Total recall--System support for automated availability management
资讯检索系统测试集之比较
Cranfield II (Continued) Cranfield II測試集中相關判斷建立四個步驟
首先請提出查詢問題的建構者對 文件後所附之引用及參考文獻進 行相關判斷
為了避免前述過程仍有遺漏,又 利用文獻耦合的概念計算文件間 之相關性,發掘更多的可能相關 文件。若有兩篇以上的文獻共同 引用了一篇或多篇論文,則稱這 些文獻間具有耦合關係。
< to p > <head> Tipster Topic D escription <num > N um ber: 037 <dom > D om ain: Science and Technology <title> Topic: Identify SA A com ponents <desc> D escription: D ocum ent identifies softw are products w hich adhere to IB M 's S A A standards. <narr> N arrative:
N /A
N /A N /A N /A N /A
N /A
多 主 題 N /A 法 文
N /A
多主題 2 1 日文
N /A
多主題 2 1 日文
Cranfield II
01
比較33種不同索引方式之檢索效益
02
蒐集1400篇有關太空動力學的文件(摘要形式)
03
請每位作者根據這些文件與其當時研究的主題提出問題,經篩選後產 生200餘個查詢問題
4 9 .8 資 訊 科 學 N /A 英 文
3 .1 2 0 .0 1 0 0Biblioteka 7 .22 2 .4
Autodesk Nastran 2023 参考手册说明书
FILESPEC ............................................................................................................................................................ 13
DISPFILE ............................................................................................................................................................. 11
File Management Directives – Output File Specifications: .............................................................................. 5
BULKDATAFILE .................................................................................................................................................... 7
FANUC America Corporation CNC 产品介绍说明书
FANUC America Corporation3900 W. Hamlin RoadRochester Hills, MI 48309Tel: 888-FANUC-US (888-326-8287)FOR IMMEDIATE RELEASE FOR IMTS 2014FANUC INTRODUCES CNC INNOVATIONS THAT IMPROVEMACHINING PERFORMANCE, EASE OF USE AND MAINTENANCEAT IMTS 2014, BOOTH #S-8919ROCHESTER HILLS, MI – (June 25, 2014) FANUC America Corporation introducesCNC innovations that improve machining performance, ease of use and maintenance at IMTS 2014 Booth #S-8919. These include: introduction of the new Series 0i-F CNCwith new commonality of design and 15” display option, a new CNC platform with built in Bluetooth technology and digital servo adapter with new EtherCAT interface.FANUC’s new Series 0i -F CNC is the latest generation of the world’s most popular and best value Series 0i CNC that now has commonality of design to the versatile Series 30i CNC and a 15” display opt ion. The Series 0i-F boasts common operability,maintainability and networking options as the Series 30i CNC along with having a highly compatible PMC ladder. This translates to easier operation and maintenance across the plant floor. The seamless combination of using the same motors, amplifiers,peripheral devices (safety machine operator’s panel, I/O module/unit, iPendant,interface unit for handy machine operator’s panel) as the Series 30i further simplifies the ease of use and maintenance of the Series 0i-F. Seamless and common PMCfunctions among both the 0i-F and 30i-B CNCs include: multi-path PMC, ladder dividing management, function block, multi-language comment and I/O Link i. With anincreased axis number of 9 total controlled axes for a 1 path system for both 0i-MD (milling) and 0i-TD (turning) and a 2 path system now available on the 0i-MF with 11 total controlled axes, the Series 0i-F is more versatile to improve machiningperformance. Additional new features on the Series 0i-F include: 15” display, I/O Link i, FSSB high speed rigid tapping, function for loader control, tolerance control, axis name expansion, program folder management, quick program restart, flexible path axisassignment, multi-path PMC function, ladder dividing management, EtherNet/IP and PROFINET.FANUC’s new standard CNC platform allows for enhanced CNC functionality using PC technology. Built in Bluetooth on the CNC allows for the use of wireless technology that can operate a CNC by keyboard or mouse. So, via remote desktop it is possible totransfer data between a tablet and CNC. Advanced PC applications such as CAD/CAM or NCGuide are now available on the CNC remotely without leaving the machine. This improves functionality and use of the CNC. Other new feature s of FANUC’s newstandard CNC platform include: enhanced 3D graphics with MANUAL GUIDE i, new data server with larger storage and use of peripheral devices such as keyboard and mouse.FANUC’s Digital Servo Adapter with new EtherCAT interface adds more p ower to applications needing high-speed and high-accuracy. The Digital Servo Adapter allows for FANUC servo motors to be run from a separate controller over EtherCat. From 1 to 8 axes can be controlled, including a spindle interface and multiple large servo motors –up to 3 large servo motors at a time for industrial machines. The Digital Servo Adapter can replace hydraulic and other brand servo drives with high accuracy and high performance FANUC servo motors. The EtherCat interface is ideal for industrial machines such as: servo press machines, wire saw machines and electric injection molding machines.About FANUC CORPORATIONFANUC CORPORATION, headquartered at the foot of Mt. Fuji, Japan, is the most innovative manufacturer of Factory Automation, Robots and Robomachines in the world. Since its inception in 1956, FANUC has contributed to the automation of machine tools as a pioneer in the development of computer numerical control equipment. FANUC technology has contributed to a worldwide manufacturing revolution, which evolved from the automation of a single machine to the automation of entire production lines.About FANUC America CorporationFANUC America Corporation provides industry-leading robotics, CNC systems and factory automation solutions, and has annual sales in excess of $1B. FANUC’s innovative technologies and proven expertise help manufacturers in the Americas maximize efficiency, reliability and profitability.For more information about FANUC America Corporation, please call: 888-FANUC-US (888-326-8287) or visit our website: . Also, connect with us on YouTube, Twitter, Facebook, Google+ and LinkedIn. FANUC America is headquartered at 3900 W. Hamlin Road, Rochester Hills, MI 48309, and is a subsidiary of FANUC CORPORATION in Japan. FANUC America has facilities in: Atlanta; Boston; Charlotte; Chicago; Cincinnati; Cleveland; Dallas; Indianapolis; Los Angeles; Minneapolis; Montreal; Pine Brook, NJ; San Francisco; Toronto; Buenos Aires, Argentina; Sao Paulo, Brazil; and Aguascalientes, Mexico City and Monterrey, Mexico.FANUC America Corporation - CNC PR contact:Jill JozwikMarketing ManagerFANUC America CorporationT: 847-898-5673E: ****************************Caption:FANUC introduces CNC innovations that improve machining performance, ease of use and maintenance at IMTS 2014 Booth #S-8919.。
惠普彩色激光打印机 Pro M454 和惠普彩色激光多功能一体机 Pro M479 维修手册说明书
Table -1 Revision history Revision number 1
Revision date 6/2019
Revision notes HP LaserJet Pro M454 HP LaserJet Pro MFP M479 Repair manual initial release
Additional service and support for HP internal personnel HP internal personnel, go to one of the following Web-based Interactive Search Engine (WISE) sites: Americas (AMS) – https:///wise/home/ams-enWISE - English – https:///wise/home/ams-esWISE - Spanish – https:///wise/home/ams-ptWISE - Portuguese – https:///wise/home/ams-frWISE - French Asia Pacific / Japan (APJ) ○ https:///wise/home/apj-enWISE - English ○ https:///wise/home/apj-jaWISE - Japanese ○ https:///wise/home/apj-koWISE - Korean ○ https:///wise/home/apj-zh-HansWISE - Chinese (simplified)
Find information about the following topics ● Service manuals ● Service advisories ● Up-to-date control panel message (CPMD) troubleshooting ● Install and configure ● Printer specifications ● Solutions for printer issues and emerging issues ● Remove and replace part instructions and videos ● Warranty and regulatory information
dnbc4tools的调用 -回复
dnbc4tools的调用-回复如何使用dnbc4tools进行自动驾驶的开发与测试?自动驾驶是当今科技发展的热点领域之一,它为人们的出行带来了许多便利。
为了开发和测试自动驾驶系统,许多工具和框架被开发出来,其中dnbc4tools是一个非常强大和实用的工具。
本文将介绍如何使用dnbc4tools进行自动驾驶的开发与测试。
第一步:安装和配置dnbc4tools首先,我们需要从dnbc4tools的官方网站下载并安装该工具。
安装完成后,配置dnbc4tools的环境变量,以便在任何位置都可以访问它。
第二步:准备开发和测试环境在使用dnbc4tools之前,我们需要准备好开发和测试环境。
首先,确保你的计算机上安装了Python和相关的依赖项,这些依赖项可以从dnbc4tools的官方文档中找到。
其次,我们需要一个适当的硬件环境,如车辆模拟器或真实车辆。
如果你使用的是车辆模拟器,则需要安装和配置模拟器的环境。
第三步:使用dnbc4tools进行开发一旦我们完成了环境的准备,我们就可以开始使用dnbc4tools进行开发了。
dnbc4tools提供了许多功能和模块,可以帮助我们开发自动驾驶系统。
下面是一些核心模块和它们的功能:1. 数据集处理:dnbc4tools可以帮助我们处理和管理自动驾驶系统所需要的数据集。
它提供了数据集的读取、存储和预处理的功能。
2. 算法开发:dnbc4tools提供了许多常用的算法和模型,如路径规划、障碍物检测和目标跟踪等。
我们可以使用这些算法和模型来开发自动驾驶系统的各个模块。
3. 控制和仿真:dnbc4tools可以与模拟器或真实车辆进行通信,控制车辆行驶,并提供仿真环境用于测试和调试。
4. 可视化和数据分析:dnbc4tools提供了可视化工具和数据分析功能,帮助我们查看和分析自动驾驶系统的输出和性能。
在使用dnbc4tools进行开发时,我们需要熟悉这些核心模块的使用方法,并根据项目的需求进行相应的开发和调试。
freesurfer的recon-all命令使用方法 -回复
freesurfer的recon-all命令使用方法-回复Freesurfer是一个被广泛用于研究神经影像学的软件套件,它主要用于处理和分析结构磁共振成像(MRI)数据。
