摘要:
The disclosed system for cooperative engagement generally includes a control system in communication with an actuation system, an effector system, a sensor system and a communications interface. Disclosed features and specifications may be variously controlled, adapted or otherwise optionally modified to realize improved distributed designation and/or engagement function. Exemplary embodiments of the present invention generally provide cooperative designation and engagement of targets for air-, land-, sea- or space-based weapon systems.
摘要:
The disclosed system for cooperative engagement generally includes a control system in communication with an actuation system, an effector system, a sensor system and a comunications interface. Disclosed features and specifications may be variously controlled, adapted or otherwise optionally modified to realize improved distributed designation and/or engagement function. Exemplary embodiments of the present invention generally provide cooperative designation and engagement of targets for air-, land-, sea- or space-based weapon systems.
摘要:
A system and method for decentralized cooperative control of a team of agents for geographic and other search tasks. The approach is behavior-based and uses probability particle approach to the search problem. Agents are attracted to probability distributions in the form of virtual particles of probability that represent hypotheses about the existence of objects of interest in a geographic area or a data-space. Reliance on dependable, high-bandwidth communication is reduced by modeling the movements of other team members and the objects of interest between periodic update messages.
摘要:
A device for performing a surgical procedure on a knee includes an adjustable femoral portion, a tibial portion and at least one sensor coupled with the femoral and/or tibial portions to sense pressure exerted by the femoral and tibial portions against one another. The femoral portion is adapted for removably coupling with a distal end of a femur to adjust tension in soft tissue adjacent the knee and has at least one positioning feature adapted to move relative to the distal end of the femur as the femoral portion is adjusted, thus helping position a femoral prosthetic on the distal end of the femur. The sensor(s) may be adapted to sense pressure at medial and lateral sides of the knee, and relative pressures may be displayed as data on a visual display. Adjustments to the femoral member may be made to balance pressure at flexion and extension of the knee.
摘要:
A method and apparatus for conducting transition testing using scan elements are disclosed. In one embodiment, an integrated circuit (IC) includes a scan chain having first and second subsets of scannable flops, the first subset having respective data inputs coupled to a memory array. The scannable flops of the second subset may each have a respective data input coupled to circuitry other than the memory array (e.g., to a logic circuit). The scannable flops of the first subset may be enabled for scan shifting during a transition test mode. The scannable flops of the second subset are inhibited from scanning during the transition test mode. The transition test mode may include at least two functional clock cycles in which the scannable flops of the first subset provide complementary first and second logic values to logic circuits coupled to respective data outputs.
摘要:
Hydrocarbon traps used to trap then release unburned hydrocarbons upon startup of a spark ignition internal combustion engine are sensitive to degradation if exposed to normal temperature exhaust gases. On board diagnostics of HC traps are provided by the invention, by incorporating a heat sensitive oxygen storage material in the HC trap material, and using conventional determination of OSC efficiency to determine if the HC trap material has been exposed to excessive temperature.
摘要:
A system for providing a client's credentials to a computer program comprises a database remote from the client and a single signon server module. The single signon server module can receive a request for the client's credentials from the computer program, determine whether the client's credentials are stored in the database, and send the client's credentials from the database to the computer program in response to a determination that the client's credentials are stored in the database. The single signon server module can store the client's credentials in the database in response to a determination that the client's credentials are not stored in the database. The single signon server module can encrypt the client's credentials prior to storing the client's credentials in the database and can decrypt the client's credentials prior to sending the client's credentials to the computer program.
摘要:
An improved method and apparatus for hand-held portable illumination, sensing and evidence collection is described. A uniquely configured multi-functional device selectively provides multi-purpose lighting and sensing in a hand-held portable device which is usable as a flashlight, camera and as an integrated device for evidence collection.
摘要:
A full-rotational conductor assembly includes a pair of coaxial electrically conductive members having complementary tracks, relatively rotatable about a common axis. A plurality of electrically conductive coupler halves located between and engaging the tracks enable electrical connection between the tracks of the conductive members. A cage is connected to each of the coupler halves and substantially located between the complimentary tracks.
摘要:
Methods and systems of screening input strings that are intended for use by a Web server are described. In the described embodiment, an attack pattern is determined that can be used to attack a Web server. A search pattern is defined that can be used to detect the attack pattern. The search pattern is defined in a flexible, extensible manner that permits variability among its constituent parts. An input string that is intended for use by a Web server is received and evaluated using the search pattern to ascertain whether the attack pattern is present. If an attack pattern is found that matches the search pattern, then a remedial action is implemented.