-
11.
公开(公告)号:US20210065316A1
公开(公告)日:2021-03-04
申请号:US16560629
申请日:2019-09-04
Applicant: Oracle International Corporation
Inventor: Edward R. Wetherbee , Kenny C. Gross
Abstract: During operation, the system receives time-series signals gathered from sensors in a utility system asset. Next, the system uses an inferential model to generate estimated values for the time-series signals, and performs a pairwise differencing operation between actual values and the estimated values for the time-series signals to produce residuals. The system then performs a sequential probability ratio test (SPRT) on the residuals to produce SPRT alarms. Next, the system applies an irrelevance filter to the SPRT alarms to produce filtered SPRT alarms, wherein the irrelevance filter removes SPRT alarms for signals that are uncorrelated with previous failures of similar utility system assets. The system then uses a logistic-regression model to compute an RUL-based risk index for the utility system asset based on the filtered SPRT alarms. When the risk index exceeds a threshold, the system generates a notification indicating that the utility system asset needs to be replaced.
-
12.
公开(公告)号:US10934178B2
公开(公告)日:2021-03-02
申请号:US16787453
申请日:2020-02-11
Applicant: Oracle International Corporation
Inventor: Kenny C. Gross , Sanjeev Sondur
IPC: C02F1/16 , H05K7/20 , C02F1/04 , C02F1/26 , C02F103/08
Abstract: The disclosed embodiments relate to a system that performs low-temperature desalination. During operation, the system feeds cold saline water through a liquid-cooling system in a computer data center, wherein the cold saline water is used as a coolant, thereby causing the cold saline water to become heated saline water. Next, the system feeds the heated saline water into a vacuum evaporator comprising a water column having a headspace, which is under a negative pressure due to gravity pulling on the heated saline water in the water column. This negative pressure facilitates evaporation of the heated saline water to form water vapor. Finally, the system directs the water vapor through a condenser, which condenses the water vapor to produce desalinated water.
-
13.
公开(公告)号:US20210011990A1
公开(公告)日:2021-01-14
申请号:US16506803
申请日:2019-07-09
Applicant: Oracle International Corporation
Inventor: Kenny C. Gross , Michael H. S. Dayringer , Andrew J. Lewis , Guang C. Wang
Abstract: The disclosed embodiments provide a system that detects unwanted electronic components in a target asset. During operation, the system generates a sinusoidal load for the target asset. Next, the system obtains target electromagnetic interference (EMI) signals by monitoring EMI signals generated by the target asset while the target asset is executing the sinusoidal load. The system then generates a target EMI fingerprint from the target EMI signals. Finally, the system compares the target EMI fingerprint against a reference EMI fingerprint for the target asset to determine whether the target asset contains unwanted electronic components.
-
公开(公告)号:US10860938B2
公开(公告)日:2020-12-08
申请号:US15951996
申请日:2018-04-12
Applicant: Oracle International Corporation
Inventor: Kenny C. Gross , Aleksey M. Urmanov
Abstract: After sensors are placed at three or more non-collinear locations on a surface of the component, the system receives time-series signals from the sensors while the component operates on a representative workload. The system then defines one or more triangles on the surface of the component, wherein each triangle is defined by three vertices, which coincide with different sensor locations on the surface of the component. For each triangle, the system applies a barycentric coordinate technique (BCT) to time-series signals received from sensors located at the vertices of the triangle to determine a candidate location within the triangle to place an additional sensor. The system then compares the candidate locations for each of the one or more triangles to determine a globally optimal location for the additional sensor, and a new sensor is placed at this location. This process is repeated until a desired number of sensors are placed.
-
15.
公开(公告)号:US20200272140A1
公开(公告)日:2020-08-27
申请号:US16282087
申请日:2019-02-21
Applicant: Oracle International Corporation
Inventor: Kenny C. Gross , Ashin George , DeJun Li
Abstract: The system receives a set of present time-series signals gathered from sensors in the asset. Next, the system uses an inferential model to generate estimated values for the set of present time-series signals, and performs a pairwise differencing operation between actual values and the estimated values for the set of present time-series signals to produce residuals. The system then performs a sequential probability ratio test (SPRT) on the residuals to produce SPRT alarms with associated tripping frequency (TF). While the TF exceeds a TF threshold, the system iteratively adjusts sensitivity parameters for the SPRT to reduce the TF, and performs the SPRT again on the residuals. The system then uses a logistic regression model to compute a risk index for the asset based on the TF. If the risk index exceeds a threshold, the system generates a notification indicating that the asset needs to be replaced.
-
16.
