G06F11/0736

Method for deterministically reporting cause and effect in software systems
11599407 · 2023-03-07 · ·

Negative outcomes experienced by a user in a live software system can be automatically, deterministically, and contemporaneously traced back to the root conditions that caused those outcomes, by generating causal event entries in a database for those root conditions as they occur, assigning unique causal IDs to those causal events, and propagating causal IDs alongside the software system state changes that are known to produce negative outcomes and which are effected by those root conditions. By selectively passing causal IDs based on the input and output values of the operation, subsequent causal events and negative outcomes can be linked accurately to causal IDs of parent events, making it simpler to trace negative outcomes for the user back to their root cause events in a software system.

Information processing device and information processing method

An information processing device that detects an anomaly in an in-vehicle network provided in a vehicle includes: a local rule storage in which at least an individual rule which is a rule generated for the vehicle is stored; a global rule storage in which an integrated rule which is a rule generated for a plurality of vehicles including the vehicle is stored; and a processing unit that performs, using a rule stored in at least one of the local rule storage or the global rule storage, an anomaly detection process on a frame transmitted on the in-vehicle network.

Apparatus and method for detecting and correcting problems, failures, and anomalies in managed computer systems such as kiosks and informational displays

In a kiosk or informational display, an apparatus for detecting and remediating problems, failures, and anomalies includes a data collection agent configured to collect original data over time associated with components, operation, and configuration of the managed computer system, a monitoring and learning module configured to process the original data and generate a historic record that includes time-based data, such as one or more time-based lists, an alert detection system that includes a sensor having associated therewith one of the time-based lists. The sensor is activated when sensor condition(s) are met, which includes evaluating the sensor condition(s) using at least the time-based list and a current-time value of the components, operation, and configuration of the managed computer system. The apparatus includes a remediation action module configured to effect at least one of a plurality of predetermined actions when the sensor is activated.

METHOD FOR DETECTION OF ANOMOLOUS OPERATION OF A SYSTEM

A computer-implemented method of detecting an anomalous action associated with a physical system includes developing, by a computing device a plurality of vectors, each vector indicative of an event that occurred at a specific time within the system, combining, with the computing device each vector that occurred within a predefined time duration into one of a plurality of master vectors, and performing, with the computing device a cluster analysis to group each master vector of the plurality of master vectors into one of a plurality of states. The method also includes determining, with the computing device a real-time master vector based at least in part on one or more events that occur within the predefined time duration, classifying, with the computing device the real-time master vector as a real-time state, and indicating that the real-time state is anomalous when the real-time state doesn't match one of the plurality of states.

AN APPROACH FOR ANALYSIS OF LOGS FROM A COMPLEX PHYSICAL EQUIPMENT

A computer-implemented method for analyzing log files generated by complex physical equipment includes receiving one or more log file generated by one or more components of physical equipment. Each of the log files comprises one or more log entries. A plurality of templates are extracted from each log file describing fixed portions of the log entries. The log entries are grouped in log files into a plurality of instances. Each instance corresponds to one of a plurality of partitions along one or more dimensions describing data in the log entries. A representation of each instance is created that describes a set of the templates included in the instance. A plurality of clusters are generated by applying a clustering process to the representations of the instances. A visual depiction of the clusters and the instances may then be created in a graphical user interface (GUI).

METHOD AND DEVICE FOR AUTOMATICALLY DETECTING POTENTIAL FAILURES IN MOBILE APPLICATIONS
20230121281 · 2023-04-20 ·

A method and a device for automatically detecting potential failures in mobile applications implemented on an operating system for mobile devices, a mobile application being executable on the operating system installed on a hosting device by executing code instructions stored in an associated executable file. Provided an executable file associated to a mobile application, the device implements a module for decompiling the executable file to obtain at least one descriptive file of the mobile application containing descriptive code formatted with a markup language, a module for providing a plurality of predetermined string patterns related to potential failures, and a module for searching for the presence of at least one of the string patterns in the at least one descriptive file, and in case of presence, outputting an indication of presence of a potential failure associated to the detected string pattern.

Wireless mobile maintenance display unit and system for cargo handling system
11628936 · 2023-04-18 · ·

A cargo handling system is disclosed. In various embodiments, the system includes a wireless mobile maintenance display unit; a line replaceable unit; a data device configured to provide an operational status data concerning the line replaceable unit to the wireless mobile maintenance display unit; a first server configured to store a catalog of parts for repairing the line replaceable unit; and a system controller configured to communicate with a source of replacement parts for the line replaceable unit.

Server-based notification of alarm event subsequent to communication failure with armed security system

A server-based environment for reporting a status of a security, monitoring and automation controller is provided. Detecting cessation of an always-on persistent network connection between the SMA controller and the server is also provided. Reporting the cessation of the network connection to an end user and defined others is further provided. A further aspect provides for automatically reporting an alarm event to a central station, the end user, and others, in the event the cessation of the network connection occurs while the SMA controller is aimed and after a zone fault event, and not receiving a disarm notification prior to expiration of a preset entry delay.

METHOD AND DEVICE FOR TRANSMITTING DATA IN WIRELESS POWER TRANSMISSION SYSTEM

The present disclosure relates to a method and a device for transmitting data in a wireless power transmission system. The method for transmitting data by a wireless power transmitter in a wireless power transmission system may comprise the steps of: receiving from a wireless power receiver, within a first control error interval, a first control error packet containing a control error value with respect to power transmitted from the wireless power transmitter; determining the size of a first data packet on the basis of the length of the first control error interval; and transmitting the first data packet to the wireless power receiver.

ULTRASOUND SYSTEM AND CONTROL METHOD OF ULTRASOUND SYSTEM
20230161657 · 2023-05-25 · ·

In an ultrasound system and a control method of the ultrasound system, in a case where the number of times of an operation corresponding to first operation information as at least one piece of operation information among a plurality of pieces of operation information corresponding to a wireless connection error, which is performed by a user, has reached a predetermined number within a predetermined period, second operation information as at least one piece of the operation information among the plurality of pieces of operation information, which corresponds to an operation that is not performed by the user, is proposed to the user.