摘要:
Two motor fans are driven by two 4-pole direct current motors, respectively. Rotational speed of the two motors is controlled in three stages, namely low speed, intermediate speed and high speed. Specifically, at the time of low speed operation the two motors are connected in series with four poles, at the time of intermediate speed operation the two motors are connected in parallel with three poles, and at the time of high speed operation the two motors are connected in parallel with four poles.
摘要:
An electrical load drive control apparatus includes: a plurality of drive units, each of which drives one of a plurality of electrical loads; an instruction unit that issues a drive switch instruction to switch drive among the plurality of electrical loads; a detection unit that detects a non-operating state of the plurality of electrical loads; and a control unit that controls the plurality of drive units based upon the drive switch instruction issued by the instruction unit and results of a detection by the detection unit. And the control unit controls the plurality of drive units so as to set all of the plurality of electrical loads in a non-operating state if an instruction to switch drive among the plurality of electrical loads is issued by the instruction unit, and controls the plurality of drive units so as to switch drive to an electrical load selected through the drive switch instruction after verifying that the plurality of electrical loads are all set in a non-operating state based upon the results of the detection by the detection unit.
摘要:
A method, an apparatus and a program for detecting spoofed Internet Protocol (IP) traffic directed to a network having a plurality of autonomous systems (AS) is provided. The method comprises receiving an incoming packet through an AS, the incoming packet containing a source IP address and a destination IP address, acquiring a corresponding source and destination IP address prefixes, converting the corresponding source and destination IP address prefixes into a source AS number and a destination AS number, determining if the incoming packet arrived from an unexpected source based upon the corresponding destination IP address prefix and the converted source and destination AS number using an unexpected pair tuple table generated from network routing information and generating an alert indicating that the incoming packet is not allowed to enter the network.
摘要:
An inventive system and method for creating source profiles to detect spoofed traffic comprises obtaining a routing path for data to traverse nodes using traffic profiles, each routing path comprising at least a target AS, initializing one or more AS sets with last hop ASes, enhancing the AS sets by connecting the AS sets to routers, for each enhanced AS set, filtering observed traffic flows, and using the filtered flows to associate enhanced AS sets with network monitoring points to create the source profiles. In one aspect, filtering flows comprise TCP session filtering and/or destination bogon filtering. In one aspect, the routers are border gateway protocol routers. In one aspect, the last hop ASes are one hop away from the target AS.
摘要:
A dark current cutoff device (1) includes: a battery (10) configure to perform electrical power supply to a load (20); a cutoff switch (32), which is provided between the battery (10) and the load (20), cuts off the electrical power supply to the load (20) at a time of being opened, and supplies electrical power to the load (20) at a time of being closed; a failure recording unit (21) that determines and records a case where the load (20) does not operate as a failure of the load (20); and an open/close determining unit (41) that determines that the cutoff switch (32) is opened; and a recording prohibiting unit (22) configure to prohibit, in a case where the cutoff switch (32) is determined to be opened by the open/close determining unit (41), the failure recording unit (21) from determining and recording the failure.
摘要:
A system and method for spammer host detection from network flow data profiles comprises constructing one or more cluster profiles and detecting spammer hosts. Construction cluster profiles comprises observing network flow data from one or more hosts; for each host, representing the network flow data associated with the host as a multidimensional vector; clustering the vectors of the hosts into the plurality of cluster profiles; annotating each cluster profile using at least one of black lists and white lists; and calculating a confidence in each cluster profile annotation. Detecting spammer hosts comprises observing the network flow data from a new host; representing the network flow data associated with the new host as a multidimensional vector, and placing the new multidimensional vector of the new host into one cluster profile of the one or more cluster profiles.
摘要:
A dark current cutoff device (1) includes: a battery (10) configure to perform electrical power supply to a load (20); a cutoff switch (32), which is provided between the battery (10) and the load (20), cuts off the electrical power supply to the load (20) at a time of being opened, and supplies electrical power to the load (20) at a time of being closed; a failure recording unit (21) that determines and records a case where the load (20) does not operate as a failure of the load (20); and an open/close determining unit (41) that determines that the cutoff switch (32) is opened; and a recording prohibiting unit (22) configure to prohibit, in a case where the cutoff switch (32) is determined to be opened by the open/close determining unit (41), the failure recording unit (21) from determining and recording the failure.
摘要:
A method, an apparatus and a program for detecting spoofed Internet Protocol (IP) traffic directed to a network having a plurality of autonomous systems (AS) is provided. The method comprises receiving an incoming packet through an AS, the incoming packet containing a source IP address and a destination IP address, acquiring a corresponding source and destination IP address prefixes, converting the corresponding source and destination IP address prefixes into a source AS number and a destination AS number, determining if the incoming packet arrived from an unexpected source based upon the corresponding destination IP address prefix and the converted source and destination AS number using an unexpected pair tuple table generated from network routing information and generating an alert indicating that the incoming packet is not allowed to enter the network.
摘要:
An inventive system and method for creating source profiles to detect spoofed traffic comprises obtaining a routing path for data to traverse nodes using traffic profiles, each routing path comprising at least a target AS, initializing one or more AS sets with last hop ASes, enhancing the AS sets by connecting the AS sets to routers, for each enhanced AS set, filtering observed traffic flows, and using the filtered flows to associate enhanced AS sets with network monitoring points to create the source profiles. In one aspect, filtering flows comprise TCP session filtering and/or destination bogon filtering. In one aspect, the routers are border gateway protocol routers. In one aspect, the last hop ASes are one hop away from the target AS.
摘要:
A system and method for spammer host detection from network flow data profiles comprises constructing one or more cluster profiles and detecting spammer hosts. Construction cluster profiles comprises observing network flow data from one or more hosts; for each host, representing the network flow data associated with the host as a multidimensional vector; clustering the vectors of the hosts into the plurality of cluster profiles; annotating each cluster profile using at least one of black lists and white lists; and calculating a confidence in each cluster profile annotation. Detecting spammer hosts comprises observing the network flow data from a new host; representing the network flow data associated with the new host as a multidimensional vector, and placing the new multidimensional vector of the new host into one cluster profile of the one or more cluster profiles.