14 Interoperability - Department of Computer Science
Oracle Retail Price Management Release Notes 14.0.
Oracle® Retail Price ManagementRelease NotesRelease 14.0.2E60607-01December 2014Oracle Retail Price Management (RPM) Release 14.0.2 is a patch release for RPM 14.0.RPM 14.0.2 includes selected defect fixes and enhancements for RPM 14.0 code.Oracle Customer Support investigates submitted issues assuming that all releasedupdates have been applied. It is the customer's decision when to apply a new release;however, delays in applying updates can complicate the support process.About Patch ReleasesOracle Retail patch releases are periodic releases that can include new defect fixes andproduct enhancements.Documentation for patch releases includes the following:■New and updated guides (for example, operations and user guides) that apply tothe patch release level. See "Related Documentation" for a list of the documentspublished for RPM 14.0.2.■Defect reports for new fixes and enhancements for the patch release.See the Oracle Retail Price Management Installation Guide for Release 14.0.2 forinstructions about how to apply the defect fixes and enhancements that you have notalready installed.Hardware and Software RequirementsSee the Oracle Retail Price Management Installation Guide, Release 14.0.2 for informationabout the following:■Hardware and software requirements.■Oracle Retail application software compatibility.Applying the Patch ReleaseBefore applying the RPM 14.0.2 patch release, be sure that:■RPM 14.0 has been installed.■Patch release RPM 14.0.1 has been applied.Before applying the release over your files:■Note whether any modules have been customized. If so, the customizations mustbe reapplied to the new version of the module, or the fix may need to be applied tothe custom version of the code.■Copy the original files to a different directory before you copy over them, in case you need to refer to them at a later date.Running ScriptsBack up data before running any script, because the scripts provided do not preserve data. See defect reports for details.Check with your database administrator to determine whether your database should be analyzed after a script is run. In many cases, analysis of the database is necessary to take advantage of new or modified indexes intended to improve performance of the application.Functional EnhancementsThe functional enhancements below are included in this release and are organized by functional area. For more information on these enhancements, see the latest Oracle Retail Price Management User Guide and Oracle Retail Price Management Implementation Guide.■The feature to apply price guides when using Price Event Item List for Price Changes, Clearances, and Simple Promotions has been enabled in the application.■An enhancement was added to avoid the inheritance of Oracle Retail Merchandising System vendor funded price deal to non-vendor funded items, when the linked RPM promotion has both a vendor funded items and anon-vendor funded items.Integration EnhancementsThe integration enhancements included in RPM 14.0.2:■The integration of multi buy promotions with more than one department in a buy list in Oracle Retail Point of Sale has been enabled within the application.Technical EnhancementsThe technical enhancements described below are included in this release and also include:■Consolidated performance fixes done for customer.■Repaired the code that caused the clearance price injector to slowly process records.■RPM Clearance Injector batch multi-threading.Note:The list below announces the addition of Oracle Retail supportfor technology described. See the Oracle Retail Price ManagementInstallation Guide requirements section for critical information, such aswhether the enhancement below replaces previous versions or issupported in addition to already existing versions.Browser SupportOracle Retail Price Management 14.0.2 is supported for use with the following browser:■Microsoft Internet Explorer 11Security TechnologiesOracle Retail Price Management 14.0.2 is supported for use with the following security technologies:■Oracle Access Manager (OAM) 11.1.1.7■Oracle Internet Directory (OID) 11.1.1.7Noteworthy Fixed IssuesThe following defect fixes and enhancements are included in RPM 14.0.2. This is not a complete list; see the cross-reference spreadsheet and defect reports for a complete list and full details.AssumptionsFor bug 19802970, before running the script 000210_s 19802970_rpm_stage_promo_comp_simple.sql, table RPM_STAGE_PROMO_COMP_SIMPLE should be empty. If the table has any data, customer should take back up of the data and truncate the table.Defect Fixes and DocumentationA defect fix is a modification to the base Oracle Retail code (for example, a bug fix, a performance enhancement, or a functional enhancement). Each defect fix that isincluded in this release has a corresponding defect report titled <defect-number>.PDF (for example, 12345678.PDF).Table 1Noteworthy Fixed IssuesDefect Number Summary19972620Enabled the feature to apply Price Guides when using Price Event Item List for Price Changes, Clearances. and Simple Promotions.19885334 Enabled the integration of multi buy promotions with more than one department in buy list to PRPOS.19802562Repaired the code that caused the clearance price injector to slowly process records.19633145An enhancement was added to avoid the inheritance of Oracle Retail Merchandising System vendor funded price deal to non-vendor funded items, when the linked RPM promotion has both a vendor funded items and a non-vendor funded items.19640630 RPM Clearance Injector batch multi-threading.19908250 RFR is not getting updated for Simple promo created with Price Event Item List.19633954 Consolidated performance fixes done for customer.In the same folder, the file named DEFECT MODULE XREF RPM 14.0.2.XLS lists every defect number and the modules and scripts that are included in this release. Review each defect report carefully before implementing the defect fixes. Note that scripts do not preserve data. Make sure that all data is backed up before you run any script. Related DocumentationFor more information, see the following documents in the Oracle Retail Price Management Release 14.0.2 documentation set:■Oracle Retail Price Management Operations Guide■Oracle Retail Price Management Installation Guide■Merchandising Batch ScheduleSupplemental Documentation on My Oracle SupportThe following documents are available through My Oracle Support. Access My Oracle Support at the following URL:https://Enterprise Integration Guide (located in the Oracle Retail Integration Suite library on the Oracle Technology Network)The Enterprise Integration Guide is an HTML document that summarizes Oracle Retail integration. This version of the Integration Guide is concerned with the two integration styles that implement messaging patterns: Asynchronous JMS Pub/Sub Fire-and-Forget and Web Service Request Response. The Enterprise Integration Guide addresses the Oracle Retail Integration Bus (RIB), a fully distributed integration infrastructure that uses Message Oriented Middleware (MOM) to integrate applications, and the Oracle Retail Service Backbone (RSB), a productization of a set of Web Services, ESBs and Security tools that standardize the deployment. Documentation AccessibilityFor information about Oracle's commitment to accessibility, visit the Oracle Accessibility Program website at/pls/topic/lookup?ctx=acc&id=docacc.Access to Oracle SupportOracle customers that have purchased support have access to electronic support through My Oracle Support. For information, visit/pls/topic/lookup?ctx=acc&id=info or visit /pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.Oracle Retail Store Inventory Management Release Notes, Release 14.0.2E60607-01Copyright © 2014, Oracle and/or its affiliates. All rights reserved.This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing.If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable:U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government.This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications.Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group.This software or hardware and documentation may provide access to or information about content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services, except as set forth in an applicable agreement between you and Oracle.Value-Added Reseller (VAR) LanguageOracle Retail VAR ApplicationsThe following restrictions and provisions only apply to the programs referred to in this section and licensed to you. You acknowledge that the programs may contain third party software (VAR applications) licensed to Oracle. Depending upon your product and its version number, the VAR applications may include:(i) the MicroStrategy Components developed and licensed by MicroStrategy Services Corporation (MicroStrategy) of McLean, Virginia to Oracle and imbedded in the MicroStrategy for Oracle Retail Data Warehouse and MicroStrategy for Oracle Retail Planning & Optimization applications.(ii) the Wavelink component developed and licensed by Wavelink Corporation (Wavelink) of Kirkland, Washington, to Oracle and imbedded in Oracle Retail Mobile Store Inventory Management.(iii) the software component known as Access Via™ licensed by Access Via of Seattle, Washington, and imbedded in Oracle Retail Signs and Oracle Retail Labels and Tags.(iv) the software component known as Adobe Flex™ licensed by Adobe Systems Incorporated of San Jose, California, and imbedded in Oracle Retail Promotion Planning & Optimization application.You acknowledge and confirm that Oracle grants you use of only the object code of the VAR Applications. Oracle will not deliver source code to the VAR Applications to you. Notwithstanding any other term or condition of the agreement and this ordering document, you shall not cause or permit alteration of any VAR Applications. For purposes of this section, "alteration" refers to all alterations, translations, upgrades, enhancements, customizations or modifications of all or any portion of the VAR Applications including all reconfigurations, reassembly or reverse assembly,re-engineering or reverse engineering and recompilations or reverse compilations of the VAR Applications or any derivatives of the VAR Applications. You acknowledge that it shall be a breach of the agreement to utilize the relationship, and/or confidential information of the VAR Applications for purposes of competitive discovery.The VAR Applications contain trade secrets of Oracle and Oracle's licensors and Customer shall not attempt, cause, or permit the alteration, decompilation, reverse engineering, disassembly or other reduction of the VAR Applications to a human perceivable form. Oracle reserves the right to replace, with functional equivalent software, any of the VAR Applications in future releases of the applicable program.。
蓝牙室内定位服务的营销指南说明书
