HERBVI - a program for simulation of baryon- and lepton- number violating processes
国家科技公司National Instruments的LabVIEW认证系列文档第一部分说明书
LabVIEW Certification OverviewThe National Instruments LabVIEW Certification Program consists of the following three certification levels:-Certified LabVIEW Associate Developer (CLAD)-Certified LabVIEW Developer (CLD)-Certified LabVIEW Architect (CLA)Each level is a prerequisite for the next level of certification.A CLAD demonstrates a broad and complete understanding of the core features and functionality available in the LabVIEW Full Development System and possesses the ability to apply that knowledge to develop, debug, and maintain small LabVIEW modules. The typical experience level of a CLAD is approximately 6 to 9 months in the use of the LabVIEW Full Development System.A CLD demonstrates experience in developing, debugging, deploying, and maintaining medium-to-large scale LabVIEW applications. A CLD is a professional with an approximate cumulative experience of 12 to 18 months developing medium-to-large applications in LabVIEW.A CLA not only possesses the technical expertise and software development experience to break a project specification into manageable LabVIEW components but has the experience to see the project through by effectively utilizing project and configuration management tools. A CLA is a professional with an approximate cumulative experience of 24 months in developing medium-to-large applications in LabVIEW.Note The CLAD certification is a prerequisite to taking the CLD exam. The CLDcertification is a prerequisite to taking the CLA exam. There are no exceptions to this requirement for each exam.CLA Exam OverviewA CLA demonstrates mastery in analyzing and interpreting customer requirements for the development of scalable application architectures in LabVIEW, organized in a modular project hierarchy with the intent to be fully developed later by a multi-developer team. The architecture meets the requirements using a software simulation with interfaces to abstracted hardware modules. To ensure successful integration, the Architect enables completion by a developer team with modules designed with consistent, well defined interfaces, data structures, module design patterns, messaging, and documented developer instructions with specific design requirements. The CLA is a professional with an approximate cumulative experience of 24 months in developing medium-to-large applications in LabVIEW.Product: Your test computer will have the latest LabVIEW Full or Professional Development System installed for developing your application. Contact your proctor or testing center prior to the exam to get the details and familiarize yourself with the LabVIEW version that you will use to develop your application.Refer to /labview/how_to_buy.htm for details on the features available in the LabVIEW Full / Professional Development System.Please note that you will not receive extra exam time to compensate for non-familiarity with the LabVIEW environment. If you need time to customize the environment, please make arrangements with your proctor to hold off on giving you the exam packet until you are ready to start the exam.The use of resources available in LabVIEW, such as the LabVIEW Help, examples, and templates are allowed during the exam. Externally developed VIs or resources are prohibited.The CLA exam consists of a project that is very similar to the project that you worked on the CLD exam.Your exam submissions should be transferred to a USB memory stick and turned in to your proctor.Note Do not detach the binding staple, copy, or reproduce / retain any section of the exam document or solution of the exam. Failure to comply will result infailure.CLA Exam Topics1.Project Requirements2.Project Organization and Hierarchy3.Project Architecture and Design4.Team-Based Design, Development, and Standardization Practices5.Reusable Tools / Component DesignNote The CLA exam is cumulative and includes CLAD and CLD exam topics.Topic Subtopic1.Project Requirements a.Technical requirementsb.Requirements trackingc.GUI Developmentd.Hardware Interfacee.Error Handling2.Project Organization and Hierarchy bVIEW project hierarchyb.Disk hierarchybVIEW pathsd.Modular hierarchy3.Project Architecture and Design a.Main VI architectureb.Module / SubVI architecturec.Messaging Architectured.Error Modulee.File and Database I/Of.Simulation architectureer interface designh.Advanced design methodsi.Documentation of requirements4.Team-Based Design, Development,and Standardization Practices bVIEW development practicesb.Modular functionalityc.Documentation for Developercompletiond.Clear Modular APIs5.Reusable Tools / Component Design bVIEW technologiesb.API designc.Design patternsCLA Exam Topic Details1.Project Requirementsa.Technical requirementsDetermine and list the following requirements from the project specification:1.Application requirements—Goal and purpose of the applicationer interface requirements—Presentation and behavior of controls thatinteract with users3.Functional requirements—The functionality of the components and theirinteraction within the system4.Timing requirements—Hardware / software, event-based data overflow,daylight savings5.Error handling requirements—Warning, errors, critical errors, shutdownsequence6.Hardware or simulation requirements—Interface and operational requirementsfor switching to field devices7.Input/output requirements—Console, databases8.Initialization, shutdown requirements—User interface and program behaviorduring startup, error conditions, and shutdown9.Non-functional requirements—Accuracy, performance, modifiability10.Assumptions and constraintsa) A functional assumption is an issue that is unclear in the specificationb) A functional constraint is a design decision that is imposed by thespecificationb.Requirements tracking1.Identify and fulfill requirementsa)Determine detail level of requirementsb)Locate requirements tags in architecture only where requirements arefulfilled2.Methods or (utilization of) software tools to track requirementsa)Use specified format for requirements tags for Requirements Gatewaytrackingb)Utilize provided tag filec.GUI Development1.Build GUI based on specificationa)Determine the appropriate control type based on functional specificationsb)Use Type Definitions2.Design interface that meets functional requirementsa)Utilize the LabVIEW Development Guidelinesb)Organize, modularize, or group user interface components to follow aprocess, or logical sequencec)Utilize advanced LabVIEW development techniquesd.Hardware Interfacee abstraction to separate simulation and hardware modulesa)Develop API to interface with the controller moduleb)Design a scalable interface that enables transition from simulation tohardwarec)Develop method to select hardware or simulation modules2.Develop simulation architecture based on hardwarea)Select a modular architecture that simulates external hardwareb)Select user interface components that closely mimic the function of thehardwaree.Error Handling1.Develop centralized error handlinga)Demonstrate methods to handle warning, critical errors, and shutdownerror conditions as defined in the specificationb)Develop architecture that integrates the error module in the main VI andwithin other modules2.Design a shut down method that is responsive to the error module and isabstracted from the functional modules2.Project Organization and HierarchybVIEW Project hierarchy1.Develop a LabVIEW Project hierarchy for team-based developmenta)Modules and their hierarchyb)Shared subVIs, custom controlsc)Plug-in VIsd)LabVIEW Project librariese)Support files (documentation, configuration, and log files)2.Utilize a naming conventionb.Disk hierarchy1.Mimic project hierarchy on diske auto-populating foldersanize project and disk hierarchy by module or other functional basedschemec.Paths1.Utilize and require developer to use relative pathsd.Modular Hierarchyanize by module or other functional based scheme2.Sub folders based on code artifacts such as controls or module subVIs3.Project Architecture and Designa.Main VI architecture1.Select an advanced, scalable, and modular architecture that enables thefollowing:a)Handling of user interface events and user eventsb)Asynchronous and parallel processing of eventsc)Initialization, shutdown, state persistence, and restorationd)Effective error (logic and run-time) handlinge)Timing (event or poll-based)f)Team-based development of functional modules2.Develop data and event messaging structures3.Develop architecture to handle configuration data4.Develop interfaces for simulation and other modules5.Utilize the LabVIEW Development Guidelines for memory optimizationb.Module / subVI architecture1.Select a cohesive architecture and design pattern for modules and subVIs2.Define and develop a clear API3.Define a consistent connector pane and iconc.Messaging Architecture1.Modularize messaging scheme for initialization, use, and shutdown2.Demonstrate method for messaging for developers to complete3.Demonstrate loose coupling of messaging moduled.Error Module1.Modularize centralized error handling for clear initialization, use, andshutdown2.Demonstrate error handling integration with functional modules3.Integrate for shutdown as specified4.Demonstrate file logging5.Discriminate actions for different types of error severitye.File and Database I/O1.Modularize I/O for clear initialization, use, and shutdownmunicate access methods for developers to complete3.Specify data formats and conversion to application data structures4.Integrate for Configuration data and Error loggingf.Simulation module architecture1.Select a modular architecture that simulates external hardware2.Design a scalable interface that can ease transition from simulation tohardware3.Select user interface components that closely mimic the function of thehardwareer interface design1.Utilize the LabVIEW Development Guidelinesanize, modularize, or group user interface components to follow a process,or logical sequence3.Utilize advanced LabVIEW development techniquesh.Advanced design methods1.Develop an architecture for a modular, scalable, and maintainable application2.Implement, develop, and enhance standard design patterns to suit projectrequirements3.Utilize an event-based design for user interface events and define usergenerated events for timing, error, signaling, and so on4.Abstract functionality and develop a clear and consistent interface API formodules and subVIs5.Utilize and standardize scalable data types and data structures6.Utilize object oriented design, recursion, VI Server, and advanced file I/Otechniquesi.Documentation of Requirements1.Utilize the LabVIEW Development Guidelines2.Document the following:a)Main architecture for module integrationb)Data structures and data and message communication mechanismc)Modules, subVIs, and interfaces (API)d)Simulation module, interfaces, and requirements for transitioning fromsimulation to hardware module4.Team-Based Design, Development, and Standardization PracticesbVIEW development practices1.Establish and use consistent development style—Utilize the LabVIEWDevelopment Guidelines as well as company developed standardse templates as a starting point for development3.Document VI Properties, the block diagram, and the user interface (tip strips,and so on)4.Develop reusable modules and tools to standardize developmentb.Architecture for modular development1.Select a cohesive architecture and design for modules and subVIs2.Define a consistent connector pane and icon3.Define error handling and ensure critical errors are handled appropriately4.Develop major structures and messaging5.Develop sufficient detail for the developer to implement the specificrequirements.c.Documentation instructions for the developer to complete the application1.Document coding completion of algorithms, transactions, and logic for adeveloper team to complete functionality2.Document multiple similar steps by completing a first step with detailedrequirements and subsequent steps referring to the technique of the first stepe LabVIEW code on the block diagram to demonstrate technique andcompliment this with developer instruction documentationd.Clear modular APIs1.Define the APIs for modules and subVIs2.Develop APIs for functional modules to enable modularity and abstraction3.Develop Architecture with APIs for error handling, initialization, andshutdown5.Reusable Tools / Component DesignbVIEW technologies1.Determine the optimal method for developing a reusable component or aproductivity enhancement tool from the following technologies:a)Custom controlsb)Merge VIc)SubVId)XControlse)VI templateb.API design1.Develop a simplified API to wrap advanced LabVIEW functions2.Develop manager VIs to handle common tasks, such as reference managementof queues, user events, and so on3.Utilize project access options to restrict or allow access to components oflibrariesc.Design Patterns1.Select appropriate design patters for modules and subVIs based on functionalrequirementse documentation to describe the completion of routine design patternelementsCLA ExamIn the CLA exam you will be required to design an architecture that covers the requirements given in a project specification.Exam Duration: 4 hoursStyle of exam: Application architecture developmentPassing grade: 70%Application Architecture Development:You must develop an application framework consisting of a main VI, modules, supporting subVIs, and custom controls (type definitions). A module is a subVI or group of subVIs that performs a set of functions. A module may have it own hierarchy of subVIs.Note You are not required to submit a functional application. The functional details of the requirements should be documented in the main VI, modules, and subVIs.You must provide this documentation in the architecture to enable developers on your team to develop the functionality.The architecture has the following minimum requirements:a.Develop a project hierarchyb.Develop a main VI. The main VI should include the following:i.Modular User interfaceii.Driving architectureiii.Major data structuresiv.Event, data, timing, and error communication method(s)v.Error handlingvi.Fully connected modules and /or subVIsc.Develop shell (stub) modules and subVIs, which should not include detailedfunctional logic, but should include the following:i.Inputs, outputs, icon, and connector paneii.Architecture and APIiii.Major internal data structuresiv.Error handling and error communicationv.Instructions or comments listing the functional details, which are sufficient for a developer to complete the functionality of the VId.Develop an interface for hardware simulation as a separate module or as part of themain VI or any other module, depending on your design.e.Develop inter-process communication mechanismf.Develop an error handling and shutdown strategyRequirements TrackingThe project specification will detail requirements identified by a unique identifier. In order to demonstrate coverage of a requirement, you must include the ID of the requirement in the documentation of your architecture. Requirements can be covered in any part of the architecture’s documentation, including:∙VI Documentation Property∙Control Documentation Property∙Project or Library Documentation Property∙Comments on the front panel or block diagramA single requirement may be covered by multiple sections of code if all of those sections are necessary to fulfill the requirement.To cover a requirement, the following text should be in the in the documentation of the code: [Covers: ID] Example: [Covers: CD1]The provided USB memory stick contains a text file that has all of the Tags. This file is provided as a convenience for use in placing the tags in the application code.Note A requirements tracking tool (Requirements Gateway) will be used to verify the requirements coverage, hence adherence to the above syntax is crucial.Please refer to the CLA sample exams to see the how the coverage is documented in the VI and the instruction / comments that need to be included in the VI for a developer to complete the implementation.Grading:The point allocation for the CLA exam consists is as follows: (Total: 100 points)∙User interface and block diagram style : 10 points∙Documentation : 20 points∙Requirements coverage : 30 points∙Architecture development : 40 pointsCertified LabVIEW Architect Preparation Guide100500-01CLA Exam Preparation ResourcesUse the following resources for additional exam preparation:∙Managing Software Engineering in LabVIEW∙Advanced Architectures for LabVIEWo Instructor-led trainingo Self-paced training using the course manuals∙CLA Sample Exams:o /claprepCLA Exam ScenariosThe following table lists possible exam scenarios that you may receive to develop a solution for your CLA exam. This list is intended to give a general idea of what exams will be administered, and there may be variations within each exam.Exam Scenario DescriptionCoffee Machine The coffee machine simulates ingredient storage, andperforms grinding, brewing and dispensing operations toprepare hot water, coffee and latte.Pizza Machine The Pizza Machine simulates creating a customized pizzarecipe and then making, baking and cutting the pizza. Security System The multi-zoned security system simulates the arming,disarming, tamper, bypass and alarm functions. Thermostat The thermostat simulates scheduled programmatic heatingand cooling control for heating, ventilation and air-conditioning (HVAC) system.© 2014 National Instruments Page 11 of 11。
Writing-a-Summary
How to Summarize an Article
5. Write the draft of your summary a. Identify the title and author of the work.
Also include the date of publication and publication name. b. The first sentence of your summary topic sentence = main idea or thesis c. Do not write an overly detailed summary. d. Do not imitate the style of the original work. Express in your own words.
How to Summarize an Article
e. Quote from the material only to illustrate key points.
f. Preserve the balance and proportion of the original work.
g. Revise your final draft. h. Write the final draft of the paper.
How to Summarize an Article
b. Subtitle. “Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward”
“Face/Off: Preventing Privacy Leakage From Photos in Social Networks”
杰克潘 Cisco 2500系列路由器简介说明书
Cisco2500 SeriesProduct OverviewThe Cisco2500 series routers provide a variety of models designed for branch office and remote site environments. Theserouters are typically fixed configuration with at least two of the following interfaces:•Ethernet (AUI)•10BaseT Ethernet hub•Token Ring•Synchronous serial•Asynchronous serial•ISDN BRIKey Features and BenefitsCisco2500 routers come with Flash EPROM technology for simplified software maintenance. These systems support avariety of Cisco IOS software feature sets,so you can choose a feature set that supports your specific protocol environment.The software feature sets range from an IP and bridging-only to the full array of Cisco’s software functionality, includingAPPN and RMON.Mission-specific models contain less memory and less hardware functionality to support a subset of protocols.Each mission-specific model can be upgraded to full router capability by downloading a new Cisco IOS software feature set and, ifnecessary, adding memory.Cisco2500 series models can be divided into the following categories:•Single LAN routers—Models 2501, 2502, 2503, 2504, 2520, 2521, 2522 and 2523•Mission-specific, entry-level routers—Models 2501CF, 2501LF, 2502CF, 2502LF, 2503I, 2504I, 2520CF, 2520LF, 2521CF, 2521LF, 2522CF, 2522LF, 2523CF and 2523LF•Router/hub combinations—Models 2505, 2507 and 2516•Access servers—Models2509to2512(refer to the“Cisco2500Series Access Servers”section in the“Access Servers”chapter later in the catalog)•Dual LAN routers—Models 2513, 2514 and 2515•Modular routers—Models 2524 and 2525 (optional integrated DSU/CSU or NT-1)SpecificationsHardwareAll the Cisco2500 series models support the features listed in the following table.Table 5-53: Cisco 2500 Series Specifications 1. If your system requires more than 8MB of Flash memory, the additional memory must be ordered separately.2. This feature set is available with Cisco IOS Release 11.0 and later releases.3. The console cable kit includes an RJ-45-to-RJ-45 roll-over console cable, an RJ-45-to-DB-25 male DCE adapter, an RJ-45-to-DB-25 female DTE adapter, and an RJ-45-to-DB-9 female DTE adapterSoftwareTable 5-54: Cisco 2500 Series Environmental Specifications Characteristic DescriptionFlash memoryMinimum of 8 MB of Flash memory, except for the mission-specific routers which require only 4MB of Flash memory. However, depending on the Cisco IOS release that shipped with the sys-tem, it might require more memory. Refer to the “Cisco IOS Software” chapter for the minimum Flash memory required for each feature set.DRAM memory expandability Minimum DRAM required by the Cisco IOS release that shipped with the system. Refer to the “Cisco IOS Software” chapter for the minimum DRAM required for each feature set.Processor type20-MHz 68030Software options—Cisco IOS Re-lease 11.2IP Routing IP Routing PlusIP/IPX with IBM base functionality and APPN Desktop (IP/IPX/AppleTalk/DEC)Desktop (IP/IPX/AppleTalk/DEC) Plus Enterprise Enterprise PlusEnterprise/APPN/PlusMission-specific Cisco 2500 series: application-specific software Software options—Cisco IOS Re-lease 11.1 and 11.0IP RoutingIP Routing with IBM base functionality IP/IPX RoutingIP/IPX Routing with IBM base functionality IP/IPX with IBM base functionality and APPN DesktopDesktop with IBM base functionality EnterpriseEnterprise/APPN RMONMission-specific Cisco 2500 series: application-specific softwareDimensions (H x W x D)Models 2501 to 2516 and 2520 to 2525: 1.75 x 17.5 x 10.56 in. (4.44 x 44.45 x 26.82 cm)Weight (average shipping)Models 2501 to 2516 and 2520 to 2525: 10 lb. (4.5 kg)Standard componentsPower supply and cord Console cable kitRJ-45-to-DB-9 adapter19 in. rack-mount/wall-mount kitDescription SpecificationConsumption For models 2501 to 2525: 40WInput For models 2501 to 2516 and 2520 to 2525: 110 to 220 V AC, 50 to 60 Hz –48VDC Current ratingFor models 2501 to 2516 and 2520 to 2525: 1.0A at 60 Hz, 0.5A at 50 Hz Operating temperature range For models 2501 to 2516 and 2520 to 2525: 32 to 104F (0 to 40C)Nonoperating temperature rangeFor models 2501 to 2516 and 2520 to 2525: –40 to 185F (–40 to 85C)Description SpecificationHumidity (noncondensing)For models 2501 to 2525: 5 to 95%OptionsThe Cisco2500 series routers are discussed in the following sections:•Memory Options•Single LAN Routers•Mission-Specific Routers•Router/Hub Combinations•Access Servers•Dual LAN Routers•Modular Routers•Hardware Product NumbersMemory OptionsAll Cisco2500models include a minimum of8MB of Flash memory,except for the mission-specific routers which include4 MB or 8 MB of Flash memory, depending upon the Cisco IOS software release you order. Additional Flash memory canbe purchased to allow for dual banking or potential future code growth.There are two types of DRAM memory in the Cisco2500 series routers: primary and shared (packet). Primary memory isused to store the operating configuration,routing tables,caches,and queues.Shared memory is used to store incoming andoutgoing packets. In the table below, the physical configuration column lists the amount of DRAM SIMM memorysupported. The system usage column lists how the system allocates the total DRAM memory installed.Table 5-55: Shared and Primary DRAM Memory—Cisco2500 SeriesPhysical Configuration System UsageTotal DRAM Memory DRAM SIMM Shared DRAM Memory Primary DRAM Memory4MB4MB2MB2MB8MB8MB2MB6MB16MB16MB2MB14MBHardware Product NumbersThe Cisco2500series offers the hardware,memory,and NPM cable options listed in the following table.If a product numberends with an equal sign(=),the item can be ordered only as a spare.If a product number does not end with an equal sign,theitem can be ordered as a spare or as a configurable part of a system order.Other hardware options can also be ordered throughthe Cisco authorized reseller channel.Note For options that apply to most systems,refer to the“Cables and Transceivers”or“Power Supplies and Power Cords”chapters later in the catalog.Single LAN