Segmented information dispersal (SID) for efficient reconstruction in fault-tolerant video

合集下载

联邦信息处理标准 -回复

联邦信息处理标准 -回复

联邦信息处理标准-回复联邦信息处理标准(FIPS)是美国政府机构国家标准与技术研究院(NIST)制定的一系列标准,旨在确保政府机构和合同商在处理信息时的安全性和一致性。

这些标准涵盖了信息安全、密码学、数据加密、网络安全等多个方面,是保护信息系统和数据安全的重要准则。

下面将一步一步回答有关FIPS的问题,并对其在信息处理中的重要性进行探讨。

第一步:FIPS的概述FIPS标准是由美国国家标准与技术研究院制定的一系列标准,最初于1977年发布。

随着技术的不断发展和信息安全威胁的不断增加,FIPS标准不断更新和修订,以适应当前的需求。

该标准的主要目的是确保联邦政府的信息系统和数据得到保护,同时还可以为私营部门等其他机构提供一个安全的框架。

第二步:FIPS的主要内容FIPS涵盖了众多领域的标准,其中包括:密码学算法和技术、数据加密标准、电子认证、访问控制、网络安全等。

其中,密码学算法和技术是FIPS 的核心内容之一,它涉及到了数据的机密性、完整性和可用性,以及对数据进行传输和存储时的保护。

另外,FIPS还包括了一些与硬件和软件相关的标准,旨在确保信息系统的安全性和一致性。

第三步:FIPS的重要性FIPS标准对于信息处理的重要性不言而喻。

首先,FIPS标准提供了一套安全性要求,可供政府机构和合同商使用,以确保他们的信息系统和数据得到充分的保护。

这些要求不仅可以提高数据的安全性,还可以帮助机构遵守相关的法律和法规,降低信息泄露和数据损坏的风险。

其次,FIPS标准可以为私营部门等其他机构提供一个参考框架,以确保他们的信息系统和数据得到良好的安全保护。

在当今数字化的时代,信息安全对于任何一个组织来说都是至关重要的。

通过遵守FIPS标准,组织可以建立起一个安全的信息处理环境,保护其核心业务和客户数据。

第四步:FIPS的影响FIPS标准对于信息处理的影响是持久的。

首先,FIPS标准的制定和修订是一个持续的过程,随着技术和威胁的变化,标准需要不断更新和适应。

中心化差分隐私定义

中心化差分隐私定义

中心化差分隐私定义1.引言1.1 概述概述部分的内容可以从以下几个方面展开:中心化差分隐私是一种隐私保护方法,旨在平衡数据的有效利用和个人隐私的保护。

在现代社会中,大量的个人数据被不同组织和机构收集和使用,为了保护个人隐私,中心化差分隐私被提出并得到广泛关注。

中心化差分隐私的定义是指在数据处理过程中,通过添加噪声或修改个体数据的方法,使得在数据收集者或数据处理者进行统计分析时,无法准确得到个体的具体信息,从而达到保护个人隐私的目的。

中心化差分隐私的核心思想是通过在数据处理过程中引入噪声,打破数据的准确性和关联性,从而模糊敏感个人信息,防止数据收集者或数据处理者推断出个体的隐私信息。

中心化差分隐私的应用范围广泛,适用于各种数据分析场景,包括但不限于医疗健康数据、金融交易数据、社交网络数据等。

通过采用中心化差分隐私技术,个体的隐私信息可以得到一定程度的保护,同时数据的有效利用和分析也能够得到保证。

本文将对中心化差分隐私的定义、要点以及相关算法进行详细介绍和分析,并探讨中心化差分隐私方法的优势、局限性及未来的发展方向。

希望通过阐述中心化差分隐私的概念和原理,可以增加人们对隐私保护的认识,并促进隐私保护技术在实际应用中的推广和发展。

1.2 文章结构文章结构的目的是为了让读者能清晰地了解整篇文章的布局和内容安排。

通过明确的结构,读者可以更好地理解作者的思路和逻辑,同时也能更方便地查找所需要的信息。

本篇文章的结构主要包括引言、正文和结论三个部分。

引言部分将在文章开始时对中心化差分隐私进行概述,并解释本文的目的和意义。

通过引言的铺垫,读者可以获得一定的背景信息,并对中心化差分隐私有一个初步的了解。

正文部分是本文的重点部分,将详细介绍中心化差分隐私的定义和要点。

其中,2.1节将对中心化差分隐私的定义进行详细解释,包括其基本概念、核心原理和相关概念的定义等内容。

2.2节将重点介绍中心化差分隐私的要点,包括其优势、应用场景、限制条件以及与其他隐私保护方法的比较等方面的内容。

基于矩阵机制的差分隐私连续数据发布方法

基于矩阵机制的差分隐私连续数据发布方法

基于矩阵机制的差分隐私连续数据发布方法
隐私保护和数据发布一直是当今社会关注的焦点问题。

随着网络
信息技术的发展,用户的数据越来越多,这些数据发布也成为当前研
究中的热点话题。

现实世界中,大多数文本数据都是连续性数据,如
位置信息、身份信息和病历等。

考虑到连续数据的特殊性,我们在研
究中提出了一种基于矩阵机制的差分隐私连续数据发布方法,旨在在
连续数据发布的同时保护用户的隐私和数据安全。

首先,将原始数据进行划分并建立矩阵,然后在矩阵的每个单元
格中清洗连续数据,计算矩阵中每个单元格中的差分隐私量,根据差
分隐私量决定矩阵中每个单元格的发布级别,即对连续数据添加噪声,使发布的数据更加模糊,从而保护用户的隐私。

在发布数据之前,我
们需要先确定矩阵维度的范围,即确定每个单元格的大小、每个矩阵
的大小等。

此外,我们还需要确定不同类型的数据的不同发布级别,
以保证发布的数据能够满足用户对隐私保护和数据安全的需求。

通过以上方法,可以有效地发布数据,同时保护用户的隐私。


方法可以用于许多领域,包括位置信息、健康信息、社交网络等,从
而使应用更加灵活,为用户提供更高分辨率的数据发布服务。

总之,本文提出的基于矩阵机制的差分隐私连续数据发布方法可
以有效地发布数据,同时保护用户的隐私,以满足不同应用场景和用
户需求,为社会科学研究提供更有价值的数据。

