Patent application number | Description | Published |
20080202376 | Altitude Compensation System for Naturally Aspirated Railroad Locomotive - A railroad locomotive includes a naturally aspirated reciprocating internal combustion engine driving a traction generator. A speed control system and load regulator provide an output signal which is operated upon and modified by a controller in response to the barometric pressure at which the locomotive is being operated. | 08-28-2008 |
20080202377 | Altitude Compensation System for Controlling Smoke Emissions From a Naturally Aspirated Railroad Locomotive - A railroad locomotive includes a naturally-aspirated reciprocating internal combustion engine, and a traction generator driven by the engine. A throttle position sensor produces a signal corresponding to the throttle position selected by the locomotive's operator. A load regulator receives a speed signal derived from the throttle position signal and outputs an excitation signal for the traction generator which is modified by a controller in response to air availability so that engine speed and load are controlled independently of the selected throttle position, so as to limit the exhaust smoke output of the engine. | 08-28-2008 |
20100131128 | APPARATUS AND METHOD FOR DETERMINING AVAILABLE POWER AND WEIGHT DISTRIBUTION IN A TRAIN - A navigation system includes a computer readable storage medium having a sequence of instructions stored thereon, which, when executed by a processor, causes the processor to acquire a plurality of parameters of a train comprising parameters measured after the train has begun a journey. The train includes a plurality of vehicles providing tractive effort and a consist coupled to the plurality of vehicles. The sequence of instructions also causes the processor to calculate the tractive effort of less than all of the plurality of vehicles based on the acquired plurality of parameters. | 05-27-2010 |
20100174484 | SYSTEM AND METHOD FOR OPTIMIZING HYBRID ENGINE OPERATION - A system for optimizing a trip for a hybrid vehicle, comprising a computer programmed to determine a route for the hybrid vehicle to travel, obtain altitude and terrain information of the route, and generate a trip plan based on at least the route and altitude to minimize total energy expended along the route by encouraging regenerative braking during portions of the route, regardless of needs to slow the hybrid vehicle. | 07-08-2010 |
20100262321 | System, Method and Computer Software Code for Optimizing Train Operations Considering Rail Car Parameters - A method for improving train performance, the method including determining a rail car parameter for at least one rail car to be included in a train, and creating a train trip plan based on the rail car parameter in accordance with one or more operational criteria for the train. | 10-14-2010 |
20110015807 | SYSTEM AND METHOD FOR VEHICLE PERFORMANCE CONTROL - A method is provided for controlling a drivetrain of a vehicle which includes a prime mover operatively connected to at least one tractive element. The method includes: (a) determining the vehicle's total weight; and (b) using an electronic controller carried by the vehicle, causing the prime mover to apply power to the tractive element so as to propel the vehicle, the magnitude of the power being a function of the vehicle's total weight. | 01-20-2011 |
20130013231 | SYSTEM AND METHOD FOR PREDICTING MECHANICAL FAILURE OF A MOTOR - A method for a vehicle having plural electric motors includes generating motor electrical signatures for the motors. The motor electrical signatures represent one or more characteristics of electrical energy that is supplied to the motors. The method also includes identifying one or more fault measures of each of the motor electrical signatures. The fault measures are indicative of mechanical characteristics of the motors. The method further includes comparing the one or more fault measures of each motor with the one or more fault measures of the other motors in the same vehicle and predicting an impending mechanical failure of one or more of the motors based on comparing the fault measures of the motors. | 01-10-2013 |
20130068003 | SYSTEMS AND METHODS FOR DIAGNOSING AN ENGINE - Methods and systems are provided for an engine. A condition of the engine may be diagnosed based on information provided by signals from speed sensors associated with the engine and/or other signals associated with a generator operationally connected to the engine. Different types of degradation may be distinguished based on discerning characteristics within the information. Thus, a degraded engine component may be identified in a manner that reduces service induced delay. | 03-21-2013 |
20130073126 | SYSTEMS AND METHODS FOR DIAGNOSING AUXILIARY EQUIPMENT ASSOCIATED WITH AN ENGINE - Methods and systems are provided for an engine and associated auxiliary equipment. A condition of the auxiliary equipment may be diagnosed based on information provided by signals from a generator operationally connected to the auxiliary equipment and/or other signals associated with the engine. Different types of degradation may be distinguished based on discerning characteristics within the information. Thus, a degraded auxiliary equipment component may be identified in a manner that reduces service induced delay. | 03-21-2013 |