RoutersModels2501,2502,2503,2504,2520,2521,2522,and2523(see through)contain the common Cisco2500series featureslisted in the following table. In addition, these models support the network interfaces listed in Table 11-90.Note This section discusses standard models.The mission-specific models are described in the “Mission-Specific Routers”section later in this chapter.Table 5-56: Single LAN Router Network Interfaces 1. Synchronous and asynchronous.2. Synchronous.Figure 5-13: Cisco 2501 Rear ViewFigure 5-14: Cisco 2502 Rear ViewModel Ethernet Token Ring Low-Speed Serial 1Serial 2ISDN BRI 25011002025020102025031002125040102125201022125210122125221082125231821H 8825DB-9DB-60RJ-45On/off switchPowerDB-9DB-60RJ-45On/off switchPowerH 1687Figure 5-16: Cisco 2504 Rear ViewFigure 5-17: Cisco 2520 Rear ViewFigure 5-18: Cisco 2521 Rear ViewDB-15DB-60RJ-45On/off switchPowerH 1688DB-9DB-60RJ-45On/off switchPowerH 1689H 6707DB-15RJ-45On/off switchPower DB-60DB-600H 6696DB-9UTP Token Ring ISDN (BRI)RJ-45On/off switch PowerDB-60Figure 5-20: Cisco 2523 Rear ViewMission-Specific RoutersMission-specific routers are entry-level routers that are based on standard Cisco 2500hardware.However,mission-specific routers contain less memory than standard models and run reduced software images designed for CFRAD,LAN FRAD,and ISDN applications. These reduced software images disable unused ports. Mission-specific routers can be upgraded to full standard-model functionality by purchasing additional software and memory.Table 5-57: Mission-Specific Router Network Interfaces Model Ethernet Token Ring Serial Low-Speed Serial ISDN BRI 2501CF Software disabled 02002501LF 102002502CF 0Software disabled 2002502LF 012002503I 10Software disabled 012504I 01Software disabled 012520CF Software disabled 022Software disabled 2520LF 1022Software disabled 2521CF 0Software disabled 22Software disabled 2521LF 0122Software disabled 2522CF Software disabled 028Software disabled 2522LF128Software disabledH 6697DB-60DB-1510BaseTISDN (BRI)RJ-45On/off switchPowerH 66980DB-15UTP Ethernet ISDN (BRI)RJ-45On/off switchDB-60PowerDB-60Router/Hub CombinationsModels 2505,2507,and 2516support integrated hub functionality as well as all the common features listed in Table 11-89. In addition, these models support the interfaces listed in the following table.Table 5-58: 10BaseT Hub Ports Figure 5-21: Cisco 2505 Rear ViewFigure 5-22: Cisco 2507 Rear View2523CF 0Software disabled 28Software disabled 2523LF128Software disabledModel Serial Hub Ports ISDN BRI 25052802507216025162141Model Ethernet Token Ring Serial Low-Speed Serial ISDN BRI DB-60RJ-45On/off switchPowerH 8826RJ-451Cisco 2505DB-60RJ-45On/off switchPowerH 2544RJ-45Access ServersModels 2509, 2510, 2511, and 2512 are designed to function as access servers for remote node and asynchronous/synchronous routing. For complete information, refer to the “Access Servers” chapter later in the catalog.Dual LAN RoutersModels 2513, 2514, and 2515 provide higher-density LAN support and include all the common features listed in Table 11-89. In addition, these models support the interfaces listed in the table below.Table 5-59: Dual LAN Router Interface Options Figure 5-24: Cisco 2513 Rear ViewModel Ethernet Token Ring Serial 25131122514202251522DB-60RJ-45RJ-45 On/off switch PowerH 2856MDI/MDI-XswitchBRI DB-60DB-15DB-60RJ-45On/off switchPowerH 2547DB-9TOK EN RIN GFigure 5-26: Cisco 2515 Rear ViewModular RoutersModels 2524 and 2525 provide LAN and WAN access in a low-cost modular router platform that can grow with yourinternetworking needs.The Cisco 2524offers an Ethernet (AUI or 10BaseT)LAN connection,and the Cisco 2525offers a Token Ring (STP or UTP) LAN connection. Both routers can accommodate up to three WAN modules—two synchronous serial and one ISDN.The choice of synchronous serial W AN modules is as follows:•2-wire, switched, 56-kbps DSU/CSU •4-wire, 56/64-Kbps DSU/CSU •Fractional T1/T1 DSU/CSU •Five-in-one synchronous serialNote The five-in-one synchronous serial WAN module gets its name from the five types of signaling it supports, whichinclude:EIA/TIA-232,EIA/TIA-449,V .35,X.21and EIA-530.You can order a DB-60shielded serial transition cable.The router end of the cable has a DB-60 connector; the other end of the cable has the appropriate connector for the standard interface you specify.The choice of ISDN WAN modules is as follows:•ISDN BRI•ISDN with integrated NT1 deviceThe ISDN W AN modules are keyed so that you cannot insert them into the synchronous serial WAN slots.A blank slot cover is installed over unused slots.DB-15DB-60RJ-45On/off switchPowerH 2546DB-15DB-9DB-60RJ-45On/off switchPowerH 2548DB-9Figure 5-28: Cisco 2525 Rear ViewFigure 5-29: 2-Wire, Switched, 56-Kbps DSU/CSU WAN ModulePowerH 5045On/offswitchConsole port (RJ-45)10BaseT port(RJ-45)Ethernet AUI port (DB-15)LAN activity LED Ethernet link LED Auxiliary port (RJ-45)H 5271PowerOn/off switchConsoleport(RJ-45)UTP port (RJ-45)Token Ring port (DB-9)LANactivityLEDToken Ringin-ring LEDAuxiliary port (RJ-45)H 5046RJ-112-WIRE 56KDSU/CSUTXLBRX ALCDCarrier detectLEDReceive LEDAlarmLED Loopback LEDTransmit LEDCaptive screwCaptive screwFigure 5-30: 4-Wire, 56/64-kbps DSU/CSU WAN ModuleFigure 5-31: Fractional T1/T1 DSU/CSU WAN ModuleFigure 5-32: ISDN BRI WAN ModuleH 5047RJ-48S4-WIRE 56K/64K DSU/CSUTXLBRX ALCDCarrier detectLEDReceive LEDAlarmLED Loopback LEDTransmit LEDCaptive screwCaptive screwH 5048RJ-48CFTI/TI DSU/CSUTX LBRX ALCDCarrier detectLEDReceive LEDAlarmLED Loopback LEDTransmit LEDCaptive screwCaptive screwMONINOUTNETJACK Monitor jackH 5050RJ-45ISDN-BRIS/TACTIVITYISDN BRI activity LEDCaptive screwCaptive screwFigure 5-33: ISDN BRI with Integrated NT1 WAN ModuleFigure 5-34: Five-in-One Synchronous Serial WAN ModuleFigure 5-35: Blank Slot CoverRefer to the “Cisco IOS Software” chapter for detailed software feature set information.Ordering InformationProduct NumbersNote For more information, including cable illustrations, refer to the “Cables and Transceivers” chapter. The “PowerCords” chapter provides international power cord product numbers.H 5051RJ-45ISDN-BRI with NTIACT UCaptive screwCaptive screwNTIH 5049SERIALCaptive screwCaptive screwACTIVITYSerial activity LEDDB-60H 5052Captive screwCaptive screwDo not plug/unplug modules with power on.BLANKTable 5-60: Cisco2500 Series Base Models Hardware Product NumbersModel Description Product Number Cisco2501 1 Ethernet, 2 serial, AC power supply CISCO2501 Cisco2501-DC 1 Ethernet, 2 serial, DC power supply CISCO2501-DC Cisco 2501CF1 2 serial, CFRAD software, AC power supply CISCO2501CF Cisco2501LF 1 Ethernet, 2 serial, LAN FRAD software, AC power supply CISCO2501LF Cisco2502 1 Token Ring, 2 serial, AC power supply CISCO2502 Cisco2502CF1 2 serial, CFRAD software, AC power supply CISCO2502CF Cisco2502LF 1 Token Ring, 2 serial, LAN FRAD software, AC power supply CISCO2502LF Cisco2503 1 Ethernet, 2 serial, 1 ISDN BRI, AC power supply CISCO2503 Cisco2503-DC 1 Ethernet, 2 serial, 1 ISDN BRI, DC power supply CISCO2503-DC Cisco2503I1 1 Ethernet, 1 ISDN BRI, ISDN software, AC power supply CISCO2503I Cisco2503I-DC1 1 Ethernet, 1 ISDN BRI, ISDN software, DC power supply CISCO2503I-DC Cisco2504 1 Token Ring, 2 serial, 1ISDN BRI, AC power supply CISCO2504 Cisco2504-DC 1 Token Ring, 2 serial, 1ISDN BRI, DC power supply CISCO2504-DC Cisco2504I1 1 Token Ring, 1 ISDN BRI, ISDN software, AC power supply CISCO2504I Cisco25058 Ethernet UTP hub ports, 2 serial, AC power supply CISCO2505 Cisco2505-DC8 Ethernet UTP hub ports, 2 serial, DC power supply CISCO2505-DC Cisco250716 Ethernet UTP hub ports, 2 serial, AC power supply CISCO2507 Cisco2507-DC16 Ethernet UTP hub ports, 2 serial, DC power supply CISCO2507-DC Cisco25092 1 Ethernet, 2 serial, 8 async serial, AC power supply CISCO2509 Cisco2509-DC2 1 Ethernet, 2 serial, 8 async serial, DC power supply CISCO2509-DC Cisco25102 1 Token Ring, 2 serial, 8 async serial, AC power supply CISCO2510 Cisco25112 1 Ethernet, 2 serial, 16 async serial, AC power supply CISCO2511 Cisco2511-DC2 1 Ethernet, 2 serial, 16 async serial, DC power supply CISCO2511-DC Cisco25122 1 Token Ring, 2 serial, 16 async serial, AC power supply CISCO2512 Cisco2513 1 Ethernet, 1 Token Ring, 2serial, AC power supply CISCO2513 Cisco2514 2 Ethernet, 2 serial, AC power supply CISCO2514 Cisco2514-DC 2 Ethernet, 2 serial, DC power supply CISCO2514-DC Cisco2515 2 Token Ring, 2 serial, AC power supply CISCO2515 Cisco251614 Ethernet UTP hub ports, 2 sync serial, 1ISDN BRI, AC power supply CISCO2516 Cisco2516-DC14 Ethernet UTP hub ports, 2 sync serial, 1ISDN BRI, DC power supply CISCO2516-DCCISCO2520 Cisco25201Ethernet,2high-speed sync serial,2low-speed async/sync serial,1ISDN BRI inter-face, AC power supplyCisco2520-DC1Ethernet,2high-speed sync serial,2low-speed async/sync serial,1ISDN BRI inter-CISCO2520-DC face, DC power supplyCisco2520CF1 2 high-speed sync serial, 2 low-speed async/sync serial, CFRAD software,CISCO2520CF AC power supplyCisco2520LF1 1 Ethernet, 2 high-speed sync serial, 2 low-speed async/sync serial, LAN FRAD soft-CISCO2520LF ware, AC power supplyCISCO2521 Cisco2521 1 Token Ring, 2 high-speed sync serial, 2 low-speed async/sync serial, 1 ISDN BRIinterface, AC power supplyCisco2521-DC 1 Token Ring, 2 high-speed sync serial, 2 low-speed async/sync serial, 1 ISDN BRICISCO2521-DC interface, DC power supplyCisco2521CF1 2 high-speed sync serial, 2 low-speed async/sync serial, CFRAD software,CISCO2521CF AC power supply1. Mission-specific router. Mission-specific routers are based on standard Cisco 2500 hardware, but they contain less memory and run reduced Cisco IOS images that disable unused ports and support a subset of protocols. By adding software, and possibly memory, mission-specific routers can be upgraded to full standard router functionality.2. See the “Access Servers” chapter later in this catalog, for more information.Cisco 2521LF 1 1 Token Ring, 2 high-speed sync serial, 2 low-speed async/sync serial, LAN FRAD software, AC power supplyCISCO2521LF Cisco 2522 1 Ethernet, 2 high-speed sync serial, 8 low-speed async/sync serial, 1 ISDN BRI in-terface, AC power supplyCISCO2522Cisco 2522-DC 1Ethernet,2high-speed sync serial,8low-speed async/sync serial,1ISDN BRI inter-face, DC power supplyCISCO2522-DC Cisco 2522CF 1 2 high-speed sync serial, 8 low-speed async/sync serial, CFRAD software,AC power supplyCISCO2522CF Cisco 2522LF 11Ethernet,2high-speed sync serial,8low-speed async/sync serial,LAN FRAD soft-ware, AC power supplyCISCO2522LF Cisco 2523 1 Token Ring, 2 high-speed sync serial, 8 low-speed async/sync serial, 1 ISDN BRI interface, AC power supplyCISCO2523Cisco 2523-DC 1 Token Ring, 2 high-speed sync serial, 8 low-speed async/sync serial, 1 ISDN BRI interface, DC power supplyCISCO2523-DC Cisco 2523CF 1 2 high-speed sync serial, 8 low-speed async/sync serial, CFRAD software,AC power supplyCISCO2523CF Cisco 2523LF 1 1 Token Ring, 2 high-speed sync serial, 8 low-speed async/sync serial, LAN FRAD software, AC power supplyCISCO2523LF Cisco 2524 1 Ethernet (AUI or 10BaseT) with 3 slots for WAN modules, AC power supply CISCO2524Cisco 2524-DC 1 Ethernet (AUI or 10BaseT) with 3 slots for WAN modules, DC power supply CISCO2524-DC Cisco 25251 Token Ring (STP or UTP) with 3 slots for WAN modules, AC power supplyCISCO2525Model DescriptionProduct NumberProduct and Part NumbersPart Numbers for the Rack-Mount KitsPart Description Part Number19-in. rack-mount kit1ACS-2500RM-19=24-in. rack-mount kit A25-2500RM-24=Memory OptionsBoot ROM upgrade BOOT-2500=DRAM Memory Options4-MB DRAM SIMM (spare)MEM-1X4D=MEM2500-4U8D4-MB to8-MB DRAM SIMM Factory Up-grade8-MB DRAM SIMM (spare)MEM-1X8D=MEM2500-4U16D 4-MB to 16-MB DRAM SIMM FactoryUpgrade16-MB DRAM SIMM (spare)MEM-1X16D=MEM2500-8U16D 8-MB to 16-MB DRAM SIMM FactoryUpgradeFlash Memory Options4-MB Flash SIMM (spare)MEM-1X4F=MEM2500-8U16F8-MB to 16-MB Flash SIMM Factory Up-grade8-MB Flash SIMM (spare)MEM-1X8F=ModulesSM25-56K22-wire switched 56-kbps DSU/CSU mod-ule(for Cisco2524and Cisco2525routersonly)SM25-56K44-wire 56/64-kbps DSU/CSU module (forCisco 2524 and Cisco 2525 routers only)SM25-T1Fractional T1/T1 DSU/CSU module (forCisco 2524 and Cisco 2525 routers only)SM25-5IN1Five-in-one synchronous serial module(forCisco 2524 and Cisco 2525 routers only)SM25-BRI-S/TISDN BRI module (for Cisco 2524 andCisco 2525 routers only)ISDN with integrated NT1 device moduleSM25-BRI-U(for Cisco 2524 and Cisco 2525 routersonly)SM25-BLANKBlank slot cover(for Cisco2524and Cisco2525 routers only)Redundant Power SystemsPWR-600-AC-RPS 600W redundant AC power system for theCisco 2500 series routersCAB-RPSY-2208Redundant power supply22/18OIR Y-loadcableRedundant power supply 22/18 load cable CAB-RPS-2218=Redundant power supply 22/08 load cable CAB-RPS-2208=ACS-2500RPS=Redundant power supplyfield upgrade forCisco 2500 series routersCables1.The 19-inch rack-mount kit can only be ordered as a spare;a 19-inch rack-mount kit is included with all Cisco 2500series routers.An optional 24-inch rack-mount kit can be ordered from Cisco Systems.2.The auxiliary/console cable kit includes an RJ-45-to-RJ-45roll-over console cable,an RJ-45-to-DB-25male DCE adapter,an RJ-45-to-DB-25female DTE adapter, and an RJ-45-to-DB-9 adapter.EIA/TIA-232 male DTE interface, 10 ft (3m)CAB-232MT EIA/TIA-232 female DCE interface, 10 ft (3 m)CAB-232FC EIA/TIA-449 male DTE interface, 10 ft (3m)CAB-449MT EIA/TIA-449 female DCE interface, 10 ft (3 m)CAB-449FC EIA-530 male DTE interface, 10 ft (3 m)CAB-530MT V .35 male DTE interface, 10 ft (3 m)CAB-V35MT V .35 female DCE interface, 10 ft (3 m)CAB-V35FC X.21 male DTE interface, 10 ft (3 m)CAB-X21MT X.21 female DCE interface, 10 ft (3 m)CAB-X21FC Ethernet AUI adapter cable CAB-3CE18=Auxiliary/console cable kit 2ACS-2500ASYN RJ-45-to-DB-25 management card con-sole cableCAB-MGMT-RH Shielded power cable, United States CABS-AC Shielded power cable, Australia CABS-ACA Shielded power cable, Italy CABS-ACI Shielded power cable, Europe CABS-ACE Shielded power cable, United KingdomCABS-ACUPart DescriptionPart Number。
动态二进制分析技术概述说明书
Dynamic Binary Instrumentation TechnologyOverviewKunping DuNational Digital Switching System Engineering & Technological Research CenterZhengzhou,China**************Hui ShuNational Digital Switching System Engineering & Technological Research CenterZhengzhou,China*****************************Fei KangNational Digital Switching System Engineering & Technological Research CenterZhengzhou,China**************Li DaiNational Digital Switching System Engineering & Technological Research CenterZhengzhou,China**************Abstract—The Dynamic Binary Analysis technology is a newly emerged technology which can analysis program execution dynamicly. Using this technology, the process of program analysis became more simple and accurate. Foreign researchers had put forward several Dynamic Binary Analysis Platform in recent 10 years. Based on these platforms, users can easily build useful analysis tools which satisfy their own needs. This paper introduces five most representative Dynamic Binary Analysis platforms first. Then, four significant fields and existing applications closely related with Dynamic Binary Analysis technology are explored. In the end of this paper, the feature research hot spots are discussed.Keywords- Dynamic Binary Analysis, program analysis technology, Dynamic Binary InstrumentI.FOREWORDDynamic Binary Analysis[1](DBA) technology is a kind of dynamic program analysis method which can analyze program's memory structure and add specific instructions for monitoring and testing program's execution.The DBA technology enables users to monitor program's behavior under the premise of not affecting the results of program execution by inserting additional appropriate analysis code into the target program, this procedure called Dynamic Binary Instrument(DBI).In addition,using DBA technology,the analysis can complete without source code, no need to recompile and link,so that this technology can be used in many cases.The research on DBA technology began in the 1990s, initially applied to the dynamic optimization and testing of the program.Due to its versatility and accuracy of the analysis process,it has been used for memory testing,software behavior monitoring,reverse engineering and some other research areas recently..This paper first introduces five most widely used DBA platform,they are Shade, DynamoRIO, Valgrind, Pin and Nirvana. On this basis, summarizes the application status and popular tools build on DBA platform in the field of memory testing and optimization, data flow tracking, software behavior analysis, reverse engineering and parallel program analysis. Finally, the application prospects of DBA technology are discussed.II.D YNAMIC B INARY A NALYSIS P LATFORM So far, the foreign researchers had put forward a number of DBA platform, such as Shade, DynamoRIO, Valgrind etc. Based on these platforms, users can easily develop their own Dynamic Binary Instrumentation(DBI) tool. Below, we will detail the Shade, DynamoRIO, Valgrind, Pin, and Nirvana.A.Shade[2]It is the first the DBI platform which implements in Solaris system. Shade uses binary translation and cache technology, it has inner support of recording the register state and opcode information..B.DynamoRIO[3]DynamoRIO is an open-source dynamic binary optimization and analysis platform which evolves from Dynamo. It is available both in Windows and Linux system, and can record the execution instruction information efficiently, but doesn't support data flow recording. This platform is mainly used for the dynamic optimization of program in instruction level.C.Valgrind[4]An open source DBI platform under Linux which can efficiently record the instructions flow and data flow information of executable file in Linux. But because of the different operation mechanism of Linux and Windows system, this platform is still difficult to transplant to Windows system. D.Pin[5]Pin is a dynamic binary instrumentation framework for the IA-32 and x86-64 instruction-set architectures that enables the creation of dynamic program analysis tools. The tools createdNational Conference on Information Technology and Computer Science (CITCS 2012)using Pin, called Pintools, can be used to perform program analysis on user space applications in Linux and Windows. Pin provides a rich API that abstracts away the underlying instruction-set idiosyncrasies and allows context information such as register contents to be passed to the injected code as parameters. Pin automatically saves and restores the registers that are overwritten by the injected code so the application continues to work. Limited access to symbol and debug information is available as well. Pin was originally created as a tool for computer architecture analysis, but its flexible API and an active community (called "Pinheads") have created a diverse set of tools for security, emulation and parallel program analysis. Pin is proprietary software developed and supported by Intel and is supplied free of charge for non-commercial use. Pin includes the source code for a large number of example instrumentation tools like basic block profilers, cache simulators, instruction trace generators, etc. It is easy to derive new tools using the rich API it provides.E.Nirvana[6]Microsoft's latest development DBI platform, mainly includes two key module: program simulation execution module and JIT (just in time) binary translation module. But it has not been to market, only for Microsoft internal use. According to relevant data, the platform can well support tracking and playback function of Windows executable files in instruction level. There will be very good application prospects especially in software reverse engineering.III.DBI A PPLICATION FIELDA.Memory testing and optimizationDBI framework developed up to now, the most widely used application is for the building of memory monitoring tools. DBI-based memory testing tools have obvious advantages than the common memory detection tool in the detection efficiency and detection accuracy, as well as the support of the underlying system. Therefore, there have been a lot of DBI based memory monitoring tools since DBI technologies emerged. Most of those tools can not only detect the memory using situation of a program, memory errors that may exist in the program, illegal use of memory, memory leaks, but also can detect buffer overflow accurately. The following details on several of BDI-based memory monitoring tools and related research.a)Memcheck: Memcheck is a memory error detector based on Valgrind. It can detect many common problems appear in C and C++ programs, such as: accessing memory you shouldn't, using undefined values, incorrect freeing of heap memory, memory leaks etc.b)Dr.Memory: Dr. Memory is built on the open-source dynamic instrumentation platform DynamoRIO. It is an excellent memory checking tool that supports both Windows and Linux. Dr. Memory uses memory shadowing to track properties of a target application’s data during execution. So that it can detect memory error more accurately. In addition, Dr. Memory provide two instrumentation paths: the fast-path and the slow-path. The fast-path is implemented as a set of carefully hand-crafted machine-code sequences or kernels covering the most performance-critical actions. Fast-path kernels are either directly inlined or use shared code with a fast subroutine switch. Rarer operations are not worth the effort and extra maintenance costs of using hand-coded kernels and are handled in the slow-path in C code with a full context switch used to call out to the C function. Through using different path in different situation, the efficiency of detection is increased greatly.B.Dynamic Taint AnalysisThe dynamic taint analysis technology is a common technique in the field of application security detection. By analysis of the data used in the program, the program's data is marked as “contaminated”(Tainted), and “not contaminated” (UnTainted) categories, while in the process of implementation of the procedures to control the spread of contaminated properties by analyzing the illegal use of the data propagation path of the contaminated property to find the loopholes that exist of the program. DBI based platform, you can build a dynamic data flow tracking tools, such data flow tracking tool with a wide tracking range, and analysis results are accurate. Here are two methods based on DBI data flow tracking tool.a)TaintCheck: TaintCheck is a dynamic taint analysis tool based on Valgrind, for the automatic detection, analysis, and signature generation of exploits on commodity software. TaintCheck's default policy detects format string attacks, and overwrite attacks that at-tempt to modify a pointer used as a return address, function pointer,or function pointer offset. Its policy can also be extended to detect other overwrite attacks, such as those that attempt to overwrite data used in system calls or security-sensitive variables. TaintCheck gave no false positives in its default configuration. in many cases when a false positive could occur, it is a symptom of a potentially exploitable bug in the monitored program. For programs where the default policy of TaintCheck could generate a false positive. Once TaintCheck detects an overwrite attack, it can automatically provide information about the vulnerability and how the vulnerability is exploited. By back-tracing the chain of tainted data structure rooted at the detection point, TaintCheck automatically identifies which original flow and which part of the original flow have caused the attack.b)Dytan: A Generic dynamic taint analysis framework based on Pin. The goal of this tool is to be a generalized tainting framework that can be used to perform dataflow and control-flow analysis on an x86 executable. The dynamic tainting of Dytan consists of: (1)associating a taint label with data values;(2)propagating taint labels as data values flow through the program during execution.As long as user provides XML configuration file, in which specify: taint sources, propagation policy, and sinks.C.Reverse engineering applicationDynamic tracking is one of the commonly used method in reverse engineering. The procedure of dynamic tracking is like this: using dynamic debugging software (eg: OllyDebug) load the