IEC-61854架空线.隔离层的要求和检验

IEC-61854架空线.隔离层的要求和检验

NORMEINTERNATIONALECEI IEC INTERNATIONALSTANDARD 61854Première éditionFirst edition1998-09Lignes aériennes –Exigences et essais applicables aux entretoisesOverhead lines –Requirements and tests for spacersCommission Electrotechnique InternationaleInternational Electrotechnical Commission Pour prix, voir catalogue en vigueurFor price, see current catalogue© IEC 1998 Droits de reproduction réservés Copyright - all rights reservedAucune partie de cette publication ne peut être reproduite niutilisée sous quelque forme que ce soit et par aucunprocédé, électronique ou mécanique, y compris la photo-copie et les microfilms, sans l'accord écrit de l'éditeur.No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical,including photocopying and microfilm, without permission in writing from the publisher.International Electrotechnical Commission 3, rue de Varembé Geneva, SwitzerlandTelefax: +41 22 919 0300e-mail: inmail@iec.ch IEC web site http: //www.iec.chCODE PRIX PRICE CODE X– 2 –61854 © CEI:1998SOMMAIREPages AVANT-PROPOS (6)Articles1Domaine d'application (8)2Références normatives (8)3Définitions (12)4Exigences générales (12)4.1Conception (12)4.2Matériaux (14)4.2.1Généralités (14)4.2.2Matériaux non métalliques (14)4.3Masse, dimensions et tolérances (14)4.4Protection contre la corrosion (14)4.5Aspect et finition de fabrication (14)4.6Marquage (14)4.7Consignes d'installation (14)5Assurance de la qualité (16)6Classification des essais (16)6.1Essais de type (16)6.1.1Généralités (16)6.1.2Application (16)6.2Essais sur échantillon (16)6.2.1Généralités (16)6.2.2Application (16)6.2.3Echantillonnage et critères de réception (18)6.3Essais individuels de série (18)6.3.1Généralités (18)6.3.2Application et critères de réception (18)6.4Tableau des essais à effectuer (18)7Méthodes d'essai (22)7.1Contrôle visuel (22)7.2Vérification des dimensions, des matériaux et de la masse (22)7.3Essai de protection contre la corrosion (22)7.3.1Composants revêtus par galvanisation à chaud (autres queles fils d'acier galvanisés toronnés) (22)7.3.2Produits en fer protégés contre la corrosion par des méthodes autresque la galvanisation à chaud (24)7.3.3Fils d'acier galvanisé toronnés (24)7.3.4Corrosion causée par des composants non métalliques (24)7.4Essais non destructifs (24)61854 © IEC:1998– 3 –CONTENTSPage FOREWORD (7)Clause1Scope (9)2Normative references (9)3Definitions (13)4General requirements (13)4.1Design (13)4.2Materials (15)4.2.1General (15)4.2.2Non-metallic materials (15)4.3Mass, dimensions and tolerances (15)4.4Protection against corrosion (15)4.5Manufacturing appearance and finish (15)4.6Marking (15)4.7Installation instructions (15)5Quality assurance (17)6Classification of tests (17)6.1Type tests (17)6.1.1General (17)6.1.2Application (17)6.2Sample tests (17)6.2.1General (17)6.2.2Application (17)6.2.3Sampling and acceptance criteria (19)6.3Routine tests (19)6.3.1General (19)6.3.2Application and acceptance criteria (19)6.4Table of tests to be applied (19)7Test methods (23)7.1Visual examination (23)7.2Verification of dimensions, materials and mass (23)7.3Corrosion protection test (23)7.3.1Hot dip galvanized components (other than stranded galvanizedsteel wires) (23)7.3.2Ferrous components protected from corrosion by methods other thanhot dip galvanizing (25)7.3.3Stranded galvanized steel wires (25)7.3.4Corrosion caused by non-metallic components (25)7.4Non-destructive tests (25)– 4 –61854 © CEI:1998 Articles Pages7.5Essais mécaniques (26)7.5.1Essais de glissement des pinces (26)7.5.1.1Essai de glissement longitudinal (26)7.5.1.2Essai de glissement en torsion (28)7.5.2Essai de boulon fusible (28)7.5.3Essai de serrage des boulons de pince (30)7.5.4Essais de courant de court-circuit simulé et essais de compressionet de traction (30)7.5.4.1Essai de courant de court-circuit simulé (30)7.5.4.2Essai de compression et de traction (32)7.5.5Caractérisation des propriétés élastiques et d'amortissement (32)7.5.6Essais de flexibilité (38)7.5.7Essais de fatigue (38)7.5.7.1Généralités (38)7.5.7.2Oscillation de sous-portée (40)7.5.7.3Vibrations éoliennes (40)7.6Essais de caractérisation des élastomères (42)7.6.1Généralités (42)7.6.2Essais (42)7.6.3Essai de résistance à l'ozone (46)7.7Essais électriques (46)7.7.1Essais d'effet couronne et de tension de perturbations radioélectriques..467.7.2Essai de résistance électrique (46)7.8Vérification du comportement vibratoire du système faisceau/entretoise (48)Annexe A (normative) Informations techniques minimales à convenirentre acheteur et fournisseur (64)Annexe B (informative) Forces de compression dans l'essai de courantde court-circuit simulé (66)Annexe C (informative) Caractérisation des propriétés élastiques et d'amortissementMéthode de détermination de la rigidité et de l'amortissement (70)Annexe D (informative) Contrôle du comportement vibratoire du systèmefaisceau/entretoise (74)Bibliographie (80)Figures (50)Tableau 1 – Essais sur les entretoises (20)Tableau 2 – Essais sur les élastomères (44)61854 © IEC:1998– 5 –Clause Page7.5Mechanical tests (27)7.5.1Clamp slip tests (27)7.5.1.1Longitudinal slip test (27)7.5.1.2Torsional slip test (29)7.5.2Breakaway bolt test (29)7.5.3Clamp bolt tightening test (31)7.5.4Simulated short-circuit current test and compression and tension tests (31)7.5.4.1Simulated short-circuit current test (31)7.5.4.2Compression and tension test (33)7.5.5Characterisation of the elastic and damping properties (33)7.5.6Flexibility tests (39)7.5.7Fatigue tests (39)7.5.7.1General (39)7.5.7.2Subspan oscillation (41)7.5.7.3Aeolian vibration (41)7.6Tests to characterise elastomers (43)7.6.1General (43)7.6.2Tests (43)7.6.3Ozone resistance test (47)7.7Electrical tests (47)7.7.1Corona and radio interference voltage (RIV) tests (47)7.7.2Electrical resistance test (47)7.8Verification of vibration behaviour of the bundle-spacer system (49)Annex A (normative) Minimum technical details to be agreed betweenpurchaser and supplier (65)Annex B (informative) Compressive forces in the simulated short-circuit current test (67)Annex C (informative) Characterisation of the elastic and damping propertiesStiffness-Damping Method (71)Annex D (informative) Verification of vibration behaviour of the bundle/spacer system (75)Bibliography (81)Figures (51)Table 1 – Tests on spacers (21)Table 2 – Tests on elastomers (45)– 6 –61854 © CEI:1998 COMMISSION ÉLECTROTECHNIQUE INTERNATIONALE––––––––––LIGNES AÉRIENNES –EXIGENCES ET ESSAIS APPLICABLES AUX ENTRETOISESAVANT-PROPOS1)La CEI (Commission Electrotechnique Internationale) est une organisation mondiale de normalisation composéede l'ensemble des comités électrotechniques nationaux (Comités nationaux de la CEI). La CEI a pour objet de favoriser la coopération internationale pour toutes les questions de normalisation dans les domaines de l'électricité et de l'électronique. A cet effet, la CEI, entre autres activités, publie des Normes internationales.Leur élaboration est confiée à des comités d'études, aux travaux desquels tout Comité national intéressé par le sujet traité peut participer. Les organisations internationales, gouvernementales et non gouvernementales, en liaison avec la CEI, participent également aux travaux. La CEI collabore étroitement avec l'Organisation Internationale de Normalisation (ISO), selon des conditions fixées par accord entre les deux organisations.2)Les décisions ou accords officiels de la CEI concernant les questions techniques représentent, dans la mesuredu possible un accord international sur les sujets étudiés, étant donné que les Comités nationaux intéressés sont représentés dans chaque comité d’études.3)Les documents produits se présentent sous la forme de recommandations internationales. Ils sont publiéscomme normes, rapports techniques ou guides et agréés comme tels par les Comités nationaux.4)Dans le but d'encourager l'unification internationale, les Comités nationaux de la CEI s'engagent à appliquer defaçon transparente, dans toute la mesure possible, les Normes internationales de la CEI dans leurs normes nationales et régionales. Toute divergence entre la norme de la CEI et la norme nationale ou régionale correspondante doit être indiquée en termes clairs dans cette dernière.5)La CEI n’a fixé aucune procédure concernant le marquage comme indication d’approbation et sa responsabilitén’est pas engagée quand un matériel est déclaré conforme à l’une de ses normes.6) L’attention est attirée sur le fait que certains des éléments de la présente Norme internationale peuvent fairel’objet de droits de propriété intellectuelle ou de droits analogues. La CEI ne saurait être tenue pour responsable de ne pas avoir identifié de tels droits de propriété et de ne pas avoir signalé leur existence.La Norme internationale CEI 61854 a été établie par le comité d'études 11 de la CEI: Lignes aériennes.Le texte de cette norme est issu des documents suivants:FDIS Rapport de vote11/141/FDIS11/143/RVDLe rapport de vote indiqué dans le tableau ci-dessus donne toute information sur le vote ayant abouti à l'approbation de cette norme.L’annexe A fait partie intégrante de cette norme.Les annexes B, C et D sont données uniquement à titre d’information.61854 © IEC:1998– 7 –INTERNATIONAL ELECTROTECHNICAL COMMISSION––––––––––OVERHEAD LINES –REQUIREMENTS AND TESTS FOR SPACERSFOREWORD1)The IEC (International Electrotechnical Commission) is a worldwide organization for standardization comprisingall national electrotechnical committees (IEC National Committees). The object of the IEC is to promote international co-operation on all questions concerning standardization in the electrical and electronic fields. To this end and in addition to other activities, the IEC publishes International Standards. Their preparation is entrusted to technical committees; any IEC National Committee interested in the subject dealt with may participate in this preparatory work. International, governmental and non-governmental organizations liaising with the IEC also participate in this preparation. The IEC collaborates closely with the International Organization for Standardization (ISO) in accordance with conditions determined by agreement between the two organizations.2)The formal decisions or agreements of the IEC on technical matters express, as nearly as possible, aninternational consensus of opinion on the relevant subjects since each technical committee has representation from all interested National Committees.3)The documents produced have the form of recommendations for international use and are published in the formof standards, technical reports or guides and they are accepted by the National Committees in that sense.4)In order to promote international unification, IEC National Committees undertake to apply IEC InternationalStandards transparently to the maximum extent possible in their national and regional standards. Any divergence between the IEC Standard and the corresponding national or regional standard shall be clearly indicated in the latter.5)The IEC provides no marking procedure to indicate its approval and cannot be rendered responsible for anyequipment declared to be in conformity with one of its standards.6) Attention is drawn to the possibility that some of the elements of this International Standard may be the subjectof patent rights. The IEC shall not be held responsible for identifying any or all such patent rights. International Standard IEC 61854 has been prepared by IEC technical committee 11: Overhead lines.The text of this standard is based on the following documents:FDIS Report on voting11/141/FDIS11/143/RVDFull information on the voting for the approval of this standard can be found in the report on voting indicated in the above table.Annex A forms an integral part of this standard.Annexes B, C and D are for information only.– 8 –61854 © CEI:1998LIGNES AÉRIENNES –EXIGENCES ET ESSAIS APPLICABLES AUX ENTRETOISES1 Domaine d'applicationLa présente Norme internationale s'applique aux entretoises destinées aux faisceaux de conducteurs de lignes aériennes. Elle recouvre les entretoises rigides, les entretoises flexibles et les entretoises amortissantes.Elle ne s'applique pas aux espaceurs, aux écarteurs à anneaux et aux entretoises de mise à la terre.NOTE – La présente norme est applicable aux pratiques de conception de lignes et aux entretoises les plus couramment utilisées au moment de sa rédaction. Il peut exister d'autres entretoises auxquelles les essais spécifiques décrits dans la présente norme ne s'appliquent pas.Dans de nombreux cas, les procédures d'essai et les valeurs d'essai sont convenues entre l'acheteur et le fournisseur et sont énoncées dans le contrat d'approvisionnement. L'acheteur est le mieux à même d'évaluer les conditions de service prévues, qu'il convient d'utiliser comme base à la définition de la sévérité des essais.La liste des informations techniques minimales à convenir entre acheteur et fournisseur est fournie en annexe A.2 Références normativesLes documents normatifs suivants contiennent des dispositions qui, par suite de la référence qui y est faite, constituent des dispositions valables pour la présente Norme internationale. Au moment de la publication, les éditions indiquées étaient en vigueur. Tout document normatif est sujet à révision et les parties prenantes aux accords fondés sur la présente Norme internationale sont invitées à rechercher la possibilité d'appliquer les éditions les plus récentes des documents normatifs indiqués ci-après. Les membres de la CEI et de l'ISO possèdent le registre des Normes internationales en vigueur.CEI 60050(466):1990, Vocabulaire Electrotechnique International (VEI) – Chapitre 466: Lignes aériennesCEI 61284:1997, Lignes aériennes – Exigences et essais pour le matériel d'équipementCEI 60888:1987, Fils en acier zingué pour conducteurs câblésISO 34-1:1994, Caoutchouc vulcanisé ou thermoplastique – Détermination de la résistance au déchirement – Partie 1: Eprouvettes pantalon, angulaire et croissantISO 34-2:1996, Caoutchouc vulcanisé ou thermoplastique – Détermination de la résistance au déchirement – Partie 2: Petites éprouvettes (éprouvettes de Delft)ISO 37:1994, Caoutchouc vulcanisé ou thermoplastique – Détermination des caractéristiques de contrainte-déformation en traction61854 © IEC:1998– 9 –OVERHEAD LINES –REQUIREMENTS AND TESTS FOR SPACERS1 ScopeThis International Standard applies to spacers for conductor bundles of overhead lines. It covers rigid spacers, flexible spacers and spacer dampers.It does not apply to interphase spacers, hoop spacers and bonding spacers.NOTE – This standard is written to cover the line design practices and spacers most commonly used at the time of writing. There may be other spacers available for which the specific tests reported in this standard may not be applicable.In many cases, test procedures and test values are left to agreement between purchaser and supplier and are stated in the procurement contract. The purchaser is best able to evaluate the intended service conditions, which should be the basis for establishing the test severity.In annex A, the minimum technical details to be agreed between purchaser and supplier are listed.2 Normative referencesThe following normative documents contain provisions which, through reference in this text, constitute provisions of this International Standard. At the time of publication of this standard, the editions indicated were valid. All normative documents are subject to revision, and parties to agreements based on this International Standard are encouraged to investigate the possibility of applying the most recent editions of the normative documents indicated below. Members of IEC and ISO maintain registers of currently valid International Standards.IEC 60050(466):1990, International Electrotechnical vocabulary (IEV) – Chapter 466: Overhead linesIEC 61284:1997, Overhead lines – Requirements and tests for fittingsIEC 60888:1987, Zinc-coated steel wires for stranded conductorsISO 34-1:1994, Rubber, vulcanized or thermoplastic – Determination of tear strength – Part 1: Trouser, angle and crescent test piecesISO 34-2:1996, Rubber, vulcanized or thermoplastic – Determination of tear strength – Part 2: Small (Delft) test piecesISO 37:1994, Rubber, vulcanized or thermoplastic – Determination of tensile stress-strain properties– 10 –61854 © CEI:1998 ISO 188:1982, Caoutchouc vulcanisé – Essais de résistance au vieillissement accéléré ou à la chaleurISO 812:1991, Caoutchouc vulcanisé – Détermination de la fragilité à basse températureISO 815:1991, Caoutchouc vulcanisé ou thermoplastique – Détermination de la déformation rémanente après compression aux températures ambiantes, élevées ou bassesISO 868:1985, Plastiques et ébonite – Détermination de la dureté par pénétration au moyen d'un duromètre (dureté Shore)ISO 1183:1987, Plastiques – Méthodes pour déterminer la masse volumique et la densitérelative des plastiques non alvéolairesISO 1431-1:1989, Caoutchouc vulcanisé ou thermoplastique – Résistance au craquelage par l'ozone – Partie 1: Essai sous allongement statiqueISO 1461,— Revêtements de galvanisation à chaud sur produits finis ferreux – Spécifications1) ISO 1817:1985, Caoutchouc vulcanisé – Détermination de l'action des liquidesISO 2781:1988, Caoutchouc vulcanisé – Détermination de la masse volumiqueISO 2859-1:1989, Règles d'échantillonnage pour les contrôles par attributs – Partie 1: Plans d'échantillonnage pour les contrôles lot par lot, indexés d'après le niveau de qualité acceptable (NQA)ISO 2859-2:1985, Règles d'échantillonnage pour les contrôles par attributs – Partie 2: Plans d'échantillonnage pour les contrôles de lots isolés, indexés d'après la qualité limite (QL)ISO 2921:1982, Caoutchouc vulcanisé – Détermination des caractéristiques à basse température – Méthode température-retrait (essai TR)ISO 3417:1991, Caoutchouc – Détermination des caractéristiques de vulcanisation à l'aide du rhéomètre à disque oscillantISO 3951:1989, Règles et tables d'échantillonnage pour les contrôles par mesures des pourcentages de non conformesISO 4649:1985, Caoutchouc – Détermination de la résistance à l'abrasion à l'aide d'un dispositif à tambour tournantISO 4662:1986, Caoutchouc – Détermination de la résilience de rebondissement des vulcanisats––––––––––1) A publierThis is a preview - click here to buy the full publication61854 © IEC:1998– 11 –ISO 188:1982, Rubber, vulcanized – Accelerated ageing or heat-resistance testsISO 812:1991, Rubber, vulcanized – Determination of low temperature brittlenessISO 815:1991, Rubber, vulcanized or thermoplastic – Determination of compression set at ambient, elevated or low temperaturesISO 868:1985, Plastics and ebonite – Determination of indentation hardness by means of a durometer (Shore hardness)ISO 1183:1987, Plastics – Methods for determining the density and relative density of non-cellular plasticsISO 1431-1:1989, Rubber, vulcanized or thermoplastic – Resistance to ozone cracking –Part 1: static strain testISO 1461, — Hot dip galvanized coatings on fabricated ferrous products – Specifications1)ISO 1817:1985, Rubber, vulcanized – Determination of the effect of liquidsISO 2781:1988, Rubber, vulcanized – Determination of densityISO 2859-1:1989, Sampling procedures for inspection by attributes – Part 1: Sampling plans indexed by acceptable quality level (AQL) for lot-by-lot inspectionISO 2859-2:1985, Sampling procedures for inspection by attributes – Part 2: Sampling plans indexed by limiting quality level (LQ) for isolated lot inspectionISO 2921:1982, Rubber, vulcanized – Determination of low temperature characteristics –Temperature-retraction procedure (TR test)ISO 3417:1991, Rubber – Measurement of vulcanization characteristics with the oscillating disc curemeterISO 3951:1989, Sampling procedures and charts for inspection by variables for percent nonconformingISO 4649:1985, Rubber – Determination of abrasion resistance using a rotating cylindrical drum deviceISO 4662:1986, Rubber – Determination of rebound resilience of vulcanizates–––––––––1) To be published.。

