摘要:
Systems and methods may include receiving first and second motion data about first and second objects, respectively. The systems and methods may include applying an asymmetric correlation rule (ACR) to the first and second motion data. The ACR may define a baseline state of motion for the first object and a correlation relationship between the first and second objects. The systems and methods may include determining whether the first object is in the baseline state and, in response to determining that the first object is not in the baseline state, determining whether a first motion vector of the first object is sufficiently correlated with a second motion vector of the second object. The systems and methods may include, in response to determining both that the first object is not in the baseline state and that the first and second motion vectors are not sufficiently correlated, generating an anomalous behavior notification.
摘要:
Systems and methods may include receiving data of a physical system. The systems and methods may include determining whether an anomalous event has occurred based on the data. The systems and methods may include, in response to determining that the anomalous event has occurred, capturing data of the physical system and of an environment. The systems and methods may include generating a virtual representation of the physical system and the environment based on the captured data. The systems and methods may include repeatedly simulating data of the virtual representation by varying parameters of the captured data. The systems and methods may include determining which parameters are a root cause of the anomalous event based on the simulated performance data. The systems and methods may include determining particular values of the parameters that are likely the root cause of the anomalous event to use as a trigger for a proactive process.
摘要:
Systems and methods may include receiving first data of components, which may represent performance characteristics of the components at a first time. The systems and methods may include performing a first cluster analysis of the first data to identify clusters of the components with similar characteristics. The systems and methods may include receiving second data of the components, which may represent performance characteristics of the components at a second time. The systems and methods may include performing a second cluster analysis of the second data to identify clusters of the components with similar characteristics. The systems and methods may include determining whether a component transitioned from a cluster identified in the first cluster analysis to a different cluster identified in the second cluster analysis. The systems and methods may include determining that an anomaly occurred in response to determining that the component transitioned from the cluster to the different cluster.
摘要:
Systems and methods may include receiving real-time data about a real component operating in a real-world environment. The systems and methods may further include generating a virtual representation of the real component based on the real-time data about the real component and historical data associated with the real component. In addition, the systems and methods may include receiving injected data from a lab. The injected data may provide data about a lab component operating in the lab. The systems and methods may also include simulating, in a virtual environment, a real-time interaction in the real-world environment between the real component and the lab component using the virtual representation of the real component and the injected data. Moreover, the systems and methods may include determining a real-time performance characteristic of at least one of the lab component and the real component based on the simulated real-time interaction in the real-world environment.
摘要:
Systems and methods may include receiving performance data of components in a system. The performance data may include data for parameters for each of the components. The systems and methods may include determining aggregate data for each group of similar components of the components. The aggregate data for each group of similar components may include a group characteristic for each of the parameters. The systems and methods may include, for each group of similar components, determining whether the data for each of the parameters for each component is consistent with the group characteristic for the respective parameter. The systems and methods may include, for each component of the respective group determining that the component is anomalous in response to determining that the data for a parameter for the component is not consistent with the group characteristic for the parameter.
摘要:
Systems and methods may include receiving real-time data from real components operating in a real-world environment. The systems and methods may further include generating a virtual representation of the real components based on the real-time data received from the real components and historical data associated with the real components. In addition, the systems and methods may include determining whether the real-time data from a component of the real components indicates an anomaly. The systems and methods also may include, in response to determining that the real-time data from the component indicates the anomaly, determining whether the anomaly indicated by the real-time data from the component is consistent with the virtual representation of the real components. Moreover, the systems and methods may include, in response to determining that the anomaly indicated by the real-time data from the component is not consistent with the virtual representation of the real components, determining that the component is a malfunctioning component.
摘要:
A method, performed in a character entry system, for interrelating character strings so that an incomplete input character string can be completed by selection of a presented character string involves computing relationship scores for individual character strings in the system from documents present in the character entry system, in response to inputting of a string of individual characters that exceeds a specified threshold, identifying at least one selectable character string from among contextual associations that can complete the input character string in context based upon an overall ranking score computed as a function of at least two other scores, and providing the identified at least one selectable character string to a user for selection.
摘要:
A method for capturing an image of a machine having one or more disks is presented. The method comprises creating a snapshot of the machine, the snapshot including full machine encapsulation, querying the one or more disks on the machine to obtain information stored thereon, creating metadata able to access one or more files, one or more folders, and the application on the machine, and capturing the snapshot, the obtained information and the metadata in the image. The method may also comprise migrating the captured image and/or extracting one or more files and/or folders from the captured image on another machine. The migration can be between physical and physical, physical and virtual, physical and cloud, etc. The method may comprise capturing another image comprising the snapshot, the metadata and changed information different from the obtained information.
摘要:
A method performed in a system having multiple navigable nodes interconnected in a hierarchical arrangement involves receiving an input containing at least one word identifiable with at least one keyword, identifying at least one node, other than the first node, not directly connected to the first node, but associated with the at least one keyword, and jumping to the identified node. A transaction processing system having a hierarchical arrangement of nodes and is configured for user navigation among the nodes. The system has an inverted index correlating keywords with at least some nodes in the arrangement so that when the user provides an input in response to a verbal description and the response includes a meaningful word correlatable with a keyword, the system will identify at least one node correlated to the meaningful word by the inverted index and jump to that node without first traversing any other node.
摘要:
A computer implemented method includes monitoring blocks of data on a storage device that are changing as the computer operates. On detecting a computer shut down event, a copy of changes to the monitored blocks are saved. Upon startup of the computer, a backup of the changed blocks of data is performed.