摘要:
A system and method are provided for controlling the latency of messages to enable a network of devices to detect and respond to potential malware. The system and method receiving a message at a device and determining whether the message represents potential malware and requires a delay to allow time to detect and respond to potential malware. The amount of the delay associated with the message is determined and the message is processed based on the delay amount.
摘要:
A method and system adjusts blade tip clearance between rotating aircraft gas turbine engine blade tips and a surrounding shroud in anticipation of and before an engine command that changes an engine rotational speed. The method may include determining when to begin adjusting the tip clearance by expanding or contracting the shroud before the engine command and may be based on monitored aircraft and/or aircraft crew data indicative of the engine. The aircraft and/or aircraft crew data may include communications between aircraft crew and air traffic control authorities or air traffic control surrogates. Determining when to begin adjusting the tip clearance may include using learning algorithms which may use the aircraft gas turbine engine's operating experience and/or operating experience of other jet engines on an aircraft containing the aircraft gas turbine engine and/or on other aircraft.
摘要:
A method for processing information is provided. The method includes directing a laser beam to a first track of a first layer of a holographic storage medium. The method also includes recording a base voltage based on a look-up table. The method includes directing the laser beam to a target track in the first layer, based on position information in tracks. Further, the method includes recording an offset voltage for the target track into the look-up table. Still further, the method includes directing the laser beam to a target layer based on position information in vertical wobbles. The method also includes recording an offset voltage for the target layer into the look-up table. Finally, the method includes determining a final voltage based on the look-up table and applying the final voltage to an actuator for moving the laser beam to a final target position in the holographic storage medium for recording and retrieval of information.
摘要:
A system and method for monitoring a network and detecting network vulnerabilities is provided. A communication associated with one or more programs is issued to one or more devices in a network and the response from the devices is detected and analyzed. Based on the analysis, a device response is identified as a threat response if it represents at least an alert, an unexpected response or a response time-out indicating that the device did not response to the communication. The vulnerability of the network is determined based on the threat responses of the devices.
摘要:
Provided are methods and systems of managing vertical handoffs in a wireless communication network. Embodiments include analyzing wireless device usage to determine usage patterns, which may include locations and times at which the wireless device is typically accessing the network. The network may recognize points in the usage patterns at which signal quality parameters are typically reduced. Such reductions in signal quality parameters may lead to inefficient vertical handoffs. The network may decrease adverse effects of inefficient vertical handoffs by reducing ping ponging, selecting links between wireless devices and network nodes, or indicating to a user of the wireless device that delays and/or data loss may occur.
摘要:
An improved holographic data storage disc is provided. The holographic data storage disc includes multiple multimedia content, wherein at least one of the multimedia is locked via one or more cryptographic keys.
摘要:
System, device and methods that provide proximate environmental and security intelligence to a guard making a security tour or round in an installation, as well as that provide for certifying that the guard has visited designated and known checkpoints on or about the times at which the guard is expected at those checkpoints.
摘要:
An article includes a display layer having an outward facing surface and an inward facing surface. The display layer includes a light-emitting device that generates heat and light during use. A thermal transport layer may be secured to the display layer. The thermal transport layer may include a microfluidic layer including a coolant that can transport heat generated by the light-emitting device away from the light-emitting device. An article includes a display structure having a height, a width, and a thickness that define a volume. The display structure can include components that emit light to generate a three-dimensional image within the volume. The display structure includes a stack. The display structure also includes a thermal dissipation layer in contact with the sheet or stack that can transport generated heat from the sheet or stack to a heat absorbing structure.
摘要:
A system for detecting a hot surface is provided. The system includes a sensor for sensing an infrared radiation radiating from the hot surface and a high pass filter to eliminate low frequency components from the sensor signal. The system also includes an absolute value module to compute absolute values of a filtered signal, a first comparator to compare output of the absolute value module to a first threshold and a peak detector to report a peak value of the sensor signal's output. The system further includes a second comparator to compare output of peak detector to a second threshold.
摘要:
In an embodiment, a method of masking transaction data for a secure wireless transaction includes transmitting wireless pseudo transaction data that includes false transaction data and processing received pseudo transaction data and transaction data to extract or separate the transaction data.