The Marketer’s Guide to Bluetooth® LE Indoor Location ServicesCREATING AMAZING ONSITE MOBILE EXPERIENCES WITH VIRTUAL BEACONSThe Marketer’s Guide to Bluetooth® LEIndoor Location ServicesCREATING AMAZING ONSITE MOBILE EXPERIENCES WITH VIRTUAL BEACONSLocation-based mobile marketing is a boon to every marketer tasked with delivering the right message to the right person at the right time. After all, there’s no better time to reach prospective customers than when they are nearby. And there’s no better way to provide personalized, targeted information than by combining what you already know about them with their current location inside your establishment.Most people are aware of the Global Positioning System (GPS), which is the defacto standard for location-based interaction when outdoors. It uses geofencing technology to trigger activities, such as push notifications, when a mobile device enters or leaves a virtual geographic boundary. However, GPS does not work when it comes to indoor location services. That is why a new technology, Bluetooth® Low Energy (BLE), has emerged to identify and engage with mobile employees, customers, and guests inside hotels, stores, convention centers, hospitals, and other establishments.If you’re reading this guide, chances are you’ve heard about Bluetooth® LE. Perhaps you’ve experimented with battery-powered BLE beacons, but struggled with the complexity of creating a complete solution from the disparate parts of different vendors. Maybe you ran a successful pilot, but when it came time to scale, your IT department said it would be too complicated and costly to manage.If so, you’re not alone. While indoor location using Bluetooth® LE has been around since Apple’s introduction of the iBeacon protocol in 2013, challenges with scalability, interoperability, and manageability have hampered large-scale adoption of this technology to date. Fortunately, this is all changing.New advancements in the wireless infrastructure, such as virtual beacons enabled by machine learning, have made Bluetooth®LE easy to deploy and operate at scale. In addition, the convergence of Wi-Fi and BLE has removed the need for an overlay network, making it more cost effective than ever to roll out indoor location services.We are in a new era of enterprise-grade, personalized, indoor-location services using BLE. Are you ready to take advantage of it? This paper will show you how.What you’ll learn:• Bluetooth® LE basics and common beaconing standards• T op use cases for BLE (e.g. analytics, wayfinding, proximity messaging and more)• Overcoming BLE deployment and management challenges• The Mist solution for BLE engagement• Getting startedTHE ABCS OF BLUETOOTH® LEBluetooth® is the ubiquitous communications technology we all use to connect our wireless headsets, keyboards, and hands-free systems to our smart phones and computers. Operating in the 2.4GHz band (the same as Wi-Fi), Bluetooth was designed for continuous streaming of voice and data over short distances, and comes standard in all modern mobile devices.Bluetooth® Low Energy (BLE) is a subset of the Bluetooth protocol introduced in 2011. Unlike classic Bluetooth’s continuous streaming, BLE was designed for transmitting short bursts of data. Because it stays in sleep mode until a connection is initiated, BLE consumes far less energy thanclassic Bluetooth. This energy efficiency is driving a new class of wireless devices and applications, from smart home sensors and wearables like Fitbits, to indoor-location beacons and proximity marketing.Beacons are devices that use Bluetooth ® LE to transmit short packetsthat are used for providing location-based information, such as proximitynotifications, location, and nearby items of interest. They can be usedfor anything from analyzing customer traffic patterns to providing turn-by-turn directions and delivering offers or other contextual informationbased on physical location. You can even turn your mobile phone into aBLE beacon for use cases such as letting the server in a restaurant knowyou would like another drink. There are two main protocols used for Bluetooth ® LE beaconing: iBeacon, introduced by Apple in 2013, and Eddystone, Google’s cross platform beaconing protocol that was launched in 2015. Both protocols work in a similar fashion by broadcasting a unique identifier that is picked up by a compatible app or operating system on the phone or other mobile devices, to determine its relative position at your location. (A third protocol, Altbeacon, was announced in July 2014 as an open source beacon protocol. It overcomes vendor tie-in, but lacks the widespread adoption of iBeacon and Eddystone.)It is worth pointing out that Bluetooth ® LE beacons are an opt-in solution. Mobile consumers grant permission to use their location information in exchange for content or services they consider valuable. Mobile devices must have Bluetooth ® and location services on, and either a mobile app configured for BLE, or Google Chrome installed (if you’re beacon is configured with Eddystone-URL). BLUETOOTH ®LE BEACON USE CASES ARE LIMITED ONLY BY YOUR IMAGINATION The more you integrate a mobile user’ location data with everything else you know about the user, the more personalized, valuable, and amazing the experience. With Bluetooth ® LE (BLE) now standard in all modern mobile devices (and expected to be in 90% of all devices by 2018), and more people enabling Bluetooth (required to pick up beacon signals) to communicate with their wireless peripherals, BLE beaconing is quickly moving from a nice-to-have to a must-have marketing technology in 2017.-- Boston Retail Partners surveyCompanies of all sizes are using BLE technology to gain tremendous insight into employee, customer, and guest behavior, and to offer helpful, convenient, and incredibly personalized new services. Here are just some of the use cases that are enabled with BLE indoor location services:Analytics – Gather zone-based user analytics, such as the average number of people in your establishment, the number of passersby, or the length of time each person spends at a particular display, area or department. Look at traffic patterns by time of day, day of week, or by season. Integrate with other data such as weather feeds and customer relationship management (CRM) to gain even greater insights.Wayfinding (Indoor Navigation) – A GPS-like navigation experience for indoor environments. Wayfinding typically offers turn-by-turn directions and a map showing the user moving toward his or her destination. Ideal for airports, hotels, casinos, tradeshows, events, malls, or any other large venue.Mobile DeviceBLE Tag Access PointPush Promotions – Consumers receive personalized notifications or offerson their smartphone, based on their proximity to a specific object—a storein a mall, or an aisle, product or brand once inside. Integrate with othercustomer data to deliver ever more personalized and relevant messages:Direct customers to a product they recently researched online, or promotea concert at a baseball game to a fan that follows the band.Proximity Messaging – Not all messages need be promotional. Providinghelpful information or additional content helps increase brand loyalty.Greet customers by name as they walk through the door. Provide specialoffers to premium guests. Offer customized information to museumpatrons or trade show guests as they approach a specific display or booth.Notify shoppers when their in-store purchases are ready for pickup.Personalized Experiences – Beacons coupled with other technology,such as RFID tags and digital signage, take personalization from theuser’s phone to the surrounding physical environment. Customers canbe greeted by name when they reach a specific display. Screens coulddisplay specific products of interest based on past purchases or even bythe products currently in their shopping carts. Even prices on digital tagscould change based on that customer’s loyalty points or stored coupons.Hyperlocal Check-in – Unlike Facebook or Foursquare, highly targeted check-ins enable consumers to tell you exactly where they are in your facility. This feature could be used in conjunction with specific location-based promotions or reward-based games, like a scavenger hunt.Employee Assistance – Find the closest sales associate for product inquiries or rapid checkout. Or enable your customers to direct an employee straight to them with the tap of a finger.Retargeting Ads – T argeting people who visit your website with ads on Facebook, Twitter and other sites that use retargeting is a powerfully cost-effective way to reserve your ad spend on people who have already indicated an interest in your business. Now imagine being able to do the same for people who walk into your store or other physical place of business.Virtual Concierges – Guests in a restaurant, mall, fitness club or other establishment can use their phones to order food and other services, which can be delivered right to their exact location.Asset Tracking – Is another popular use case for Bluetooth® LE beacons. Instead of broadcasting its ID to mobile devices, the beacon “listens” for the unique IDs of BLE tags attached to objects. Because these tags can be equipped with sensors—for things such as light, sound, movement and temperature—the applications are many, from tracking of wheelchairs and infusion pumps in a hospital, to monitoring the movement, speed and vibration of an airport baggage conveyor.Creative marketers in every industry are already dreaming up ways to leverage asset tracking to generate more revenue streams and increase productivity.BLE Engagement WayfindingProximity Messaging Real-time Location AnalyticsTRADITIONAL BLUETOOTH® LE DEPLOYMENT AND MANAGEMENT CHALLENGESWhile the use cases for Bluetooth® LE are compelling, historically it has been a challenge to deploy and operate large BLE networks in a cost-effective way. That is because the beaconing technology to date has required battery powered devices (i.e. transmitters), which create the following challenges:•Comprehensive site surveys are required to arrange and calibrate beacons for optimum performance and accuracy in a given environment.Want to move or add more beacons? Another site survey and recalibration is required. Because RF signals can be impacted by physical changes in the environment—such as new product displays, moved furniture, or even large influxes of people—the system will be plagued by poor performance until the beacons can be recalibrated. What retail store or event venue doesn’t change on a regular basis? Who has an IT staff capable of dealing with dynamic daily changes, like large groups of people, on demand?•High deployment costs. Many of the use cases above require alocation system with granular micro-location to deliver one to threemeter accuracy. This would requires thousands of beacons in a singlelocation, which creates substantial cost barriers.•Battery maintenance is problematic- While battery life has improved, alarge enterprise may deploy tens of thousands of beacons, distributedacross the globe. Locating and replacing dead batteries can be aweekly occurrence. The more you beacon to get accurate and timelylocation information, the faster you’ll be replacing batteries.I’m a battery-powered Beacon •Lack of enterprise-grade management means costly truck rollsand time-consuming manual processes. Physical beacons lack IPaddresses. As such, they can’t be identified by the network and bemanaged remotely by IT.•Aesthetics. Battery powered beacons are glued to the wall, often 25 feet apart. This can adversely impact the appearance of a location, which is often a nonstarter in hotels, museums, and other locations where aesthetics is important.•Risk of theft. Battery powered beacons can be stolen or knocked off the wall, creating additional management headaches.All told, a large enterprise can expect to pay approximately $300 per beacon in maintenance costs. Even if your use cases warranted the high cost, there is still the issue of inconsistent user experiences to consider. Differences in mobile device types (chipsets, OS, antenna, etc.), and dynamic changes to the RF environment—like that large influx of people-- can dramatically affect accuracy and user experience. Manual site surveys and RF calibrations simply cannot keep up.MIST VIRTUALIZES INDOOR LOCATIONFor indoor location services to truly take off, companies require BLE deployments that integrate with their existing networks, scale to handle millions of mobile devices, and automatically recalibrate for different device types and dynamic changes to the environment in real time.Fortunately, new solutions like the Mist Learning WLAN integrate BLE with Wi-Fi in a single A.I.