MATCHED FILTER TESTING OF DATA TRANSMISSION CABLES
    94.
    发明申请
    MATCHED FILTER TESTING OF DATA TRANSMISSION CABLES 审中-公开
    数据传输电缆的匹配滤波器测试

    公开(公告)号:US20140257737A1

    公开(公告)日:2014-09-11

    申请号:US14284176

    申请日:2014-05-21

    IPC分类号: G01R31/08

    CPC分类号: G01R31/088 G01R31/021

    摘要: In one embodiment, a method for testing a cable includes receiving a read-signal profile read at a receiving-end of a cable upon an initial test signal being input to a sending end of the cable, calculating a cross-correlation function between the read-signal profile and a matched filter output, and determining a peak value of the cross-correlation function. In another embodiment, a system includes a device, the device including logic for receiving a read-signal profile read at a receiving-end of the cable upon an initial test signal being input to a sending end of the cable, logic for calculating a cross-correlation function between the read-signal profile and a matched filter output, logic for determining a peak value of the cross-correlation function, and logic for storing the peak value to a computer readable medium. Other methods, systems, and computer program products are also described according to various embodiments.

    摘要翻译: 在一个实施例中,用于测试电缆的方法包括在初始测试信号被输入到电缆的发送端时接收在电缆的接收端读取的读取信号分布,计算读取的互相关函数 信号分布和匹配滤波器输出,并确定互相关函数的峰值。 在另一个实施例中,系统包括一个设备,该设备包括逻辑,该逻辑用于在初始测试信号被输入到电缆的发送端时接收在电缆的接收端读取的读信号分布,用于计算交叉 读信号分布和匹配滤波器输出之间的相关函数,用于确定互相关函数的峰值的逻辑,以及用于将峰值存储到计算机可读介质的逻辑。 根据各种实施例还描述了其它方法,系统和计算机程序产品。

    Generation of test datasets for guarded commands

    公开(公告)号:US11593358B2

    公开(公告)日:2023-02-28

    申请号:US16818596

    申请日:2020-03-13

    摘要: Systems and techniques that facilitate automated generation of relevant and adequate test datasets based on guarded commands are provided. In various embodiments, a query generation component can generate a query language query based on a first guarded command. In various aspects, an execution component can execute the query language query on a data table to return one or more datasets for testing the first guarded command. In various embodiments, the query generation component can comprise an initialization component that can initialize conditions of a WHERE clause of the query language query based on the first guarded command. In various instances, the query generation component can further comprise a transformation component that can transform the conditions of the WHERE clause of the query language query based on a sequence of guarded commands on which the first guarded command depends. In various cases, the query generation component can further comprise a translation component that can convert the transformed conditions of the WHERE clause of the query language query into query language syntax.

    TRAVERSING SOFTWARE COMPONENTS AND DEPENDENCIES FOR VULNERABILITY ANALYSIS

    公开(公告)号:US20220318396A1

    公开(公告)日:2022-10-06

    申请号:US17222345

    申请日:2021-04-05

    IPC分类号: G06F21/57

    摘要: Systems, devices, computer-implemented methods, and/or computer program products that facilitate software vulnerability analysis using relationship data extracted from disparate package-related sources. In one example, a system can comprise a processor that executes computer executable components stored in memory. The computer executable components can comprise a knowledge induction component and a vulnerability component. The knowledge induction component can populate a package ontology for a range of packages with relationship data extracted from a plurality of disparate package-related sources. The vulnerability component can identify an implicit vulnerability impacting the range of packages using the package ontology and a vulnerability record regarding an explicit vulnerability for a package within the range of packages.

    End user protection against ATM keypad overlay

    公开(公告)号:US11080970B2

    公开(公告)日:2021-08-03

    申请号:US16682112

    申请日:2019-11-13

    摘要: Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a material with a reflection coefficient. A presence of a fraud device is determined by emitting, from beneath the surface, security light from a set of one or more emitters, wherein the security light has a security light luminous power. A reflection of the security light off the material is collected by a first set of one or more sensors, wherein the reflection has a reflection luminous power. A luminous power range is determined based on the security light luminous power and the reflection coefficient and based on the reflection luminous power being outside the luminous power range, security measures are engaged at the data entry device.