摘要:
A Blended Wing Body SUAV and MUAV is disclosed having a novel airfoil profile, wing configuration, rigging and tractor pull propeller placement that provide improved stability and safety characteristics over prior art SUAVs and MUAVs of comparable size and weight. This unique blended wing design includes wing twist on the outboard wing and an inverted “W” shaped planform to provide lateral and longitudinal stability, and smooth, even flight characteristics throughout the range of the expected flight envelope. These flight characteristics are crucial to providing a stable reconnaissance platform with favorable stall speeds, an increased payload and the ability to hand launch without the danger of exposing ones hands or wrist to a propeller.
摘要:
A command queuing engine in a target controller ASIC automatically detects sequential commands received from an initiator and generates a linked list of data transfer descriptors for the sequential commands. The data transfer descriptors are automatically processed by the command queuing engine to reduce command overhead from interrupt processing by a microprocessor in the target controller, thereby improving the performance of the target controller.
摘要:
Described embodiments provide for authenticating a user request for access to at least a portion of an encrypted storage device. First, the request for access to at least a portion of the encrypted storage device is received. The request includes a plaintext password. A hash module generates a hashed version of the received plaintext password based on an authentication hash key. A hashed value of the generated plaintext password is retrieved from a key storage. A hash comparator compares the hashed version of the received plaintext password with the retrieved hashed value of the generated plaintext password. If the hashed version of the received plaintext password and the retrieved hashed value of the generated plaintext password are equal, the user is authenticated for access to at least a portion of the encrypted storage device. Otherwise, the user is denied access to the encrypted storage device.
摘要:
Described embodiments provide encryption/decryption of data transferred between a media controller and a storage device. The media controller provides encryption/decryption based on a root key (RK). Storage in a one-time programmable (OTP) memory is provided as a plurality of un-burned slots. The OTP memory is initially provided without the RK, which is generated with a random number generator. A control module performs the steps of i) burning the RK to an initial slot of the OTP memory, and ii) validating the burned RK (bRK) stored at the initial slot based on a comparison of the RK and the burned RK. If the control module validates the burned RK, the burned RK is employed by the media controller. Otherwise, one or more subsequent slots of the OTP memory are burned with the RK until the control module validates the corresponding burned RK.
摘要:
Described embodiments provide encryption/decryption of data transferred between a media controller and a storage device. The media controller provides encryption/decryption based on a root key (RK). Storage in a one-time programmable (OTP) memory is provided as a plurality of un-burned slots. The OTP memory is initially provided without the RK, which is generated with a random number generator. A control module performs the steps of i) burning the RK to an initial slot of the OTP memory, and ii) validating the burned RK (bRK) stored at the initial slot based on a comparison of the RK and the burned RK. If the control module validates the burned RK, the burned RK is employed by the media controller. Otherwise, one or more subsequent slots of the OTP memory are burned with the RK until the control module validates the corresponding burned RK.
摘要:
The disk drive provides a method of adaptively managing a cache segment divided into chunks by defining an unavailable data type to be stored in an element of a chunk array which indicates that the chunk is not available, and defining an available data type to be stored in an element of the chunk array that indicates the chunk is available and that indicates the number of consecutive chunks that are available. The disk drive also computes a number of chunks needed to fit the request length and scans the chunk array to find a first available element whose available data type meets a predetermined criteria for the number of chunks needed to fit the request length.
摘要:
A method for processing interface messages, such as SCSI messages, using an indexed jump table. Two single-dimensional tables are implemented by the method described. The first table stores index values for all valid sequence instruction locations for which an ATN signal can be detected. The second table stores index values for all valid interface messages. The index values of these two tables are used as entry points to the indexed jump table whose elements contain addresses to message handling functions.
摘要:
Digital logic equipment in which two logic elements operate with timing control from a clock element with selected synchronism, includes a failure detecting element which detects the absence of the selected synchronism between the two logic elements even when each is providing otherwise correct logic operation. The apparatus and method enable a digital logic system to follow two redundant digital logic elements so long as they operate in lock step synchronism, and to sense a failure which occurs only in synchronism to disable one of the two logic elements to maintain thereafter uninterrupted operation with the other logic element.
摘要:
A method of reconstruction of the standard 12-lead surface EKG given values of the electrical potential from an implanted medical device is described. This implanted device can be oriented in an arbitrary fashion and reconstruction technique is obtained through physical measurement of the orientation of the implanted device or correlation with a standard 12-lead EKG obtained from the patient.
摘要:
A method, apparatus and program storage device for providing intelligent rebuild order selection is a storage array is disclosed. The interrelationship of the data on the drives to be rebuilt and the remaining drives in the system is examined. A relative score for a rebuild record to be rebuilt is based upon the manner in which the RAID data is placed on the other drives. The rebuild record with the highest relative risk is identified as the rebuild record to be rebuilt next.