d-s 法 -回复

d-s 法 -回复

d-s 法-回复数据科学在当今社会中扮演着越来越重要的角色。

它的应用涉及到各个领域,从医疗保健到金融,甚至到社交媒体和流行趋势预测。

在本篇文章中,我将详细介绍数据科学的概念、其在现实生活中的应用以及如何步步为营的进行数据科学工作。

首先,让我们明确数据科学的概念。

数据科学是一门综合性学科,结合了数学、统计学、计算机科学和领域知识,旨在通过对大数据集的分析和解释,发现其中的规律和模式。

数据科学家使用各种工具和技术,包括机器学习、人工智能和数据可视化,来理解和解释大数据中隐藏的信息。

数据科学的应用范围广泛,无处不在。

举例来说,在医疗保健领域,数据科学可以帮助医生和研究人员识别潜在的疾病风险因素,通过对大量病人数据的分析,推断出潜在的症状和病情变化的趋势。

这有助于改善诊断和治疗方法,提高病人的生活质量。

在金融领域,数据科学可以帮助银行和金融机构识别欺诈行为,通过分析海量的交易记录和个人资料,发现潜在的犯罪模式。

这种分析有助于及早发现欺诈行为,并采取相应的措施来防范和减少金融欺诈的发生。

此外,数据科学还可以用于社交媒体分析和流行趋势预测。

通过对社交媒体平台上的大数据进行分析,我们可以了解人们关注的话题和兴趣,并推断出潜在的流行趋势和消费者行为模式。

这对于企业制定市场营销策略和消费者行为研究非常有用。

那么,数据科学家如何步步为营地进行数据科学工作呢?首先,一个数据科学家需要具备数学、统计学和计算机科学方面的扎实基础。

这些基础知识是进行数据分析和建模的基础。

其次,数据科学家需要具备编程技能,能够使用编程语言如Python或R来处理和分析大数据集。

编程技能对于数据清洗和数据可视化非常关键。

在进行数据科学项目时,数据科学家需要遵循一套系统的方法。

这包括定义问题、收集数据、数据清洗和转换、建立模型、评估模型性能和解释结果。

数据科学家应该灵活运用不同的分析工具和技术,根据特定问题的要求选择合适的方法。

此外,一个成功的数据科学家还应该具备沟通和解释复杂信息的能力。

非线性薛定谔方程的五种差分格式

非线性薛定谔方程的五种差分格式

非线性薛定谔方程的五种差分格式非线性薛定谔方程(NLSE)是一类非常重要的和高度发达的信息传输研究的重要模型。

它的出现为很多无线通信的技术发展提供了重要的基础和参照。

目前,非线性薛定谔方程的差分格式已有五种。

它们是恒定折回差分格式(CFD),动态折回差分格式(DRFD),步进步函数差分格式(SDF),连续步函数差分格式(CDF)和多阶进步函数差分格式(MSDF)。

恒定折回差分格式(CFD)是用于解决非线性薛定谔方程的最简单的一种差分格式。

它最初由Lyons发明,是一种非标准的三点迭代形式,但比一般三点迭代形式更有效。

它的优点在于最大限度地减少了计算量,但它的准确性不高,偏离正确的解。

动态折回差分格式(DRFD)是用于解决非线性薛定谔方程的一种改进的差分格式。

它使用了非标准的五点迭代形式,比三点迭代形式更高效,可以很好地跟踪参数变化并准确地加以反映。

它在计算量上比CFD稍大,但其计算结果更加准确,离正确解更近。

步进函数差分格式(SDF)是用于解决非线性薛定谔方程的一种改进的五点迭代格式。

它在数值处理上有更低的计算量,而且能够比动态折回差分格式更准确地产生数值解。

连续步函数差分格式(CDF)是用于解决非线性薛定谔方程的一种七点迭代格式,它可以更准确地模拟无线信号传输状况。

它有较低的运算量,可以获得较高精度的解。

多阶步函数差分格式(MSDF)是用于解决非线性薛定谔方程的一种变阶函数形式,它可以更准确地模拟信号的非线性传输过程,同时具有低的运行复杂性和高的计算精度,减小了计算时间。

总之,非线性薛定谔方程的不同差分格式均有不同的特征,决定了它们之间的特点和性能差异,旨在满足不同信号处理需求。

segment anything 提示的用法 -回复

segment anything 提示的用法 -回复

segment anything 提示的用法-回复Segment Anything 提示的用法Segment Anything 是一种用于分割和划分数据的工具,在数据处理和分析领域中被广泛使用。

它具有强大的功能和灵活的应用方式,可以帮助用户轻松地对各种类型的数据进行切割、过滤和分组。

本文将以Segment Anything 提示的用法为主题,逐步解释其使用方法和实际应用。

首先,我们需要明确一些基本概念和术语。

Segment Anything 的核心概念是“segment”,即一组互相关联的数据。

这些数据可以是同一类别的,也可以是根据某种特定条件所划分的。

一个segment 可以包含一个或多个数据点,每个数据点可以包含多个属性。

在使用Segment Anything 的过程中,我们需要确定segment 的划分依据,并给出相应的过滤条件。

Segment Anything 提供了多种划分方法和过滤条件,以适应不同的应用需求。

其中最常用的方法之一是基于时间的划分。

我们可以根据数据的时间戳将其划分为不同的时间段,例如按天、按周或按月。

这一划分方式适用于时间序列数据的分析和预测。

另外,我们还可以根据其他属性,如地理位置、用户类型等,将数据进行分组和切割。

在使用Segment Anything 进行数据处理时,我们可以先定义一个segment 的模板。

模板是用来描述segment 的属性和过滤条件的规则集合。

通过定义模板,我们可以实现对数据的精确分类和筛选。

例如,假设我们有一个包含销售数据的数据库,我们可以定义一个模板,指定销售额大于1000的数据为一个segment,指定销售渠道为线上的数据为另一个segment。

这样,我们就可以轻松地对数据进行切割和分析,以获得更准确的结果。

Segment Anything 还支持对segment 进行聚合和汇总操作,以便更好地理解数据。

我们可以将多个segment 合并成一个更大的segment,或者在segment 中汇总各个属性的数据。

2024年电信5G基站建设理论考试题库(附答案)

2024年电信5G基站建设理论考试题库(附答案)

2024年电信5G基站建设理论考试题库(附答案)一、单选题1.在赛事保障值守过程中,出现网络突发故障,需要启用红黄蓝应急预案进行应急保障,确保快速处理和恢复。

红黄蓝应急预案的应急逻辑顺序为()A、网络安全->用户感知->网络性能B、网络性能->用户感知->网络安全C、用户感知->网络安全->网络性能D、用户感知->网络性能->网络安全参考答案:D2.2.1G规划,通过制定三步走共享实施方案,降配置,省TCO不包含哪项工作?A、低业务小区并网B、低业务小区关小区C、低业务小区拆小区D、高业务小区覆盖增强参考答案:D3.Type2-PDCCHmonsearchspaceset是用于()。

A、A)OthersysteminformationB、B)PagingC、C)RARD、D)RMSI参考答案:B4.SRIOV与OVS谁的转发性能高A、OVSB、SRIOVC、一样D、分场景,不一定参考答案:B5.用NR覆盖高层楼宇时,NR广播波束场景化建议配置成以下哪项?A、SCENARTO_1B、SCENARIO_0C、SCENARIO_13D、SCENARIO_6参考答案:C6.NR的频域资源分配使用哪种方式?A、仅在低层配置(非RRC)B、使用k0、k1和k2参数以实现分配灵活性C、使用SLIV控制符号级别的分配D、使用与LTE非常相似的RIV或bitmap分配参考答案:D7.SDN控制器可以使用下列哪种协议来发现SDN交换机之间的链路?A、HTTPB、BGPC、OSPFD、LLDP参考答案:D8.NR协议规定,采用Min-slot调度时,支持符号长度不包括哪种A、2B、4C、7D、9参考答案:D9.5G控制信道采用预定义的权值会生成以下那种波束?A、动态波束B、静态波束C、半静态波束D、宽波束参考答案:B10.TS38.211ONNR是下面哪个协议()A、PhysicalchannelsandmodulationB、NRandNG-RANOverallDescriptionC、RadioResourceControl(RRC)ProtocolD、BaseStation(BS)radiotransmissionandreception参考答案:A11.在NFV架构中,哪个组件完成网络服务(NS)的生命周期管理?A、NFV-OB、VNF-MC、VIMD、PIM参考答案:A12.5G需要满足1000倍的传输容量,则需要在多个维度进行提升,不包括下面哪个()A、更高的频谱效率B、更多的站点C、更多的频谱资源D、更低的传输时延参考答案:D13.GW-C和GW-U之间采用Sx接口,采用下列哪种协议A、GTP-CB、HTTPC、DiameterD、PFCP参考答案:D14.NR的频域资源分配使用哪种方式?A、仅在低层配置(非RRC)B、使用k0、k1和k2参数以实现分配灵活性C、使用SLIV控制符号级别的分配D、使用与LTE非常相似的RIV或bitmap分配参考答案:D15.下列哪个开源项目旨在将电信中心机房改造为下一代数据中心?A、OPNFVB、ONFC、CORDD、OpenDaylight参考答案:C16.NR中LongTruncated/LongBSR的MACCE包含几个bit()A、4B、8C、2D、6参考答案:B17.对于SCS120kHz,一个子帧内包含几个SlotA、1B、2C、4D、8参考答案:D18.SA组网中,UE做小区搜索的第一步是以下哪项?A、获取小区其他信息B、获取小区信号质量C、帧同步,获取PCI组编号D、半帧同步,获取PCI组内ID参考答案:D19.SA组网时,5G终端接入时需要选择融合网关,融合网关在DNS域名的'app-protocol'name添加什么后缀?A、+nc-nrB、+nr-ncC、+nr-nrD、+nc-nc参考答案:A20.NSAOption3x组网时,语音业务适合承载以下哪个承载上A、MCGBearB、SCGBearC、MCGSplitBearD、SCGSplitBear参考答案:A21.5G需要满足1000倍的传输容量,则需要在多个维度进行提升,不包括下面哪个()A、更高的频谱效率B、更多的站点C、更多的频谱资源D、更低的传输时延参考答案:D22.以SCS30KHz,子帧配比7:3为例,1s内调度次数多少次,其中下行多少次。

