摘要:
A method and system for routing traffic in a communication network is disclosed that may include assigning each node in a network a first subset of route repository nodes and a second subset of route repository nodes, querying the second subset of route repository nodes in order to obtain route information that is stored in the second subset of route repository nodes, computing route information by applying a route computation algorithm to the first subset of route repository nodes, and routing traffic in the communication network based on the route information obtained from the second subset of route repository nodes and the route information computed using the first subset of route repository nodes.
摘要:
A method for authenticating appliance messages sent between an appliance and an appliance communication center over an appliance communications network includes maintaining a shared message counter at both the appliance communication center. A shared message counter at both the appliance communication center and the remotely located appliance. An authentication algorithm is applied to the appliance message and the shared message counter to generate an authentication word. The appliance message is then transmitted to the appliance or the communication center along with the authentication word. Upon receiving the appliance message, the appliance or the communication center will apply an authentication algorithm to the appliance message and the shared counter to generate an authentication word. The generated authentication word may be compared to the word received with the appliance message to determine authenticity of the message.
摘要:
A method and system for monitoring and controlling a power distribution system is provided. The system includes a plurality of circuit breakers and a plurality of node electronic units. Each node electronic unit is mounted remotely from an associated circuit breaker that is electrically coupled with one of the node electronic units. The system also includes a first digital network, and a first central control unit. The first central control unit and the plurality of node electronic units are communicatively coupled to the first digital network. The method includes receiving digital signals from each node electronic unit at the central control unit, determining an operational state of the power distribution system from the digital signal, and transmitting digital signals to the plurality of node electronic units such that the circuit breakers are operable from the first central control unit.
摘要:
A method of monitoring and controlling a power distribution system is provided. The power distribution system includes a plurality of circuit breakers, a plurality of node electronic units, and wherein each associated circuit breaker is electrically coupled with each respective node electronic unit. The system also includes at least one digital network, and at least one central control processing unit (CCPU) wherein each CCPU includes a first power system global information set, and each CCPU is communicatively coupled to the plurality of node electronic units. The method includes transmitting at least one digital message from each node electronic unit to each CCPU over a respective network, determining an operational state of the power distribution system from the digital message, and transmitting at least one multicast message from each CCPU to each node electronic unit such that the circuit breakers are operable from each CCPU.
摘要:
Appliances (102, 102, 106 and 108) are controlled by providing a source (2016, 112) of command fields (CMD, FIG. 2) that include a context subfield (Community, FIG. 4) defining operating modes and a command subfield (Command, FIG. 4) defining operations to be performed within the context subfield. A network (119) transmits the command fields between the source and the appliance. A controller (112, 116) processes the command fields so that an operation defined by one of the command subfields is performed.
摘要:
An intrusion detection system for detecting and defeating unauthorized intrusion within a computer network of an infrastructure element of a high value target, the system including a pre-processor configured to receive data from a computer network of an infrastructure element of a high value target and to output filtered data, a grammar applicator configured to apply grammars produced using a grammar based compression and learning algorithm to the filtered data, a decision making device configured to provide a recommendation based on an input from the grammar applicator as to whether the data in the computer network constitutes an unauthorized intrusion, and an emulator in communication with the decision making device configured to expand a sampling of the filtered data using a polymorphic transformation to allow the decision making device to further analyze the sampled data to determine an unauthorized intrusion. A method and a computer software code are also disclosed.
摘要:
Methods and systems for determining whether a particular individual is to be granted, among other things, access to information, access to a particular room or other space, or permission to perform a given act or transaction are disclosed. For example, disclosed is an exemplary method that includes performing multiple biometrics tests on the individual to retrieve multiple biometrics test results, performing at least a first data fusion operation on the multiple biometrics test results to determine an identity result, performing at least one biological state test to determine one or more biological state test results of the individual, and conditionally granting authority to the individual based on the identity result and the one or more biological state results.
摘要:
An intrusion detection system for detecting and defeating unauthorized intrusion within a computer network of an infrastructure element of a high value target, the system including a pre-processor configured to receive data from a computer network of an infrastructure element of a high value target and to output filtered data, a grammar applicator configured to apply grammars produced using a grammar based compression and learning algorithm to the filtered data, a decision making device configured to provide a recommendation based on an input from the grammar applicator as to whether the data in the computer network constitutes an unauthorized intrusion, and an emulator in communication with the decision making device configured to expand a sampling of the filtered data using a polymorphic transformation to allow the decision making device to further analyze the sampled data to determine an unauthorized intrusion. A method and a computer software code are also disclosed.
摘要:
A method and system for web mining and clustering is described. The method includes receiving and dividing input data into a plurality of primitive datasets. Additionally, one or more combinations of the plurality of primitive datasets may be created. Further, a model for each primitive dataset in the plurality of primitive datasets and each of the one or more combinations of the plurality of primitive datasets may be generated. Subsequently, a cost associated with a model corresponding to each primitive dataset in the plurality of primitive datasets, and each of the one or more combinations of the plurality of primitive datasets may be computed. Further, a sum of the costs associated with the models corresponding to each primitive dataset in the plurality of primitive datasets may be compared with the cost associated with each model corresponding to each of the one or more combinations of the plurality of primitive datasets. Finally, the plurality of primitive datasets may be partitioned into one or more clusters based on the comparison of the costs such that each primitive dataset is a part of a cluster in the one or more clusters or a stand-alone primitive dataset.
摘要:
The present technique provides for the analysis of a data series to identify sequences of interest within the series. The analysis may be used to iteratively update a grammar used to analyze the data series or updated versions of the data series. Furthermore, the technique provides for the calculation of a minimum description length heuristic, such as a symbol compression ratio, for each sub-sequence of the analyzed data sequence. The technique may then compare a selected heuristic value against one or more reference conditions to determine if additional iteration is to be performed. The grammar and the data sequence may be updated between iterations to include a symbol representing a string corresponding to the selected heuristic value based upon a non-termination result of the comparison. Alternatively, the string corresponding to the selected heuristic value may be identified as a sequence of interest based upon a termination result of the comparison.