Patent classifications
G05B99/00
Systems and methods for hybrid dynamic state estimation
A power system energy management system with dynamic state estimation (DSE) is disclosed wherein system dynamic states are estimated using SCADA measurements, PMU measurements, signals of controllers, digital recorders, protection devices, and smart electronic devices. The DSE is solved first by Unscented Kalman Filter, and if the Unscented Kalman Filter is failed, weighted lease square is used to solve the DSE. If weighted lease square is failed, integration method is used to calculate the dynamic states. In another aspect, Unscented Kalman Filter, weighted lease square, and integration calculation are applied to solve the DSE by nodal parallel computing for each generation system.
Multi-objective calibrations of lithography models
A system may include a model calibration engine configured to determine a candidate lithography model set from which to calibrate a lithography model according to multiple objectives, including by initializing a population of parent candidate models, generating child candidate models, merging the parent and child candidate models into a merged population, classifying the candidate models of the merged population into tiers of non-dominated fronts according to respective objective functions for the multiple objectives, determining a subset of the merged population based on the classified tiers, and identifying, as the candidate lithography model set, a Pareto-optimal front of the subset of the merged population determined based on the classified tiers. The system may also include a model selection engine configured to set a given candidate lithography model in the candidate lithography model set as a calibrated lithography model for simulating a lithographic process.
Electrical energy management of exchanges between a plurality of residential networks
A method for exchanging electrical energy between a plurality of private electricity networks each comprising: a coordination unit, groups of electrical devices, and a plurality of relays arranged on the power supply lines of the devices. The method comprises: a) transmitting device status data from the devices to the coordination unit, b) establishing a set of electrical energy resources and requirements, c) comparing the set of resources and requirements with those of other private networks, d) allocating the requirements and resources to one another, e) ensuring at least part of the routing of electrical energy by means of digital certificates and instructions for drawing electrical energy that are sent to the relays, f) keeping record of each energy exchange in order to define a transaction between two private networks.
Numerical controller and data editing method
A numerical controller which uses a simulation screen displayed on a touch panel so as to edit operation data of an industrial machine includes: a touch operation reception unit that receives a touch operation by an operator on the simulation screen; an operation identifying unit that identifies an operation target and an operation type on the simulation screen by the touch operation received; a setting screen data extraction unit that references the editing data storage unit for associating the operation target and the operation type and setting screen data including an editing item so as to store them so as to extract the setting screen data corresponding to the operation target and the operation type identified; an editing processing unit that edits the setting screen data extracted; and a setting screen output unit that outputs, to the touch panel 40, the setting screen data after being edited.
Method of detecting cyber attacks on a cyber physical system which includes at least one computing device coupled to at least one sensor and/or actuator for controlling a physical process
A method of detecting cyber attacks on a cyber physical system is disclosed, and the system includes at least one computing device coupled to at least one sensor and/or actuator for controlling a physical process. The method comprises: deriving at least one invariant for the computing device, based on a system design of the system or computer code configured to control the system in relation to the physical process or data collected from the system during testing or operation of the system, the invariant defining a set of conditions that enable determination from the sensor and/or actuator regarding process anomalies of the physical process being controlled; configuring the invariant as corresponding computer code; and executing the invariant as the computer code on the computing device to monitor the physical process via the sensor and/or actuator and detect the process anomalies for detecting the cyber attacks.
Automated manufacturing process tooling setup assist system
An automated manufacturing process tooling setup assist system includes a controller configured to control movement and positioning of tools to provide a first tool spatial arrangement within a workspace. Responsive to an unsuccessful test process run using the tools in the first tool spatial arrangement, the controller may control movement of the tools so as to replace a tool in the first tool spatial arrangement with another tool configured to perform a function of the tool to be replaced. Responsive to a successful test process run using the tools in the first tool spatial arrangement, the controller may control movement of the tools so as to reposition one or more tools in the workspace to provide a second tool spatial arrangement within the workspace different from the first tool spatial arrangement.
CRYOGENIC SPECIMEN MANAGEMENT SYSTEM AND METHODS OF SECURING SENSITIZE DATA AND SERVICING COMPONENTS
A method of servicing a cryo-EM storage system includes identifying an element of the storage system, the element including at least one of a dewar, a rack, a puck, a gridbox, and a grid, marking the element for additional action via a user device, and sending a request to another party via a network to perform the additional action.
Modular robotic system and associated method of automatically determining configuration and control therefor
Modular building blocks for building a robotic system, and the method of building the robotic system using the building blocks, are presented. The building block includes a chassis having a first end and a second end, a first connector positioned closer to the second end than the first end of the chassis, either a second connector or a rotational actuator positioned closer to the first end than the second end of the chassis and configured to couple with the first connector, a signal interface on a surface of the chassis, the signal interface including hardware and circuitry for transferring and receiving signals from and to the building block, and a power and control interface on the chassis for receiving power for the building block.
Modular robotic system and associated method of automatically determining configuration and control therefor
Modular building blocks for building a robotic system, and the method of building the robotic system using the building blocks, are presented. The building block includes a chassis having a first end and a second end, a first connector positioned closer to the second end than the first end of the chassis, either a second connector or a rotational actuator positioned closer to the first end than the second end of the chassis and configured to couple with the first connector, a signal interface on a surface of the chassis, the signal interface including hardware and circuitry for transferring and receiving signals from and to the building block, and a power and control interface on the chassis for receiving power for the building block.
METHOD OF DETECTING CYBER ATTACKS ON A CYBER PHYSICAL SYSTEM WHICH INCLUDES AT LEAST ONE COMPUTING DEVICE COUPLED TO AT LEAST ONE SENSOR AND/OR ACTUATOR FOR CONTROLLING A PHYSICAL PROCESS
A method of detecting cyber attacks on a cyber physical system is disclosed, and the system includes at least one computing device coupled to at least one sensor and/or actuator for controlling a physical process. The method comprises: deriving at least one invariant for the computing device, based on a system design of the system or computer code configured to control the system in relation to the physical process or data collected from the system during testing or operation of the system, the invariant defining a set of conditions that enable determination from the sensor and/or actuator regarding process anomalies of the physical process being controlled; configuring the invariant as corresponding computer code; and executing the invariant as the computer code on the computing device to monitor the physical process via the sensor and/or actuator and detect the process anomalies for detecting the cyber attacks.