其中,recon-all是Freesurfer 中最常用的命令之一,主要用于将原始MRI数据转化为三维大脑模型,并提取各种形态学指标(如皮层厚度、灰质体积等)。
本文将详细介绍recon-all命令的使用方法,并逐步解释每个参数的作用。
希望这篇文章能够帮助读者更好地了解和使用Freesurfer中的recon-all命令。
recon-all命令的基本语法如下:shellrecon-all -i <input.mgz> -s <subject_id> -sd <subject_dir> [optional arguments]下面将逐个解释这个命令的各个参数和可选参数的作用。
1. `-i <input.mgz>`:输入MRI图像文件的路径。
在使用recon-all之前,我们需要准备好原始MRI图像数据,通常为.mgz格式。
这个参数用于指定输入图像文件的路径。
2. `-s <subject_id>`:主题ID的名称。
这个参数用于指定处理的主题(被试)的ID,它可以是任意的字符串,建议使用具有描述性的名称,方便后续对数据的管理和识别。
3. `-sd <subject_dir>`:主题目录的路径。
这个参数用于指定主题目录的路径,Freesurfer将在这个目录中保存所有的处理结果和中间文件。
以上三个参数是recon-all命令的必需参数,接下来我们将介绍一些常用的可选参数。
4. `-all`:运行全部的处理步骤。
通过使用此参数,recon-all将执行从预处理到后处理的所有步骤,包括大脑切割、配准、脑皮层厚度估计等。
这是使用recon-all的最简单方式,但是需要注意,这个命令可能需要较长时间运行,特别是对于较大的数据集。
萨福铝焊机说明书
B - 安装调试 ............................................................................................................10 1. 拆除包装 .......................................................................................................10 2. 送丝机连接...................................................................................................10 3. 主电源的电路连接 .....................................................................................10 4. 焊枪的连接...................................................................................................10
中文
目录
安全说明 .....................................................................................................................2
A - 总体介绍 ...............................................................................................................7 1. 装置简介 .........................................................................................................7 2. 焊接设备组成 ................................................................................................7 3. 前面板描述.....................................................................................................8 4. 选配件..............................................................................................................8 5. OPTIPULS i / i W技术规格 .............................................................................8 6. 尺寸和重量.....................................................................................................9 7. 冷却装置的技术规格......................................................................................9
MSA2000简易管理手册v1.1_20140315
Created by Jeff,2014/3/15
Front panel components............................................................................. 23 Disk drive bay numbers .............................................................................. 24 Rear panel view – controller module .......................................................... 24 Rear panel components.............................................................................. 25 P2000 6Gb 3.5 12-drive enclosure .............................................................. 25 MSA2000 3Gb 3.5 12-drive enclosure ......................................................... 26 P2000G3 iSCSI .................................................................................................................27 Front panel components............................................................................. 27 Disk drive bay numbers .............................................................................. 28 Rear panel views – controller modules ....................................................... 28 Rear panel components.............................................................................. 29 P2000 6Gb 3.5 12-drive enclosure .............................................................. 30 MSA2000 3Gb 3.5 12-drive enclosure ......................................................... 30 P2000G3 SAS...................................................................................................................31 Front panel components............................................................................. 31 Disk drive bay numbers .............................................................................. 32 Rear panel view – controller module .......................................................... 32 Rear panel components.............................................................................. 33 P2000 6Gb 3.5 12-drive enclosure .............................................................. 33 MSA2000 3Gb 3.5 12-drive enclosure ......................................................... 34 2. MSA2000 管理方式............................................................................................................35
endroid 参数 -回复
endroid 参数-回复在此文章中,我们将逐步回答关于[endroid 参数]的问题。
endroid 是一个模块化机器学习框架,用于自然语言处理(NLP)任务。
它提供了许多参数可供使用,以帮助用户根据他们的特定需求对模型进行调整。
在本文中,我们将深入研究一些常用的endroid 参数,并详细解释它们的功能和使用方法。
1. batch_size(批处理大小)batch_size 参数确定每个训练步骤中要处理的样本数量。
较大的批处理大小可以提高训练速度,但可能会导致内存问题。
较小的批处理大小可能会减慢训练速度,但能更好地处理较大的数据集。
通常,合理的批处理大小是根据计算资源和数据集大小进行调整的。
2. learning_rate(学习速率)学习速率决定了模型参数更新的步长。
较高的学习速率可能导致训练不稳定和震荡,而较低的学习速率可能导致训练过慢。
对于不同的任务和数据集,需要进行学习速率的调优。
建议的做法是从一个较大的学习速率开始,并通过监控训练过程中的损失函数来进行调整,以找到一个合适的学习速率。
3. num_epochs(训练周期数)num_epochs 参数确定了训练数据集在模型中重复多少次。
一个周期是指模型遍历整个训练数据集一次。
训练周期数的选择取决于数据集的大小和复杂性。
通常,一个较大的数据集需要更多的训练周期,而一个较小的数据集可能只需要几个训练周期即可。
4. hidden_dim(隐藏层维度)hidden_dim参数表示模型中隐藏层的维度或大小。
隐藏层是神经网络模型的核心部分,负责提取数据中的特征。
较大的隐藏层维度可以容纳更多的特征信息,但也可能使模型过拟合。
因此,选择合适的隐藏层维度需要进行实验和调优。
5. dropout_rate(丢弃率)dropout_rate 参数决定模型中神经元被随机丢弃的比例。
它是一种正则化技术,有助于减少模型过拟合。
较高的丢弃率可以更强力地抑制过拟合,但也可能降低模型的拟合能力。
dlprof的使用命令 -回复
dlprof的使用命令-回复以下是有关使用dlprof的命令的详细介绍。
dlprof是一种性能分析工具,用于对深度学习模型进行分析和优化。
它可以帮助开发人员了解模型在不同层次上的运行情况,提供了有关模型性能瓶颈的信息。
使用dlprof命令,您可以收集关于模型运行的各种度量、参数和数据,以及对其进行分析和解释。
以下是使用dlprof的一些常用命令和示例:1. dlprof collect:此命令用于收集模型执行的度量和参数。
通过收集这些信息,您可以了解模型的整体性能,并识别潜在的优化机会。
例如,以下命令将收集模型执行的度量和参数,并将结果保存在profiling.json文件中:dlprof collect -o profiling.json python your_script.py2. dlprof analyze:此命令用于分析收集的度量和参数,并生成可视化报告。
通过分析报告,您可以更深入地了解模型的性能特征,并确定性能瓶颈。
例如,以下命令将分析profiling.json文件,并生成一个名为report.html的报告:dlprof analyze -i profiling.json -o report.html在报告中,您可以查看模型的整体性能指标,如运行时间、内存使用等。
您还可以查看每个层次的性能统计信息,并根据需要进行进一步的分析和优化。
3. dlprof visualize:此命令用于可视化模型执行的度量和参数。
它提供了一种直观的方式来查看模型的性能特征,并帮助您发现潜在的优化机会。
例如,以下命令将可视化profiling.json文件,并生成一个名为visualization.html的可视化报告:dlprof visualize -i profiling.json -o visualization.html在可视化报告中,您可以使用交互式的图表和图像来查看模型的性能特征。
您可以通过缩放和选择特定的时间窗口来更详细地查看性能瓶颈。
罗克威尔自动化工业电脑 - 增强写滤镜(EWF)和休眠一次唤醒多次(HORM)配置实用程序说明书
Technical DataEWF and HORM Configuration Utility for Rockwell Automation Industrial ComputersAbout This Publication This publication provides instructions on how to use the Enhanced Write Filter(EWF) and Hibernate Once/Resume Many (HORM) configuration utility. Thisutility is available only on these Rockwell Automation industrial computers thatcome with the Windows Embedded Standard 2009 (WES 2009) operatingsystem:•6155F compact non-display computers•6181F integrated display computersY ou can view or download this publication at/literature.About the EWF and HORM Utility EWF protects a volume from write access by caching writes to another location. This helps extend the life of solid state media and can help reduce possible corruption to the operating system due to unplanned power outages. HORM allows the system to boot from a hibernation file while EWF is enabled.For more information on EWF and HORM, go to the Microsoft website at .Managing EWF EWF can be managed on the run-time image in these two ways:•Rockwell Automation EWF/HORM configuration utility•Microsoft EWFMGR command line utilityThe EWF/HORM configuration utility provides commonly used features of theMicrosoft EWFMGR utility and an easy to use graphical interface.For more information about managing EWF with the EWMGR command lineutility, see the Microsoft website at .2 EWF and HORM Configuration Utility for Rockwell Automation Industrial ComputersStart the Utility The EWF/HORM configuration utility is pre-installed on all WES 2009 imagesand can be found as ‘EWFHORM Utility.exe’ in C:\ProgramFiles\EWFHORM Utility\. A shortcut has been provided for the initialadministrator logon.T o start the utility, double-click the EWFHORM utility shortcut.The shortcut loads the utility and displays this dialog box.TIP Only users with administrator rights can make changes to theEWF/HORM utility.Field Descriptions FieldDescription Overlay Type Displays the current mode of EWF. RAM (Reg) is the only mode supported on Rockwell Automation WES 2009 images and cannot be changed. This mode caches all writes to the physical random access memory (RAM) and the configuration information is stored in the system registry.Protected Drive Displays the volume protected by EWF. This will default to C: and cannot be changed on the run-time image.Overlay Level Some EWF configurations can allow multiple overlays. The RAM (Reg) mode allows only a single