program, then follow the tracks of program executionstep-by-step. This approach can be summarized in a word:analysis when tracking. And the analysis relies heavily onmanual, it is difficult to automate it. By means of DBI platform,one can separate the analysis work to the tracking process byusing DBI tool recording the execution information of targetsoftware, analyzing the recorded information by other a utomatic tools. Such processing procedure can save a lot of human labor. And the automatic analysis of the recordedinformation also can greatly reduce the software reversingcycle.In 2008 blackhat Danny Quist. etc propose a DBI basedtemporal reverse engineering. By DBI platform Pin, they getthe basic block execution sequence. By analyzing andvisualizing these block information, it help analyst understandthe program behavior quickly. In addition, in reference[7], theauthor proposed a DBI based protocol reverse method, themain idea of the paper is recording the data-flow of a softwarewith DynamoRIO, then parse the protocol field with their ownautomatic tool.D.Parallel program analysis[8]With the development of high performance computingtechnology, the design of parallel programs is becomingincreasingly important. Parallel debugging and performanceevaluation of parallel programs are difficult problems in thefield. The traditional Parallel debugging and performance evaluation tools are mostly based on source code instrumentation, which makes the workload of analyzing parallel programs very huge, and as the coding language and software upgrade, testers need to do some modifications. The most deadly is if you can’t get the source code of the parallel program, the test can’t be conducted. DBA technology making the analysis of parallel programs has nothing to do with the source code, the analysis process is more transparent and more efficient. The following is several parallel program analysis tools based on DBI framework.a)Intel Parallel Inspector: The Intel Parallel Inspector analyzes the multithreaded programs’ execution to find memory and threading errors, such as memory leaks, references to uninitialized data, data races, and deadlocks. Intel Parallel Inspector uses Pin to instrument the running program and collect the information necessary to detect errors. The instrumentation requires no special test builds or compilers, so it’s easier to test code more often. Intel Parallel Inspector combines threading and memory error checking into one powerful error checking tool. It helps increase the reliability, security, and accuracy of C/C++ applications from within Microsoft Visual Studio.b)CMP$im: Memory system behavior is critical to parallel program performance. Computational bandwidth increases faster than memory bandwidth, especially for multi-core systems. Programmers must utilize as much bandwidth as possible for programs to scale to many processors. Hardware-based monitors can report summary statistics such as memory references and cache misses; however, they are limited to the existing cache hierarchy and are not well suited for collecting more detailed information such as the degree of cache line sharing or the frequency of cache misses because of false sharing. CMP$im uses Pin to collect the memory addresses of multithreaded and multiprocessor programs, then uses a memory system’s software model to analyze program behavior. It reports miss rates, cache line reuse and sharing, and coherence traffic, and its versatile memory system model configuration can predict future systems’ application performance. While CMP$im is not publicly available, the Pin distribution includes the source for a simple cache model, dcache.cpp.IV.F UTURE RESEARCHDBA technology as a new program analysis method, have not yet been widely used. As people get more comprehensive understanding on its properties and advantages, it will play a role in more areas in more fields. Future research on dynamic binary analysis techniques are mainly concentrated in the following aspects:a)Improvement of performance for DBI platform:Based on DBI build tools have a common weakness: a certain degreeof reduction on efficiency to instrumentation program. In general, the use of DBI make the original program run rate 3-5 times lower, in future studies, how to improve the performance and efficiency of the DBI platform is an important research direction.b)The combination of static analysis methods:DBA method has many advantages, but it is essentially a dynamic analysis method that can not overcome the shortcoming of only one execution path can be passed by a time. In the future, how to combine the dynamic binary analysis with the static analysis methods is a future research focus.c)solve the problem of huge amount of record information: Using DBI instrument a program ,weather in instruction level or function level, the record set could be very huge. How to reduce the volume of the record set in the premise of ensure enough information, how to improve the efficiency of information processing, how to visualize those information are all the research spot in the future.DBA technology, with the advantages of extensive (needn't source code) and accuracy (run-time instrument), has already come to the forefront in several areas, and provides new idea to solve the problems in related field. The DBA technology would bring more breakthrough for more field in the future.R EFERENCES[1]Nicholas Nethercote. Dynamic Binary Analysis and Instrumentation orBuilding Tools is Easy [D]. PhD thesis. University of Cambridge, 2004. [2]Bob Cmelik and David Keppel. Shade: a fast instruction-set simu lateorfor execution profiling [R]. In:ACM SIGMETRICS, 2004.[3]Derek L. Bruening. Efficient, Transparent, and Comprehensive RuntimeCode Manipulation [D]. PhD thesis, M.I.T, 2004. /. [4]hercote. Valgrind: A Framework for Heavyweight DynamicBinary Instrumentation [C]. In:Proceedings of the 2007 ACM SIGPLAN conference on Programming language design and implemention, San Diego,California,USA: 2007. 89-100..[5]Chi-Keung Luk. Pin: building customized program analysis tools withdynamic instrumentation [C]. In:Programming Language Design and Implementation. 2005: 190-200.[6]Sanjay Bhansali. Framework for Instruction-level Tracing and Analysisof Program Executions [C]. Second International Conference on Virtual Execution Environments VEE, 2006. [7]HE Yong-jun, SHU Hui, XIONG Xiao-bing. Network Protocol ReverseParsing Based on Dynamic Binary Analysis.[J]. Computer Engineering.2010.36(9):268-270[8]Moshe Bach, Mark Charney, Robert Cohn, etc. Analyzing ParallelPrograms with Pin. [J]. IEEE Computer. 2010:34-41.。
蓝色梦幻羽毛欧美简约通用模板课件.pptx
FASHION
PART 03
There are many variations of passages of Lorem Ipsum available, but believ If you are going to use a passage of
Easy Customize Interactively utilize resource maximizing web-readiness via functional infomediaries.
Unlimited Colors Interactively utilize resource maximizing web-readiness via functional infomediaries.
Professionals Team
There are many variations of passages of Lorem Ipsum available, but believable. If you are going to use a passage of Lorem Ipsum, you need to be sure there isn't anything
PLECE ENTER
There are many variations of passages of Lorem Ipsum available,
but believable
PLECE ENTER
There are many variations of passages of Lorem Ipsum available,
available, but believable
OSHA现场作业手册说明书
DIRECTIVE NUMBER: CPL 02-00-150 EFFECTIVE DATE: April 22, 2011 SUBJECT: Field Operations Manual (FOM)ABSTRACTPurpose: This instruction cancels and replaces OSHA Instruction CPL 02-00-148,Field Operations Manual (FOM), issued November 9, 2009, whichreplaced the September 26, 1994 Instruction that implemented the FieldInspection Reference Manual (FIRM). The FOM is a revision of OSHA’senforcement policies and procedures manual that provides the field officesa reference document for identifying the responsibilities associated withthe majority of their inspection duties. This Instruction also cancels OSHAInstruction FAP 01-00-003 Federal Agency Safety and Health Programs,May 17, 1996 and Chapter 13 of OSHA Instruction CPL 02-00-045,Revised Field Operations Manual, June 15, 1989.Scope: OSHA-wide.References: Title 29 Code of Federal Regulations §1903.6, Advance Notice ofInspections; 29 Code of Federal Regulations §1903.14, Policy RegardingEmployee Rescue Activities; 29 Code of Federal Regulations §1903.19,Abatement Verification; 29 Code of Federal Regulations §1904.39,Reporting Fatalities and Multiple Hospitalizations to OSHA; and Housingfor Agricultural Workers: Final Rule, Federal Register, March 4, 1980 (45FR 14180).Cancellations: OSHA Instruction CPL 02-00-148, Field Operations Manual, November9, 2009.OSHA Instruction FAP 01-00-003, Federal Agency Safety and HealthPrograms, May 17, 1996.Chapter 13 of OSHA Instruction CPL 02-00-045, Revised FieldOperations Manual, June 15, 1989.State Impact: Notice of Intent and Adoption required. See paragraph VI.Action Offices: National, Regional, and Area OfficesOriginating Office: Directorate of Enforcement Programs Contact: Directorate of Enforcement ProgramsOffice of General Industry Enforcement200 Constitution Avenue, NW, N3 119Washington, DC 20210202-693-1850By and Under the Authority ofDavid Michaels, PhD, MPHAssistant SecretaryExecutive SummaryThis instruction cancels and replaces OSHA Instruction CPL 02-00-148, Field Operations Manual (FOM), issued November 9, 2009. The one remaining part of the prior Field Operations Manual, the chapter on Disclosure, will be added at a later date. This Instruction also cancels OSHA Instruction FAP 01-00-003 Federal Agency Safety and Health Programs, May 17, 1996 and Chapter 13 of OSHA Instruction CPL 02-00-045, Revised Field Operations Manual, June 15, 1989. This Instruction constitutes OSHA’s general enforcement policies and procedures manual for use by the field offices in conducting inspections, issuing citations and proposing penalties.Significant Changes∙A new Table of Contents for the entire FOM is added.∙ A new References section for the entire FOM is added∙ A new Cancellations section for the entire FOM is added.∙Adds a Maritime Industry Sector to Section III of Chapter 10, Industry Sectors.∙Revises sections referring to the Enhanced Enforcement Program (EEP) replacing the information with the Severe Violator Enforcement Program (SVEP).∙Adds Chapter 13, Federal Agency Field Activities.∙Cancels OSHA Instruction FAP 01-00-003, Federal Agency Safety and Health Programs, May 17, 1996.DisclaimerThis manual is intended to provide instruction regarding some of the internal operations of the Occupational Safety and Health Administration (OSHA), and is solely for the benefit of the Government. No duties, rights, or benefits, substantive or procedural, are created or implied by this manual. The contents of this manual are not enforceable by any person or entity against the Department of Labor or the United States. Statements which reflect current Occupational Safety and Health Review Commission or court precedents do not necessarily indicate acquiescence with those precedents.Table of ContentsCHAPTER 1INTRODUCTIONI.PURPOSE. ........................................................................................................... 1-1 II.SCOPE. ................................................................................................................ 1-1 III.REFERENCES .................................................................................................... 1-1 IV.CANCELLATIONS............................................................................................. 1-8 V. ACTION INFORMATION ................................................................................. 1-8A.R ESPONSIBLE O FFICE.......................................................................................................................................... 1-8B.A CTION O FFICES. .................................................................................................................... 1-8C. I NFORMATION O FFICES............................................................................................................ 1-8 VI. STATE IMPACT. ................................................................................................ 1-8 VII.SIGNIFICANT CHANGES. ............................................................................... 1-9 VIII.BACKGROUND. ................................................................................................. 1-9 IX. DEFINITIONS AND TERMINOLOGY. ........................................................ 1-10A.T HE A CT................................................................................................................................................................. 1-10B. C OMPLIANCE S AFETY AND H EALTH O FFICER (CSHO). ...........................................................1-10B.H E/S HE AND H IS/H ERS ..................................................................................................................................... 1-10C.P ROFESSIONAL J UDGMENT............................................................................................................................... 1-10E. W ORKPLACE AND W ORKSITE ......................................................................................................................... 1-10CHAPTER 2PROGRAM PLANNINGI.INTRODUCTION ............................................................................................... 2-1 II.AREA OFFICE RESPONSIBILITIES. .............................................................. 2-1A.P ROVIDING A SSISTANCE TO S MALL E MPLOYERS. ...................................................................................... 2-1B.A REA O FFICE O UTREACH P ROGRAM. ............................................................................................................. 2-1C. R ESPONDING TO R EQUESTS FOR A SSISTANCE. ............................................................................................ 2-2 III. OSHA COOPERATIVE PROGRAMS OVERVIEW. ...................................... 2-2A.V OLUNTARY P ROTECTION P ROGRAM (VPP). ........................................................................... 2-2B.O NSITE C ONSULTATION P ROGRAM. ................................................................................................................ 2-2C.S TRATEGIC P ARTNERSHIPS................................................................................................................................. 2-3D.A LLIANCE P ROGRAM ........................................................................................................................................... 2-3 IV. ENFORCEMENT PROGRAM SCHEDULING. ................................................ 2-4A.G ENERAL ................................................................................................................................................................. 2-4B.I NSPECTION P RIORITY C RITERIA. ..................................................................................................................... 2-4C.E FFECT OF C ONTEST ............................................................................................................................................ 2-5D.E NFORCEMENT E XEMPTIONS AND L IMITATIONS. ....................................................................................... 2-6E.P REEMPTION BY A NOTHER F EDERAL A GENCY ........................................................................................... 2-6F.U NITED S TATES P OSTAL S ERVICE. .................................................................................................................. 2-7G.H OME-B ASED W ORKSITES. ................................................................................................................................ 2-8H.I NSPECTION/I NVESTIGATION T YPES. ............................................................................................................... 2-8 V.UNPROGRAMMED ACTIVITY – HAZARD EVALUATION AND INSPECTION SCHEDULING ............................................................................ 2-9 VI.PROGRAMMED INSPECTIONS. ................................................................... 2-10A.S ITE-S PECIFIC T ARGETING (SST) P ROGRAM. ............................................................................................. 2-10B.S CHEDULING FOR C ONSTRUCTION I NSPECTIONS. ..................................................................................... 2-10C.S CHEDULING FOR M ARITIME I NSPECTIONS. ............................................................................. 2-11D.S PECIAL E MPHASIS P ROGRAMS (SEP S). ................................................................................... 2-12E.N ATIONAL E MPHASIS P ROGRAMS (NEP S) ............................................................................... 2-13F.L OCAL E MPHASIS P ROGRAMS (LEP S) AND R EGIONAL E MPHASIS P ROGRAMS (REP S) ............ 2-13G.O THER S PECIAL P ROGRAMS. ............................................................................................................................ 2-13H.I NSPECTION S CHEDULING AND I NTERFACE WITH C OOPERATIVE P ROGRAM P ARTICIPANTS ....... 2-13CHAPTER 3INSPECTION PROCEDURESI.INSPECTION PREPARATION. .......................................................................... 3-1 II.INSPECTION PLANNING. .................................................................................. 3-1A.R EVIEW OF I NSPECTION H ISTORY .................................................................................................................... 3-1B.R EVIEW OF C OOPERATIVE P ROGRAM P ARTICIPATION .............................................................................. 3-1C.OSHA D ATA I NITIATIVE (ODI) D ATA R EVIEW .......................................................................................... 3-2D.S AFETY AND H EALTH I SSUES R ELATING TO CSHO S.................................................................. 3-2E.A DVANCE N OTICE. ................................................................................................................................................ 3-3F.P RE-I NSPECTION C OMPULSORY P ROCESS ...................................................................................................... 3-5G.P ERSONAL S ECURITY C LEARANCE. ................................................................................................................. 3-5H.E XPERT A SSISTANCE. ........................................................................................................................................... 3-5 III. INSPECTION SCOPE. ......................................................................................... 3-6A.C OMPREHENSIVE ................................................................................................................................................... 3-6B.P ARTIAL. ................................................................................................................................................................... 3-6 IV. CONDUCT OF INSPECTION .............................................................................. 3-6A.T IME OF I NSPECTION............................................................................................................................................. 3-6B.P RESENTING C REDENTIALS. ............................................................................................................................... 3-6C.R EFUSAL TO P ERMIT I NSPECTION AND I NTERFERENCE ............................................................................. 3-7D.E MPLOYEE P ARTICIPATION. ............................................................................................................................... 3-9E.R ELEASE FOR E NTRY ............................................................................................................................................ 3-9F.B ANKRUPT OR O UT OF B USINESS. .................................................................................................................... 3-9G.E MPLOYEE R ESPONSIBILITIES. ................................................................................................. 3-10H.S TRIKE OR L ABOR D ISPUTE ............................................................................................................................. 3-10I. V ARIANCES. .......................................................................................................................................................... 3-11 V. OPENING CONFERENCE. ................................................................................ 3-11A.G ENERAL ................................................................................................................................................................ 3-11B.R EVIEW OF A PPROPRIATION A CT E XEMPTIONS AND L IMITATION. ..................................................... 3-13C.R EVIEW S CREENING FOR P ROCESS S AFETY M ANAGEMENT (PSM) C OVERAGE............................. 3-13D.R EVIEW OF V OLUNTARY C OMPLIANCE P ROGRAMS. ................................................................................ 3-14E.D ISRUPTIVE C ONDUCT. ...................................................................................................................................... 3-15F.C LASSIFIED A REAS ............................................................................................................................................. 3-16VI. REVIEW OF RECORDS. ................................................................................... 3-16A.I NJURY AND I LLNESS R ECORDS...................................................................................................................... 3-16B.R ECORDING C RITERIA. ...................................................................................................................................... 3-18C. R ECORDKEEPING D EFICIENCIES. .................................................................................................................. 3-18 VII. WALKAROUND INSPECTION. ....................................................................... 3-19A.W ALKAROUND R EPRESENTATIVES ............................................................................................................... 3-19B.E VALUATION OF S AFETY AND H EALTH M ANAGEMENT S YSTEM. ....................................................... 3-20C.R ECORD A LL F ACTS P ERTINENT TO A V IOLATION. ................................................................................. 3-20D.T ESTIFYING IN H EARINGS ................................................................................................................................ 3-21E.T RADE S ECRETS. ................................................................................................................................................. 3-21F.C OLLECTING S AMPLES. ..................................................................................................................................... 3-22G.P HOTOGRAPHS AND V IDEOTAPES.................................................................................................................. 3-22H.V IOLATIONS OF O THER L AWS. ....................................................................................................................... 3-23I.I NTERVIEWS OF N ON-M ANAGERIAL E MPLOYEES .................................................................................... 3-23J.M ULTI-E MPLOYER W ORKSITES ..................................................................................................................... 3-27 K.A DMINISTRATIVE S UBPOENA.......................................................................................................................... 3-27 L.E MPLOYER A BATEMENT A SSISTANCE. ........................................................................................................ 3-27 VIII. CLOSING CONFERENCE. .............................................................................. 3-28A.P ARTICIPANTS. ..................................................................................................................................................... 