-driven platform that is operated via the cloud.Unlike other WLANs that just integrate a single BLE beacon in anAccess Point and/or make it possible to monitor battery beacons viaa centralized management tool, Mist completely virtualizes the indoorlocation experience for maximum scale, performance, ease of use,and cost effectiveness. Here are the unique components of the Mistsolution:Access Points with directional BLE antenna array. The first step in a Bluetooth ® LE location service is to blanket the room with BLE signals. Rather than use physical beacons, Mist achieves this with a patented 16 element directional antenna array in Mist Access Points, which sends unique RF energy in multiple different directions. With BLE signals emanating from the AP, Mist eliminates the need for battery powered BLE beacons and lets mobile devices interact with an entire room instead of a single transmitter.Machine learning in the cloud. An iPhone 6s operate s very differentlythan an iPhone 5s or Samsung Galaxy on a wireless network. But knowingthat doesn’t make it any easier to recalibrate for every situation. T oaddress this, the Mist platform uses artificial intelligence to account fordifferences in devices, as well as constant changes to the RF environment—such as moving a chair, or adding a partition. It continuously takeslocation estimates from every-day use, examines them, detects the RFcharacteristics based on the actual input, and adapts the location formulato maximize accuracy.Machine learning operates across different end user device types,constructing specifically tailored path loss formulas. This is naturallynecessary as different devices have different RF characteristics. Bycontinuously and automatically adapting to different devices and changingRF environments, new Mist WLAN systems obviate the need for manualcalibration in BLE environments.Virtual Beacons. As mentioned above, Mist eliminates the need forbattery powered beacons by moving the Bluetooth ® LE beaconingfunctionality into the AP and using machine learning in the cloud. T oenable location-specific messages, Mist patented a new concept knownas virtual beacons. Virtual beacons use geofencing technology to allowspecific messages to be displayed anywhere on a floor plan (like GPS usesoutdoors). The message, range and location is completely configurableusing software – i.e. the Mist UI or APIs. With Mist, an unlimited numberof virtual beacons can be deployed in any physical environment, providingunsurpassed scalability and ease of use.The above technologies enable Mist to deliver 1-3m location accuracy with sub-second latency, making it ideal for all the use cases mentioned above. By integrating this functionality into an enterprise-grade WLAN platform, you save time and money on deployment and operations while ensuring maximum scalability and reliability.Machine Learning in the Cloud Patented Virtual BeaconsHOW TO START YOUR OWN INDOOR LOCATION JOURNEYNow that you understand the basics of Bluetooth ® LE and how to deploy a scalable solution, here is what you need to get started with indoor location services:A Bluetooth ® LE-enabled mobile appA mobile app with a compelling user experience is essential for a successful proof of concept. Y ou can start with a simple navigation or wayfinding app, or any number of readily available third-party apps designed specifically for your industry. If you have your own branded app, your beacon platform provider can supply your developers with the software developerkit (SDK) they’ll need to BLE-enable your app. You can also find expertBLE app development partners to help you customize your app or build one from the ground up.Indoor MapA digital map of your facility or campus is required for navigation andproximity marketing. Your POC use case will help you determine howextensive your initial indoor map needs to be. But you should alsoconsider what will be required and who will maintain your maps longterm. Indoor mapping and navigation vendors catering to a variety ofindustries can be found in the Mist BLE Alliance.Bluetooth ® LE beacon infrastructure and analyticsBeacons and accompanying software services are required for blue dotlocation and analytics. A few battery beacons are all you need to testpilot your application. However, we recommend you engage early withyour IT department, and an enterprise-grade BLE/Wi-Fi provider toensure your solution can scale.Management platformMost battery beacons are managed with a mobile app. When moving from POC to full-scale deployment, you may want to consider an enterprise-grade management system with machine learning and virtual beacon capabilities to avoid expensive overlay network management and unsatisfactory user experiences.YOUR CEO WILL THANK YOUThe wireless world is at a tipping point where every smartphone, tablet and laptop has BLE, making these devices ready for new indoor location-based services.Thanks to new modern wireless platforms with enterprise-grade BLE access points, machine learning in the cloud, and virtual beacon technology, the infrastructure is now ready to support the demand.The use cases for BLE are endless. Are you ready to take advantage of the enormous opportunity? Mist can help you with all the elements needed to deliver a great BLE user experience. Email *************and we will get you started.Mist Case Study。
跨界合作趋势:创新与创业的最新发展
跨界合作趋势:创新与创业的最新发展1. Introduction1.1 Overview:The rapid pace of innovation and entrepreneurship has led to the emergence of new ways of collaboration, and one such trend is cross-domain cooperation. This article aims to explore the latest developments in cross-domain collaboration within the context of innovation and entrepreneurship.1.2 Background:Traditionally, industries have operated within specific boundaries, with limited interaction between sectors. However, with technological advancements and globalization, boundaries have become blurred. Companies are now realizing the immense potential in collaborating with partners from diverse industries to drive innovation and fuel entrepreneurial success.1.3 Objectives:The primary objective of this article is to delve into the concept andsignificance of cross-domain collaboration for fostering innovation and entrepreneurship. It will provide a comprehensive analysis of current trends in cross-domain cooperation across various sectors while highlighting practical examples of successful collaborations. Furthermore, this article aims to offer insights into future directions for cross-domain cooperation and provide valuable strategies for individuals and businesses looking to engage in such partnerships.(Word count: 149 words)2. 跨界合作的定义与概念2.1 跨界合作的含义跨界合作是指不同行业、领域或专业之间进行合作和协同创新的一种趋势。
ITIL术语中英文对照表
发表于: 2009-11—29 14:26发表主题:ITIL术语中英文对照表,论坛里有看到,但是没有过验证,在这里贴ITIL术语中英文对照表Absorbed overhead 可分摊间接费用Absorption costing 吸收成本法,完全成本法Acceptance 验收Acceptance environment 验收环境Acceptance test 验收测试Access control 访问控制Accounting 会计核算Accuracy 准确度Action lists 行动列表Activity Based Costing (ABC) 作业成本法(ABC)Adaptive maintenance 适应性维护Additive maintenance 补充性维护Adjustability 可调整性Agreed Service Time (AST)约定服务时段Alert 告警Alert phase 告警阶段Allocated cost 可直接分配成本Application 应用,应用系统Application maintenance 应用维护Application management 应用管理Application sizing 应用选型Application software 应用软件Apportioned cost 待分摊间接成本Architecture 架构Archive 存档Asset 资产Asset management 资产管理Assurance 保证Attributes 属性Audit 审计Auditability 可审计性Authentication 验证Authenticity 真实性Authorisation 授权Automatic Call Distribution (ACD) 自动呼叫转发(系统)(ACD)Availability 可用性Availability management 可用性管理Availability Management Database (AMDB) 可用性管理数据库(AMDB)Backup 备份Balanced Scorecard (BSC) 平衡计分卡Baseline 基线Baseline security 安全基线Batch processing rate 批处理速度Benchmark 标杆Biometrics 生物测定学BS7799 BS7799Budgeting 预算编制Bug BUG(也可形象地译为“臭虫")Build 构建Building environment 构建环境Business 业务,商业Business capacity management 业务能力管理Business Continuity Management (BCM)业务持续性管理(BCM) Business function 业务功能,业务职能部门Business Impact Analysis (BIA) 业务影响分析(BIA)Business process 业务流程Business recovery objective 业务恢复目标Business recovery plan framework 业务恢复计划框架Business recovery plans 业务恢复计划Business recovery team 业务恢复小组Business Relationship Management (BRM)业务关系管理(BRM)Business request 业务请求Business Unit (BU) 业务单元(BU)Bypass 临时措施Call 呼叫Call center 呼叫中心Capacity Database (CDB)能力数据库(CBD)Capacity management 能力管理Capacity plan 能力计划Capacity planning 能力规划Capital investment appraisal 资本投资评估Capitalization 资本化Category 类别,分类Central point of contact 联络中心Certificate 证书Certification Authority (CA)认证机构(CA)Certify 认证Change 变更Change Advisory Board (CAB)变更顾问委员会(CAB)Change Advisory Board /Emergency Committee(CAB/EC)变更顾问委员会/应急委员会(CAB/EC)Change authority 变更授权Change builder 变更构建者Change control 变更控制Change document 变更文档Change history 变更历史Change log 变更日志Change management 变更管理Change manager 变更经理Change model 变更模式Change processing 变更处理Change Record 变更记录Change request 变更请求Chargeable unit 计费单元Charging 计费CI level 配置项级别Clarity 易理解性Classification 分类,分级Clean desk 桌面清理,桌面整理Client 客户Cold stand-by 冷支持Command,control and communications 命令、控制和协调Communication facility 通信设备,通信设施Compatibility 兼容性Completeness 完整性Complexity 复杂性Component Failure Impact Analysis (CFIA) 组件故障影响分析(CFIA)Compromise 泄漏Computer 计算机Computer Aided Systems Engineering(CASE)计算机辅助系统工程(CASE)Computer center 计算机中心Computer operations 计算机操作Computer platform 计算机平台Computer system 计算机系统Computer Telephony Integration (CTI) 计算机电话集成(系统)(CTI) Confidentiality 保密性Confidentiality, Integrity and Availability (CIA) 保密性、完整性和可用性(CIA)Configuration 配置Configuration baseline 配置基线Configuration control 配置控制Configuration documentation 配置文档Configuration identification 配置标识Configuration Item (CI)配置项(CI)Configuration management 配置管理Configuration Management Database(CMDB)配置管理数据库(CMDB)Configuration management plan 配置管理计划Configuration manager 配置经理Configuration structure 配置结构Configure 配置Connectivity 连通性Contingency manager 应急经理Contingency plan 应急计划Contingency planning 应急规划Contingency planning and control 应急规划及控制Continuity 持续性Continuity manager 持续性经理Continuous availability 持续可用性Continuous operation 持续运作Contract 合同Control 控制Controllability 可控性Cookie Cookie(也可形象地译为“甜饼",译者注)Correctability 可纠正性Corrective controls 纠正性控制Corrective maintenance 纠正性维护Corrective measures 纠正措施Cost 成本,费用Cost effectiveness 成本效益Cost management 成本管理Cost unit 成本单元Costing 成本核算Countermeasure 防范措施Cracker 骇客CRAMM CRAMM(英国中央计算机与电信局行风险分析和管理的方法。
因特网发明作文英语版
因特网发明作文英语版Title: The Invention of the Internet。
The invention of the Internet stands as one of the most transformative events in human history. Its impact has been profound, reshaping the way we communicate, work, learn, and interact with the world around us. In this essay, we will explore the origins, development, and significance of this remarkable innovation.The Internet traces its origins back to the late 1960s, emerging from research conducted by the United States Department of Defense's Advanced Research Projects Agency (ARPA). The initial goal was to create a robust and decentralized communication network that could withstand a nuclear attack, thus ensuring the continuity of military communication in the event of a catastrophe.Key developments in the early years included the creation of ARPANET, the first packet-switching network,which allowed for the transmission of data between multiple computers. This laid the groundwork for the protocols and technologies that would eventually evolve into the Internet as we know it today.One of the pivotal moments in the Internet's development came with the invention of TCP/IP (Transmission Control Protocol/Internet Protocol) in the 1970s. This standardized protocol suite provided a common language for computers to communicate over networks, facilitating interoperability and paving the way for the expansion of the Internet beyond military and academic circles.Throughout the 1980s and 1990s, the Internet experienced explosive growth, driven by advances in computing technology, the proliferation of personal computers, and the commercialization of the network. The World Wide Web, invented by Sir Tim Berners-Lee in 1989, further democratized access to information by providing a user-friendly interface for navigating the vast array of resources available on the Internet.The Internet's decentralized architecture, built onopen standards and protocols, has been instrumental in fostering innovation and creativity. It has empowered individuals and communities to connect, collaborate, and share knowledge on an unprecedented scale. From the rise of social media platforms to the emergence of e-commerce giants, the Internet has revolutionized nearly every aspect of modern life.Moreover, the Internet has played a crucial role in advancing global development and promoting socio-economic inclusion. It has bridged geographical barriers, enabling people from diverse backgrounds to access educational resources, economic opportunities, and vital services. In developing countries, mobile Internet access has empowered millions to leapfrog traditional barriers to development, accelerating progress in areas such as healthcare, education, and entrepreneurship.However, the Internet also presents challenges andrisks that must be addressed. Issues such as online privacy, cybersecurity, digital divide, and misinformation posesignificant threats to the Internet's potential as a force for good. As we navigate the complexities of the digital age, it is imperative that we work together to safeguard the openness, integrity, and inclusivity of the Internetfor future generations.In conclusion, the invention of the Internet has transformed the world in profound ways, revolutionizing how we communicate, work, and live. Its decentralized architecture and open standards have fueled innovation and empowered individuals across the globe. Yet, as we reap the benefits of the digital revolution, we must remain vigilant in addressing the challenges and risks that accompany it. Only by working together can we ensure that the Internet continues to serve as a force for positive change in the years to come.。
中考英语交通工具改进单选题50题
