Abstract:
A mower is provided and includes: a case; a charging circuit provided in the case, and a combination of a wheel assembly and a charging interface assembly arranged on the case. The combination is electrically connected to the charging circuit. The combination includes: a wheel assembly; and a charging interface assembly electrically connected to the charging circuit. The wheel assembly and the charging interface assembly are integrated molding structure.
Abstract:
An apparatus for heating vessels, the vessels having enclosed spaces therein and controlling air ingress into the enclosed spaces through gaps. The method includes providing a lid structure for the vessel having the enclosed space, the lid structure having a burner assembly mounted therein. The burner is configured to provide a predetermined flame diameter. The vessel and lid structure are mated such that the gap is formed between the vessel and the lid structure. Fuel and oxidant are discharged from the burner assembly under conditions to provide the predetermined flame diameter and impart a flame velocity sufficiently large to create an outward gas flow from the enclosed space through the gap and control air ingress.
Abstract:
A heating method for heating vessels, the vessels having enclosed spaces therein and controlling air ingress into the enclosed spaces through gaps. The method includes providing a lid structure for the vessel having the enclosed space, the lid structure having a burner assembly mounted therein. The burner is configured to provide a predetermined flame diameter. The vessel and lid structure are mated such that the gap is formed between the vessel and the lid structure. Fuel and oxidant are discharged from the burner assembly under conditions to provide the predetermined flame diameter and impart a flame velocity sufficiently large to create an outward gas flow from the enclosed space through the gap and control air ingress.
Abstract:
In one embodiment, a method for detecting malicious software agents, such as domain-flux botnets. The method applies a co-clustering algorithm on a domain-name query failure graph, to generate a hierarchical grouping of hosts based on similarities between domain names queried by those hosts, and divides that hierarchical structure into candidate clusters based on percentages of failed queries having at least first- and second-level domain names in common, thereby identifying hosts having correlated queries as possibly being infected with malicious software agents. A linking algorithm is used to correlate the co-clustering results generated at different time periods to differentiate actual domain-flux bots from other domain-name failure anomalies by identifying candidate clusters that persist for relatively long periods of time. Persistent candidate clusters are analyzed to identify which clusters have malicious software agents, based on a freshness metric that characterizes whether the candidate clusters continually generate failed queries having new domain names.
Abstract:
A method and apparatus for incremental quantile estimation is provided. A method for performing incremental quantile estimation using an estimated cumulative distribution function includes receiving a record, identifying an entity with which the received record is associated, determining a record type of the received record based at least in part on the entity with which the received record is associated, updating the estimated cumulative distribution function based on the record type of the received record, and storing the estimated cumulative distribution function. The record type of the received record is indicative of whether the received record is an insertion record, an update record, or a deletion record. The estimated cumulative distribution function may be used to respond to quantile query requests in real-time or near-real-time.
Abstract:
Methods and apparatuses are provided for detecting traffic patterns in a data network. A sequential hashing scheme can be utilized that has D hash arrays. Each hash array i, wherein 1≦i≦D, includes Mi independent hash tables each having K buckets, with each of the buckets having an associated traffic total. Each of the keys corresponds with a single bucket of each of the Mi independent hash tables of each hash array i. The keys of the data network are partitioned into D words. As traffic is received for a key, a traffic total of each bucket that corresponds with a key is updated. The hash arrays can then be utilized to identify high traffic buckets of the independent hash tables having a traffic total greater than a threshold value. The high traffic buckets can be used to detect significant traffic patterns of the data network.
Abstract:
In one embodiment, a method of monitoring a network. The method includes, at each node of a fixed set, constructing a corresponding vector of M components based on data packets received at the node during a time period, M being an integer greater than 1, the fixed set being formed of some nodes of the network; and, based on the constructed vectors, estimating how many of the received data packets have been received by all of the nodes of the set or estimating how many flows of the received data packets have data packets that have passed through all of the nodes of the set. The constructing includes updating a component of the vector of one of the nodes in response to the one of the nodes receiving a data packet. The updating includes selecting the component for updating by hashing a property of the data packet received by the one of the nodes.
Abstract:
A method of heating a charge material by controlling heat flux in a tilt rotary furnace is disclosed. Combustion by the burner forms a heat release profile including a high heat flux region. The positioning of the high heat flux region is controllable by providing a controlled amount of secondary or staged oxidant. The burner is configured and controlled to position a region of high heat flux at a position corresponding to an area requiring greater heating, such as the area of maximum charge depth in the furnace to provide substantially uniform melting and heat distribution.
Abstract:
In one embodiment, a method for detecting malicious software agents, such as domain-flux botnets. The method applies a co-clustering algorithm on a domain-name query failure graph, to generate a hierarchical grouping of hosts based on similarities between domain names queried by those hosts, and divides that hierarchical structure into candidate clusters based on percentages of failed queries having at least first- and second-level domain names in common, thereby identifying hosts having correlated queries as possibly being infected with malicious software agents. A linking algorithm is used to correlate the co-clustering results generated at different time periods to differentiate actual domain-flux bots from other domain-name failure anomalies by identifying candidate clusters that persist for relatively long periods of time. Persistent candidate clusters are analyzed to identify which clusters have malicious software agents, based on a freshness metric that characterizes whether the candidate clusters continually generate failed queries having new domain names.