3-28B.D ISCUSSION I TEMS. ............................................................................................................................................ 3-28C.A DVICE TO A TTENDEES .................................................................................................................................... 3-29D.P ENALTIES............................................................................................................................................................. 3-30E.F EASIBLE A DMINISTRATIVE, W ORK P RACTICE AND E NGINEERING C ONTROLS. ............................ 3-30F.R EDUCING E MPLOYEE E XPOSURE. ................................................................................................................ 3-32G.A BATEMENT V ERIFICATION. ........................................................................................................................... 3-32H.E MPLOYEE D ISCRIMINATION .......................................................................................................................... 3-33 IX. SPECIAL INSPECTION PROCEDURES. ...................................................... 3-33A.F OLLOW-UP AND M ONITORING I NSPECTIONS............................................................................................ 3-33B.C ONSTRUCTION I NSPECTIONS ......................................................................................................................... 3-34C. F EDERAL A GENCY I NSPECTIONS. ................................................................................................................. 3-35CHAPTER 4VIOLATIONSI. BASIS OF VIOLATIONS ..................................................................................... 4-1A.S TANDARDS AND R EGULATIONS. .................................................................................................................... 4-1B.E MPLOYEE E XPOSURE. ........................................................................................................................................ 4-3C.R EGULATORY R EQUIREMENTS. ........................................................................................................................ 4-6D.H AZARD C OMMUNICATION. .............................................................................................................................. 4-6E. E MPLOYER/E MPLOYEE R ESPONSIBILITIES ................................................................................................... 4-6 II. SERIOUS VIOLATIONS. .................................................................................... 4-8A.S ECTION 17(K). ......................................................................................................................... 4-8B.E STABLISHING S ERIOUS V IOLATIONS ............................................................................................................ 4-8C. F OUR S TEPS TO BE D OCUMENTED. ................................................................................................................... 4-8 III. GENERAL DUTY REQUIREMENTS ............................................................. 4-14A.E VALUATION OF G ENERAL D UTY R EQUIREMENTS ................................................................................. 4-14B.E LEMENTS OF A G ENERAL D UTY R EQUIREMENT V IOLATION.............................................................. 4-14C. U SE OF THE G ENERAL D UTY C LAUSE ........................................................................................................ 4-23D.L IMITATIONS OF U SE OF THE G ENERAL D UTY C LAUSE. ..............................................................E.C LASSIFICATION OF V IOLATIONS C ITED U NDER THE G ENERAL D UTY C LAUSE. ..................F. P ROCEDURES FOR I MPLEMENTATION OF S ECTION 5(A)(1) E NFORCEMENT ............................ 4-25 4-27 4-27IV.OTHER-THAN-SERIOUS VIOLATIONS ............................................... 4-28 V.WILLFUL VIOLATIONS. ......................................................................... 4-28A.I NTENTIONAL D ISREGARD V IOLATIONS. ..........................................................................................4-28B.P LAIN I NDIFFERENCE V IOLATIONS. ...................................................................................................4-29 VI. CRIMINAL/WILLFUL VIOLATIONS. ................................................... 4-30A.A REA D IRECTOR C OORDINATION ....................................................................................................... 4-31B.C RITERIA FOR I NVESTIGATING P OSSIBLE C RIMINAL/W ILLFUL V IOLATIONS ........................ 4-31C. W ILLFUL V IOLATIONS R ELATED TO A F ATALITY .......................................................................... 4-32 VII. REPEATED VIOLATIONS. ...................................................................... 4-32A.F EDERAL AND S TATE P LAN V IOLATIONS. ........................................................................................4-32B.I DENTICAL S TANDARDS. .......................................................................................................................4-32C.D IFFERENT S TANDARDS. .......................................................................................................................4-33D.O BTAINING I NSPECTION H ISTORY. .....................................................................................................4-33E.T IME L IMITATIONS..................................................................................................................................4-34F.R EPEATED V. F AILURE TO A BATE....................................................................................................... 4-34G. A REA D IRECTOR R ESPONSIBILITIES. .............................................................................. 4-35 VIII. DE MINIMIS CONDITIONS. ................................................................... 4-36A.C RITERIA ................................................................................................................................................... 4-36B.P ROFESSIONAL J UDGMENT. ..................................................................................................................4-37C. A REA D IRECTOR R ESPONSIBILITIES. .............................................................................. 4-37 IX. CITING IN THE ALTERNATIVE ............................................................ 4-37 X. COMBINING AND GROUPING VIOLATIONS. ................................... 4-37A.C OMBINING. ..............................................................................................................................................4-37B.G ROUPING. ................................................................................................................................................4-38C. W HEN N OT TO G ROUP OR C OMBINE. ................................................................................................4-38 XI. HEALTH STANDARD VIOLATIONS ....................................................... 4-39A.C ITATION OF V ENTILATION S TANDARDS ......................................................................................... 4-39B.V IOLATIONS OF THE N OISE S TANDARD. ...........................................................................................4-40 XII. VIOLATIONS OF THE RESPIRATORY PROTECTION STANDARD(§1910.134). ....................................................................................................... XIII. VIOLATIONS OF AIR CONTAMINANT STANDARDS (§1910.1000) ... 4-43 4-43A.R EQUIREMENTS UNDER THE STANDARD: .................................................................................................. 4-43B.C LASSIFICATION OF V IOLATIONS OF A IR C ONTAMINANT S TANDARDS. ......................................... 4-43 XIV. CITING IMPROPER PERSONAL HYGIENE PRACTICES. ................... 4-45A.I NGESTION H AZARDS. .................................................................................................................................... 4-45B.A BSORPTION H AZARDS. ................................................................................................................................ 4-46C.W IPE S AMPLING. ............................................................................................................................................. 4-46D.C ITATION P OLICY ............................................................................................................................................ 4-46 XV. BIOLOGICAL MONITORING. ...................................................................... 4-47CHAPTER 5CASE FILE PREPARATION AND DOCUMENTATIONI.INTRODUCTION ............................................................................................... 5-1 II.INSPECTION CONDUCTED, CITATIONS BEING ISSUED. .................... 5-1A.OSHA-1 ................................................................................................................................... 5-1B.OSHA-1A. ............................................................................................................................... 5-1C. OSHA-1B. ................................................................................................................................ 5-2 III.INSPECTION CONDUCTED BUT NO CITATIONS ISSUED .................... 5-5 IV.NO INSPECTION ............................................................................................... 5-5 V. HEALTH INSPECTIONS. ................................................................................. 5-6A.D OCUMENT P OTENTIAL E XPOSURE. ............................................................................................................... 5-6B.E MPLOYER’S O CCUPATIONAL S AFETY AND H EALTH S YSTEM. ............................................................. 5-6 VI. AFFIRMATIVE DEFENSES............................................................................. 5-8A.B URDEN OF P ROOF. .............................................................................................................................................. 5-8B.E XPLANATIONS. ..................................................................................................................................................... 5-8 VII. INTERVIEW STATEMENTS. ........................................................................ 5-10A.G ENERALLY. ......................................................................................................................................................... 5-10B.CSHO S SHALL OBTAIN WRITTEN STATEMENTS WHEN: .......................................................................... 5-10C.L ANGUAGE AND W ORDING OF S TATEMENT. ............................................................................................. 5-11D.R EFUSAL TO S IGN S TATEMENT ...................................................................................................................... 5-11E.V IDEO AND A UDIOTAPED S TATEMENTS. ..................................................................................................... 5-11F.A DMINISTRATIVE D EPOSITIONS. .............................................................................................5-11 VIII. PAPERWORK AND WRITTEN PROGRAM REQUIREMENTS. .......... 5-12 IX.GUIDELINES FOR CASE FILE DOCUMENTATION FOR USE WITH VIDEOTAPES AND AUDIOTAPES .............................................................. 5-12 X.CASE FILE ACTIVITY DIARY SHEET. ..................................................... 5-12 XI. CITATIONS. ..................................................................................................... 5-12A.S TATUTE OF L IMITATIONS. .............................................................................................................................. 5-13B.I SSUING C ITATIONS. ........................................................................................................................................... 5-13C.A MENDING/W ITHDRAWING C ITATIONS AND N OTIFICATION OF P ENALTIES. .................................. 5-13D.P ROCEDURES FOR A MENDING OR W ITHDRAWING C ITATIONS ............................................................ 5-14 XII. INSPECTION RECORDS. ............................................................................... 5-15A.G ENERALLY. ......................................................................................................................................................... 5-15B.R ELEASE OF I NSPECTION I NFORMATION ..................................................................................................... 5-15C. C LASSIFIED AND T RADE S ECRET I NFORMATION ...................................................................................... 5-16。
2019-2020新课堂英语选修八北师大版讲义:Unit 23-3 Word版含答案
Period Three Lesson 3War MemoriesⅠ.单词自测1.security n.安全secure adj.可靠的,安全的2.ending n.结局,结尾3.weep v t.& v i.哭泣,流泪sob v i.抽泣,呜咽4.shoot v t.& v i.射击5.unconscious adj.失去知觉的6.representative n.代表represent v t.代表7.greet v t.问候,致意greeting n.问候(常用复数)8.remark v t.说起,谈到9.distribute v t.分发,分配distribution n.分配,配给10.consume v t.喝;消耗,消费consumption n.消费;吃喝consumer n.消费者11.salute v t.向……致敬12.swear v i.发誓13.acquaintance n.相识的人14.handful n.少数,一些15.firework n.烟火,烟花Ⅱ.短语自测1.have_no_reason_to_do...没有理由干……2.in_surprise吃惊地,惊奇地3.be_fed_up_with...对……烦透了4.come_to_an_understanding达到一致,达成谅解5.in_peace和平地6.turn_sb.off令某人厌烦/反感7.more_or_less或多或少,几乎8.take_sb.in_one's_arms拥抱某人9.get_through打通(电话);完成;通过10.a_handful_of少量的1.One of their men,speaking in English,remarked_that he had worked in England for some years and_that he was fed up to the neck with this war and would be glad when it was over.他们之中有一个人会说英语,他说他在英格兰工作过好几年,他对这场讨厌的战争烦透了,如果战争结束他会感到高兴的。
2023年浙江省普通高等学校招生全国统一考试英语含答案
2023年普通高等学校招生全国统一考试英语选择题部分第一部分听力(共两节,满分30分)做题时,先将答案标在试卷上。
录音内容结束后,你将有两分钟的时间将试卷上的答案转涂到答题纸上。
第一节(共5小题;每小题1.5分,满分7.5分)听下面5段对话。
每段对话后有一个小题,从题中所给的A、B、C三个选项中选出最佳选项。
听完每段对话后,你都有10秒钟的时间来回答有关小题和阅读下一小题。
每段对话仅读一遍。
1. 【此处可播放相关音频,请去附件查看】What will the speakers do next?A. Visit a friend.B. Pick up Billy.C. Buy some beans.【答案】C【原文】M: Billy needs some beans for his science project at school. Maybe we can stop by a store on our way home. W: Let’s go to Greens. It’s just around the corner.M: Okay.2. 【此处可播放相关音频,请去附件查看】Who is Andy Clarks?A. A public librarian.B. A TV actor.C. A famous lawyer.【答案】B【原文】W: Hi, Stephen, guess who I saw at the city library? Andy Clarkes — the leading actor in The Good Lawyer — the famous TV series.M: What was he doing there? His popularity has slipped since the final season of the show.3. 【此处可播放相关音频,请去附件查看】What are the speakers talking about?A. Gifts for Jason.B. A baseball game.C. The woman's retirement.【答案】A【原文】W: It seems as if everybody is talking about Jason’s retirement.M: Yes, his office is filled with gifts. I gave him a T-shirt with a baseball pattern on it.W: That’s nice. I’ll get him something this afternoon. Hope it’s not late.4. 【此处可播放相关音频,请去附件查看】What went on at Cooper's last night?A. A movie show.B. A birthday party.C. A sales promotion.【答案】C【原文】W: Did you go to Cooper’s last night?M: No, was there anything special?W: Yes, the employees dressed up as movie characters, and every customer received a discount card.M: That was interesting.5. 【此处可播放相关音频,请去附件查看】What problem do the speakers have?A. They are late for work.B. They get stuck in traffic.C. They have lost their way.【答案】B【原文】W: Oh, the road is jammed with traffic again. We are going to be late for work.M: Let’s make a U-turn at the next crossroads and try another way.第二节(共15小题:每小题1.5分,满分22.5分)听下面5段对话或独白。
Autodesk Simulation DFM软件介绍说明书
Simulate While You Design with Inventor and Simulation DFM Robert Savage – Advanced Solutions Inc., Education Specialist - Primary SpeakerKevin J. Smedley – FS-Elliott Co., LLC – Co-SpeakerMD5511 Simulation DFM or “Design for Manufacturing” software was created by Autodesk after they purchased Moldflow. It was inspired by a Moldflow software called “Moldflow Cad Doctor”, but DFM is not a Moldflow product… It is, however, powered by Moldflow. It was created to be used by designers and engineers to help verify the part design and cut down on costly mistakes at the part level. DFM loads inside your 3D design tool to give you near-real-time feedback on the quality of your plastic part, as you design it. Simulation DFM software reviews things, such as nominal wall thickness, draft angle, material cost, part recyclability, sink marks, fill patterns, and more, to grade your part in the categories of manufacturability, cost, and environmental impact. In this class, we will look at how we can analyze the part files, during the design process. We will also investigate the effect changes to the configurations and the parts have.Learning ObjectivesAt the end of this class, you will be able to:1. Learn how to navigate the Simulation DFM interface2. Learn how to analyze the model for possible defects3. Learn how to make changes to the model's material4. Review cost effects of part changesAbout the SpeakersRobert Savage is an Education Specialist at Advanced Solutions, Inc. He is a 15-year design veteran who has designed everything from molds and molded parts to robots. At Remotec, a division of Northrop Grumman Corporation, he spent 5 years as a designer in the development group, as well as CAD and Vault Administrator. He is an Autodesk Certified Instructor and a Certified Inventor Professional. He has used Inventor software since its inception, as well as being well-versed in a variety of other design software. He has 10 years of experience teaching 3D design software, including Product Design Suite Ultimate software, Factory Design Suite Ultimate software, Simulation Moldflow software, and Vault Professional software. Email: *****************************Kevin Smedley is currently Cad Manager for Product Engineering at FS-Elliott Company, a Global Centrifugal Compressor Manufacturer with facilities in Asia, Europe, South America and headquartered in Export, Pennsylvania. He has 26 years of Autodesk applications experience in design/drafting and as an Autodesk VAR channel Technical/Mechanical Applications Engineer. He spent 16 years, in the Autodesk channel, implementing 3D processes and creating Vault database strategies, along with training users. Kevin has created best practices and workflows, as a Certified Inventor and Vault Specialist. He’s presented lectures and hands-on labs at Autodesk University for 7 years, as wel l as attending AU for 10 years. Kevin’s philosophy is summed up in three words… Communication, Consistency, and Standards. Kevin continues pursuing best practices and processes for the Product Design Suite and Vault Pro data management. Email: ***********************ContentsLearning Objectives (1)About the Speakers (1)Chapter 1 (3)Navigate the Interfaces (3)Widget (4)Standalone (7)Chapter 2 (8)Analyzing the Model (8)Indicators (8)Pull Direction (11)Injection Locations (14)Animation Tools (11)Finished Part View (15)Saving and Exporting (17)Chapter 3 (18)Making Changes (18)Configure Rules (18)Materials (24)Chapter 4 (26)Cost Effect of Part Changes (26)Mold Cost (26)Material Cost (27)Production Cost (27)Chapter 1Navigate the Interfaces∙Widget∙StandaloneSimulation DFM (Simulation Design for Manufacturing) is part of the Autodesk Digital Prototyping solutions. Simulation DFM also runs as a standalone tool and as a widget inside your Autodesk Inventor software. In addition, it will work in PTC Creo, and Solidworks. Simulation DFM is designed to show real-time evaluation of your plastic components, focusing on Manufacturability, Cost Efficiency, and Plastic Material Impact. It is intended to be used during the 3D part design process by both designers and engineers to minimize errors and improve design efficiencies. The widget usesgreen/yellow/red indicators for visual feedback in areas,such as wall thickness, draft angles, sink marks, fillpatterns, and part recyclability. As the design processbuilds, the DFM evaluates and updates the output.Autodesk has a portfolio of Simulation products which fits into a number of different situations. The portfolio make up includes the following:Mechanical SimulationMoldflow SimulationComposite SimulationComputational Fluid Dynamics SimulationStructural AnalysisWidgetSimulation DFM will run as a widget inside Autodesk Inventor, as well as PTC Creo, and Solidworks, giving the same analysis for each of the products. The widget is similar to a toolbar, but instead of icons, it has indicators that change colors from Green to Yellow to Red, showing the severity of the issue. In this class, we are going to be focusing on using DFM, while running Inventor software. It can be set to load automatically in the software by going to the Tools Tab then selecting the Add-Ins Button. Inside the Add-In Manage, you can set Autodesk Simulation DFM to Load/Unload or Load Automatically.The Widget has 3 main parts: the Indicators, the Menu, and the Refresh Button. The Widget Indicator displays the results of the analysis in the 3 different categories: Manufacturability, Cost Efficiency, and Plastic Material Impact.The Widget Menu is a dropdown menu in the lower right hand corner of the page. In the drop down, you will find the options and toolbars for defining injector locations and Fill Animation, as well as A Finish Part Previewer. The Refresh tool, which can be set to automatically refresh, will show as a button in the upper left hand corner of the tools. The Refresh tool is what you would select to tell it to refresh your calculations.If an indicator has a yellow triangle with an exclamation mark on it, you have received an Alert. This means you have one or more subcategories with an issue, which you need to address. If you select on the indicator, it will display the subcategory with the issue. If you select the subcategory, it will then display the issue on the model.IndicatorsPlastic Material ImpactCost EfficiencyManufacturabilityMenuRefreshThe Refresh can be used as an Automatic Refresh by checking the option in the dropdown list on the widget, or used as a manual refresh to be selected as desired.ToolbarsThere are 2 toolbars available in the dropdown menu on the widget. They are named, “Injection location” and “Animation”. In the software, they display as toolbars. However, in the standalone they show up as tabs in the ribbon.Injection locationAnimation (Fill Animation)StandaloneSimulation DFM will not only run inside of a variety of design software, but it also runs as a standalone where it will read and analyze 11 different file formats. The standalone will run the same tools as the add-on software. In the standalone, you have the same tools as the widget, but you have an increase in file formats that you can work with.It also contains 2 different ways of using the tools. You can choose to use the widget or the ribbon to access the different tools.Chapter 2Analyzing the Model∙Indicatorso Manufacturabilityo Cost Efficiencyo Plastic Material Impact∙Pull Direction∙Fill Tools∙Injector Locations∙Finished Part Preview∙Exporting ResultsIn this Chapter, we are going to focus on how the tools are used to analyze your design. The tools are used the same, whether you are using the Widget or the Standalone tools. The Indicator tools will give you visual feedback on the thresholds that are configured in the system. The toolbars will allow you to set injector locations and view the fill results based on the injector locations.Indicatorso Manufacturabilityo Cost Efficiencyo Plastic Material ImpactManufacturability, Cost Efficiency, and Plastic Material Impact are indicators on the widget, but they are rollups of different subcategories. They indicate the overall effect of the different subcategories by using different colors. By selecting the indicator, it will list the subcategories that are not at optimal levels in the alerts section and all levels will be listed in the information section.There are 3 buttons in the Indicators. They each have different areas they are evaluating. The button changes colors from green to yellow to red, and if you put your cursor over the indicator it will