Patent classifications
G06F9/45508
Hardware in loop testing and generation of latency profiles for use in simulation
Systems, methods, tangible non-transitory computer-readable media, and devices associated with testing, simulation, or operation of an autonomous device including an autonomous vehicle are provided. For example, a service entity computing system can perform operations including obtaining operating software data associated with operating software of the autonomous vehicle. Log data associated with one or more real-world scenarios can also be obtained. One or more first simulations of the operating software can be performed based on the one or more real-world scenarios. A latency distribution profile associated with the operating software can be generated based on the one or more first simulations. One or more second simulations of the operating software can be performed based on the latency distribution profile and one or more artificially generated scenarios. Furthermore, a real-world behavior of the autonomous vehicle can be predicted based on the one or more second simulations.
SYSTEMS AND METHODS FOR CONTROLLING AN INDUSTRIAL ASSET IN THE PRESENCE OF A CYBER-ATTACK
Systems and methods are provided for the control of an industrial asset, such as a power generating asset. Accordingly, a cyber-attack model predicts a plurality of operational impacts on the industrial asset resulting from a plurality of potential cyber-attacks. The cyber-attack model also predicts a corresponding plurality of potential mitigation responses. In operation, a cyber-attack impacting at least one component of the industrial asset is detected via the cyber-attack neutralization module and a protected operational impact of the cyber-attack is identified based on the cyber-attack model. The cyber-attack neutralization module selects at least one mitigation response of the plurality of mitigation responses based on the predicted operational impact and an operating state of the industrial asset is altered based on the selected mitigation response.
BRING YOUR OWN MACHINE (BYOM)
A method and/or apparatus for creating and/or editing a machine pool with bring your own machine (BYOM) includes creating and/or editing a machine pool with a static list of machines. A user input machine list and an existing machine list are retrieved, and the user input machine list and existing machine list are compared to identify one or more changes between the user input machine list and existing machine list. Next, a new machine specification is created when the one or more changes between the user input machine list and existing machine list are identified. The one or more machines are then moved to the new machine specification.
System for executing new instructions and method for executing new instructions
A method for executing new instructions includes receiving an instruction, and determining whether the received instruction is a new instruction according to an operation code of the received instruction. When the received instruction is a new instruction, the basic decoding information of the received instruction is stored in a private register. And, the system for executing the new instructions enters a system management mode, and simulates the execution of the received instruction according to the basic decoding information stored in the private register in the system management mode; wherein the basic decoding information includes the operation code.
Computer architecture for performing multiplication using correlithm objects in a correlithm object processing system
A system includes a memory and a node. The memory stores first and second log string correlithm objects. The node receives first and second real-world numerical values, and identifies a first sub-string correlithm object from the first log string correlithm object that corresponds to the first real-world numerical value. The node aligns the first and second log string correlithm objects such that the first sub-string correlithm object aligns with a sub-string correlithm object from the second log string correlithm object representing the logarithmic value of one. The node identifies a second sub-string correlithm object from the second log string correlithm object that corresponds to the second real-world numerical value, and determines which sub-string correlithm object from the first log string correlithm object aligns with the second sub-string correlithm object from the second log string correlithm object. The node outputs the determined sub-string correlithm object.
AGENT-BASED MONITORING OF AN APPLICATION MANAGEMENT SYSTEM
In one embodiment, one or more agents monitor the usage of an application management system by one or more users associated with an entity, the one or more agents executing on one or more servers that implement the application management system. An adoption score for the entity is generated based on collected usage data and used to form a combined score for the entity that can be used, e.g., for resource allocation in the application management system.
Recording program execution
Among other things, a method includes, at a computer system on which one or more computer programs are executing, receiving a specification defining types of state information, receiving an indication that an event associated with at least one of the computer programs has occurred, the event associated with execution of a function of the computer program, collecting state information describing the state of the execution of the computer program when the event occurred, generating an entry corresponding to the event, the entry including elements of the collected state information, the elements of state information formatted according to the specification, and storing the entry. The log can be parsed to generate a visualization of computer program execution.
Cross-compilation, orchestration, and scheduling for in-memory databases as a service
In an example embodiment, a new solution is provided for an in-memory database provided in a cloud as a service that enables “job cross running” instead of “parallel job running.” Specifically, job scripts are clustered based on a shared service. A primary job script in the cluster is compiled and executed, but secondary job scripts in the cluster are not compiled until after the execution of the primary job script has begun. A mock library is inserted into each of the secondary job scripts to cause service calls for the shared service in the secondary job scripts to be replaced with mock service calls. The secondary job scripts are then scheduled and executed, and upon completion the primary job script is permitted to delete the shared service.
METHOD OF PREPARING DOCUMENTS IN MARKUP LANGUAGES
The present technical solution relates to user interfaces in general and specifically to user interfaces intended for working with data of computer information systems. A method for preparing documents written in markup languages while implementing a user interface for working with data of an information system, such that: forming metadata for at least one entity class, entity class attributes, datasets, and dataset elements including at least dataset fields and dataset aggregate functions; forming a template for presenting instances of the entity class, the template includes at least one document written in at least one markup language; forming and storing a link between the template and the entity class; displaying the template, forming and storing links between the template and entity class attributes, datasets, their fields and aggregate functions.
DATA ANALOG IDENTIFICATION METHOD
The present invention proposes a method for identifying data similarity, specifically applied to the execution of exploratory projects and geological characterization of reservoirs.
The invention evaluates different samples of a data population according to groupers defined by users and analyzes the data according to the population analyses, returning parametric indices that allow the comparison of groupers with definition of data analogy.
The invention provides greater productivity in identifying analogous occurrences by data and brings economic benefits by ensuring greater use of available data.