中考英语交通工具改进单选题50题1. We need to improve the ____ of our cars to reduce fuel consumption.A. speedB. performanceC. sizeD. color答案:B。
本题考查交通工具性能相关词汇。
选项A“speed”指速度;选项B“performance”有性能的意思,符合语境,强调汽车整体性能的提升以降低油耗;选项C“size”指尺寸;选项D“color”指颜色,均与降低油耗的性能改进无关。
2. The new technology can greatly enhance the ____ of the buses.A. safetyB. comfortC. beautyD. cost答案:A。
本题围绕交通工具性能改进。
选项A“safety”意为安全,新技术能提升公交车的安全性;选项B“comfort”指舒适;选项C“beauty”指美观;选项D“cost”指成本,而题干说的是新技术对公交车性能的提升,安全性能更符合。
3. To make the trains more efficient, we should focus on improving their ____.A. enginesC. seatsD. lights答案:A。
本题考查火车性能改进的重点。
选项A“engines”指引擎,改进引擎能使火车更高效;选项B“windows”指窗户;选项C“seats”指座位;选项D“lights”指灯光,这三个选项都不是影响火车效率的关键因素。
4. The improvement of the ____ can make the planes fly longer distances.A. wingsB. cabinsC. enginesD. pilots答案:C。
本题关于飞机性能改进。
选项A“wings”指机翼;选项B“cabin”指机舱;选项C“engines”指引擎,改进引擎能使飞机飞得更远;选项D“pilots”指飞行员,飞行员不是飞机能飞更远的直接改进因素。
生物样本库信息管理系统的设计和实现
系统研发与应用System Research and Application生物样本库信息管理系统的设计和实现System Research and Application系统研发与应用2 系统设计生物样本库信息管理系统是以图1 临床资源库网络信息管理系统图2 LIS系统图3 HIS系统 2.1 系统分析生物样本库信息管理系统是技术难点和科技含量较高的生物样本库信息系统。
生物样本库信息技术是与高效运行的医院信息系统(HIS)、电子病历系统(EMR)、检验信息系统(LIS)、放射医疗学管理系统(RIS)对接的医疗结构的基础设施和基础结构的集成,围绕卫生部“基于电子病历的医院信息平台建设技术方案”为宗旨,探索生物样本库平台建设以及无线临床应用,探索建立生物样本库样本的标准化采集,保存流程和生物样本库信息整合,分析及检索查询和尝试移动终端为社区流调数据归档和建立的可行性研究和分析。
本系统是基于SOAP模式的数据采集,采用Broswer/Server(B/S)和Client/Server(C/S)混合架构。
考虑到系统的可扩展性及跨平台性,数据库系统选择采用SQL Severs 2005,实高,系统设计分为表现层,业务逻辑层和数据访问层系统。
系统设有不同图4 EMR系统图5 统一医学语言系统80第8卷第10期System Research and Application系统研发与应用本信息,优化流程,探索开发一套服务于国内转化医学研究的生物样本库信息管理和决策支持系统。
2.3.2 管理权限的设置 优化流程、集中控制采集、分级权限管理解决了物理访问控制的矛盾,避免了数据泄露。
网络边界管理,数据访问限制和数字签名,完善的密码验证和分级权限登录验证机制,及时的数据备份可以从容应对紧急情况下发生的灾难事件,将数据损失降低到最低,加强对接医院端生物样本库的临床信息管理系统的安全管理。
在有限元要素的建立下,确保生物样本患者个人隐私安全进行设计架构。
信息安全的英文
Apply regular firewall updates to patch vulnerability and ensure optimal performance
Intrusion Detection/Prevention Systems (IDS/IPS)
Real time Monitoring
Threats
Any circulation or event with the potential to cause harm to information systems through unauthorized access, destruction, disclosure, modification of data, or denial of service
Regular updates of antivirus software to ensure protection against the latest threats
Integration of antivirus software with other security tools for comprehensive protection
03
Key Management: Implement robust key management practices to securely generate, store, distribute, and revoke encryption keys
04
Compliance with Standards: Adhere to industry standards and regulations for encryption technologies to ensure interoperability and security
BS 746-2014
BS746:2014Specification for gas meter unions and adaptorsPublishing and copyright informationThe BSI copyright notice displayed in this document indicates when the documentwas last issued.©The British Standards Institution 2014Published by BSI Standards Limited 2014ISBN 9780580748929ICS 21.060.01The following BSI references relate to the work on this document:Committee reference GSE/25Draft for comment 12/30243876DCPublication historyFirst published December 1937Second edition February 1958Third edition January 1967Fourth edition April 1987Fifth edition May 2005Sixth (present)edition November 2014Amendments issued since publicationDate Text affectedBS 746:2014BRITISHSTANDARDContentsForeword ii1Scope 12Normative references 13Terms and definitions 24Materials 25Dimensions 56Machined surfaces 57Screw threads 58Strength of nuts and female adaptor ends 59Finish 610Marking 6Bibliography 15List of figuresFigure 1–Basic Whitworth form 5List of tablesTable 1–Initial and release torques 3Table 2–Torque for strength test 6Table 3–Boss dimensions 7Table 4–Nut dimensions 8Table 5–Liner dimensions 9Table 6–Reducing adaptor dimensions 10Table 7–Increasing adaptor dimensions 11Table 8–Union washer dimensions 12Table 9–Adaptor washer dimensions 12Table 10–Sealing disc dimensions 13Table 11–External thread dimensions 14Table 12–Internal thread dimensions 14Summary of pagesThis document comprises a front cover,an inside front cover,pages i to ii,pages 1to 16,an inside back cover and a back cover.BRITISH STANDARD BS 746:2014©The British Standards Institution 2014•iForewordPublishing informationThis British Standard is published by BSI Standards Limited,under licence fromThe British Standards Institution,and came into effect on 30November 2014.Itwas prepared by Technical Committee GSE/25,Gas meters .A list of organizationsrepresented on this committee can be obtained on request to its secretary.SupersessionBS 746:2014supersedes BS 746:2005+A1:2009,which is withdrawn.Relationship with other publicationsThis standard specifies fittings to be used in conjunction with gas meters such asthose specified by BS EN 1359and BS EN 14236.Information about this documentThis is a full revision of the standard,and introduces the following principalchanges.•Dimensional changes have been made to ensure that the flat parts of the nuts engage directly on the flat parts of the liners such that even pressure isapplied to the surfaces of the washers.•The properties of the sealing washer have been redefined.•Additional tests for fittings and washer performance have been added.•Hexagonal nuts are now permitted as an alternative to octagonal nuts.This document may be used in the procurement of fittings.Presentational conventionsThe provisions of this standard are presented in roman (i.e.upright)type.Itsrequirements are expressed in sentences in which the principal auxiliary verb is“shall”.Commentary,explanation and general informative material is presented insmaller italic type,and does not constitute a normative element.Contractual and legal considerationsThis publication does not purport to include all the necessary provisions of aers are responsible for its correct application.Compliance with a British Standard cannot confer immunity from legalobligations.BRITISH STANDARDBS 746:2014ii •©The British Standards Institution20141ScopeThis British Standard specifies requirements and test methods for unions andadaptors for the installation of low pressure gas meters.It is applicable tounions and adaptors for gas meters for use with 1st,2nd and 3rd family gases attemperatures between –20°C and +60°C,up to a maximum operating pressureof 75mbar 1)and a maximum incidental pressure of 200mbar.The gas tightnessof the gas meter unions and adaptors is also specified.NOTE The tests specified in this standard are type tests,except for that specifiedin 4.2.3.2Normative referencesThe following referenced documents are indispensable for the application ofthis document.For dated references,only the edition cited applies.For undatedreferences,the latest edition of the referenced document (including anyamendments)applies.BS 1936-1,Undercuts and runouts for screw threads –Part 1:Inch screw threadsBS 7371-6,Coatings on metal fasteners –Part 6:Specification for hot dippedgalvanized coatingsBS EN 549,Specification for rubber materials for gas appliances and gasequipmentBS EN 1562,Founding –Malleable cast ironsBS EN 1652,Copper and copper alloys –Plate,sheet,strip and circles for generalpurposesBS EN 1976,Copper and copper alloys –Cast unwrought copper productsBS EN 1982,Copper and copper alloys –Ingots and castingsBS EN 10088-3:2005,Stainless steels –Part 3:Technical delivery conditions forsemi-finished products,bars,rods,wire,sections and bright products ofcorrosion resisting steels for general purposesBS EN 10242,Threaded pipe fittings in malleable cast ironBS EN 12164,Copper and copper alloys –Rod for free machining purposesBS EN 12165,Copper and copper alloys –Wrought and unwrought forging stockBS EN 12167,Copper and copper alloys –Profiles and rectangular bar forgeneral purposesBS EN 12168,Copper and copper alloys –Hollow rod for free machiningpurposesBS EN 12329:2000,Corrosion protection of metals –Electrodeposited coatings ofzinc with supplementary treatment on iron or steelBS EN 12420,Copper and copper alloys –ForgingsBS EN ISO 27830,Metallic and other inorganic coatings –Guidelines forspecifying metallic and inorganic coatingsPD 970,Wrought steels for mechanical and allied engineering purposes –Requirements for carbon,carbon manganese and alloy hot worked or coldfinished steels1)1bar =105N/m2=100kPa.BRITISH STANDARD BS 746:2014©The British Standards Institution 2014•13Terms and definitionsFor the purposes of this British Standard the following terms and definitionsapply.3.1adaptor metal fitting for connecting a nut and liner to a boss of a different size 3.2apparatus construction of pipes,fittings,test points,etc.,that is leak tight 3.3boss part of a fitting with an external screw thread 3.4adaptor washer elastomeric seal between a boss and an adaptor 3.5liner metal fitting with a flanged end to take union washer 3.6nut metal fitting with an internal screw thread 3.7sealing discmetal fitting fitted between a boss and a nut,with or without a liner,designedto close off the gasway3.8unionmetal fitting comprising a boss and a liner using a washer and nut for gastightness3.9union washerelastomeric seal between a boss and a liner4Materials4.1Metal fittingsMetal fittings shall be made from one of the following materials:a)brass for hot pressing,grade CW602N or CW617N to BS EN 12165or BS EN 12420;b)brass for casting,grade CC490K,CC491K,CC750S,CC754S or CC760S to BS EN 1982;c)brass rod,grade CW602N,CW614N or CW617N to BS EN 12164,BS EN 12167or BS EN 12168;d)brass sheet and strip,grade CW508L to BS EN 1652;e)copper,grade CR004A to BS EN 1976;f)malleable cast iron to BS EN 1562;g)carbon steel of any grade,with a content not exceeding 0.01%for lead,0.06%for sulfur and 0.06%for phosphorous and which is suitable forwelding,and forming or machining,as appropriate,to PD 970;orh)austenitic stainless steel to BS EN 10088-3:2005,grades 1.4404and 1.4541.BRITISH STANDARDBS 746:20142•©The British Standards Institution20144.2Elastomeric washers4.2.1GeneralElastomeric washers shall be tested in accordance with BS EN 549.Whentested in accordance with BS EN 549,the material from which elastomericwashers are made shall:a)be of a hardness 91±3IRHD 2);b)otherwise conform to BS EN 549,grade H3,A2.4.2.2Leak rate at low pressure4.2.2.1Leak rateEach size of washer (see Table 8and Table 9)shall be tested separately inaccordance with 4.2.2.2.When tested in accordance with 4.2.2.2,the totalleak rate of the assembly shall not exceed 0.2L/h and the release torque ofany union nut shall be not less than given in Table 1.Table 1Initial and release torquesNominal size inInitial torque Release torque1⁄2——3⁄42581251411⁄4352011⁄245282100374.2.2.2Test method4.2.2.2.1Select 60washers and divide these into four groups of 15.Erect fourseparate assemblies,each:a)comprising 15washers,nuts,liners and bosses,together with suitableapparatus that includes means of allowing the internal pressure of eachassembly to be changed and measured;andb)having an internal volume not exceeding 0.035m 3.Calculate the internal volume of each assembly.4.2.2.2.2Allow the apparatus,washers,nuts,liners and bosses to stabilize at(20±3)°C for a period of 1h.Assemble the washers,nuts,liners and bosses andtighten each nut to the applicable torque given in Table 1.2)International Rubber Hardness DegreesBRITISH STANDARD BS 746:2014©The British Standards Institution 2014•34.2.2.2.3Subject each assembly to the following environmental conditions,asapplicable.Assembly 1Leave at room temperature of (20±3)°C for a period of not less than 4h.Assembly 2Leave at room temperature of (20±3)°C for a period of 1h,then place theassembly in an environmental chamber at a temperature of (–20±3)°C andleave for a period of not less than 4h.Remove the assembly from theenvironmental chamber and leave the assembly at room temperature for aperiod of 2h.Assembly 3Leave at room temperature of (20±3)°C for a period of 1h,then place theassembly in an environmental chamber at a temperature of (60±3)°C and leavefor a period of not less than 4h.Remove the assembly from the environmentalchamber and leave the assembly at room temperature of (20±3)°C for a periodof 2h.Assembly 4Leave at room temperature of (20±3)°C for a period of 1h then place theassembly in an environmental chamber at a temperature of (–20±3)°C andleave for a period of not less than 4h.Increase the temperature within thechamber to (60±3)°C,and once a temperature of (60±3)°C is reached maintainthe temperature for a period of not less than 4h.Remove the assembly fromthe environmental chamber;leave the assembly at room temperature of(20±3)°C for a period of 2h.NOTE If any of the groups are split into subgroups,due for example to theenvironmental chamber being unable to accommodate 