FINS5513_SECURITY VALUATION AND PORTFOLIO SELECTION_2006 Summer_solution_chap025
SAPPHIRE系统用户指南说明书
The challengeThe RAF is a complex and diverse organisation. It's people and equipment carry out complicated, high-risk tasks both in the UK and on operations overseas which need to be completed against demanding time constraints, in a way that minimises the risk of failure and maximises efficient use of resources. The achievement of these tasks relies upon timely and well-informed decisions based upon a shared understanding of trends, the current position and the future outlook.However, prior to the selection of SAPPHIRE, the RAF did not have a consolidated view of its performance and risk position. For a commander to see one version of the truth, hundreds of emails and documents would have to be collated which could take weeks and there was no way for staff at all levels to have universal access to performance and risk data.There was a long-standing requirement for themeasurement of capability , the associated risks and issues such as threats, equipment problems, resource shortfalls and possible future adverse events.The solutionAfter conducting a requirements capture and analysis exercise at the RAF Headquarters at the former Strike Command, Fujitsu developed and delivered a new , bespoke Performance and Risk Management System, named ‘SAPPHIRE’, with balanced scorecard capabilities. The acronym ‘SAPPHIRE’ stands for Strike Applications Project Promoting High level Information Reporting and Evaluation. Whilst Strike Command has since transformed to become AIR Command, SAPPHIRE is in use across the whole of the RAF , providing a single performance and riskmanagement tool.SAPPHIRE is based on Oracle database technology , sitting on the MoD’s existing communicationsinfrastructure with (Trusted) access available to users not yet on DII. SAPPHIRE can take information from any other ODBC-compliant database and provide outputs in a variety of formats as defined (and thus easily understood) by the user as appropriate to their own organisation or unit’s needs.‘SAPPHIRE has become embedded in the management culture of the RAF , where it is finding an increasingly important role in both the conduct of day-to-day business at the producer level through to the conduct of senior management boards all the way up to the Defence Management Board.’Mark Williams - Group CaptainSUMMARY OF KEY FACTSOrganisation RAF Air Command Contract signing date February 2002Service/s deliveredSAPPHIRE Application Design, Application Integration, Application Development, Support, Managed Service and training on Application Management.Benefits For MOD• One database providing a consolidated view of performance & risks• Subjective assessment of performance displayed alongside the calculated value• Enter data once, use many times in different ways • See the big picture or focus in on detail • Capture all expertise, make better decisions • Shared aims, more effective working • Reduced reporting burden upon users • Emphasises forecasting• Compatible with legacy and future IT systems • Promotes corporate awarenessEmphasises forecasting SAPPHIRE providesimmediate access to history and trend information but focus is now on forecasting and managing the future. The application allows managers to enter performance and risk forecasts to any future time period based upon proposed management and mitigation strategies detailed in report narratives.Compatible with legacy and future systems, adding value to existing data Data from other sources can be imported without the need for manual transcription, saving time and improving consistency which adds value to that data.Promotes corporate awareness Training for users of the application and its subsequent use in everyday management has helped to remove silo thinking.Future DevelopmentsThe system will continue to be developed to reflect the unique business needs of new users and toenhance core functionality to existing users, including investigation of alternate user interfaces and automated data feeds from extant applications.An increasing user community as DII(F) rolls out across Defence, enabling business areas the opportunity to adopt SAPPHIRE as their preferred performance, risk and business management tool.Our ApproachSAPPHIRE was delivered in phases by Fujitsu, allowing early benefits as well as quick response to requirements for changes and enhancements. The SAPPHIRE training has contributed to the cultural and mind-set changes which were critical to achieving optimum ROI.The ExpertiseFujitsu were chosen because of their proven expertise in project management, application development, implementation, support and managed services.Wing Commander Nicky Mellings, the SAPPHIRE User Champion, stated: ‘SAPPHIRE continues to provide key benefits to (not just) AIR Command (but the RAF as a whole), enabling senior management at all levels to view, understand and manage their outputs effectively and efficiently. The ability to view the present position, married against risks, allows senior managers to make (better) informed decisions to mitigate future risks and improve future performance.’Fujitsu implements changes and additions to SAPPHIRE functionality as user needs evolve, and provides on-line support to users and system administrators as well as managed support services and training for instructors and those performing application management roles.Although it was the RAF’s requirements that drove SAPPHIRE’s development, it has been successfully adopted by other MoD departments as theperformance and risk management tool of choice. The system design is generic and because the user defines the business rules, it can be applied to any organisation.SAPPHIRE operates at SECRET and RESTRICTED data classifications, with user definable rules that allow access to pre-determined individuals whilst still promoting information sharing on a ‘need-to-know’ or ‘duty-to-share’ basis.Benefits for our CustomerOne version of the truth One database providing a consolidated view of operational performance, risks and issues giving a single version of the truth available in one place, transforming decision-making and operational management.Subjective assessment of performance displayed alongside the calculated value Subjective military assessment of performance can be added without overriding calculated, objective assessments so that the extent of the judgement applied is always apparent.Enter once, use many times in different ways Data is entered only once but can be used again and again, categorised in a variety of ways (for example, Defence Lines of Development, user-defined structures and keywords) and viewed or manipulated to suit user output needs through the generation of reports.See the big picture or focus on detail Huge amounts of information are consolidated into simple summaries by users, who can drill down to the supporting data if required.Capture all expertise, make better decisions Accurate information entered by experts in their area gives senior management a clearer understanding of the factors and impacts which lead to better, faster decisions.Shared aims, more effective working Senior officers are equally aware of a consistent big picture, which helps them work together more effectively .Reduced reporting burden upon users Previous reporting systems were labour intensive. WithSAPPHIRE, comprehensive reports are viewed easily on-screen and information can be selected then presented in various formats.。
Extreme Networks SLX 9640高性能固定路由器商品介绍说明书
ExtremeRouting? SLX 9640
Built to Suit Your Business Needs Ext rem e Elem ent s are t he b uild ing b locks t hat allow you t o t ailor your net w ork t o your sp ecific b usiness environm ent , g oals, and ob ject ives. They enab le t he creat ion of an A ut onom ous Net w ork t hat d elivers t he p osit ive exp eriences and b usiness out com es m ost im p ort ant t o your org anizat ion.
W W W.EXTREMENETW
1
Flexib le Bo rd er Ro ut ing w it h Int ernet Scale, Ult ra-Deep Buffers,
MPLS and EVPN
The SLX 964 0 is a very p ow erful com p act d eep b uffer Int ernet b ord er rout er, p rovid ing a cost -efficient solut ion t hat is p urp ose-b uilt for t he m ost d em and ing service p rovid er and ent erp rise d at a cent ers and MA N/ WA N ap p licat ions. The rob ust syst em archit ect ure sup p ort ed by SLX-OS and a versat ile feat ure set includ ing IPv4 , IPv6, and MPLS/ VPLS w it h Carrier Et hernet 2.0 and OA M cap ab ilit ies t o p rovid e d ep loym ent flexib ilit y.
FINS5513_SECURITYVALUATIONANDPORTFOLIOSELECTI..
CHAPTER 19: FINANCIAL STATEMENT ANALYSIS1. ROE = Net profits/Equity = Net profits/Sales × Sales/Assets × Assets/Equity= Net profit margin × Asset turnover × Leverage ratio= 5.5% × 2.0 × 2.2 = 24.2%2.ROA = ROS × ATOThe only way that Crusty Pie can have an ROS higher than the industry average and an ROA equal to the industry average is for its ATO to be lower than the industry average.3. ABC’s Asset turnover must be above the industry average.4. ROE = (1 – Tax rate) × [ROA + (ROA – Interest rate)Debt/Equity]ROE A > ROE BFirms A and B have the same ROA. Assuming the same tax rate and assuming that ROA > interest rate, then Firm A must have either a lower interest rate or a higher debt ratio. 5. SmileWhite has higher quality of earnings for the following reasons:•SmileWhite amortizes its goodwill over a shorter period than does QuickBrush.SmileWhite therefore presents more conservative earnings because it has greatergoodwill amortization expense.•SmileWhite depreciates its property, plant and equipment using an accelerated depreciation method. This results in recognition of depreciation expense sooner andalso implies that its income is more conservatively stated.•SmileWhite’s bad debt allowance is greater as a percent of receivables.SmileWhite is recognizing greater bad-debt expense than QuickBrush. If actualcollection experience will be comparable, then SmileWhite has the moreconservative recognition policy.19-119-26. a. EquityAssetsAssets Sales Sales profits Net Equity profits Net ROE ××=== Net profit margin × Total asset turnover × Assets/equity%92.90992.0140,5510Sales profits Net ===66.1100,3140,5Assets Sales == 41.1200,2100,3Equity Assets ==b.%2.2341.166.1%92.9200,2100,3100,3140,5140,5510ROE =××=××=c.g = ROE × plowback = 23.2% × %1.1696.160.096.1%2.23=−×=7.a.Palomba Pizza StoresStatement of Cash FlowsFor the year ended December 31, 1999Cash Flows from Operating Activities Cash Collections from Customers $250,000 Cash Payments to Suppliers (85,000) Cash Payments for Salaries (45,000) Cash Payments for Interest(10,000)Net Cash Provided by Operating Activities$110,000Cash Flows from Investing Activities Sale of Equipment 38,000 Purchase of Equipment (30,000) Purchase of Land(14,000)Net Cash Used in Investing Activities(6,000)Cash Flows from Financing Activities Retirement of Common Stock (25,000) Payment of Dividends(35,000)Net Cash Used in Financing Activities (60,000) Net Increase in Cash 44,000Cash at Beginning of Year50,000Cash at End of Year $94,00019-3b. The cash flow from operations (CFO) focuses on measuring the cash flow generatedby operations and not on measuring profitability. If used as a measure of performance,CFO is less subject to distortion than the net income figure. Analysts use the CFO asa check on the quality of earnings. The CFO then becomes a check on the reportednet earnings figure, but is not a substitute for net earnings. Companies with high netincome but low CFO may be using income recognition techniques that are suspect.The ability of a firm to generate cash from operations on a consistent basis is oneindication of the financial health of the firm. For most firms, CFO is the “life blood” ofthe firm. Analysts search for trends in CFO to indicate future cash conditions and thepotential for cash flow problems.Cash flow from investing activities (CFI) is an indication of how the firm is investing itsexcess cash. The analyst must consider the ability of the firm to continue to grow and toexpand activities, and CFI is a good indication of the attitude of management in this area.Analysis of this component of total cash flow indicates the type of capital expendituresbeing made by management to either expand or maintain productive activities. CFI isalso an indicator of the firm’s financial flexibility and its ability to generate sufficient cashto respond to unanticipated needs and opportunities. A decreasing CFI may be a sign ofa slowdown in the firm’s growth.Cash flow from financing activities (CFF) indicates the feasibility of financing, the sourcesof financing, and the types of sources management supports. Continued debt financingmay signal a future cash flow problem. The dependency of a firm on external sources offinancing (either borrowing or equity financing) may present problems in the future, suchas debt servicing and maintaining dividend policy. Analysts also use CFF as anindication of the quality of earnings. It offers insights into the financial habits ofmanagement and potential future policies.8. a. CF from operating activities = $260 – $85 – $12 – $35 = $128b.CF from investing activities = –$8 + $30 – $40 = –$18c. CF from financing activities = –$32 – $37 = –$6919-49. a. QuickBrush has had higher sales and earnings growth (per share) than SmileWhite.Margins are also higher. But this does not mean that QuickBrush is necessarily a betterinvestment. SmileWhite has a higher ROE, which has been stable, while QuickBrush’sROE has been declining. We can see the source of the difference in ROE using DuPontanalysis:Component Definition QuickBrush SmileWhiteTax burden (1 – t) Net profits/pretax profits 67.4% 66.0%Interest burden Pretax profits/EBIT 1.000 0.955Profit margin EBIT/Sales 8.5% 6.5%Asset turnover Sales/Assets 1.42 3.55Leverage Assets/Equity 1.47 1.48ROE Net profits/Equity 12.0% 21.4%While tax burden, interest burden, and leverage are similar, profit margin and assetturnover differ. Although SmileWhite has a lower profit margin, it has a far higher assetturnover.Sustainable growth = ROE × plowback ratioROE PlowbackratioSustainablegrowth rateLudlow’sestimate ofgrowth rateQuickBrush 12.0% 1.00 12.0% 30%SmileWhite 21.4% 0.34 7.3% 10%Ludlow has overestimated the sustainable growth rate for both companies. QuickBrush has little ability to increase its sustainable growth – plowback already equals 100%.SmileWhite could increase its sustainable growth by increasing its plowback ratio.b. QuickBrush’s recent EPS growth has been achieved by increasing book value per share,not by achieving greater profits per dollar of equity. A firm can increase EPS even ifROE is declining as is true of QuickBrush. QuickBrush’s book value per share has more than doubled in the last two years.Book value per share can increase either by retaining earnings or by issuing new stock ata market price greater than book value. QuickBrush has been retaining all earnings, butthe increase in the number of outstanding shares indicates that it has also issued asubstantial amount of stock.19-519-610. a. ROE = operating margin × interest burden × asset turnover × leverage × tax burdenROE for Eastover (EO) and for Southampton (SHC) in 2002 are found as follows: profit margin =SalesEBITSHC: EO: 145/1,793 = 795/7,406 = 8.1% 10.7% interest burden =EBITprofits PretaxSHC:EO: 137/145 = 600/795 = 0.95 0.75 asset turnover =AssetsSales SHC:EO: 1,793/2,104 = 7,406/8,265 =0.85 0.90leverage =EquityAssets SHC: EO: 2,140/1,167 = 8,265/3,864 = 1.80 2.14 tax burden =profits Pretax profitsNet SHC: EO:91/137 = 394/600 =0.66 0.66 ROESHC:EO:7.8% 10.2%b.The differences in the components of ROE for Eastover and Southampton are as follows: Profit marginEO has a higher marginInterest burden EO has a higher interest burden because its pretax profits are alower percentage of EBIT Asset turnover EO is more efficient at turning over its assets Leverage EO has higher financial leverageTax Burden No major difference here between the two companiesROEEO has a higher ROE than SHC, but this is only in part due to higher margins and a better asset turnover -- greater financial leverage also plays a part.c. The sustainable growth rate can be calculated as: ROE times plowback ratio. The sustainable growth rates for Eastover and Southampton are as follows:ROEPlowback ratio*Sustainablegrowth rate Eastover 10.2% 0.36 3.7% Southampton7.8% 0.58 4.5%The sustainable growth rates derived in this manner are not likely to berepresentative of future growth because 2002 was probably not a “normal” year. For Eastover, earnings had not yet recovered to 1999-2000 levels; earnings retention of only 0.36 seems low for a company in a capital intensive industry.19-7Southampton’s earnings fell by over 50 percent in 2002 and its earnings retention will probably be higher than 0.58 in the future. There is a danger, therefore, in basing a projection on one year’s results, especially for companies in a cyclical industry such as forest products. *Plowback = (1 – payout ratio)EO:Plowback = (1 – 0.64) = 0.36SHC: Plowback = (1 – 0.42) = 0.5811. a. The formula for the constant growth discounted dividend model is:gk )g 1(D P 00−+=For Eastover:20.43$08.011.008.120.1$P 0=−×=This compares with the current stock price of $28. On this basis, it appears that Eastover is undervalued.b. The formula for the two-stage discounted dividend model is:333322110)k 1(P )k 1(D )k 1(D )k 1(D P +++++++=For Eastover: g 1 = 0.12 and g 2 = 0.08 D 0 = 1.20D 1 = D 0 (1.12)1 = $1.34 D 2 = D 0 (1.12)2 = $1.51 D 3 = D 0 (1.12)3 = $1.69 D 4 = D 0 (1.12)3(1.08) = $1.8267.60$08.011.082.1$g k D P 243=−=−=03.48$)11.1(67.60$)11.1(69.1$)11.1(51.1$)11.1(34.1$P 33210=+++=This approach makes Eastover appear even more undervalued than was the case using the constant growth approach.19-8c. Advantages of the constant growth model include: (1) logical, theoretical basis; (2) simple to compute; (3) inputs can be estimated.Disadvantages include: (1) very sensitive to estimates of growth; (2) g and k difficult to estimate accurately; (3) only valid for g < k; (4) constan t growth is an unrealistic assumption; (5) assumes growth will never slow down; (6) dividend payout must remain constant; (7) not applicable for firms not paying dividends.Improvements offered by the two-stage model include:(1) The two-stage model is more realistic. It accounts for low, high, or zero growth in the first stage, followed by constant long-term growth in the second stage.