摘要:
A mower is provided and includes: a case; a charging circuit provided in the case, and a combination of a wheel assembly and a charging interface assembly arranged on the case. The combination is electrically connected to the charging circuit. The combination includes: a wheel assembly; and a charging interface assembly electrically connected to the charging circuit. The wheel assembly and the charging interface assembly are integrated molding structure.
摘要:
An apparatus for heating vessels, the vessels having enclosed spaces therein and controlling air ingress into the enclosed spaces through gaps. The method includes providing a lid structure for the vessel having the enclosed space, the lid structure having a burner assembly mounted therein. The burner is configured to provide a predetermined flame diameter. The vessel and lid structure are mated such that the gap is formed between the vessel and the lid structure. Fuel and oxidant are discharged from the burner assembly under conditions to provide the predetermined flame diameter and impart a flame velocity sufficiently large to create an outward gas flow from the enclosed space through the gap and control air ingress.
摘要:
A heating method for heating vessels, the vessels having enclosed spaces therein and controlling air ingress into the enclosed spaces through gaps. The method includes providing a lid structure for the vessel having the enclosed space, the lid structure having a burner assembly mounted therein. The burner is configured to provide a predetermined flame diameter. The vessel and lid structure are mated such that the gap is formed between the vessel and the lid structure. Fuel and oxidant are discharged from the burner assembly under conditions to provide the predetermined flame diameter and impart a flame velocity sufficiently large to create an outward gas flow from the enclosed space through the gap and control air ingress.
摘要:
In one embodiment, a method for detecting malicious software agents, such as domain-flux botnets. The method applies a co-clustering algorithm on a domain-name query failure graph, to generate a hierarchical grouping of hosts based on similarities between domain names queried by those hosts, and divides that hierarchical structure into candidate clusters based on percentages of failed queries having at least first- and second-level domain names in common, thereby identifying hosts having correlated queries as possibly being infected with malicious software agents. A linking algorithm is used to correlate the co-clustering results generated at different time periods to differentiate actual domain-flux bots from other domain-name failure anomalies by identifying candidate clusters that persist for relatively long periods of time. Persistent candidate clusters are analyzed to identify which clusters have malicious software agents, based on a freshness metric that characterizes whether the candidate clusters continually generate failed queries having new domain names.
摘要:
A method and apparatus for incremental quantile estimation is provided. A method for performing incremental quantile estimation using an estimated cumulative distribution function includes receiving a record, identifying an entity with which the received record is associated, determining a record type of the received record based at least in part on the entity with which the received record is associated, updating the estimated cumulative distribution function based on the record type of the received record, and storing the estimated cumulative distribution function. The record type of the received record is indicative of whether the received record is an insertion record, an update record, or a deletion record. The estimated cumulative distribution function may be used to respond to quantile query requests in real-time or near-real-time.
摘要:
Methods and apparatuses are provided for detecting traffic patterns in a data network. A sequential hashing scheme can be utilized that has D hash arrays. Each hash array i, wherein 1≦i≦D, includes Mi independent hash tables each having K buckets, with each of the buckets having an associated traffic total. Each of the keys corresponds with a single bucket of each of the Mi independent hash tables of each hash array i. The keys of the data network are partitioned into D words. As traffic is received for a key, a traffic total of each bucket that corresponds with a key is updated. The hash arrays can then be utilized to identify high traffic buckets of the independent hash tables having a traffic total greater than a threshold value. The high traffic buckets can be used to detect significant traffic patterns of the data network.
摘要:
In one embodiment, a method of monitoring a network. The method includes, at each node of a fixed set, constructing a corresponding vector of M components based on data packets received at the node during a time period, M being an integer greater than 1, the fixed set being formed of some nodes of the network; and, based on the constructed vectors, estimating how many of the received data packets have been received by all of the nodes of the set or estimating how many flows of the received data packets have data packets that have passed through all of the nodes of the set. The constructing includes updating a component of the vector of one of the nodes in response to the one of the nodes receiving a data packet. The updating includes selecting the component for updating by hashing a property of the data packet received by the one of the nodes.
摘要:
Burner assembly comprising (a) an elongated body having a periphery, a discharge end adjacent a combustion zone, and an axis, wherein the axis extends into the combustion zone; (b) one or more oxidant nozzles disposed at the discharge end of the elongated body and adapted to discharge a gaseous oxidant into the combustion zone; and (c) one or more fuel nozzles disposed at the discharge end of the elongated body and adapted to discharge a fuel into the combustion zone. At least one of the oxidant and fuel nozzles is characterized by a shape factor, σ, that is greater than about 10, wherein σ is a dimensionless parameter defined as σ=P2/2A where P is the perimeter dimension of the discharge opening and A is the area of the discharge opening.
摘要:
A capability for incremental tracking of multiples quantiles is provided. A method for performing an incremental quantile update using a data value of a received data record includes determining an initial distribution function, updating the initial distribution function to form a new distribution function based on the received data value, generating an approximation of the new distribution function, and determining new quantile estimates from the approximation of the new distribution function. The initial distribution function includes a plurality of initial quantile estimates and a respective plurality of initial probabilities. The new distribution function includes a plurality of quantile points identifying the respective initial quantile estimates and a respective plurality of new probabilities associated with the initial quantile estimates. The approximation of the new distribution function is generated by connecting pairs of adjacent quantile points using linear approximations of regions between the pairs of adjacent quantile points.
摘要:
A method and system for identifying causes of performance metric changes in a network by selecting, from a pool of network event counters, a plurality of candidate counters relevant to a performance metric; grouping the candidate counters into clusters of similar counters; selecting, from each cluster, one or more representative counters; and fitting the selected representative counters to a model of the performance metric to determine thereby a set of representative counters most relevant to the performance metric.