Abstract:
A rule-based verification testing methodology automates the process and allows for field deployment of verification testing instrumentation. A rule-based chemical monitoring methodology automates the verification of a chemical being monitored, as well as the instrument and a sample path, increasing the confidence in the verification process. In both methods, at least Raman spectra of a sample are captured, and compared to a model that is based on reference data. Predetermined, flexible, parameterized rules control the comparison. Additional physical properties, such as color and size, may also be compared (also controlled by predetermined rules).
Abstract:
A downhole actuator apparatus that selectively maintains a pressure differential between two pressure regions in a well. The apparatus includes a body defining first and second chambers. A piston is slidably disposed in the body and is selectively moveable between first and second positions. A barrier is disposed in the body to selectively separate the first and second chambers. A fluid is disposed in the first chamber between the barrier and the piston. A control system that is at least partially disposed within the body is operable to generate an output signal responsive to receipt of a predetermined input signal. The output signal is operable to create a failure of the barrier such that at least a portion of the fluid flows from the first chamber to the second chamber and the piston moves from the first position to the second position.
Abstract:
Techniques are provided for isolating failed routing resources on a programmable circuit. Failing test patterns and the test logs are fed to a Statistical Failure Isolation (SFI) tool. The SFI tool extracts failing paths from the test patterns. A statistical analysis is performed on interconnect resources related to failing paths. The resources on the paths are then tallied to create a histogram of resources. These resources are then be fed into an Adaptive Failure Isolation (AFI) tool to auto-generate verification patterns. A tester uses the verification patterns to isolate failed interconnect resources.
Abstract:
A cable containing an optical fiber is used to transmit data between an underwater remotely operated vehicle (ROV) and a support vessel floating on the surface of the water. The ROV stores the cable on a spool and releases the cable into the water as the ROV dives away from the support vessel. The ROV detects the tension in the cable and the rate that the cable is released from the ROV is proportional to the detected tension in the cable. After the ROV has completed the dive and retrieved by the support vessel, the cable can be retrieved from the water and rewound onto the spool in the ROV.
Abstract:
The probability of a computer file being malware is inferred by iteratively propagating domain knowledge among computer files, related clients, and/or related source domains. A graph is generated to include machine nodes representing clients, file nodes representing files residing on the clients, and optionally domain nodes representing source domains hosting the files. The graph also includes edges connecting the machine nodes with the related file nodes, and optionally edges connecting the domain nodes with the related file nodes. Priors and edge potentials are set for the nodes and the edges based on related domain knowledge. The domain knowledge is iteratively propagated and aggregated among the connected nodes through exchanging messages among the connected nodes. The iteration process ends when a stopping criterion is met. The classification and associated marginal probability for each file node are calculated based on the priors, the received messages, and the edge potentials associated with the edges through which the messages were received.
Abstract:
An individualized time-to-live (TTL) is determined for a reputation score of a computer file. The TTL is determined based on the reputation score and the confidence in the reputation score. The confidence can be determined based on attributes such as the reputation score, an age of the file, and a prevalence of the file. The reputation score is used to determine whether the file is malicious during a validity period defined by the TTL, and discarded thereafter.
Abstract:
A method and system to maintain a personal health record, including, obtaining data using a medical imaging device, storing the data in a picture archiving and communication system, determining which of the data stored in the picture archiving and communication system is to be stored in the personal health record, and transmitting the data to be stored in the personal health record to an internet accessible storage device based on the determination.
Abstract:
A safety valve system includes a safety valve having an actuator and a line connected to the actuator. The safety valve is operable by opening the line in the well, with the line being free of any connection to a surface control system. Another safety valve system includes multiple safety valves. An actuator of each safety valve is connected to an actuator of another safety valve via a line. A biasing force in each of the actuators is operative to close the respective one of the safety valves in response to opening of the line. The biasing force is produced at least in part by hydrostatic pressure in a well.
Abstract:
A multicycle hydraulic control valve. A control and actuation system for a well tool includes a control valve having one or more metal-to-metal seals which open while differential pressure exists across the seals to thereby selectively connect pressure sources to an actuator to operate the well tool. Both seals may be closed while a connection between the actuator and the pressure sources is switched by the control valve. The control valve may include a member having areas formed thereon acted upon by various pressures to facilitate operation of the control valve.
Abstract:
An apparatus and method for generating configuration and test files for programmable logic devices includes a dynamic configuration and test generation program to specify, in source code, a logic function to be implemented by a programmable logic device. A device test development kernel program has information characterizing physical elements of the programmable logic device and bit patterns for implementing connections between the physical elements of the programmable logic device. The device test development kernel program converts the logic function into a configuration file for use in programming the logic function into the programmable logic device. The dynamic configuration and test generation program also specifies, in source code, a test operation to be executed by the programmable logic device. It operates with the device test development kernel program to produce a vector file for use in testing the programmable logic device.