摘要:
The present technique provides for the analysis of a data series to identify sequences of interest within the series. The analysis may be used to iteratively update a grammar used to analyze the data series or updated versions of the data series. Furthermore, the technique provides for the calculation of a minimum description length heuristic, such as a symbol compression ratio, for each sub-sequence of the analyzed data sequence. The technique may then compare a selected heuristic value against one or more reference conditions to determine if additional iteration is to be performed. The grammar and the data sequence may be updated between iterations to include a symbol representing a string corresponding to the selected heuristic value based upon a non-termination result of the comparison. Alternatively, the string corresponding to the selected heuristic value may be identified as a sequence of interest based upon a termination result of the comparison.
摘要:
A system and method for detecting a utility network threat based on the quality of communications received at devices in the utility network. The quality of a communication signal received by a device in the utility network is determined and a threat to the utility network is determined based on the signal quality. Threat information is output to devices on the utility network.
摘要:
A method and system for detection of intrusion in networked control systems, is provided. The method includes generating an operating model of a system being controlled. The operating model of the system comprises a relationship between a plurality of components in the system defined by a plurality of parameters. Further, the method includes calculating an estimated value of at least one parameter for at least one component in the system. The operating model is used to calculate the estimated value of the at least one parameter. Furthermore, the method includes measuring a latest value of at least one parameter at a predefined interval. The method also includes triggering an alert for intrusion for the at least one component based on an analysis of at least one of the latest value and the estimated value of at least one parameter.
摘要:
A self-organizing protection coordination system within a power network is provided. The self-organizing protection coordination system in the power network includes a plurality of distribution devices communicatively coupled to each other in a power network. The power network also includes a protection device coupled to each of the plurality of distribution devices configured to transmit power in the distribution network. The power network further includes a controller coupled to each of the plurality of distribution devices. The controller receives communication channel characteristics from a plurality of distribution devices in a distribution network at an interval of time. The controller also computes a delay in time for receiving the communication characteristics. The controller further determines a plurality of reliability indicators at each of the plurality of distribution devices. The controller adjusts tripping characteristics of the plurality of distribution devices to minimize the reliability indicators based on the computed delay.
摘要:
The present technique provides for the analysis of a data series to identify sequences of interest within the series. The analysis may be used to iteratively update a grammar used to analyze the data series or updated versions of the data series. Furthermore, the technique provides for the calculation of a minimum description length heuristic, such as a symbol compression ratio, for each sub-sequence of the analyzed data sequence. The technique may then compare a selected heuristic value against one or more reference conditions to determine if additional iteration is to be performed. The grammar and the data sequence may be updated between iterations to include a symbol representing a string corresponding to the selected heuristic value based upon a non-termination result of the comparison. Alternatively, the string corresponding to the selected heuristic value may be identified as a sequence of interest based upon a termination result of the comparison.
摘要:
A flood attack of an information system is simulated by injecting an algorithmically compressed flood attack model into the information system to assess the effect of the attack upon the system. The flood attack model propagates from node to node throughout the system by way of virtual messages that time-project the flood attack model and do not disrupt system operation while the simulated flood attack is taking place. Programs of executable code installed on nodes of the information system generate and send the virtual messages describing the flood attack.
摘要:
A dialog processing method and apparatus for uninhabited air vehicles is described. The apparatus contains a recognition unit for recognizing incoming data, an interpretation unit for interpreting the data according to a grammar and a response unit for generating an appropriate response to the incoming data. The method may utilize natural language processes and may reduce to a finite state machine. The incoming data is combined with uninhabited air vehicle state information to increase the accuracy of this interpretation. Additionally, the dialog states may be limited to customary air traffic control dialogs.
摘要:
A communications network comprises a plurality of nodes including at least one earth station and at least one spacecraft. The spacecraft node is an active node of the network. A method for dynamically configuring a spacecraft to function as a node of a communications network in accordance with the defacto active network reference and with an Open Systems Interconnect (OSI) reference model comprises the step of transmitting an object from an earth station to the spacecraft. The object comprises at least one method for configuring the spacecraft to include a node operating system (nodeOS) and at least one execution environment (EE).
摘要:
A real-time distributed model-based predictive control method having a time maintenance mechanism that solves all state synchronization problems. Method steps include generating a message that predicts a system value corresponding to a future time, and executing a control process using the system value contained within said message, resulting in a process state. The process state is then stored in a state queue. The local process time is rolled back to the latest valid local process time prior to said message if the message precedes the current process state time. Rolling back comprises retrieving the system state values at that latest valid local process time from said state queue and re-executing the control process, using the system value contained within the message, and storing the new state in the state queue. The method also includes rolling back if, upon receiving a message containing an observed system value, said observed system value differs from its predicted value by more than a predetermined tolerance. The method is carried out on a distributed processor control system.