give you an overall percentage of the cumulative subcategories. If you select the indicator, you will get a drop down that has two tabs: Alerts and Information. In the Alerts area, you will see any subcategory that has a higher chance of causing an issue in manufacturing. Selecting a subcategory will also highlight the areas on the screen where the issue exists.The Information tab will let you see the results from all of the sub categories. Selecting a subcategory will either giving you an on-the-screen representation of the issues, or a dialog box indicating why the rating is not high.In the design software, the Indicators and subcategories recalculate, as you make modifications to the model or when you tell it to refresh. Unless, you have it set to Auto-refresh.Animation ToolsThe Animation tool will play, pause, and replay the fill animation, based on the injector locations. This can be used with the Injector tools to see how the part will fill. These tools are used together to determine results, like, Weld Lines and Sink Marks.Pull DirectionThe Pull Direction is a tool that is only available in the standalone. The icon for the tool launches a tab on the ribbon, allowing you to define or move the pull direction of the part. It launches a triad that you can place and adjust, by making adjustments to the Red, Green or Blue circular rings.Injection LocationsThe Injection Locations tool will allow you to Move, Add and Delete Injector Locations. There is, by default, 1 injector placed by Simulation DFM that is used in several of the calculations. By moving or adding locations, it will prompt the software to redo the calculations and change the results.Finished Part ViewThe Finished Part View tool is located in the dropdown list on the Widget and the Ribbon on the standalone. It generates a rendered view of the part to help show any defects that may be caused by fill or weld line issues. Inside the rendered window, you can make adjustments to the material under the Edit drop down menu and highlight the defects under the view dropdown. You can also save the file out as an image file under the File dropdown.Saving and ExportingWhen you save the file in Inventor, any adjustments you make to the DFM portion of the file is saved, so that the next time you open the file the changes are still there. If you have the software, you can also export the information to the Autodesk MoldFlow.My Analysis ProcessIn this section, I want to go through the DFM Analysis process I use on plastic parts. Every part is different, as is every user. That is why this is intended as a general process guideline.1. Open or create the file to the point that you are ready to start analyzing it.2. Update or turn on automatic updates.3. Review manufacturability alerts and information.4. Check your fill location or locations.5. Make necessary changes to the part.6. Repeat 3 and 4 till you have it the way you want it.7. Review cost and material alerts and information to see if changes are needed.8. Run finish part preview.9. Save and export if needed.Chapter 3Making Changes∙Configure Rules∙MaterialsIn this section, we are going to look at the different areas you can configure to changes the results that DFM displays in the indicators. We are also going to see how to change materials and what affect the material changes have to the results.Configure RulesThe Configuration Rules can be accessed from the drop down menu on the widget or the ribbon in the standalone. In the rules configuration area, you can select what rules affect the indicators. In the sub categories, you can adjust the percentages displayed in the indicator.Note:∙Modifications to the configuration will apply to all parts∙Not all parameters can be configured∙Because an indicator result is a combination of several parameters, the effect of altering a parameter may not be obvious∙Realistic parameter values need to be appliedIn the rule configuration dialog box, you can adjust what calculations are included in the indicators by checking or unchecking the rule in the main indicator headers.Manufacturability: Wall Thickness calculates the percentage above and below the median wall thickness.Manufacturability: Undercuts calculate the percentage of undercuts to total surface.Manufacturability: Draft Angle calculates a percentage of drafted faces, based on a defined minimum draft angle.Manufacturability: Weld Lines will check weakness and visual flaws caused by joining flow.Manufacturability: Sink Mark checks for surface depressions.Manufacturability: Filling calculates fill ability, based on pressure location and wall thickness.Manufacturability: Knife Edge (New in the 2015 software version) allows you to define a minimum thin edge.Cost Efficiency: Mold Cost is based on size and complexity of the mold tooling.Cost Efficiency: Material Cost calculates raw material cost and volume.Cost Efficiency: Production Cost is based on cycle times.Plastic Material Impact: Carbon Footprint calculates the carbon dioxide required to produce each.Plastic Material Impact: Embodied Energy calculates the energy in BTU’s required to make each part.Plastic Material Impact: Recyclability calculates material recycle rate.Plastic Material Impact: Embodied Water calculates the water required to produce the part.If you have a threshold you want to meet, most of these allow you to add or append the percentages.You also have a button at the bottom of the page that will “Restore All Defaults”.MaterialsMaterial is changed differently in the standalone verses the widget in Inventor. In the widget (Inside Autodesk Inventor), the material is changed in the same way you would for any other part. You can change it using the physical tab, in the part iProperties, or the material drop down menu on the ribbon. Both of these options use the Autodesk Materials Library.In the standalone, you would use the Select Material tool on the Home tab of the ribbon. In the Material selection box, materials are listed by name, as well as by common uses. It also displays a cost indicator and plastic material impact indicator. You can sort the materials by Application and Attributes, using the drop down list at the top of the box.Chapter 4Cost Effect of Part Changes∙Mold Cost∙Material Cost∙Production CostIn this section, we are going to look at how cost effect is determined based on three main categories: Mold Cost, Material Cost, and Production Cost. There is no true way for the software to calculate the actual cost of the mold, the material, or the production of the part. What it does is display the Cost Efficiency as a percentage of the three categories. These calculations adjust with every effected change made to the part, both physical and material.Mold CostMold Cost checks the size and complexity of the mold tooling. As you make changes to the parts to reduce size and complexity, the system will automatically recalculate and adjust.Material CostThe Material Cost is based on part size and raw material cost. As you adjust the model size or material, whether it is in the CAD software or in the standalone application, it will adjust the calculations.Production CostProduction Cost is based on Part Cycle Time, which is based on material properties, injector quantities and fill pattern.ConclusionSimulate While You Design with Inventor and Simulation DFM ∙Learn how to navigate the Simulation DFM interface∙Learn how to analyze the model for possible defects∙Learn how to make changes to the model's material∙Review cost effects of part changesIn this class, we looked at using Simulation DFM inside of Inventor and as a standalone, to improve the design process of creating plastic parts. Simulation DFM is an analysis tool that allows you to see the effect different variables have on the overall manufacturability of a part. You can also see real-time updates on how changes to the file and material effect the overall manufacturability of the part.In Chapter 1, we went through the interface of both the widget that runs inside of Inventor, as well as the standalone interface. We also looked at the different areas in the interface and what they mean.In Chapter 2, we explored the different analysis tools that exist within the software and how to apply them to the model.In Chapter 3, we talked about the effect changes to the rules, as well as the material, have on the calculations.In Chapter 4, we looked at how the cost effect was calculated and how changes effect the results of the calculations.I want to thank you for attending this class. I know you have a lot of class choices at AU2015. If you have any questions on the information, please feel free to email me at*****************************.I would also like to thank Kevin Smedley for his assistance in this class. He not only kept me on track, but on point.。
非线性系统(第三版)(英文版)chapter4[2页][001]精选全文完整版
1Additional Exercises for Chapter 41.For each of the following systems,use a quadratic Lyapunov function candidate to show that the origin is asymptotically stable.Then,investigate whether the origin is globally asymptotically stable.(1)˙x 1=−x 1+x 22,˙x 2=−x 2(2)˙x 1=(x 1−x 2)(x 21+x 22−1),˙x 2=(x 1+x 2)(x 21+x 22−1)(3)˙x 1=−x 1+x 21x 2,˙x 2=−x 2+x 1ing V (x )=x 21+x 22,study stability of the origin of the system˙x 1=x 1(k 2−x 21−x 22)+x 2(x 21+x 22+k 2),˙x 2=−x 1(k 2+x 21+x 22)+x 2(k 2−x 21−x 22)when (a)k =0and (b)k =0.ing the variable gradient method,find a Lyapunov function V (x )that shows asymptotic stability ofthe origin of the system˙x 1=x 2,˙x 2=−(x 1+x 2)−sin(x 1+x 2)4.Consider the system˙x 1=x 2,˙x 2=x 1−sat(2x 1+x 2)Show that the origin is asymptotically stable,but not globally asymptotically stable.5.Show that the origin of the following system is unstable.˙x 1=−x 1+x 62,˙x 2=x 32+x 616.Consider the system˙z =−m i =1a i y i ,˙y i =−h (z,y )y i +b i g (z ),i =1,2,...,mwhere z is a scalar,y T =(y 1,...,y m ).The functions h (·,·)and g (·)are continuously differentiable for all (z,y )and satisfy zg (z )>0,∀z =0,h (z,y )>0,∀(z,y )=0,and z0g (σ)dσ→∞as |z |→∞.The constants a i and b i satisfy b i =0and a i /b i >0,∀i =1,2,...,m .Show that the origin is an equilibrium point,and investigate its stability using a Lyapunov function candidate of the formV (z,y )=α z 0g (σ)dσ+mi =1βi y 2i7.Consider the system˙x 1=x 2,˙x 2=−x 1−x 2sat(x 22−x 23),˙x 3=x 3sat(x 22−x 23)where sat(·)is the saturation function.Show that the origin is the unique equilibrium point,and useV (x )=x T x to show that it is globally asymptotically stable.8.The origin x =0is an equilibrium point of the system˙x 1=−kh (x )x 1+x 2,˙x 2=−h (x )x 2−x 31Let D ={x ∈R 2| x 2<1}.Using V (x )=14x 41+12x 22,investigate stability of the origin in each ofthe following cases.(1)k >0,h (x )>0,∀x ∈D ;(2)k >0,h (x )>0,∀x ∈R 2;(3)k >0,h (x )<0,∀x ∈D ;(4)k >0,h (x )=0,∀x ∈D ;(5)k =0,h (x )>0,∀x ∈D ;(6)k =0,h (x )>0,∀x ∈R 2.29.Consider the system˙x 1=−x 1+g (x 3),˙x 2=−g (x 3),˙x 3=−ax 1+bx 2−cg (x 3)where a ,b ,and c are positive constants and g (·)is a locally Lipschitz function that satisfiesg (0)=0and yg (y )>0,∀0<|y |<k,k >0(a)Show that the origin is an isolated equilibrium point.(b)With V (x )=12ax 21+12bx 22+ x 3g (y )dy as a Lyapunov function candidate,show that the origin is asymptotically stable.(c)Suppose yg (y )>0∀y =0.Is the origin globally asymptotically stable?10.Consider the system˙x 1=x 2,˙x 2=−a sin x 1−kx 1−dx 2−cx 3,˙x 3=−x 3+x 2where all coefficients are positive and k >a .Using V (x )=2a x 10sin y dy +kx 21+x 22+px 23with some p >0,show that the origin is globally asymptotically stable.11.Show that the system˙x 1=11+x 3−x 1,˙x 2=x 1−2x 2,˙x 3=x 2−3x 3has a unique equilibrium point in the region x i ≥0,i =1,2,3,and investigate stability of this point using linearization.12.For each of the following systems,use linearization to show that the origin is asymptotically stable.Then,show that the origin is globally asymptotically stable.(1)˙x 1=−x 1+x 2˙x 2=(x 1+x 2)sin x 1−3x 2(2)˙x 1=−x 31+x 2˙x 2=−ax 1−bx 2,a,b >013.Consider the system˙x 1=−x 31+α(t )x 2,˙x 2=−α(t )x 1−x 32where α(t )is a continuous,bounded function.Show that the origin is globally uniformly asymptoticallystable.Is it exponentially stable?14.Consider the system˙x 1=x 2,˙x 2=−x 1−(1+b cos t )x 2Find b ∗>0such that the origin is exponentially stable for all |b |<b ∗.15.Consider the system˙x 1=x 2−g (t )x 1(x 21+x 22),˙x 2=−x 1−g (t )x 2(x 21+x 22)where g (t )is continuously differentiable,bounded,and g (t )≥k >0for all t ≥0.Is the originuniformly asymptotically stable?Is it exponentially stable?16.Consider two systems represented by˙x =f (x )(1)˙x =h (x )f (x )(2)where f :R n →R n and h :R n →R are continuously differentiable,f (0)=0,and h (0)>0.Show that the origin of (1)is exponentially stable if and only if the origin of (2)is exponentially stable.17.Investigate input-to-state stability of the system˙x 1=(x 1−x 2+u )(x 21+x 22−1),˙x 2=(x 1+x 2+u )(x 21+x 22−1)。
ROHM Solution Simulator 用户指南.pdf_1705892277.949866
User’s Guide ROHM Solution SimulatorAutomotive High Precision & Input/Output Rail-to-Rail CMOS Operational Amplifiers (Quad Op-Amps) TLR4377YFV-C – Voltage Follower– DC Sweep simulationThis circuit simulates DC sweep response with Op-Amp as a voltage follower. You can observe the output voltage when the input voltage is changed. You can customize the parameters of the components shown in blue, such as VSOURCE, or peripheral components, and simulate the voltage follower with the desired operating condition.You can simulate the circuit in the published application note: Operational amplifier, Comparator (Tutorial). [JP] [EN] [CN] [KR] General CautionsCaution 1: The values from the simulation results are not guaranteed. Please use these results as a guide for your design.Caution 2: These model characteristics are specifically at Ta=25°C. Thus, the simulation result with temperature variances may significantly differ from the result with the one done at actual application board (actual measurement).Caution 3: Please refer to the Application note of Op-Amps for details of the technical information.Caution 4: The characteristics may change depending on the actual board design and ROHM strongly recommend to double check those characteristics with actual board where the chips will be mounted on.1 Simulation SchematicFigure 1. Simulation Schematic2 How to simulateThe simulation settings, such as parameter sweep or convergence options,are configurable from the ‘Simulation Settings’ shown in Figure 2, and Table1 shows the default setup of the simulation.In case of simulation convergence issue, you can change advancedoptions to solve. The temperature is set to 27 °C in the default statement in‘Manual Options’. You can modify it.Figure 2. Simulation Settings and execution Table 1.Simulation settings default setupParameters Default NoteSimulation Type DC Do not change Simulation TypeParameter Sweep VSOURCE VOLTAGE_LEVEL from 0 V to 5 V by 0.1 VAdvanced options Balanced - Convergence Assist -Manual Options .temp 27 - SimulationSettingsSimulate3 Simulation Conditions4 Op-Amp modelTable 3 shows the model pin function implemented. Note that the Op-Amp model is the behavior model for its input/output characteristics, and no protection circuits or the functions not related to the purpose are not implemented.5 Peripheral Components5.1 Bill of MaterialTable 4 shows the list of components used in the simulation schematic. Each of the capacitors has the parameters of equivalent circuit shown below. The default values of equivalent components are set to zero except for the ESR ofC. You can modify the values of each component.Table 4. List of capacitors used in the simulation circuitType Instance Name Default Value Variable RangeUnits Min MaxResistor R1_1 0 0 10 kΩRL1 10k 1k 1M, NC ΩCapacitor C1_1 0.1 0.1 22 pF CL1 10 free, NC pF5.2 Capacitor Equivalent Circuits(a) Property editor (b) Equivalent circuitFigure 3. Capacitor property editor and equivalent circuitThe default value of ESR is 0.01 Ω.(Note 2) These parameters can take any positive value or zero in simulation but it does not guarantee the operation of the IC in any condition. Refer to the datasheet to determine adequate value of parameters.6 Recommended Products6.1 Op-AmpTLR4377YFV-C : Automotive High Precision & Input/Output Rail-to-Rail CMOS Operational Amplifier (QuadOp-Amp). [JP] [EN] [CN] [KR] [TW] [DE]TLR2377YFVM-C : Automotive High Precision & Input/Output Rail-to-Rail CMOS Operational Amplifier (DualOp-Amp). [JP] [EN] [CN] [KR] [TW] [DE]TLR377YG-C : Automotive High Precision & Input/Output Rail-to-Rail CMOS Operational Amplifier. [JP] [EN] [CN] [KR] [TW] [DE]LMR1802G-LB : Low Noise, Low Input Offset Voltage CMOS Operational Amplifier. [JP] [EN] [CN] [KR] [TW] [DE] Technical Articles and Tools can be found in the Design Resources on the product web page.NoticeROHM Customer Support System/contact/Thank you for your accessing to ROHM product informations.More detail product informations and catalogs are available, please contact us.N o t e sThe information contained herein is subject to change without notice.Before you use our Products, please contact our sales representative and verify the latest specifica-tions :Although ROHM is continuously working to improve product reliability and quality, semicon-ductors can break down and malfunction due to various factors.Therefore, in order to prevent personal injury or fire arising from failure, please take safety measures such as complying with the derating characteristics, implementing redundant and fire prevention designs, and utilizing backups and fail-safe procedures. ROHM shall have no responsibility for any damages arising out of the use of our Poducts beyond the rating specified by ROHM.Examples of application circuits, circuit constants and any other information contained herein areprovided only to illustrate the standard usage and operations of the Products. The peripheral conditions must be taken into account when designing circuits for mass production.The technical information specified herein is intended only to show the typical functions of andexamples of application circuits for the Products. ROHM does not grant you, explicitly or implicitly, any license to use or exercise intellectual property or other rights held by ROHM or any other parties. ROHM shall have no responsibility whatsoever for any dispute arising out of the use of such technical information.The Products specified in this document are not designed to be radiation tolerant.For use of our Products in applications requiring a high degree of reliability (as exemplifiedbelow), please contact and consult with a ROHM representative : transportation equipment (i.e. cars, ships, trains), primary communication equipment, traffic lights, fire/crime prevention, safety equipment, medical systems, servers, solar cells, and power transmission systems.Do not use our Products in applications requiring extremely high reliability, such as aerospaceequipment, nuclear power control systems, and submarine repeaters.ROHM shall have no responsibility for any damages or injury arising from non-compliance withthe recommended usage conditions and specifications contained herein.ROHM has used reasonable care to ensur e the accuracy of the information contained in thisdocument. However, ROHM does not warrants that such information is error-free, and ROHM shall have no responsibility for any damages arising from any inaccuracy or misprint of such information.Please use the Products in accordance with any applicable environmental laws and regulations,such as the RoHS Directive. For more details, including RoHS compatibility, please contact a ROHM sales office. ROHM shall have no responsibility for any damages or losses resulting non-compliance with any applicable laws or regulations.W hen providing our Products and technologies contained in this document to other countries,you must abide by the procedures and provisions stipulated in all applicable export laws and regulations, including without limitation the US Export Administration Regulations and the Foreign Exchange and Foreign Trade Act.This document, in part or in whole, may not be reprinted or reproduced without prior consent ofROHM.1) 2)3)4)5)6)7)8)9)10)11)12)13)。
LabVIEW SoftMotion
LabVIEW SoftMotion™ Module 2014 f1 ReadmeAugust 2014This document contains information to introduce you to the LabVIEW SoftMotion Module including installation information, a list of changes in this version of SoftMotion, and information about known issues for this version of SoftMotion.ContentsOverviewSystem RequirementsInstallation InstructionsLicensingNew Features and ChangesBug Fix ListGeneral InformationAccessing the HelpFinding ExamplesKnown IssuesAutomating the Installation of NI ProductsOverviewThe LabVIEW SoftMotion Module allows you to use the LabVIEW project to configure and test your motion axis settings, tune your servo motors, program deterministic motion profiles, create custom motion applications, and simulate your designs created in SolidWorks.Note: Refer to the SoftMotion Selection Guide at for a description of the different NI SoftMotion Module packages available.System RequirementsYou can run the LabVIEW SoftMotion Module 2014 f1 installer on the following operating systems:Windows 8.1/8/7/VistaWindows XP Service Pack 3 (32-bit)Windows Server 2003 R2 (32-bit)Windows Server 2008 R2 (64-bit)Windows Server 2012 R2 (64-bit)The LabVIEW SoftMotion Module runs as a 32-bit application on all operating systems.Note: Support for Windows Server 2003 R2 may require disabling physical address extensions (PAE). To learn how this might affect your use of Windows Server 2003 and what actions you might have to take, visit /info and enter the info code PAESupport.The LabVIEW SoftMotion Module does not support Windows 2000/NT/Me/98/95, Windows XP x64, or the Windows Server non-R2 editions.To run the LabVIEW SoftMotion Module, National Instruments recommends that your system meet the following requirements in addition to the minimum requirements for the LabVIEW Development System for Windows:2 GB of memory if using SoftMotion for SolidWorks250 MB of free disk spaceThe SoftMotion Module is compatible with the following National Instruments software.LabVIEW 2014 Base, Full, or Professional Development System (32-bit)LabVIEW 2014 Real-Time ModuleLabVIEW 2014 FPGA ModuleNI-RIO Device Drivers August 2014NI-Industrial Communications for EtherCAT® 2014Note To use SoftMotion for SolidWorks you must have SolidWorks 2009 SP2.1 or later.Installation InstructionsDownloading the LabVIEW SoftMotion Module 2014 f1 from the WebComplete the following steps to download and install the LabVIEW SoftMotion Module 2014:1. Download the LabVIEWSoftMotionModule2014f1.exe file from /updates, and then run it.2. Follow the onscreen instructions.Note (Windows 8.1/8/7/Vista) Users may see access and security messages during installation. Accept the prompts tocomplete the installation.3. When the installer completes, a dialog box appears that asks if you want to restart, shut down, or restart later. SelectRestart.LabVIEW SoftMotion Module Updates and NotificationsNational Instruments releases critical software updates after product release using the NI Update Service. Visit /info and enter updates to view a list of all currently available updates.National Instruments provides notification of certain critical issues at install time. Visit /info and enter notifications to view a list of current product notifications.LicensingThe LabVIEW SoftMotion Module relies on licensing activation. After the evaluation period for SoftMotion Module expires, you must activate a valid license before you can run the software. To activate the SoftMotion Module, use the serial number you received as part of your installation package.Refer to the Activation Instructions for National Instruments Software for more information about licensing activation.Version 2014 f1 Features and ChangesSupport for NI 9503 ModulesLabVIEW SoftMotion Module 2014 f1 supports the NI 9503 stepper drive module. Updates include FPGA VIs that can be used to create smoother motion.Support for NI Real-Time Linux 64-bitLabVIEW 2014 SoftMotion Module is compatible with NI Real-Time Linux 64-bit targets.LabVIEW SoftMotion Module 2014 f1 Bug Fix ListYou can access the software and