医疗数据隐私保护中的差分隐私算法使用方法

医疗数据隐私保护中的差分隐私算法使用方法

医疗数据隐私保护中的差分隐私算法使用方法医疗数据的隐私保护一直是一个备受关注的问题。

随着现代医疗领域中数据的不断增长和智能医疗的广泛应用,如何有效保护患者的隐私,同时又能够充分利用这些数据进行研究和分析,成为了一个迫切需要解决的难题。

差分隐私算法作为目前较为常用的隐私保护方法之一,已经在医疗数据隐私保护中得到广泛应用。

差分隐私算法是一种通过对原始数据进行噪声添加的方式来保护数据隐私的方法。

简单来说,差分隐私通过给每个个体数据添加一定的噪声,使得在其加入计算和分析之后,无法准确推断出其中任何一个个体数据的具体信息。

这种方法可以在一定程度上保证数据的隐私性,同时又不会完全破坏数据的可用性,从而保护医疗数据的隐私。

在医疗数据隐私保护中,使用差分隐私算法的方法主要可以分为两类:加噪和扰动查询。

下面,我将针对这两个方面,介绍差分隐私算法在医疗数据中的使用方法。

首先是加噪。

加噪方法是差分隐私算法中最常用的一种方法,其核心思想是在每个个体数据上添加一定的噪声。

这些噪声可以是随机噪声,也可以是根据具体数据特征进行设计的噪声。

加噪方法保护数据隐私的关键在于,加入数据集的每个个体数据都被破坏了一定程度的准确性,从而保护了数据本身的隐私。

在医疗数据隐私保护中,常见的差分隐私加噪方法有拉普拉斯机制和指数机制。

拉普拉斯机制是一种基于拉普拉斯分布的加噪方法,其特点是能够保护数据的隐私性,同时还能够保证数据的可用性。

具体来说,拉普拉斯机制通过在每个个体数据上加入拉普拉斯噪声来保护数据隐私。

这种方法的优点是简单易实现,同时能够提供较好的隐私保护效果。

在医疗数据隐私保护中,拉普拉斯机制可以应用于一些常见的数据分析任务,如聚合查询、数据挖掘等。

指数机制是一种基于指数分布的加噪方法,其特点是能够根据数据敏感度的不同,为每个个体数据添加不同程度的噪声。

具体来说,指数机制通过根据个体数据的敏感度来计算每个个体数据的贡献量,再根据其贡献量来为个体数据添加噪声。

LWIP中文手册

LWIP中文手册
和缓冲管理系统。还包括LWIP API的参考手册和使用LWIP 的一些代码例子。
目录 1 Introduction …………………………………………………………………………………………..1 2 Protocol layering ……………………………………………………………………………………..1 3 Overview ……………………………………………………………………………………………...2 4 Process model ……………………………………………stem emulation layer ……………………………………………………………...3 6 Buffer and memory management……………………………..…………………………….. ……...3 6.1 Packet buffers -pbufs………………………………………………………………………………3 6.2 Memory management………………………………………………………………………………..5 7 Network interfaces…………………………………………….……………………………… ……..5 8 IP processing………………………………………………….……………………………………… 7 8.1 Receiving packets…………………………………………………………………………………….7 8.2 Sending packets………………………………………………………………………………………7 8.3 Forwarding packets…………………………………………………………………………………..8 8.4 ICMP processing …………………………………………………………………………………….8 9 UDP processing……………………………………………………………………………….. ……...8 10 TCP processing……………………………………………………………………………… ……...9 10.1 Overview……………………………………………………………………………………………9 10.2 Data structures……………………………………………………………………………………..10

sid光谱信息散度 matlab

sid光谱信息散度 matlab

尊敬的读者:我将介绍一下SID光谱信息散度和Matlab之间的关系。

我将详细阐述如何在Matlab中使用SID光谱信息散度进行图像处理和分析。

我将展示一些实际应用案例,以便读者更好地理解SID光谱信息散度在Matlab中的应用。

一、SID光谱信息散度简介1.1 SID光谱信息散度的概念SID(Spectral Information Divergence)光谱信息散度是一种用于评估图像质量的指标,它可以衡量两幅图像之间的相似度。

SID光谱信息散度的计算是基于图像的光谱信息,包括颜色、亮度等方面的特征。

通过比较两幅图像的光谱信息散度,我们可以得出它们之间的相似度,从而进行进一步的图像处理和分析。

1.2 SID光谱信息散度的作用SID光谱信息散度在图像处理领域有着广泛的应用,它可以用于图像压缩、图像复原、图像分割等方面。

通过计算图像之间的光谱信息散度,我们可以在一定程度上评估图像的质量,从而选择合适的图像处理方法,提高图像处理的效率和质量。

1.3 SID光谱信息散度的计算方法SID光谱信息散度的计算方法较为复杂,它涉及到图像的光谱信息提取、距离度量、特征匹配等多个方面的计算。

一般来说,我们可以利用Matlab等图像处理软件来进行SID光谱信息散度的计算,通过已有的函数或者自行编写程序来实现。

二、Matlab中的SID光谱信息散度计算2.1 Matlab中的光谱信息提取在Matlab中,我们可以利用各种图像处理工具包来提取图像的光谱信息,比如RGB颜色空间、YUV颜色空间等。

通过Matlab提供的函数,我们可以轻松获取图像的各种光谱信息,并进行后续的处理和分析。

2.2 Matlab中的距离度量在计算SID光谱信息散度时,距离度量是一个重要的环节。

Matlab中提供了丰富的距离度量函数,比如欧氏距离、曼哈顿距离、切比雪夫距离等。

我们可以根据具体的需求,选择合适的距离度量方法来计算图像之间的光谱信息散度。

diameter信令的code

diameter信令的code

diameter信令的code
Diameter协议中的信息元素都有其对应的编码方式。

编码方式可以是定长编码或变长编码。

定长编码指的是信息元素占据固定长度的字节流。

例如,对于一个占据4个字节的整数类型信息元素,其编码方式就是定长编码。

变长编码指的是信息元素占据可变长度的字节流。

例如,对于一个字符串类型信息元素,其编码方式就是变长编码。

Diameter协议中的编码方式还包括了基本类型和组合类型。

基本类型指的是Diameter协议中定义的原始数据类型,如整数、字符串等。

组合类型指的是由多个基本类型组成的信息元素,如
AVP(Grouped)信息元素。

在Diameter协议中,信息元素的编码顺序与解码顺序是相反的。

发送方首先对信息元素进行编码,然后将编码后的字节流按照逆序传递到接收方,接收方再对字节流进行解码,恢复出信息元素的值。

Diameter信令的code的正确实现对于Diameter协议的正确使用至关重要。

不同的实现可能采用不同的编码方式和顺序,因此,Diameter协议的实现必须遵循Diameter协议规范中的相关规定。

- 1 -。

昆虫学常用名称(骆)

昆虫学常用名称(骆)

1 昆虫学(1)基本词汇生理和解剖:Transverse section of abdom of an insect体腔body cavity血腔haemocoele血淋巴haemolymph背血管dorsal vessel=大动脉aorta+心脏heart背膈dorsal diaphragm腹膈ventral diaphragm背血窦(围心窦)dorsal sinus围脏窦periviseeral sinus腹血窦ventral sinus 腹神经索ventral nerve cord脂肪体fat-body消化系统digestive system消化和营养digestion and nutrition消化道alimentary canal口mouthpart食道oesophagus嗉囊crop前胃proventriculus胃盲囊caecum(caeca)中肠mid-gut后肠small intestine (hind gut)回肠ileum结肠colon直肠rectum马氏管Malpighian tubes胃stomach滤室filter chamber环肌circular muscles纵肌longitudimal muscles激食要素phagostimalant蛋白质protein氨基酸amino acid糖sugar脂肪fat 维生素vitamin无机质inorgaic iron唾液腺salivary gland酯酶esterase(短链)脂酶lipase (长链)体壁body wall=tegument基膜basement membrane真皮层epidermis表皮层cuticle内表皮endocuticle外表皮exocuticle上表皮epicuticle蜕皮腺ecdysial gland膜原细胞tormogen cell毛原细胞trichogen cell几丁质chitin多元酚polyphenol氧化酶oxidase硬化harden暗化darken色素pigment黑色素melain pigment类胡萝卜素carotenoid(orange)蝶啶(是一类荧光色素)pterin(fluorescent pigment) 渗透性permeability外骨骼skeleton电解质electrolyte表皮内突ingrowth capodemes= endeskeleton表皮外突outgrowth非细胞外突non-cellular outgrowth微毛microtrichia细胞性外突cellular outgrowth单细胞外突unicellular outgrowth刚毛setae毒毛poisonous hair鳞片scale多单细胞外突刺stab=thorn距spur色素色=化学色pigment color=chemical color鳞片scale结构色=光学色strucrual color=chemical color折射refract散射scatter反散reflect脊椎动物vertebrate无脊椎动物inverterate呼吸系统respiratory system呼吸respiration气管系统tracheal system=管状内陷物tabule invagination气门spiracles 气管trachea 分级气管intracellulav tracheloes气管口tracheal orifice气管腔atrium=tracheal背纵干dorsal longitudinal trunks侧纵干secondary longitudinal trunks腹纵干ventral longitudiaual trunks背气管dorsal trachea内脏管visceral trachea物理腮physical gill循环系统circilatory system肌肉系统muscular system神经系统nervous system神经原=神经细胞neurones=nerve cell突触synapses中枢神经系统central nervous system交感神经系统sympathelic nervous system周缘神经系统peripheral nervous system前脑protocerebrum视叶optic lobe中脑deutocerebrum后脑tritocerebrum静息电位resting potential动作电位action potential昆虫激素和外激素昆虫激素insect hormone:由内分泌器官分泌的、具有高度活性的微量化学物质。

SID概述

SID概述

共享信息与数据模型(SID)概述NGOSS提供了一整套的方法论来指导OSSfBSS的设计与建立,它的核心设计思想是利坩“流程驱动”,系统设计时首先从流程分析开始,分析自己企业的核心业务流程:然后通过分析流程,提炼出所有关键的数据,利用共享信息模型将数据进行抽象,划分为不同的管理域建立共享的数据模型;最后根据共享的数据模型组建实际的OSS/BSS系统。

数据是 OSS/BSS设计中最重要的特性,成功建立0SS/BSS系统关键是有一个好的共享信息模型。

因此,NGOSS提供了共享信息模型的通用框架——sID。

我们首先看下NGOSS知识体系,如图2.34所示。

它被用来对内部的规则和实例进行编码。

这样就形成了四个不咧的视图:业务、系统、实现和开发。

每个视图都关注一个特殊的体系,相卫.关联衔接的四个视图就构成了NGOSS体系架构。

SID是NGOSS提出的建立共享信息模型的通用框架,SID分别从业务和系统两个视图描述了共享信息模型。

一方面,SID从业务视图出发,以cTOMLevel 0定义的业务处理模型为基础,依据对商业过程中涉及的各种业务信息的抽象和分析,定义厂各种可聚合的实体 ABE以及各种业务实体BE,并将它们划分为不同的管理域,从而最大限度地实现信息和数据的共享。

另一方面,SID从组建BSS /OSS系统的视点出发,对各种业务实体的属性进行定义,并利用UML将它们有机地组合在‘起,形成UML模型,从而为设计用于实现BSS/OSS系统实际使用的共享数据模型提供参考模型。

