摘要:
Systems and methods may include receiving first and second motion data about first and second objects, respectively. The systems and methods may include applying an asymmetric correlation rule (ACR) to the first and second motion data. The ACR may define a baseline state of motion for the first object and a correlation relationship between the first and second objects. The systems and methods may include determining whether the first object is in the baseline state and, in response to determining that the first object is not in the baseline state, determining whether a first motion vector of the first object is sufficiently correlated with a second motion vector of the second object. The systems and methods may include, in response to determining both that the first object is not in the baseline state and that the first and second motion vectors are not sufficiently correlated, generating an anomalous behavior notification.
摘要:
A method includes determining a convergence point for a first object and a second object from position data, capability data, and environment data that are all associated with the first and second object, wherein the convergence point is determined in accordance with a policy. The method also includes determining a first amount of time for the first object to reach the convergence point based on the position data, the capability data, and the environment data. The method still further includes determining a second amount of time for the second object to reach the convergence point based on the position data, the capability data, and the environment data. The method additionally includes determining an estimated amount of time to convergence between the first object and the second object, and transmitting the estimated amount of time to convergence to one or more of the first and second object.
摘要:
A method includes applying a correlation rule defining a correlation relationship between a first and second object and determining, using a processor, whether a first motion vector of the first object is correlated at a threshold level of correlation with a second motion vector of the second object, the correlation relationship between the first and second objects identifying the threshold level of correlation between the first and second motion vectors. The method also includes, in response to determining that the first motion vector is not correlated at the threshold level with the second motion vector, determining a convergence point for the first and second objects in accordance with a policy. The method further includes transmitting instructions for arriving at the convergence point to the first and second objects.
摘要:
A method includes applying a correlation rule defining a correlation relationship between a first and second object and determining, using a processor, whether a first motion vector of the first object is correlated at a threshold level of correlation with a second motion vector of the second object, the correlation relationship between the first and second objects identifying the threshold level of correlation between the first and second motion vectors. The method also includes, in response to determining that the first motion vector is not correlated at the threshold level with the second motion vector, determining a convergence point for the first and second objects in accordance with a policy. The method further includes transmitting instructions for arriving at the convergence point to the first and second objects.
摘要:
Systems and methods may include receiving first motion data corresponding to a first object and receiving second motion data corresponding to a second object. The systems and methods may include determining whether the second object is following the first object based on the first motion data and the second motion data. The systems and methods may include receiving additional information corresponding to the second object. The systems and methods may include determining whether the second object poses a risk to the first object based on the additional information. The systems and methods may include performing processes in response to determining that the second object is following the first object and poses a risk to the first object. Such processes may include providing a notification to a subscribing party. The notification may indicate that the second object is following the first object and poses a risk to the first object.
摘要:
Systems and methods may include receiving data of a physical system. The systems and methods may include determining whether an anomalous event has occurred based on the data. The systems and methods may include, in response to determining that the anomalous event has occurred, capturing data of the physical system and of an environment. The systems and methods may include generating a virtual representation of the physical system and the environment based on the captured data. The systems and methods may include repeatedly simulating data of the virtual representation by varying parameters of the captured data. The systems and methods may include determining which parameters are a root cause of the anomalous event based on the simulated performance data. The systems and methods may include determining particular values of the parameters that are likely the root cause of the anomalous event to use as a trigger for a proactive process.
摘要:
Systems and methods may include receiving, by an expert system, performance data for a monitored system. The systems and methods may include generating a prediction for the monitored system in response to determining that the performance data satisfies a condition. The prediction may identify an anomaly that is predicted to occur. The systems and methods may include receiving, by a filter system, the prediction, information identifying the condition, and user information. The user information may include user preference information and user feedback information. The systems and methods may include determining a filter criteria based on the user information. The filter criteria may be based on the preferences for predictions to be provided to the user and on the historical user feedback regarding the historical predictions. The systems and methods may include providing the prediction to the user in response to determining that the particular prediction satisfies the filter criteria.
摘要:
Systems and methods may include receiving real-time data from real components operating in a real-world environment. The systems and methods may further include generating a virtual representation of the real components based on the real-time data received from the real components and historical data associated with the real components. In addition, the systems and methods may include determining whether the real-time data from a component of the real components indicates an anomaly. The systems and methods also may include, in response to determining that the real-time data from the component indicates the anomaly, determining whether the anomaly indicated by the real-time data from the component is consistent with the virtual representation of the real components. Moreover, the systems and methods may include, in response to determining that the anomaly indicated by the real-time data from the component is not consistent with the virtual representation of the real components, determining that the component is a malfunctioning component.
摘要:
Systems and methods may include receiving first data of components, which may represent performance characteristics of the components at a first time. The systems and methods may include performing a first cluster analysis of the first data to identify clusters of the components with similar characteristics. The systems and methods may include receiving second data of the components, which may represent performance characteristics of the components at a second time. The systems and methods may include performing a second cluster analysis of the second data to identify clusters of the components with similar characteristics. The systems and methods may include determining whether a component transitioned from a cluster identified in the first cluster analysis to a different cluster identified in the second cluster analysis. The systems and methods may include determining that an anomaly occurred in response to determining that the component transitioned from the cluster to the different cluster.
摘要:
Systems and methods may include receiving real-time data about a real component operating in a real-world environment. The systems and methods may further include generating a virtual representation of the real component based on the real-time data about the real component and historical data associated with the real component. In addition, the systems and methods may include receiving injected data from a lab. The injected data may provide data about a lab component operating in the lab. The systems and methods may also include simulating, in a virtual environment, a real-time interaction in the real-world environment between the real component and the lab component using the virtual representation of the real component and the injected data. Moreover, the systems and methods may include determining a real-time performance characteristic of at least one of the lab component and the real component based on the simulated real-time interaction in the real-world environment.