documentation bug fix list online. Refer to the National Instruments Web site for an up-to-date list of bug fixes in the LabVIEW SoftMotion Module 2014.General InformationLabVIEW Real-Time UsersTo use the updates and features included in the LabVIEW SoftMotion Module 2014, you must install the LabVIEW SoftMotion Module 2014 software on the LabVIEW Real-Time target system using Measurement & Automation Explorer (MAX).Accessing the HelpRefer to the LabVIEW Help, accessible by selecting Help»LabVIEW Help from the pull-down menu in LabVIEW, for information about SoftMotion Module concepts, using SoftMotion, step-by-step instructions using the LabVIEW SoftMotion Module, and reference information about SoftMotion VIs and functions.Finding ExamplesLabVIEW examples for the SoftMotion Module are located in the labview\examples\Motion folder. You can modify an example VI to fit an application, or you can copy and paste from one or more examples into a VI that you create.LabVIEW SoftMotion Module 2014 Known IssuesYou can access the software and documentation known issues list online. Refer to the National Instruments Web site for an up-to-date list of known issues in the LabVIEW SoftMotion Module 2014.Back to TopAutomating the Installation of NI ProductsYou can automate the installation of most NI products using command-line arguments to suppress some or all of the installer user interface and dialog boxes. However, starting with the August 2012 releases (products using NI Installers version 3.1 or later), you may need to perform additional steps before or during a silent installation of NI software.If the NI product you are installing uses Microsoft .NET 4.0, the .NET installer may run before any NI software installs and may require a reboot before the installation of NI software begins. To avoid a .NET reboot, install .NET 4.0 separately before you install NI software.For more information, refer to the following KnowledgeBase articles:For more information on silent installations of individual NI products, refer to KB 4CJDP38M, Automating the Installationof a Single Installer.For more information on silent installations of suited NI products, such as NI Developer Suite, refer to KB 4GGGDQH0,Automating the Installation of a Suited Installer.To determine what version of NI Installers your product contains, refer to KB 4CJDR18M, How Can I Determine the Type and Version of My National Instruments Installer?.Back to TopImportant InformationCopyright© 2004–2014 National Instruments. All rights reserved.Under the copyright laws, this publication may not be reproduced or transmitted in any form, electronic or mechanical, including photocopying, recording, storing in an information retrieval system, or translating, in whole or in part, without the prior written consent of National Instruments Corporation.National Instruments respects the intellectual property of others, and we ask our users to do the same. NI software is protected by copyright and other intellectual property laws. Where NI software may be used to reproduce software or other materials belonging to others, you may use NI software only to reproduce materials that you may reproduce in accordance with the terms of any applicable license or other legal restriction.End-User License Agreements and Third-Party Legal NoticesYou can find end-user license agreements (EULAs) and third-party legal notices in the following locations:Notices are located in the <National Instruments>\_Legal Information and <National Instruments> directories.EULAs are located in the <National Instruments>\Shared\MDF\Legal\license directory.Review <National Instruments>\_Legal Information.txt for information on including legal information in installersbuilt with NI products.TrademarksLabVIEW, National Instruments, NI, , the National Instruments corporate logo, and the Eagle logo are trademarks of National Instruments Corporation. Refer to the Terms of Use section on /legal for more information about National Instruments trademarks. EtherCAT® is a registered trademark of Beckhoff Automation GmbH. Other product and company names mentioned herein are trademarks or trade names of their respective companies.PatentsFor patents covering the National Instruments products/technology, refer to the appropriate location: Help»Patents in your software, the patents.txt file on your media, or the National Instruments Patent Notice at /patents.。
plant simulation
Plant SimulationIntroductionPlant simulation is a powerful tool used in various industries to model, analyze, and optimize the performance of manufacturing systems. It helps in understanding and improving the efficiency of production processes by simulating the behavior of different components within a plant.Benefits of Plant SimulationSome of the key benefits of using plant simulation include:1.Visualization: Plant simulation provides a visual representation ofthe manufacturing system, allowing stakeholders to understand complexprocesses easily. It helps in identifying bottlenecks, optimizing layouts, andimproving overall productivity.2.Process Optimization: By simulating different scenarios, plantsimulation helps in identifying inefficiencies in the production process. Itallows users to test and evaluate alternative strategies, optimize schedules, and reduce cycle times.3.Cost Reduction: Plant simulation enables users to identifyopportunities for cost reduction by analyzing production line performance,minimizing material handling, and optimizing resource utilization. It helps in reducing inventory levels, improving throughput, and increasing overallprofitability.4.Reduced Downtime: Simulation enables users to analyze and predictthe impact of equipment failures, maintenance activities, or other disruptions on the production process. It helps in planning preventive maintenance,reducing unplanned downtime, and increasing overall equipment effectiveness.5.What-if Analysis: Plant simulation allows users to perform。
宝马X3(第三代)用户手册说明书
Pearson BTEC Level 2 Diploma in Care (England) Pearson BTEC Level 3 Diploma in Adult Care (England) Issue 2 – July 2019 © Pearson Education Limited 2019 1Unit 71: Increase Awarenessabout Drugs, Alcohol orOther Substances withIndividuals and GroupsUnit reference number: H/501/0586Level: 3Unit type: OptionalCredit value: 7Guided learning hours: 42Unit summaryThis unit is for those who need to raise awareness of substances (drugs and alcohol), the use of substances and the effects of substances. The awareness raising may be with children and young people, or with other people who need to know about substances, for example because they use substances themselves, have friends or family who use or may use substances, or work on a formal or informal basis with individuals who use substances.Additional informationAny skills-based element within the unit must be assessed in the workplace or using workplace-based evidence.Simulation is not permitted for this unit.The nature of this unit means that all of your evidence must come from real work activities.The evidence must reflect, at all times, the policies and procedures of the workplace, as linked to current legislation and the values and principles for good practice in the sector. Required sources of performance and knowledge evidenceObservation and/or expert witness testimony is the required assessment method to be used to evidence some parts of this unit.If the assessor is unable to observe the learner they will identify an expert witness in the workplace who will provide testimony of the learner’s work-based performance. The assessor or expert witness will observe the learner in real work activities and this is likely to provide most of the evidence for the assessment criteria for this unit.Other sources of performance and knowledge evidenceThe assessor will identify other sources of evidence to ensure that the most reliable and efficient mix of evidence-gathering methods from the list below. This will ensure that all learning outcomes and assessment criteria are met and that the consistency of your performance can be established.Pearson BTEC Level 2 Diploma in Care (England) Pearson BTEC Level 3 Diploma in Adult Care (England) Issue 2 – July 2019 © Pearson Education Limited 20192 Work products: these are non-confidential records made, or contributed to, by the learner, e.g. promotional material relating to the nature of substance misuse.Confidential records: these may be used as evidence but must not be placed in the learner’s portfolio. They must remain in their usual location and be referred to in the assessor records in the learner’s portfolio, e.g. case records.Questioning: questions may be oral or written. In each case the question and the learner’s answer will need to be recorded, e.g. what are the key organisations that deliver the government’s strategy on drugs and alcohol?Professional discussion: this should be in the form of a structured review of the learner’s practice with the outcomes captured by means of audiotape or a written summary. These are particularly useful to provide evidence that the learner knows and understands principles which support practice; policies, procedures and legislation, and that the learner can critically evaluate their application, e.g. describe the legislation, policy and procedures regarding equality and confidentiality of information.Original certificates: certificates of training and records of attendance must be authentic, current and valid. The assessor will also want to check the content of such training so that this can be matched to the standards and check that the learner has retained and can apply learning to practice, e.g. Certificate/Progression Award in Drug and Alcohol Services.Case studies, projects, assignments and candidate/reflective accounts of your work: These methods are most appropriately used to cover any outstanding areas of your qualification. Occasionally, because an event happens rarely or may be difficult to observe, the learner may be able to use a candidate/reflective account to provide some of the evidence for this unit, e.g. describe the interrelationship between the background of individuals and the effect of substances on them.Witness testimony: colleagues, allied professionals and individuals with whom you work may be able to provide testimony of your performance. The assessor will help the learner to identify the appropriate use of witnesses.Unit guidanceThe evidence for this unit is likely to come from:•the observation of the learner working with an individual or group •confidential case records and/or promotional material prepared •the learner’s explanation of their work with individuals or a group recorded either through professional discussion or a reflective account.Pearson BTEC Level 2 Diploma in Care (England) Pearson BTEC Level 3 Diploma in Adult Care (England) Issue 2 – July 2019 © Pearson Education Limited 2019 3Learning outcomes and assessment criteriaTo pass this unit, the learner needs to demonstrate that they can meet all the learning outcomes for the unit. The assessment criteria outline the requirements the learner is expected to meet to achieve each learning outcome.1 Understand legislation and policyrelevant to substance use 1.1 Identify the legislation which relatesto substance use and describe thedifference between legal and illegaldrugs1.2 Describe government policy inrelation to substance use services,e.g. prevention, treatment andrehabilitation1.3 Identify key organisations that aredesigned to deliver the government’sstrategy on drugs and alcohol1.4 Describe the legislation, policy andprocedures regarding equality andconfidentiality of information2 Understand substance use, itseffects and treatments 2.1 Describe the different substanceswhich are available and the effectsthey have on the body, e.g.stimulants, sedatives andhallucinogenics2.2 Identify the street names forsubstances, and how these changeover time and in different locations 2.3 Describe the dangers of substanceuse, e.g. related to quantity,frequency, purity and polydrug use 2.4 Describe the methods of substanceuse and the risks associated with thedifferent methods2.5 Explain the interrelationship betweenthe background of individuals and theeffect of substances on them: e.g.experience and expectations, mentaland psychological state, physicalhealth, etc.2.6 Identify reasons why individuals usesubstances and the influence onsubstance use of individuals’ age,gender, economic disadvantageand/or emotional deprivation2.7 Describe the relationship betweensubstance use, crime and antisocialbehaviourPearson BTEC Level 2 Diploma in Care (England) Pearson BTEC Level 3 Diploma in Adult Care (England) Issue 2 – July 2019 © Pearson Education Limited 20194 3 Identify individuals’ knowledge and values about substances 3.1 Enable individuals to talk about and identify what they know and understand about substance use3.2 Support individuals to explore their feelings and values about substance use3.3 Interact with individuals in a manner that encourages an open exchange of views and is non-judgemental4 Increase individuals’ knowledge and understanding of substances 4.1 Identify the gaps in individuals’ knowledge and understanding about substances, their use and effects4.2 Demonstrate how the values and beliefs of individuals may need to be challenged in their own interests and those of others4.3 Provide learning opportunities in a manner sensitive to individuals’ needs and confidence4.4 Ensure that the content of the learning provision is accurate and based on up-to-date evidencePearson BTEC Level 2 Diploma in Care (England) Pearson BTEC Level 3 Diploma in Adult Care (England) Issue 2 – July 2019 © Pearson Education Limited 2019 5Unit contentLearning outcome 1: Understand legislation and policy relevant to substance useLegislation relating to substance use•Medicines Act 1968 and amendments.•Misuse of Drugs Act 1971 and amendments.•Misuse of Drugs (Safe Custody) Regulations 1973.•Health and Safety at Work etc. Act 1974.•Misuse of Drugs (Supply to Addicts) Regulations 1997.•Data Protection Act 2018.•Control of Substances Hazardous to Health (COSHH) Regulations 2002.•Care Standards Act 2000 (receipt, storage and administration of medicines). •Misuse of Drugs Regulations 2001.•The Hazardous Waste (England and Wales) Regulations 2005 (as amended by the Hazardous Waste (England and Wales) Regulations 2009).•The Human Medicines Regulations 2012.•The Psychoactive Substances Act 2016.The difference between legal and illegal drugs•Legal drugs can be bought over the counter or with a prescription from a medical practitioner.•Illegal drugs cannot legally be manufactured, bought or sold.•Some drugs are legal in some situations, for example when prescribed as antipsychotics or painkillers, but illegal when misused.Government policy in relation to substance use services•Prevention, treatment and rehabilitation.•2010 to 2015 government policy: drug misuse and dependency.•Modern crime prevention strategy 2016.•UK Chief Medical Officers’ Alcohol Guidelines Review 2016.•Drug Strategy 2017.•Drug misuse and dependence: UK guidelines on clinical management 2017.Organisations delivering the government’s strategy on drugs and alcohol •Support groups and networks, e.g. National Treatment Agency, Addaction, Community for Recovery, Narcotics Anonymous, Cocaine Anonymous, Alcoholics Anonymous. •GP surgery.•Hospitals.•Treatment centres.•Criminal justice system: policy, probation services.•Multidisciplinary approaches to support.•Social support, including peers, support groups.•Inpatient rehabilitation.Pearson BTEC Level 2 Diploma in Care (England) Pearson BTEC Level 3 Diploma in Adult Care (England) Issue 2 – July 2019 © Pearson Education Limited 20196 •Outpatient treatment programmes. •Self-help programmes, lifestyle changes. •Therapeutic community living. • The 12 Steps Programme.Legislation, policy and procedures regarding equality and confidentiality of information Equality•Human Rights Act 1998. •Mental Capacity Act 2005. •Equality Act 2010. •Health and Social Care Act 2012. •Care Act 2014. • Policy and procedures:o race/cultural diversity o equality of opportunity o inclusive practice o safeguarding/bullying o complaints odisability and access. Confidentiality of information •The Caldicott Principles. •Freedom of Information Act 2000. •Data Protection Act 2018. •General Data Protection Regulations (GDPR) 2018. • Policy and procedures:o confidentiality o reporting and recording o duty of care.Learning outcome 2: Understand substance use, its effects and treatments The range of different substances•Class A drugs include: heroin (diamorphine), cocaine (including crack), methadone, ecstasy (MDMA), LSD, magic mushrooms. •Class B drugs include: amphetamines, barbiturates, codeine, cannabis, cathinones (including mephedrone), synthetic cannabinoids. •Class C drugs include: benzodiazepines (tranquilisers), GHB/GBL, ketamine, anabolic steroids, benzylpiperazines (BZP). •Illegal drugs include: marijuana, heroin, cocaine, amphetamines, methamphetamines, club drugs. •Prescription drugs include: stimulants, benzodiazepines, opioid painkillers. •Over-the-counter drugs include: cough medicine, cold and flu remedies, motion sickness medication. • Alcohol includes: beer, wine, distilled spirits.Pearson BTEC Level 2 Diploma in Care (England) Pearson BTEC Level 3 Diploma in Adult Care (England) Issue 2 – July 2019 © Pearson Education Limited 2019 7•Solvents include: fast drying glues and adhesives, assorted paint and petroleum products, lighter fluid, dry-cleaning fluids, assorted aerosol sprays, surgical spirit, cleaner.•New psychoactive substances include: plant food, bath salts, MDAT, Eric 3, dimethocaine.•Hallucinogenic drugs include: LSD, psilocybin (magic mushrooms), peyote (mescaline), DMT, ketamine (Special K), PCP (phencyclidine).Effects•Acts as a stimulant, relaxant, depressant.•Enhances moods.•Lethargy.•Reduces inhibitions.•Paranoia.•Seizures.•Mood altering.•Hallucinations.•Effect if injecting cut heroin.•Infection.•Collapsed veins.Street names for substances•How these change over time and in different locations.•Slang is often specific to certain geographic areas and can vary from locality to locality, e.g. addict, abuser, junkie, alkie.•Marijuana – Acapulco Gold/Red, home grown, tea, weed, kif, weed, smoke, herb, skunk, mary jane, blaze ,jive, buds, chronic, nugget, Colombo, Pakalolo, dagga, grass, green, hash, pot, reefer, sensi, solid, wacky baccy.The dangers of substance use•Related to quantity, frequency, purity and polydrug use.•Overdose.•Dependence.•Associated physical health risks.•Associated mental health/psychological risks.•Financial implications.•Loss of role.•Mistrust.•Loss of income.•Eviction/homelessness.•Insecurity.•Stigma attached to addiction.•Anxiety.•Frustration.•Interruption to routines/plans.Pearson BTEC Level 2 Diploma in Care (England) Pearson BTEC Level 3 Diploma in Adult Care (England) Issue 2 – July 2019 © Pearson Education Limited 20198 Methods of substance use and the risks associated with the different methods • Topical:o includes insufflation (snorting) and smoking o risk of damage to respiratory system.• Enteral:o includes oral and suppositories o risk of bleeding, damage through incorrect application.• Parenteral:o includes injecting into blood vessels o risk of infection, risk of contracting serious diseases such as hepatitis and HIV.• Alcohol:o oral o binge and chronic drinking o social and occasional drinking may escalate into addiction, then dependence. • All carry risk of overdose, heart failure, coma, seizures and even death.Interrelationship between the background of individuals and the effect of substances on them•Experience and expectations. •Mental and psychological state. •Physical health. •Experimentation. •The availability of substances. •Social environment in terms of friends, family and peer behaviours. •Trauma/traumatic life events. •Experience of abuse, including domestic violence. •Social deprivation and homelessness. •Grief. •Workload, demands, pressure or stress. •Anxiety. •Self-perception, insecurity. •Peer or social pressure. • Relationship breakdown.Why individuals use substances•Insecurity. •Trauma/traumatic life events. •Experience of abuse. •Social deprivation and homelessness. •Workload/academic demands. •Self-perception. •Peer or social pressure. •Relationship breakdown.Pearson BTEC Level 2 Diploma in Care (England) Pearson BTEC Level 3 Diploma in Adult Care (England) Issue 2 – July 2019 © Pearson Education Limited 2019 9•Mental ill health.•Lifestyle choices such as consumption of dietary supplements, e.g. steroids, appetite suppressants, alcohol, smoking.•Learned behaviour.•Parental/caregiver influence.•Availability of and ease of access to substances.•Injury or illness requiring prescription pain relief, leading to continued reliance on prescribed medication to manage or ‘block’ pain.•The substance used and how addictive it is.•Theory of genetic predisposition.The influence of individual’s age, gender, economic disadvantage and/or emotional deprivation•Level of substance use.•Availability of funds.•Access to substances.•Influence of peers.•Assessed risk.•Willingness to change.•Engagement with services and practitioners.•Impact on health and wellbeing.The relationship between substance use, crime and antisocial behaviour •The need to fund substance use.•Increase in crime to fund use.•Illegal use of properties to sell and take illicit drugs.•Behaviour as a result of substance use.•Increase in threatening behaviour to prevent police involvement.•Involvement of minors to sell drugs – county lines.Learning outcome 3: Identify individuals’ knowledge and values about substancesEnable individuals to talk about substance use•What they know and understand.•Privacy.•Dignity.•Consent.•Commitment from both sides.•Willingness.•Sensitivity.•Effective communication and interpersonal skills.Support individuals to explore their feelings and values about substance use •Privacy.•Dignity.Pearson BTEC Level 2 Diploma in Care (England) Pearson BTEC Level 3 Diploma in Adult Care (England) Issue 2 – July 2019 © Pearson Education Limited 2019 10 •Consent. •Commitment from both sides. •Willingness. •Sensitivity. • Effective communication and interpersonal skills.Interact with individuals in a manner that encourages an open exchange of views and is non-judgemental•Empathetic. •Privacy. •Safety and security of the environment. •Use of body language. •Genuine/authentic. •Collaborative approach. •Supportive. •Active listening. •Reflection. •Use of questioning. •Self-awareness. •Legitimisation of individuals’ views. •Partnership. • Respect.Learning outcome 4: Increase individuals’ knowledge and understanding of substancesGaps in individuals’ knowledge and understanding about substances, their use and effects•Knowledge of drugs, alcohol and other substances used. •Terminology used. •Methods used. •Risk factors. •Indicators of addiction. • Support mechanisms and how to access these.How the values and beliefs of individuals may need to be challenged•In their own interests and those of others. •Understanding drug, alcohol and other substance use. •Identifying risk factors. •Increasing awareness and understanding in order to provide support and guidance. • Identifying and challenging assumptions.Provide learning opportunities•Manner sensitive to individuals’ needs and confidence.•Awareness of communication preferences.•Understanding of current levels of understanding.•Privacy.•Availability of materials to support learning.•Level and pace appropriate to needs.Ensure content of the learning provision is accurate and based on up-to-date evidence•Currency of information.•Reliable sources.•Benchmarking.•Sharing and dissemination of information.Information for tutorsSuggested resourcesBooksAllan G – Working with Substance Users: A Guide to Effective Interventions(Palgrave Macmillan, 2014) ISBN 9781137278043Dorling Kindersley – BMA Concise Guide to Medicine and Drugs, 5th edition(Dorling Kindersley, 2015) ISBN 9780241201015Heanue K and Lawton C – Working with Substance Users (UK Higher Education OUP Humanities & Social Sciences Health & Social Welfare) (Open University Press, 2012) ISBN 9780335245192Koubel G and Bungay H – Challenge of Person-centred Care: An Interprofessional Perspective (Palgrave MacMillan, 2008) ISBN 9780230550773Life-Style Ebooks – Addiction: The Last Addiction Recovery Guide – The Infallible Method To Overcome Any Addiction (CreateSpace Independent Publishing Platform, 2015) ISBN 9781519741103Roberts GW and Machon A – Appreciative Healthcare Practice: A guide to compassionate, person-centred care (M&K Publishing, 2015) ISBN 9781905539932Sanderson H and Lewis J – A Practical Guide to Delivering Personalisation: Person-Centred Practice in Health and Social Care (Jessica Kingsley Publishers, 2012)ISBN 9781849051941Smith JE and Meyers R – Motivating Substance Abusers to Enter Treatment: Working with Family Members (Guilford Press, 2008) ISBN 9781593856465White T – Working With Drug and Alcohol Users: A Guide to Providing Understanding, Assessment and Support (Jessica Kingsley Publishers, 2012) ISBN 9781849052948 OtherDepartment of Health – Fair Access to Care Services: Guidance on Eligibility Criteria for Adult Social Care (Department of Health, 2002)Websites DrugWise provides advice, research andinformation Federation of Drug and AlcoholProfessionals, the professional body forthe substance misuse (drugs and alcohol)field/government/publications/dru g-and-alcohol-addiction-and-obesity-effects-on-employment-outcomes Department for Work and Pensions Drug and alcohol addiction, and obesity: effects on employment outcomes National Institute for Health and CareExcellenceAlcohol-use disorders: diagnosis,assessment and management of harmfuldrinking and alcohol dependence www.who.int World Health Organization –guidance onsubstance abuseAssessmentThis guidance should be read in conjunction with the associated qualification specification for this unit.This unit is internally assessed. To pass this unit, the evidence that the learner presents for assessment must demonstrate that they have met the required standard specified in the learning outcomes and assessment criteria, and the requirements of the assessment strategy.To ensure that the assessment tasks and activities enable learners to produce valid, sufficient, authentic and appropriate evidence that meets the assessment criteria, centres should follow the guidance given in Section 8 Assessment of the associated qualification specification and meet the requirements from the assessment strategy given below.Wherever possible, centres should adopt an holistic approach to assessing the units in the qualification. This gives the assessment process greater rigour and minimises repetition, time and the burden of assessment on all parties involved in the process.Unit assessment requirementsThis unit must be assessed in accordance with the Skills for Care Assessment Principles. TM03/07/19 U71_H5010586_INCREASE AWARENESS ABOUT DRUGS, ALCOHOL OR OTHER SUBSTANCES WITH INDIVIDUALS AND GROUPS_ISS2.1–14/0。