20130073127 | SYSTEMS AND METHODS FOR DIAGNOSING AN ENGINE - Methods and systems are provided for an engine. A condition of the engine may be diagnosed based on a combustion torque profile of the engine estimated using signals from a generator operationally connected to the engine and/or other signals associated with the engine. Different types of degradation may be distinguished based on discerning characteristics within the estimated combustion torque profile data. Thus, a degraded engine component may be identified in a manner that reduces service induced delay. | 03-21-2013 |
20140151460 | SYSTEM AND METHOD FOR MAINTAINING SENSOR PERFORMANCE - A system for use with a vehicle includes at least one nozzle and an fluid reservoir capable of holding a volume of pressurized gas or other fluid. The air reservoir is in fluid communication with the at least one nozzle and the at least one nozzle is selectively operable to direct the pressurized gas or other fluid at a surface of an optical inspection sensor assembly to remove contaminants from the sensor assembly. | 06-05-2014 |
Patent application number | Description | Published |
20100211780 | SECURE NETWORK COMMUNICATIONS - Apparatus, systems, and methods may operate to establish a secure communications tunnel between a server node and a client node, and to receive user requests from the client node at the server node via the secure communications tunnel. The user requests may be received in conjunction with a device verification token derived from nonces generated by the server node and transmitted to the client node as part of keep-alive response messages. The nonces may change according to a period of time established by the server node. Additional apparatus, systems, and methods are disclosed. | 08-19-2010 |
20140281121 | Managing the Write Performance of an Asymmetric Memory System - Some implementations include a method of managing a hosted non-volatile random-access memory (NVRAM) based storage subsystem that includes NVRAM devices. The method includes: receiving, at a device driver on the host computing device, write requests each requesting to write a respective unit of data to the NVRAM-based storage subsystem; categorizing the write requests into subgroups of write requests, where write requests within respective subgroups are mutually exclusive; ascertaining a load condition of each of several of the NVRAM devices of the NVRAM-based storage subsystem; identifying a target location on at least one NVRAM device to service a particular subgroup of write requests according to the ascertained load conditions of the NVRAM devices of the NVRAM-based storage subsystem; and servicing the particular subgroup of write requests by writing the corresponding units of data to the identified target location on the at least one NVRAM device of the NVRAM-based storage subsystem. | 09-18-2014 |
20140281133 | MANAGING THE WRITE PERFORMANCE OF AN ASYMMETRIC MEMORY SYSTEM - Some implementations include a method of managing a hosted non-volatile random-access memory (NVRAM) based storage subsystem that includes NVRAM devices. The method includes: receiving, at a device driver on the host computing device, write requests each requesting to write a respective unit of data to the NVRAM-based storage subsystem; categorizing the write requests into subgroups of write requests, where write requests within respective subgroups are mutually exclusive; ascertaining a load condition of each of several of the NVRAM devices of the NVRAM-based storage subsystem; identifying a target location on at least one NVRAM device to service a particular subgroup of write requests according to the ascertained load conditions of the NVRAM devices of the NVRAM-based storage subsystem; and servicing the particular subgroup of write requests by writing the corresponding units of data to the identified target location on the at least one NVRAM device of the NVRAM-based storage subsystem. | 09-18-2014 |
20140281152 | Managing the Write Performance of an Asymmetric Memory System - Some implementations include a method of managing a hosted non-volatile random-access memory (NVRAM) based storage subsystem that includes NVRAM devices. The method includes: receiving, at a device driver on the host computing device, write requests each requesting to write a respective unit of data to the NVRAM-based storage subsystem; categorizing the write requests into subgroups of write requests, where write requests within respective subgroups are mutually exclusive; ascertaining a load condition of each of several of the NVRAM devices of the NVRAM-based storage subsystem; identifying a target location on at least one NVRAM device to service a particular subgroup of write requests according to the ascertained load conditions of the NVRAM devices of the NVRAM-based storage subsystem; and servicing the particular subgroup of write requests by writing the corresponding units of data to the identified target location on the at least one NVRAM device of the NVRAM-based storage subsystem. | 09-18-2014 |