overlay and cannot be changed.Available RAM Displays the amount of physical RAM available to the system.EWF can attempt to allocate more physical RAM than is installed on the computer. The system can become unstable and unresponsive if the amount of physical RAM is too low. See Commit Changes to Disk for methods to free up physical RAM.For instructions on adding more RAM, see your computer’s user manual.EWF Status Displays the current status of the EWF. For more information on managing EWF, see the following sections.Overlay SizeDisplays the current size of the overlay size. This must be less than the amount of available RAM or else the system can become unstable. For more information on managing the overlay size, see the following sections.EWF and HORM Configuration Utility for Rockwell Automation Industrial Computers 3Enable EWF The factory image comes with EWF in the disabled state.Follow these steps to enable EWF.1.Click Enable.2.Click Yes to enable EWF.Enabling EWF requires a system restart.3.Click Yes to restart.HORM StatusDisplays the current status of HORM. This is enabled by default. For more information on managing HORM, see Enable HORM and Disable HORM .Hibernate Hibernates the system.HORM must be enabled for the system to hibernate. If hibernation is not enabled on the system, the Hibernate button will put the system into standby.Reboot Restarts the system.CloseCloses the application. Minimizing the application at any time will then display an icon in the system tray.Field DescriptionsFieldDescription TIP Enable is unavailable if EWF is already enabled.4 EWF and HORM Configuration Utility for Rockwell Automation Industrial ComputersOnce EWF is enabled, the status screen displays Enabled.Disable EWF The following method is used to clear the contents of the overlay and disableEWF for RAM (Reg) overlay types.Please see Commit Changes to Disk if you would like to commit changes inaddition to disabling EWF.Follow these steps to disable EWF.1.Click Disable.2.Click Yes to disable EWF.Disabling the EWF requires a system restart.3.Click Yes to restart.4.Once the system restarts, start the utility.5.Click Commit/Disable EWF to complete the disable process.TIP Disable is unavailable if EWF is already disabled.EWF and HORM Configuration Utility for Rockwell Automation Industrial Computers 5This will make sure the overlay is empty and immediately disable EWF.No restart is necessary after this step.6.Click Yes to commit/disable EWF.The EWF state will then change to disabled and all RAM utilized for the overlay will be returned to the operating system.Commit Changes to Disk All changes to a system are lost on a power outage or restart while EWF isenabled, unless they are committed to disk.Follow these steps to commit changes to disk.1.Click Commit.ATTENTION: Enabling EWF for long periods of time can fill theRAM overlay. The system will become unstable if changes are notcommitted to disk or restarted before the physical RAM isdepleted.If the overlay continually becomes full, examine your applications’use of RAM or consider adding more RAM to your system.For more information about adding RAM to your system, see yourcomputer’s user manual.TIP Commit is unavailable if EWF is not enabled.6 EWF and HORM Configuration Utility for Rockwell Automation Industrial Computers2.Click Yes to commit changes. Commiting changes requires a system restart.3.Click Yes to restart.The changes will be committed and EWF will remain enabled once the system restart. Commit Changes and Disable EWF Follow these steps to commit changes and disable EWF.1.Click Commit/Disable EWF.2.Click Yes to commit/disable EWF.No restart is necessary after this step. The changes will be written to diskand EWF will be in a disabled state.TIP The Commit/Disable EWF button is unavailable if EWF is not enabled.EWF and HORM Configuration Utility for Rockwell Automation Industrial Computers 7Enable HORMFollow these steps to enable HORM.1.Click Enable.2.Click Yes to enable HORM. 3.Click Yes to restart. Disable HORM Follow these steps to disable HORM.1.ClickDisable . 2.Click Yes to disable HORM.TIP Enable is unavailable if HORM is already enabled.TIP Disable is unavailable if HORM is disabled.Allen-Bradley, Rockwell Software, Rockwell Automation, and TechConnect are trademarks of Rockwell Automation, Inc.Trademarks not belonging to Rockwell Automation are property of their respective companies.Rockwell Otomasyon Ticaret A.Ş., Kar Plaza İş Merkezi E Blok Kat:6 34752 İçerenköy, İstanbul, T el: +90 (216) 5698400Publication 6000-TD003A-EN-P - April 2010Copyright © 2010 Rockwell Automation, Inc. All rights reserved. Printed in the U.S.A.3.Click Yes to restart.。
诺基亚智能手机使用指南说明书
C
Capacities Chart .................... 344, 346 Carbon Monoxide Hazard .............. 52 Carrying Cargo .............................. 202 Cassette Player
Charging System Indicator .... 58, 328 Checklist, Before Driving............. 206 Child Safety ...................................... 20 Child Seats........................................ 25
Before Driving ............................... 191 Belts, Seat ..................................... 8, 41 Beverage Holder............................ 101 Body Repair .................................... 310
Maintenance............................... 279 Usage .................................. 111, 117 Air Outlets (Vents)................ 110, 115 Air Pressure, Tires ........................ 282 Alcohol in Gasoline........................ 350 Aluminum Wheels, Cleaning........ 305 Antifreeze ....................................... 253 Anti-lock Brakes (ABS) Indicator................................ 59, 219 Operation .................................... 218 Anti-theft, Audio System............... 179 Anti-theft Steering Column Lock .. 76
nuscenes指标nds -回复
nuscenes指标nds -回复其中括号内的主题是"Nuscenes指标NDS"。
在自动驾驶技术的发展中,评估和比较不同系统的性能是至关重要的。
Nuscenes (nuTonomy scenes)指标NDS (nuScenes Detection and Segmentation)是一个用于评估目标检测和分割算法的指标。
本文将逐步回答关于Nuscenes指标NDS的一些问题。
问题1:什么是Nuscenes指标NDS?Nuscenes指标NDS是nuScenes数据集的官方评估指标,用于评估目标检测和分割算法。
nuScenes是一个大规模的自动驾驶数据集,包含来自一个广泛城市环境的高分辨率传感器数据。
NDS评估指标可以帮助研究人员和开发者衡量自动驾驶系统在不同场景和条件下的性能。
问题2:NDS如何进行评估?NDS评估主要分为两个步骤:目标检测和实例分割。
在目标检测阶段,算法将预测的边界框与真实的边界框进行比较,并计算不同IoU (Intersection over Union)阈值下的准确率。
在实例分割阶段,算法将预测的分割掩码与真实的分割掩码进行比较,并计算平均交并比(Mean Intersection over Union, MIoU)。
问题3:NDS指标的计算公式是什么?Nuscenes指标NDS的计算公式如下所示:NDS = 0.5 * NDS_{detection} + 0.5 * NDS_{segmentation}其中,NDS_{detection}表示目标检测指标,NDS_{segmentation}表示实例分割指标。
问题4:目标检测指标的计算公式是什么?目标检测指标的计算公式为:NDS_{detection} = AP_{0.5} + AP_{0.7} + AP_{0.9}其中,AP_{0.5}、AP_{0.7}和AP_{0.9}分别代表IoU阈值为0.5、0.7和0.9时的平均准确率(Average Precision)。
HP Latex R2000 Plus 打印机用户手册说明书
DatasheetHP Latex R2000 Plus PrinterUnprecedented quality and colors on rigid up to 98 inches, for sustained production environments1Achieve amazing colors and media look and feelHelp increase profitability with higher value rigid and flexible applications with vibrant HP Latex gamut.Gain versatility with HP Latex Ink—fromindoor/outdoor signage to thermoforming and high-quality decoration.Win more jobs with UL ECOLOGO® Certified,water-based HP Latex Inks that produce odorless prints.Expand your offering with the glossiest white Expand your portfolio into a wide range of applications with glossiest white that resists yellowing.No waste between white jobs with removable HP Thermal Inkjet printheads stored in offline rotating chamber.You’re always ready to print white—automatic recirculation and printhead cleaning eliminate manual purging.Increase your productivity with smart printingMeet production peaks—get high-speed quality up to 28 outdoor boards/hr with belt system,smart vacuum.Drive high productivity with multi-board printing,assisted loading, and advanced queuing.Maximize uptime with automatic maintenance and smart service tools for fast diagnosis and issue resolution.Maintain control of your production and costs with the help of HP PrintOS software tools.31145For more information, please visit /go/LatexR2000Join the community, find tools, and talk to experts. Visit the HP Latex Knowledge Center at https:///Dynamic security enabled printer. Only intended to be used with cartridges using an HP original chip. Cartridges using a non-HP chip may not work, and those that work today may not work in the future. More at: /go/learnaboutsuppliesGlossiest white based on internal HP testing in January, 2018 compared to the HP Scitex FB750/FB550 Printer using UV-curable ink technology. White ink measured for the level of gloss at 60 degrees on a rigid material(acrylic). Tested using Glossmeter BYK micro-TRI-gloss (20°, 60°, 85°), compatible with ISO 2813 and ASTM D523 relative to glossiness measure. High opacity and resists yellowing over time based on internal HP WeatherOmeter testing October , 2017 with 1 dot-per-pixel HP Latex Overcoat, on a range of rigid and flexible unlaminated substrates. Yellowing based on L * and B* of white underflood samples.Most vibrant colors based on internal HP testing, January 2018 compared to leading competitive printers under $350,000 USD. Tested in High Quality print mode on rigid (white acrylic 12-pass, 6-color , 120%). Internal HP testing with HP GamutViewer , Alpha Shapes=50000.HP Latex Inks are UL ECOLOGO® Certified. UL ECOLOGO® Certification to UL 2801 demonstrates that an ink meets a range of multi-attribute, lifecycle based criteria related to human health and environmental considerations (see /EL). There is a broad set of media with very different odor profiles. Some of the media can affect the odor performance of the final print. When HP 886 White Latex Printheads are placed in the storage cassettes, no white ink is used for servicing when printheads are not in use. Outdoor mode 3-pass, 70%. On 4 x 8 ft (1.2 x 2.4 m) boards.12345Datasheet | HP Latex R2000 Plus Printer© Copyright 2020 HP Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services.Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.4AA7-2574EEP ap-en March 2020Technical specificationsPrintPrinting modes22 m²/hr - Indoor High Quality (12p 120%)43 m²/hr - Indoor Production (6p 110%)86 m²/hr - Outdoor (3p 70%)36 m²/hr - White Spot (100%)16 m²/hr - White Overflood/Underflood (100%)5.2 m²/hr - 3 layers day & night Print resolution Up to 1200 x 1200 dpi Ink types Water-based HP Latex InksInk cartridges 9 (cyan, magenta, yellow, black, light cyan, light magenta, HP Latex Optimizer , HP Latex Overcoat, white)Cartridge size 5 L (colors, HP Latex Optimizer , HP Latex Overcoat); 3 L (white)Printheads8 (cyan/black, magenta/yellow, light cyan/light magenta, HP Latex Overcoat, 2 HP Latex Optimizer , 2 white)Long-term print-to-print repeatabilityAverage ≤ 1.0 dE2000, 95% of colors ≤ 2 dE2000MediaHandling Flatbed, sheet feed, roll feed, vacuum belt media drive for easy loading and accurate media advance Media typesRigid substrates: paper foamboard, plastic foamboard, PVC foam, plastic corrugated, acrylic, polycarbonate,polystyrene, compressed cardboard, corrugated board, honeycomb board, aluminum composite panel, wood,glass, ceramic; Roll substrates: PVC banner , self-adhesive vinyl, coated paper , polypropylene, polystyrene,polycarbonate, polyester , textile (non porous), canvas, leatherRigid media size 297 x 420 mm to 2489 x 1220 mm (up to 2489 x 3050 mm with two sets of optional extension tables)Roll size 60.9 cm to 2.49 m Roll weight Up to 100 kg Roll diameter Up to 25 cm ThicknessUp to 50.8 mmshort-run customized packaging, prototypingConnectivityInterfacesGigabit Ethernet (1000Base-T)Printer 5.10 x 2.04 x 1.75 m (printer); 5.10 x 3.64 x 1.75 m (including standard input and output tables)Shipping 5.32 x 2.24 x 2.15 m Operating area8.7 x 7.23 x 3 mPrinter 1600 kg Shipping2800 kgPrintheads; HP Latex Printhead Cleaning Kit; standard input and output tables; foot switch; HP Internal PrintServer and displays (x2); printer maintenance kit; warranty and intro docsOperating temperature 15 to 30ºCOperating humidity20 to 70% RH (non-condensing)Consumption10 to 12 kW (typical)CertificationSafetyIEC 60950-1+A1+A2 compliant; United States and Canada (CSA listed); EU (LVD and MD compliant, EN60950-1,EN12100-1, EN ISO13849-1, EN60204-1, and EN1010-1); Russia, Belarus and Kazakhstan (EAC); Australia,New Zealand (RCM)Electromagnetic Compliant with Class A requirements, including: USA (FCC rules), Canada (ICES), EU (EMC Directive), Australia (ACMA), New Zealand (RSM)EnvironmentalWEEE; RoHS (EU, China, Korea, Singapore, Turkey, Ukraine); India Waste Management Rules; REACH; CA 65Prop; ErP Ecodesign DirectiveOrdering informationProductK0Q46AHP Latex R2000 Plus PrinterAccessoriesD9Z41B HP Large Format Onyx Thrive RIP Software L5E74C HP Large Format Caldera Grand RIP Software T7V23A HP Latex R2000 Extension Tables Y6V16AHP Latex R Series Edge Holders KitOriginal HP printing suppliesG0Z00A HP 886 Latex Printhead Cleaning Kit G0Z09A HP 886 3-liter White Latex Ink Cartridge G0Z10A HP 882 5-liter Cyan Latex Ink Cartridge G0Z11A HP 882 5-liter Magenta Latex Ink Cartridge G0Z12A HP 882 5-liter Yellow Latex Ink Cartridge G0Z13A HP 882 5-liter Black Latex Ink CartridgeG0Z14A HP 882 5-liter Light Cyan Latex Ink Cartridge G0Z15A HP 882 5-liter Light Magenta Latex Ink Cartridge G0Z16A HP 882 5-liter Optimizer Latex Ink Cartridge G0Z17A HP 882 5-liter Overcoat Latex Ink Cartridge G0Z21A HP 886 White Latex Printhead G0Z22A HP 886 Optimizer Latex Printhead G0Z24AHP 886 Latex PrintheadOriginal HP large format printing materialsHP Premium Removable Gloss Adhesive Vinyl HP Permanent Gloss Adhesive VinylHP Durable Backlit Fabric (Take-back program)HP Backlit Polyester Film (Take-back program)For the entire HP Large Format Printing Materials portfolio, please see .2WM39A/K0Q45-67267 HP Latex R Series Uptime Kit 2WM40A/K0Q45-67269 HP Latex R Series Expert Kit 2WP87A/K0Q45-67268 HP Latex R Series Reseller Kit K0Q45-67272 HP Latex R Series Service Maintenance KitK0Q45-67273 HP Latex R Series White Service Maintenance KitECO highlightsBetter for print operations—no hazard warning labels or HAPs, no special ventilation needed Better for the environment—HP designs end-to-end sustainability into large-format printingWater-based inks produce odorless prints HP Latex Inks are UL ECOLOGO® and UL GREENGUARD GOLD Certified Please recycle large-format printing hardware and printing supplies. Find out how at our website: /ecosolutionsContains no Hazardous Air Pollutants according to EPA Method 311. Special ventilationequipment (air filtration) is not required to meet U.S. OSHA requirements. Special ventilation equipment installation is at the discretion of the customer—see the Site Preparation Guide for details. Customers should consult state and local requirements and regulations. Contains no Hazardous Air Pollutants according to EPA Method 311.There is a broad set of media with very different odor profiles. Some of the media can affect the odor performance of the final print.UL ECOLOGO® Certification to UL 2801 demonstrates that an ink meets a range of multi-attribute, lifecycle based criteria related to human health and environmental considerations (see /EL). UL GREENGUARD GOLD Certification to UL 2818 demonstrates that products are certified to UL 's GREENGUARD standards for low chemical emissions into indoor air during product usage. For more information, visit /gg or .Print speed may vary due to the adaptive printing mechanism to avoid image quality defects. Reflective measurements on a 943 color target under CIE standard illuminant D50, and according to the standard CIEDE2000 as per CIE Draft Standard DS 014-6/E:2012. Backlit substrates measured in transmission mode may yield different results. Recyclable HP papers can be recycled through commonly available recycling programs, or according to region-specific practices. Some HP media are eligible for return through the HP Large Format Media take-back program. Programs may not exist in your area. See /hp/ecosolutions for details.1233123123123。
focas2 备份和还原机床参数 -回复
focas2 备份和还原机床参数-回复备份和还原机床参数是机床维护和管理中非常重要的任务之一。
在操作机床时,有时会遇到需要重新设置、更改或恢复出厂设置的情况,这时备份和还原参数就显得至关重要。
下面将详细介绍备份和还原机床参数的步骤。
第一步:备份机床参数1. 确定备份数据的存储位置:备份数据通常存储在机床控制系统的存储设备(如硬盘、U盘等)中,可以根据实际需求选择适当的存储设备。
2. 进入机床参数备份界面:打开机床控制系统的操作界面,通常有一个“参数备份”或类似的选项,点击进入备份界面。
3. 选择备份类型:一般有自定义备份和全备份两种类型。
自定义备份可以选择需要备份的参数,而全备份则会备份所有参数。
根据实际需求选择相应的备份类型。
4. 开始备份:点击“开始备份”按钮,系统会开始备份参数。
备份时间因机床参数的大小和数量而异,一般需要数分钟到数十分钟。
5. 备份完成:备份完成后,系统会显示备份成功的提示信息。
此时,备份的参数已经保存在存储设备中,可以进行下一步的操作。
第二步:还原机床参数1. 确定还原数据的来源:还原数据通常来源于之前备份的参数数据。
将存储备份参数的设备连接到机床控制系统中。
2. 进入机床参数还原界面:同样,在机床控制系统的操作界面中点击“参数还原”或类似选项,进入还原界面。
3. 选择还原类型:通常有自定义还原和全还原两种类型。
自定义还原可以选择需要还原的参数,而全还原会还原所有参数。
根据实际需求选择相应的还原类型。
4. 开始还原:点击“开始还原”按钮,系统会开始还原参数。
还原时间也因参数的大小和数量而异,一般也需要数分钟到数十分钟。
5. 还原完成:还原完成后,系统会显示还原成功的提示信息。
此时,机床的参数已经被还原为之前备份的状态,可以进行下一步的操作。
备份和还原机床参数的重要性备份和还原机床参数的目的是为了在需要时能够方便地恢复到之前的设置或出厂设置。
以下是备份和还原机床参数的重要性:1. 防止设置丢失:在操作机床过程中,参数的设置可能会被误操作或错误设置,导致机床性能下降或无法正常工作。
V90 的一键优化功能
V90 的一键优化功能
V90伺服驱动器推出了一键自动优化以及实时自动优化的功能以简化对于伺服系统优化方面的调试工作,很大程度上降低了伺服系统的调试难度。
通过优化解决运行中震动、异响应等问题使伺服系统发挥出卓越的性能。
使用一键自动优化的前提条件:
1、机械负载惯量比未知,需要进行估算。
2、电机在顺时针和逆时针方向上均可旋转。
3、电机旋转位置(p29027 定义一圈为 360 度)在机械允许的范围之内。
对于带绝对值编码器的电机:位置限制由 p29027 决定,至少为180°
对于带增量式编码器的电机:在优化开始时必须允许电机有两圈的自由旋转,P29027至少为720°
可通过以下3种方法实现一键优化:
(1) 通过调试软件优化,操作步骤如下图
(2) 通过BOP面板设置参数进行一键优化,操作步骤如下图
(3) 通过博途软件中的驱动调试进行优化(必须使用V90 PN 的 HSP组态),操作步骤如下图:
常问问题
V90一键优化失败如何解决?
首先确认参数P29027电机旋转角度设置是否正确:
•绝对值编码器,P29027至少为180度;
•增量编码器,P29027至少为720度。
如果空载时一键优化成功,而带载时失败,请在一键优化高级设置中,取消勾选P29023的BIT2转动惯量评估器,并在参数P29022中手动输入转动惯量比。
驱动器掉电后再上电优化效果丢失?
