摘要:
A system and method of deploying a network hopping adaptor is disclosed. In some embodiments, a network hopping adaptor may be configured to manipulate network traffic so as to change at least one network characteristic of the network traffic, and at least one network interface of a machine selected from a group of machines may be configured to send the network traffic to the network hopping adaptor. The network hopping adaptor may manipulate such characteristics as an IP address, a port number, an encryption algorithm or a compression algorithm. The group of machines may be deployed as virtual machines being executed by a virtualization server, and the network hopping adaptor may be implemented on another virtual machine being executed by the virtualization server. Alternatively, or in addition, the group of machines or the network hopping adaptor may be implemented as physical machines.
摘要:
Systems and methods that analyze and monitor the performance of a call center including performance of the interactive voice response systems, call center agents, and other components. The systems and methods record characteristics of the call such as the audio data, and analyze that record to identify the events that take place during the call. These events may be defined as customer/call center interactions, such as dropped calls, logic errors or other event. A call center administrator may also identify a set of metrics, such as the number of dropped calls that occur during a day, that may be monitored by the systems described herein. The data collected about these events and metrics may be stored in a database and provided to the administrator through a user interface that allows the administrator to browse through the collected metric and recorded call data and directly review relevant portions of a call.
摘要:
Embodiments of a system and method for providing frequency assignment with managed transceiver resources. A frequency assignment protocol manages transceiver resources in making channel assignment decisions based on a number of links and state of transceivers. Long-term traffic patterns are captured and transceiver resource decisions are made based on an analysis of the captured long-term traffic patterns to increase a selected metric, such as connectivity, capacity or any other measurable quantity.
摘要:
A method for data privacy in a VoIP system includes: generating a private key for an additive homomorphic encryption scheme; sending the private key to a plurality of client terminals to be used by each of the plurality of client terminals to encrypt a respective VoIP streaming data; receiving an encrypted VoIP streaming data from each of the plurality of client terminals, wherein each of the VoIP streaming data is encrypted using the same private key; performing an encrypted homomorphic addition on the encrypted VoIP streaming data to generate a mixed encrypted VoIP data stream; and sending the mixed encrypted VoIP data stream to the plurality of client terminals to be played back.
摘要:
Generally discussed herein are systems, apparatuses, or processes to recognize that a cyber threat exists or predict a future track of a cyber threat in a network. According to an example, a process for recognizing a cyber threat can include (1) determining a network layout of a network based on received network layout data, (2) receiving cyber sensor data indicating actions performed on the network, (3) calculating a first score associated with the cyber sensor data indicating that a cyber threat is present in the network by comparing a cyber threat profile of the cyber threat that details actions performed by the cyber threat to actions indicated by the cyber sensor data, (4) determining whether the calculated first score is greater than a specified threshold, or (5) determining that the cyber threat is present in response to determining the calculated first score is greater than the specified threshold.
摘要:
An approach to computation of kernel descriptors is accelerated using precomputed tables. In one aspect, a fast algorithm for kernel descriptor computation that takes O(1) operations per pixel in each patch, based on pre-computed kernel values. This speeds up the kernel descriptor features under consideration, to levels that are comparable with D-SIFT and color SIFT, and two orders of magnitude faster than STIP and HoG3D. In some examples, kernel descriptors are applied to extract gradient, flow and texture based features for video analysis. In tests of the approach on a large database of internet videos used in the TRECVID MED 2011 evaluations, the flow based kernel descriptors are up to two orders of magnitude faster than STIP and HoG3D, and also produce significant performance improvements. Further, using features from multiple color planes produces small but consistent gains.
摘要翻译:使用预先计算的表加速了内核描述符的计算方法。 在一个方面,一种用于内核描述符计算的快速算法,其基于预先计算的内核值在每个补丁中每像素执行O(1)个操作。 这将加速考虑的内核描述符功能,达到与D-SIFT和颜色SIFT相当的水平,比STIP和HoG3D快两个数量级。 在一些示例中,内核描述符被应用于提取用于视频分析的梯度,流和纹理的特征。 在对TRECVID MED 2011评估中使用的大量互联网视频数据库的方法进行测试时,基于流的内核描述符比STIP和HoG3D快两个数量级,并且还可以显着提高性能。 此外,使用来自多个颜色平面的特征产生小但恒定的增益。
摘要:
A body garment including sensors distributed throughout the garment, each sensor senses body state information from a local surface area of a body; and sensor nodes in proximity to the plurality of sensors, each sensor node including a processor to receive sensing body state information from at least one of the plurality of sensors. Each processor is configured to receive body state information locally from sensors, to utilize the information to determine a local surface shape of the surface of a portion of the body part; and to exchange local surface shape information with neighboring sensor nodes. At least one processor of utilizes the local surface shape information received from the sensor nodes to generate one overall model of a surface shape of the entire surface of the body part covered by the garment.
摘要:
Technology for controlling network connected systems is disclosed. A wireless network can be scanned in order to determine a list of active network addresses. The list of active network addresses can be associated with a plurality of wireless devices that are actively communicating within the wireless network. One or more active network addresses of interest can be identified from the list of active network addresses. An address profile associated with the active network addresses of interest can be identified. One or more network connected systems can be controlled according to a predefined set of rules in the address profile.
摘要:
A system including an optical waveguide having a length extending from an optical interrogator at a first end, a plurality of light-modulating sensor nodes disposed at predetermined locations along the length of the optical waveguide, and (in some embodiments) a plurality of first beam splitters at each of the predetermined locations along the length of the optical waveguide, each of the first beam splitters configured to direct a portion of an optical signal from the optical interrogator to one of the plurality of light-modulating sensor nodes along an optical waveguide path, and return a reflected optical signal to the optical interrogator in an opposite direction along the same optical waveguide path.
摘要:
An approach to segmentation or clustering of a set of elements combines separate procedures and uses training data for those procedures on labeled data. This approach is applied to elements being components of an image of text (e.g., printed or handwritten). In some examples, the elements are connected sets of pixels. In images of text, the clusters can correspond to individual lines. The approach provides improved clustering performance as compared to any one of the procedures taken alone.