综上所述,SID足业务和系统的实体定义和1 3M1.模犁的有组织的集合。

在业务视图中,eTOM和SID主要关注业务层面的目标、过程、实体以及交互。

视图定义了业务过程和信息实体,以支撑业务目标的实现。

在系统视图中,SID、eTOM以及NGOSS体系架构主要描述了系统的几个方面:对象、行为、计算的互操作。

在这里,SID更为详细地描述了业务视图中定义的结构,并H.为了支持这个视图还定义了新的结构,这使得业务过程变得更加完善。

ISO 11992-4-2005

ISO 11992-4-2005

ICS 43.040.15 Ref. No. ISO 11992-4:2005/Cor.1:2006(E)© ISO 2006 – All rights reservedPublished in SwitzerlandINTERNATIONAL STANDARD ISO 11992-4:2005TECHNICAL CORRIGENDUM 1Published 2006-05-15INTERNATIONAL ORGANIZATION FOR STANDARDIZATION • МЕЖДУНАРОДНАЯ ОРГАНИЗАЦИЯ ПО СТАНДАРТИЗАЦИИ • ORGANISATION INTERNATIONALE DE NORMALISATIONRoad vehicles — Interchange of digital information on electrical connections between towing and towed vehicles —Part 4:DiagnosticsTECHNICAL CORRIGENDUM 1Véhicules routiers — Échange d'informations numériques sur les connexions électriques entre véhicules tracteurs et véhicules tractés —Partie 4: DiagnosticsRECTIFICATIF TECHNIQUE 1Technical Corrigendum 1 to ISO 11992-4:2005 was prepared by Technical Committee ISO/TC 22, Road vehicles , Subcommittee SC 3, Electrical and electronic equipment.ISO 11992-4:2005/Cor.1:2006(E)Page 6, subclause 5.4.3Replace Figure 3 with the following:Figure 3 — Client service state diagram — Service request with physical server target address2 ©ISO 2006 – All rights reservedISO 11992-4:2005/Cor.1:2006(E)Page 24, subclause 6.4.6Replace Figure 5 with the following:Figure 5 — A_PDU timing diagram confirmed services — physical target address©ISO 2005 – All rights reserved3ISO 11992-4:2005/Cor.1:2006(E)Page 25, subclause 6.4.6Replace Figure 6 with the following:Figure 6 — A-PDU timing diagram confirmed services — functional target address4 ©ISO 2006 – All rights reservedReference numberISO 11992-4:2005(E)© ISO 2005INTERNATIONALSTANDARD ISO 11992-4First edition2005-07-15Road vehicles — Interchange of digitalinformation on electrical connectionsbetween towing and towed vehicles —Part 4:DiagnosticsVéhicules routiers — Échange d'informations numériques sur lesconnexions électriques entre véhicules tracteurs et véhicules tractés —Partie 4: DiagnosticsISO 11992-4:2005(E)PDF disclaimerThis PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat accepts no liability in this area.Adobe is a trademark of Adobe Systems Incorporated.Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below.© ISO 2005All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISO's member body in the country of the requester.ISO copyright officeCase postale 56 • CH-1211 Geneva 20Tel. + 41 22 749 01 11Fax + 41 22 749 09 47E-mail copyright@Web Published in Switzerlandii © ISO 2005 – All rights reservedISO 11992-4:2005(E)Contents PageForeword (iv)Introduction (v)1Scope (1)2Normative references (1)3Terms and definitions (1)4Syntax applied (2)5Diagnostic application specification (2)5.1General (2)5.2Basic diagnostics (2)5.3Enhanced diagnostics (3)5.4Client and server state diagrams (3)6Application layer specification (7)6.1General (7)6.2Application layer functions (7)6.3Application layer services (10)6.4Application layer protocol (22)7Presentation layer specification (27)8Session layer specification (27)9Transport layer specification (27)10Network layer specification (27)10.1General (27)10.2Network layer functions (27)10.3Network layer services (30)10.4Network layer protocol (34)11Data link layer specification (42)11.1General (42)11.2Data link layer service parameter (42)12Physical layer specification (43)Annex A (normative) Addresses (44)Annex B (normative) Basic diagnostic service parameters (46)Annex C (informative) Trailer message routing example (65)Annex D (normative) CAN identifier and frame format (67)Bibliography (68)© ISO 2005 – All rights reserved iiiISO 11992-4:2005(E)ForewordISO (the International Organization for Standardization) is a worldwide federation of national standards bodies (ISO member bodies). The work of preparing International Standards is normally carried out through ISO technical committees. Each member body interested in a subject for which a technical committee has been established has the right to be represented on that committee. International organizations, governmental and non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization.International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.The main task of technical committees is to prepare International Standards. Draft International Standards adopted by the technical committees are circulated to the member bodies for voting. Publication as an International Standard requires approval by at least 75 % of the member bodies casting a vote.Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO shall not be held responsible for identifying any or all such patent rights.ISO 11992-4 was prepared by Technical Committee ISO/TC 22, Road vehicles, Subcommittee SC 3, Electrical and electronic equipment.ISO 11992 consists of the following parts, under the general title Road vehicles — Interchange of digital information on electrical connections between towing and towed vehicles:⎯Part 1: Physical and data-link layers⎯Part 2: Application layer for brakes and running gear⎯Part 3: Application layer for equipment other than brakes and running gear⎯Part 4: Diagnosticsiv © ISO 2005 – All rights reservedISO 11992-4:2005(E)© ISO 2005 – All rights reserved vIntroductionISO 11992 has been established in order to define the data interchange between road vehicles and their towed vehicles using a Controller Area Network (CAN) serial data link as specified in ISO 11898[4].The description of this part of ISO 11992 is based on the Open Systems Interconnection (OSI) Basic Reference Model in accordance with ISO/IEC 7498[2] (and ISO/IEC 10731[3]), which structures communication systems into seven layers.When mapped on this model, the communication system specified by ISO 11992 is broken down into: Layer 7Application layer for brakes and running gear.Application layer for equipment other than brakes and running gear.Application layer for diagnostics.Layer 3Network layer for diagnostics.Layer 2Data link layer for all communication types.Layer 1Physical layer for all communication types.Table 1 — Applicability and relationship between International Standards Normal communication Diagnostic communication Applicability Brakes and running gearEquipment other than brakes and running gear All applications Layer 7: Application layer ISO 11992-2ISO 11992-3 ISO 11992-4 ISO 14229-1 Layer 6: Presentation layer No functions specified for this layer.Layer 5: Session layer No functions specified for this layer.Layer 4: Transport layer No functions specified for this layer.Layer 3: Network layer No functions specified for this layer.ISO 11992-4 ISO 15765-2 Layer 2: Data link layer ISO 11992-1Layer 1:Physical layerISO 11992-1INTERNATIONAL STANDARD ISO 11992-4:2005(E) Road vehicles — Interchange of digital information on electricalconnections between towing and towed vehicles —Part 4:Diagnostics1 ScopeThis part of ISO 11992 specifies the data communication for diagnostic purposes on a serial data link between a road vehicle and its towed vehicle(s).This part of ISO 11992 is applicable to road vehicles of a maximum authorized total mass greater than 3 500 kg.2 Normative referencesThe following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.ISO 11898-1, Road vehicles — Controller area network (CAN) — Part 1: Data link layer and physical signallingISO 11992-1, Road vehicles — Interchange of digital information on electrical connections between towing and towed vehicles — Part 1: Physical and data-link layersISO 11992-2, Road vehicles — Interchange of digital information on electrical connections between towing and towed vehicles — Part 2: Application layer for brakes and running gearISO 11992-3, Road vehicles — Interchange of digital information on electrical connections between towing and towed vehicles — Part 3: Application layer for equipment other than brakes and running gearISO 14229-1, Road vehicles — Unified diagnostic services (UDS) — Part 1: Specification and requirements ISO 15765-2, Road vehicles — Diagnostics on Controller Area Networks (CAN) — Part 2: Network layer services3 Terms and definitionsFor the purposes of this document, the terms and definitions given in ISO 11992-1, ISO 14229-1 and ISO 15765-2 apply.© ISO 2005 – All rights reserved1ISO 11992-4:2005(E)4 Syntax appliedFor the description of services and service parameters of this part of ISO 11992, the following syntax is used: Name: Type Parameter name and type specificationName Mandatory parameter value<Name> Parameter name representing a set of mandatory parameter values [Name] Optional parameter value[<Name>] Parameter name representing a set of optional parameter values{Name 1;Name 2} List of mandatory parameter values{<Name 1>;<Name 2>} List of parameter names representing sets of mandatory parameter values [<Name 1>;<Name 2>] List of parameter names representing sets of optional parameter values{<Name 1>|<Name 2>} Parameter names selection list representing sets of mandatory parameter values[<Name 1>|<Name 2>] Parameter names selection list representing sets of optional parameter valuesName.req Service request primitiveName.ind Service indication primitiveName.rsp Service response primitiveName.rsp- Service negative response primitiveName.rsp+ Service positive response primitiveName.con Service confirmation primitiveName.con- Service negative confirmation primitiveName.con+ Service positive confirmation primitive5 Diagnostic application specification5.1 GeneralThe diagnostic applications are divided into basic diagnostic applications and enhanced diagnostic applications.Functions, services and protocols of the layers 1 to 4 shall be identical for basic diagnostics and enhanced diagnostics.5.2 Basic diagnosticsThe purpose of the basic diagnostics is to provide vehicle-independent identification and diagnostic information.All basic diagnostic functions and services shall be provided under all operation conditions in the default diagnostic session without the need for specific access rights.2 © ISO 2005 – All rights reservedISO 11992-4:2005(E)5.3 Enhanced diagnosticsThe support and the conditions under which enhanced diagnostic functions and services are provided are manufacturer-specific. It is the responsibility of the manufacturer to secure a server against unauthorized access and to guarantee performance and safe operation in all operation modes allowing enhanced diagnostics.5.4 Client and server state diagrams5.4.1 GeneralThe client and server state diagrams describe the diagnostic service processing of the client and server application entity.5.4.2 Client service primitives handlingThe client service primitives handling shall be as specified in Figure 1 and Figure 2.Client states while processing a diagnostic service shall be as specified in Table 2, events resulting in a client state change shall be as specified in Table 3.Figure 1 — Client service state diagram — Service request with physical server target address© ISO 2005 – All rights reserved3ISO 11992-4:2005(E)4© ISO 2005 – All rights reservedFigure 2 — Client service state diagram — Service request with functional server target addressTable 2 — Client state description Client state Description ASAny client state in which a service request can take place. WS Client state while waiting for a confirmation from the server.NCS a) Following a service request with a physical server target address:client state after the reception of a negative confirmation from the server.b) Following a service request with a functional server target address:client state if no positive service confirmation has been received.PCS Client state after the reception of a positive confirmation from a server.ESClient state for error handling, e.g. in case of a time out condition.ISO 11992-4:2005(E)© ISO 2005 – All rights reserved 5Table 3 — Client event description Client eventDescription Tas1.1Transmit <a.>.req The client transmits an <a> service request with a physical server target address. Tas1.2 Transmit <a.>.req The client transmits an <a> service request with a functional server target address.Tws1.1 Receive <a>.con- Following a service request with a physical server target address:the client receives a negative <a> service confirmation with the response code 'Request correctly received - response pending'.The client shall then reset the time outs and enter the WS state again.Tws1.2 Receive <a>.con+ Following a service request with a functional server target address:the client receives a positive <a> service confirmation. The client shall then process the positive service confirmation and enter the WSstate again.Tws2.1 Receive <a>.con- Following a service request with a physical server target address:the <a> service request has been rejected, a corresponding negative <a> service confirmation with a response code has been received.The client shall then change to the NCS state.Tws2.2 ACT1 expiredFollowing a service request with a functional server target address:the time ACT1 for the reception of the first service confirmation has expired andno positive service confirmation has been received.The client shall then change to the NCS state. Tws3.1 Receive <a>.con+ Following a service request with a physical server target address:the <a> service has been executed, a positive <a> service confirmation, i.e. the result of the service, has been received.The client shall then change to the PCS state.Tws3.2 ACT3.2 expired Following a service request with a functional server target address the time ACT3.2for the reception of consecutive service confirmations has expired and at least one positive service confirmation has been received.The client shall then change to the PCS state.Tes1 Error.ind An error condition, e.g. a time out condition, is signalled to the client.The client shall then change to the ES state for error handling.NOTE Negative service responses with a response code 1016, 1116 or 1216 shall not be sent by a server in case of a service request with a functional server target address.<a> Any diagnostic service.5.4.3 Server service primitives handlingThe server diagnostic service primitives handling shall be as specified in Figure 3.Server states while processing a diagnostic service shall be as specified in Table 4, events resulting in a server state change shall be as specified in Table 5.Table 4 — Server state descriptionServer stateDescription ASAny server state in which the reception of a service indication can take place. PSServer state while processing a service. PCSServer state after the diagnostic service has been executed. ES Server state error handling, e.g. after reaching a time out condition.ISO 11992-4:2005(E)Figure 3 — Server state diagram6 © ISO 2005 – All rights reservedISO 11992-4:2005(E)© ISO 2005 – All rights reserved 7Table 5 — Server event description Event Description Tas1Receive <a.>.ind The server receives any <a> service.indication. Tws1 AST1max expiredTransmit <a>.res- The service execution time AST1max has expired. the server shall then send a negative service response with the response code 'Request correctly received - response pending' and change back to the PS state to proceed the service execution.Tws2 Received <b>.indRespond <b>.res± The server receives a <b> service indication, while service <a> is in progress.the server shall reject the service <b> if service <b> ≠ service <a> and send a negative response with response code "Busy - Repeat Request". If service <b> =service <a>, the server shall send a negative service response with response code"Request Correctly Received - Response Pending".The server shall then enter again the PS state to proceed the service execution.Tws3.1 Service execution not completed Respond <a>.res- Following a service request with a physical server target address:the server rejects the service request.The server shall then send a negative <a> service response with a correspondingresponse code and change to the AS state.Tws3.2 Service execution not completed No response Following a service request with a functional server target address:the server rejects the service request.The server shall then send no response code and change to the AS state.Tws4 Service execution completed Respond <a>.res+ The server sends a positive <a> service response.the service has been executed.The server shall then transmit a positive <a> service response, i.e. the serviceresults, and shall change again to the PCS state.Tes1 Error.indAn error condition is indicated to the server, e.g. a time out condition.The server changes to the ES state for error handling. NOTE Negative service responses with a response code 1016, 1116 or 1216 shall not be sent by a server in case of a service request with a functional server target address.<a> Any first diagnostic service.<b> Any second diagnostic service.6 Application layer specification6.1 GeneralThe application layer function, service and protocol specifications comply with ISO 14229-1. In case of differences, the specifications of this part of ISO 11992 shall have precedence.For the diagnostic communication between road vehicles and their towed vehicles, the restrictions described in this clause apply additionally.6.2 Application layer functions6.2.1 GeneralThe application layer provides functions for the execution of the vehicle diagnostics. These functions are used by client and server applications requesting the respective application layer services.6.2.2 Processing of diagnostic services requests and responsesDiagnostic service requests from the client application and diagnostic service responses from the server application shall be processed according to the service identifier. The diagnostic data shall be encoded as an application layer protocol data unit (A_PDU). The A_PDU shall be transmitted to the respective application layer peer entity by requesting services of the layers beneath the application layer.ISO 11992-4:2005(E)6.2.3 Processing of diagnostic service indications and confirmationsDiagnostic data shall be received as an A_PDU from the layers beneath the application layer. If the received A_PDU is addressed to one of the local server or client application, the received A_PDU shall be decoded and processed according to the diagnostic service identifier and delivered to the server or client application as a service indication or confirmation.6.2.4 Determination of network layer service parametersNetwork layer service parameters are determined by the application layer service type, i.e. ClientIdentifier, ServerIdentifier, ServiceIdentifier and ServiceParameter. In addition the specified parameters Priority and ReservedBit shall be used.NOTE As no specific functions have been specified for the presentation, session and transport layer, the PDUs of these layers are identical to the respective application layer PDUs.6.2.5 Application layer protocol timing supervisionThe peer application layer entities communicating shall supervise the specified timing and shall take the respective actions in case a specified time out expires.6.2.6 Server and client addressing6.2.6.1 Vehicle network architectureTowed vehicle server and client applications shall be addressed and identified by means of remote network addressing. The physical sub-networks between towing and towed vehicles are part of the local motor vehicle network and share the same address range. The address type of the target address (TA) and of the remote address (RA) in the case of encoding a remote target address shall be identified by the target address type (TA_Type).Figure 4 shows an example of the vehicle network architecture.Figure 4 — Vehicle network architecture example8 © ISO 2005 – All rights reservedISO 11992-4:2005(E)6.2.6.2 Towing to towed vehicle <Service>.Request and <Service>.IndicationFor a diagnostic service request transmitted from a towing vehicle to a towed vehicle, the address parameters of the service primitives have the following meaning:SA = <Towing vehicle client source address>TA = <Towed vehicle target address>RA = <Towed vehicle remote server target address>TA_type = {<Physical target addresses>|<Functional target addresses>}See Annex A.NOTE TA_type identifies the TA and the RA target address type.6.2.6.3 Towed to towing vehicle <Service>.Response and <Service>.ConfirmationFor a diagnostic service response transmitted from a towed vehicle to a towing vehicle, the address parameters of the service primitives have the following meaning:SA = <Towed vehicle source address>TA = <Towing vehicle client target address>RA = <Towed vehicle remote server source address>TA_type = <Physical target addresses>NOTE TA_type identifies only the TA target address type.6.2.6.4 Towed to towing vehicle <Service>.Request and <Service>.IndicationFor a diagnostic service request transmitted from a towed vehicle to a towing vehicle, the address parameters of the service primitives have the following meaning:SA = <Towed vehicle source address>TA = <Towing vehicle server target address>RA = <Towed vehicle remote client source address>TA_type = {<Physical target addresses>|<Functional target addresses>}NOTE TA_type identifies only the TA target address type.© ISO 2005 – All rights reserved9ISO 11992-4:2005(E)6.2.6.5 Towing to towed vehicle <Service>.Response and <Service>.ConfirmationFor a diagnostic service response transmitted from a towing vehicle to a towed vehicle, the address parameters of the service primitives have the following meaning:SA = <Towing vehicle server source address>TA = <Towed vehicle target address>RA = <Towed vehicle remote client target address>TA_type = <Physical target addresses>NOTE TA_type identifies the TA and RA target address type.6.3 Application layer services6.3.1 GeneralThis subclause specifies the application layer services for diagnostics.6.3.2 Application layer service parameters6.3.2.1 GeneralThis subclause specifies the general application layer service parameter and the respective parameter format. Service specific parameters are specified in 6.3.4.6.3.2.2 Source address (SA)The parameter source address (SA) contains the client or server source address. It represents the physical location of a client or server on the local network.SA = {<Towing vehicle client source address>|<Towed vehicle source address>}6.3.2.3 Target address (TA)The parameter target address (TA) contains the client or server target address. It represents the physical location of a client or server or a functional group of servers on the local network. The target address type is determined by the parameter TA_type.TA = {<Towed vehicle target address>|<Towing vehicle client target address>|<Towing vehicle server target address>}6.3.2.4 Target address type (TA_type)The parameter target address type (TA_type) determines the address type of the target address TA and the remote address RA, in the case that the remote address corresponds to a target address.TA_type = {<Physical target addresses>|<Functional target addresses>}10 © ISO 2005 – All rights reserved6.3.2.5 Remote address (RA)The remote address (RA) contains the remote addresses of servers or clients on a remote network. Depending on the respective application layer primitive, RA represents either a remote target address or a remote source address.RA = {<Towed vehicle remote server target address>|<Towed vehicle remote server source address>|<Towed vehicle remote client source address>|<Towed vehicle remote client target address>}6.3.2.6 ServiceParameterServiceParameter is a record which contains the respective service parameters of the service primitive. ServiceParameter = {<<Service name> request service parameter>|<<Service name> positive response service parameter>|<<Service name> negative response service parameter>}<Service name> request service parameters are those following the <service name> request service identifier. <Service name> positive response service parameters are those following the <service name> positive response service identifier.<Service name> negative response service parameters are those following the negative response service identifier.6.3.3 Application layer service data units (A_SDU)The application layer service data units (A_SDU) of the diagnostic service primitives have the following formats:<Service name>.Request = {<SA>;<TA>;<TA_Type>;<RA>;<<Service name> request service identifier>;<<Service name> request service parameter>}<Service name>.Indication = < <Service name>.Request><Service name>.Response = {<SA>;<TA>;<TA_Type>;<RA>;<<Service name> response service identifier>;<<Service name> response service parameter>}<Service name>.Confirmation = <<Service name>.Response>© ISO 2005 – All rights reserved 11。