一键优化成功后请进行Copy RAM to ROM的操作,否则驱动器参数掉电后不会保存;
电机运行中震动、异响应等问题怎么办?
请对驱动器进行一键自动优化,如设备不能进行自动优化请减小速度环的比例增益。
2700-5500中文用户操作手册
服务
MAHA Maschinenbau Haldenwang GmbH & Co. KG - Service Dept. Hoyen 20 D-87490 Haldenwang/Allgäu Hotline: +49 (0) 8374-585 + extension 260 for brake testers, test lanes 280 for automotive lifts 290 for dynamometers, exhaust and air conditioning service equipment +49 (0) 8374-585-110, -111, -112, -113, -115 +49 (0) 8374-585-491
诊断型底盘测功机
FPS 2700 / 5500
用于乘用车和轻卡,最大轴重 2,700 / 5,500 kg
操作手册
D1 3907BA1-GB01
FPS 2700 / 5500
版本
第一版:2005-05-19 D1 3907BA1-GB01 软件: FPS 版本高于 V1.08.001 ASM H8 版本高于 V2.50
1.1 1.2
概述 ................................................................................................................................................ 1 技术规格 .... ................................................................................................................................ 2 1.2.1 滚筒 ................................................................................................................................. 2 1.2.2 计算机最低配置(到2005年3月) .................................................................................. 2 噪声 ................................................................................................................................................. 2 键盘描述 ......................................................................................................................................... 3 测量程序 ......................................................................................................................................... 5 基本计算公式 .................................................................................................................................. 6 1.6.1 驱动阻力 ......................................................................................................................... 6 1.6.2 扭矩 ................................................................................................................................. 7 1.6.3 标准功率计算公式 ........................................................................................................... 7 1.6.4 汽油发动机功率转换公式 ................................................................................................ 8 1.6.5 柴油发动机功率转换公式................................................................................................. 9 1.6.6 涡轮增压发动机功率转换公式 ....................................................................................... 10 1.6.7 计算发动机因子fm......................................................................................................... 11
自动升级工具(AUT)发布说明 December 2012 v9.3.2说明书
Automated Upgrade ToolAUT Release Notesv9.3.2Part No. E28708-01December 2012Copyright and TrademarksCopyright © 1995, 2012, Oracle and/or its affiliates. All rights reserved.This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing.If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable:U.S. GOVERNMENT RIGHTSPrograms, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). Oracle USA, Inc., 500 Oracle Parkway, Redwood City, CA 94065.This software is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications which may create a risk of personal injury. If you use this software in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy and other measures to ensure the safe use of this software. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software in dangerous applications.Oracle and Java are registered trademarks of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners.This software and documentation may provide access to or information on content, products and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third party content, products and services. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third party content, products or services. The RMW product includes software developed by the Visigoth Software Society.C ONTENTSCopyright and Trademarks (2)Chapter 1 Agile PLM Automated Upgrade Tool (1)Downloading the Software (1)Maintenance and Updates (2)Chapter 2 What's New (1)Supported Agile PLM Upgrade Paths (1)Merged Hotfixes (2)Supported Agile Advantage Upgrade Paths (3)Resolved Issues (3)Known Issues (3)Check Snap Material Views Utility Runs Twice (3)Existing Dashboards No Longer Work (3)Upgrade Criteria Contains All Is Changed to Contains Any (3)Markup Restrictions Not Retained on Upgrade (3)Performance Issue - Delete SQL for Notification fields (3)AUT Throws Error if Destination Version is 9.2 or 9.2.x (4)PrefaceOracle's Agile PLM documentation set includes Adobe® Acrobat PDF files. The Oracle Technology Network (OTN) Web site /technetwork/documentation/agile-085940.html contains the latest versions of the Agile PLM PDF files. You can view or download these manuals from the Web site, or you can ask your Agile administrator if there is an Agile PLM Documentation folder available on your network from which you can access the Agile PLM documentation (PDF) files.Note To read the PDF files, you must use the free Adobe Acrobat Reader version 9.0 or later.This program can be downloaded from the Adobe Web site .The Oracle Technology Network (OTN) Web site/technetwork/documentation/agile-085940.html can be accessed through Help > Manuals in both Agile Web Client and Agile Java Client. If you need additional assistance or information, please contact My Oracle Support (https://) for assistance.Note Before calling Oracle Support about a problem with an Agile PLM manual, please have the full part number, which is located on the title page.TTY Access to Oracle Support ServicesOracle provides dedicated Text Telephone (TTY) access to Oracle Support Services within the United States of America 24 hours a day, 7 days a week. For TTY support, call 800.446.2398. Outside the United States, call +1.407.458.2479.ReadmeAny last-minute information about Agile PLM can be found in the Readme file on the Oracle Technology Network (OTN) Web site /technetwork/documentation/agile-085940.html.Agile Training AidsGo to the Oracle University Web page/education/chooser/selectcountry_new.html for more information on Agile Training offerings.Accessibility of Code Examples in DocumentationScreen readers may not always correctly read the code examples in this document. The conventions for writing code require that closing braces should appear on an otherwise empty line; however, some screen readers may not always read a line of text that consists solely of a bracket or brace.This documentation may contain links to Web sites of other companies or organizations that Oracle does not own or control. Oracle neither evaluates nor makes any representations regarding the accessibility of these Web sites.Chapter 1 Agile PLM Automated Upgrade Tool This chapter includes the following:▪Downloading the Software (1)▪Maintenance and Updates (2)▪What's New (1)▪Resolved Issues (3)▪Known Issues (3)The Automated Upgrade Tool (AUT) upgrades your Agile PLM database using the inputs you provide in a property file. It completes the upgrade using your existing database as the source database, and the newly created database as the destination database. For detailed information on the upgrade process using the AUT, refer to the Agile PLM Database Upgrade Guide. Downloading the SoftwareThe Automated Upgrade Tool is distributed with each Agile major release and subsequent service pack releases. The software can be downloaded from Oracle Software Delivery Cloud, or My Oracle Support.To download the software from Oracle Software Delivery Cloud():1. On the Oracle Software Delivery Cloud Welcome page, choose your language and clickContinue.2. Enter required information on the Export Validation screen and click Continue.3. On the Search screen, select Oracle Agile Applications in the Select a Product Pack drop-down listbox. Select a platform value. Click Go.4. Links to applicable Agile release downloads display. Select the appropriate link. Click Continue.5. The Download screen displays release parts that can be downloaded, including customerguides. Click Download for the appropriate media pack.6. Extract the contents of the media pack. The Agile PLM Database Installer is included with theAgile PLM software.7. To download the database installer, navigate to the DB_Installer folder. DB installers for allplatforms are made available within the DB_Installer folder, regardless of the operating system on which you have chosen to install Agile PLM.8. To download the AUT software, navigate to the AUT folder within the Deployment_Tools folder.From the AUT folder, extract the contents of the AUT.zip file to your destination database server.After the AUT is extracted, all of the files are located in an AUT directory on the local drive. In this document, this directory is referred to as the AUT_HOME.AUT Release NotesTo download only the AUT software from My Oracle Support (https://):1. Log in to My Oracle Support.2. Under Patches & Updates, click Product or Family (Advanced Search).1. Select the Include all products in a family checkbox.2. Enter the following search parameters:▪Product : Oracle Agile Applications▪Release : Agile PLM Tools 9▪Platform : Select the appropriate platform, for example, Microsoft Windows (32-bit).3. Click Search.4. Links to Averify and AUT are displayed in the search results.5. Select the Patch ID and click Download.3. From the Patchset zip file, extract the contents of the AUT.zip file to your destination databaseserver. After the AUT is extracted, all of the files are located in an AUT directory on the local drive. In this document, this directory is referred to as the AUT_HOME.Maintenance and UpdatesBefore you upgrade your database, you should always make sure you are using the latest version of the AUT. Changes to scripts such as averify may occur after the initial version has been released. To ensure your database is correctly upgraded, always check the My Oracle Support (https://) web site for updates.Chapter 2 What's NewThis chapter includes the following:▪Supported Agile PLM Upgrade Paths (1)▪Supported Agile Advantage Upgrade Paths (3)This chapter introduces additional upgrade paths and enhancements in release 9.3.2. Supported Agile PLM Upgrade PathsUpgrade of your Agile PLM database to version 9.3.2 is supported from any of the earlier versions listed below:▫Agile 9.3.1.2▫Agile 9.3.1.1▫Agile 9.3.1▫Agile 9.3.0.2▫Agile 9.3.0.1▫Agile 9.3▫Agile 9.2.2.7▫Agile 9.2.2.6▫Agile 9.2.2.5▫Agile 9.2.2.4▫Agile 9.2.2.3▫Agile 9.2.2.2▫Agile 9.2.2.1▫Agile 9.2.2▫Agile 9.2.1.6▫Agile 9.2.1.5▫Agile 9.2.1.4▫Agile 9.2.1.3▫Agile 9.2.1.1▫Agile 9.2.1▫Agile 9.2.0.2AUT Release Notes▫Agile 9.2.0.1▫Agile 9.2▫Agile 9.1 SP1-SP4▫Agile 9.0 SP1-SP7▫Program Execution 8.5 SP2▫Product Service and Improvement 8.5 SP1-SP7▫Product Cost Management 8.5 SP1▫Product Collaboration 8.5 SP1-SP7Merged HotfixesUpgrade is supported from any of the hotfixes merged to 9.3.2 listed here: 9302HF1269302HF149931HF63931HF66931HF69931HF73931HF74931HF759311HF959311HF1069311HF1079311HF1179311HF1379311HF1389311HF1399311HF1539311HF1569311HF1629311HF1779311HF1789312HF49312HF69312HF7Chapter 2: Agile PLM Automated Upgrade Tool9312HF89312HF109312HF329312HF42Supported Agile Advantage Upgrade PathsUpgrade of your Agile Advantage (AA) database to version 9.3.2 is supported from the following version only:AA 2006Resolved IssuesThe list of service requests (SRs) resolved in this release is provided here for your reference. Known IssuesThe list of known issues as of this release is provided here for your reference, along with workarounds, if any.Check Snap Material Views Utility Runs TwiceWhen you upgrade with SourceEqualsDestination parameter set to FALSE, the Check Snap Material Views Utility runs twice.Existing Dashboards No Longer WorkWhen upgrading to Agile PLM 9.3.1.2, rows in CRITERIA, QUERY and SELECT_LIST tables associated with dashboard queries are deleted.Resolution: Do not delete dashboard query rows during the upgrade.Upgrade Criteria Contains All Is Changed to Contains AnyCorrect all schema change errors to fix this issue.Markup Restrictions Not Retained on UpgradeMarkup restrictions that were enforced through privileges are not retained when you upgrade. With the new security model implemented in 9.2.2.2, Markup is a subclass under the File Folders class and all markup privileges are automatically enabled. To prevent users from viewing or modifying the existing markups, you must disable blanket privileges at File Folders class level in Java Client and enable Markup privilege for relevant users only.Performance Issue - Delete SQL for Notification fieldsThe SQL script to clean up deleted notifications takes too long to run on very large databases.AUT Release NotesAUT Throws Error if Destination Version is 9.2 or 9.2.xIf you select 9.2, 9.2.1 or 9.2.2 as the destination version for the upgrade, the database upgrades successfully but Averify may not run, and the log file may report the following error "Source database version and selected upgrade destination versions are same. Please change thedest.version in aut.properties file."You can ignore the error as it does not affect the upgrade. Run Averify manually to check for other errors.。