15samples,it is necessary tobe able to show that the test conditions were the same for each subgroup.4.2.2.2.4After each assembly has undergone the environmental conditioningspecified in 4.2.2.2.3,set the pressure in the assembly to 75mbar.Isolate thepressure supply,then observe a 1min temperature stabilization.Take thepressure (P1)within the assembly and observe a test period of 2min.Followingthis,take a second pressure reading (P2).Calculate the rate of leakage duringthe test period using the total volume of the assembly under test and the twopressures P1and P2.The gauge used shall be a digital pressure gauge with aresolution of 2dcp.NOTE 1When undertaking the gas tightness test,care has to be taken not to affectthe gas tightness of the assembly,e.g.avoid tightening against it or otherwiseclamping the joint.NOTE 2It is not necessary to test all groups simultaneously,only that 60samples betested in four groups.4.2.3One-off test for complete assembly with new washers4.2.3.1Each size of washer (see Table 8and Table 9)shall be subjectedseparately,as part of a complete assembly,to the gas tightness test in 4.2.3.2.When tested in accordance with 4.2.3.2,no air bubbles shall be released fromthe assembly.4.2.3.2Select five new washers of each size and assemble the washers,nuts,liners and bosses.Tighten each nut to the applicable torque given in Table 1.Pressurize the assembly to 350mbar and seal off the ends.Immerse theassembly in a water bath which is at ambient temperature and with a depth notexceeding 300mm.Observe for a period of 30s after any external trapped airhas been dispersed.BRITISH STANDARDBS 746:20144•©The British Standards Institution20145Dimensions 5.1General Fittings shall conform to the appropriate dimensions specified in Table 3to Table 10,as applicable.NOTE Reference numbers have been added to Table 4and Table 6to Table 10to assist the ordering and purchase of fittings.5.2Undercuts The thread undercuts shall be Grade 1,Form A,Width 2p in accordance with BS 1936-1,except that undercut radius shall be ≤0.5mm.6Machined surfaces The machined surface of a fitting shall have:a)a concentricity tolerance on all threads and diameters of Ø0.4mm;and b)a surface roughness of not more than 1.6µm on the sealing faces.7Screw threads Screw threads shall conform to the dimensions given in Table 11and Table 12,and shall be of basic Whitworth form as illustrated in Figure 1.Figure 1Basic Whitworthform 8Strength of nuts and female adaptor ends8.1Nuts and adaptors shall be tested in accordance with 8.2.When tested inaccordance with 8.2,nuts and the female ends of adaptors shall not fracture.8.2Screw a nut fitted with a liner or adaptor,but without the washer,onto asuitable boss component and tighten to the appropriate torque given in Table 2.BRITISH STANDARD BS 746:2014©The British Standards Institution 2014•5Table 2Torque for strength testNominal sizeinTorque N·m 1⁄21253⁄4150115011⁄417511⁄220022009FinishMetal fittings shall be clean and free from scale.Metal components,excluding meter bosses,conforming to 4.1f)and 4.1g)shall be protected from corrosion in accordance with a)and b),as applicable.The protective finish shall be such as to not affect the dimensional conformity of threads in Table 11and Table 12or the efficacy of sealing surfaces (as specified in Clause 10).a)Where a hot dipped zinc corrosion protection coating is applied tomalleable cast iron conforming to 4.1f),this shall conform to BS EN 10242or BS 7371-6.b)Where an electroplated zinc and chromate passivated corrosion protection coating is applied to carbon steel conforming to 4.1g),the coatingdesignation shall conform to BS EN 12329and,as a minimum,be suitable for service condition 3,as defined in BS EN ISO 27830,or as agreed with the purchaser.The chromate conversion coating shall be trivalent,rather than hexavalent,and conform to the corrosion resistance test requirements for the corresponding chromate conversion code in BS EN 12329:2000,Table 2.NOTE Requirements for the corrosion protection of meter bosses are given in gas meter standards,e.g.BS EN 1359and BS EN 14236.10MarkingThe nut,union,liner,boss and adaptor shall be marked with the following information.a)The name,trade mark or other means of identification of the manufacturer.b)The product reference and,where applicable,the batch of products to which it belongs.c)The number and date of this British Standard,i.e.BS 746:20143).The washer shall be marked on either its internal or external surface,but not on the sealing surfaces,such that the washers’sealing properties are not affected.The marking shall be a permanent feature of the washer.The marking shall be obvious and be not less than 6mm in width.NOTE The marking is intended to distinguish washers conforming to BS 746:2014from those made to earlier editions.3)Marking BS 746:2014on or in relation to a product represents a manufacturer’s declaration of conformity,i.e.a claim by or on behalf of the manufacturer that the product meets the requirements of the standard.The accuracy of the claim is solely the claimant’s responsibility.Such a declaration is not to be confused with third-party certification of conformity.BRITISH STANDARDBS 746:20146•©The British Standards Institution2014©The British Standards Institution2014•78•©The British Standards Institution2014©The British Standards Institution 2014•910•©The British Standards Institution2014©The British Standards Institution2014•11Table9Adaptor washerdimensions 12•©The British Standards Institution2014©The British Standards Institution 2014•13Table 11External thread dimensions Nominal size Threads per inch Pitch Major diameter Effective diameterMinor diametermax.min.max.min.max.min.in mm mm mm mm mm mm mm 1⁄218 1.41125.04524.77024.14023.92523.23522.8953⁄412 2.11729.23528.92527.88027.64026.52026.135111 2.30936.90536.56535.42535.17033.95033.53511⁄411 2.30946.23045.89044.75044.49543.27042.85511⁄211 2.30957.15056.79555.67055.40054.19553.7652112.30976.58076.21575.10074.82073.62573.185Table 12Internal thread dimensions Nominalsize Threads per inchPitchMajor diameter Effective diameter Minor diameter min.max.min.max.min.in mm mm mm mm mm mm 1⁄218 1.41125.09524.40524.19023.78023.2853⁄412 2.11729.33528.22027.98027.22526.625111 2.30937.01035.78535.53034.73534.05011⁄411 2.30946.33045.10544.85044.06043.37511⁄211 2.30957.30056.09555.82555.03054.3452112.30976.73575.53575.25574.46073.775NOTE The fittings to which the above screw threads are applied are thin walled and of relatively large diameter.This table includes an allowance for possible distortion.14•©The British Standards Institution 2014BibliographyFor dated references,only the edition cited applies.For undated references,the latest edition of the referenced document(including any amendments)applies. BS EN1359,Gas meters–Diaphragm gas metersBS EN14236,Ultrasonic domestic gas metersOther publications[1]GREAT BRITAIN.The Gas Safety(Installation and Use)Regulations1998.London:The Stationery Office.[2]GREAT BRITAIN.The Gas Safety(Management)Regulations1996.London:The Stationery Office.[3]GREAT BRITAIN.The Gas(Meters)Regulations1983,as amended.London:The Stationery Office.[4]GREAT BRITAIN.The Building Regulations2000,as amended.London:TheStationery Office.[5]GREAT BRITAIN.The Building(Scotland)Regulations2004.London:TheStationery Office.[6]NORTHERN IRELAND.The Building Regulations(Northern Ireland)2000.London:The Stationery Office.©The British Standards Institution2014•1516•©The British Standards Institution2014This page deliberately left blankThis page deliberately left blankBSI Group Headquarters389 Chiswick High Road London W4 4AL UK About usWe bring together business, industry, government, consumers, innovatorsand others to shape their combined experience and expertise into standards-based solutions.The knowledge embodied in our standards has been carefully assembled ina dependable format and refined through our open consultation process.Organizations of all sizes and across all sectors choose standards to helpthem achieve their rmation on standards We can provide you with the knowledge that your organization needs to succeed. Find out more about British Standards by visiting our website at/standards or contacting our Customer Services team or Knowledge Centre.Buying standards You can buy and download PDF versions of BSI publications, including Britishand adopted European and international standards, through our website at/shop, where hard copies can also be purchased.If you need international and foreign standards from other Standards DevelopmentOrganizations, hard copies can be ordered from our Customer Services team.Subscriptions Our range of subscription services are designed to make using standards easier for you. For further information on our subscription products go to /subscriptions.With British Standards Online (BSOL) you’ll have instant access to over 55,000 British and adopted European and international standards from your desktop. It’s available 24/7 and is refreshed daily so you’ll always be up to date. You can keep in touch with standards developments and receive substantial discounts on the purchase price of standards, both in single copy and subscription format, by becoming a BSI Subscribing Member .PLUS is an updating service exclusive to BSI Subscribing Members. You willautomatically receive the latest hard copy of your standards when they’rerevised or replaced.To find out more about becoming a BSI Subscribing Member and the benefitsof membership, please visit /shop.With a Multi-User Network Licence (MUNL) you are able to host standardspublications on your intranet. Licences can cover as few or as many users as youwish. With updates supplied as soon as they’re available, you can be sure yourdocumentation is current. For further information, email bsmusales@.Revisions Our British Standards and other publications are updated by amendment or revision. We continually improve the quality of our products and services to benefit your business. If you find an inaccuracy or ambiguity within a British Standard or other BSI publication please inform the Knowledge Centre.Copyright All the data, software and documentation set out in all British Standards andother BSI publications are the property of and copyrighted by BSI, or some personor entity that owns copyright in the information used (such as the internationalstandardization bodies) and has formally licensed such information to BSI forcommercial publication and use. Except as permitted under the Copyright, Designsand Patents Act 1988 no extract may be reproduced, stored in a retrieval systemor transmitted in any form or by any means – electronic, photocopying, recordingor otherwise – without prior written permission from BSI. Details and advice canbe obtained from the Copyright & Licensing eful Contacts:Customer Services Tel: +44 845 086 9001Email (orders): orders@Email (enquiries): cservices@SubscriptionsTel: +44 845 086 9001Email: subscriptions@Knowledge CentreTel: +44 20 8996 7004Email: knowledgecentre@Copyright & LicensingTel: +44 20 8996 7070Email: copyright@ NO COPYING WITHOUT BSI PERMISSION EXCEPT AS PERMITTED BY COPYRIGHT LAW 螺纹标注:1-11BS746 PD:35.530-35.785。
美国电力可靠性公司在NIST智能网格标准框架与路线图评论说明书