UVM1.1应用指南及源代码分析_20111211版

UVM1.1应用指南及源代码分析_20111211版

6.2. 强大的config .............................................................................................94
6.3. 聚合config变量 .........................................................................................98
写这本书,只是想把自己会的一点东西完全的落于纸上。在努力学习 UVM 的 过程中,自己花费了很多时间和精力。我只想把学习的心得记录下来,希望能够给 后来的人以启发。如果这本书能够给一个人带来一点点的帮助,那么我的努力就不 算是白费。
这本书的前半部分(第 1 到第 9 章)介绍了 UVM 的使用,其用户群较为广泛;
8.2. 搭建一个简单的register model...............................................................129
8.3. 复杂的register model...............................................................................137
函数索引609xvi图目录图11uvm在数字电路设计中的位置3图12uvm对systemverilog的封装4图13简单验证平台5图14uvm验证平台的树形结构6图15实际验证平台7图16packbytes和unpackbytes14图17uvm验证平台中的agent181图21完整的uvm树35图22uvm中常用类的继承关系37图31uvm中的常用phase47图32uvm中所有的phase50图33两个driver位于同一domain57图34两个driver位于不同的domain58图41穿梭的transaction60图51defaultsequence的设置与启动77图52sequencer与driver之间的通信80图53virtualsequence的使用85图61半全局变量93图71monitor与scoreboard的通信104图72使用public成员变量实现通信105图73put操作106图74get操作106xvii图75transport操作107图76component在端口通信中的作用109图77connect关系的建立110图78port与imp的连接111图79portexport与imp的连接115图710使用fifo连接component122图81uvmregfield和uvmreg126图82使用registermodel读取寄存器的流程128图83uvmregfield

sem中的八种信息

sem中的八种信息

sem中的八种信息
在语义分割领域,常见的八种信息是:
1. 图像的全局信息(Global Information):指的是整个图像的概貌或整体特征,如图像的背景、整体颜色等。

2. 物体/实例的形状信息(Shape Information):指的是物体或实例的边界轮廓、轮廓形状等特征信息。

3. 物体/实例的边界信息(Boundary Information):指的是物体或实例的边界像素或边界线的位置和形状等信息。

4. 物体/实例的语义信息(Semantic Information):指的是物体或实例的语义类别或标签,用于区分不同的物体或实例。

5. 物体/实例的局部信息(Local Information):指的是物体或实例内部的局部特征,如纹理、形状等。

6. 物体/实例的空间关系信息(Spatial Relationship Information):指的是不同物体或实例之间的相对位置关系,如物体的重叠、包含关系等。

