Abstract:
Embodiments of this invention provide methods for detecting a denial of service attack (DoS) and isolating traffic that relates to the attack. The method may begin by collecting network traffic data by observing individual packets carried over the network. The data may then be compiled into a time series comprising network traffic data relating successive time-intervals. A difference value based upon the entry in the time series for a large time-window and for a small time-window. A deviation score may then be determined by calculating the ratio of the difference values. The deviation score may indicate whether an attack occurred. In an embodiment of the invention, an attack is deemed to occur if the deviation score is between 0.6 and 1.4.
Abstract:
One embodiment of the present invention relates to a method by which the imprint of a ferroelectric random access memory (FRAM) array is reduced. The method begins when an event that will cause imprint to the memory array is anticipated by an external agent to the device comprising the chip. The external agent sends a command to the control circuitry that the data states are to be written to a particular data state. Upon receiving a signal the control circuitry writes all of the ferroelectric memory cells in the FRAM array to a preferred memory data state. The memory data states are held in the preferred data state for the entire duration of the event to minimize imprint of the FRAM memory cells. When the event ends the external agent sends a command to the control circuitry to resume normal memory operation. Other methods and circuits are also disclosed.
Abstract:
One embodiment of the present invention relates to a method by which the imprint of a ferroelectric random access memory (FRAM) array is reduced. The method begins when an event that will cause imprint to the memory array is anticipated by an external agent to the device comprising the chip. The external agent sends a command to the control circuitry that the data states are to be written to a particular data state. Upon receiving a signal the control circuitry writes all of the ferroelectric memory cells in the FRAM array to a preferred memory data state. The memory data states are held in the preferred data state for the entire duration of the event to minimize imprint of the FRAM memory cells. When the event ends the external agent sends a command to the control circuitry to resume normal memory operation. Other methods and circuits are also disclosed.
Abstract:
An order scheduling system providing a method for distributing product orders to multiple fulfillers is described. This method, which solves the common business problem of scheduling order shipments, is optimal because it minimizes the number of orders across fulfillers, thus minimizing shipping costs. It is also fair because orders are distributed equally across fulfillers if that fulfiller has the product available. To schedule orders, a data structure is defined whose rows are represented by a hash table of Fulfillers (HF), where each column is a hash table of Products (HP) and where each index of HP is itself a bit vector (VPi). This gives a three-dimensional data structure. The method operates by performing bitwise ANDing (&) operations of the bit vectors, to generate an Order bit vector representing the optimized fulfillment (per system configuration/constraints) for a particular received order.
Abstract:
Apparatuses and methods for removing veins, usually varicose veins, rely on endoluminal capture of a distal end of the vein segment to be removed. In the illustrated embodiments, a shaft having reciprocatable penetrating elements is used to engage and capture the distal end of the vein. After rotating the shaft to pull the distal segment of the vein away from the connecting tissue, the shaft is withdrawn proximally, invaginating the segment back to the point of insertion.
Abstract:
An electric reciprocating file or polishing member held in a housing. The housing supports a motor for reciprocating an enclosure held within the housing. A spring is held within the enclosure and the file is shaped to be snapped in or pulled out of the spring for use.
Abstract:
Systems and methods are disclosed for analyzing network traffic data to detect anomalies in the data and determine their causes. In one implementation, a system includes a processor and a memory. The memory stores instructions that cause the processor to generate a time series of network traffic values. The processor calculates deviation scores for time entries within the time series and detects anomalies in the time series by comparing the deviation score to a predetermined range. If the processor detects an anomaly, it may determine a list of IP addresses of computers on the network that may have caused the anomaly.
Abstract:
A bird deterrent with a reel of reflective ribbon, a reel housing, a reel housing to railing retaining member, a plurality of reflective ribbon to railing retaining members and ribbon retaining cap members. The reel housing to railing retaining member is attached to the reel housing. The railing retaining members include front and rear hinged clamping members. Each clamping member includes a railing retaining tubular aperture. The ribbon to railing retaining members each include a ribbon retaining member. The front and rear clamping members are tightened onto the rail of a cabin cruiser or sail boat by of a threaded thumbscrew. The reel housing and ribbon retaining members are attached to the railing so that the ribbon can be unwound from the reel housing and placed in a zig zag orientation within each ribbon retaining member and held in place by the ribbon retaining caps.
Abstract:
Systems and methods are disclosed for collecting network traffic logs from a plurality of network servers, such as DNS name servers, and storing extracted data from the logs in a central repository. In one implementation, a system includes a processor and a memory. The memory stores instructions that cause the processor to retrieve PCAP files from a plurality of servers and extract data from the PCAP files. The data comprises header data and digest data. The processor stores the header data and the digest data in a header/digest pair. In another aspect, the processor retrieves a sample of the PCAP files from each of the plurality of servers rather than retrieving all PCAP files.
Abstract:
An apparatus designed to catch flies and other flying insects comprises an aesthetically pleasing rectangular housing with a top opening which allows an insect to fly or crawl onto an internal tacky sheet to be trapped. The housing may be placed upon any flat surface or be wall-mounted, thereby minimizing an occurrence of observing the trapped dead insects. A side surface of the housing provides loading and unloading of a slide-in tacky sheet. The tacky sheet attracts and traps flying or crawling insects such as flies through the top opening of the housing, thereby partially blocking a view of the trapped insects inside.