UNITED STATES OF AMERICABEFORE THEU.S. DEPARTMENT OF COMMERCENATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY COMMENTS OF THE NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION ON NIST FRAMEWORK AND ROADMAP FOR SMART GRID INTEROPERABILITY STANDARDS, RELEASE 1.0 (DRAFT)Rick SergelPresident and Chief Executive Officer David N. CookVice President and General Counsel Michael J. AssanteVice President and Chief Security Officer North American Electric Reliability Corporation116-390 Village Boulevard Princeton, NJ 08540-5721(609) 452-8060(609) 452-9550 – facsimile*******************Rebecca J. MichaelAssistant General CounselHolly A. HawkinsAttorneyNorth American Electric Reliability Corporation1120 G Street, N.W.Suite 990Washington, D.C. 20005-3801 (202) 393-3998(202) 393-3955 – facsimile**********************************************November 9, 2009TABLE OF CONTENTSI. INTRODUCTION 1II. NOTICES AND COMMUNICATIONS 2III. BACKGROUND 2IV.DISCUSSION 7 V. CONCLUSION 13I. INTRODUCTIONThe North American Electric Reliability Corporation (“NERC”) is pleased to provide these comments in response to the National Institute of Standards and Technology (“NIST”) Framework and Roadmap for Smart Grid Interoperability Standards Release 1.0 (“Smart Grid Framework Document”).1NERC has been certified by the Federal Energy Regulatory Commission (“FERC” or the “Commission”) as the “electric reliability organization” under Section 215 of the Federal Power Act2 and is similarly recognized by governmental authoritiesr in Canada. Because NERC’s mission is to ensure the reliability and security of the bulk powe system in North America by, in part, developing and enforcing mandatory Reliability Standards subject to FERC approval, NERC’s comments on the Smart Grid Framework Document focus on the development by NIST of voluntary Interoperability Standards as they may relate to NERC’s mandatory Reliability Standards, and in particular, to NERC Critical Infrastructure Protection (“CIP”) Reliability Standards.1 NIST Framework and Roadmap for Smart Grid Interoperability Standards Release 1.0 (Draft), Office of the National Coordinator for Smart Grid Interoperability, U.S. Department of Commerce, September 2009 (“Smart Grid Framework Document”).2 See North American Electric Reliability Corporation, “Order Certifying North American Electric Reliability Corporation as the Electric Reliability Organization and Ordering Compliance Filing.” 116 FERC ¶ 61,062 (July 20, 2006).II. NOTICES AND COMMUNICATIONSNotices and communications with respect to these comments may be addressed to the following:Rick SergelPresident and Chief Executive Officer David N. CookVice President and General Counsel North American Electric Reliability Corporation116-390 Village Boulevard Princeton, NJ 08540-5721(609) 452-8060(609) 452-9550 – facsimile*******************Rebecca J. MichaelAssistant General CounselHolly A HawkinsAttorneyNorth American Electric ReliabilityCorporation1120 G Street, N.W.Suite 990Washington, D.C. 20005-3801(202) 393-3998(202) 393-3955 – facsimile**********************************************III. BACKGROUNDThe NIST Smart Grid Framework Document outlines the first phase of a three-phase plan for NIST to accelerate the identification of interoperability standards and develop a robust framework for the long-term evolution of standards related to Smart Grid. While most of the interoperability standards identified pertained to the technical requirements for the interoperability of equipment, the report also acknowledges NERC’s Critical Infrastructure Protection (“CIP”) CIP-002 through CIP-009 Reliability Standards as the only mandatory NERC Standards “directly relevant to Smart Grid.”3 It is on this basis that NERC hereby provides these comments to respond to the Smart Grid Framework Document.3 Smart Grid Framework Document at p. 78.NIST also released a draft of a document entitled Smart Grid Cyber Security Strategy and Requirements (“Smart Grid Cyber Security Document”) on September 25, 2009 containing an overall cyber security risk management framework and strategy for the Smart Grid. That document maps NERC’s mandatory CIP Standards to similar cyber security documents from the Department of Homeland Security (“DHS”), the International Electrotechnical Commission (“IEC”), the American National Standards Institute (“ANSI”) and others. NERC plans to provide comments to NIST on the Smart Grid Cyber Security Document by December 1, 2009.On March 19, 2009, FERC issued a document entitled Smart Grid Policy, Proposed Policy Statement and Action Plan Order (“Proposed Policy Statement”)4 on which NERC provided comments. The Commission issued a Final Policy Statement on July 16, 2009,5 which provided guidance regarding the development of a Smart Grid for the nation’s electric transmission system, focusing on the development of key standards to achieve interoperability and functionality of Smart Grid systems and devices. While the Commission will ultimately be responsible for adopting “interoperability standards and protocols necessary to ensure smart-grid functionality and interoperability in the interstate transmission of electric power and in regional and wholesale electricity markets,”6 NIST, in accordance with the Energy Independence and Security Act of 2007 (“EISA”), Section 1305(a), was directed “… to coordinate the advancement of a framework that includes protocols and model standards for information management to achieve interoperability of Smart Grid devices and systems.”7 NIST’s Smart Grid Framework Document presents the results of the first of three phases of that project.4 Smart Grid Proposed Policy Statement and Action Plan, 126 FERC ¶ 61,253 (March 19, 2009), Docket No. PL09-4-000 (“FERC Proposed Policy Statement”).5 Smart Grid Policy Statement, 128 FERC ¶ 61,060 (July 16, 2009), Docket No. PL09-4-000 (“FERC Policy Statement”).6 FERC Proposed Policy Statement at P 1 n.3, citing to the Energy Independence and Security Act of 2007, Pub. L. No. 110-140, 121 Stat. 1492 (2007) (“EISA”), to be codified at 15 U.S.C. §17381(a).7 FERC Proposed Policy Statement at P 7 n.7, citing to EISA §1305(a).Based on NERC’s review of the Smart Grid Framework Document, there are three types of standards (either currently existing or to be developed) that NERC believes will be important to ensuring the successful operation, reliability and security of Smart Grid technologies. These standards are – Interoperability Standards, System Security Standards and Reliability Standards. Each is described below.Interoperability StandardsThe NIST Framework Document defines “Interoperability” as “[t]he capability of two or more networks, systems, devices, applications, or components to exchange and readily use information—securely, effectively, and with little or no inconvenience to the user. ... [t]hat is, different systems will be able to exchange meaningful, actionable information. The systems will share a common meaning of the exchanged information, and this information will elicit agreed-upon types of response. The reliability, fidelity, and security of information exchanges between and among Smart Grid systems must achieve requisite performance levels.”8“Standards” are defined in the Smart Grid Framework Document as: “Specifications that establish the fitness of a product for a particular use or that define the function and performance of a device or system. Standards are key facilitators of compatibility. They define specifications for languages, communications protocols, data formats, linkages within and across systems, interfaces between software applications and between hardware devices, and much more. Standards must be robust enough so that they can be extended to accommodate future applications and technologies.”9 For purposes of this document, NERC has referred to NIST’s discussion of standards for the Smart Grid as “Interoperability Standards.” NERC notes that the Interoperability Standards8 Smart Grid Framework Document at p. 11-12.9Id. at p. 12.proposed in the Smart Grid Framework Document appear to focus on components and applications, and in many cases do not directly address interoperability of networks and systems. That is, the Smart Grid Framework Document proposes Interoperability Standards that today are useful for component designers and manufacturers, but may not be adequate for system integrators and utilities to guide architectures and system properties. Standards developed for interoperability of networks and systems will also need to be carefully evaluated to ensure that no incompatibilities or conflicts are inadvertently created that could potentially adversely affect the reliability of the bulk power system.System Security StandardsSystem security standards (“System Security Standards”) refer to those standards thatwill apply to the technology and architecture of the system network and components that will collectively enable the functionality of Smart Grid technologies. According to FERC’s Proposed Policy Statement, System Security Standards should address the following considerations: (1) the integrity of data communicated (whether the data is correct); (2) the authentication of the communications (whether the communication is between the intended Smart Grid device and an authorized device, network, or person); (3) the prevention of unauthorized modifications to Smart Grid networks and devices and the logging of all modifications made; (4) the physical protection of Smart Grid networks and devices; and (5) the potential impact of unauthorized use of these Smart Grid networks and devices on the bulk-power system.10 Although there is no cited authority in the Smart Grid Framework Document, NERC believes it will be essential to address system security considerations to ensure that the standards for the design and integration of Smart Grid systems, networks and technologies do not conflict with or create unintended10Id. at P 30.reliability and security risks for the bulk power system. NERC will address this issue in more detail in its comments in response to NIST’s Smart Grid Cyber Security Document, which will be sent to NIST by December 1, 2009.NERC Reliability StandardsNERC Reliability Standards (“Reliability Standards”) are the international standards that ensure reliability of the bulk power system. Through the Energy Policy Act of 2005,11 Congress provided for the creation of an ERO, charged with developing and enforcing mandatory Reliability Standards in the United States, subject to Commission approval. NERC was certified by the Commission as the designated ERO on July 20, 2006.12 NERC’s role as the ERO is to develop, implement, and enforce mandatory Reliability Standards for the bulk power system, subject to Commission approval, in accordance with Section 215 of the Federal Power Act (the “Act” or the “FPA”).13 Section 215 requires that all users, owners and operators of the bulk power system in the United States be subject to the Commission-approved Reliability Standards. NERC-enforced, and Commission-approved Reliability Standards are designed to ensure the reliability of the bulk power system and typically apply to those entities that perform the planning, design, maintenance, and operation of facilities at the transmission and generation level.While NERC understands that NIST’s development of Interoperability Standards will help to implement devices and programs to enable the functionality of a Smart Grid, NERC’s role with respect to this process is to specifically address whether new Reliability Standards, or11 Energy Policy Act of 2005, Pub. L. No. 109-58, Title XII, Subtitle A, 119 Stat. 594, 941 (2005) (codified at 16 U.S.C. §824o (2007)).12See North American Electric Reliability Corporation, 116 FERC ¶61,062 (July 20, 2006)13See Id.; citing to, FPA §§ 824, 824o.modifications to existing mandatory Reliability Standards, will be necessary, to ensure the continued reliability of the bulk power system as new Smart Grid technologies and systems are developed and integrated with existing systems and networks.IV.DISCUSSIONThe title of the Smart Grid Framework Document suggests that this document is a roadmap for the development of Interoperability Standards to apply to the Smart Grid. However, the contents appear to be a “plan” for the development of Interoperability Standards rather than a roadmap as they do not provide a full complement of interoperability requirements now and into the future (i.e., off-ramps, expected evolution). Rather, the Smart Grid Framework Document appears to be a compendium of high priority elements, each with its own plan and milestones. Although there are references to “reliability” throughout the document, these references are generally attributed to the reliability of Smart Grid devices and systems rather than the reliability of the bulk power system or electric distribution systems.Accordingly, NERC’s comments herein focus on suggested areas for NIST’s further consideration in the development of Interoperabilty Standards for the Smart Grid. As discussed below, it will be vitally important for NIST Interoperability Standards to be developed in close coordination with NERC Reliability Standards to ensure the continued reliability of the bulk power system.1.NIST’s Proposed Interoperability Standards Must be Compatible with NERCReliability StandardsAlthough the voluntary Interoperabilty Standards proposed by NIST are designed to achieve a different purpose from the NERC mandatory Reliability Standards, it is critical to thecontinued reliability of the bulk power system that the two bodies of standards be compatible and complementary. The EISA has tasked NIST with the “responsibility to coordinate development of a framework that includes protocols and model standards for information management to achieve interoperability of smart grid devices and systems.”14 The Smart Grid Framework Document states that “[t]he Smart Grid is a very complex