Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

76 results about "High severity" patented technology

High Priority, High Severity :- An error which occurs on the basic functionality of the application and will not allow the user to use the system (E.g. user is not able to login to the application)

FMEA analysis based comprehensive reliability allocation method for numerical control machine tool

The invention discloses an FMEA analysis based comprehensive reliability allocation method for a numerical control machine tool, and belongs to the field of mechanical system reliability analysis. According to the method, the comprehensive reliability allocation for a system is carried out based on an FMEA three-order conversion function and a Copula function, so that the problems of a single consideration factor, only capability of regulating reliability differentiation degree of high severity or failure frequency, and the like in an existing machine tool reliability allocation method are solved; the conversion function in the method is simple in form and easy to understand and operate, covers the advantages of a conventional index conversion function and extends reliability differentiation degree regulation capability of a low interval and a medium interval of an FMEA analysis result; the method considers influence of various allocation indexes and fault correlation effects at the same time, and has the characteristics of good integrity and convenience for engineering application; and compared to a conventional method, the subsystem reliability obtained by analysis with the method is lower, the manufacturing and processing cost requirements can be better lowered, and very important engineering value is achieved.
Owner:NORTHEASTERN UNIV

Method and system for simulating a hacking attack on a network

The present invention describes a method for simulating a hacking attack on a Network, wherein the Network comprises at least one of a plurality of data processing units (DPUs), a plurality of users and a plurality of communication links, to assess vulnerabilities of the Network. The method includes receiving one or more scan parameters for the Network. Further, the method includes creating at least one master agent by a system to gather information about the Network, wherein the information pertains to critical and non-critical information about the Network. The method includes creating an Information Model and then incrementally updating the Information Model during the hacking attack. The Information Model is the abstract representation of information collected by the system. Furthermore, the method includes generating a Multiple Attack Vector (MAV) graph based on one or more scan parameters and the Information Model. MAV has the ability to combine plurality of low and medium severity vulnerabilities associated with the data processing units (DPUs), users and communication links, correlate vulnerabilities in combination with Information Model and generate high severity attack paths that can lead to compromise of the Network. Moreover, the method includes launching one or more attacks based on the MAV graph to compromise the Network. The method further includes installing atleast one slave agent on the compromised Network to perform the one or more attacks in a distributed manner. Moreover, the method includes performing a multi stage attack by using the at least one slave agent and the at least one master agent by repeating above steps. Finally, the method includes generating a report by the scan controller, wherein the report contains details about the compromisedNetwork and the vulnerabilities of the Network.
Owner:IVIZ TECHNO SOLUTIONS PVT

Voltage Stability Monitoring Device and Method

An object is to accurately monitor deterioration of current or future voltage stability, by dynamically changing a bus in which current or future voltage stability deteriorates, in stability monitoring calculation of a power system. Hence the present invention provides a voltage stability monitoring device, which monitors voltage stability of a power system, including an assumed change scenario calculation unit which produces a plurality of assumed change scenarios indicating a scenario of a change that is assumed based on at least one of a system configuration of the power system and a change of a tide state; a voltage stability calculation unit which calculates the voltage stability using the assumed change scenario; a voltage stability margin calculation unit which calculates a voltage stability margin indicating margin degree of the voltage stability, based on the voltage stability; an each scenario severity ranking calculation unit which selects an assumed change scenario with high severity of the voltage stability for each assumed change scenario, based on the voltage stability margin; a vulnerable bus calculation unit which calculates which of buses in the power system is a vulnerable bus that decreases voltage stability, based on the assumed change scenario which is selected; and a monitoring location change unit which changes a monitoring target of the voltage stability, based on information of the vulnerable bus.
Owner:HITACHI LTD

State evaluation method of hydropower plant computer monitoring system

The invention discloses a state evaluation method of a hydropower plant computer monitoring system. The method comprises a step of respectively initiating an upper computer state evaluation model and a lower computer state evaluation model which are provided with hydropower plant computer monitoring systems and establishing the corresponding classification diagnosis evaluation table, respectively detecting the actual degradation degree of each evaluation program and obtaining a basic deduction value, and multiplying the basic deduction value with the weight coefficient corresponding to the evaluation program to obtain the actual deduction value of the evaluation program, a step of comparing the actual deduction value of each evaluation program in each program classification with the classification diagnosis evaluation table and judging the diagnosis state corresponding to each program classification, and a step of obtaining the diagnosis state with the highest severity degree as the final evaluation result of the upper computer/lower computer of the hydropower plant computer monitoring system. According to the state evaluation method, the running state of the hydropower plant computer monitoring system can be comprehensively evaluated, the influence on a hydropower plant and even the stable operation of a power system by fault expansion is prevented, and the examination and maintenance cost can be greatly reduced.
Owner:STATE GRID CORP OF CHINA +2

City intelligent traffic induction method based on RFID and WeChat platform

InactiveCN106601005AEffective monitoring of traffic congestionSimple structureRoad vehicles traffic controlIn vehicleRoad traffic
The present invention belongs to the real-time traffic status navigation technology field, and relates to a city intelligent traffic induction method based on a RFID and a WeChat platform. The concrete technology comprises: a RFID reading device reads the information of RFID chips in vehicles and sends the information to a database terminal for calculation and processing, the passing time T(N) of each time on a road section is monitored to evaluate the jamming condition of the road section, if T(N)<1.5T(S), the jamming condition is evaluated as the low-severity jamming, if 2.0T(S)> T(N)>=1.5T(S), the jamming condition is evaluated as the mid-severity jamming, and if T(N)>=2.0T(S), the jamming condition is evaluated as the high-severity jamming, the vehicle jamming quantity S(N) and the vehicle jamming quantity growth rate F(N1) on the road section are employed to evaluate the condition changing trend, and a server calls corresponding information and send the corresponding information to the official account of a user phone terminal according to the query request received by an intelligent traffic induction WeChat public platform. The city intelligent traffic induction method based on the RFID and WeChat platform is simple in structure, reliable in principle and low in installation, can effectively monitor the road traffic jamming condition, can perform effective induction, and is friendly in application environment and wide in the market prospect.
Owner:QINGDAO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products