(2) The model can be used to determine stock value when the growth rate in the first stage exceeds the required rate of return.12. a.In order to determine whether a stock is undervalued or overvalued, analysts often compute price-earnings ratios (P/Es) and price-book ratios (P/Bs); then, these ratios are compared to benchmarks for the market, such as the S&P 500 index. The formulas for these calculations are: Relative P/E = P/E of specific companyP/E of S&P 500Relative P/B = P/B of specific companyP/B of S&P 500To evaluate EO and SHC using a relative P/E model, Mulroney can calculate the five-year average P/E for each stock, and divide that number by the 5-year average P/E for the S&P 500 (shown in the last column of Table 19E). This gives the historical average relative P/E. Mulroney can then compare the average historical relative P/E to the current relative P/E (i.e., the current P/E on each stock, using the estimate of this year’s earnings per share in Table 19F, divided by the current P/E of the market).For the price/book model, Mulroney should make similar calculations, i.e., divide the five-year average price-book ratio for a stock by the five year average price/book for the S&P 500, and compare the result to the current relative price/book (using current book value). The results are as follows:P/E modelEO SHC S&P500 5-year average P/E 16.56 11.94 15.20 Relative 5-year P/E 1.09 0.79 Current P/E17.50 16.00 20.20 Current relative P/E 0.87 0.79Price/Book modelEO SHC S&P500 5-year average price/book1.52 1.102.10Relative 5-year price/book 0.72 0.52Current price/book 1.62 1.49 2.60Current relative price/book 0.62 0.57From this analysis, it is evident that EO is trading at a discount to its historical 5-yearrelative P/E ratio, whereas Southampton is trading right at its historical 5-year relativeP/E. With respect to price/book, Eastover is trading at a discount to its historicalrelative price/book ratio, whereas SHC is trading modestly above its 5-year relativeprice/book ratio. As noted in the preamble to the problem (see problem 10),Eastover’s book value is understated due to the very low historical cost basis for itstimberlands. The fact that Eastover is trading below its 5-year average relative price tobook ratio, even though its book value is understated, makes Eastover seem especiallyattractive on a price/book basis.b. Disadvantages of the relative P/E model include: (1) the relative P/E measures onlyrelative, rather than absolute, value; (2) the accounting earnings estimate for the nextyear may not equal sustainable earnings; (3) accounting practices may not bestandardized; (4) changing accounting standards may make historical comparisonsdifficult.Disadvantages of relative P/B model include: (1) book value may be understated oroverstated, particularly for a company like Eastover, which has valuable assets on itsbooks carried at low historical cost; (2) book value may not be representative ofearning power or future growth potential; (3) changing accounting standards makehistorical comparisons difficult.13.The following table summarizes the valuation and ROE for Eastover and Southampton:Eastover SouthamptonStock Price $28.00 $48.00Constant-growth model$43.20 $29.002-stage growth model $48.03 $35.50Current P/E 17.50 16.00Current relative P/E 0.87 0.795-year average P/E 16.56 11.94Relative 5 year P/E 1.09 0.79Current P/B 1.62 1.49Current relative P/B 0.62 0.575-year average P/B 1.52 1.10Relative 5 year P/B 0.72 0.52Current ROE10.2% 7.8%Sustainable growth rate 3.7% 4.5%Eastover seems to be undervalued according to each of the discounted dividend models.Eastover also appears to be cheap on both a relative P/E and a relative P/B basis.Southampton, on the other hand, looks according to each of the discounted dividendmodels and is slightly overvalued using the relative price/book model. On a relative P/E19-9basis, SHC appears to be fairly valued. Southampton does have a slightly highersustainable growth rate, but not appreciably so, and its ROE is less than Eastover’s.The current P/E for Eastover is based on relatively depressed current earnings, yet thestock is still attractive on this basis. In addition, the price/book ratio for Eastover isoverstated due to the low historical cost basis used for the timberland assets. This makes Eastover seem all the more attractive on a price/book basis. Based on this analysis,Mulroney should select Eastover over Southampton.14. a. Net income can increase even while cash flow from operations decreases. This canoccur if there is a buildup in net working capital -- for example, increases inaccounts receivable or inventories, or reductions in accounts payable. Lowerdepreciation expense will also increase net income but can reduce cash flow throughthe impact on taxes owed.b. Cash flow from operations might be a good indicator of a firm's quality of earningsbecause it shows whether the firm is actually generating the cash necessary to paybills and dividends without resorting to new financing. Cash flow is less susceptibleto arbitrary accounting rules than net income is.15. $1,200Cash flow from operations = sales – cash expenses – increase in A/RIgnore depreciation because it is a non-cash item and its impact on taxes is alreadyaccounted for.16. a Both current assets and current liabilities will decrease by equal amounts. But this isa larger percentage decrease for current liabilities because the initial current ratio isabove 1.0. So the current ratio increases. Total assets are lower, so turnoverincreases.17. a Cost of goods sold is understated so income is higher, and assets (inventory) arevalued at most recent cost so they are valued higher.18. a Since goods still in inventory are valued at recent versus historical cost.19. b Dividend has no effect on interest payments, earnings, or debt, but will reduceequity, at least minimally.19-1020.2005 2009(1) Operating margin = Operating income – DepreciationSales%5.6542338=−%8.6979976=−(2) Asset turnover =SalesTotal Assets21.2245542=36.3291979=(3) Interest Burden =[Op Inc – Dep] – Int ExpenseOperating Income – Depreciation914.03383338=−−−1.0(4) Financial Leverage =Total AssetsShareholders Equity54.1159245=32.1220291=(5) Income tax rate =Income taxesPre-tax income%63.403213=%22.556737=Using the Du Pont formula:ROE = [1.0 – (5)] × (3) × (1) × (2) × (4)ROE(2005) = 0.5937 × 0.914 × 0.065 × 2.21 × 1.54 = 0.120 = 12.0%ROE(2009) = 0.4478 × 1.0 × 0.068 × 3.36 × 1.32 = 0.135 = 13.5%(Because of rounding error, these results differ slightly from those obtained by directly calculating ROE as net income/equity.)b. Asset turnover measures the ability of a company to minimize the level of assets(current or fixed) to support its level of sales. The asset turnover increasedsubstantially over the period, thus contributing to an increase in the ROE.Financial leverage measures the amount of financing other than equity, including short and long-term debt. Financial leverage declined over the period, thusadversely affecting the ROE. Since asset turnover rose substantially more than financial leverage declined, the net effect was an increase in ROE.19-11。
罗克韦尔 PlantPAx 全局控制系统 说明书
罗克韦尔自动化出版物 PROCES-UM003A-ZH-P - 2016 年 3 月
3
目录
配置报警 配置历史数据 配置 I/O 块
分配 I/O 和诊断
章节 4
考虑事项 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 配置报警组. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 配置报警和事件横幅 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
控制器项目管理器. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 逻辑管理器 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 构建过程策略 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 PS_AIn_Chan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 PS_PID_AIn_Chan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 PS_PF755 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 控制器与系统同步 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
低频活动漂浮潜水船声探测系统(LFATS)说明书
LOW-FREQUENCY ACTIVE TOWED SONAR (LFATS)LFATS is a full-feature, long-range,low-frequency variable depth sonarDeveloped for active sonar operation against modern dieselelectric submarines, LFATS has demonstrated consistent detection performance in shallow and deep water. LFATS also provides a passive mode and includes a full set of passive tools and features.COMPACT SIZELFATS is a small, lightweight, air-transportable, ruggedized system designed specifically for easy installation on small vessels. CONFIGURABLELFATS can operate in a stand-alone configuration or be easily integrated into the ship’s combat system.TACTICAL BISTATIC AND MULTISTATIC CAPABILITYA robust infrastructure permits interoperability with the HELRAS helicopter dipping sonar and all key sonobuoys.HIGHLY MANEUVERABLEOwn-ship noise reduction processing algorithms, coupled with compact twin line receivers, enable short-scope towing for efficient maneuvering, fast deployment and unencumbered operation in shallow water.COMPACT WINCH AND HANDLING SYSTEMAn ultrastable structure assures safe, reliable operation in heavy seas and permits manual or console-controlled deployment, retrieval and depth-keeping. FULL 360° COVERAGEA dual parallel array configuration and advanced signal processing achieve instantaneous, unambiguous left/right target discrimination.SPACE-SAVING TRANSMITTERTOW-BODY CONFIGURATIONInnovative technology achievesomnidirectional, large aperture acousticperformance in a compact, sleek tow-body assembly.REVERBERATION SUPRESSIONThe unique transmitter design enablesforward, aft, port and starboarddirectional transmission. This capabilitydiverts energy concentration away fromshorelines and landmasses, minimizingreverb and optimizing target detection.SONAR PERFORMANCE PREDICTIONA key ingredient to mission planning,LFATS computes and displays systemdetection capability based on modeled ormeasured environmental data.Key Features>Wide-area search>Target detection, localization andclassification>T racking and attack>Embedded trainingSonar Processing>Active processing: State-of-the-art signal processing offers acomprehensive range of single- andmulti-pulse, FM and CW processingfor detection and tracking. Targetdetection, localization andclassification>P assive processing: LFATS featuresfull 100-to-2,000 Hz continuouswideband coverage. Broadband,DEMON and narrowband analyzers,torpedo alert and extendedtracking functions constitute asuite of passive tools to track andanalyze targets.>Playback mode: Playback isseamlessly integrated intopassive and active operation,enabling postanalysis of pre-recorded mission data and is a keycomponent to operator training.>Built-in test: Power-up, continuousbackground and operator-initiatedtest modes combine to boostsystem availability and accelerateoperational readiness.UNIQUE EXTENSION/RETRACTIONMECHANISM TRANSFORMS COMPACTTOW-BODY CONFIGURATION TO ALARGE-APERTURE MULTIDIRECTIONALTRANSMITTERDISPLAYS AND OPERATOR INTERFACES>State-of-the-art workstation-based operator machineinterface: Trackball, point-and-click control, pull-down menu function and parameter selection allows easy access to key information. >Displays: A strategic balance of multifunction displays,built on a modern OpenGL framework, offer flexible search, classification and geographic formats. Ground-stabilized, high-resolution color monitors capture details in the real-time processed sonar data. > B uilt-in operator aids: To simplify operation, LFATS provides recommended mode/parameter settings, automated range-of-day estimation and data history recall. >COTS hardware: LFATS incorporates a modular, expandable open architecture to accommodate future technology.L3Harrissellsht_LFATS© 2022 L3Harris Technologies, Inc. | 09/2022NON-EXPORT CONTROLLED - These item(s)/data have been reviewed in accordance with the InternationalTraffic in Arms Regulations (ITAR), 22 CFR part 120.33, and the Export Administration Regulations (EAR), 15 CFR 734(3)(b)(3), and may be released without export restrictions.L3Harris Technologies is an agile global aerospace and defense technology innovator, delivering end-to-endsolutions that meet customers’ mission-critical needs. The company provides advanced defense and commercial technologies across air, land, sea, space and cyber domains.t 818 367 0111 | f 818 364 2491 *******************WINCH AND HANDLINGSYSTEMSHIP ELECTRONICSTOWED SUBSYSTEMSONAR OPERATORCONSOLETRANSMIT POWERAMPLIFIER 1025 W. NASA Boulevard Melbourne, FL 32919SPECIFICATIONSOperating Modes Active, passive, test, playback, multi-staticSource Level 219 dB Omnidirectional, 222 dB Sector Steered Projector Elements 16 in 4 stavesTransmission Omnidirectional or by sector Operating Depth 15-to-300 m Survival Speed 30 knotsSize Winch & Handling Subsystem:180 in. x 138 in. x 84 in.(4.5 m x 3.5 m x 2.2 m)Sonar Operator Console:60 in. x 26 in. x 68 in.(1.52 m x 0.66 m x 1.73 m)Transmit Power Amplifier:42 in. x 28 in. x 68 in.(1.07 m x 0.71 m x 1.73 m)Weight Winch & Handling: 3,954 kg (8,717 lb.)Towed Subsystem: 678 kg (1,495 lb.)Ship Electronics: 928 kg (2,045 lb.)Platforms Frigates, corvettes, small patrol boats Receive ArrayConfiguration: Twin-lineNumber of channels: 48 per lineLength: 26.5 m (86.9 ft.)Array directivity: >18 dB @ 1,380 HzLFATS PROCESSINGActiveActive Band 1,200-to-1,00 HzProcessing CW, FM, wavetrain, multi-pulse matched filtering Pulse Lengths Range-dependent, .039 to 10 sec. max.FM Bandwidth 50, 100 and 300 HzTracking 20 auto and operator-initiated Displays PPI, bearing range, Doppler range, FM A-scan, geographic overlayRange Scale5, 10, 20, 40, and 80 kyd PassivePassive Band Continuous 100-to-2,000 HzProcessing Broadband, narrowband, ALI, DEMON and tracking Displays BTR, BFI, NALI, DEMON and LOFAR Tracking 20 auto and operator-initiatedCommonOwn-ship noise reduction, doppler nullification, directional audio。
智能融合cSoC:ACE序列控制使用纤维和MSS说明书
Application Note AC366May 20191© 2019 Microsemi Corporation SmartFusion cSoC: ACE Sequencing Control Using Fabric and MSSTable of ContentsIntroductionThe mixed signal blocks found in the SmartFusion ® customizable system-on-chip (cSoC) devices are controlled and connected to the rest of the system via a dedicated processor called the analog compute engine (ACE). The ACE is built to handle the sampling, sequencing, and post-processing of the ADCs,DACs, and signal conditioning blocks (SCBs). For a larger deterministic synchronization between the sampling and custom fabric logic, the sample sequencing in the ACE is controlled through the microprocessor subsystem (MSS) or FPGA fabric logic.This application note provides the two design examples which allow deterministic synchronization between the sampling essential steps:•"Design Example 1: ACE Sequencer Using Fabric Logic" on page 3•"Design Example 2: Simultaneous Sampling Using the MSS" on page 5This application note also assumes that you are familiar with the SmartFusion analog block. Refer to the SmartFusion Programmable Analog User’s Guide for more information.Sample Sequencing in ACEThe ACE in the SmartFusion cSoC is made up of two major blocks:•Sample sequencing engine (SSE)•Post processing engine (PPE)The SSE offers a flexible configuration of the analog front end (AFE) resources (analog inputs and monitors, comparators, ADCs, and DACs), as well as a variety of simple and sophisticated sample sequencing. The PPE is a self sufficient block that allows the data processing such as linear transformation, filtering, and thresholds comparisions, etc. The ACE also has an interface with the AFE and the MSS/FPGA fabric.Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Sample Sequencing in ACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Design Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3Special Consideration During the Simultaneous Sampling . . . . . . . . . . . . . . . . . . . . . . . . 6Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7Appendix A: ACE Configuration and Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8Appendix B: Special ACE Register for Design Example . . . . . . . . . . . . . . . . . . . . . . . . 12Appendix C: Configuration for Simultaneous Sample Procedure . . . . . . . . . . . . . . . . . . . . 13Appendix D: ACE Configuration and Procedure for Design Example 2 . . . . . . . . . . . . . . . . 14Appendix E: Design Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14List of Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15SmartFusion cSoC: ACE Sequencing Control Using Fabric and MSS2It interfaces with the MSS and fabric is through the APB3 bus as depicted in Figure1.Figure2 provides an overview of the sample sequencing engine (SSE) block and its interfaces to PPE, APB3, ADCs, DACs, and ACB. The SSE block has the following:•The sample sequencing instruction (SSI) unit multiplexes between APB3 and program instruction in SRAM, access to the analog fabric registers.•Time division multiplexing finite state machine (TDM FSM): Creates the timeslots for each of the three ADCs, as well as a shared timeslot for APB3 or PPE accesses. The ADC timeslots are allocated during the ACE configuration in the SmartDesign.•APB3/PPE interface: Arbitrates the SSE access between the APB3 and PPE.