system of systems,” and “[t]here needs to be a shared understanding of its major building blocks and how they inter-relate (an architectural reference model) in order to analyze use cases, identify interfaces for which interoperability standards are needed, and to develop a cyber security strategy.”15 In order to achieve this, Interoperabilty Standards will be required to address “how to” achieve interoperability of the Smart Grid (e.g. what type of equipment an entity must use to interoperate with other Smart Grid entities, and how that equipment will communicate with each other).NERC Reliability Standards, on the other hand, deal with “what” should be done to ensure the reliability of the bulk power system. The definition of “Reliability Standard” as it appears in Section 39.1 of the Code of Federal Regulations is:“... a requirement to provide for reliable operation of the bulk power system, includingwithout limiting the foregoing, requirements for the operation of existing bulk powersystem facilities, including cyber security protection, and including the design of planned additions or modifications to such facilities to the extent necessary for reliable operation of the bulk power system; but shall not include any requirement to enlarge bulk powersystem facilities or to construct new transmission capacity or generation capacity.”NERC, as an ANSI-accredited standards-setting body, is responsible for developing mandatory Reliability Standards for the reliability of the bulk power system. NERC’s role as the ERO is to develop, implement, and enforce mandatory Reliability Standards for the bulk power system, subject to Commission approval, in accordance with Section 215 of the FPA.16 Section14 EISA Title XIII, Section 1305.15 Smart Grid Framework Document at p. 5.16 16 U.S.C. Section 824o.215 requires that all users, owners and operators of the bulk power system in the United States comply with Commission-approved Reliability Standards, which are designed to ensure the reliability of the bulk power system and typically apply to entities that own, operate, and use facilities at the transmission and generation level. Additionally, Section 401.2 of the NERC Rules of Procedure provides that “[w]here required by applicable legislation, regulation, rule or agreement, all bulk power system owners, operators, and users, regional entities, and NERC, are required to comply with all approved NERC reliability standards at all times.”17Although NIST’s voluntary Interoperability Standards and NERC’s mandatory Reliability Standards are designed to serve fundamentally different purposes, it is essential that they be compatible and that no inadvertent conflicts arise that make it impossible for entities to be able to comply with both. An entity should be able to comply with both NERC Reliability Standards listed on Table 2 and NIST Interoperability Standards. Because Interoperability Standards will likely apply to equipment and systems that interface with the equipment and systems of bulk power system users, owners, or operators’ equipment, and because these Interoperability Standards could become de facto mandatory standards that all Smart Grid technologies and systems will adopt, it will be important for NERC and NIST to coordinate on the development of the interoperability standards that affect the reliability and the security of the bulk power system.NERC looks forward to working collaboratively with NIST in the development of Interoperabilty Standards that are compatible with NERC Reliability Standards.17 NERC’s Rules of Procedure are available at: /page.php?cid=1|8|169.2.Cyber Security of the Smart Grid is a Top Priority; However Inclusion of the NERCCIP Standards Into the Interoperability Standards Will Not Ensure CompleteCyber Security Protection of Smart Grid Devices and May Have UnintendedConsequencesIn the Smart Grid Framework Document, NIST states that cyber security is a “critical priority,” covering all aspects of reliable Smart Grid integration and deployment and should be a top priority.18 While NERC agrees that cyber security is a top priority, NERC CIP Reliability Standards are not intended to reach beyond the reliability of the bulk power system. NERC therefore encourages NIST to use caution in applying NERC CIP Reliability Standards to the body of Interoperability Standards to ensure cyber security protection of Smart Grid devices.The applicability of NERC-developed, FERC-approved, CIP Reliability Standards is limited to users, owners, and operators of the bulk power system in accordance with Section 215 of the FPA. Smart Grid technologies and applications will generally be applied at the customer and distribution system levels, which are not typically considered to be part of the bulk power system. However, the aggregated impacts of these Smart Grid devices on the bulk power system could be substantial.While the purpose of developing Interoperability Standards is to ensure that Smart Grid systems can freely exchange information without logical barriers, the NERC CIP Reliability Standards purposefully put barriers in place to protect the various elements that comprise the critical infrastructure assets of the bulk power system, including critical cyber assets, from malicious intrusion or attack. As such, NIST must recognize that its application of the NERC CIP Reliability Standards to the body of Interoperability Standards will not adequately protect cyber security of all components of the Smart Grid, such as Smart Grid distribution devices.18 See Smart Grid Framework Document at p. 7.For example, NERC’s CIP Reliability Standards do not specifically protect telecommunications systems or communication paths, which are important components of the Smart Grid. Additionally, NERC CIP Reliability Standards do not provide requirements for actual components, such as the requirement for device-to-device authentication. While the CIP Reliability Standards are designed to shape the behavior of asset owners and operators, they are not designed to shape the behavior of equipment and system designers, manufacturers, and integrators. The NERC Reliability Standards apply to installed equipment and require security controls be applied to manage risk in the operation and maintenance of cyber assets. The protection goals of the Smart Grid, on the other hand, are broader, and address component security, integrity of communications, privacy, and other cyber security considerations.Accordingly, NERC encourages NIST to integrate adequate cyber security protection, at all levels (device, application, network and system) for the Smart Grid in the development of a body of Interoperabilty Standards. While NERC CIP Reliability Standards provide for the reliable and safe operation of the bulk power system by preventing the unauthorized cyber and physical access to critical assets and critical cyber assets, there is a need to develop additional cyber security protection for distribution facilities in the development of Smart Grid Interoperability Standards to address, for example, security aspects of interoperability at the distribution level. Therefore, new Smart Grid system designs that can help manage cyber security risks must be explored to ensure that suitable reliability and security considerations are included in NIST’s Interoperability Standards.NERC intends to work closely with NIST through the Smart Grid Interoperabilty Panel and in other forums on the development of cyber security Interoperability Standards for Smart Grid technologies and their associated network and system architectures, with an eye towardpass-through attacks (i.e. an attacker moving from a point in the system to other criticalinfrastructure systems) and aggregated impacts to the bulk power system. Additionally, NERC will provide more substantive comments in response to NIST’s Smart Grid Cyber Security Document by December 1, 2009.3. All Interoperability Standards Need to be HarmonizedIn its textbox labeled “Guidance for Identifying Standards for Implementation,” NIST presents a list of criteria for evaluating Interoperability Standards and emerging specifications.19 In this list, NIST proposes that a standard or emerging specification be evaluated on “whether it is integrated and harmonized with complementing standards across the utility enterprise through the use of an industry architecture that documents key points of interoperability andinterfaces.”20 NERC concurs that evaluating proposed Interoperability Standards against this criterion is a good practice and critical to the success of the NIST Interoperability Standards identification process. Although NIST states that this criterion “does not apply to every or specification listed in Tables 2 and 3,” NERC asserts that this specific criterion be full applicable to all of the proposed interoperability standards in those tables as it represents a fundamental attribute for system-wide interoperability and will ensure that all standards proposed to be included in the body of Interoperability Standards are compatible and complementary with each other.standard y19 Smart Grid Framework Document at p. 46.20Smart Grid Framework Document at p. 46.V. CONCLUSIONFor the reasons stated above, NERC looks forward to working with NIST in developing Interoperability Standards that work collaboratively and in conjunction with NERC Reliability Standards, recognizing that new or modified NERC Reliability Standards may also be necessary to integrate Smart Grid technologies based on their impact on bulk power system reliability. Additionally, because cyber security and reliability will be of paramount importance in the development of a smarter grid, NERC encourages NIST to develop cyber security Interoperability Standards that relate to Smart Grid technologies and systems.Respectfullysubmitted,Rick SergelPresident and Chief Executive OfficerDavid N. CookVice President and General CounselNorth American Electric Reliability Corporation 116-390 Village BoulevardPrinceton, NJ 08540-5721(609) 452-8060(609) 452-9550 – facsimile*******************/s/ Holly A. HawkinsRebecca J. MichaelAssistant General CounselHolly A. HawkinsAttorneyNorth American Electric Reliability Corporation1120 G Street, N.W.Suite 990Washington, D.C. 20005-3801 (202) 393-3998(202) 393-3955 – facsimile**********************************************。
BPMN 2.0 跨平台互操作性标记:使交流数据中的互操作性问题显现说明书
Interoperability Markers for BPMN 2.0Making Interoperability Issues ExplicitXabier Heguy1, Gregory Zacharewicz2,*, Yves Ducq3 and Said Tazi41University of Bordeaux, IMS, UMR 5218 CNRS, Talence – France and ONETIK, D252, 64240 Macaye – France 2,3University of Bordeaux, IMS, UMR 5218 CNRS, Talence – France4University of Pau, Pau, – France*Corresponding authorAbstract—Business Process Model and Notation (BPMN) is being becoming the most used standard for business process modelling. One of the important upgrades of BPMN 2.0 with respect to BPMN 1.2 is the fact that Data Objects are now handling semantic elements. Nevertheless, BPMN doesn't enable the representation of interoperability problems in the exchanged data object, which remains a limitation when using BPMN to express interoperability issues in enterprise processes. We propose to extend the Meta-Object Facility meta-model and the XML Schema Definition of BPMN as well as the notation in order to fill this gap. The extension, named Data Interoperability, is defined using the BPMN Extension Mechanism. This new elements will allow to represent existing interoperability problems as well as interoperability concerns which have been solved. We illustrate the Data Interoperability capabilities with an example from a real industrial case.Keywords-interoperability; BPMN; modelling; CBPI.I NTRODUCTIONThe global economic context requires enterprises to acquire and maintain an efficient information system. An adapted and well-defined ERP is today a sine qua non condition for the success of a company. In addition, exchanges of information between various information systems are increasingly necessary: In particular, information exchanges is growing with customers, suppliers, subcontractors or when the enterprise is bought out and integrated in another company, but also within an internal department. Also, assuming one ERP covering all sectors of the company is not always possible, which entails grafting many heterogeneous ERP or at least modules. The crucial problem of interoperability then arises.Cross-organizational Business Process (CBP) modeling aims to describe the interactions between different