7. 物体/实例的运动信息(Motion Information):指的是物体或实例在时间上的运动变化,如物体的速度、方向等。

8. 物体/实例的上下文信息(Contextual Information):指的是
物体或实例周围环境或周围物体的信息,用于更好地理解和识别物体或实例。

Diameter信令技术及信令网组织

Diameter信令技术及信令网组织

5
Diameter协议栈
Diameter协议采用了一种新的协议定义模式:首先推出一个轻量的、易于 实施的基础协议,旨在提供一个基本框架,其中包括实现相关功能的最基 本要求。并针对不同的网络情况和业务需求,分别制定相应的应用扩展 Diameter协议族包括:基础协议、传送协议、不同的应用协议 Diameter基础协议在IETF RFC3588中定义,描述了Diameter协议的基本 功能(如消息格式、AVP格式、逐跳安全、代理、错误报告等),是 应用的基础 各种应用协议可以在基础协议的基础上,根据具体应用需求进行扩展
提供协议转换功能 如Radius Diameter, TACACS+ Diameter Translation Agent必须保持会话状态和事务状态。 Translation Agent是保持传统AAA协议网络功能节点的有效 性以及与新协议的互通,保护网络运营商或者内容提供商的既 有投资
Agent(代理)
代理 自身不完成认证和授权的处理 包括Relay,Proxy,Redirect,Translation四种类型
Relay: 利用路由表进行消息路由,本身是协议透明的 Proxy:提供对请求和响应的增值处理,同时利用路由表进行消息路由 Redirect:重定向请求 Translation: 实现其它AAA协议(如Radius)和Diameter协议的转换Fra bibliotek3.响应
归属 Diameter 服务器
Home Network
9
Diameter-Proxy Agent
Proxy Agent
可以路由转发Diameter消息
Proxy Agent可以修改Diameter消息体,以实现某种特定的应 用代理需求 Proxy Agent需要维护事物的状态,执行资源限制的Proxy必须 保持会话状态 不能支持端到端的加密
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Segmented Information Dispersal(SID)for Efficient Reconstruction in Fault-Tolerant Video ServersAriel Cohen Walter A.BurkhardGemini Storage Systems LaboratoryDepartment of Computer Science&EngineeringUniversity of California,San DiegoLa Jolla,CA92093-0114acohen@ burkhard@ABSTRACTThis paper presents a new data organization for disk arrays—Segmented Information Dispersal(SID).SID provides pro-tection against disk failures while ensuring that the recon-struction of the missing data requires only relatively small contiguous accesses to the available disks.SID has a num-ber of properties that make it an attractive solution for fault-tolerant video servers.Under fault-free conditions,SID per-forms as well as RAID5and organizations based on bal-anced incomplete block designs(BIBD).Under failure,SID performs much better than RAID5since it significantly re-duces the size of the disk accesses performed by the recon-struction process.SID also performs much better than BIBD by ensuring the contiguity of the reconstruction accesses. This contiguity property is a very significant factor for video retrieval workloads,as we demonstrate in this paper.We present SID data organizations with a concise representation which enables the reconstruction process to locate efficiently the needed video and check data.KEYWORDS:video server,fault-tolerance,segmented in-formation dispersalINTRODUCTIONAchieving fault-tolerance in disk arrays for video retrieval workloads is one of the challenging problems which need to be addressed by the designer of a large-scale video server. In this paper,we describe a novel data organization which provides an attractive solution for this problem.A storage server for digital video retrieval consists of an array of high-performance disks which is connected to display sta-tions(e.g.personal computers or set-top boxes)over a high-bandwidth network.The disk array may be attached to a tertiary storage device containing additional movies,a copy of the movies on the disk array,and possibly a copy of the check data(i.e.the data used for fault-tolerance purposes). The system uses memory either at the server or at the display stations(or both)for buffering.Naturally,the goal is to serve as many concurrent users as possible given the available re-sources.The workload experienced by the video server is essentially a read-only workload in which the task of the server is to retrieve movies from the disk array for consumption by the display units.Occasionally,a new movie may be copied from the tertiary storage device(or another server)to the disk array,and an existing movie may be erased.The main re-quirement for the server is to replenish the buffers in such a way that buffer starvation or overflow never occur for any of the streams which are being serviced.The buffers typically drain at a rate of1.5–40Mb/s(depending on the compression scheme and parameters used).Our goal is to devise a data organization for the disk array which achieves the following:a large number of concurrent streams,low buffering requirements,load balancing,fault-tolerance without adverse effects on fault-free perfor-mance,andreasonable performance under disk failure;this includes continued service when a disk fails(degraded mode)as well as reconstruction on a spare disk(rebuild mode).During degraded mode operation,data from surviving disks is used to reconstruct the data that is being requested from the failed disk;tertiary storage devices cannot assume responsi-bility for this real-time retrieval task.However,a disk rebuild may be performed by reading the data from a tertiary storage device,thus avoiding the need to increase the load on the surviving disks for the rebuild operation.BASIC PRINCIPLESData LayoutsThe disk array is devoted to video data and check data;sys-temfiles and metadata are stored separately.Movies are di-vided into equal size slices which serve as the basic unit ofaccess to the data;each slice is stored contiguously.The slice size is typically a few hundred KBs.A simple data organization without check data is shown inFigure 1.denotes slice of movie .This round-robin assignment of slices to disks achieves load balancing.If this scheme is used,a disk failure results in a complete loss of service.........................M1.1M1.5M1.6M1.7M1.8M1.2M1.3M1.4M2.1M2.5M2.2M2.6M2.3M2.7M2.4M2.8Figure 1:Slice striping for load balancingFigure 2shows a RAID 3organization [8].denotes fragment of slice of movie ,and denotes the par-ity of the fragments of slice of movie (e.g.).In this example,the disks are dividedinto two parity groups.The data within rectangles is read in parallel by all disks in the group.Note that each group can sustain up to one disk failure.Moreover,no degrada-tion of performance occurs if the parity can be computed fast enough.However,this organization suffers from poor fault-free performance due to the dedicated parity disks which are not utilized under fault-free operation,and the effects of the fine-grained striping (see [3]for a study of this).Figure 3shows a RAID 5organization [8].denotes slice of movie ,and denotes the parity of the slices that appear in the same row.Each of the two parity groups in this example can sustain up to one disk failure.This organiza-tion has good fault-free performance (see [3]),but it suffers from poor performance under failure since an affected par-ity group becomes a bottleneck:the load on the surviving disks doubles because of the need to perform the reconstruc-tion reads in addition to the normal workload.Our proposed organization (SID)addresses this issue.Read SchedulingIn this section we describe one possible read scheduling ap-proach which is based on reading cycles.Other approaches are possible with SID as well.Time during playback is divided into reading cycles during which exactly one slice is read for each stream from some disk (or group in the case of a RAID 3organization).A read-ing cycle concurrently serves a number of groups of streams which we call cohorts .Each stream is a member of exactly one cohort in each reading cycle.We can think of cohorts as tasks to be performed by a circular pipeline.During a read-ing cycle,each disk serves one cohort,and then the cohorts move to the next disk where they will be served during the next reading cycle.The maximum number of streams in a cohort is fixed to per-mit a certain fixed maximum number of streams to be ser-viced.When the number of streams in a cohort is lower thanthis maximum number,we say that the cohort contains one or more free slots .When the display of a new stream needs to be initiated,the system waits until a cohort with a free slot is about to be served by the group where the first slice of the requested movie resides;the new stream is then incorporated into this cohort.When a stream ends,it is dropped from its cohort;this results in a free slot which can be used to initi-ate a new stream.Note that once a stream is assigned to a cohort,it remains a member of that cohort until its display is finished.Figure 4shows examples of reading cycles along with their cohorts in a server with two disks.In this example,a cohort may contain up to 4streams.Cohort 0is served by disk 0during reading cycle ,disk 1during the reading cycle,and disk 0again during reading cycle.Cohort 1is served by disk 1during reading cycle ,disk 0during readingcycle,and disk 1during reading cycle .A new stream ()is incorporated into cohort 1during reading cycle.Note that the order of reads may vary from reading cycle to reading cycle;this flexibility enables us to use seek optimization algorithms.SSS567SSSSSSS7SSSSSSS142376556SS884321SSSS4213Disk 0Disk 1reading cycle reading cycle reading cycle Cohort 0Cohort 1Cohort 0Cohort 1Cohort 0Cohort 1tt+1t+2Figure 4:Reading cyclesDuring each reading cycle,for each stream,the system reads the next slice from the group serving the stream’s cohort into the buffer while consuming the slice which was read in the previous reading cycle.Let the slice display time be (sec-onds);if the reading cycle takes less than seconds,the sys-tem waits until seconds are over before starting the next reading cycle.The maximum amount of time between the retrievals of suc-cessive slices for a stream is called the replenishment latency .Figure 5illustrates this latency.The replenishment latency determines the amount of data that needs to be buffered per stream;hence,reducing this latency is the way to reduce the buffering requirements or increase the number of supportable streams for a give amount of buffering.The replenishment latency is determined by the number of streams in a cohort,seek times,rotational latencies,and slice transfer times.RELATED WORKParity-based schemes for fault-tolerant video servers were studied by Berson,Golubchik and Muntz [1].They stud-ied an approach which is similar under fault-free conditions to the RAID 5approach described above.Under failure,a....................................M1.2.1M1.2.2P1.2M2.4.1M2.4.2P2.4M1.4.1M1.4.2P1.4M2.2.1M2.2.2P2.2M1.2M1.4M2.2M2.4M1.1.1M1.1.2P1.1M2.3.1M2.3.2P2.3M1.3.1M1.3.2P1.3M2.1.1M2.1.2P2.1M1.1M1.3M2.1M2.3Figure 2:RAID 3..................P P P P P PM1.3M1.4M1.7M1.8M1.12M1.11M2.3M2.4M2.7M2.8M2.12M2.11P P P P P PM1.1M1.2M1.5M1.6M1.9M1.10M2.1M2.2M2.5M2.6M2.9M2.10Figure 3:RAID 5reading cycle reading cycle replenishment latency12343241S S S S S S S S Figure 5:Replenishment latencydifferent read scheduling policy is employed for affected par-ity groups:data from all surviving disks in the parity group(i.e.an entire parity stripe which contains a number of video slices and parity data)is read for a stream during a single reading cycle,and this data is consumed during a number of reading cycles.This obviates the need to perform sep-arate reconstruction reads since the data needed to perform the reconstruction is already stored in the buffer.Hence,the load increase incurred by the surviving disks is minimized by exploiting the sequentiality of video playback.However,significant additional buffering for degraded mode operation is required.A disadvantage of this scheme is that there is a transition phase as the parity group switches to degraded mode;during this phase,some of the data is not delivered and consequently “hiccups”occur.The scheme proposed in this paper (SID)provides a smooth transition to degraded mode.Vin,Shenoy and Rao [11]proposed a method which does not rely on error-correcting codes such as parity,but on prop-erties of the video data itself.Their technique is a combi-nation of a compression algorithm and a disk array layout.The compression algorithm partitions the data in such a way that an acceptable (but not perfect)reconstruction of an im-age can be performed when some of the data is not avail-able.The disk array layout ensures that the recovery pro-cess does not impose any additional load on the surviving disks.This method is based on a non-standard compressionscheme which is an adaptation of the JPEG image compres-sion technique which does not exploit the temporal redun-dancy of motion video,and thus it results in poor compres-sion ratios when compared to standard motion video com-pression schemes such as MPEG (note that motion prediction accounts for most of MPEG’s ability to achieve good quality at a low bit-rate.)Such lower compression ratios result in a need to maintain a higher bit-rate which has a detrimental effect on the performance of the server and the number of movies that can be stored.The technique proposed in this paper is oblivious to the nature of the data stored in the disk array,so it works well with MPEG and other standard motion video compression schemes.Parity declustering [5]is a redundancy scheme for reducing the additional load on the surviving disks during the recon-struction of the content of a failed disk.This scheme is tar-geted at transaction processing environments;it is not well-suited for video retrieval workloads.This issue is discussed further in another section below (SID vs.Balanced Incom-plete Block Designs).GOALSOur goals in developing a new data organization for fault-tolerant disk arrays for video are as follows:we desire to obtain RAID 5-like performance under fault-free conditions,reduce the reconstruction load under disk failure while main-taining the access contiguity of the read operations,and pro-vide optimized reconstruction of video data rather than obliv-ious video and check data reconstruction.The last goal is motivated by the fact that only the video data is needed for continued service under failure,and the effi-cient delivery of this data is critical to maintaining reason-able performance under failure.The check data,on the otherhand,is less time-critical—it is needed only for the rebuild process.Since the video retrieval workload is essentially a read-only workload,the rebuild process may even be per-formed by copying the data which existed on the failed disk from tertiary storage without engaging any of the surviving disks.SID achieves the goal of load reduction by reducing the size of the reconstruction reads;this reduces the transfer time which is the dominant component of the replenishment la-tency.The load reduction is illustrated in Figure 6.In thisexample,there are three streams per cohort.,,and denote the three slices read for a cohort during a reading cy-cle.denotes a read performed for reconstruction purposes.When a RAID 5organization is used,the size of the recon-struction reads is the same as the size of the slice reads (re-constructing a slice of bytes requires reading bytes from each of the surviving