asam sovd标准解读
asam sovd标准解读
ASAM SOVD(Service-Oriented Vehicle Diagnostics,面向服务的车辆诊断)是一个灵活的标准,它提供了统一的访问HPC(High Performance Computing,高性能计算机)及其相关应用的诊断内容,以及经典的ECU (Electronic Control Unit,电子控制单元)等。
该标准旨在为所有诊断任务以及软件更新(跨车辆、车型)提供一个API(Application Programming Interface,应用程序编程接口)。
ASAM SOVD具有以下特性:
- 可覆盖传统诊断用例:数据访问、故障信息、控制内部软件功能。
- 可覆盖高性能计算相关的诊断用例:车辆软件升级、记录、访问系统信息、动态内容发现。
- 适用于远程、近程和车载应用场景。
- 支持最先进的IT技术(HTTP、REST、JSON、OAuth)。
- 诊断可以独立于诊断数据描述文件。
- 整个计算过程被封装,使无状态访问成为可能。
- 客户端实现不需要汽车特定的堆栈。
nvpmodel指令 -回复
nvpmodel指令-回复nvpmodel是英伟达公司为Jetson平台提供的一款配置功耗模式的实用工具。
Jetson是英伟达针对嵌入式应用的计算平台系列,广泛应用于无人驾驶、智能机器人、无人机等领域。
nvpmodel工具通过更改系统的功耗模式,以实现动态平衡系统性能与功耗之间的关系。
下面将逐步介绍nvpmodel指令的用途、指令的基本用法以及常用的功耗模式。
首先,我们来了解一下nvpmodel指令的用途。
nvpmodel可以帮助用户在Jetson平台上灵活控制系统的功耗与性能表现。
在应用开发、调试和产品部署等阶段,nvpmodel能够有效地优化系统的功耗和性能,找到最佳平衡点。
通过调整功耗模式,我们可以控制CPU和GPU的工作频率、核数以及电压等参数,以满足不同应用场景的需求。
nvpmodel指令的基本用法如下所示:nvpmodel -qnvpmodel -m [model]其中,`-q`选项用于查询当前的功耗模式,返回当前模式的编号。
`-m`选项后跟着功耗模式的编号,用于设置特定的功耗模式。
在Jetson平台上,有多种功耗模式可供选择,常见的功耗模式包括:- `0`:最大性能模式,所有CPU和GPU核心均工作在最高频率,功耗较高。
- `1`:动态功耗模式,系统在满足性能要求的前提下,尽可能降低功耗。
- `2`:最大效能模式,所有CPU和GPU核心工作在较高频率,功耗略高。
- `3`:最低功耗模式,所有CPU和GPU核心工作在较低频率,功耗最低,适用于资源受限的应用场景。
接下来,我们将使用nvpmodel指令在Jetson平台上设置不同的功耗模式,以感受不同模式下系统的性能与功耗的表现。
第一步,我们先查询当前的功耗模式,可以使用以下指令:nvpmodel -q假设返回结果为`2`,表示当前模式为最大效能模式。
接下来,我们将尝试将功耗模式切换到最低功耗模式。
第二步,我们执行以下指令将功耗模式设置为最低功耗模式:nvpmodel -m 3执行后,系统将切换到最低功耗模式,所有CPU和GPU核心将工作在较低频率,功耗最低。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Total Recall:System Support for Automated Availability Management Ranjita Bhagwan,Kiran Tati,Yu-Chung Cheng,Stefan Savage,and Geoffrey M.V oelker Department of Computer Science and EngineeringUniversity of California,San DiegoAbstractAvailability is a storage system property that is both highly desired and yet minimally engineered.While many systems provide mechanisms to improve availabil-ity–such as redundancy and failure recovery–how to best configure these mechanisms is typically left to the system manager.Unfortunately,few individuals have the skills to properly manage the trade-offs involved,let alone the time to adapt these decisions to changing con-ditions.Instead,most systems are configured statically and with only a cursory understanding of how the config-uration will impact overall performance or availability. While this issue can be problematic even for individual storage arrays,it becomes increasingly important as sys-tems are distributed–and absolutely critical for the wide-area peer-to-peer storage infrastructures being explored. This paper describes the motivation,architecture and implementation for a new peer-to-peer storage system, called TotalRecall,that automates the task of availability management.In particular,the TotalRecall system auto-matically measures and estimates the availability of its constituent host components,predicts their future avail-ability based on past behavior,calculates the appropriate redundancy mechanisms and repair policies,and delivers user-specified availability while maximizing efficiency. 1IntroductionAvailability is a storage system property that is highly de-sired in principle,yet poorly understood in practice.How much availability is necessary,over what period of time and at what granularity?How likely are failures now and in the future and how much redundancy is needed to tol-erate them?When should repair actions be initiated and how should they be implemented?These are all ques-tions that govern the availability of a storage system,but they are rarely analyzed in depth or used to influence the dynamic behavior of a system.Instead,system designers typically implement a static set of redundancy and repair mechanisms simply param-eterized by resource consumption(e.g.,number of repli-cas).Determining how to configure the mechanisms and what level of availability they will provide if employed is left for the user to discover.Moreover,if the underlying environment changes,it is again left to the user to re-configure the system to compensate appropriately.While this approach may be acceptable when failures are con-sistently rare,such as for the individual drives in a disk array(and even here the management burden may be ob-jectionable[23]),it quickly breaks down in large-scale distributed systems where hosts are transiently inaccessi-ble and individual failures are common.Peer-to-peer systems are particularly fragile in this re-spect as their constituent parts are in a continual state of flux.Over short time scales(1-3days),individual hosts in such systems exhibit highly transient availability as their users join and leave the system at will–frequently following a rough diurnal pattern.In fact,the majority of hosts in existing peer-to-peer systems are inaccessible at any given time,although most are available over longer time scales[4,19].Over still longer periods,many of these hosts leave the system permanently,as most peer-to-peer systems experience high levels of churn in their overall membership.In such systems,we contend that availability management must be provided by the system itself,which can monitor the availability of the underly-ing host population and adaptively determine the appro-priate resources and mechanisms required to provide a specified level of availability.This paper describes the architecture,design and im-plementation of a new peer-to-peer storage system,called TotalRecall,that automatically manages availability in a dynamically changing environment.By adapting the de-gree of redundancy and frequency of repair to the distri-bution of failures,TotalRecall guarantees user-specified levels of availability while minimizing the overhead needed to provide these guarantees.We rely on three key approaches in providing these services:Availability Prediction.The system continuously monitors the current availability of its constituent hosts.This measured data is used to construct pre-dictions,at multiple time-scales,about the future availability of individual hosts and groups of hosts.Redundancy Management.Short time-scale predic-tions are then used to derive precise redundancy re-quirements for tolerating transient disconnectivity.The system selects the most efficient redundancy mechanism based on workload behavior and system policy directives.Dynamic Repair.Long time-scale predictions cou-pled with information about current availability drive system repair actions.The repair policy is dy-namically selected as a function of these predictions, target availability and system workload. TotalRecall is implemented in C++using a modified version of the DHash peer-to-peer object location ser-vice[8].The system implements a variety of redun-dancy mechanisms(including replication and online cod-ing),availability predictors and repair policies.However, more significantly,the system provides interfaces that al-low new mechanisms and policies to describe their be-havior in a unified manner–so the system can decide how and when to best use them.The remainder of this paper describes the motivation, architecture and design of the TotalRecall system.The following section motivates the problem of availability management and describes key related work.In Section3 we discuss our availability architecture–the mechanisms and policies used to ensure that user availability require-ments are met.Sections4describes the design of the TotalRecall Storage System and its implementation.Sec-tion5describes the TotalRecall File System,a NFSfile service implemented on the core storage system.In Sec-tion6,we quantitatively evaluate the effectiveness of our system and compare it against existing approaches.Fi-nally,Section7concludes.2Motivation and Related Work The implicit guarantee provided by all storage systems is that data,once stored,may be recalled at some future point.Providing this guarantee has been the subject of countless research efforts over the last twenty years,and has produced a wide range of technologies ranging from RAID to robotic tape robots.However,while the effi-ciency of these techniques has improved over time and while the cost of storage itself has dropped dramatically, the complexity of managing this storage and its availabil-ity has continued to increase.In fact,a recent survey analysis of cluster-based services suggests that the op-erational cost of preparing for and recovering from fail-ures easily dominates the capital expense of the individ-ual hardware systems[17].This disparity will only con-tinue to increase as hardware costs are able to reflect ad-vances in technology and manufacturing while manage-ment costs only change with increases in human produc-tivity.To address this problem,the management burden required to ensure availability must be shifted from indi-vidual system administrators to the systems themselves. We are by no means thefirst to make this observation.A major source of our inspiration is early work in-vested by HP into their AutoRAID storage array[23].The AutoRAID system provided two implementations of storage redundancy–mirroring and RAID5–and dy-namically assigned data between them to optimize the performance of the current workload.While this sys-tem did not directly provide users with explicit con-trol over availability it did significantly reduce the management burden associated with configuring these high-availability storage devices.A later HP project, AFRAID,did allow user-specified availability in a disk array environment,mapping availability requests into variable consistency management operations[20].In the enterprise context,several researchers have re-cently proposed systems to automate storage manage-ment tasks.Keeton and Wilkes have described a sys-tem designed to automate data protection decisions that is similar in motivation to our own,but they focus on longer time scales since the expected failure distribution in the enterprise is far less extreme than in the peer-to-peer en-vironment[10].The WiND system is being designed to automate many storage management tasks in a cluster en-vironment,but is largely focused on improving system performance[2].Finally,the PASIS project is exploring system support to automatically make trade-offs between different redundancy mechanisms when building a dis-tributedfile system[24].Not surprisingly,perhaps the closest work to our own arises from the peer-to-peer(P2P)systems community. Due to the administrative heterogeneity and poor host availability found in the P2P environment,almost all P2P systems provide some mechanism for ensuring data availability in the presence of