•24-bit phase accumulators: Front-end accumulators for the three SDDs.Figure 1 • Overview of ACE Architecture and InterfacesFigure 2 • Overview of ACE Architecture and InterfacesDesign Example 3The TDM FSM block (shown in Figure 2 on page 2) implements a mechanism to sequence through the ADCs. It allows the equal access by three separate program counters (PC0, PC1, and PC2) in the SSE and the APB3/PPE master. The SSE uses a separate program counters (PC) for sequencing and controlling each ADCs independently. When controlling the SSE from the APB3 master, the master needs to honor the wait-states generated by the PREADY signal during the normal operation of the SSE TDM timeslot counter.Note:When the TDM timeslot counter is enabled for normal operation of the SSE block, there are alwaysfour timeslots, regardless of whether there are one, two, or three ADC instances in a specificdevice.The TDM FSM is controlled by FABACETRIG signal or SSE_TS_CTRL register when bit 0 of•SSE_TS_CTRL register or FABACETRIG is set to 1, it enables all 4 timeslots •SSE_TS_CTRL or FABACETRIG set to 0, it only enables access to the APB3 master – this fixesthe PREADY signal high to allow the zero-wait state access to the APB3 masterThe SmartFusion cSoC devices also have the capability of simultaneous sampling on different ADCs.Simultaneous synchronized ADC conversion control register (ADC_SYNC_CONV) allows for a single program to issue the synchronized start instructions for all ADCs.Design ExampleThis section describes the design examples. This application note shows two design examples of controlling the ACE sequencer using the fabric logic and MSS.The first design example shows a master in fabric, uses the FABACETRIG to access the APB3 interface in the ACE, and then control the SSE sampling. The second design example shows the simultaneous sampling on multiple ADCs using the MSS.Note:The timeslots do not have any capability neither to block each other nor to signal each other. So,you need to use the special consideration during the simultaneous sampling. For more details, referto "Special Consideration During the Simultaneous Sampling" on page 6.Design Example 1: ACE Sequencer Using Fabric LogicThis design example shows a master in fabric controlling the SSE timeslot. It uses the FABACETRIG (refer to "Appendix A: ACE Configuration and Connectivity" on page 8) signal to access the APB3interface in ACE and then control the SSE sampling. Figure 3 illustrates the concept of using the FABACETRIG to control the SSE sampling.Figure 3 •Timing Diagram showing FABACETRIG to Control SSE SamplingSmartFusion cSoC: ACE Sequencing Control Using Fabric and MSS4The fabric APB master is responsible for:•Detecting that the ACE has reached the end of a sequence through the ACEFLAGS signal (ACEFLAGS are connected to ACE_TRIGGER in fabric).•Assert the FABACETRIG signal to the ACE to halt the SSE time division multiplexing.•Clear the *_PPE_DONE notification flag by writing to the ACE PPE_FLAGS0_IRQ_CLR registers (refer to "Appendix B: Special ACE Register for Design Example" on page 12).•Notifying the rest of the fabric logic to begin a transaction. This is simulated in this design with the ENABLE_PWM signal that enable a CorePWM IP.•Re-enabling the ACE sequencer by writing to the program counter enables bit and writing the next program counter address (refer to "Appendix B: Special ACE Register for Design Example"on page 12). The program counter address is found in the<project>\firmware\drivers_config\mss_ace\ace_config.c file.The starting loop address for a given procedure is specified in the ace_procedure_dest_t table.For example, in the structure below, “2” is the starting loop address for this procedure.{g_ace_sse_proc_0_name, /* const uint8_t * p_sz_proc_name */ 2, /* uint16_t sse_loop_pc */ 0, /* uint16_t sse_load_offset */ sizeof(g_ace_sse_proc_0_sequence) / sizeof(uint16_t), /* uint16_tsse_ucode_length */g_ace_sse_proc_0_sequence, /* const uint16_t * sse_ucode */ 0 /* uint8_t sse_pc_id */ },The block diagram of the design example is shown in Figure4.Figure 4 •Top Level Block Diagram of ACE Sequencer Using Fabric LogicDesign Example 5The design example is available for downloading at/download/rsc/?f=A2F_AC366_DF .The following waveform (Figure 5) shows the ACE and fabric APB3 master interacting.Design Example 2: Simultaneous Sampling Using the MSSThe second design example shows the simultaneous sampling on multiple ADCs using the MSS.Figure 6 shows the ACE configuration used in this design. "Appendix C: Configuration for Simultaneous Sample Procedure" on page 13 shows the option to enable simultaneous sampling in the ACE configurator.Figure 5 • ACE and Fabric APB3 Master SimulationFigure 6 •ACE Configuration for Simultaneous Sampling Design ExampleSmartFusion cSoC: ACE Sequencing Control Using Fabric and MSS6The block diagram of the design example is shown in Figure 7. The design exampleLibero ® System-on-Chip (cSoC) software projects are available for downloading at/download/rsc/?f=A2F_AC366_DFSpecial Consideration During the Simultaneous SamplingThe ADC timeslots have the capability to access and control any of the ADCs. However, these timeslots do not have the capability to block or signal each other. Therefore, essentially they get two clock cycles each to execute the available microcode instruction, and then the SSE moves to the next timeslot. Due to this architectural advantage, you should take care of the following situation where the results might be wrong.Assume that both the timeslot 0 and timeslot 1 are sampling the ADC0 channels. This means that the timeslot 0 executes its sample instructions and asserts the ADCSTART for the ADC0 on channel X. The ADC0 begins that process. Now the timeslot 1 is activated (after two clocks) and it also has an instruction that uses ADC0. There is no mechanism in the SSE to explicitly query whether the ADC is busy or not.Therefore, when that timeslot sees the sample microcode, it asserts another ADCSTART for the ADC0on channel Y . Consequently, now you have the timeslot 0 waiting for a data valid from the ADC0 for channel X, and the timeslot 1 is waiting for a data valid from ADC0 for channel Y . When the ADC0 finally finishes and returns the data valid, both timeslots move onto their next respective microcode instructions.However, only one of them have the sample proper data. Only one piece of data is sent to the PPE, since it is the ADC data valid that is used to write into the ADCFIFO and only one ADC data valid signal allocated per ADC.Figure 7 •Top Level Block Diagram of Simultaneous Sampling Design ExampleConclusionA technique is shown to solve this simultaneous sampling in "Design Example 2: Simultaneous SamplingUsing the MSS" on page 5. Please refer to the technique below that solves the problem of simultaneoussampling on the same ADC.Note:The two ADCs’ procedure uses the simultaneous sample.1.After power-on reset,–The MSS initializes the various peripherals.–The MSS loads the simultaneous sampling procedures into SSE to sample two channels per ADC (total four samples expected).–In the FPGA, FABACETRIG is set to 1.–The MSS sends an enable signal through a GPIO to FPGA (to convey that it can start the sampling sequence).2.On seeing the GPIO set, FPGA starts 10 KHz counter.3.On rising of 10 KHz, it brings FABACETRIG low after 1 s.4.The ACE starts simultaneous sampling and interrupts M3 when samples are available. Theprocedure disables the timeslot (PCx_EN = 0).5.The M3 gets the data from the ACE into variables and loads both the sequential samplingprocedures (seq_adc00 and seq_adc01). Sequential sampling starts.6.On completion, the M3 gets two interrupts for both the ADCs. The procedure disables both thetimeslots (PCx_EN = 0). On serving both the interrupts (reading sample values), M3 does a writeto fabric to signal end of sequence.7.On detecting the write from M3, FPGA brings FABACETRIG high.8.The M3 loads simultaneous sampling procedure (two ADCs).9.Sequence repeats from step 3.ConclusionThis application note provides the design examples of using the fabric logic or MSS to control the SSEsampling. This can be used to allow the deterministic synchronization.7SmartFusion cSoC: ACE Sequencing Control Using Fabric and MSS8Appendix A: ACE Configuration and ConnectivityStep1. MSS ACE Configuration for Design Example 11.Inside the ACE Configurator, click the Advanced Options dialog box. Select the ExposeFABACETRIG port checkbox. This exposes the FABACETRIG port on the ACE block enabling the fabric logic to halt the ACE sequencing.2.Create the ACE design as normal. Configure the ACE services and threshold flags.Figure 8 •Expose FABACETRIG Port CheckboxAppendix A: ACE Configuration and Connectivity 93.Sequence your analog services in the ACE configurator Controller tab.You can initiate a signal to the fabric when the end of this sequence is reached. You can accomplish this by reconfiguring the ADCDirectInput_2 service to assert a signal on completing its post processing. Use this particular service, as it is the last one in this sequence.4.Configure the ADCDirectInput_2 service and select the Assert flag when post processingcompleted checkbox.Figure 9 • ACE Configurator ControllerFigure 10 •Configure the ADCDirectInput_2 ServiceSmartFusion cSoC: ACE Sequencing Control Using Fabric and MSS10Selecting this checkbox creates a flag signal named <Signal name>:PPE_DONE automatically.5.Go into the Flags tab and assign it to the bit position of your choice. In the example, you haveassigned the new PPE_DONE indication to bit 15.Figure 11 •Assigning ADCDirectInput_2_PPE_DONE to Bit 15Appendix A: ACE Configuration and Connectivity 116.Click FPGA_FLAGS in the left-hand treeview and select the Expose these signals asACEFLAGs checkbox.7.Click OK , the ACE instance in the MSS configurator window is displayed, as shown in Figure 13.Figure 12 • Exposing ACEFLAGsFigure 13 •ACE Instance in the MSS ConfiguratorSmartFusion cSoC: ACE Sequencing Control Using Fabric and MSS12Appendix B: Special ACE Register for Design ExampleNote:Table 1 shows the register description for the Program Counter 0. The registers are duplicated forProgram Counter 1 and Program Counter 2.Table 1 • Special ACE Register for Design Example ADDRRegister Name Description 0x4002122c PPE_FLAGS0_IRQ_CLR These write-only bits are used to clear corresponding bits in thePPE_FLAGS0_IRQ register. Writing a 1 to any of the bits clears thecorresponding bits in the PPE_FLAGS0_IRQ register, while writing a 0to any of the bits does not have an effect. In the event that writing a 1to these clear bits coincides with a set event in the PPE_FLAGS0_IRQregister, the set event shall have higher priority.0x40020040PC0_LO Program Counter 0 points to address the next sample sequenceinstruction for ADC0. A write to this register causes the timeslot 0 tounconditionally jump to the SSE RAM address PC[7:0], which includesRAM addresses from 0 to 255 inclusive.0x40020044PC0_HI Program Counter 0 points to address the next sample sequenceinstruction for ADC0. A write to this register causes timeslot 0 tounconditionally jump to the SSE RAM address 256+PC[7:0], whichincludes RAM addresses from 256 to 511 inclusive.0x40020048PC0_CTRLOnly bit 0 is used. When set to 1, Program Counter 0 is enabled andwhen set to 0, Program Counter 0 is disabled (stop).Appendix C: Configuration for Simultaneous Sample Procedure 13Appendix C: Configuration for Simultaneous Sample Procedure1.In the Configurator ACE window, click the Controller tab.2.From the Insert Operating Sequence Slot drop-down list, select SIMULTANEOUS SAMPLE.The Configure ’SIMULTANEOUS SAMPLE’ window is displayed.3.Select the services you want to sample simultaneously and click OK .Figure 14 • Adding Simultaneous Sample ProcedureFigure 15 •Selecting Services for Simultaneous SampleSmartFusion cSoC: ACE Sequencing Control Using Fabric and MSS14Appendix D: ACE Configuration and Procedure for Design Example 2The ACE controller procedures are:ADC0_MAIN :•Stop the sequence in this time slot ADC1_MAIN :•Stop the sequence in this time slot ADC2_MAIN :•Stop the sequence in this time slot seq_adc00:•Sample VoltageMonitor_2•Sample VoltageMonitor_3•Assert Interrupt on GP1•Stop the sequence in this time slot seq_adc10:•Sample VoltageMonitor_6•Sample VoltageMonitor_7•Assert Interrupt on GP0•Stop the sequence in this time slot two ADCs:•Simultaneously Sample VoltageMonitor_0 VoltageMonitor_4•Assert Interrupt on GP0•Simultaneously Sample VoltageMonitor_1 VoltageMonitor_5•Stop the sequence in this time slot Appendix E: Design FilesYou can download the design files from the Microsemi SoC Products Group website:/download/rsc/?f=A2F_AC366_DF .List of Changes 15List of ChangesThe following table lists critical changes that were made in each revision of the document.Revision*Changes Page Revision 1(January 2012)Updated Figure 4 (SAR 35795).4Modified the section "Design Example" (SAR 35795).3Updated Figure 7 (SAR 35795).6Modified the section "Appendix E: Design Files" (SAR 35795).14Revision 2(May 2019)Modified the sections:Design Example 1: ACE Sequencer Using Fabric LogicDesign Example 2: Simultaneous Sampling Using the MSS (SAR 51242).5 and 6Note:*The revision number is located in the part number after the hyphen. The part number is displayed at the bottomof the last page of the document. The digits following the slash indicate the month and year of publication.Microsemi HeadquartersOne Enterprise, Aliso Viejo,CA 92656 USAWithin the USA: +1 (800) 713-4113 Outside the USA: +1 (949) 380-6100 Sales: +1 (949) 380-6136Fax: +1 (949) 215-4996Email: *************************** ©2019 Microsemi, a wholly owned subsidiary of Microchip Technology Inc. All rights reserved. Microsemi and the Microsemi logo are registered trademarks of Microsemi Corporation. All other trademarks and service marks are the property of their respective owners. Microsemi makes no warranty, representation, or guarantee regarding the information contained herein or the suitability of its products and services for any particular purpose, nor does Microsemi assume any liability whatsoever arising out of the application or use of any product or circuit. The products sold hereunder and any other products sold by Microsemi have been subject to limited testing and should not be used in conjunction with mission-critical equipment or applications. Any performance specifications are believed to be reliable but are not verified, and Buyer must conduct and complete all performance and other testing of the products, alone and together with, or installed in, any end-products. Buyer shall not rely on any data and performance specifications or parameters provided by Microsemi. It is the Buyer’s responsibility to independently determine suitability of any products and to test and verify the same. The information provided by Microsemi hereunder is provided “as is, where is” and with all faults, and the entire risk associated with such information is entirely with the Buyer. Microsemi does not grant, explicitly or implicitly, to any party any patent rights, licenses, or any other IP rights, whether with regard to such information itself or anything described by such information. Information provided in this document is proprietary to Microsemi, and Microsemi reserves the right to make any changes to the information in this document or to any products and services at any time without notice.About MicrosemiMicrosemi, a wholly owned subsidiary of Microchip T echnology Inc. (Nasdaq: MCHP), offers a comprehensive portfolio of semiconductor and system solutions for aerospace & defense, communications, data center and industrial markets. Products include high-performance and radiation-hardened analog mixed-signal integrated circuits, FPGAs, SoCs and ASICs; power management products; timing and synchronization devices and precise time solutions, setting the world's standard for time; voice processing devices; RF solutions; discrete components; enterprise storage and communication solutions, security technologies and scalable anti-tamper products; Ethernet solutions; Power-over-Ethernet ICs andmidspans; as well as custom design capabilities and services. Learn more at .51900234-2/05.19。
千兆光猫用户手册说明书
The CODA-5519is a powerful router that will be used as the heart of your wireless home.It will offer strong Wi-Fi that will covers most houses.The CODA-5519has the capability to receive 5Gbps bi-directional based on 2OFDM +32QAM downstream channels and with 2OFDMA +8upstream channels over its DOCSIS 3.1interface.The integrated Wi-Fi 4x42.4GHz 802.11ax and 4x45GHz 802.11ax dual band MU-MIMO Access Point significantly improves customer experience extending range and coverage with blazing speeds.For wired clients,2.5G plus two Gigabit Ethernet ports offer ultra-fast connection.It can be paired with Hitron extenders/mesh pods for extra coverage.•DOCSIS 3.1 2x2 multi-carrier OFDM •DOCSIS 3.0 32x8 channel bonding•4x4 2.4GHz 802.11ax and 4x4 5GHz 802.11ax dual band concurrent MU-MIMO internal antennas •16 SSIDs (8SSIDs per radio)•Individual configuration for each SSID (security, bridging, routing, firewall and Wi-Fi parameters)•Extensive operator control via configuration file and SNMP•Integrated DLNA Media Server with support for video, audio and image servingDOCSIS 3.1 Wi-Fi 6 and eMTA GatewayIntel® Puma™ 7 OFDM 2x2 w / fixed upstream, 4x4 dual band Wi-Fi w/ concurrent 802.11ax 2.4Ghz + 5GHz, MoCA 2.0 channel bonding and voice HIGH PERFORMANCE INTERNET AND WIRELESS ACCESSThe CODA-5519supports pre-configured and pre-enabled Wi-Fi security via Wi-Fi Protected Setup (WPS),allowing the end-user to rapidly set up a secure wireless network without manual configuration.Hitron's AutoSync software provides secure automated setup of extenders in the customer's home or business.It comes with MyHitron (end user management mobile application).MSO can also get extra management and analytics via HitronCloud/OptiMy CSR interface from the support center.SECURE WIRELESS NETWORKING CONTROLLED AT THE TIP OF YOUR FINGERSKEY FEATURES•IPv6 routing•MoCA 2.0 channel bonding•TR-069 and HNAP for easy setup and remote management•Enhanced management and stability for low total cost of ownership•One 2.5G and Two 1G Ethernet ports •Hitron Ecosystem Support (OptiMy, HitronCloud, MyHitron)•2 HD voice ports with SIP or MGCP supportTVStreamer Smartphone TabletThermostatHome Security LaptopCODA-5519Printer PCMoCA ExtenderPhonesWi-Fi1G Ethernet Analog2.5G Ethernet Coax PodLaptop Gaming ConsoleConnectivity•RF F-Type 75Ωfemale connector•2x RJ-45 Ethernet port 10/100/1000Mbps•1x RJ-45 Ethernet port 10/100/1000/2500Mbps•USB 3.0 type A connector with host interface•2x RJ-11 HD voice ports•EBBU jackManagement•Protocol support: TR-069, TFTP, SSHv2, SNMP v2C, v3•Web-based GUI control, configuration and management •Power-on self diagnostic•Hitron proprietary MIBs for extended support onDOCSIS, router management, Wi-Fi managementand MoCA management•app support•and back end supportReception-Demodulation•DOCSIS 3.1/3.0/2.0•DOCSIS 3.1 demodulation: Multi-carrier OFDM 16 to 4096QAM •DOCSIS 3.1 data rate: Up to 5Gps with 2 OFDM 192MHz downstream channels +32 QAM•DOCSIS 3.0 demodulation: 64QAM, 256QAM•DOCSIS 3.0 data rate: Up to 1.2Gbps with 32 bonded downstream channels•Frequency (edge-to-edge): 108-1218MHz and 258-1218 •Channel Bandwidth: 6MHz•Signal level: -15dBmV to 15dBmVTransmitter-Modulation•DOCSIS 3.1/3.0/2.0•DOCSIS 3.1 modulation: Multi-carrier OFDMA BPSK to 4096QAM •DOCSIS 3.1 data rate: Up to 700Mbps with OFDMA 96MHz upstream channels•DOCSIS 3.0 modulation: QPSK, 8QAM, 16QAM, 32QAM, 64QAM, and 128QAM (SCDMA only)•DOCSIS 3.0 data rate: Up to 320Mbps with 8 bonded upstream channels•Frequency: Fixed 5-85MHz•Upstream transmit signal level: +11 to 65dBmVMoCA 2.0 Reception / Transmitter-Modulation •Demodulation/ Modulation: BPSK, QPSK, 8QAM, 16QAM,32QAM, 64QAM, 128QAM, 256QAM, 512QAM, 1024QAM •PHY data rate: 700Mbps (baseline Mode) / 1400Mbps (bonding channel)•Throughput: 400+Mbps (baseline mode) / 500+Mbps (turbo mode, point to point) / 800Mbps (bonding channel)•Frequency (center frequencies): 1400-1625MHz•Channel bandwidth: 100MHz (baseline mode) / 225MHz (bonding channel)Voice•Protocol support: SIP or MGCP•2x 8kHz each HD voice•Audio codecs: G.711 (a-law and mu-law), G.722 (HD codec), G.723.1, G.726, G.728, and G.729Routing Support•Protocol support: IGMP v3 for IPTV service capability•MAC address filtering (IPv4/IPv6)•IP source/destination address filtering (IPv4/IPv6)•DHCP, TFTP and ToD clients (IPv4/IPv6)•DHCP server supports RFC 1541 (IPv4)•DHCPv6 obtains prefix from DHCPv6 server through prefix delegation•Firewall with stateful inspection (IPv4/IPv6)•Hacker intrusion prevention and detection•Application content filtering (IPv4/IPv6)•Complete NAT software implemented as per RFC 1631 with port and address mapping (IPv4)•DSLite support for IPv4 in-home support with IPv6 MSO backbone •6RD support for quick IPv6 deployment over IPv4 backbone •RIPv2 for static IP supportWireless•802.11a/b/g/n/ac/ax•4T4R 2.4GHz 11ax and 4T4R 5GHz 11ax dual band concurrent MU-MIMO with 1Gbps+4.8Gbps PHY rate•20/40/80/160MHz channel bandwidth•Up to 8 SSIDs for each frequency•Security: WPA-PSK/WPA2-PSK (TKIP/AES), WPA3, WAPI •QoS: WMM/WMM-PS•WPS (Wi-Fi Protected Setup) PBC, PIN•Airtime Fairness (ATF), Band Steering (BS)•Dynamic Frequency Selection (DFS)•Wi-Fi output power range: Max permitted by FCC/IC Electrical•Input power: 12VDC, 4A•Power adaptor: 100-240VAC, 50/60Hz•Power consumption: 4.92 (power saving), 22W (typ.), 38W (Max)•Support power outage for 24 hours on Hitron external battery •Surge protection: RF input sustains at least 4KVEthernet RJ-45 sustains at least 4KV Mechanical•Factory default reset button•WPS button•Dimensions: 74.3mm (W) x 251.5mm (H) x 230.8mm (D)•Weight: Weight: 1850 ±10gEnvironmental•Operating temperature: 0°C (32°F) ~ 40°C (104°F)•Operating humidity: 10% ~ 90% (Non-condensing)•Storage temperature: -40°C (-40°F) ~ 60°C (140°F) Compliance Certificates•RoHS compliant•FCC, IC, ULSPECIFICATIONS。