公开(公告)号:US20200245140A1
公开(公告)日:2020-07-30
申请号:US16258544
申请日:2019-01-26
Applicant: Oracle International Corporation
Inventor: Kenny C. Gross , Ashin George , Guang C. Wang
Abstract: The disclosed embodiments relate to a system that camouflages electromagnetic interference (EMI) fingerprints in EMI emissions from a computing system to enhance system security. During operation, the system monitors the EMI emissions from the computer system while the computer system is operating to produce corresponding EMI signals. Next, the system performs a Fast Fourier Transform (FFT) operation on the EMI signals. The system then converts an output of the FFT operation into a frequency-domain representation of the EMI signals. Next, the system generates a camouflaging signal based on the frequency-domain representation of the EMI signals. Finally, the system outputs the camouflaging signal through a transmitter to camouflage EMI fingerprints in the EMI emissions from the computer system.
-
17.
公开(公告)号:US10685226B1
公开(公告)日:2020-06-16
申请号:US16292623
申请日:2019-03-05
Applicant: Oracle International Corporation
Inventor: Kenny C. Gross , Andrew J. Lewis , Edward R. Wetherbee
IPC: G06K9/00
Abstract: The disclosed embodiments provide a system that detects counterfeit electronic components in a target device, which is part of an electrical generation and distribution system. During operation, the system obtains target EMI signals, which were gathered by monitoring target electromagnetic interference (EMI) emissions generated by the target device using one or more target antennas positioned in proximity to the target device. Next, the system generates a target EMI fingerprint for the target device from the target EMI signals. Finally, the system compares the target EMI fingerprint against a reference EMI fingerprint for the target device to determine whether the target device contains one or more counterfeit electronic components.
-
18.
公开(公告)号:US20190295190A1
公开(公告)日:2019-09-26
申请号:US16355127
申请日:2019-03-15
Applicant: Oracle International Corporation
Inventor: Benjamin P. Franklin, JR. , Kenny C. Gross
Abstract: During operation, the system receives a set of input signals containing electrical usage data from a set of smart meters, which gather electrical usage data from customers of the utility system. The system uses the set of input signals and a projection technique to produce projected loadshapes, which are associated with electricity usage in the utility system. Next, the system identifies a closest time period in a database containing recent empirically obtained load-related parameters for the utility system, wherein the load-related parameters in the closest time period are closest to a present set of load-related parameters for the utility system. The system then iteratively adjusts the projected loadshapes based on changes indicated by the load-related parameters in the closest time period until a magnitude of adjustments falls below a threshold. Finally, the system predicts electricity demand for the utility system based on the projected loadshapes.
-
19.
公开(公告)号:US20180060151A1
公开(公告)日:2018-03-01
申请号:US15248807
申请日:2016-08-26
Applicant: Oracle International Corporation
Inventor: Kenny C. Gross , Kalyanaraman Vaidyanathan , Guang-Tong Zhou
Abstract: The disclosed embodiments relate to a system for validating a prognostic-surveillance mechanism, which detects anomalies that arise during operation of a computer system. During operation, the system obtains telemetry data comprising a set of raw signals gathered from sensors in the computer system during operation of the computer system, wherein the telemetry signals are gathered over a monitored time period. Next, for each raw signal in the set of raw signals, the system decomposes the raw signal into deterministic and stochastic components. The system then generates a corresponding set of synthesized signals based on the deterministic and stochastic components of the raw signals, wherein the synthesized signals are generated for a simulated time period, which is longer than the monitored time period. Finally, the system uses the set of synthesized signals to validate one or more performance metrics of the prognostic-surveillance mechanism.
-
公开(公告)号:US20170222976A1
公开(公告)日:2017-08-03
申请号:US15015055
申请日:2016-02-03
Applicant: Oracle International Corporation
Inventor: Kenny C. Gross , Kalyanaraman Vaidyanathan , Andrew E. Brownsword
IPC: H04L29/06
CPC classification number: H04L63/1416 , H04L63/1425 , H04L63/1466
Abstract: The disclosed embodiments relate to a system that performs an intrusion-detection technique to differentiate between packets received from malicious remote users and legitimate local users in a networked computer system. During operation, the system determines arrival times for incoming packets at a node in the networked computer system. Next, the system determines inter-arrival times between the incoming packets from the arrival times. The system then determines a mean cumulative function (MCF) for the inter-arrival times by computing a cumulative sum of the inter-arrival times. Finally, upon detecting a change in a slope of the MCF, the system generates an alarm to indicate that a malicious remote user may be generating some of the incoming packets.
-
-
-
-
-
-
-
-
-