failures.For example,the CFS system relies on a static replication factor coupled with an active repair policy,as does Microsoft’s FAR-SITE system(although FARSITE calculates the replica-tion factor as a function of total storage and and is more careful about replica placement)[1,8,9].The Oceanstore system uses a combination of block-level erasure cod-ing for long term durability and simple replication to tol-erate transient failures[12,22].Finally,a recent paper by Blake and Rodrigues argues that the cost of dynamic membership makes cooperative storage infeasible in the transiently available peer-to-peer environments[5].This finding is correct under certain assumptions,but is not critical in the environments we have measured and the system we have developed.What primarily distinguishes TotalRecall from previ-ous work is that we allow the user to specify a specific availability target and then automatically determine the best mechanisms and policies to meet that request.In this way,TotalRecall makes availability afirst-class storage property–one that can be managed directly and without a need to understand the complexities of the underlying system infrastructure.3Availability ArchitectureThere are three fundamental parameters that govern the availability of any system:the times at which compo-nents fail or become unavailable,the amount of redun-dancy employed to tolerate these outages and the time to detect and repair a failure.Thefirst of these is usually considered an independent parameter of the system,governed primarily by the en-vironment and external forces not under programmatic control.1The remaining variables are dependent–they can be controlled,or at least strongly influenced,by the system itself.Therefore,providing a given level of avail-ability requires predicting the likelihood of component failures and determining how much redundancy and what kind of repair policies will compensate appropriately. The remainder of this section discusses the importance of these issues in turn,how they can be analyzed and how they influence system design choices.The following sec-tion then describes our concrete design and implementa-tion of this overall architecture.3.1Availability PredictionAt the heart of any predictive approach to availability is the assumption that past behavior can be used to create a stochastic model of future outcomes.For example,“mean-time-to-failure”(MTTF)specifications for disk drives are derived from established failure data for simi-lar components over a given lifetime.This kind of predic-tion can be quite accurate when applied to a large group of fail-stop components.Consequently,the future avail-ability of single homogeneous disk arrays can be stati-cally analyzed at configuration time.However,in a distributed storage system–particularly one with heterogeneous resources and administration–this prediction can be considerably more complex.First, since the hosts composing such systems are rarely identi-cal,the availability distribution cannot be analytically de-termined a priori–it must be measured empirically.Sec-ond,unlike disks,individual hosts in a distributed system are rarely fail-stop.Instead,hosts may be transiently un-available due to network outages,planned maintenance or other local conditions.Consequently,such hosts may become unavailable and then return to service without any data loss.Finally,as such systems evolve,the num-ber of hosts populating the system may grow or shrink–ultimately changing the availability distribution as well. Nowhere is this issue more pronounced than in the public peer-to-peer environment.In such systems,the availability of an individual host is governed not only by failures,but more importantly by user decisions to disconnect from the network.Several recent studies ofpotential transient failures.At the other extreme,opti-mal erasure codes are extremely efficient.For a constant factor increase in storage cost,an erasure-coded object can be recovered at any time using a subset of its con-stituent blocks.However,the price for this efficiency is a quadratic coding time and a requirement that reads and writes require an operation on the entire object.By com-parison,“non-optimal”erasure codes sacrifice some ef-ficiency for significantly reduced on-line complexity for largefiles.Finally,it is easy to conceive of hybrid strate-gies as well.For example,a large logfile written in an append-only fashion,might manage the head of the log using replication to provide good performance and even-tually migrate old entries into an erasure coded represen-tation for provide higher efficiency.However,for all of these representations another ques-tion remains:how much redundancy is required to de-liver a specified level of availability.More precisely: given an known distribution for short-term host availabil-ity and a target requirement for instantaneous data avail-ability,how should these mechanisms be parameterized?Below we provide analytic approximations to these ques-tions for pure replication and pure erasure coding.In both cases,our approach assumes that host failures are independent over short time scales.In previous work, we have provided a detailed explanation of our stochastic analysis and its assumptions[3],as well as experimental evidence to support our independence assumption[16]. Consequently,the TotalRecall system is not designed to survive catastrophic attacks or widespread network fail-ures,but rather the availability dynamics resulting from localized outages,software crashes,disk failures and user dynamics.Replication.Given a target level of availability (where represents the probability afile can be accessed at any time)and a mean host availability of,we can calculate the number of required replicas,,directly.(1) Solving for c,(5) More details on this equation’s derivation can be found in[3].For the same0.999level of availability used in the example above,an erasure-coded representation only requires a storage overhead of2.49.3.3Dynamic RepairHowever,the previous analyses only consider short-term availability–the probability that at a given instant there is sufficient redundancy to mask transient disconnections and failures.Over longer periods,hosts permanently leave the system and therefore the degree of redundancy afforded to an object will strictly decrease over time–ultimately jeopardizing the object’s availability.In re-sponse,the system must“repair”this lost redundancy by continuously writing additional redundant data onto new hosts.The two key parameters in repairingfile data are the degree of redundancy used to tolerate availability tran-sients and how quickly the system reacts to host depar-tures.In general,the more redundancy used to storefile data,the longer the system can delay before reacting to host departures.Below we describe a spectrum of repair policies de-fined in terms of two extremes:eager and lazy.Eager repair uses a smaller degree of redundancy to maintain file availability guarantees by reacting to host departures immediately,but at the cost of additional communication overhead.In contrast,lazy repair uses additional redun-dancy,and therefore additional storage overhead,to delay repair and thereby reduce communication overhead.3.3.1Eager RepairMany current research peer-to-peer storage systems maintain data redundancy pro-actively as hosts depart from the system.For example,the DHash layer of CFS replicates each block onfive separate hosts[8].When DHash detects that one of these hosts has left the system, it immediately repairs the diminished redundancy by cre-ating a new replica on another host.We call this approach to maintaining redundancy eager repair because the system immediately repairs the loss of redundant data when a host ing this policy,data only becomes unavailable when hosts fail more quickly than they can be detected and repaired.The primary advantage of eager repair is its simplicity. Every time a host departs,the system only needs to place redundant data on another host in reaction.Moreover,de-tecting host failure can be implemented in a completely distributed fashion since it isn’t necessary to coordinate information about which hosts have failed.However,the eager policy makes no distinction between permanent de-partures that require repair and transient disconnections that do not.Consequently,in public peer-to-peer en-vironments,many repair actions may be redundant and wasteful.In Section6we show via simulation that this overhead is very high for contemporary peer-to-peer host populations.3.3.2Lazy RepairAn alternative to eager repair is to defer immediate repair and use additional redundancy to mask and tolerate host departures for an extended period.2We call this approach lazy repair since the explicit goal is to delay repair work for as long as possible.The key advantage of lazy repair is that,by delaying action,it can eliminate the overhead of redundant repairs and only introduce new redundant blocks when availability is threatened.However,lazy repair also has disadvantages.In partic-ular,it must explicitly track the availability of individual hosts and what data they carry.This is necessary to de-termine when an object’s availability is threatened and a repair should be initiated.Consequently,the system must maintain explicit metadata about which hosts hold what data.By contrast,eager implementations can make use of the implicit mappings available through mechanisms like consistent hashing[8].For small objects,this can significantly increase the overhead of repair actions. For lazy repair,the system must incorporate additional redundancy forfiles so that it can tolerate host departures over an extended period.Hence while the analysis in the previous section gives us the short-term redundancy fac-tor used to tolerate transient failures,eachfile needs to(lazy repair)Figure1:TotalRecall system architecture.for maintaining data objects with specified target avail-ability guarantees.4.1System OverviewHosts in TotalRecall contribute disk resources to the sys-tem and cooperatively make stored data persistent and available.Figure1shows an overview of TotalRecall with participating hosts organized in a ring ID space.To-talRecall stores and maintains data objects,conveniently referred to asfiles.Files are identified using unique IDs. The system uses these IDs to associate afile with its mas-ter host,the host responsible for maintaining the persis-tence,availability,and consistency of thefile.Storage hosts persistently storefile data and metadata according to the repair policy the master uses to maintainfile avail-ability.Client hosts request operations on afile.Clients can send requests to any host in the system,which routes all requests on afile to its master.As a cooperative sys-tem,every TotalRecall host is a master for somefiles and storage host for others;hosts can also be clients,although clients do not need to be TotalRecall hosts.A TotalRecall server runs on every host in the system. As shown in Figure2,the TotalRecall host architecture has three layers.The TotalRecall Storage Manager han-dlesfile requests from clients and maintainsfile avail-ability for thosefiles for which it is the master.It uses the Block Store layer to read and write data blocks on storage hosts.The Block Store in turn uses an underly-ing distributed hash table(DHT)to maintain the ID space and provide scalable lookup and request routing.4.2Storage ManagerThe TotalRecall Storage Manager(TRSM)implements the availability architecture described in Section3.It hasthree components,thepolicy module,the availabil-ity monitor,and the redundancy engine(see Figure2). The TRSM invokes the policy module when clients create newfiles or substantially changefile characteris-tics such as size.The policy module determines the mostFigure2:TotalRecall host architecture.efficient