离港系统操作教材
中国民航离港系统操作教材Departure Control SystemOperations Manual目录一. 离港系统简介...............................................................................1.1系统介绍(软件) ...........................................................................1.2.终端与主机的连接(硬件)..................................................................1.3.系统使用基础知识..........................................................................二. 基本系统指令...............................................................................2.1.进入系统...................................................................................2.2.工作区操作DA/SI/AI/SO/AO/AN...............................................................2.3.工作号定义.................................................................................2.4.页控制PG/PF/PN/PB/PL......................................................................2.5.打印指令PT/PC.............................................................................2.6.查询指令CD/CNTD/CO/TIME/ACRT/HELP......................................................... 三.工作流程....................................................................................四. 建立航班....................................................................................4.1.基础指令EX/CND/SEI/SEM/CG.................................................................4.2.建T-CARD BF:T.............................................................................4.3.查看过渡区航班SFL.........................................................................4.4.生效过渡区中的航班BP:R/ACT................................................................4.5.查看生效航班AFL...........................................................................4.6.删除航班T-CARD BF:T........................................................................4.7.航班建立流程...............................................................................4.8.查看及修改航班信息.........................................................................4.8.1查看航班信息FI ........................................................................4.8.2修改航班信息FU(单项修改) ..........................................................4.8.3修改航班信息FDC (多项修改) ..........................................................4.8.4显示及修改编目航班信息CSD/CSM .........................................................五. 准备航班...................................................................................5.1.初始化航班IF..............................................................................5.2查看名单报MB/MD............................................................................5.3设置缺省航班FT.............................................................................5.4航班状态显示SY.............................................................................5.5删除航班初始化DFL..........................................................................5.6航班座位控制...............................................................................航班座位图显示SE ............................................................................5.6.2 .锁定座位BS ...........................................................................改变座位性质SU.............................................................................保留座位RS.................................................................................锁过站座位BT................................................................................分配座位AL.................................................................................释放保留座位RA.............................................................................六. 控制航班:.................................................................................6.1.建立航班控制终端EF ........................................................................6.2.建立航班控制员AK ..........................................................................6.3.航班配餐及备注信息RK ......................................................................6.4.值机航班显示CFL ...........................................................................6.5.设立/取消航班保护PO/POC...................................................................6.6.限额控制...................................................................................修改GO-SHOW额GS ............................................................................登机人数限制 HL.............................................................................候补状态旅客限制SL.........................................................................设定/调整持折扣票旅客限额ID................................................................6.7.航班控制流程...............................................................................七. 办理值机手续...............................................................................7.1提取旅客记录 ...............................................................................显示旅客名单PD ..............................................................................提取旅客详细纪录PR ..........................................................................提取旅客记录的几种简化格式RL/RN/FB/FSN......................................................7.2.接收旅客PA................................................................................7.3.修改旅客记录PU............................................................................7.4.删除旅客记录或记录中数据项PW .............................................................7.5.候补状态旅客处理...........................................................................7.5.1.产生SBY原因代码......................................................................7.5.2 接收SBY旅客,已经接收过SB/JC/AC......................................................7.6.值机操作程序...............................................................................八. 关闭航班及发报:...........................................................................8.1.关闭航班...................................................................................8.1.1航班初始关闭 (值机柜台关闭) CI..........................................................航班中间关闭CCL .............................................................................航班最后关闭CC ..............................................................................8.2打开已关闭航班.............................................................................打开最后关闭航班CC:-.......................................................................打开中间关闭航班CCL:-......................................................................打开值机关闭航班CI:-.......................................................................8.3发报.......................................................................................自动发报.....................................................................................手工发报LR ..................................................................................旅客登机名单的产生JL ........................................................................系统内部发报MSG/TLX......................................................................... 九.处理过站航班................................................................................9.2.前站未用DCS ...............................................................................十. 特殊情况处理及辅助指令.....................................................................10.1.手工建航班................................................................................建立航班信息MBM.............................................................................显示及修改航班信息MBD/MBL..................................................................手工输入名单报MBP.........................................................................手工拍发增减报MBA ...........................................................................10.2.自动换飞机................................................................................初始化前换飞机...............................................................................航班已经初始化,还未办理旅客,PA之前..........................................................10.2.3已经办理旅客AEC/REA ..................................................................10.3.航班转换BR/BRC/BRN .......................................................................10.4.辅助指令JFL/ACL/JB/FSD/DIL/AIL/CSTD/CSBD/CSFD............................................. 十一. PDQ 操作及OFFC QUE 处理:...............................................................11.1.PDQ操作..................................................................................的处理.........................................................................................显示各种QUEUE的数量QT ......................................................................处理QUEUE QS/QD/QB/QN/QH ................................................................... 十二.控制及值机小结............................................................................12.1.系统简介..................................................................................12.2.建T-CARD .................................................................................12.3.准备航班..................................................................................12.4.监控航班,办值机之前做好..................................................................12.5.办理值机手续..............................................................................12.6.关闭航班CI—>CCL—>CC ...................................................................十二. 航班配载平衡:............................................................................12.1.建立配载航班LCFD ........................................................................12.2.航班油量控制LFFD .........................................................................12.3.航班配货、加旅客LPAD.....................................................................配货LPAD……CGO1............................................................................本站旅客数LPAD……PAX.......................................................................过站旅客数LPAD……PAX1......................................................................12.4.查看航班状态、关闭航班LFSD...............................................................12.5.打印舱单LLSP.............................................................................12.6.手工发报LLDM/LLPM/LCPM/LMSD .............................................................12.7.辅助指令..................................................................................修改航班操作数LODD ..........................................................................显示配载航班预配重心LPDD....................................................................显示航空公司飞机注册号及布局LLAF............................................................显示配载有效航班LFLD ........................................................................显示配载报文地址定义LAID ....................................................................显示飞机基本数据LADD........................................................................12.8.配载操作程序..............................................................................12.9.过站航班处理..............................................................................上一站用DCS .................................................................................上一站无DCS ................................................................................. 十三、离港系统办理航班的全过程..................................................................一、 离港系统简介1、系统介绍(软件)订座系统计算机离港控制系统(Departure Control System),简称DCS ,是中国民航引进美国UNISYS 公司的航空公司旅客服务大型系统,分为旅客值机控制(CKI )、配载平衡(LDP )两大部分。
Sodium Azide说明书
Section 1- Product InformationProduct Name Sodium AzideSection 2-Composition / information on ingredientsSubstance/Preparation: SubstanceIngredient Name Sodium AzideCAS No. 26628-22-8EC Number RC0520EU Symbol T+,NR-Phrases R28,R32Note: See section 8 for occupational exposure limits and section 11 for LC50/LD50 informationSection 3- Hazards IdentificationPrimary hazards and critical effects Danger!May be fatal if absorbed through skin or if swallowed.May cause damage to the following organs: liver, brain, digestive system, centralnervous system, head.May be harmful to environment if released in large amounts.Do not get in eyes, on skin or on clothing. Do not ingest. Wash thoroughly afterhandling.Avoid contact of spilled material and runoff with soil and surface waterways. Physical/chemical hazards Not applicable.Human health hazards Very toxic if swallowed.Contact with acids liberates very toxic gas.Environmental hazards Very toxic to aquatic organisms. May cause long-term adverse effects in the aquaticenvironment.Section 4- First Aid MeasuresInhalation Ingestion If swallowed, do not induce vomiting unless directed to do so by medical personnel. Never give anything by mouth to an unconscious person. Get medical attention immediately.Skin Contact In case of contact, immediately flush skin with plenty of water.Remove contaminated clothing and shoes. Wash clothing before reuse. Thoroughlyclean shoes before reuse. Get medical attention.Eye Contact In case of contact, immediately flush eyes with plenty of water for at least 15minutes. Get medical attention.Notes to Medical Doctor Not available.Section 5- Fire Fighting MeasuresExtinguishing Media Use foam or all purpose dry chemicals to extinguish. This material is very toxic toaquatic organisms.Fire water contaminated with this material must be contained and prevented frombeing discharged to any waterway, sewer or drain.Fire-Fighting Procedures Fire fighters should wear positive pressure self-contained breathing apparatus(SCBA) and full turnout gear.Fire/Explosion Hazards Not applicableHazardous Decomposition Products These products are nitrogen oxides (NO, NO2...). Some metallic oxides.Section 6- Accidental Release MeasuresPersonal precautions Immediately contact emergency personnel. Keep unnecessary personnel away. Usesuitable protective equipment (Section 8).Follow all fire fighting procedures (Section 5).Environmental Precautions and Clean-up Methods If emergency personnel are unavailable vacuum or carefully scoop up spilled materials and place in an appropriate container for disposal.Avoid creating dusty conditions and prevent wind dispersal. Minimize contact of spilled material with soils to prevent runoff to surface waterways.Material Safety Data SheetDate Created 06/10/2010Date Updated 12/18/2012Email ******************Section 7- Handling and StorageHandlingDo not get in eyes, on skin or on clothing. Do not ingest. Wash thoroughly after handling. Avoid contact of spilled material and runoff with soil and surface waterways. StorageKeep container tightly closed. Keep container in a cool, well-ventilated area. Packaging materials Use original container.Section 8- Exposure Controls/Personal Protection EquipmentOccupational Exposure Limits Not available Engineering controlsOpen handling is not permitted. All handling must be performed in a glove box or other totally enclosed system. Personal protective equipmentRespiratory SystemUse an approved, properly fitted, HEPA filter cartridge respirator, or a respirator of greater protection if there is the potential to exceed the exposure limit(s). Skin and bodyDisposable outer garments, or impervious garments of equal or greater protection. Hands Use chemical resistant, impervious gloves.Additional body garments should be used based upon the task being performed(e.g., sleevelets, apron, gauntlets, disposable suits) to avoid exposed skin surfaces.Appropriate techniques should be used to remove potentially contaminated clothing.EyesSafety glasses. Goggles, face shield, or other full-face protection if potential existsfor direct exposure to dust.Protective Clothing (Pictograms)Section 9- Physical and Chemical PropertiesFlash point Not availableSection 10- Stability and ReactivityStability The product is stable. Conditions and Materials to avoidReactive with metals, acids. Hazardous Decomposition Products Not availableSection 11- Toxicological InformationToxicity DataTest LD50 LD50 LD50 LD50 LDLo LDLo LDLo Result 27 mg/kg 27 mg/kg 23.7 mg/kg 20 mg/kg 129 mg/kg 143 mg/kg 29 mg/kg Route Oral Oral Oral Dermal Oral Oral Oral SpeciesRatMouseBirdsRabbitsHumanHumanHumanRoutes of Entry Absorbed through skin. Dermal contact. Eye contact. Inhalation.Ingestion.Acute toxicity Ingestion Very toxic if swallowed.Skin Contact Very toxic in contact with skin.Chronic toxicityAdverse Effects Adverse symptoms may include: nausea/vomiting headache blood pressure lowered nerve damagecentral nervous system depression liver abnormalities cerebral (brain) pathology.Target Organs May cause damage to the following organs: liver, brain, digestive system, central nervous system(CNS), head.Carcinogenic Effects Not availableMutagenic Effects Not availableDevelopmental and Teratogenic EffectsNot availableReproductive Effects Not availableOther Information Repeated exposure to a highly toxic material may produce general deterioration of health by anaccumulation in one or many human organs.Section 12- Ecological InformationEcotoxicity Data Species Not availableavailablePeriod NotavailableResult NotSection 13- Disposal ConsiderationsWaste Handling and Disposal Waste must be disposed of in accordance with federal, state and localenvironmental control regulations.Section 14- Transport InformationAirProper shipping name Not applicableUN/ID Number Not applicableIATA-DGR Class Not controlled under IATA.Packing Group Not applicableSection 15- Regulatory InformationEU RegulationsHazard Symbol(s) C; N; TRisk Phrases R28- Very toxic if swallowed. R32- Contact with acids liberates very toxic gas.R36/37/38- Irritating to eyes, respiratory system and skin. R50/53- Very toxic toaquatic organisms, may cause long-term adverse effects in the aquatic environment. Safety Phrases S26- In case of contact with eyes, rinse immediately with plenty of water and seekmedical advice. S28.1- After contact with skin, wash immediately with plenty ofwater. S36- Wear suitable protective clothing. S45- In case of accident or if you feelunwell, seek medical advice immediately (show the label where possible). S60- Thismaterial and its container must be disposed of as hazardous waste. S61- Avoidrelease to the environment.Refer to special instructions/Safety data sheets.U.S. Federal RegulationsHaz-Com Standard CLASS: Highly toxic.CLASS: Target organ effects.EPA TSCA 8(b) inventory: Sodium AzideTSCA 8(d) H and S data reporting: Sodium AzideSARA 313 toxic chemical notification and release reporting:Sodium Azide 50%available.State NotCanadian RegulationsWHMIS CLASS D-1A: Material causing immediate and serious toxic effects (VERY TOXIC). CEPA No products were found.Provincial No products were found.Section 16- Other InformationGenScript corporation MSDS is believed to be correct but only used as a guide for experienced personnel, GenScript shall not be held liable for any damage resulting from the handling or from contact with the above product.。
