Abstract:
There is provided a system and method for estimating network tomography. More specifically, there is provided a computer system configured to measure the transmission delay along a path from a source endpoint of a computer network to a plurality of destination endpoints of the computer network, wherein the path includes at least two data links and wherein at least one of the data links is shared by the plurality of destination endpoints for transmissions from the source endpoint, to calculate a characteristic function of the measured transmission delay, and to calculate a performance parameter of one of the data links based on the characteristic function.
Abstract:
The method includes receiving a plurality of calls from users of the communication network, the plurality of calls having a non-homogenous arrival rate that is defined by first arrival rate information, transforming the first arrival rate information into second arrival rate information, the second arrival rate information having a homogenous arrival rate, and detecting at least one first anomaly of the received plurality of calls using the second arrival rate information. A network node may be configured to perform this method.
Abstract:
A method of heating a charge material by controlling heat flux in a tilt rotary furnace is disclosed. Combustion by the burner forms a heat release profile including a high heat flux region. The positioning of the high heat flux region is controllable by providing a controlled amount of secondary or staged oxidant. The burner is configured and controlled to position a region of high heat flux at a position corresponding to an area requiring greater heating, such as the area of maximum charge depth in the furnace to provide substantially uniform melting and heat distribution.
Abstract:
In one embodiment, a method for detecting malicious software agents, such as domain-flux botnets. The method applies a co-clustering algorithm on a domain-name query failure graph, to generate a hierarchical grouping of hosts based on similarities between domain names queried by those hosts, and divides that hierarchical structure into candidate clusters based on percentages of failed queries having at least first- and second-level domain names in common, thereby identifying hosts having correlated queries as possibly being infected with malicious software agents. A linking algorithm is used to correlate the co-clustering results generated at different time periods to differentiate actual domain-flux bots from other domain-name failure anomalies by identifying candidate clusters that persist for relatively long periods of time. Persistent candidate clusters are analyzed to identify which clusters have malicious software agents, based on a freshness metric that characterizes whether the candidate clusters continually generate failed queries having new domain names.
Abstract:
An oxy-fuel burner that co-fires liquid fuel and gaseous fuel to create a more luminous flame. The characteristics of a liquid fuel spray and the gaseous fuel and primary oxidant gas flows, as well as the geometry of the burner is adapted to shroud the liquid fuel from the primary oxidant until it exits a precombustor and to prevent the liquid fuel from contacting the walls of the precombustor.
Abstract:
Burner assembly for use in industrial heating and melting applications of material susceptible to oxidation at elevated temperatures is comprised of a flow passage of oxidant surrounded by an annular flow passage of fuel whereby the oxidant is substantially contained inside the fuel layer up to at least 5 oxidant nozzle diameters downstream of the burner outlet in order to minimize contact between the oxidant and the furnace load.
Abstract:
In one embodiment, a method of monitoring a network. The method includes, at each node of a set, constructing a corresponding vector of M components based on a stream of data packets received at the node during a time period, the set including a plurality of nodes of the network, M being greater than 1; and estimating a value of a byte traffic produced by a part of the packets based on the constructed vectors, the part being the packets received by every node of the set. The constructing includes updating a component of the vector corresponding to one of the nodes in response to the one of the nodes receiving a data packet. The updating includes selecting a component of the vector to be updated by hashing a property of the received data packet.
Abstract:
In one embodiment, a statistical model is generated based on observed data, the observed data being associated with a network device, online parameter fitting is performed on parameters of the statistical model, and for each newly observed data value, a forecast value is generated based on the statistical model, the forecast value being a prediction of a next observed data value, a forecasting error is generated based on the forecast value and the newly observed data value, and whether the data of the network stream is abnormal is determined based on a log likelihood ratio test of the forecasting errors and a threshold value.
Abstract:
In one embodiment, a method of monitoring a network. The method includes: receiving, from each host of a set of two or more hosts of the network, a corresponding vector of M components constructed based on data packets received at the host during a time period, M being an integer greater than 1; and, based on the constructed vectors, using an expectation-maximization algorithm to estimate a cardinality distribution for the hosts in the set, wherein constructing a vector includes updating a component of the vector of the corresponding host in response to the corresponding host receiving a data packet, the updating including selecting the component for updating by hashing one or more fields of the data packet received by the corresponding host.