SIMIT V9.1 安装和使用说明说明书
SIMITNotes on Installation and UsageThese notes should be considered more up-to-date than the information in other documents.Read the notes carefully, because they contain information on installing and using SIMIT V9.1. The installation notes in chapter 4 contain important information that you will require in order to install SIMIT. Read these notes before installing the software.Software disclaimer for simulation productsSiemens offers simulation software to plan, simulate and optimize plants and machines. The simulation- and optimization-results are only non-binding suggestions for the user. Thequality of the simulation and optimizing results depend on the correctness and thecompleteness of the input data. Therefore, the input data and the results have to bevalidated by the user.Security informationSiemens provides automation and drive products with industrial security functions thatsupport the secure operation of plants or machines. They are an important component in a holistic industrial security concept. With this in mind, our products undergo continuousdevelopment. We therefore recommend that you keep yourself informed with respect to our product updates. Please find further information and newsletters on this subject at:.To ensure the secure operation of a plant or machine it is also necessary to take suitable preventive action (e.g. cell protection concept) and to integrate the automation and drive components into a state-of-the-art holistic industrial security concept for the entire plant or machine. Any third-party products that may be in use must also be taken into account.Please find further information at: /industrialsecuritySIMIT allows you to identify simulation models using a unique version number and also to restrict visibility of certain information by providing password protection for macros andcomponents. Please note that these procedures do not provide unimpeachable protection against skilled high effort attacks.ContentsNotes on Installation1Contents of the Consignment2Hardware Requirements3Software Requirements3.1Operating Environment3.2Memory Requirements3.3Compatibility with Other Software Products3.4Anti virus software3.5Online Documentation4Installation4.1Installation of SIMIT4.2Copy protection dongle4.3Upgrade from SIMIT4.4Uninstalling SIMIT5Specific features of the SIMIT Unit (“SIMBA”)6Specific features of the Virtual Controller (“SIMIT VC”)7Remote Control Interface8UnlockHWConfig.exe9Terms of License and Disclaimer of Liability for Open Source Software1Contents of the ConsignmentYou received one of the following products with this consignment:SIMIT V9.1The following items are included in this package:1 CD SIMIT V9.11 Dongle with an individual license number (Type: Standard, Professional or Ultimate)1 Product InformationSIMIT Upgrade V9.1The following items are included in this package:1 CD SIMIT V9.11 Product information including license informationContent of the SIMIT CDFile Start.exe:-SIMIT Installer (Frame Setup)Folder _Beispiele:-SIMIT-Sample Projects (german)-Sample implementation for the Shared Memory (SHM) coupling-Sample data for bulk data import (SMD)-Sample data for 3D-Models-Sample data and Document Type Definition for XML-ImportFolder _D ocs:-Manuals in pdf format in German and English. You can view the manuals at any time on the SIMIT-CD.Ordner _LegacyComponents:-Prior versions of standard component types. They can be helpful if they are used in existing SIMIT projects but are not embedded in the archive file.Ordner _LegacyTemplates:-Prior versions of standard templates. These templates still contain the variable “GATEWAY” that has been changed to “COUPLING” in SIMIT V8.0.Folder _Samples:-SIMIT Sample Projects (english)-Sample implementation for the Shared Memory (SHM) coupling-Sample data for bulk data import (SMD)-Sample data for 3D-Models-Sample data and Document Type Definition for XML-ImportFolder Support/Tools:-Tool to make HWConfig data available.Folder XMLTRANSFER_09.00.00.00_01.89.00.03::-Setup for installation of the XML transfer as an add-on for PCS 7.In order to work with SIMIT, you need a PC with the following minimum requirements for processor speed/performance (recommendations from Microsoft), RAM and graphics capability:GraphicsProcessor Expandedmemoryconfiguration2 GHz2GB *)DirectX 9-raphics device withWDDM 1.0- or later driver*) At least 4 GB expanded memory configuration is recommendedIn addition, you will need a CD drive and a free USB port.The performance of your graphics architecture as well as memory configuration may have considerable influence on the performance of SIMIT. In case you work with large SIMIT projects with e.g. several hundred diagrams you should use a PC with up-to-date performance.3.1Operating EnvironmentOperating SystemSIMIT is a 32-bit application that is released for the following operating systems:-MS Windows 7 SP1 (Professional, Ultimate, Enterprise, 32 and 64 bit versions)-MS Windows 10 Pro and Enterprise (32 and 64 bit versions)-MS Windows Server 2008 R2 (64 Bit)-MS Windows Server 2012 R2 (64 Bit)-MS Windows Server 2016You may use one of these operating systems as a virtual machine under the control of aVMware host (ESXi V5.5 or V6.0).SIMIT has not been tested for use in other environments; use at your own risk.Display of PDF filesTo read the supplied PDF files, you need a PDF reader that is compatible with PDF 1.7(ISO32000-1:2008 PDF).Security SettingsIn project directories as well as in the SIMIT workspace, all users need to receive writepermission in case of non-exclusive use by one user only. These rights have to be set up byan administrator.Note: The standard rights available in the operating system depend on the operating systemin use. Tools used for the creation of partitions will implement their own security guidelines.Hibernation modeShifting to hibernation mode is generally prevented by SIMIT.Modifying date and timePlease do not modify the date or time of your computer while SIMIT is running since thiscould cause unpredictable errors.3.2Memory RequirementsSIMIT requires approx. 350 Mbytes of memory on your hard disk. The exact value dependson your operating system and on the file system used on your personal computer.Additionally, on the drive your project data is located you need to make sure enough harddisk space is available. If during an operation (e.g. saving a SIMIT diagram or starting thesimulation) disk space is insufficient, this may lead to corruption of project data.We also recommend that you do not store the project data on the same drive as the Windowsswap file.3.3Compatibility with Other Software ProductsSIMIT V9.1 cannot be installed as long as SIMIT V8.x is installed on your computer. Asapplicable please uninstall SIMIT V8.x first.There are no further incompatibilities known to other software products. Simultaneous use ofSIMIT V5.x or SIMIT V7.x and SIMIT V9.x may fail, however.Since the Virtual Controller is integrated into SIMIT an existing installation of SIMIT VC V3.0must be uninstalled manually if applicable.SIMIT VC supports PCS 7 versions 7.0 to 9.0 according to the emulation of driver blocks. 3.4Anti virus softwareThe following antivirus software has been tested for compatibility with SIMIT V9.1-Trend Micro OfficeScan Client V11.0.6054Other versions or other anti virus software cannot be guaranteed by Siemens. Please do thetest for compatibility yourself if using them.3.5Online DocumentationAll SIMIT components contained in this delivery provide an online help which may be openedfrom the component taskcard as well as from the diagram.4Installation4.1Installation of SIMITSIMIT requires administrator rights for installation. Insert the SIMIT CD in the drive. In caseyour PC is configured appropriately, installation will start automatically. Otherwise, pleasestart installation of SIMIT manually by double clicking the program Start.exe in the root folderof the SIMIT-CD using Microsoft Windows Explorer.Some notes on required user input during setup:SIMIT can be installed in any folder. Do not specify a folder that already contains data! Forusing SIMIT, only read-access to this installation folder is required.In addition, SIMIT requires a workspace for placing data. For using SIMIT, you need read andwrite access to this workspace. The workspace is usually located at the (hidden) folderC:\ProgramData\Siemens\Automation\SIMIT.SIMIT projects may be placed at any location on the file system, independent from these twoinstallation folders.NoteSIMIT registers itself in Microsoft Windows system files. You must not delete, moveor rename SIMIT files and folders using Microsoft Windows utilities such as theExplorer or modify SIMIT data in the Microsoft Windows registry. The program mayno longer run properly after such modifications.4.2Copy protection dongleBefore using SIMIT, you need to plug the dongle that was delivered into an available usb portof your PC. Please do not use extensions or USB-hubs.Using the DEMO modeIf there is no valid SIMIT dongle plugged, you can launch SIMIT in DEMO mode. Thefunctionality is restricted in DEMO mode. The purpose of the DEMO mode is to make youfamiliar working with SIMIT. Productive work is not possible in DEMO mode.For details please see the SIMIT manual.4.3Upgrade from SIMITCoexistent installation with SIMIT V7.xThe installation of SIMIT V9.1 does not affect an existing SIMIT V7.0 or SIMIT V7.1. You canuninstall the older SIMIT version manually.Coexistent installation with SIMIT V8.xA coexistent installation of SIMIT V8.x and V9.x is not possible. You have to uninstall anexisting installation of SIMIT V8.x first.Transfer of existing SIMIT componentsComponents, macros and templates, that you created with SIMIT V7 have to be transferredmanually into the workspace of SIMIT V9.1 (C:\ProgramData\Siemens\Automation\SIMIT\8.0\FULL).Projects that were created with SIMIT V7.x, V8.x or V9.0 can be opened with SIMIT V9.1.When doing this the first time it may last a while to automatically convert the project to thenew version. Afterwards this project can no longer be opened with a previous SIMIT version!CompatibilityComponents, macros, templates and projects that were created with SIMIT V8.x can still beused with SIMIT V9.x. Please be aware of the following incompatibilities:- A coupling to the Virtual Controller V3.0 that has been created with SIMIT V8.1 will not be carried to SIMIT V9.x. You have to create this coupling once again in SIMITV9.x, if applicable.-The syntax of the module addresses used by the “unit connector” has been changed with version 9.0. Instead of using keywords like “Slv” and “Slt” the subsystem, slaveand slot is now indicated by numbers in square bracket. If applicable, you have tocorrect these specifications in the “unit connectors”. Alternatively, you may drag anew “unit connector” from the coupling editor, which provides a connector with theproper setting.-When processing the XML file used for the CMT import and provided by theautomation interface, SIMIT will still use a “\” to separate the CMT hierarchy levels.However, the signal or parameter name is separated by a “.” from SIMIT V9.0onwards as used by PCS 7. You have to adopt your templates if applicable.-In order to optimize the model calculation in SIMIT V9.1 differential equations are assembled and solved no longer regarding the complete SIMIT project but onlyregarding single components. This may cause a slightly changed behavior of thesimulation results if components containing differential equations are used. Thesolvers used for the library FLOWNET and CHEM-BASIC are not affected.License keys for upgradesIf you purchased an upgrade license you have to provide the according license key when starting SIMIT V9.1 the first time. Please note that all license keys that you received for your dongle number are required!Software for Simulation Unit (formerly “Simulation Unit” resp. “SIMBA”) The software necessary for using the Profinet or Profibus coupling in SIMIT V9.x is delivered in conjunction with the hardware (Simulation Unit) and is no longer part of the SIMIT installer. If you already possess this hardware you may get the necessary software (SIMULATIONUnit, abbreviated SU-Software) free of charge:https:///cs/ww/en/view/1097461924.4Uninstalling SIMITNoteSoftware products must be removed according to Microsoft Windows.To do this, use Microsoft Windows application "Software" (Settings > Control Panel >Software) to remove your software package (for example "SIMIT").During uninstall the entire SIMIT installation folder will be deleted, too. Furthermore, allentries in the registry, the startup menu and the desktop will be removed.The SIMIT workspace will not be deleted.Projects that were created with SIMIT will not be deleted.During installation of SIMIT the following software packages were installed, in case they werenot installed yet:-Microsoft Visual C++ 2010 Redistributable-Microsoft Visual C++ 2012 Redistributable-Microsoft Visual C++ 2013 Redistributable-Microsoft Visual C++ 2015 Redistributable-OPC Core Components Redistributable-Microsoft .NET-Framework 4.6Since these software packages may be used by other applications, they will not beautomatically removed during SIMIT uninstall. If you are sure that you do not need thesesoftware packages any more, you may uninstall them using the control panel.5Specific features of the SIMIT Unit (“SIMBA”) The new SU coupling replaces the previous Profibus DP and Profinet IO couplings.In a SU coupling all Profibus and Profinet lines of a S7 station are now concentrated. Thisallows to switch from a …Hardware-in-the-Loop“ configuration to a …Software-in-the-Loop“configuration more easily because the I/O signals in the process model do no longer dependon the corresponding line and need not be modified.However, if you open a SIMIT project of a previous version that contains Profibus or Profinetcouplings, each line will be converted into an individual SU coupling. This allows you to usethe SIMIT project without any modifications. If you want to organize the SU couplingaccording to S7 stations as intended in SIMIT V9.1, please delete the SU Coupling andrecreate it.When using the SIMIT Unit as Profibus DB- or Profinet IO-coupling please note that pausingthe simulation for more than about 30 seconds will abort the connection between theSimulation Unit and SIMIT.Shared Devices attached to the Profinet are currently not supported completely. Only thedevices that are located in the same station as the interface module can be accessed bySIMIT.You can import GSD resp. GSDML files via the “SU administration” to publish deviceinformation to SIMIT. They are marked as “User” in the table. If there is device informationalready delivered by the SIMIT installation it is marked as “System”. The “User” informationalways overrides the “System” information!6Specific features of the Virtual Controller(“SIMIT VC”)The Virtual Controller is able to handle IP-based S7-connections. However, this does notinclude the redundant S7H-protocol for redundant connections unrestrictedly. The S7H-protocol can only be used for connections between Virtual Controllers belonging to the sameSIMIT project.Each delta download is registered in the controller by a time stamp. This time stamp is usedto decide if the program in the controller (“online”) is identical to the program in theengineering tool (“offline”). The Virtual Controller does not provide such a time stamp if thesimulation is restarted, even though the program is loaded correctly. The engineering tool willtherefor report an inconsistent state of the program after delta download and simulationrestart which is not appropriate. You can avoid this message by executing a full download.The Virtual Controller is able to emulate S7-300 controllers. However, technology functionsare not supported. I/Q-addresses must be unique on technology CPUs as well.Please make sure that the subnet masks of all computers that are involved in the simulationare configured in a way that each configured IP address can be assigned to an unambiguoussubnet. Otherwise the licensing of the Virtual Computer might not work properly.Make sure, that IP addresses are not added automatically (e.g. by SIMATIC NETCommunication Settings) to prevent such error-prone configurations.The Virtual Controller supports the Library …S7 F Systems Lib V1_3” under regular conditions(no failure conditions).“Distributed Safety” is currently not supported.7Remote Control InterfaceOther than described in the documentation of the RCI interface the library“Siemens.Simit.API.Coupling.dll“ is no longer located in the installation folder of SIMIT but inthe Global Assembly Cache (GAC) of your computer:"%Windir%\\assembly\GAC_MSIL\Siemens.Simit.API.Coupling\v4.0_1.0.0.0__fd3415afd42094c5\Siemens.Simit.API.Coupling.dll"Please refer to this library at this location and do not copy it to your project and do not deliverthis file as part of your software!8UnlockHWConfig.exeIn STEP 7, the sdb files are by default deleted following compilation of the hardware configuration.To prevent this permanently, launch the program "UnlockHWConfig.exe" once on the STEP 7 PC.Please note that this program must be executed with administration rights!9Terms of License and Disclaimer of Liability for Open Source SoftwareBefore installation, please read the Readme_OSS.rtf file in the root directory of the SIMITCD.。
GSG-5 6 卫星导航信号模拟器产品介绍说明书
Basic PrincipleG SG -5/6 simulators can generate any combination of G PS, G LONASS, G alileo, BeiDou, QZSS, SBAS satellite signals un-der any condition simultaneously through a single RF out-put (type N connector). Configurations with higher channel counts generate new, modernized, signals on any of the navi-gation frequencies, including IRNSS, even those currently un-der development. Based on a test scenario that includes date, time and power levels, the generated signals correspond to any position on, or above, the earth (below the satellite orbits at approximately 20,000 km). It is easy to test dynamic condi-tions by defining a trajectory of the receiver under test. The simulator manages all the dynamics including relativistic effects.Test Solutions•Position/navigation accuracy •Dynamic range/sensitivity•Simulate movements/trajectories anyway on or above earth •Susceptibility to noise•Sensitivity to GPS impairments: loss of satellites, multi-path, atmospheric conditions, interference, jamming and spoofing •Conducted or over-the-air RF •GPS time transfer accuracy •Effect of leap second transition •Multiple constellation testing•Modernization signals/ frequencies •Hardware in the loop integrationGSG-5/6 SeriesAdvanced GNSS Simulators•Pre-defined or user-defined test scenarios•Full control over all test parameters•Front panel interface/stand-alone operation•Windows-based scenario builder software including Google Maps •Remote operation by Ethernet, GPIB, USB •Built-in or downloadable navigation files•Full control over trajectories and other dynamics •Up to 64 simultaneous signals•All GNSS constellations and frequencies•Accurate, adjustable power levels•Synchronization features to external devices or other simulatorsSimulation is simply the best way to test and verify proper operation of devices, systems and software reliant on global navigation satellite signals.Pendulum G SG -5/6 series simulators are easy-to-use, feature-rich and affordable to offer the best value compared to alternative testing tools or the limitations of testing from “live sky” signals. | *****************************•Constellations: GPS, GLONASS, Galileo, BeiDou, QZSS, IRNSS •Modulations: BPSK, QPSK, BOC (all)•SBAS: WAAS, EGNOS, GAGAN, MSAS, SAIF (included)•Spurious transmission: ≤40 dBc •Harmonics: ≤40 dBc•Output signal level: -65 to -160 dBm; 0.1 dB resolution down to -150 dBm; 0.3 dB down to -160 dBm•Power accuracy: ±1.0 dB •Pseudorange accuracy: Within any one frequency band:1 mm; Across different frequency bands: 30 cm•Inter-channel bias: Zero•Inter-channel range: >54 dB •Limits:Standard ExtendedAltitude18,240 m(60,000 feet)20,200,000 m (66,273,000 feet)Acceleration 4.0 g No limitsVelocity515 m/s (1000knots)20,000 m/s (38,874 knots)Jerk20 m/s3No limit •White noise signal level: -50 to -160 dBm; 0.1 dB resolution down to -150 dBm;0.3 dB down to -160 dBm. ±1.0 dB accuracy External Frequency Reference Input •Connector: BNC female•Frequency: 10 MHz nominal•Input signal level: 0.1 to 5Vrms•Input impedance: >1kΩFrequency Reference Output •Connector: BNC female•Frequency: 10 MHz sine•Output signal level: 1Vrms in to 50 Ω load External Trigger Input•Connector: BNC female•Level: TTL level, 1.4V nominalXPPS Output•Connector: BNC female•Rate: 1, 10, 100, 1000 PPS (configurable)•Pulse ratio: 1/10 (1 high, 9 low)•Output signal level: approx. 0V to +2.0V in 50 Ω load•Accuracy: Calibrated to ±10 nSec of RF timing mark output (option to reduce by a factor of ten with a characterization of offsets)Built-in TimebaseInternal Timebase – High Stability OCXO •Ageing per 24 h: <5x10-10•Ageing per year: <5x10-8•Temp. variation 0…50°C: <5x10-9•Short term stability (Adev @1s): <5x10-12 Auxiliary FunctionsInterface•GPIB (IEEE-488.2), USB 1.X or 2.X (SBTMC-488), Ethernet (100/10 Mbps)Settings•Predefined scenarios: User can change date, time, position, trajectory, number of satellites, satellite power level and atmospheric model •User defined scenarios: Unlimited •Trajectory data: NMEA format (GGA or RMC messages, or both), convert from other formats with GSG StudioView™ (see separate datasheet)General SpecificationsCertifications•Safety: Designed and tested for Measurement Category I, Pollution Degree 2, in accordance with EN/IEC 61010-1:2001 and CAN/CSA-C22.2 No. 61010-1-04 (incl. approval)•EMC: EN 61326-1:2006, increased test levels per EN 61000-6-3:2001 and EN 61000-6-2:2005 Dimensions•WxHxD: 210 x 90 x 395 mm(8.25” x 3.6” x 15.6”)•Weight: approx. 