系统传感器 I56-01-00 advantagedDetector 插座式烟雾传感器基底说明书
B116LPA Plug-in Detector BaseFor use with the following smoke detectors:1151A ionization2151A photoelectronicINSTALLATION AND MAINTENANCE INSTRUCTIONSBefore InstallingPlease thoroughly read the System Sensor manual I56-407, Guide for Proper Use of System Smoke Detectors , which provides detailed information on detector spacing, placement, zoning, wiring, and special applications. Cop-ies of this manual are available at no charge from System Sensor. Please also refer to CAN4-S524, Standard for the Installation of Fire Alarm Systems and CEC Part 1, Sec. 32.NOTICE: This manual should be left with the owner/user of this equipment.IMPORTANT: The detector used with this base must be tested and maintained regularly following ULC-S536 re-quirements. The detector used with this base should be cleaned at least once a year.Specifications Base Diameter: 6.2 inches (157 mm)Base Height: 0.95 inches (24 mm)Weight: 0.3 lb. (130 g)Mounting: 4-inch square box with or without plaster ring. Min. Depth–1.5 inches 4-inch octagon box. Min. Depth–1.5 inches 3-1/2 inch-octagon box. Min. Depth–1.5 inches 50 mm box 60 mm box 70 mm box Operating Temperature Range: 0° to +49°C (32° to 120°F) Operating Humidity Range: 10% to 93% Relative Humidity Electrical Ratings – includes base and detector System Voltage: 24 VDC Maximum Ripple Voltage: 4 Volts peak to peak Start-up Capacitance: 0.02µF Maximum Standby Ratings: 15 VDC Minimum 35 VDC Maximum 120 µA Maximum Alarm Ratings: 8 V Minimum at 16 mA 12 V Maximum at 100 mA (Alarm current MUST be limited to 100 mA maximum by the control panel.)Relay Contact Ratings: Resistive or Inductive (60% power factor) Load Form C: 2.0A @ 30 VAC/DC Reset Voltage: 1.4 VDC Minimum Reset Time: 0.3 Seconds Maximum Start-up Time: 34.0 Seconds Maximum General DescriptionThe model B116LPA plug-in detector base is used with System Sensor model 1151A ionization detector heads and model 2151A photoelectronic detector heads. The capability of plugging these detectors into a variety of special bases makes them more versatile than equivalent direct-wired models. Refer to the System Sensor catalog for other available plug-in detector bases.The B116LPA base is intended for use in 2-wire systems, with screw terminals provided for power and relay contact connections. These bases MUST be current limited by the system control panel in the alarm state.MountingThis detector base mounts directly to 3-1/2-inch and 4-6581 Kitimat Rd., Unit #6, Mississauga, Ontario, L5N 3T51-800-SENSOR2, FAX: 905-812-0771www.systemsensor.cainch octagon boxes, and 4-inch square boxes (with or without plaster rings). To mount, remove decorative ring by turning it in either direction to unhook the snaps, then separate the ring from the base. Install the base to the box using the screws supplied with the junction box and the ap-propriate mounting slots in the base. Place decorative ring onto base, then turn in either direction until the ring snaps in place (see Figure 1).Installation GuidelinesAll wiring must be installed in compliance with the Ca-nadian Electrical Code and the local codes having jurisdiction. Proper wire gauges should be used. The con-ductors used to connect smoke detectors to control panels and accessory devices should be color-coded to prevent wiring mistakes. Improper connections can prevent a sys-tem from responding properly in the event of a fire.For signal wiring (the wiring between inter-connected detectors), it is recommended that the wire be no smaller than 18 gauge. Wire sizes up to 12 gauge may be used with the base. For best system performance, the power (+) and (–) loop wires should be twisted pair and installed in separate grounded conduit to protect the loop from extra-neous electrical interference.Smoke detectors and alarm system control panels have specifications for allowable loop resistance. Consult the control panel manufacturer’s specifications for the total loop resistance allowed for the particular model control panel being used before wiring the detector loops. Locate installations where normal ambient temperaturesdo not exceed 100°F.Wiring InstructionsFor system supervision — For terminals 2, 3, and 5 do not use looped wire under terminals. Break wire run to provide system supervision of connections.Wire connections are made by simply stripping insulation from the end of the wire, sliding the bare end of the wire under the clamping plate, and tightening the clamping plate screw. Use the strip gauges molded into the inside and underside of the base for ease of wiring to terminals 1 through 5, and to terminals 12 through 14, respectively. The zone wiring of the detector base should be checked before the detector heads are installed in them. To make this possible, this base contains a special spring-type shorting jumper. After a detector base is properly wired and mounted on an electrical box, make sure that the jumper spring is in contact with the base of Terminal 3. This temporary connection shorts the positive-in and positive-out leads and permits the wiring of the loop to be checked for continuity.Once all the detector bases have been wired and mount-ed, and the loop wiring has been checked, the detector heads may be installed in the bases. The shorting spring in the base will disengage automatically when the detec-tor head is removed from the base. DO NOT remove the shorting spring since it reengages as the detector head is fully turned into the base, completing the circuit. Tamper-resistance Featuremoval Tool will be used.This detector base includes a tamper-resistance feature that prevents removal of the detector without the use of aSPRINGFigure 1. Mounting base to box:A78-1175-01tool.To activate this feature, break off the tab on the detec-tor base shown in Figure 3A, then install the detector. To remove the detector from the base once the tamper-resis-tance feature has been activated, place a small-bladed screwdriver into the small hole on the side of the base and push plastic lever away from the detector head (see Figure 3B). This will allow the detector to be rotated coun-terclockwise for removal.NOTE: Head removal after the tamper-resistance featurehas been activated requires removal of the deco-rative ring.Figure 2. Typical wiring diagram:A78-1577-00The tamper-resistance feature can be defeated by break-ing and removing the plastic lever from the base, however this prevents using the feature again.BREAK TAB AT DOTTED LINE BY USE SMALL-BLADED A78-1175-03Figure 3B. Removing detector head from base:Figure 3A. Activating tamper-resistance feature:Three-Year Limited WarrantySystem Sensor warrants its enclosed smoke detector base to be free from defects in materials and workmanship under normal use and service for a period of three years from date of manufacture. System Sen-sor makes no other express warranty for this smoke detectorbase. No agent, representative, dealer, or employee of the Company has the authority to increase or alter the obligations or limitations of this War-ranty. The Company’s obligation of this Warranty shall be limited to the repair or replacement of any part of the smoke detector base which is found to be defective in materials or workmanship under normal use and service during the three year period com-mencing with the date of manufacture. After phoning System Sensor’s toll free number 800-SENSOR2 (736-7672) for a Return Authorization num-ber, send defective units postage prepaid to: System Sensor, Repair De-partment, RA #__________, 6581 Kitimat Rd., Unit #6, Mississauga, ON, L5N 3T5. Please include a note describing the malfunction and suspected cause of failure. The Company shall not be obligated to repair or replace units which are found to be defective because of damage, unreasonable use, modifications, or alterations occurring after the date of manufacture. In no case shall the Company be liable for any consequential or incidental damages for breach of this or any other Warranty, expressed or implied whatsoever, even if the loss or damage is caused by the Company’s neg-ligence or fault. Some legislations do not allow the exclusion or limitation of incidental or consequential damages, so the above limitation or exclu-sion may not apply to you. This Warranty gives you specific legal rights, and you may also have other rights which vary under common law.The smoke detector used with this base is designed to activate and ini-tiate emergency action, but will do so only when it is used in conjunction with an authorized fire alarm system. This detector must be installed in accordance with CAN/ULC-S524.Smoke detectors will not work without power. AC or DC powered smoke detectors will not work if the power supply is cut off.Smoke detectors will not sense fires which start where smoke does not reach the detectors. Smoldering fires typically do not generate a lot of heat which is needed to drive the smoke up to the ceiling where the smoke detector is usually located. For this reason, there may be large delays in detecting a smoldering fire with either an ionization type detec-tor or a photoelectric type detector. Either one of them may alarm only after flaming has initiated which will generate the heat needed to drive the smoke to the ceiling.Smoke from fires in chimneys, in walls, on roofs or on the other side of a closed door(s) may not reach the smoke detector and alarm it. A detector cannot detect a fire developing on another level of a building quickly or at all. For these reasons, detectors shall be located on every level and in every bedroom within a building.Smoke detectors have sensing limitations, too.Ionization detectors and photoelectric detectors are required to pass fire tests of the flaming and smoldering type. This is to ensure that both can detect a wide range of types of fires. Ionization detectors offer a broad range of fire sensing capability but they are somewhat better at detecting fast flaming fires than slow smoldering fires. Photoelectric detectors sense smoldering fires bet-ter than flaming fires which have little, if any, visible smoke. Because fires develop in different ways and are often unpredictable in their growth, nei-ther type of detector is always best, and a given detector may not always provide early warning of a specific type of fire.In general, detectors cannot be expected to provide warnings for fires resulting from inadequate fire protection practices, violent explosions, escaping gases which ignite, improper storage of flammable liquids like cleaning solvents which ignite, other similar safety hazards, arson, smok-ing in bed, children playing with matches or lighters, etc. Smoke detectors used in high air velocity conditions may have a delay in alarm due to dilution of smoke densities created by frequent and rapid air exchanges. Additionally, high air velocity environments may create increased dust contamination, demanding more frequent maintenance.To keep your equipment in excellent working order, ongoing mainte-nance is required per the manufacturer’s recommendations and ULC standards. At a minimum, the requirements of the National Fire Alarm Code, shall be followed. A preventative maintenance agreement should be arranged through the local manufacturer’s representative. Though smoke detectors are designed for long life, they may fail at any time. Any smoke detector, fire alarm equipment or any component of that system which fails shall be repaired or replaced as soon as possible.D150-01-00 REV# 003 4 I56-1032-000。
双频激电及其数据处理
甘肃某金银矿点 金银矿受断裂带产于绿泥石角闪片岩、绢云母石英片岩内的挤压带中,金、银与铅、锌、黄铁矿化共生,且有正相关关系。黄铁矿化较强处可呈稠密浸染至半块状。图为该矿体IV号剖面综合图。Fs 与 ηs 相似性也是一目了然。
时间域与频率域的差异
频率域电法的主要优点 a.轻便; b.抗干扰能力强。 传统频率域电法的主要缺点 任何一种频率域电法都是要在不同的频率进行测量,传统的主动源电法勘探(包括激发极化法和电磁法)的工作方式都是“变频法”,变频法是一个频率、一个频率地逐个改变频率进行测量,以致带来了它两大致命弱点. a.变频法的工作效率低(“扫面”的速度更低); b.变频法的相对精度低。 (1)在激电法中区分矿异常性质能力低, (2)在电磁法(CSAMT)中发现深部异常能力低。 (3)不能(像TEM那样)进行近区的频率域电磁测深。
电流脉冲宽度 T(即充电时间长度) 对极化强度的影响
ΔV0
电位差ΔV
ΔV0
时间 (t)
T大,二次电位大
电位差ΔV
ΔV0
ΔV0
T小,二次电位小
T
T
二次电位差 ΔVIP
频率域与时间域的等效性
脉冲宽度 (T)
电位差 ΔV
二次电位差 ΔVIP
ΔVIP
时间域
时间域
频率域
二次电位差 ΔVIP
频率域IP与时间域IP的物理实质是一样的,对于寻找金属矿来说它们的能力是等效的。
01
对于线性时不变系统,在理论上二者是可以相互转换的。
02
在实际条件下,一般电流密度都非常小(小于0.01μA/cm2),实际上可以看作线性系统,如果能测量到相当完整的时间响应和频率响应,则它们在一定精度内也是可以相互转换的。
A.H. Systems Model SAS-551 动态测试设备说明书
A.H. Systems Model SAS-551 Passive Monopole AntennaSAS-551 PassiveMonopole AntennaOperation Manual© A.H. Systems inc. – June 2010 REV B 11981TABLE OF CONTENTSINTRODUCTION3SPECIFICATIONS5OPERATING INSTRUCTIONS6ANTENNA FORMULAS8CALIBRATION10MAINTENANCE11WARRANTY122© A.H. Systems inc. – June 2010REV BINTRODUCTION3© A.H. Systems inc. – June 2010REV BINTENDED PURPOSESThis equipment is intended for general laboratory use in a wide variety of industrial andscientific applications and designed to be used in the process of generating, controllingand measuring high levels of electromagnetic Radio Frequency (RF) energy. It is theresponsibility of the user to assure that the device is operated in a location which willcontrol the radiated energy such that it will not cause injury and will not violateregulatory levels of electromagnetic interference.RANGE OF ENVIRONMENTAL CONDITIONSThis equipment is designed to be safe under the following environmental conditions:Indoor useAltitude: up to 2 kmTemperature: 5° C to 40° CMaximum relative humidity: 80% for temperatures up to 31° C.Decreasing linearly to 50% at 40° CPollution degree 2: Normally non-conductive with occasionalcondensation.While the equipment will not cause hazardous condition over this environmental range,performance may vary.4© A.H. Systems inc. – June 2010REV BSPECIFICATIONSGENERAL DESCRIPTIONThe A.H. Systems passive monopole antenna is a general-purpose transmittingantenna which cover the 10 KHz – 40 MHz frequency range. Each unit comeswith a telescoping rod and ground plane. Review this manual and becomefamiliar with all safety markings and instructions.ANTENNA SPECIFICATIONSSAS-551 Monopole Antenna specifications:Frequency Range ....................................................9 kHz – 40 MHzMaximum Continuos Power ............................................1000 WattsInput Connector Type..............................................................BNC(f)Mounting Base............................................................1/4-20 Tread(f)Weight....................................................................................3.5 lbs.Size (W x H x D)..........................................................18" x 18" x 41"46 cm x 46 cm x 104 cm5© A.H. Systems inc. – June 2010REV BOPERATING INSTRUCTIONSASSEMBLY INSTRUCTIONSTo prepare the antenna for operation, attach the telescoping rod antennaelement to the top of the ground plane box.Connect the rod antenna by pushing straight down on the femaleconnector on top of the amplifier. Do not apply excessive sideways force,as this can cause the antenna center-pin to break.SETUP INSTRUCTIONSThe ground plane can be mounted to any tripod with a 1/4-20 attaching stud.Extend the rod antenna to 41" (104 cm) above the ground plane. Connect theoutput BNC connector on the side of the antenna to the output of a 50 Ωgenerator or amplifier. Establish a ground connection to the ground plane ifrequired by the test specification.GENERAL USE INSTRUCTIONSThe calibration tables shown provide a listing of the frequency of operation andits antenna factor in dB/m. The field strength is the receiver voltage in dBµVplus the antenna factor (refer to the antenna factor calibration) plus any cableloss. When making a measurement, mount the antenna on an appropriate mastor tripod.6© A.H. Systems inc. – June 2010REV BECF-10 (Equivalent Capacitance Fixture)The ECF-10 is an equivalent capacitance fixture constructed per IEEE 291 andARP 958. This is an indispensable tool used for gain adjustment and calibrationof the active monopole antennas. The