Abstract:
A method of and system for protecting a computer system against denial-of-service attacks or other exploitation. The method comprises collecting network data and analyzing the network data using statistical and heuristic techniques to identify the source of the exploitation upon receiving an indication of exploitation. Upon identifying the network source, the network data associated with the network is blocked, redirected, or flow controlled. Preferably, the method also includes identifying when the system is being exploited.
Abstract:
In one embodiment, the present invention includes a processor having a plurality of cores and a control logic to control provision of a voltage/frequency to a first core of the plurality of cores independently of provision of a voltage/frequency to at least a second core of the plurality of cores. In some embodiments, the voltages may be provided from one or more internal voltage regulators of the processor. Other embodiments are described and claimed.
Abstract:
A differential buffer circuit having increased output voltage swing includes a differential input stage including at least first and second transistors, the first and second transistors being operative to receive first and second signals, respectively. The buffer circuit further includes a bias stage connected between the differential input stage and a first voltage source. The bias stage is operative to generate a quiescent current as a function of a third signal supplied to the bias stage. A load circuit is connected between a second voltage source and the differential input stage, first and second differential outputs of the buffer circuit being generated at a junction between the load circuit and the differential input stage. The load circuit includes first and second switching elements coupled with the first and second transistors, respectively. The first switching element is operative to electrically connect the first differential output to the second voltage source when the first transistor is turned off. The second switching element is operative to electrically connect the second differential output to the second voltage source when the second transistor is turned off.
Abstract:
A voltage level translator circuit for translating an input signal referenced to a first voltage supply to an output signal referenced to a second voltage supply includes an input stage for receiving the input signal, the input stage including at least first and second nodes, a voltage at the second node being a logical complement of a voltage at the first node. A load circuit is coupled with the input stage, the load circuit being operative to at least temporarily store a signal at the first and/or second nodes which is indicative of a logical state of the input signal. An output stage connected with the second node is operative to generate an output signal which is indicative of a logical state of the input signal. The voltage level translator circuit further includes a compensation circuit connected with the output stage and operative to balance pull-up and pull-down propagation delays in the voltage level translator circuit as a function of a voltage at the first node.
Abstract:
Embodiments of the present disclosure describe methods, apparatus, and system configurations for cyclic redundancy check circuits using Galois-field arithmetic.
Abstract:
A method and apparatus to enable data integrity checking of a block of data while the block of data is being transferred from a volatile memory to a non-volatile storage device is provided. The data integrity checking is performed in conjunction with Direct Memory Access operations and Redundant Array of Independent Disk (RAID) operations. In addition, data integrity checking of syndrome blocks in the RAID is performed during transfers to/from the storage devices in the RAID system and during RAID update and RAID data reconstruction operations.
Abstract:
A method includes controllably generating a first bias voltage from a supply voltage to be within an upper tolerable limit of an operating voltage of an IO receiver, and controllably generating a second bias voltage from an external voltage supplied through an IO pad to be within the upper tolerable limit of the operating voltage of the IO receiver. The method also includes deriving an output voltage from the first bias voltage during a normal condition and a tolerant condition, and deriving the output voltage from the second bias voltage during a failsafe condition. The tolerant condition is a mode of operation where the external voltage supplied through the IO pad varies from zero to a value higher than the supply voltage, and the failsafe condition is a mode of operation where the supply voltage is zero.
Abstract:
A method includes controllably generating a first bias voltage from a supply voltage to be within an upper tolerable limit of an operating voltage of one or more constituent active circuit element(s) of an Input/Output (IO) core device of an integrated circuit (IC) to be interfaced with an IO pad, and controllably generating a second bias voltage from an external voltage supplied through the IO pad to be within the upper tolerable limit of the operating voltage of the one or more constituent active circuit element(s) of the IO core device to be interfaced with the IO pad. The method also includes controllably utilizing a control signal generated by the IO core to derive an output bias voltage from the first bias voltage during a driver mode of operation or the second bias voltage during a failsafe mode of operation and a tolerant mode of operation.
Abstract:
The present invention relates to a fluidized catalytic cracking process for cracking hydrocarbon feed having organo-sulfur compound as an impurity, said process comprising: adding a heavy metal poisoned spent catalyst to an equilibrium catalyst to obtain a composite circulating catalyst, wherein the heavy metal poisoned spent catalyst is added in an amount to maintain the activity of the circulating catalyst; and obtaining a fluidized catalytic cracked product.The present invention further relates to fluidized catalytic cracked product obtained by the process of the present invention. The sulfur content of the fluidized catalytic cracked product mainly gasoline which is boiling in the range of C5-250° C. reduced by more than 20% (wt/wt). And Research Octane number of the fluidized catalytic cracked product is increased by more than 1 unit.
Abstract:
The wireless information and safety system for mines of the present invention enables continuously tracking and monitoring underground miners and moveable equipment in underground mines using ZigBee-enabled active RFID devices forming a wireless network among them and other static and mobile ZigBee devices placed at strategic locations. The present invention provides a wireless information and safety system for mines comprises in combination of ZigBee-compliant devices (programmable to operate as end devices, routers and coordinators by hardware specific embedded software) and wireless sensor network (WSN) software having various application modules both for underground and opencast mines. Use of the system of the present invention would help in identifying the miners entering in underground mine to keep the track of the miners and maintain computerized attendance. This would help in monitoring equipment locations and their operation to improve productivity and reduce fatal collision accident. This would help in locating and tracking the miners in case of disaster for speedy rescue operation. This would help in monitoring miners' unsafe practice and providing warning to the respective miner. This would further help in real time monitoring environmental parameters in underground mine. This would also help in sending coded message to the concerned person in underground mine. This would further help in monitoring movement of dumpers in opencast mine, which will ultimately help in optimum shovel-dumper performance and improving productivity.