会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 85. 发明授权
    • Integrated cooling, heating, and power systems
    • 集成冷却,加热和电力系统
    • US08739560B2
    • 2014-06-03
    • US12529695
    • 2008-03-06
    • Ting Wang
    • Ting Wang
    • F25B15/00
    • F01K23/10F25B15/02F25B27/02Y02A30/274Y02B30/625Y02E20/14
    • One exemplary embodiment of this invention provides a single-effect absorption chiller including an absorber operatively connected to a solution heat exchanger and a generator, and a condenser in fluid communication with the absorber, wherein the absorber is sized and configured to receive a feed of water from a source of water and to transfer heat to the feed of water and then to convey the feed of water to the condenser without further heat conditioning of the feed of water prior to its entry into the condenser, and wherein the condenser is sized and configured to receive the feed of water from the absorber and to transfer heat to the feed of water, thereby cooling the condenser without resorting to an external heat exchanger such as a conventional cooling tower.
    • 本发明的一个示例性实施例提供了一种单效吸收式制冷机,其包括可操作地连接到溶液热交换器和发生器的吸收器,以及与吸收器流体连通的冷凝器,其中吸收器的尺寸和构造适于接收水的进料 来自水源并且将热量传递到水的进料,然后将水的进料输送到冷凝器,而不需要在进入冷凝器之前对水进料进行进一步的热调节,并且其中冷凝器的尺寸和构造 以从吸收器接收水的供给并将热量传递到水的供给,从而冷却冷凝器而不使用诸如常规冷却塔的外部热交换器。
    • 87. 发明申请
    • PREDICTING ATTACKS BASED ON PROBABILISTIC GAME-THEORY
    • 基于概率游戏理论预测攻击
    • US20130318616A1
    • 2013-11-28
    • US13487774
    • 2012-06-04
    • Mihai ChristodorescuDmytro KorzhykReiner SailerDouglas L SchalesMarc Ph StoecklinTing Wang
    • Mihai ChristodorescuDmytro KorzhykReiner SailerDouglas L SchalesMarc Ph StoecklinTing Wang
    • G06F21/00
    • G06F21/00G06F21/552G06Q10/06375H04L63/1408H04L63/20
    • Systems for determining cyber-attack target include a network monitor module configured to collect network event information from sensors in one or more network nodes; a processor configured to extract information regarding an attacker from the network event information, to form an attack scenario tree that encodes network topology and vulnerability information including a plurality of paths from known compromised nodes to a set of potential targets, to calculate a likelihood for each of the paths, to calculate a probability distribution for the set of potential targets to determine which potential targets are most likely pursued by the attacker, to calculate a probability distribution over a set of nodes and node vulnerability types already accessed by the attacker, and to determine a network graph edge to remove that minimizes a defender's expected uncertainty over the potential targets; and a network management module configured to remove the determined network graph edge.
    • 用于确定网络攻击目标的系统包括被配置为从一个或多个网络节点中的传感器收集网络事件信息的网络监视器模块; 处理器,其被配置为从网络事件信息中提取关于攻击者的信息,以形成将网络拓扑和脆弱性信息编码的攻击场景树,所述攻击场景树包括从已知的受损节点到一组潜在目标的多个路径,以计算每个 的路径,以计算潜在目标集合的概率分布,以确定攻击者最有可能追查哪些潜在目标,以计算攻击者已经访问的一组节点和节点漏洞类型的概率分布,以及 确定一个网络图边缘去除,使防守者对潜在目标的预期不确定性最小化; 以及被配置为去除所确定的网络图边缘的网络管理模块。