ECF-10 is used as a signal substitutionsource when calibrating the active monopole antennas. Refer to the calibrationprocedures below.7© A.H. Systems inc. – June 2010REV BCALCULATIONSEMISSIONS TESTINGIndividual calibration data for the passive monopole antenna is supplied tocomply with various emissions test requirements.For emissionsmeasurements, add antenna factor plus cable loss to receiver reading in dBµVto convert to field strength in dBµV/meter.FS = Field Strength in dBµV/mSA = Spectrum Analyzer or Receiver voltage readingAF = Antenna Correction FactorCL = Cable Loss in dBIMMUNITY TESTINGFor Immunity measurements, the generated electric field strength can becalculated by:FS = Approximate Field Strength in (V/m)P = Power in wattsg = Numeric Gaind = Distance in meters8© A.H. Systems inc. – June 2010REV BTYPICAL CONVERSION FORMULASLOG -> LINEAR VOLTAGE FIELD STRENGTH & POWER DENSITYdBµV to Volts V = 10 ((dBµV – 120) / 20)dBµV/m to V/m V/m = 10 (((dBµV/m) -120) / 20) Volts to dBµV dBµV = 20 log(V) + 120V/m to dBµV/m dBµV/m = 20 log(V/m) + 120 dBV to Volts V = 10 (dBV / 20)dBµV/m to dBmW/m2dBmW/m2 = dBµV/m – 115.8 Volts to dBV dBV = 20log(V)dBmW/m2 to dBµV/m dBµV/m = dBmW/m2 + 115.8 dBV to dBµV dBµV = dBV +120dBµV/m to dBµA/m dBµA/m = dBµV/m – 51.5dBµV to dBV dBV = dBµV - 120dBµA/m to dBµV/m dBµV/m = dBµA + 51.5LOG -> LINEAR CURRENT dBµA/m to dBpT DBpT = dBµA/m + 2dBµA to uAµA = 10 (dBµA / 20)dBpT to dBµA/m dBµA/m = dBpT – 2µA to dBµA dBµA = 20 log(µA)W/m2 to V/m V/m = SQRT(W/m2 * 377)dBA to A A = 10 (dBA / 20)V/m to W/m2W/m2 = (V/m)2 / 377A to dBA dBA = 20log(A)µT to A/m A/m = µT / 1.25dBA to dBµA dBµA = dBA + 120A/m to µTµT = 1.25 * A/mdBµA to dBA dBA = dBµA -120E-FIELD ANTENNASLOG -> LINEAR POWER Correction Factor dBµV/m = dBµV + AFdBm to Watts W = 10((dBm – 30)/10)Field Strength V/m = 30 * watts * Gain numericmetersWatts to dBm dBm = 10log(W) + 30Required Power Watts = (V/m * meters)230 * Gain numericdBW to Watts W = 10(dBW / 10)LOOP ANTENNASWatts to dBW dBW = 10log(W)Correction Factors dBµA/m = dBµV + AFdBW to dBm dBm = dBW + 30Assumed E-field forshielded loopsdBµV/m = dBµA/m + 51.5dBm to dBW dBW = dBm - 30dBpT = dBµV + dBpT/µV TERM CONVERSIONSdBm to dBµV dBµV = dBm + 107 (50Ω)dBµV = dBm + 10log(Z) + 90CURRENT PROBESdBµV to dBm dBm = dBµV – 107 (50Ω)dBm = dBµV – 10log(Z) – 90Correction Factor dBµA = dBµV – dB(ohm)dBm to dBµA dBµA = dBm – 73 (50Ω)dBµA = dBm – 10log(Z) + 90Power needed for injection probe given voltage(V) into 50Ω load and Probe Insertion Loss (I L)dBµA to dBm dBm = dBµA + 73 (50Ω)dBm = dBµA + 10log(Z) – 90Watts = 10((I L + 10log(V2/50))/10)dBµA to dBµV dBµV = dBµA + 34 (50Ω)dBµV = dBµA + 20log(Z)dBµV to dBµA dBµA = dBµV – 34 (50Ω)dBµA = dBµV – 20log(Z)© A.H. Systems inc. – June 2010REV B9CALIBRATIONMonopole CalibrationThe antenna factor for the rod antenna shall be determined by measuring the signal transfercharacteristics of the matching device and assuming that the antenna is a short monopole with aninfinite ground plane. Set up the monopole to be calibrated and the test equipment per Figure 3.Allow all equipment to warm up for 15 minutes.* Also referred to as a Dummy Antenna.Figure 3NOTESIf the VSWR of the receiver or signal generator is low, pads may not be needed or reduced to 6 dBor 3 dB.With the equipment connected as shown and a 50 Ω t ermination on the T-connector (A), measurethe received signal voltage V L in dBµV at the signal output port (B).Leaving the RF output of the signal generator unchanged, transfer the 50Ωtermination to thesignal output port (B) and transfer the receiver input cable to the T-connector (A). Measure thedrive signal voltage V D in dBµV.Subtract V L from V D and add 6 dB to obtain the antenna factor (in dB) of the antenna.Records providing evidence that the required final inspection and tests are carried out shall bemaintained and shall be available for review by the customer and third party inspectors. Suchrecords include signed off ITPs, job cards, nonconformance reports, test reports and inspectionreports, if any.NOTE – The signal generator does not need to be calibrated, but it shall be stable. The 50Ωtermination shall have low VSWR. The spectrum analyzer shall be calibrated and have low VSWR.10© A.H. Systems inc. – June 2010REV BMAINTENANCETo ensure reliable and repeatable long-term performance, annualre-calibration of your active monopole preamplifier by A.H.Systems’ experienced technicians is recommended. Our staff canrecalibrate almost any type or brand of antenna.For more information about our calibration services or to place anorder for antenna calibration, visit our website at or call (818) 998-0223.WARRANTY INFORMATIONA.H. Systems Inc., warrants that our Antennas, Sensors and Probes will be free fromdefects in materials and workmanship for a period of three (3) years. All other productsdelivered under contract will be warranted for a period of two (2) years. A.H. Systems'obligation under this warranty shall be limited to repairing or replacing, F.O.B.Chatsworth, California, each part of the product which is defective, provided that thebuyer gives A.H. Systems notice of such defect within the warranty period commencingwith the delivery of the product by A.H. Systems.The remedy set forth herein shall be the only remedy available to the buyer, and in noevent shall A.H. Systems be liable for direct, indirect, incidental or consequentialdamages.This warranty shall not apply to any part of the product which, without fault of A.H.Systems has been subject to alteration, failure caused by a part not supplied by A.H.Systems, accident, fire or other casualty, negligence, misuse or normal wear ofmaterials.Except for the warranty set forth above, there are no other warranties, expressed orimplied, with respect to the condition of the product or it's suitability for the use intendedfor them by the buyer.For prompt service, please contact our service department for a Return MaterialAuthorization Number before shipping equipment back to us.。
FINS5513_SECURITY VALUATION AND PORTFOLIO SELECTION_2006 Summer_solution_chap009
9-1CHAPTER 9: THE CAPITAL ASSET PRICING MODEL1. E(r P ) = r f + β P [E(r M ) – r f ]18 = 6 + β P (14 – 6) ⇒ β P = 12/8 = 1.52.If the security’s correlation coefficient with the market portfolio doubles (with all other variables such as variances unchanged), then beta, and therefore the risk premium, will also double. The current risk premium is: 14 – 6 = 8%The new risk premium would be 16%, and the new discount rate for the security would be: 16 + 6 = 22%If the stock pays a constant perpetual dividend, then we know from the original data that the dividend (D) must satisfy the equation for the present value of a perpetuity:Price = Dividend/Discount rate50 = D/0.14 ⇒ D = 50 × 0.14 = $7.00At the new discount rate of 22%, the stock would be worth: $7/0.22 = $31.82 The increase in stock risk has lowered its value by 36.36%. 3. The appropriate discount rate for the project is:r f + β[E(r M ) – r f ] = 8 + [1.8 × (16 – 8)] = 22.4%Using this discount rate: ×+−=+−=∑=15[$40$224.115$40$NPV 101t tAnnuity factor (22.4%, 10 years)] = $18.09The internal rate of return (IRR) for the project is 35.73%. Recall from your introductoryfinance class that NPV is positive if IRR > discount rate (or, equivalently, hurdle rate). The highest value that beta can take before the hurdle rate exceeds the IRR is determined by:35.73 = 8 + β(16 – 8) ⇒ β = 27.73/8 = 3.474. a. False. β = 0 implies E(r) = r f , not zero.b.False. Investors require a risk premium only for bearing systematic (undiversifiable or market) risk. Total volatility includes diversifiable risk.c.False. Your portfolio should be invested 75% in the market portfolio and 25% in T-bills. Then:βP = (0.75 ×1) + (0.25 ×0) = 0.759-29-35. a.Call the aggressive stock A and the defensive stock D. Beta is the sensitivity of the stock’s return to the market return, i.e., the change in the stock return per unit change in the market return. Therefore, we compute each stock’s beta by calculating the difference in its return across the two scenarios divided by the difference in the market return:00.2255382A =−−−=β30.0255126D =−−=βb. With the two scenarios equally likely, the expected return is an average of the two possible outcomes:E(r A ) = 0.5 × (–2 + 38) = 18%E(r D ) = 0.5 × (6 + 12) = 9%c. The SML is determined by the market expected return of [0.5(25 + 5)] = 15%, with a beta of 1, and the T-bill return of 6% with a beta of zero. See the following graph.The equation for the security market line is:E(r) = 6 + β(15 – 6)9-4d. Based on its risk, the aggressive stock has a required expected return of:E(r A ) = 6 + 2.0(15 – 6) = 24%The analyst’s forecast of expected return is only 18%. Thus the stock’s alpha is:α A = actually expected return – required return (given risk)= 18% – 24% = –6%Similarly, the required return for the defensive stock is:E(r D ) = 6 + 0.3(15 – 6) = 8.7%The analyst’s forecast of expected return for D is 9%, and hence, the stock has a positive alpha: α D = actually expected return – required return (given risk)= 9 – 8.7 = +0.3%The points for each stock plot on the graph as indicated above.e. The hurdle rate is determined by the project beta (0.3), not the firm’s beta. The correct discount rate is 8.7%, the fair rate of return for stock D.6. Not possible. Portfolio A has a higher beta than Portfolio B, but the expected return for Portfolio A is lower than the expected return for Portfolio B. Thus, these two portfolios cannot exist in equilibrium.7.Possible. If the CAPM is valid, the expected rate of return compensates only for systematic (market) risk, represented by beta, rather than for the standard deviation, which includes nonsystematic risk. Thus, Portfolio A’s lower rate of return can be paired with a higher standard deviation, as long as A’s beta is less than B’s.8. Not possible. The reward-to-variability ratio for Portfolio A is better than that of the market. This scenario is impossible according to the CAPM because the CAPM predicts that the market is the most efficient portfolio. Using the numbers supplied: 5.0121016S A =−=33.0241018S M =−=Portfolio A provides a better risk-reward tradeoff than the market portfolio.9. Not possible. Portfolio A clearly dominates the market portfolio. Portfolio A has both alower standard deviation and a higher expected return.9-59-610. Not possible. The SML for this scenario is: E(r) = 10 + β(18 – 10)Portfolios with beta equal to 1.5 have an expected return equal to:E(r) = 10 + [1.5 × (18 – 10)] = 22%The expected return for Portfolio A is 16%; that is, Portfolio A plots below the SML (α A = –6%), and hence, is an overpriced portfolio. This is inconsistent with the CAPM.11. Not possible. The SML is the same as in Problem 10. Here, Portfolio A’s requiredreturn is: 10 + (0.9 × 8) = 17.2%This is greater than 16%. Portfolio A is overpriced with a negative alpha: α A = –1.2%12. Possible. The CML is the same as in Problem 8. Portfolio A plots below the CML, asany asset is expected to. This scenario is not inconsistent with the CAPM.13. Since the stock’s beta is equal to 1.2, its expected rate of return is: 6 + [1.2 × (16 – 6)] = 18%11P P P D )r (E −+=53$P 5050P 618.011=⇒+=−14. The series of $1,000 payments is a perpetuity. If beta is 0.5, the cash flow should bediscounted at the rate: 6 + [0.5 × (16 – 6)] = 11%PV = $1,000/0.11 = $9,090.91If, however, beta is equal to 1, then the investment should yield 16%, and the price paid for the firm should be:PV = $1,000/0.16 = $6,250The difference, $2,840.91, is the amount you will overpay if y ou erroneously assume that beta is 0.5 rather than 1.15. Using the SML: 4 = 6 + β(16 – 6) ⇒ β = –2/10 = –0.29-716. r1 = 19%; r2 = 16%; β1 = 1.5; β2 = 1a. To determine which investor was a better selector of individual stocks we look atabnormal return, which is the ex-post alpha; that is, the abnormal return is thedifference between the actual return and that predicted by the SML. Withoutinformation about the parameters of this equation (risk-free rate and market rate ofreturn) we cannot determine which investor was more accurate.b.If r f = 6% and r M = 14%, then (using the notation alpha for the abnormal return):α 1 = 19 – [6 + 1.5(14 – 6)] = 19 – 18 = 1%α 2 = 16 – [6 + 1(14 – 6)] =16 – 14 = 2%Here, the second investor has the larger abnormal return and thus appears to be thesuperior stock selector. By making better predictions, the second investor appearsto have tilted his portfolio toward underpriced stocks.c.If r f = 3% and r M = 15%, then:α 1 =19 – [3 + 1.5(15 – 3)] = 19 – 21 = –2%α 2 = 16 – [3+ 1(15 – 3)] = 16 – 15 = 1%Here, not only does the second investor appear to be the superior stock selector,but the first investor’s predictions appear valueless (or worse).17. a. Since the market portfolio, by definition, has a beta of 1, its expected rate of returnis 12%.b.β = 0 means no systematic risk. Hence, the stock’s expected rate of return inm arket equilibrium is the risk-free rate, 5%.ing the SML, the fair expected rate of return for a stock with β = –0.5 is:E(r) = 5 + [(–0.5)(12 – 5)] = 1.5%The actually expected rate of return, using the expected price and dividend for nextyear is:E(r) = [($41 + $1)/40] – 1 = 0.10 = 10%Because the actually expected return exceeds the fair return, the stock isunderpriced.9-818. a.The risky portfolio selected by all defensive investors is at the tangency pointbetween the minimum-variance frontier and the ray originating at r f, depicted bypoint R on the graph. Point Q represents the risky portfolio selected by allaggressive investors. It is the tangency point between the minimum-variance frontier.and the ray originating at r Bfb.Investors who do not wish to borrow or lend will each have a unique risky portfolioat the tangency of their own individual indifference curves with the minimum-variance frontier in the section between R and Q.c. The market portfolio is clearly defined (in all circumstances) as the portfolio of allrisky securities, with weights in proportion to their market values. Thus, by design,the average investor holds the market portfolio. The average investor, in turn,neither borrows nor lends. Hence, the market portfolio is on the efficient frontierbetween R and Q.d. Yes, the zero-beta CAPM is valid in this scenario as shown in the following graph:9-919. Assume that stocks pay no dividends and hence the rate of return on stocks is essentiallytax-free. Thus, both taxed and untaxed investors compute identical efficient frontiers.The situation is analogous to that with different lending and borrowing rates as depicted in the graph of Problem 18. Taxed investors are analogous to lenders with a lending rate of [r f(1 – t)]. Their relevant CML is drawn from [r f(1 – t)] to the efficient frontier withtangency at point R on the graph. Untaxed investors are analogous to borrowers whomust use the (now higher) rate of r f to get a tangency at Q. Between them, both classes of investors hold the market portfolio, which is a weighted average of R and Q, with weights proportional to the aggregate wealth of the investors in each class.Since any combination of two efficient frontier portfolios is also efficient, the average(market) portfolio will also be efficient here, as depicted by point M. Moreover, the Zero Beta model must now apply, because the market portfolio is efficient and all investorschoose risky portfolios that lie on the efficient frontier. As a result, the ray from theexpected return on the efficient portfolio with zero correlation with M (and hence zerobeta) to the efficient frontier, will be tangent at M. This can happen only if:r f(1 – t) < E(r Z) < r fMore generally, consider the case of any number of classes of investors with individualrisk-free borrowing and lending rates. As long as the same efficient frontier of risky assets applies to all of them, the Zero-Beta model will apply, and the equilibrium zero-beta rate will be a weighted average of each individual's risk-free borrowing and lending rates.9-1020. In the zero-beta CAPM the zero-beta portfolio replaces the risk-free rate, and thus:E(r) = 8 + 0.6(17 – 8) = 13.4%21. a.22. d. From CAPM, the fair expected return = 8 + 1.25(15 − 8) = 16.75%Actually expected return = 17%α = 17 − 16.75 = 0.25%23. d.24. c.25. d.26. d. [You need to know the risk-free rate]27. d. [You need to know the risk-free rate]28.Under the CAPM, the only risk that investors are compensated for bearing is the risk thatcannot be diversified away (systematic risk). Because systematic risk (measured by beta) is equal to 1.0 for both portfolios, an investor would expect the same rate of return from both portfolios A and B. Moreover, since both portfolios are well diversified, it doesn’t matter if the specific risk of the individual securities is high or low. The firm-specific risk has been diversified away for both portfolios.29. a. McKay should borrow funds and invest those funds proportionately in Murray’sexisting portfolio (i.e., buy more risky assets on margin). In addition to increasedexpected return, the alternative portfolio on the capital market line will also haveincreased risk, which is caused by the higher proportion of risky assets in the totalportfolio.b. McKay should substitute low beta stocks for high beta stocks in order to reducethe overall beta of York’s portfolio. By reducing the overall portfolio beta, McKaywill reduce the systematic risk of the portfolio, and therefore reduce its volatilityrelative to the market. The security market line (SML) suggests such action (i.e.,moving down the SML), even though reducing beta may result in a slight loss ofportfolio efficiency unless full diversification is maintained. York’s primaryobjective, however, is not to maintain efficiency, but to reduce risk exposure;reducing portfolio beta meets that objective. Because York does not want toengage in borrowing or lending, McKay cannot reduce risk by selling equities and9-11using the proceeds to buy risk-free assets (i.e., lending part of the portfolio).9-1230. The beta of Black’s portfolio is likely to be underestimated relative to the beta calculatedbased on the “true” market portfolio. This is because the Dow Jones Industrial Average (DJIA) and other market proxies are likely to have less diversification and higher variance of returns than the “true” market portfolio as specified by the Capital Asset PricingModel. Consequently, beta computed using an overstated variance will beunderestimated. This relationship can be seen from the following:β Portfolio = Cov(r Portfolio , r Market proxy )/σ2Market proxyThe slope of the security market line (i.e., the market risk premium) is likely to beunderestimated relative to the “true” market portfolio. This would occur because the“true” market portfolio is likely to be more efficient (i.e., plotting at a higher return for the same risk) relative to the DJIA and similarly incorrectly specified market proxies.Consequently, the proxy-based SML would offer less expected return per unit of risk. 31. a.Expected Return AlphaStock X 5% + 0.8(14% − 5%) = 12.2% 14.0% − 12.2% = 1.8%Stock Y 5% + 1.5(14% − 5%) = 18.5% 17.0% − 18.5% = −1.5%b.i. Kay should recommend Stock X because of its positive alpha, compared toStock Y, which has a negative alpha. In graphical terms, the expected return/riskprofile for Stock X plots above the security market line (SML), while the profile forStock Y plots below the SML. Also, depending on the individual risk preferencesof Kay’s clients, the lower beta for Stock X may have a beneficial effect on overallportfolio risk.ii. Kay should recommend Stock Y because it has higher forecasted return andlower standard deviation than Stock X. The respective Sharpe ratios for Stocks Xand Y and the market index are:Stock X: (17% − 5%)/25% = 0.48Stock Y: (14% − 5%)/36% = 0.25Market index: (14% − 5%)/15% = 0.60The market index has an even more attractive Sharpe ratio than either of theindividual stocks, but, given the choice between Stock X and Stock Y, Stock Y isthe superior alternative.When a stock is held as a single stock portfolio, standard deviation is the relevantrisk measure. For such a portfolio, beta as a risk measure is irrelevant. Althoughholding a single asset is not a typically recommended investment strategy, someinvestors may hold what is essentially a single-asset portfolio when they hold thestock of their employer company. For such investors, the relevance of standarddeviation versus beta is an important issue.9-13。
