Abstract:
A method for reducing engine fuel consumption of an electromotive vehicle during braking, the method including steps for providing an engine for the vehicle, generating primary electric power at a primary electric power generator connected to the engine, generating primary electric power at a secondary electric power generator connected to the engine, operating a plurality of electric traction motors each coupled in driving relationship to a respective one of a plurality of driven wheels to propel the vehicle during motoring operations and to generate electricity upon braking operations of the vehicle, electrically connecting a braking switch between the traction motors and the primary electric power generator, applying braking, closing the braking switch, and transmitting power generated by the traction motors to the primary electric power generator to operate as a motor to rotate the engine and drive the secondary electric power generator to power the auxiliary equipment without fueling the engine.
Abstract:
The subject disclosure is directed towards detecting malware or possible malware in an input file by allowing the input file to be opened, and by monitoring for one or more behaviors corresponding to the open file that likely indicate malware. Only certain executable files and/or file types opened thereby may be monitored, with various collected event data used for antimalware purposes when improper behavior is observed. Example behaviors include writing of a file to storage, generation of network traffic, injection of a process, running of script, and/or writing system registry data. Telemetry data and/or a sample of the file may be sent to an antimalware service, and malware remediation may be performed. Data (e.g., the collected events) may be distributed to other nodes for use in antimalware detection, e.g., to block execution of a similar file.
Abstract:
The subject disclosure is directed towards a technology by which antimalware detection logic is maintained and operated at a backend service, with which a customer frontend machine communicates (queries) for purposes of malware detection. In this way, some antimalware techniques are maintained at the backend service rather than revealed to antimalware authors. The backend antimalware detection logic may be based upon feature selection, and may be updated rapidly, in a manner that is faster than malware authors can track. Noise may be added to the results to make it difficult for malware authors to deduce the logic behind the results. The backend may return results indicating malware or not malware, or return inconclusive results. The backend service may also detect probing-related queries that are part of an attempt to deduce the unrevealed antimalware detection logic, with noisy results returned in response and/or other actions taken to foil the attempt.
Abstract:
Some implementations include a method of managing a hosted non-volatile random-access memory (NVRAM) based storage subsystem that includes NVRAM devices. The method includes: receiving, at a device driver on the host computing device, write requests each requesting to write a respective unit of data to the NVRAM-based storage subsystem; categorizing the write requests into subgroups of write requests, where write requests within respective subgroups are mutually exclusive; ascertaining a load condition of each of several of the NVRAM devices of the NVRAM-based storage subsystem; identifying a target location on at least one NVRAM device to service a particular subgroup of write requests according to the ascertained load conditions of the NVRAM devices of the NVRAM-based storage subsystem; and servicing the particular subgroup of write requests by writing the corresponding units of data to the identified target location on the at least one NVRAM device of the NVRAM-based storage subsystem.
Abstract:
A system for providing at least one of train information and track characterization information for use in train performance, including a first element to determine a location of a train on a track segment and/or a time from a beginning of the trip. A track characterization element to provide track segment information, and a sensor for measuring an operating condition of at least one of the locomotives in the train are also included. A database is provided for storing track segment information and/or the operating condition of at least one of the locomotives. A processor is also included to correlate information from the first element, the track characterization element, the sensor, and/or the database, so that the database may be used for creating a trip plan that optimizes train performance in accordance with one or more operational criteria for the train.
Abstract:
Diagnosing auxiliary equipment associated with an engine. A condition of the auxiliary equipment is diagnosed based on information provided by signals from a generator operationally connected to the auxiliary equipment or other signals associated with the engine. Different types of degradation are distinguished based on discerning characteristics within the information. Thus, a degraded auxiliary equipment component can be identified in a manner that reduces service induced delay.
Abstract:
Techniques are described herein that are capable of selectively scanning objects for infection by malware (i.e., to determine whether one or more of the objects are infected by malware). For instance, metadata that is associated with the objects may be reviewed to determine whether update(s) have been made with regard to the objects since a determination was made that the objects were not infected by malware. An update may involve increasing a number of the objects, modifying one of the objects, etc. Objects that have been updated (e.g., added and/or modified) since the determination may be scanned. Objects that have not been updated since the determination need not necessarily be scanned. For instance, an allowance may be made to perform operations with respect to the objects that have not been updated since the determination without first scanning the objects for infection by malware.
Abstract:
A system for optimizing a trip for a hybrid vehicle, comprising a computer programmed to determine a route for the hybrid vehicle to travel, obtain altitude and terrain information of the route, and generate a trip plan based on at least the route and altitude to minimize total energy expended along the route by encouraging regenerative braking during portions of the route, regardless of needs to slow the hybrid vehicle.
Abstract:
A method for determining the configuration of a diesel powered system having at least one diesel-fueled power generating unit, the method including a step for determining a minimum power required from the diesel powered system in order to accomplish a specified mission, and a step for determining an operating condition of the diesel-fueled power generating unit such that the minimum power requirement is satisfied while yielding at least one of lower fuel consumption and lower emissions for the diesel powered system.
Abstract:
A hybrid power locomotive system has a plurality of combustion engines for driving a plurality of electric power generators that supply electric power to at least one traction battery. The battery is connected to supply power to a plurality of electric traction motors coupled in driving relationship to respective ones of a plurality of wheel-axle sets of the locomotive. At least one traction motor drive is connected for controlling power to the electric traction motors. An electric power controller is arranged for coupling electric power from the power generators to the battery and senses the available energy in the battery and the power demand from the traction drives for activating selected ones of the plurality of combustion engines for charging the battery.