Patent classifications
H04L1/24
Training Sparse Networks With Discrete Weight Values
Some embodiments provide a method for training a machine-trained (MT) network. The method propagates multiple inputs through the MT network to generate an output for each of the inputs. each of the inputs is associated with an expected output, the MT network uses multiple network parameters to process the inputs, and each network parameter of a set of the network parameters is defined during training as a probability distribution across a discrete set of possible values for the network parameter. The method calculates a value of a loss function for the MT network that includes (i) a first term that measures network error based on the expected outputs compared to the generated outputs and (ii) a second term that penalizes divergence of the probability distribution for each network parameter in the set of network parameters from a predefined probability distribution for the network parameter.
CABLE MODEM TERMINATION SYSTEM
A system, in one embodiment, includes a cable modem termination system configured to perform at least the following processing: determining a first quantity related to uncorrectable erroneous codewords and a second quantity related to other codewords except the erroneous codewords in the data packet received by the cable modem termination system from the terminal device via the channel; calculating a first metric relating the first quantity to the second quantity; and in response to the first metric exceeding a first threshold for a first predetermined time, determining the channel as a damaged channel.
System and method of detecting hidden processes by analyzing packet flows
A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed outside of the first host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that a hidden process exists and corrective action can be taken.
Method and apparatus for real-time monitoring and field adjustment
A system that incorporates aspects of the subject disclosure may perform operations including, for example, obtaining uplink information associated with a downlink path, wherein the uplink information includes operational parameters used by a plurality of communication devices for transmitting wireless signals on a plurality of uplink paths; performing, based on the uplink information, a plurality of measurements of the plurality of uplink paths; identifying a measurement from the plurality of measurements that is below a threshold, thereby indicating an affected uplink path of the plurality of uplink paths; initiating a first filtering of the affected uplink path, wherein the initiating is based on the identifying and wherein the first filtering is based upon one or more first filtering parameters; and receiving instructions comprising one or more updated filtering parameters, wherein the instructions are received by the system at a port of the system. Other embodiments are disclosed.
SYSTEM AND METHOD FOR LOOPBACK AND NETWORK LOOP DETECTION AND ANALYSIS
A method of determining the presence of a loopback in one or more networks comprises storing information related to a test instance; sending a loopback detection beacon (LPDB) containing information related to the test instance from a port on an originating device; monitoring the port for a predetermined time period to detect LPDBs arriving at the port during the predetermined time period; and determining whether a detected LPDB contains information corresponding to the stored information, to detect the presence of a loopback. The method may determine whether a detected loopback is a port loopback, a tunnel loopback or a service loopback. The stored information related to the test instance may be deleted if an LPDB arriving at the port and containing information corresponding to the stored information is not detected within the predetermined time period.
TECHNOLOGIES FOR MANAGING COMPROMISED SENSORS IN VIRTUALIZED ENVIRONMENTS
Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. In some embodiments, a system can receive, from a first capturing agent deployed in a virtualization layer of a first device, data reports generated based on traffic captured by the first capturing agent. The system can also receive, from a second capturing agent deployed in a hardware layer of a second device, data reports generated based on traffic captured by the second capturing agent. Based on the data reports, the system can determine characteristics of the traffic captured by the first capturing agent and the second capturing agent. The system can then compare the characteristics to determine a multi-layer difference in traffic characteristics. Based on the multi-layer difference in traffic characteristics, the system can determine that the first capturing agent or the second capturing agent is in a faulty state.
Measuring and evaluating a test signal generated by a device under test (DUT)
Embodiments described herein generally relate to measuring and evaluating a test signal generated by a device under test (DUT). In particular, the test signal generated by the DUT may be compared to a reference signal and scored based on the comparison. For example, a method may include: capturing a test signal from a device under test; splicing the test signal into a plurality of test audio files based on a plurality of frequency bins; at each frequency bin, comparing each of the plurality of test audio files to a corresponding reference audio file from among a plurality of reference audio files, the plurality of reference audio files being associated with a reference signal; and calculating a performance score of the device under test based on the comparisons.
Intelligent electronic device comprising a cellular radio module
A method for enabling communication of data relating to samples of electric measurements, the method being performed in an intelligent electronic device, IED, including a cellular radio module, the IED being configured to protect power system equipment. The method includes the steps of: detecting channel quality using the cellular radio module, the channel quality relating to a channel between the IED and a base station; transmitting packets using the cellular radio module, each packet including data relating to samples of electric measurements for protecting power system equipment; and increasing sample rate of the electric measurements when the channel quality is worse than a first threshold.
Serial interface with improved diagnostic coverage
A serial interface, such as a serial peripheral interface (SPI), with improved diagnostic coverage is disclosed. The serial interface includes a data verification module that selects an error detection value in response to a mode signal indicating if the transmitting device is in user mode or test mode. For example, the data verification module computes a cyclic redundancy check (CRC) value and selects either the computed CRC value or its inverse based on the mode. The receiving device can determine the mode of the transmitting device based on the error detection value used. The serial interface further includes a read detector for clearing the transmit data buffer after data is read out. The serial interface may further include a loopback circuit for verifying that the data output from an output pin matches the data from the transmit data buffer.
SYSTEMS, METHODS, AND STORAGE MEDIA FOR DETECTING A SECURITY INTRUSION OF A NETWORK DEVICE
Systems, methods, and storage media for detecting a security intrusion of a network device are disclosed. Exemplary implementations may include a method involving, in the network device including a processor, monitor a light signal associated with a security enabled port of the network device; and in response to detecting a change in the light signal, initiate a security alert.