光纤光学振动传感器头的数据手册说明书
OFV-551/552 Fiber-Optic Sensor HeadThe OFV-551/552 fiber-optic sensorheads are designed for flexible vibrationmeasurement where space is restricted.Another benefit is their ability to adjustthe laser intensity especially for sensitive objectslike nanostructures and biological samples.The system comprises the OFV-5000 VibrometerController and a Fiber-Optic Sensor Head.The OFV-551 sensor head utilizes flexible single pointfiber-optics while the dual-fiber OFV-552 sensorhead permits direct measurements of differentialmovements between two monitored points.Technical Data1 Tolerance of ± 15 mm for position of coherence maximum.2Single point measurement with OFV-552: with OFV-151 reference head: 63 mm + n · 204 mm. Differential measurement with OFV-552: ±n · 204 mm between stand-off distance of both arms.3OFV-552: Length of the Y-fiber cable from branch to fiber head: always 500 mm.4 Standard 5Option 6The maximum stand-off distance depends on the backscattering properties of the sample.Options and AccessoriesPolytec offers a wide range of accessories including tripods, tilt and traverse stages for mounting and positioning fiber heads.Please contact your local vibrometer sales engineer or visit our website /vibrometersfor more detailed information.O M _D S _O F V -551552_E _423682017/01 - T e c h n i c a l s p e c i fi c a t i o n s a r e s u b j e c t t o c h a n g e w i t h o u t n o t i c ePolytec GmbH (Germany)Polytec-Platz 1-7 76337 Waldbronn Tel. +49 7243 604-0 ***************Polytec GmbH (Germany)Vertriebs- und BeratungsbüroSchwarzschildstraße 1 12489 BerlinTel. +49 30 6392-5140Polytec, Inc. (USA)North American Headquarters16400 Bake Parkway Suites 150 & 200Irvine, CA 92618Tel. +1 949 943-3033****************Central Office 1046 Baker Road Dexter, MI 48130Tel. +1 734 253-9428East Coast Office 1 Cabot Road Suites 101 & 102Hudson, MA 01749Tel. +1 508 417-1040Polytec Ltd. (Great Britain)Lambda House Batford MillHarpenden, Herts AL5 5BZ Tel. +44 1582 711670*******************.uk Polytec France S.A.S.Technosud II Bâtiment A99, Rue Pierre Semard 92320 ChâtillonTel. +33 1 496569-00***************Polytec JapanArena Tower, 13th floor 3-1-9, Shinyokohama Kohoku-ku, Yokohama-shi Kanagawa 222-0033Tel. +81 45 478-6980***************.jpPolytec South-East Asia Pte LtdBlk 4010 Ang Mo Kio Ave 10#06-06 TechPlace 1Singapore 569626Tel. +65 64510886********************Polytec China Ltd.Room 402, Tower B Minmetals PlazaNo. 5 Chaoyang North Ave Dongcheng District 100010 BeijingTel. +86 10 65682591*******************。
RF55旋转摩擦传感器产品目录说明书
RF55Rotary Friction Sensors Catalog MSG33-2375/USApplicationThe RF55 rotary controls belongs to the Parker family of accessories provided to complement electronic control systems. The RF55 is a 0-5 V output, non-contact, rotary friction control for mobile hydraulic applications. The RF55 has twelve inch leads and an attached Deutsch connector.There are 3 versions of this rotary friction control. Two of the versions are powered by 5 Vdc and have 10%-90% ratiometric outputs. Of these, 1 has a 90° working angle and dual outputs, the other has 360° continuous rotation and a single output.The third version is powered by the vehicle’s 12 V battery and has a 90° working angle and single output.To make the control suitable for mobile equipment, we have focused upon properties such as reliability, electromagnetic immunity and ease of installation. PropertiesReliabilityThe RF55 has glass-filled nylon construction for strength and corrosion resistance. The control uses non-contact, Hall-effect technology for trouble free operation. The control is very robust and able to withstand rugged applications.Electromagnetic immunityThe RF55 has a high level of EMI protection. InstallationThe RF55 is well suited for the mobile hydraulics industry. The 3 pin connector is a sealed Deutsch type designed for automotive use. This connector combined with potted electronics gives the control IP66 protection for exposed outdoor applications. The locating flat on the threads provides for easy alignment. The mounting nut and washer are supplied. These features provide for easy installation and removal, even in field conditions.MATING CONNECTORKIT P/N - 01787(FOR 1 OUTPUT)13ype SXLMATING CONNECTORKIT P/N - 01789(FOR 2 OUTPUTS)61Ordering part number153880ECD 12V , 90°, 1 output (0.5 - 4.5 Vdc)153881ECD 5V , 90°, 3 detents, 2 outputs (10-90%)153882ECD 5V , 360° continuous, 1 output (10-90%)Environmental protection EMIISO 11452-2 150 V/m ESDEN 61000-4-2 7 kV Mechanical Shock 1m drop Vibration30 Gs ClimateSealing (electronics) IP66Chemical environment Liquids (resistance)standard automotiveGeneral Weight77 gT emperature range -40°C to 85°C Operating life 1 million cycles T otal accuracy Max 4.0 % FS Hysteresis<1.0%Mechanical characteristics Angular travel 90° or 360° continuous Connector Deutsch DTM Electrical specifications Working angle 90° or 360°Supply Voltage, Vs 5.0 ±10% Vdc 1)Max. Voltage, Vs 8 Vdc 1)Supply Voltage, V BAT 12.0 ±10% Vdc 2)Max. Voltage, V BA T 16 Vdc 2)Current supply Max 8.0 mA per output Output at -45° 10% Vs 3), 0.5 V 4)Output at 0° 50% Vs 3), 2.5 V 4)Output at +45° 90% Vs 3), 4.5 V 4)Output currentMax. 1.0 mA per output1) 5 V ratiometric versions.2) 12 V versions.3) 5 V , 90° versions. Output is ratiometric to Vs. Secondary output is inverse.4) 12 V , 90° versions. The output is 0.5 - 4.5 Vdc.OFFER OF SALEThe items described in this document are hereby offered for sale by Parker-Hannifin Corporation, its subsidiaries or its authorized distributors. This offerand its acceptance are governed by the provisions stated in the detailed “Offer of Sale” available from your Parker representative or at .Parker Hannifin Corporation Electronic Controls Division 850 Arthur AvenueElk Grove Village, IL, 60007 USA phone 800 221 9257******************Parker Motion Systems International Sales OfficesNorth AmericaMotion Systems Group Headquarters6035 Parkland BoulevardCleveland, OH 44124-4141 USA Tel: 216-896-3000 Fax: 216-896-4031Parker Canada Division 160 Chisholm Drive Milton Ontario Canada L9T 3G9 Tel: 905-693-3000 Fax: 905-876-1958Parker Hannifin de México Industrial Hydraulic Sales Eje Uno Norte No.100Parque Industrial Toluca 2000 Toluca, Edo, de Mexico CP 50100 Tel: 52 722 275 4200 Fax: 52 722 279 9308Parker Hannifin de México Mobile Hydraulic SalesVia de FFCC a Matamoraos 730 Apodaca, NL, de Mexico CP 66600 Tel: 52 81 8156 6000 Fax: 52 81 8156 6068EuropeMotion Systems Group Headquarters La Tuilière 61163 Etoy - Switzerland Tel: 41 21 821 8500 Fax: 41 21 821 8580South AfricaParker Hannifin Africa Pty Ltd P .O. Box 1153ZA-Kempton Park 1620, Republic of South Africa Tel: 27 11 961 0700 Fax: 27 11 392 7213Mobile SalesMobile Sales Organization and Global Sales 850 Arthur AvenueElk Grove Village, IL 60007 USA Tel: 847-258-6200 Fax: 847-258-6299Industrial SalesCentral Region1042 Maple Avenue Unit 331Lisle, IL 60532 USA Tel: 630-964-0796Great Lakes Region6035 Parkland BoulevardCleveland, OH 44124-4141 USA Tel: 216-896-2740 Fax: 866-498-7507Gulf Region20002 Standing Cypress Drive Spring, TX 77379 USA Tel: 817-473-4431 Fax: 888-227-9454Southwest Region 700 S. 4th AvenueMansfield, TX 76063 USA Tel: 817-473-9341 Fax: 817-473-2680Mid Atlantic and Southeast Regions1225 Old Alpharetta Road Suite 290Alpharetta, GA 30005 USA Tel: 770-619-9767 Fax: 770-619-9806Midwest Region 8145 Lewis RoadMinneapolis, MN 55427 USA Tel: 763-513-3535 Fax: 763-544-3418Northeast Region P .O. Box 396Pine Brook, NJ 07058 USA Tel: 973-227-2565 Fax: 973-227-2467 Northwest Region6458 North Basin Avenue Portland, OR 97217 USA Tel: 503-283-1020 Fax: 866-611-7308 Pacific Region 8460 Kass DriveBuena Park, CA 90621 Tel: 714-228-2510 Fax: 714-228-2511Asia PacificParker Hannifin Shanghai Ltd 280 Yunqiao Road,Jin Qiao Export Processing Zone Shanghai 201206, China Tel: 86 21 2899 5000 Fax: 86 21 6445 9917Parker Hannifin Hong Kong Ltd 8/F , Kin Yip Plaza 9 Cheung Yee StreetCheung Sha Wan, Hong Kong Tel: 852 2428 8008 Fax: 852 2425 6896Parker Hannifin Korea Ltd 9F KAMCO Yangjae Tower949-3 Dogok1-dong, Gangnam-gu Seoul, 135-860, Korea Tel: 82 2 559 0400 Fax: 82 2 556 8187Parker Hannifin India Pvt Ltd Plot No. EL-26, MIDC TTC Industrial AreaMahape, Navi Mumbai, 400 709 India Tel: 91 22 6513 7081 Fax: 91 22 2768 6841Parker Hannifin Australia Parker Hannifin Pty Ltd. 9 Carrington RoadCastle Hill, NSW 2154, Australia Tel: 612 9634 7777 Fax: 612 9842 5111Latin AmericaParker Hannifin Ind. e Com. Ltda Hydraulics Division Av. FredericoRitter, 110094930-000 Cachoeirinha RS, Brazil Tel: 55 51 3470 6090 Fax: 55 51 3470 9281Parker Hannifin Argentina S.A.I.C.Stephenson 27111667-T ortuguitas-Malvinas Argentinas Pcia. de Buenos Aires, Argentina Tel: 54 3327 44 4129 Fax: 54 3327 44 4199Pan American Division7400 NW 19th Street, Suite A Miami, FL 33126 USA Tel: 305-470-8800 Fax: 305-470-8808HY33-2375/US04/2017©2013-2017 Parker Hannifin Corporation. All rights reserved.。
FINS5514_s1_2011
Australian School of BusinessSchool Banking and FinanceFINS5514C APITAL B UDGETING AND F INANCING D ECISIONSC OURSE O UTLINES EMESTER 1,2011TABLE OF CONTENTS1. STAFF CONTACT DETAILS12. COURSE DETAILS12.1Teaching Times and Locations 1 2.2Units of Credit 1 2.3Summary of Course 1 2.4Course Aims and Relationship to Other Courses 12.5Student Learning Outcomes 23.L EARNING AND T EACHING ACTIVITIES23.1 Approach to Learning and Teaching in the Course 23.2 Learning Activities and Teaching Strategies 34.A SSESSMENT34.1Formal Requirements 3 4.2Assessment Details 3 4.3Late Submission 45.A CADEMIC H ONESTY AND P LAGIARISM46.C OURSE R ESOURCES47.C OURSE EVALUATION AND DEVELOPMENT58.S TUDENT RESPONSIBILITIES AND CONDUCT58.1 Workload 5 8.2 Attendance 5 8.3 Special Consideration and Supplementary Examinations 6 8.4 General Conduct and Behaviour 7 8.5 Occupational Health and Safety 78.6 Keeping Informed 79. ADDITIONAL S TUDENT R ESOURCES AND S UPPORT710.C OURSE S CHEDULE81. STAFF CONTACT DETAILSPosition Name Email ConsultationHours andlocationPhoneLecturer-in-charge Dr. Jin Yu jin.yu@.au Monday2-4pm (weeks 5 –12)@ ASB Level 3- Room 339(the west wing)93857886Lecturer Mr.MarkHumphery-Jenner M.HumpheryJenner@.au TBA@ ASB Level 3-Room 350(the west wing)2. COURSE DETAILS2.1 Teaching Times and LocationsLectures:Section A: Tuesday, 18 – 21 pm @ Chemical Sc M11Section B: Tuesday, 14-17 pm @ Mechanical Eng 203Section C: Wednesday, 13-16pm @ Chemical Sc M102.2 Units of CreditThis course carries 6 UOC2.3 Summary of CourseCapital budgeting and financing decisions are primarily concerned with the major financial decisions faced by firms. These decisions can be broadly categorized as the investment policy, the financing policy, the dividend/repurchase policy, and the restructuring policy.This course will examine the main theories and empirical evidence surrounding these decisions and to use this knowledge to help solve typical ‘real’ finance problems.2.4 Course Aims and Relationship to Other CoursesThe two main aims of this course are:∙to provide students with an understanding of the basic theories of corporate finance decision marking∙to provide students with the ability to apply these theories to numerical problemsThis course is a Disciplinary Specialization for students specializing in Finance on the Master of Commerce Degree. Students specializing in Finance, International Finance, Funds Management, and Banking must take this course. Students specializing in Financial Econometrics may take this course or choose another Disciplinary Specialization and should consult the Postgraduate Handbook for details. Security Valuation and Portfolio Selection (FINS5513) is either a prerequisite or a co-requisite for FINS5514. It is the responsibility ofeach student to ensure that this criterion has been met prior to the commencement of this course.2.5 Student Learning OutcomesBy the end of this course, you should be able to:1. Explain why the separation of the ownership and the control of most major corporationscan cause agency problems and describe how a judicious use of different financing vehicles can reduce these costs;2. Apply several capital budgeting techniques using MS Excel, appreciating the strengthsand weaknesses of the different techniques;3. Understand how to incorporate risk and uncertainty into capital budgeting decisionsand how capital budgeting is applied in practice;4. Describe how the arbitrage-based arguments of Modigliani and Miller establish theirrelevance propositions and to explain why their framework can contribute to our understanding of financing decisions;5. Explain why managers face an adverse selection problem to convince outside investorsto give the financing that the firm needs to implement investment decisions and to describe how costly signalling mechanisms can assist the managers to make informed corporate finance decisions;6. Explain the key issues of a company’s dividend/repurchase policy;7. Understand the restructuring choices faced by managers and how these choices canhelp resolve agency problems within the firm;8. Critically evaluate the core empirical evidence related to each of the key financialdecisions.ASB Graduate AttributesThis course contributes to your development of the following Australian School of Business Graduate Attributes, which are the qualities, skills and understandings we want you to have by the completion of your degree.LearningASB Graduate AttributesOutcomes1 – 8 1. Critical thinking and problem solvingCommunication2.3. Teamwork and leadership1 4. Social, ethical and global perspectives1-8 5. In-depth engagement with relevant disciplinary knowledgeskillsProfessional2,3 6.More information on the ASB Graduate Attributes and how they align with the UNSW Graduate Attributes (2010) is available on the ASB website (Learning and Teaching >Graduate Attributes).3.L EARNING AND T EACHING ACTIVITIES3.1 Approach to Learning and Teaching in the CourseThe course provides the foundations of corporate finance through the explanation of financial theories and their application to numerical problems. The lectures build from the student notes to set out the main ideas, theories, and conceptual framework for the course. The lectures also include numerical examples to demonstrate the applications of the theories. The tutorials offer an opportunity to discuss numerical questions.3.2 Learning Activities and Teaching StrategiesThis course is a combination of formal lectures and tutorials (problem solving classes). The lectures are used to explain concepts and to give real life examples of situations in which these concepts are employed. The tutorials are for problem-solving and discussion of issues raised in the lectures. Students are expected to prepare answers/solutions for the tutorials in advance. In all classes, students are encouraged to ask related questions.To prepare for the course, each week you must:∙download the weekly lecture notes from the course website;∙prepare yourself through the weekly readings;∙work through the tutorial questions;∙read the financial press for relevant current events;∙be ready to participate in the class discussions, group work, and practical activities.4.A SSESSMENT4.1 Formal RequirementsIn order to pass this course, you must:∙achieve a composite mark of at least 50; and∙make a satisfactory attempt at all assessment tasks (see below).4.2 Assessment DetailsAssessment Task Weighting LearningOutcomesassessedASB GraduateAttributesassessedLength DueDate1. Class Test 1 25% 1, 2, 3 1, 2, 3, 4 1.5 hoursWeek 62. Class Test 2 25% 4,5,6,8 1, 3 1.5 hoursWeek12 3. Final Exam 50% 1- 8 1, 2, 3, 4 2 hours TBAThe assessment tasks on this course are:∙Class Tests: Class Tests will be held during the normal lecture times in week 6 and also in week 12. These tests are designed to give students an opportunity to check their understanding of the concepts and issues raised in the material covered in the course. The tests will be of multiple choice format in which students have to answer 45 questions in 1.5 hours. The first (second) test covers material from week 1 to 5 (6 to11). The first test carries a weight of 25% and the second test 25%,which amounts to a50% weight in total.