disks in the parity group.)Hence,a reading cycle under failure is approximately twice as long as a reading cycle under fault-free conditions.With SID,the size of the reconstruction reads will be smaller than the size of the slice reads;this will result in shorter reading cycles.SID under failure:3S RAID 5 under failure:RAID 5/SID fault-free:S 3S 1reading cycle reading cyclereplenishment latencyS 2S 2S 3S 11S S reading cycle S 322S 1S reading cycle replenishment latencyS S 3S 12S S S 231replenishment latencyreading cyclereading cycle RRRRRRR R R R R R Figure 6:Load reduction through smaller reconstruc-tion readsWe can state the problem that we wish to address as fol-lows (see Figure 7):we are given disks containing video data,and we wish to add some check data to each disk (the check data will occupy contiguous spare tracks at the begin-ning or end of the disks)such that the following holds:the data (video and check)is protected against a single disk fail-ure,and the recovery of a slice of bytes of video data (is known in advance)from a failed disk requires reading atmostcontiguous bytes from any surviving disk (we call this property the limited contiguous access length (LCAL)property.)is called the dispersal factor of the data orga-nization.The ratio of the amount of check data to the total amount of data (check and video)is called the redundancy rate of the solution.. . .DataD D D 12n. . .12nC 1C 2C nDataCheckD D D Figure 7:We wish to add check data to the data con-tent of the disks such that protection against a single disk failure is obtained and the LCAL property holds.The goal of SID is to allow reconstruction while requiring only small accesses to the disks.Thus,we wish to maximize the dispersal factor ;on the other hand,we wish to min-imize the redundancy rate.The latter goal runs counter to the former goal,of course.Hence,the problem that needs to be addressed is that of finding a solution which strikes a good balance between the obtained dispersal factor and the required level of redundancy.An obvious upper bound on is.In fact,it is very easy to construct solutions that achieve this upper bound.Fig-ure 8shows an example of such a solution.In this example,each of the disks is divided into four equal size logical seg-ments (the figure only illustrates the segments for disk ;the data belonging to the four segments of disk is de-noted by four different shades of gray.)The segments are -interleaved where is the slice size (-interleaving is used in the general case.)The check portion of each disk contains one segment from each of the other disks (the figureonly shows the locations of the data of disk;the data of the other disks is distributed similarly.)If a slice of bytes on a failed disk needs to be reconstructed,its content can be found in the check portions of the other disks.Each of these disks will provide one fourth of the data,and the recon-struction reads will be contiguous;hence,the LCAL property holds.The disadvantage of this construction is the amount of redundancy that it requires:one half of the storage space is devoted to check data.RAID 5organizations are on the other extreme of the range of solutions.The obtained dispersal factor is 1,while the redundancy rate is ,which is the minimum required for single erasure correction.SEGMENTED INFORMATION DISPERSAL (SID)SID provides a middle ground between the two extremes of duplication and RAID 5.Figure 9shows an example of a SID solution for 5disks which achieves a dispersal factorof 2with a redundancy rate of.In this example,each of the disks is divided into two equal size logical segments(e.g.is divided into and ).The segments are -interleaved where is the slice size (e.g.the first bytes of are in ,the second set of bytes is inDataCheckD D D D D 12354(r bytes)video sliceFigure 8:Highest dispersal by duplication:,,redundancy=1/2,the third set is in ,the fourth is in ,etc.)Note that the sole purpose of the segments is data labeling;no datais rearranged.The-interleaving ensures that a contiguous video slice of bytes will contain equal amounts of data from the two segments of the disk (recall that the disk array is dedicated to video data and check data).2-interleaved)r(=====C 1S 5,1S 2,2S 3,2S 1,1C 2C 32,1S S 4,2S 3,1C 4C 5S 4,11,2S S 5,2D D D D D 12345DataCheckFigure 9:SID layout:,,redundancy=1/3In Figure 9,the content of the check portions of the disks was chosen in such a way that when a video slice from any failed disk needs to be reconstructed,the two halves of the data will be reconstructed from two disjoint pairs of disks.Hence,a dispersal factor of 2is obtained.The size of thecheck portion of each disk in this example is the same as the size of a segment (which is half the size of the data on thedisk);therefore the obtained redundancy rate is.The general problem is illustrated in Figure 10.We are given the video data content of disks,a video slice size ,and a dispersal factor (the set of feasible values for depends on ,of course;we return to this issue below.)Each disk con-tains a number of contiguous video slices.The data on eachdisk is labeled by dividing each disk into-interleaved logical segments (we assume that divides .)For example,in Figure 9each disk contains three video slices of size bytes,and each disk is divided into two -interleaved log-ical segments of size bytes.The goal is to add a check portion to each disk such that contains the XOR of data segments that belong to other disks.The pur-pose of the check data is to enable the recovery of the datain a single failed disk;that is,all the video data in should be recoverable as long as all other disks are available.In addition,the recovery process must have the following special property:during the recovery of any videoslice which belongs to a failed disk,no more thanbytes must be read from any of the surviving disks,and these bytes must be contiguous.This property of the recovery process is the limited contiguous access length (LCAL)property.Theratiois called the redundancy rate of the layout.Note that the LCAL property applies only to the reconstruc-tion of the data portion of a missing fragment.It is possibleto impose a stronger condition and require the recovery pro-cess to satisfy the LCAL property when both the data and the check area of a missing fragment are reconstructed.This problem is discussed in [2].The problem of SID layouts for multiple failures is also discussed in [2].Figure 11shows a larger example with 10disks and a disper-sal factor of 3.When a video slice of bytes from any disk needs to be reconstructed,its three equal size parts (the ones belonging to the three segments of the failed disk)will be reconstructed from three disjoint triples of surviving disks.Hence,each surviving disk will be required to read only bytes.Given a certain number of disks ,we naturally wish to ob-tain a SID data organization with the highest possible disper-sal factor .This maximizes the load reduction and mini-mizes the redundancy rate (recall that the redundancy rate is).It is easy to see that .This is a result ofthe LCAL property:when a slice of size bytes needs to be reconstructed,bytes are read from the check portion of disks,and bytes are read from the data portion ofother disks;all these disks must be different to maintain the LCAL property,so we get a total ofdisks.Therefore,an upper bound on is.In [2]we show that this upper bound can be obtained only for...............qrqr 1D 2D n D . . .n S S S S S S S S S 1,12,1n,11,22,2n,21,q 2,q n,q12q-interleaved . . .12qData Check-interleaved )(D 1D 2D Figure 10:SID layout:=XOR ofdata segments that belong to otherdisksD D D Figure 11:SID layout:,,redundancy=very few values of (,and possibly 57).However,using construction methods which are described in [2],it is possible to construct SID solutions withTable1:SID solutions forsolution solution solution 25725725725(6)72582(3)573673673673683683683683(4)6(7)8468468468468468468478468469478478578578578579578(9)578578the parity group size is 3.By interleaving the parity groups on the disks in a manner similar to that of SID’s segments,we obtain a dispersal factor of.For example,if a video slice of bytes from disk C needs to be reconstructed,onlybytes will be read from each of the otherdisks.Data + Check123124234314D 4D D D 123Figure 12:BIBD layout:dispersal factor=,redundancy=Note that although a dispersal factor of is obtained by the layout of Figure 12,the LCAL property does not hold since the reconstruction reads are not contiguous!Contigu-ous reconstruction accesses cannot be obtained by layouts based on this block design no matter how the parity groups are permuted within the disks.There are few block designs that result in a layout which enables contiguous reconstruc-tion (these are block designs with and a few block designs with ;see [4]for a definition of balanced in-complete block designs and .)There are even fewer block designs that enable contiguous reconstruction while provid-ing acceptable redundancy rates and dispersal factors.SID,on the other hand,provides good solutions for any reasonable number of disks (see Table 1).In the next section,we will see that the inability to provide contiguous reconstruction accesses is a serious deficiency of BIBD layouts for video workloads.This problem is of lesser concern in transaction processing environments since the crit-ical issue for those workloads is the aggregate load increase over many transactions.In the example of Figure 12,one quarter of the transactions would be reconstructed from each of the parity groups;hence,each surviving disk would par-ticipate in the reconstruction of only two thirds of the trans-actions.For video workloads,on the other hand,the most important measure is the length of a reading cycle which is determined by the time it takes to retrieve a few video slices;hence,we need to minimize the reconstruction time per slice.PERFORMANCE RESULTSWe conducted an analytical study which compares the per-formance of various possible data organizations.The diskparameters were based on the performance characteristics of Seagate Elite 9disks.A description of the model and the parameters used can be found in [2].Figure 13shows how the buffering requirement per stream varies with the total number of concurrent streams for a disk array with 12disks and a video consumption rate of 4Mb/s.The figure compares the performance of three data organiza-outs has SID ure,per ure Total Number of StreamsB u f f e r S i z e p e r S t r e a m (K B )Figure 13:SID vs.RAID 3&5:,,redundancy=,video consumption=4Mb/sNote,however,that both RAID 3and RAID 5provide a higher degree of fault-tolerance in this case since they protect against one disk failure per parity group while SID protects against one failure in the entire disk array.For a fixed level of fault-tolerance,SID requires a higher redundancy rate than RAID 3or RAID 5,but it provides a significantly higher level of performance under failure.The same level of fault-tolerance as that of RAID 3or RAID 5can be achieved by dividing the disk array into SID groups in the same man-ner that RAID 3and RAID 5arrays are divided into parity groups.Since a large number of disks is desirable for perfor-mance reasons regardless of the data organization used,and since current and future disks offer a very high capacity,trad-ing some amount of storage space for a significantly higher level of performance under disk failure is very acceptable.Total Number of StreamsBufferSizeperStream(KB)RAID 5 with failureRAID 3 with/without failureSID with failureRAID 5/SID without failureFigure14:SID vs.RAID3&5:,,redundancy=,video consumption=4Mb/sFigure14shows the performance of a disk array with90disks.The redundancy rate for all data organizations is(i.e.the RAID3and RAID5layouts consist of10paritygroups of size9,and the SID layout has a dispersal factorof8.)The impact of using SID in this case is considerablylarger than in the previous case because of the higher disper-sal factor.For example,if we limit the buffer size per streamto1MB,SID can support540streams under failure,whileRAID5can only support360streams.The impact of the dispersal factor is illustrated in Figure15.We see,as expected,that performance improves as the dis-persal factor increases,but diminishing returns are obtainedonce the dispersal factor is high enough to make latenciesother than the transfer time dominate.As mentioned in the SID vs.Balanced Incomplete BlockDesigns section,the most important advantage of SID whencompared to BIBD layouts is the guarantee of contiguousreconstruction reads.Figure16shows the impact of discon-tiguity on the performance.The different curves correspondto different numbers of accesses performed during the recon-struction of a video slice.With SID,only one access is per-formed,but we studied the performance for larger numbersof accesses in order to determine the impact of the disconti-guity exhibited by BIBD layouts.We see that even a smallamount of discontiguity seriously affects the performance.Once the number of accesses increases beyond4,the per-formance becomes even worse than that of RAID5(whichrequires reading larger,but contiguous,pieces ofdata).Number of Streams per DiskRAID 5 with failureSID (q=2)SID (q=4)SID (q=8)SID (q=16)SID (q=256)RAID 5/SID without failureFigure15:Dispersal factor impact:video consump-tion=4Mb/sCONCLUSIONSSID achieves a significant reduction in the size of the recon-struction accesses while maintaining the contiguity of theseaccesses.It strikes a good balance between the obtained dis-persal factor and the required level of redundancy.RAID5organizations require reconstruction accesses which are aslarge as the size of the data to be reconstructed.BIBD or-ganizations achieve a size reduction,but do not generallymaintain contiguity.SID is an attractive data organizationfor fault-tolerant disk arrays when the reconstruction pro-ceeds in units of a predeterminedfixed size.Video workloadshave this property(the reconstruction unit is a video slice.)Our performance study shows the significantly higher levelof performance under failure obtained by SID when com-pared to RAID5or BIBD.Under fault-free conditions,SIDperforms as well as RAID5or BIBD.ACKNOWLEDGEMENTSThis work was supported in part by grants from SymbiosLogic,Wichita,Kansas,and the University of California MI-CRO program.REFERENCES1.Berson,S.,L.Golubchik,and R.R.Muntz.Fault Tol-erant Design of Multimedia Servers.SIGMOD Record,24(2),pp.364–375,1995.2.Cohen, A.Segmented Information Dispersal.Ph.D.Dissertation,Department of Computer Science&En-。

相关文档
最新文档