20140304456 | MEMORY APPARATUS AND METHODS THEREOF FOR PREVENTING READ ERRORS ON WEAK PAGES IN A NON-VOLATILE MEMORY SYSTEM - A memory apparatus and methods are provided for preventing read errors on weak pages in a non-volatile memory system. In one example, a method includes identifying a weak page in a non-volatile memory device along a word line, wherein the weak page is partially written with at least some data; buffering data associated with the weak page to a weak page buffer that is coupled in communication with the non-volatile memory device; determining that an amount of data in the weak page buffer has reached a predetermined data level; and writing the data from the weak page buffer into the weak page along the word line in the non-volatile memory device. | 10-09-2014 |
20140304560 | SHUTDOWNS AND DATA RECOVERY TO AVOID READ ERRORS WEAK PAGES IN A NON-VOLATILE MEMORY SYSTEM - A memory apparatus and methods are provided for preventing read errors on weak pages in a non-volatile memory system. In one example, a method includes identifying a weak page in a non-volatile memory device along a word line, wherein the weak page is partially written with at least some data; buffering data associated with the weak page to a weak page buffer that is coupled in communication with the non-volatile memory device; determining that an amount of data in the weak page buffer has reached a predetermined data level; and writing the data from the weak page buffer into the weak page along the word line in the non-volatile memory device. | 10-09-2014 |
Patent application number | Description | Published |
20120297488 | Discovering Malicious Input Files and Performing Automatic and Distributed Remediation - The subject disclosure is directed towards detecting malware or possible malware in an input file by allowing the input file to be opened, and by monitoring for one or more behaviors corresponding to the open file that likely indicate malware. Only certain executable files and/or file types opened thereby may be monitored, with various collected event data used for antimalware purposes when improper behavior is observed. Example behaviors include writing of a file to storage, generation of network traffic, injection of a process, running of script, and/or writing system registry data. Telemetry data and/or a sample of the file may be sent to an antimalware service, and malware remediation may be performed. Data (e.g., the collected events) may be distributed to other nodes for use in antimalware detection, e.g., to block execution of a similar file. | 11-22-2012 |
20120317644 | Applying Antimalware Logic without Revealing the Antimalware Logic to Adversaries - The subject disclosure is directed towards a technology by which antimalware detection logic is maintained and operated at a backend service, with which a customer frontend machine communicates (queries) for purposes of malware detection. In this way, some antimalware techniques are maintained at the backend service rather than revealed to antimalware authors. The backend antimalware detection logic may be based upon feature selection, and may be updated rapidly, in a manner that is faster than malware authors can track. Noise may be added to the results to make it difficult for malware authors to deduce the logic behind the results. The backend may return results indicating malware or not malware, or return inconclusive results. The backend service may also detect probing-related queries that are part of an attempt to deduce the unrevealed antimalware detection logic, with noisy results returned in response and/or other actions taken to foil the attempt. | 12-13-2012 |
20130086683 | SELECTIVELY SCANNING OBJECTS FOR INFECTION BY MALWARE - Techniques are described herein that are capable of selectively scanning objects for infection by malware (i.e., to determine whether one or more of the objects are infected by malware). For instance, metadata that is associated with the objects may be reviewed to determine whether update(s) have been made with regard to the objects since a determination was made that the objects were not infected by malware. An update may involve increasing a number of the objects, modifying one of the objects, etc. Objects that have been updated (e.g., added and/or modified) since the determination may be scanned. Objects that have not been updated since the determination need not necessarily be scanned. For instance, an allowance may be made to perform operations with respect to the objects that have not been updated since the determination without first scanning the objects for infection by malware. | 04-04-2013 |
20130185799 | TRUSTED INSTALLATION OF A SOFTWARE APPLICATION - The trust reputation of the combination of an installation package and installer, as a pair, and the combination of a file and an installer, as a pair, is used to store the identity of a file in a persistent cache. An entry in the persistent cache indicates the trust worthiness of a file that does not contain malware thereby avoiding a scan of the file for malware. The trust worthiness of a file may be determined from known trust reputations of the installation package, installer, and file from a network of computing resources. By relying on the known trust reputation of the combination of the installation package and installer and the combination of the file and installer, the identity of the file may be stored in persistent cache quickly. | 07-18-2013 |