2.7 kg (approx. 5.8 lb) Optional Antenna•Frequency: 1000 to 2600 MHz •Impedance: 50 Ω•VSWR: <2:1 (typ)•Connector: SMA male•Dimensions: 15 mm diameter x 36 mm length Environmental•Class: MIL-PRF-28800F, Class 3•T emperature: 0°C to +50°C (operating); -40°C to +70°C non-condensing @ <12,000 m (storage)Humidity:•5-95 % @ 10 to 30°C•5-75 % @ 30 to 40°C•5-45 % @ 40 to 50°CPower•Line Voltage: 100-240 V AC, 50/60/400 Hz •Power Consumption: 40 W max.Simple Set-up and Operation Even the most inexperienced operator can configure scenarios on-the-fly without the need for an external PC and pre-compila-tion phase. Via the front panel, the user can swiftly modify parameters. Each unit comes with a license for GSG StudioView™ Windows software to graphically create, modify, and upload scenarios. A G oogle Maps interface makes trajectory creation easy. Trajectories can also be defined by recorded or generated NMEA formats. Connectivity Extends Ease-of-use and FlexibilityG SG simulators can be controlled via an Ethernet network connection, USB or GPIB. A built-in web interface allows complete operation of the instrument through front panel controls. It also al-lows for file transfers. Connectivity also supports the integration of G NSS simula-tion into a wide range of other applica-tions. There is an option to control signal generation in real-time through a simple command set. It can synchronize to ex-ternal systems in many other ways based on its precision timing capabilities and the ability to automatically download ephem-eris and almanac data via RINEX files. Input/OutputRF GNSS Signal Generation •Connector: Type N female•DC blocking: internal, up to 7 VDC; 470 Ωnominal load•Frequency bands:•L1/E1/B1/SAR: 1539 to 1627 MHz•L2/L2C: 1192 to 1280 MHz•L5/E5/B2: 1148 to 1236 MHz•E6/B3:1224 to 1312 MHz•Output channels:•1 (GSG-51); 4, 8, 16 (GSG-5); 32 (GSG-62),48, (GSG-63), 64 (GSG-64)•Any channel can generate anyconstellation or a derivative signal(multipath, interference, jamming)•Any set of 16 channels can generate withina frequency bandOptional FeaturesRecord and Playback (OPT-RP)This option provides the easiest way to create a complex scenario by recording satellite signals on a route. This option includes a recording receiver and software to automatically generate a simulation scenario that can be modified to ask ‘what if’ questions.•True life constellation replication •Automatic scenario generation•Ability to modify signal parameters •Compatible with any recording that includes NMEA 0183 RMC, GGA, and GSV sentences Real-time Scenario Generator (OPT-RSG) This option supports generation of 6DOF trajectory information via position, velocity, acceleration, or heading commands as the input for GPS RF generation. Vehicle attitude and attitude rate changes, as well as satellite power levels, are also controllable via real-time commands.•Control trajectories using 6DOF•Low fixed latency from command input to RF output•Hardware-in-the-loop applications •Includes sensor simulation optionRTK/DGNSS Virtual Reference Station (OPT-RTK)This option supports generation of RTCM correction data messages for testing an RTK / Differential-GNSS receiver.•Generates RTCM 3.x correction data via 1002, 1004, 1006, 1010, 1012, and 1033 messages•User settable base station location •Support for GNSS RTK receivers using serial interfacesHigh Velocity Option (OPT-HV)This option extends the limits for simulated trajectories. As of August 2014, the extended limits are no longer USA export controlled. (See Limits chart under Input/Output specifications.) Jamming Simulation (OPT-JAM)This option extends the capability of the standard interference simulation feature. Set noise or sweep types of interference and create a location-based jammer to test your system’s susceptibility.•Adjustable bandwidth and amplitude interference•Location-based jamming•Swept-frequency jammingeCall Scenarios (OPT-ECL)This option provides scenarios for testing eCall in vehicle systems per Regulation (EU) 2017/79.Sensor Simulation (OPT-SEN)This option generates sensor data in responseto a query according to the trajectory of theGPS RF simulation in real-time. See technicalnote for more details.•Simultaneously test GPS plus other sensorinputs to your nav system•Simulate data for accelerometers,gravimeters, gyroscopes and odometersOrdering InformationBase Configurations•GSG-51: Single channel GPS L1 generator(contact the factory for alternativeconstellations and upgrades to multi-channeland/or frequencies)•GSG-5: 4-channel GPS L1 simulator.Software options increase output channelsto 8 or 16, and adds GLONASS, BeiDou (B1),Galileo (E1), or QZSS constellations. Factoryupgradable to GSG-62 to add more channeland/or frequencies)•GSG-62: 32-channels and up to 2simultaneous frequency bands. Softwareoptions adds GLONASS, BeiDou, Galileo,QZSS or IRNSS constellations; and addssignals on other frequencies (P-code, L2,L2C, Galileo E5a/b, BeiDou B2)•GSG-63: 48-channels and up to 3simultaneous frequency bands. Samesoftware options as GSG-62•GSG-64: 64-channels and up to 4simultaneous frequency bands. Samesoftware options as GSG-62Included with instrument•User manual and GSG StudioView software(one license per unit) on CD•RF cable, 1.5 m•SMA to Type N adapter•USB cable•Certificate of calibration•3-year warranty1Optional Accessories•Option 01/71: Passive GNSS Antenna•Option 22/90: Rack-mount kit•Option 27H: Heavy-duty hard transport case•OM-54: User Manual (printed)•Additional StudioView licenses are availableOptional UpgradesConstellations•OPT-GLO: GLONASS Constellation•OPT-GAL: Galileo Constellation•OPT-BDS: BeiDou Constellation•OPT-QZ: QZSS Constellation•OPT-IRN: IRNSS Constellation (requires atleast GSG-62 and OPT-L5)Frequencies (requires at least GSG-62; non-GPS signals are enabled when constellationoption is installed)•Option L2: enables GPS L1P, GPS L2P, GLOL2 C/A•Option L2C: enables GPS L2C•Option L5: enables GPS L5, Galileo E5 a/b,BeiDou B2, IRNSS L5•Option L6: enables Galileo E6 b/cChannels/Simultaneous Frequencies2•Option 8: 4-channel to 8-channel upgrade•Option 16: 8-channel to 16-channel upgrade•Option 32/2: 16-channel to 32-channel, dualfrequency upgrade•Option 48/3: 32-channel to 48-channel, threefrequency upgrade•Option 64/4: 48-channel to 64-channel, fourfrequency upgradeApplication Packages (typical requirement for16 channel min)•OPT-RSG: Real-time scenario generator•OPT-HV: High velocity upgrade to extendedlimits•OPT-RP: Record and playback package•OPT-JAM: Jamming package•OPT-RTK: RTK virtual base station scenarios•OPT-SEN: Sensor simulation data via protocol(included with OPT RSG)•OPT-ECL: eCall scenariosOptional Services•Option 90/54:GSG Calibration Service•Option 95/05: Extended warranty to 5 years•GSG-INST: User Training and Installation•OPT-TIM: Timing Calibration Service1Warranty period and available services may vary dependent on country.2Option may require the unit to be returned to factory for upgrade.Models Channels # of Sim.Freq.Upgrade to nexthigher modelUpgradetypeConstellations and Signal T ypes Frequency BandsGSG-5111OPT-4Software GPS L1 C/A IncludedOthers if constellation is ordered:•GLONASS L1 C/A •QZSS L1•Galileo E1•BeiDou B11539-1627 MHz (L1)GSG-541OPT-8Software 8OPT-16Software 16OPT-32/2FactoryGSG-62322OPT-48/3Factory Same as aboveOptions if constellation andfrequency are ordered:•GPS L1P, L2P, GLONASS L2 C/A (OPT L2)•GPS L2C (OPT L2C)•GPS L5, IRNSS L5, Galileo E5a/b,BeiDou B2 (OPT L5)Same as above and 3 other ranges•1192-1280 MHz (L2)•1148-1236 MHz (L5)•1224-1312 MHz (E6/B3)GSG-63483OPT 64/4FactoryGSG-64644––Configuration SummaryOct 29, 2018 rev.2© 2018, Pendulum Instruments and OroliaSpecifications subject to change or improvement without notice.。
ABB RobotStudio Machine Tending PowerPac 产品说明书
to injection molding and machining, this new package delivers Define stations and movementsPre-defined and easily modifiable station templates ensure quick PC-based programming. Template stations include most of the common types of machine tending tasks.After stations are identified, you can interactively program cycles and movements between stations in the 3D virtual world; you can even define part-specific routines. The ease of PC-based offline programming ensures process optimization is virtually complete before any actual parts are handled. Safety made simpleDefining low risk strategies to get the robot to a safe home position is simple with a graphical interface. Once safe movements to the home position are defined, the software automatically creates a HomeRun RAPID routine that is easily accessible by even untrained workers on the FlexPendant control device – avoiding the potential for costly damage.– provides a platform for quick,© C o p y r i g h t A B B R o b o t i c s . R O B 0239E N _R 1. 2012intuitive and customizable graphical user interface via ABB’s Define and configure the grippers used by the robot.Define and configure stations in the cell. Select sta-tion type and template programs or create your own.Interactively create robot movement between stations. Define different production cycles; start-up, produc-tion, empty, etc. Interactively define logic for each cycle.System requirementsThe following system requirements must be met in order to use RobotStudio Machine Tending PowerPac.RobotStudio: Version 5.15 or later.。
基于LabVIEW的网络视频传输系统设计说明书
2nd International Conference on Electrical, Computer Engineering and Electronics (ICECEE 2015)Design of network video transmission system based on LabVIEWFuhai HUANG1, a, Zhenhai Wang1, Xu Bo21School of Informatics, Linyi Normal University, Linyi, 276000, China 2School of Automobile Engineering, Linyi Normal University, Linyi, 276000, Chinaa email:***************Keywords: Virtual Instrument; TCP/IP; Network TransmissionAbstract.This paper uses LabVIEW software to realize the network online video transmission, introduced the use of TCP/IP protocol on the platform of the virtual instrument. The image collected by the camera on the server through the network transmission to the client, remote video monitoring, at the same time with video storage and other functions.IntroductionAt present, the remote video transmission has been widely used in the fields of education, health and security. Two of the most prominent feature of the video monitoring system is the digital and network. With the progress of society and development of science and technology, the network has spread to thousands of households, has become an indispensable work of learning and living conditions. The virtual instrument is based on the general purpose computer as the core hardware platform, defined by the user design, has a virtual panel, a computer instrument system is carried out by testing software. NI Company’s LabVIEW software is the core of software instead of hardware circuits, and simplify the system development, reduce development costs. In this paper, the use of network transmission module of TCP/IP protocol and LabVIEW, puts forward a scheme of the video monitoring system has the characteristics of cheap, practical, universal and stable.The system designThis system adopts C/S mode, the client is responsible for a network connection to the server and video monitoring request, receiving server transmits the video, and in the local real-time display and preservation; the server is mainly responsible for the response to the request of the client, the video acquisition equipment to collect the real-time image, and the image information transmission network transmission protocol. Therefore, to realize the remote control of video images through the Internet and related protocol. The structure of the scheme is shown in figure 1.Fig.1. The structure of C/S systemSoftware designGraphical virtual instrument integrated development environment LabVIEW (Laboratory Virtual Instrument Engineering Workbench) is a software development platform of virtual instrument NI company, using the graphical programming language, the program block diagram form, easy to learn and easy to use, can support and expression analysis to source level device its intuitive and easy programming, many the driver, a variety of, have created the basis of conditions for users to quickly and easily build instrument system their own needs in practical production. Compared with the LabVIEW and other computer languages, has a particularly important difference: the other computer languages are used to generate code for text based on LabVIEW language, using thegraphical programming language.LabVIEW software provides a visual and motor module, this module can initialize camera and video image capture, as shown in figure 2(a).In addition the TCP protocol controls provide the data communication module, protocol, can be very convenient to establish a network connection and data transmission, as shown in figure 2(b).(a) NI-IMAQ module (b) TCP moduleFig.2. LabVIEW moduleThe system initialization of the camera on the server side, and connected through the TCP protocol to establish with the client, the client to receive and display the video image of the program flow diagram as shown in figure 3.Fig.3. System flow diagramServer designServer side call camera image acquisition. LabVIEW image acquisition is mainly composed of two kinds of methods, one is the use of industrial camera driver, such as LabVIEW driver, DLL dynamic link library; another is the use of NI IMAQ and IMAQdx driver for image acquisition. This design choice is driven by the use of NI for image acquisition IMAQdx. Video image shouldbe format conversion before transmission effectively. This design uses the TCP/IP protocol for the video transmission. TCP is a connection based protocol, the transmission must be created before the data transmission. To create a TCP connection, need to specify the address and port of the address. Different ports address different services on the site. Through the "TCP VI Listener" create a listener and wait for a specified port has been received in the TCP connection. If the connection is successful, VI will return a connection handle, connecting the remote TCP address and port of the client. With two 'TCP Write' VI to send data, the first node to transmit data length, the second nodes transmit video data. Finally, the end connected with the TCP Close Connection 'VI'. The server program block diagram shown in figure 4.Fig.4. The server program block diagramThe design of the clientThe client is mainly to complete the network connection, read the video data and save functions. 'TCP Open Connection' with VI open TCP, and then use the two 'TCP Read' VI to read the data, the first to receive video data as input length of second nodes, second nodes receive video data, finally, 'TCP Close Connection' by VI end connection. Block diagram as shown in figure 5.Fig.5. The client programTest resultFirst select a port before the program runs, usually more than 1000, because a lot of less than 1000 of the port is other procedures have been occupied port. Set the server and the client port must be consistent, in order to ensure the normal listening. When the client sends a request to the server in response to the request, the connection, the connection is established, the server will send data package, finally, the client receives the data, and the data unpack restore. The result of running the program is shown in figure 6.Fig.6. The result of running the programConclusionThis design adopts C/S mode, using LabVIEW platform provides a powerful network functions and network conditions, and combined with the TCP/IP protocol, the effective realization of video network transmission and preservation, by running results show the good performance. References[1]LabVIEW User Manual: USA: National Instruments Corporation (1998).[2]Changqing Cai, WeiJun Zhang: The design on the multi-temperature testing system based on the Laview, International Seminar on Future Biomedical Information Engineering (FBIE) (2008).[3]Using External Code in LabVIEW, National Instruments Corporation (2003).[4]Wagner. C, Armenta. S, Lendl. B: Talanta 80(3)(2010).[5]F. Correa Alegria, E. Martinho, F. Almeida: Measurement 42(7) (2009).。
Unit 1 Teenage Life
Unit 1 TEENAGE LIFE目标导航重点单词1.teenage[‘tiːneIdʒ] adj.十几岁的(指13至19岁);青少年的→___________n.(13至19岁之间的)青少年2.volunteer[ˌvɒlən’tIə(r)] n.志愿者→___________ adj.志愿的;自愿的3.prefer[prI’fɜː(r)] vt.较喜欢→___________ n.喜爱;偏爱4.___________ [‘muːvmənt] n.动作;运动;活动→move vi.移动;搬家,迁移;离开vt.移动;感动5.___________ [‘suːtəbl] adj.合适的;适用的→suit vt.适合;使适宜6.___________ [‘æktʃʊəli] adv.事实上;的确→actual adj.真实的;实际的7.challenge[‘tælIndʒ] n.挑战;艰巨任务vt.怀疑;向……挑战→___________ adj.具有挑战性的8.confuse[kən’fjuːz] vt.使糊涂;使迷惑→___________ adj.难以理解的;不清楚的→confusedadj.糊涂的;迷惑的→___________ n.迷惑9.graduate[‘ɡrædʒueIt] vi.& vt.毕业;获得学位→_________n.毕业;毕业典礼10.advance[ad’vaːns] n.前进;发展vi.前进;发展vt.发展;促进→___________adj.高级的;高等的;先进的11.___________ [‘ɒbviəsli] adv.显然;明显地→obvious adj.显而易见的12.responsible[rI’spɒnsəbl] adj.负责的;有责任的→___________n.责任;义务13.___________ [sə’luːʃn] n.解决办法;答案→solve vt.解决14.___________ [juːθ]n.青年时期;青春→young adj.年轻的,没有经验的15.___________ [bI’heIvjə(r)] n.行为;举止→behave vt.& vi.举动;(举止或行为)表现16.attract[ə’trækt] vt.吸引;引起……的注意(或兴趣)→___________n.有吸引力的事物;吸引→___________adj.吸引人的17.addict[‘ædIkt] n.对……入迷的人;吸毒成瘾的人→___________adj.有瘾的;上瘾的;入迷目标短语1.____________喜爱2.____________ 集中;特别关注3.____________ 对……很入迷4.____________玩得开心5.____________ 与此同时6.____________ 集中注意力7.____________ 以好的顺序8.Prefer…to…____________9.clean up ____________10.suitable for ____________11.sign up (for sth.) ____________12.____________ 对……负责13.____________参加俱乐部14.____________ 做好准备15.hand out ____________16.keep up with____________重点语法名词短语、形容词短语和副词短语【答案】重点单词1.teenage[‘tiːneIdʒ] adj.十几岁的(指13至19岁);青少年的→teenager n.(13至19岁之间的)青少年2.volunteer[ˌvɒlən’tIə(r)] n.志愿者→voluntary adj.志愿的;自愿的3.prefer[prI’fɜː(r)] vt.较喜欢→preference n.喜爱;偏爱4.movement[‘muːvmənt] n.动作;运动;活动→move vi.移动;搬家,迁移;离开vt.移动;感动5.suitable[‘suːtəbl] adj.合适的;适用的→suit vt.适合;使适宜6.actually[‘æktʃʊəli] adv.事实上;的确→actual adj.真实的;实际的7.challenge[‘tælIndʒ] n.挑战;艰巨任务vt.怀疑;向……挑战→challenging adj.具有挑战性的8.confuse[kən’fjuːz] vt.使糊涂;使迷惑→confusing adj.难以理解的;不清楚的→confused adj.糊涂的;迷惑的→confusion n.迷惑9.graduate[‘ɡrædʒueIt] vi.& vt.毕业;获得学位→graduation n.毕业;毕业典礼10.advance[ad’vaːns] n.前进;发展vi.前进;发展vt.发展;促进→advanced adj.高级的;高等的;先进的11.obviously[‘ɒbviəsli] adv.显然;明显地→obvious adj.显而易见的12.responsible[rI’spɒnsəbl] adj.负责的;有责任的→responsibility n.责任;义务13.solution[sə’luːʃn] n.解决办法;答案→solve vt .解决14.youth[juːθ]n.青年时期;青春→young adj .年轻的,没有经验的15.behaviour[bI’heIvjə(r)] n.行为;举止→behave vt.& vi.举动;(举止或行为)表现16.attract[ə’trækt] vt.吸引;引起……的注意(或兴趣)→attraction n.有吸引力的事物;吸引→attractive adj.吸引人的17.addict[‘ædIkt] n .对……入迷的人;吸毒成瘾的人→addicted adj .有瘾的;上瘾的;入迷目标短语1.be attracted to 喜爱2.focus on 集中;特别关注3.addicted to对……很入迷4.have fun 玩得开心5.at the same time 与此同时6.concentrate on 集中注意力7.in a good order 以好的顺序8.prefer … to… 喜欢……多于……9.clean up 打扫(或清除)干净10.suitable for对……适合的11.sign up (for sth.)报名(参加课程)12.be responsible for对……负责13.join a club 参加俱乐部14.be well prepared for 做好准备15.hand out 分发16.keep up with 跟上,赶上知识精讲知识点01 teenage / ˈti:neɪdʒ/ adj. 十几岁的(指13至19岁); 青少年的teenage life 青少年生活(P11)teenage girls/boys 十几岁的少女/ 少年teenager / ˈti:neɪdʒə(r)/ n. (13至19岁之间的)青少年例句:As a teenager, you should concentrate on your study.作为一个青少年,你应该全神贯注于学习。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Program summary
Title of program: HERBVI Program obtainable from: gibbs@dxcern.cern.ch Prgramming language used: FORTRAN 77 Memory required: approx. 120 kbytes Number of bits per word: 32 Subprograms used: HERWIG version 5.7 or later Number of lines in distributed program: 4000 Keywords: baryon and lepton number violation, Monte Carlo techniques, high particle multiplicites Nature of physical problem: simulation of baryon and lepton number violating processes with an associated large gauge boson multiplicity. Method of solution: generation of phase space configurations using an efficient algorithm, coupled to a phenomenological model of the physical processes under study. Typical running time: 2-3 hours for a 104 event simulation (DEC ALPHA 4000), dependent on the process simulated Unusual features of the program: none.
Cavendish–HEP–94/16 Liverpool–HEP–95/201 February 1, 2008
Research supporineering Research Council and by the EC Programme “Human Capital and Mobility”, Network “Physics at High Energy Colliders”, contract CHRXCT93-0357 (DG 12 COMA). † Current Address: Department of Physics, Oliver Lodge Laboratory, P.O. Box 147, Liverpool University, Liverpool L69 3BX.
2.1
General properties
The general features of instanton-induced BLNV taken into account by HERBVI are: • Quarks and leptons of all families attached to the BLNV vertex, with total change in baryon and lepton number ∆B = ∆L = −3. (1) • A steeply rising cross section, the rise being cut off at some energy due to unitarity constraints. • A parametrically large boson multiplicity, nB , with a typical value being nB = 30 ∼ 1/αW . 1
Cavendish–HEP–94/16 Liverpool–HEP–95/201 hep-ph/9504232
arXiv:hep-ph/9504232v1 5 Apr 1995
HERBVI - a program for simulation of baryon and lepton number violating processes∗
1
Introduction
It has been known for some time that topologically non-trivial gauge field configurations induce baryon- and lepton-number violating (BLNV) vertices in the electroweak sector of the standard model [1, 2]. More recent investigations of these processes suggest that such processes may be observable at supercollider energies. An extensive review can be found in [3]. However, at present it is not possible to make definite predictions even about the rate of such processes. What is possible is to take the main features of the calculations and use these characteristics to form a phenomenological model of BLNV processes. The aim of such a model is to predict possible experimental avenues that can be explored, with the possibility of improved theoretical calculations in the future allowing the model to be refined. One such model has been presented in [4, 5], and in section 2 we review this model. In section 3 we describe the implementation of the model as a Monte Carlo simulation, HERBVI. This package simulates hard scattering processes involving BLNV, and has been designed to take into account the very high particle multiplicities associated with BLNV processes. In addition, the formation of the extra baryons or antibaryons from the BLNV process is dealt with. Finally, in section 4 we make some concluding remarks. In an appendix we describe the use of the HERBVI package by detailing how it interfaces with the general Monte Carlo simulation program HERWIG [6, 7].
2
Simulating baryon number violation
In this section, the model of [4, 5] is briefly outlined. One of the general properties that has to be addressed is the parametrically large multiplicity of gauge bosons produced in BLNV interactions [8, 9]. Consequently, we discuss in some detail the method of [10] for the efficient Monte Carlo generation of many-body phase space configurations.
The BLNV process is assumed to be initiated by a valence quark-quark collision. Thus the reaction is q + q → 7¯ q + 3¯ l + nB W (Z ) + nH H. (2)
where the two incoming quarks and one outgoing antiquark are first-generation, and three outgoing antiquarks of each of the second and third generations are produced. The matrix element is taken to be constant, so that the distributions of produced particles are determined by phase space. Two options for the gauge boson multiplicity nB are provided in the program: either a fixed multiplicity, or a distribution modelled on the leading-order BLNV matrix element. Alternatively, a user-supplied routine can be used. The Higgs boson multiplicity nH is assumed to be tied to that of gauge bosons, as discussed in sect. 3.5 below. For the energy √ dependence, a simple step-function of the quark-quark centre-of-mass ˆ is assumed: collision energy s √ √ σ ˆ s ˆ =σ ˆ0 θ s ˆ− s ˆ0 (3)