle communication network configured to interface the in-vehicle network with an external communication network, the cyber security module comprising: a communication port configured to receive a message from the communication device that the communication device generates based on a message that the communication device receives from the external communication network; at least one communication port coupled to the bus; an authentication module configured to authenticate whether or not the message originated from an authorized source; and a processor configured to operate to prevent content of the message from being operated on if the authentication module determines that the source of the message received by the communication device is not from an authorized source.
Abstract:
Health and usage monitoring systems for aircraft hoist systems are described herein. In some embodiments, a health and usage monitoring system comprises a capacitive load cell and a processing unit for communication with the capacitive load cell, the capacitive load cell comprising a load receiving surface and a capacitive assembly coupled to the load receiving surface, the capacitive assembly comprising parallel electrically conductive plates separated by a reversibly deformable spacer construction wherein the parallel plates comprise aligned apertures providing a passageway through the capacitive assembly for the hoist system cable.
Abstract:
In order to detect an attack to a web application accurately by accurately correlating different types of events having occurred in the same server, an event acquiring unit (151) acquires a log of events containing a HTTP request to a server, an event correlator (152) creates a set of the request and events relevant to the request as an event block by using process IDs of processes having processed events contained in the log, and an attack detector (155) contrasts the event block that is created from the log of events in which an attack is to be detected with a profile of a profile list (143) that is created from normal events to calculate a degree of similarity and, when the degree of similarity is equal to or lower than a threshold, detects the event block as an event block containing an event that is abnormal due to an attack. The event correlator (152) further creates an event block by using transmission port numbers contained in events.