strategy for maintaining stored data with a tar-get availability guarantee.The strategy is a combination of redundancy mechanism,repair policy,and number of blocks used to store coded data.It chooses the redun-dancy mechanism(e.g.,erasure coding vs.whole-file replication)based on workload characteristics such asfile size and the rate,ratio,and access patterns of read and write requests tofile data(Section3.4).The repair pol-icy determines how the TRSM maintains data availability over long-term time scales to minimize repair bandwidth for a target level of availability(Section3.3).Although redundancy and repair are orthogonal,for typical work-loads TotalRecall uses replication and eager repair for smallfiles and erasure coding and lazy repair for large files(Section6.3.1).Finally,with lazy repair the pol-icy module also determines the number of blocks to use with erasure coding to balancefile availability and com-munication overhead;more blocks increases availability but requires the TRSM to contact more storage hosts to reconstruct thefile[3].The TRSM dynamically adapts its mechanisms and policies for efficiently maintaining data according to the availability of hosts in the system.To do this,the avail-ability monitor(AM)tracks host availability,maintains host availability metrics that are used by other compo-nents,and notifies the redundancy engine when the sys-tem reaches availability thresholds that trigger repair. The AM tracks the availability of the storage hosts stor-ing the metadata and data for thosefiles for which it is the master.Based upon individual host availability,the AM maintains two metrics:short-term host availability and long-term decay rate(Section3.1).Short-term host availability measures the minimum average of all tracked hosts that were available at any given time in the past24 hours(e.g.,50%of hosts were available at4am).It is a conservative prediction of the number of hosts available over the course of a day.Long-term decay rate measures the rate at which hosts leave the system over days and weeks,and is used to predict the frequency of repair.Fi-nally,the TRSM registers to receive events from the AM whenever the availability of a set of storage hosts dropsbelow a specified threshold to trigger repairs. Whereas the policy module decides what kind of re-dundancy mechanism to use based upon high-level work-load characteristics,the redundancy engine(RE)imple-ments the redundancy mechanisms and determines how much short-term and long-term redundancy to use for a file based upon current system conditions.The TRSM invokes the redundancy engine when writing and repair-ingfiles.The RE currently supports simple replication and erasure coding.For replication,the RE uses Equa-tion2in Section3.2to determine the number of replicas to create when storing thefile.It uses the target avail-ability associated with thefile and the short-term host availability from the AM as inputs to the equation.For erasure coding,the RE uses Equation5to determine the short-term redundancy(also called repair threshold)for encoding thefile.It uses the target availability associ-ated with thefile,the short-term host availability from the AM,and the number of blocks determined by the policy module as inputs to the equation.4.3Storage LayoutFor everyfile,the TotalRecall Storage Manager uses in-odes as metadata to locatefile data and maintainfile at-tributes such as target availability,size,version,etc.It stores inodes for allfiles using replication and eager re-pair.The master stores inodes itself and a set of repli-cas on its successors,much like DHash blocks[8],and the redundancy engine determines the number of replicas (Section4.2).Figure1shows an example of storing an inode for a lazily repairedfile.The master updates in-odes in place,and it serializes all operations onfiles by serializing operations on their inodes(e.g.,a write does not succeed until all inode replicas are updated).The TRSM stores data differently depending upon the repair policy used to maintainfile availability.Forfiles using eager repair,the TRSM on the master creates a uniquefile data ID and uses the DHT to lookup the stor-age host responsible for this ID.It storesfile data on this storage host and its successors in a manner similar to in-odes.The inode for eagerly repairedfiles stores thefile data ID as a pointer to thefile data.Forfiles using lazy repair,the TRSM storesfile data on a randomly selected set of storage hosts(Section3.3.2). Figure1also shows how the master storesfile data for lazily repairedfiles.It stores the IDs of the storage hosts in thefile’s inode to explicitly maintain pointers to all of the storage hosts with thefile’s data.It also uses the redundancy engine to determine the number of storage hosts to use,placing one block(erasure coding)or replica (replication)per storage host.File data is immutable.When a client stores a new version of afile that is lazy repaired,for example,the TRSM randomly chooses a new set of storage hosts to store the data and updates thefile’s inode with pointers to these hosts.The TRSM uses the version number stored in the inode to differentiatefile data across updates.A garbage collection process periodically reclaims oldfile data,and a storage host can always determine whether itsfile data is the latest version by looking up the inode at the master(e.g.,when it joins the system again after being down).4.4Storage APIThe TotalRecall Storage Manager implements the stor-age API.The API supports operations for creating,open-ing,reading,writing,and repairingfiles,and similar op-erations for inodes.All request operations on afile are routed to and handled by thefile’s cking the space to detail all operations,we highlight the semantics of a few of them.Clients use trread returnsfile data by read-ing data from storage hosts,decoding erasure-coded data when appropriate.trrepair opera-tion for repairingfile data,although its execution is usu-ally only triggered internally by the availability manager. For eager repair,trrepair essentially has the semantics of afile read followed by a write onto a new set of hosts.4.5ConsistencySince the system maintains replicas of inodes and inodes are updated in place,the master must ensure that inode updates are consistent.In doing so,the system currently assumes no partitions and that the underlying DHT pro-vides consistent routing—lookups from different hosts for the same ID will return the same result.When writing,the master ensures that all data writescomplete before it updating the inode.The master writes all redundant data to the storage hosts,but does not start updating the inode until all the storage hosts have ac-knowledged their writes.If a storage host does fail during the write,the master will retry the write on another stor-age host.Until all data writes complete,all reads will see the older inode and,hence,the older version of thefile. As the master makes replicas of the inode on its succes-sors,it only responds that the write has completed after all successors have acknowledged their writes.Each in-ode stores a version number assigned by the master or-dered by write requests to ensure consistent updates to inode replicas.Once a successor stores an inode replica, eager repair of the inode ensures that the replica remains available.If the master fails as it updates inodes,the new master will synchronize inode versions with its succes-sors.If the master fails before acknowledging the write, the host requesting the write will time out and retry the write to thefile.A new master will assume responsibility for thefile,receive the write retry request,and perform the write request.As a result,once a write completes,i.e., the master has acknowledged the write to the requester, all subsequent reads see the newest version of thefile. 4.6ImplementationWe have implemented a prototype of the TotalRecall stor-age system on Linux in C++.The system consists of over 5,700semi-colon lines of new code.We have also reused existing work in building our system.We use the SFS toolkit[14]for event-driven programming and MIT’s Chord implementation as the underlying DHT[21].Files stored using eager repair use a modified version of the DHash block store[8].The prototype implements all components of the To-talRecall Storage Manager,although some advanced be-havior remains future work.The prototype policy module currently chooses the redundancy mechanism and repair policy solely based onfile size:files less than32KB use replication and eager repair,and largerfiles use erasure coding and lazy repair.For lazy repair,files are frag-mented into a minimum of32blocks with a maximum block size of64KB.To erasure code lazily repairedfiles, the redundancy engine implements Maymounkov’s on-line codes[13],a sub-optimal linear-time erasure-coding algorithm.The redundancy engine also uses a default constant long-term redundancy factor of4to maintain lazyfile availability during the repair period.The availability monitor tracks host availability by pe-riodically probing storage hosts with an interval of60 seconds.This approach has been sufficient for our exper-iments on PlanetLab,but would require a more scalable approach(such as random subsets[11])for tracking and disseminating availability information in large-scale de-ployments.The TRSM uses the probes to storage hosts for afile to measure and predict thatfile’s availability. Based upon storage host availability,the TRSM calcu-lates the amount of available redundancy for thefile.The available redundancy for thefile is the ratio of the total number of available data blocks(or replicas)to the to-tal number of data blocks(replicas)needed to read the file in its entirety.When this value drops below the re-pair threshold,the AM triggers a callback to the TRSM, prompting it to start repairing thefile.The prototype by default uses a repair threshold of2.With a long-term re-dundancy factor of4for lazy repair,for example,when half of the original storage hosts are unavailable the AM triggers a repair.In building our prototype,we have focused primarily on the issues key to automated availability management, and have not made any significant effort to tune the sys-tem’s runtime performance.Addressing run-time over-heads,as well as implementing more advanced perfor-mance and availability tradeoffs in the policy module,re-mains ongoing work.5TotalRecall File SystemThe TotalRecall Storage System provides a core storage service on which more sophisticated storage services can be built,such as backup systems,file-sharing services, andfile systems.We have designed one such service,the TotalRecall File System(TRFS),an NFSv3-compatible file system[7].To provide this service,the TotalRecall File System extends the Storage Manager with the TRFS Manager(see Figure2).The TRFS Manager extends the storage system withfile system functionality,implement-ing a hierarchical name space,directories,etc.It extends the TotalRecall Storage Manager with an interface that roughly parallels the NFS interface,translatingfile sys-tem operations(e.g.,mkdir)into lower-level TRSM op-erations.Clients use a TRFS loopback server to mount and ac-cess TRFSfile systems.The loopback server runs on the client as a user-levelfile server process that supports the NFSv3interface[14].It receives redirected NFS opera-tions from the operating system and translates them into RPC requests to TotalRecall.We have implemented TRFS as part of the TotalRecall prototype,adding2,000lines of code to implement the TRFS Manager and loopback server.It currently sup-ports all NFSv3operations except hard links.6Experimental EvaluationIn this section,we evaluate TotalRecall using both trace-driven simulation and empirical measurements of our prototype implementation.We use simulation to study the effectiveness of our availability predictions,the be-。