摘要:
Artificial Immune Systems (AIS) including the Dendritic Cell Algorithm (DCA) are an emerging method to detect malware in computer systems. The DCA implementation may use an inflammation signal to communicate information among the processes of device or a network or among nodes of a network, where the inflammatory signal indicates a likelihood that a process or a node has been attacked by malicious software. The DCA implementation may dynamically change the malware sensitivity and responsiveness based on the inflammation signals without requiring user intervention. The inflammatory signal includes one or more inflammatory tuples, which may include multiple components such as a strength, a PrimeIndicator, and an optional third element, p. The strength component may be an indication of the magnitude of an attack and provide a degree of certainty of the attack. The PrimeIndicator may be an identifier of the indicator type that is the source of the inflammation tuple.
摘要:
A computing system includes an input sensor, a processor, and a memory storing executable instructions that, in response to execution by the processor, cause the processor to collect input data related to at least a portion of an object from the input sensor, generate a UV coordinate map based on the input data, use a predetermined process ink density lookup table to produce an ink density bitmap corresponding to the UV coordinate map, the ink density bitmap including process ink densities for each bit in the ink density bitmap, produce and output a dithering of bits of the ink density bitmap to thereby generate dithered image pixel data, and compile and output a control plan, based on the dithered image pixel data, to control a printing array to print an image on a contoured surface of the object.
摘要:
Provided are methods and systems for inspecting surfaces of various components, such as evaluating height deviations on these surfaces. A method involves aggregating inspection data from multiple line scanners into a combined data set. This combined data set represents a portion of the surface that is larger than the field of measurement any one of the scanners. Furthermore, each pair of adjacent scanners operate at different periods of time to avoid interference. Because operating periods are offset, surface portions scanned by the pair of adjacent scanners can overlap without interference. This overlap of the scanned portions ensures that the entire surface is analyzed. The position of scanners relative to the inspection surface may be changed in between the scans and, in some embodiments, even during the scan. This approach allows precise scanning of large surfaces.
摘要:
Artificial Immune Systems (AIS) including the Dendritic Cell Algorithm (DCA) are an emerging method to detect malware in computer systems. A DCA module may receive an output or signal from multiple indicators concerning the state of at least a portion of the system. The DCA module is configured to combine the plurality of signals into a single signal vector. The DCA module may be configured to sort the received signals based on signal type and magnitude of each signal. The DCA module may then use a decay factor to weight the received signals so that a large number of “nominal” signals do not drown out a small number of “strong” signals indicating a malware attack. The decay factor may be exponentially increased each time it is applied so that all received signals are considered by the DCA module, but so that the “nominal” signals may have a minimal effect.
摘要:
Artificial Immune Systems (AIS) including the Dendritic Cell Algorithm (DCA) are an emerging method to detect malware in computer systems. An implementation of the DCA may detect anomalous behavior in various processes of a device or devices. Unlike previous approaches, the DCA implementation may use an inflammation signal to communicate information among the processes of device or a network, where the inflammatory signal indicates a likelihood that a process has been attacked by malicious software.
摘要:
Provided are methods, systems, and computer program products for inspecting composite items. Specifically, a method involves analyzing an image of or, more generally, data characterizing condition of a top layer, which is disposed over a bottom layer. The method also involves performing a structural integrity check based on any anomalies detected in the top layer during this analysis as well as based on any anomalies previously detected in the bottom layer. As such, this structural integrity check accounts for characteristics of multiple layers, in some embodiments, all layers applied up to point of this inspection. In addition to the detected anomalies, the structural integrity check may account for previously performed repairs. The structural integrity check may be performed on individual portions of a composite item while, for example, other portions continue receiving a new composite layer, which may be referred to as an inline inspection.
摘要:
Disclosed herein is a livery printing system and a method of generating a control path. The system includes a training system having a processor and a memory with code configured to cause the processor to receive a 3D digital model associated with an object; generate simulated control paths, based on the 3D digital model, for actuators of a printing device with printheads, determine a reward value for each one of the simulated control paths based on a simulated physical value, a simulated surface coverage value, or a simulated printing speed value. A value of one simulated control path variable of any of the simulated control paths is different than the value of the simulated control path variable of another simulated control path. One of the simulated control paths is selected based on a comparison between the reward values determined for the simulated control paths.
摘要:
An elevated platform system comprises a platform, a vision system configured to detect a number of people on the platform, and a plurality of restraining systems onboard the platform. Each restraining system includes a passive RFID tag secured to the platform and a reader configured to perform near field detection of the tag.
摘要:
Provided are methods, systems, and computer program products for inspecting composite items. Specifically, a method involves analyzing an image of or, more generally, data characterizing condition of a top layer, which is disposed over a bottom layer. The method also involves performing a structural integrity check based on any anomalies detected in the top layer during this analysis as well as based on any anomalies previously detected in the bottom layer. As such, this structural integrity check accounts for characteristics of multiple layers, in some embodiments, all layers applied up to point of this inspection. In addition to the detected anomalies, the structural integrity check may account for previously performed repairs. The structural integrity check may be performed on individual portions of a composite item while, for example, other portions continue receiving a new composite layer, which may be referred to as an inline inspection.
摘要:
Systems and methods are provided for verifying the placement of tows by a robot. One embodiment includes a robot that includes an end effector that lays up tows, actuators that reposition the end effector, a memory storing a Numerical Control (NC) program, and a robot controller that directs the actuators to reposition the end effector based on the NC program, and instructs the end effector to lay up tows based on the NC program. The system also includes a sensor system comprising an imaging device that acquires images of the tows as the tows are laid-up, a measuring device that generates input as tows are laid-up by the end effector, and a sensor controller that receives images from the imaging device and the input from the measuring device, and updates stored data to correlate the images with instructions in the NC program, based on the input.