摘要:
A method, apparatus, and computer program product are provided for calculating an indicator of operator distraction for an equipment operator. First, distraction-correlated indicator information from devices around an operator is received. Next, a distraction level is estimated. Subsequently, an output is produced indicative of the distraction level to facilitate a threat assessment decision. Additional operations may include grouping information into complex task types comprising sets of related activities. Next, an elapsed time is determined since the start of the first activity in a complex task. The delay since the most recent activity in the complex task is compared with a minimum task quiescent period. When the delay exceeds the minimum task quiescent period, the elapsed time and the delay are reset. Also, during the performance of a complex task, the type and the elapsed time of the complex task are correlated with other information to facilitate a threat assessment decision.
摘要:
A signal is generated at a source 100a and a first portion of the signal 102a is processed locally by a processor 104a. This first portion of the signal 102a that is locally processed, is comprised of data, which would be prone to noise masking or loss, in its transition from the source 100a to a non-local analog-to-digital converter in the absence of a processing step. The remaining portion of the signal 106a is converted at a non-local analog-to-digital converter 108a, to produce a first digital signal 110a. The processed signal 112a is converted non-locally at a non-local converter 114a to produce a second digital signal 116a, finally the first digital signal 100a is combined with the second digital signal 116a to produce a digital output signal 118a.
摘要:
The present invention relates to a valuation-based learning system. The system is configured to receive a plurality of inputs, each input being input evidence corresponding to a variable in a Dempster-Shafer Reasoning System. The Dempster-Shafer Reasoning System is a network of interconnected nodes, with each node representing a variable that is representative of a characteristic of a problem domain. A discount weight is then optimized for assigning to each of the inputs. A basic probability assignment (bpa) is generated using the Dempster-Shafer Reasoning System, and where the bpa is an output for use in determining a solution of the problem domain. Finally, a solution to the problem domain is determined using the bpa.
摘要:
Separating mixed signals includes receiving the mixed signals from signal sources transmitting from a number of cells. A signal source is operable to transmit a source signal, and a mixed signal comprises at least a subset of the source signals. A complex mixing matrix is established from the mixed signals. The complex mixing matrix describes mixing the source signals to yield the mixed signals. The number of cells is estimated from the mixed signals. The mixed signals are separated using the complex mixing matrix and the estimated number of cells.
摘要:
An apparatus and method for preventing information leakage attacks that utilize timeline alignment. The apparatus and method inserts a random number of instructions into an encryption algorithm such that the leaked information can not be aligned in time to allow an attacker to break the encryption.
摘要:
A method for classification of a target object having a periphery comprises the steps of: selecting a plurality of random first chords D1 across the periphery of the target object; measuring each of the first chords D1 to obtain a plurality of first dimensions; computing for each of the first chords D1 a second chord D2 across the periphery thus forming a plurality of D1, D2 pairs of chords; measuring the second chords D2 for all pairs to obtain second dimensions; computing for each of the pairs of first chords D1 and second chords D2 the ratio D1/D2 of the first dimension to the second dimension to obtain a plurality of first values; computing the logarithm of the first values to obtain a plurality of logarithmic values; computing difference values by subtracting the second dimension from the first dimension for each of the pairs; recording the first values, logarithmic values and difference values in histograms; extracting a vertex lists from the histograms; combining one or more of the vertex lists to obtain a signature indicative of the classification of the object target. For each of the pairs, the second chords are orthogonal to the first chords, and the second chords share a point with the first chords and the periphery.
摘要:
The present invention relates to an anti-tamper system. The system comprises a circuit pathway having a unique, programmable, evolved chip in the pathway. The chip has logic units with transistors having fixed parameters. The chip has route lengths and connections between the logic units that are formed in an evolutionary formation of the chip such that the evolutionary formation changes the route lengths and connections between the logic units to create feedback and delay changes. The changes in the route lengths and connections cause the transistors to operate in intermediate analog states. In chip formation, a search and optimization algorithm explores, in a clock-less environment, various route lengths and connections such that the chip can behave in a desired fashion to provide a desired output for a given input. Through use of the evolved chip, the anti-tamper system provides a security benefit of utilizing a unique chip in its pathway.
摘要:
An apparatus and method for preventing information leakage attacks that utilize timeline alignment. The apparatus and method inserts a random number of instructions into an encryption algorithm such that the leaked information can not be aligned in time to allow an attacker to break the encryption.
摘要:
An apparatus and method for preventing information leakage attacks through a polarized cryptographic bus architecture. The polarized cryptographic bus architecture randomly changes the polarity of the target bit such that the leaked information cannot be consistently averaged to yield statistical key material. Further, to increase the prevention of information leakage attacks, a set of dual rails is used to write data to a given register bit.
摘要:
The present invention relates to a hierarchical system for multi-objective shape control of variable stiffness structures. The system operates by initializing a hierarchical hybrid Gur-game controller that is affixed to a variable stiffness structure. The hierarchical hybrid Gur-game controller includes a hierarchy of Gur-games being utilized, at each level of the hierarchy, to control at least two angular rotations and at least one stiffness setting of the variable stiffness structure. The Gur-game controller is utilized to optimize variables, including angular rotations and stiffness settings of the variable stiffness structure to morph into a desired shape. Finally, the variable stiffness structure is morphed into the desired shape according to the optimized angular rotation and stiffness settings.