∙ A formal end of semester written exam will be held during the University’s exam period.The exam includes written short answers and numerical problems. Details will be posted on the web later in the semester. The final exam has a weight of 50%.4.3 Late SubmissionQuality AssuranceThe ASB is actively monitoring student learning and quality of the student experience in all its programs. A random selection of completed assessment tasks may be used for quality assurance, such as to determine the extent to which program learning goals are being achieved. The information is required for accreditation purposes, and aggregated findings will be used to inform changes aimed at improving the quality of ASB programs. All material used for such processes will be treated as confidential and will not be related to course grades.5.A CADEMIC H ONESTY AND P LAGIARISMThe University regards plagiarism as a form of academic misconduct, and has very strict rules regarding plagiarism. For UNSW policies, penalties, and information to help you avoid plagiarism see: .au/plagiarism/index.html as well as the guidelines in the online ELISE and ELISE Plus tutorials for all new UNSW students:.au/skills/tutorials/InfoSkills/index.htm.To see if you understand plagiarism, do this short quiz:.au/plagiarism/plagquiz.htmlFor information on how to acknowledge your sources and reference correctly, see:.au/onlib/ref.htmlFor the ASB Harvard Referencing Guide, see the ASB Referencing and Plagiarism webpage (ASB >Learning and Teaching>Student services>Referencing and plagiarism)6.C OURSE R ESOURCESPrescribed textbook∙Ross, S. A., R. W. Westerfield, and B. D. Jordan (RWJ), ‘Corporate Finance Fundamentals’, 8th Edition, McGraw-Hill, 2008;Other texts that students may find useful include:∙Copeland, T. E., J. F. Weston, and K Shastri, ‘Financial Theory and Corporate Policy’, 4th Editiion, Pearson, 2003;∙Damodaran, A., ‘Corporate Finance, Theory and Practice’, 2nd Edition, Wiley, 2001.BlackboardBlackboard is used to disseminate lecture notes, tutorial problems and selected answers/solutions, assessment details, journal articles, and announcements. This is the only place where these resources can be accessed. Students should make appoint of checking this site regularly. The address is:.auCalculatorsStudents will need to have their own ‘approved’ calculator for class tests and exams.The list of calculators approved for use in exams at UNSW is updated frequently. The current list and the exam calculator policy is available at:.au/student/academiclife/assessment/examinations/Calculator.html7.C OURSE EVALUATION AND DEVELOPMENTEach year we seek feedback from students and other stakeholder about the course offered in the Australian School of Business and continual improvements are made based on this feedback. UNSW’s Course and Teaching Evaluation and Improvement (CATEI) Process (.au/content/LT/evaluation/catei.cfm?ss=2) is one of the ways in which student evaluative feedback is gathered. In this course, we evaluate and use your course-level feedback, both quantitative and qualitative, to guide our continued review and redesigning of the course.Our teaching team reflects on a range of feedback sources over time. This continuous improvement process can affect one or more particular areas of the course, whether this has to do with structure, content, resources, delivery or assessment. For example, we have introduced additional student participation in class by forming break out groups to discuss key issues and concepts. A group/groups will be selected to have a nominated member present briefly to the class on key issues and raise questions.8.S TUDENT RESPONSIBILITIES AND CONDUCTStudents are expected to be familiar with and adhere to university policies in relation to class attendance and general conduct and behaviour, including maintaining a safe, respectful environment; and to understand their obligations in relation to workload, assessment and keeping informed.Information and policies on these topics can be found in the ‘A-Z Student Guide’: https://.au/student/atoz/A.html. See, especially, information on ‘Attendance and Absence’, ‘Academic Misconduct’, ‘Assessment Information’, ‘Examinations’, ‘Special Consideration’, ‘Student Responsibilities’, ‘Workload’ and policies such as ‘Occupational Health and Safety’.8.1 WorkloadIt is expected that you will spend at least ten hours per week studying this course. This time should be made up of reading, research, working on exercises and problems, and attending classes. In periods where you need to complete assignments or prepare for examinations, the workload may be greater.Over-commitment has been a cause of failure for many students. You should take the required workload into account when planning how to balance study with employment and other activities.8.2 AttendanceYour regular and punctual attendance at lectures and seminars is expected in this course. University regulations indicate that if students attend less than eighty per cent of scheduled classes they may be refused final assessment.8.3 Special Consideration and Supplementary ExaminationsYou must submit all assignments and attend all examinations scheduled for your course. You should seek assistance early if you suffer illness or misadventure which affects your course progress.General Information on Special Consideration:1. For assessments worth 20% or more, all applications for special consideration mustgo through UNSW Student Central(https://.au/student/academiclife/StudentCentralKensington.html) andbe lodged within 3 working days of the assessment to which it refers;2. Applications will not be accepted by teaching staff, but you should notify thelecture-in-charge when you make an application for special consideration throughUNSW Student Central;3. Applying for special consideration does not automatically mean that you will begranted a supplementary exam;4. Special consideration requests do not allow lecturers-in-charge to award studentsadditional marks.Special Consideration and the Final Exam:Applications for special consideration in relation to the final exam are considered by an ASB Faculty panel to which lecturers-in-charge provide their recommendations for each request. If the Faculty panel grants a special consideration request, this will entitle the student to sit a supplementary examination. No other form of consideration will be granted. The following procedures will apply:1. Supplementary exams will be scheduled centrally and will be held approximately twoweeks after the formal examination period. The dates for ASB supplementary examsfor session 1, 2011 are:12 July 2011 – exams for the School of Accounting13 July 2011 – exams for all Schools other than Accounting and Economics14 July 2011 – exams for the School of EconomicsIf a student lodges a special consideration for the final exam, they are stating theywill be available on the above dates. Supplementary exams will not be held at anyother time.2. Where a student is granted a supplementary examination as a result of a request forspecial consideration, the student’s original exam (if completed) will be ignored andonly the mark achieved in the supplementary examination will count towards the finalgrade. Failure to attend the supplementary exam will not entitle the student to havethe original exam paper marked and may result in a zero mark for the final exam.If you are too ill to perform reasonably on the final exam, do not attend the final and apply for a supplementary instead. However granting of a supplementary exam in such cases is not automatic. If a student attends the regular final, s/he is unlikely to be granted a supplementary exam.The ASB’s Special Consideration and Supplementary Examination Policy and Procedures for Final Exams for Undergraduate Courses is available at:.au/currentstudents/resources/forms/Documents/supplementaryexamp rocedures.pdf.8.4 General Conduct and BehaviourYou are expected to conduct yourself with consideration and respect for the needs of your fellow students and teaching staff. Conduct which unduly disrupts or interferes with a class, such as ringing or talking on mobile phones, is not acceptable and students may be asked to leave the class. More information on student conduct is available at: https://.au/student/atoz/BehaviourOfStudents.html8.5 Occupational Health and SafetyUNSW Policy requires each person to work safely and responsibly, in order to avoid personal injury and to protect the safety of others. For more information, see .au/.8.6 Keeping InformedYou should take note of all announcements made in lectures, tutorials or on the course web site. From time to time, the University will send important announcements to your university e-mail address without providing you with a paper copy. You will be deemed to have received this information. It is also your responsibility to keep the University informed of all changes to your contact details.9. ADDITIONAL S TUDENT R ESOURCES AND S UPPORTThe University and the ASB provide a wide range of support services for students, including:∙ASB Education Development Unit(EDU).au/learningandteaching/studentservices/Pages/default.aspx Academic writing, study skills and maths support specifically for ASB students. Servicesinclude workshops, online and printed resources, and individual consultations. EDU Office: Room GO7, Ground Floor, ASB Building (opposite Student Centre); Ph: 9385 5584; Email: edu@.au∙Capturing the Student Voice: An ASB website enabling students to comment on any aspect of their learning experience in the ASB. To find out more, go to the CurrentStudents/Resources/Student Feedback page here.∙Blackboard eLearning Support: For online help using Blackboard, follow the links from .au to UNSW Blackboard Support / Support for Students. For technical support, email: itservicecentre@.au; ph: 9385 1333∙UNSW Learning Centre (.au )Academic skills support services, including workshops and resources, for all UNSWstudents. See website for details.∙Library training and search support services:.au/web/services/services.html∙UNSW IT Service Centre: :https://.au/students/index.html Technical support for problems logging in to websites, downloading documents etc.: UNSW Library Annexe (Ground floor); Ph: 9385 1333.∙UNSW Counselling and Psychological Services (.au) Free, confidential service for problems of a personal or academic nature; and workshops on study issues such as ‘Coping With Stress’ and ‘Procrastination’.Office: Quadrangle Building, Level 2, East Wing ; Ph: 9385 5418∙Student Equity & Disabilities Unit (.au) Advice regarding equity and diversity issues, and support for students who have a disability or disadvantage that interferes with their learning. Office: Ground Floor, John GoodsellBuilding; Ph: 9385 473410.C OURSE S CHEDULEWeek 1. (Lecturer: Mr. Mark Humphery)Introduction to the CourseAgency TheoryRequired Reading:∙RWJ Chapter 1;∙Dobson J. (1999), ‘Is Shareholder Wealth Maximization Immoral?’, Financial Analysts Journal, Sept-Oct, 69-74;∙Byrd, J., Parrino R. and G. Pritsch (1998), ‘Stockholder-Manager Conflicts and Firm Value’, Financial Analysts Journal, May-June, 14-29;∙Palepu, K. G. and P. M. Healy, (2003), ‘The Fall of Enron’, Journal of Economic Perspectives, Vol. 17, 3-26;∙Bigger than Enron: /wgbh/pages/frontline/shows/regulation/∙Friedman, H. And L. Friedman (2009), ‘The Global Financial Crisis of 2008: What Went Wrong?’, available at SSRN: /sol3/papers.cfm?abstract_id=1356193∙Inside the meltdown: /wgbh/pages/frontline/meltdownWeek 2. (Lecturer: Mr. Mark Humphery)The Investment Decision IRequired Reading: RWJ Chapters 5&6Week 3. (Lecturer: Mr. Mark Humphery)The Investment Decision IIRequired Reading: RWJ Chapters 9Week 4. (Lecturer: Mr. Mark Humphery)The Investment Decision IIIRequired Reading: RWJ Chapters 10Week 5. (Lecturer: Dr. Jin Yu)The Investment Decision IVRequired Reading: RWJ Chapters 11&15Week 6. (Lecturer: Dr. Jin Yu)Class Test 1Raising CapitalRequired Reading: RWJ Chapters 16Week 7. (Lecturer: Dr. Jin Yu)Capital Structure IRequired Reading: RWJ Chapters 17Myers, S. (2001), ‘Capital Structure’, Journal of Economic Perspectives, Vol. 15, 81-102 Week 8. (Lecturer: Dr. Jin Yu)Capital Structure IIRequired Reading: RWJ Chapters 17Graham, J. and C. Harvey (2002), ‘How do CFOs make capital budgeting and capital structure decisions?’, The Journal of Applied Corporate Finance, Vol. 15, 8-23Week 9. (Lecturer: Dr. Jin Yu)The Dividend DecisionRequired Reading: RWJ Chapters 18Week 10. (Lecturer: Dr. Jin Yu)Options and Corporate FinanceRequired Reading: RWJ Chapters 24Week 11. (Lecturer: Dr. Jin Yu)The Restructuring Decision – Mergers and AcquisitionsRequired Reading: RWJ Chapters 25Week 12. (Lecturer: Dr. Jin Yu)Class Test 2Revision LectureFINS5514 – Capital Budgeting and Financing Decisions。
基于改进人工蜂群算法的边缘服务器部署策略
基于改进人工蜂群算法的边缘服务器部署策略
李波;袁也;侯鹏;丁洪伟
【期刊名称】《计算机应用与软件》
【年(卷),期】2024(41)5
【摘要】作为移动边缘计算架构部署的第一步,边缘服务器的部署是基础和关键,其部署位置与用户体验和系统性能密切相关,但是目前较少有研究关注该问题。
研究无线城域网中移动边缘计算环境下的边缘服务器部署问题,以最小化响应时间为目标,将边缘服务器部署问题定义为一个优化问题,并提出基于交叉的全局人工蜂群算法求解边缘服务器部署的最优解以降低系统的平均响应时间。
充分的实验结果表明,所提算法能够有效降低系统响应时间,算法性能优于其他代表性部署算法。
【总页数】8页(P218-225)
【作者】李波;袁也;侯鹏;丁洪伟
【作者单位】云南大学信息学院
【正文语种】中文
【中图分类】TP393
【相关文献】
1.基于四元数改进人工蜂群算法的彩色图像边缘检测
2.基于改进人工蜂群算法的多值属性系统故障诊断策略
3.基于改进人工蜂群算法的核电巡检机器人路径优化策略设计
4.基于改进人工蜂群算法的云资源调度策略
5.基于改进人工蜂群算法的自适应控制策略的设计及应用
因版权原因,仅展示原文概要,查看原文内容请购买。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Exchange Rate:
$1.80/£ -6.25% 5.00% 16.25%
$2.20/£ -8.75% 5.00% 18.75%
The standard deviation is now 10.24%. This is lower than the unhedged dollardenominated standard deviation, and is only slightly higher than the standard deviation of the pound-denominated return.
$1.80/£ 7,875 9,000 10,125 1,500
Exchange Rate:
$1.80/£ 9,375 10,500 11,625
$2.20/£ 9,125 10,500 11,875
Finally, calculate the dollar-denominated rate of return, recalling that the initial investment was $10,000: Price per Share (£) £35 £40 £45 b. Rate of return (%) at Given Exchange Rate $2.00/£ -7.50% 5.00% 17.50%
5.
The standard deviation of the pound-denominated return (using 3 degrees of freedom) is 10.21%. The dollar-denominated return has a standard deviation of 13.10% (using 9 degrees of freedom), greater than the pound-denominated standard deviation. This is due to the addition of exchange rate risk.
CHAPTER 25: INTERNATIONAL DIVERSIFICATION
1. d. Initial investment = 2,000 × $1.50 = $3,000 Final value = 2,400 × $1.75 = $4,200 Rate of return = ($4,200/$3,000) − 1 = 0.40 = 40% 2. 3. 4. a. c. a. $10,000/2 = £5,000 £5,000/£40 = 125 shares b. To fill in the table, we use the relation: 1 + r(US) = [(1 + rf (UK)]
25-1
6. First we calculate the dollar value of the 125 shares of stock in each scenario. Then we add the profits from the forward contract in each scenario. Price per Share (£) Exchange Rate: £35 £40 £45 Profits on Forward Exchange: [ = 5000(2.10 – E1)] Price per Share (£) £35 £40 £45 Dollar Value of Stock at Given Exchange Rate $2.00/£ $2.20/£ 8,750 9,625 10,000 11,000 11,250 12,375 500 -500 Total Dollar Proceeds at Given Exchange Rate $2.00/£ 9,250 10,500 11,750
E1 E0
Dollar-Denominated Return (%) for Year End Exchange Rate $1.80/£ $2.00/£ $2.20/£ -21.25% -12.5% -3.75% -10.00% 0.0% 10.00% 1.25% 12.5% 23.75%
Price per Share (£) £35 £40 £45 c.
Loss of 2.45% relative to EAFE.
25-3Βιβλιοθήκη 8. 9.1 + r(US) = [1 + rf (UK)] × (F 0/E0) = 1.08 × (1.85/1.75) = 1.1417 ⇒ r(US) = 14.17% You can now purchase: $10,000/$1.75 = £5,714.29 This will grow with 8% interest to £6,171.43. Therefore, to lock in your return, you would sell forward £6,171.43 at the forward exchange rate.
7.
Currency Selection EAFE: [0.30 × (–10%)] + (0.10 × 0%) + (0.60 × 10%) = 3.0% Manager: [0.35 × (–10%)] + (0.15 × 0%) + (0.50 × 10%) = 1.5% Loss of 1.5% relative to EAFE. Country Selection EAFE: (0.30 × 20%) + (0.10 × 15%) + (0.60 × 25%) = 22.50% Manager: (0.35 × 20%) + (0.15 × 15%) + (0.50 × 25%) = 21.75% Loss of 0.75% relative to EAFE. Stock Selection [(18% – 20%) × 0.35] + [(20% – 15%) × 0.15] + [(20% – 25%) × 0.50] = – 2.45% 25-2
10. a.
The primary rationale is the opportunity for diversification. Factors that contribute to low correlations of stock returns across national boundaries are: i. imperfect correlation of business cycles ii. imperfect correlation of interest rates iii. imperfect correlation of inflation rates iv. exchange rate volatility Obstacles to international investing are: i. Availability of information, including insufficient data on which to base investment decisions. Interpreting and evaluating data that is different in form and/or content than the routinely available and widely understood U.S. data is difficult. Also, much foreign data is reported with a considerable lag. ii. Liquidity, in terms of the ability to buy or sell, in size and in a timely manner, without affecting the market price. Most foreign exchanges offer (relative to U.S. norms) limited trading, and experience greater price volatility. Moreover, only a (relatively) small number of individual foreign stocks enjoy liquidity comparable to that in the U.S., although this situation is improving steadily. iii. Transaction costs, particularly when viewed as a combination of commission plus spread plus market impact costs, are well above U.S. levels in most foreign markets. This, of course, adversely affects return realization. iv. Political risk. v. Foreign currency risk, although to a great extent, this can be hedged. The asset-class performance data for this particular period reveal that non-U.S. dollar bonds provided a small incremental return advantage over U.S. dollar bonds, but at a considerably higher level of risk. Each category of fixed income assets outperformed the S&P 500 Index measure of U.S. equity results with regard to both risk and return, which is certainly an unexpected outcome. Within the equity area, non-U.S. stocks, represented by the EAFE Index, outperformed U.S. stocks by a considerable margin with only slightly more risk. In contrast to U.S. equities, this asset category performed as it should relative to fixed income assets, providing more return for the higher risk involved. Concerning the Account Performance Index, its position on the graph reveals an aggregate outcome that is superior to the sum of its component parts. To some extent, this is due to the beneficial effect on performance resulting from multi-market diversification and the differential covariances involved. In this case, the portfolio manager(s) (apparently) achieved an on-balance positive alpha, adding to total portfolio