Patent application number | Description | Published |
20090188304 | METHOD FOR OPERATING A COUETTE DEVICE TO CREATE AND STUDY EMULSIONS - A method for generating and characterizing an emulsion. The method provides a Couette device having first and second cylindrical members that define an annulus between them. The second cylindrical member is rotatably driven with respect to the first cylindrical member. Two or more substances each in a non-emulsified state are injected into the annulus. The Couette device is operated in a first mode to generate an emulsion from the two or more substances. The Couette device is also operated in a second mode to measure various attributes of the emulsion. | 07-30-2009 |
20110106456 | MATERIAL WETTABILITY CHARACTERIZATION AND CHEMICAL ADDITIVE EVALUATION - Methods and related systems are described for determining a property of a solid material relating to wettability, and for evaluating chemical additives. A solid particle is positioned at an interface between a lighter fluid phase, such as oil, and a denser fluid phase, such as water. An external force is applied, preferably with a centrifuge, so as to urge the solid particle into the denser fluid phase. An observation is made as to whether the particles has passed through the denser fluid phase, and based on the observation the contact angle is calculated. The calculation is also based on the densities of each fluid phase, of the solid material, the amount of the external force applied, size of the solid material, and interfacial tension between the two phases. The calculation also preferably accounts for two curvatures representing the interface between the first phase and the second phase as deformed by the solid material. | 05-05-2011 |
20140316722 | Method and Apparatus for Characterizing Interfacial Tension between Two Immiscible or Partially Miscible Fluids - An apparatus (and method) for characterizing interfacial tension between a non-wetting phase fluid and a wetting phase fluid of a slug flow employs a capillary structure that is configured to contain a slug of the non-wetting phase fluid of the slug flow. The slug has a leading edge meniscus and a trailing edge meniscus, and the capillary structure has a venturi-like section. A pressure sensor is configured to measure differential pressure between first and second locations of the capillary structure. The first location is disposed upstream of the leading edge meniscus of the slug with the leading edge meniscus of the slug contained within the venturi-like section. The second location is disposed downstream of the trailing edge meniscus of the slug. Data processing means is configured to derive a measure of interfacial tension based upon the differential pressure measured by the pressure sensor and, optionally, geometry of the capillary structure. | 10-23-2014 |
Patent application number | Description | Published |
20090083855 | System and methods for detecting intrusions in a computer system by monitoring operating system registry accesses - A method for detecting intrusions in the operation of a computer system is disclosed which comprises gathering features from records of normal processes that access the files system of the computer, such as the Windows registry, and generating a probabilistic model of normal computer system usage based on occurrences of said features. The features of a record of a process that accesses the Windows registry are analyzed to determine whether said access to the Windows registry is an anomaly. A system is disclosed, comprising a registry auditing module configured to gather records regarding processes that access the Windows registry; a model generator configured to generate a probabilistic model of normal computer system usage based on records of a plurality of processes that access the Windows registry and that are indicative of normal computer system usage; and a model comparator configured to determine whether the access of the Windows registry is an anomaly. | 03-26-2009 |
20090254992 | SYSTEMS AND METHODS FOR DETECTION OF NEW MALICIOUS EXECUTABLES - A system and methods for detecting malicious executable attachments at an email processing application of a computer system using data mining techniques. The email processing application may be located at the server or at the client or host. The executable attachments are filtered from said email, and byte sequence features are extracted from the executable attachment. The executable attachments are classified by comparing the byte sequence feature of the executable attachment to a classification rule set derived from byte sequence features of a data set of known executables having a predetermined class in a set of classes, e.g., malicious or benign. The system is also able to classify executable attachments as borderline when the difference between the probability that the executable is malicious and the probability that the executable is benign are within a predetermined threshold. The system can notify the user when the number of borderline attachments exceeds the threshold in order to refine the classification rule set. | 10-08-2009 |
20100169970 | SYSTEM AND METHODS FOR DETECTING MALICIOUS EMAIL TRANSMISSION - A system and methods of detecting an occurrence of a violation of an email security policy of a computer system. A model relating to the transmission of prior emails through the computer system is defined which is derived from statistics relating to the prior emails. For selected emails to be analyzed, statistics concerning the selected email are gathered. Such statistics may refer to the behavior or other features of the selected emails, attachments to emails, or email accounts. The determination of whether a violation of an email security policy has occurred is performed by applying the model of prior email transmission to the statistics relating to the selected email. The model may be statistical or probabilistic. A model of prior email transmission may include grouping email recipients into cliques. A determination of a violation of a security policy may occur if email recipients for a particular email are in more than one clique. | 07-01-2010 |
20130031633 | System and methods for adaptive model generation for detecting intrusion in computer systems - A system and methods for detecting intrusions in the operation of a computer system comprises a sensor configured to gather information regarding the operation of the computer system, to format the information in a data record having a predetermined format, and to transmit the data in the predetermined data format. A data warehouse is configured to receive the data record from the sensor in the predetermined data format and to store the data in a SQL database. A detection model generator is configured to request data records from the data warehouse in the predetermined data format, to generate an intrusion detection model based on said data records, and to transmit the intrusion detection model to the data warehouse according to the predetermined data format. A detector is configured to receive a data record in the predetermined data format from the sensor and to classify the data record in real-time as one of normal operation and an attack based on said intrusion detection model. A data analysis engine is configured to request data records from the data warehouse according to the predetermined data format and to perform a data processing function on the data records. | 01-31-2013 |
20130239210 | SYSTEM AND METHODS FOR DETECTING MALICIOUS EMAIL TRANSMISSION - A system and methods of detecting an occurrence of a violation of an email security policy of a computer system. A model relating to the transmission of prior emails through the computer system is defined which is derived from statistics relating to the prior emails. For selected emails to be analyzed, statistics concerning the selected email are gathered. Such statistics may refer to the behavior or other features of the selected emails, attachments to emails, or email accounts. The determination of whether a violation of an email security policy has occurred is performed by applying the model of prior email transmission to the statistics relating to the selected email. The model may be statistical or probabilistic. A model of prior email transmission may include grouping email recipients into cliques. A determination of a violation of a security policy may occur if email recipients for a particular email are in more than one clique. | 09-12-2013 |
20150058982 | Methods of unsupervised anomaly detection using a geometric framework - A method for unsupervised anomaly detection, which are algorithms that are designed to process unlabeled data. Data elements are mapped to a feature space which is typically a vector space | 02-26-2015 |
20150058994 | SYSTEM AND METHODS FOR ADAPTIVE MODEL GENERATION FOR DETECTING INTRUSION IN COMPUTER SYSTEMS - A system and methods for detecting intrusions in the operation of a computer system comprises a sensor configured to gather information regarding the operation of the computer system, to format the information in a data record having a predetermined format, and to transmit the data in the predetermined data format. A data warehouse is configured to receive the data record from the sensor in the predetermined data format and to store the data in a SQL database. A detection model generator is configured to request data records from the data warehouse in the predetermined data format, to generate an intrusion detection model based on said data records, and to transmit the intrusion detection model to the data warehouse according to the predetermined data format. A detector is configured to receive a data record in the predetermined data format from the sensor and to classify the data record in real-time as one of normal operation and an attack based on said intrusion detection model. A data analysis engine is configured to request data records from the data warehouse according to the predetermined data format and to perform a data processing function on the data records. | 02-26-2015 |