摘要:
A method of modifying a seismic image of a subsurface region includes identifying a location within the seismic image that includes a distortion, indicating a structural change associated with the distortion, that is selected to at least partially correct for the distortion, identifying a region causing the distortion in which corrections to a velocity model corresponding to the seismic image are to be applied, performing an inversion for the region in accordance with the indicated structural change, updating the velocity model on the basis of the inversion, and producing a modified seismic image on the basis of the updated velocity model.
摘要:
A method of modifying a seismic image of a subsurface region includes identifying a location within the seismic image that includes a distortion, indicating a structural change associated with the distortion, that is selected to at least partially correct for the distortion, identifying a region causing the distortion in which corrections to a velocity model corresponding to the seismic image are to be applied, performing an inversion for the region in accordance with the indicated structural change, updating the velocity model on the basis of the inversion, and producing a modified seismic image on the basis of the updated velocity model.
摘要:
One embodiment is directed to an approach to solving a leader-follower problem in which a leader has a set of leader actions and a follower has a set of follower actions. The approach includes receiving an expression of the leader-follower problem as a normal form Stackelberg game. The approach further includes, for each possible follower action, solving a linear program (LP) problem to determine a respective optimal mixed leader strategy, wherein the LP problem optimizes a leader payoff for a given mixed leader strategy and a given fixed follower action over a feasible region that includes only mixed leader strategies that provoke that respective follower action. The approach further includes generating an output derived from the optimal mixed leader strategies, and outputting the output by changing a physical state associated with an interface.
摘要:
A method of coupling surface urban heat island measures with socio-economic indicators of vulnerability to create improved spatially specific models to assist public health professionals in predicting extreme heat events mortality in urban environments. The method includes utilizing landsat TM imagery for the measuring of the urban heat island intensity levels and a spatial analysis of the variables in question.
摘要:
Methods and devices for detecting and predicting parameter deviations and isolating failure modes in systems that are subject to failure. In a preferred embodiment, methods are provided for use with engines, including aircraft, automobile, and industrial combustion engines. However, numerous other applications are contemplated. Such engines may be described as having monitor points having current parameter values, where the monitor points may correspond to single physical sensors or to virtual or inferred monitor points having parameter values derived from multiple sensors. Acceptable ranges, limits, and values for each of the monitor point parameters may be provided for use with the present invention. Parameters lying outside of the acceptable ranges may be said to be in deviation. Ambiguity groups, including one or more failure modes or physical causes of the parameter deviations may also be provided. Parameter deviations, after optional filtering, may generate deviation signals which may be followed by analysis of the ambiguity groups to isolate the failure mode or modes causing the deviation. Courses of engine operation ameliorating the failure mode may be suggested. Methods are also provided for projecting current trends into the future to predict deviations and isolate failure modes early, prior to actual occurrence. One preferred use for the methods is early detection and isolation of faults in aircraft engines, leading to corrective action including early preventative maintenance.
摘要:
Methods and systems for securely uploading files onto a vehicle such as an aircraft are provided. In one embodiment, a system for transmitting files to a remote vehicle comprises: a communication system onboard the remote vehicle; at least one processor onboard the remote vehicle coupled to the communication system; and at least one storage device comprising a database, the at least one storage device further comprising computer executable instructions which when executed by the at least one processor implement a data checking functionality process comprising: generating a security file at the remote vehicle from an uplinked file received by a communication system; verifying integrity of the uplinked file using the security file; when integrity of the uplinked file is confirmed, accepting the uplinked file; and when integrity of the uplinked file is not confirmed, rejecting the uplinked file.
摘要:
Methods and systems for securely uploading files onto a vehicle such as an aircraft are provided. In one embodiment, a system for transmitting files to a remote vehicle comprises: a communication system onboard the remote vehicle; at least one processor onboard the remote vehicle coupled to the communication system; and at least one storage device comprising a database, the at least one storage device further comprising computer executable instructions which when executed by the at least one processor implement a data checking functionality process comprising: generating a security file at the remote vehicle from an uplinked file received by a communication system; verifying integrity of the uplinked file using the security file; when integrity of the uplinked file is confirmed, accepting the uplinked file; and when integrity of the uplinked file is not confirmed, rejecting the uplinked file.
摘要:
Methods and apparatus are provided for securing the transfer of data over the internet from malicious interference. The apparatus comprises a computing device and a data storage device in operable communication with the computing device. The apparatus also includes a set of high assurance security instructions resident on the data storage device and executing within the computing device and at least one input/output interface. The method comprises receiving data via a first communication interface and storing the data in a memory device and initiating an unsecured data indication. The method also provides for receiving an authentication code via the first communication interface and decoding the authentication code and determining the authenticity of the data. If the authentication code fails to indicate authenticity then the data is deleted. If the authentication code indicates authenticity, then the data is transferred to a destination device via a second communication interface.
摘要:
A method of determining ranges for algorithmic variables for a processor that uses fixed point arithmetic is provided. The method comprises expressing overflow requirements of processor instructions as inequalities. The method also expresses precision requirements and expressiveness requirements as inequalities and merit functions. A global constraint and optimizer tool is used to find ranges for algorithmic variables based on the inequalities and the merit functions. The use of constraint equation solving and optimization finds optimal algorithmic ranges that provide overflow-free arithmetic as well as optimal expressiveness and precision.
摘要:
Methods and apparatus are provided for securing the transfer of data over the internet from malicious interference. The apparatus comprises a computing device and a data storage device in operable communication with the computing device. The apparatus also includes a set of high assurance security instructions resident on the data storage device and executing within the computing device and at least one input/output interface. The method comprises receiving data via a first communication interface and storing the data in a memory device and initiating an unsecured data indication. The method also provides for receiving an authentication code via the first communication interface and decoding the authentication code and determining the authenticity of the data. If the authentication code fails to indicate authenticity then the data is deleted. If the authentication code indicates authenticity, then the data is transferred to a destination device via a second communication interface.