organizations [1] but also between different systems within a single organization. Process modeling at the highest level should enable the various partners to understand the articulation of the different processes in a simple and intuitive way. However, defining user needs is not necessarily collaborative. Users rarely understand the differences between inter-organization processes and internal processes.BPMN 2.0 [2] is a de facto standard in the modeling of business processes. BPMN is currently the most used language among process modelers (64% of industry penetration according to P. Harmon's study) [3]. It provides a meta-model and notation for defining and visualizing them. BPMN 2.0 allows the modeling of CBP by clearly identifying independent resources pools and collaborative swim lanes within the same resource group. However, the representation of data in BPMN 2.0 does not reflect the concept of interoperability. Whether data is exchanged within the same information system or between two entities, the representation of the data remains the same. This is a weakness because this model hides the challenge and the difficulty of solving interoperability problems, in particular in the eyes of decision-makers. This lack of visibility can lead to incomprehension between IT technicians and managers and may lead them to underestimate both the impact of the lack of interoperability in the representation of the existing system and to make difficult the evaluation of costs and delays to produce the system to set up.The technical structuring of BPMN is based on the concept of extensible layers around a core set of basic elements. This extensibility makes it possible to define an overlay of elements in order to better represent concepts inherent in the targeted sector of activity. Each new layer is constructed in extension of a lower layer. BPMN extensions are most often used to represent the specific needs of an industry [4]. But they can also be used to fill a general gap. This is the proposition of this paper: Prolonging the BPMN model specification by adding an extension representing the data concerned by interoperability.II.P ROBLEM S TATEMENT AND B ACKGROUNDA.Problem StatementThe problem tackled in this paper is a lack of modeling data in a context of interoperability in BPMN. We propose to fill this gap defining a BPMN 2.0 metamodel extension to represent data interchanges with an interoperability problem. It will allow defining barriers and solved problems.B.CBPs Modeling RequirementsWhether they are interchanges between customers, suppliers or providers, or between different information systems within a company, data interchanges are more and more necessary. In order to ensure a decent implementation of these interchanges, a preliminary model is an essential stage.The goal of CBP modelling is to describe the interactions between different systems [1]. The processes modelling at the higher level must allow to the various partners to understand2nd International Conference on Electrical, Automation and Mechanical Engineering (EAME 2017)the articulation of the processes in a simple and intuitive way. The model has to be easily understandable by all parts, be they managers, processes owners or IT technicians who will have to implement the system. But user-driven requirements are not necessarily collaboration-oriented. Hence, users hardly understand the differences between internal business processes and cross-organizational processes, and thus the difficulties that these last ones represent.For a successful CBP modelling, interoperability points have to be necessarily shown. The managers and the users of the different organizations must be able to represent interaction from a high level business point of view in order to visualize data interchanges with interoperability problem. Thus, they will be able to grasp them. Hence, resolving interoperability problems involves an enhancement of the work.C.BPMN Shortcomings.One of the important upgrades of BPMN 2.0 with respect to BPMN 1.2 is the fact that Data Objects are now semantic elements defined as additional Data Categories aside form swim-lanes, flow objects, connecting objects and artifacts (whereas in the precedent version, they were considered as simple artifacts, simple annotation without any semantic).However, BPMN 2.0 does not distinguish between data with an interoperability issue. In order to represent the exchange of data between different systems, the corridors (swim lanes) [1] are used. However, the notion of interoperability is absent from this representation, because if we distinguish between different systems, there is no indication that the data exchanged can be integrated as such in the target system or that Must undergo pre-treatment. A modeling of CBP carried out using BPMN 2.0 therefore does not allow the different actors to understand the problem of interoperability in the exchange of data.We propose to enrich the BPMN meta-model with the addition of a Data Interoperability object which will mean that a data exchange must take into account interoperability.D.InteroperabilityThe most common definition of interoperability tells us that it is: "the ability of two (or more) systems or components to exchange information and use it" [5]. The InterOp NoE Network of Interoperability (Interoperability) defined interoperability as "the ability of a system to work with another system without effort on the part of the user" [6]. To complement these definitions we can say that interoperability is “the ability of systems, natively independent, to interact in order to build harmonious and intentional collaborative behaviors without deeply modifying their individual structure or behavior” [7]. These definitions demonstrate that interoperability is rapidly becoming complex and that its success depends on the resolution of a number of barriers [8]. rmational Perspective of BPMN 2.0We present here an overview of BPMN's informational perspective. In BPMN, the construct that allows modeling any type of information entity, regardless of its nature (electronic document, paper, etc.) is the Data Object [2]. In BPMN 2.0, Data Objects become first-class elements at the same level as tasks or activities [9]. They are visually represented in the process diagrams. Data can be referenced by DataObjectReference that specifies different states of the same object. The structure of the Data Objects is not visible in the diagrams, but can be defined by the itemDefinition element associated with it by specifying it in an XML schema. The data are represented graphically by the Data Objects as (Figure I).FIGURE I.BPMN DATA OBJECTF.BPMN Extension Mechanism.BPMN has been designed to be extensible. The technical structuring of BPMN is based on the concept of extensible layers around a core of simple elements. Extensibility is used to define an overlay of elements to better represent concepts inherent in the targeted industry. Each new layer is constructedin extension of a lower layer. BPMN provides generic extension elements in the meta-model.The BPMN extension mechanism consists of a set of extension elements that allow the addition of additional elements and attributes for standard and existing BPMN elements. These extension elements are: ExtensionDefinition, ExtensionAttributeDefinition, ExtensionAttributeValue and Extension. The Extension element is used to connect to the BPMN model an extension whose structure is defined using the ExtensionDefinition element. This adds additional attributes used to extend the BPMN model by attaching them to any BPMN element. The definition of each attribute includes the name and type of the attribute; given by the corresponding ExtensionAttributeValue element. In a BPMN extended element, ExtensionAttributeValue is used to assign a value to a extension attribute that was defined in the ExtensionDefinition by using ExtensionAttributeDefinition element.III.R ELATED W ORKSSeveral works treats of the problems of interoperability in data interchange between different Information Systems. Wexin Mu [11] focuses on automatically generate the cartography of collaborative processes. His method consists first in gathering knowledge of partners’ data, then building a repository of partners’ services and finally deducing a collaborative process model that can run and a workflow engine that enables to run it. Among the different modelling languages he uses, we can find BPMN. But he does not represent the problems of interoperability in his models.The approach of Jankovic et. al. [9] relates to ours since they propose an extension of BPMN 2.0 meta-model to represent information requirements in BPMN 2.0. They state that information requirements should be specified in terms of a common, reference ontology. Their methodology is based on the use of reference ontology as an unambiguous and formal representation of a set of business concepts and their relationships for a particular CBP environment. Thus, they exclude technological and organizational barriers. Furthermore,this BPMN extension is directed only to IT technicians and not to managers and processes owners.All mentioned works cover the problems of interoperability in data interchange between different Information Systems. But the goal of these works is to help the job of IT technicians. This is surely useful, but it doesn’t offer a possibility to make these problems visible for all the collaborating business partners (and not only IT technicians). With the extension we define in our work, we offer the possibility of that shared understanding, which is one of the main goals of BPMN.IV.E XTENSIONSPurpose: Our aim is to create a sustainable (conservative) extension of BPMN, which allows representing interoperabilityin data exchanges in the framework of process diagrams. This new extension can be used in very different business contexts, whether in inter-company data exchanges, in web applications, etc. It will make possible to represent explicitly and intuitivelythe exchanges of data presenting an interoperability problem.Framework: In order to explicit interoperability problemsin BPMN data exchanges, we introduce two extensions: dataInteroperabilityBarrier and dataInteroperabilitySolute.The first (dataInteroperabilityBarrier) represents a data exchange with an unresolved interoperability problem. It allows representing this drawback so that all the participants ofthe project (managers, IT technicians, owners of the process, etc.) can realize that there is a problem to solve. Its aim is notto enter into technical considerations. Ideally, it should be used only in existing modeling (AsIs), since the realization of the project should include resolution of the difficulty. But it can be assumed that in some cases, for various reasons (lack of funding or time for example) no solution will be put in place. This extension can thus also be part of the modeling of the future system (ToBe).The second extension (dataInteroperabilitySolute) will be used to represent an overcoming interoperability issue. As such,it should have its place only in the modeling of the project of the future system (ToBe).A.StructureWe used the extension mechanism of BPMN 2.0 to define the extension of the BPMN meta-model. It allows the inclusionof the definition of the interoperability document template. The structure of the proposed element is defined by the ExtensionDefinition and ExtensionAttributeDefinition elements. The structure of BPMN is described using two representations: a Meta-Object Facility (MOF) meta-model that describes the concepts and an XML Schema Definition (XSD) that establishes the format of exchanges [10]. The MOF class diagram of the BPMN meta-model is visible in the specification manual. It is divided into different sections. We will only represent here that which concerns the data objects. The classes corresponding to the extensions we propose are represented in gray in Figure II.This illustration shows that dataInteroperabilityBarrier and dataInteroperabilitySolute extend dataObject. These two classes therefore inherit its attributes and models of association.FIGURE II.BPMN CLASS EXTENSION.No additional attributes are defined. It would have beeninteresting to associate an association constraint with these two extensions: that they can only be linked to tasks belonging to different corridors. Indeed, a problem of interoperability can only exist between different systems, represented by distinct corridors. But in the basic structuring of BPMN, any source task can be linked to any target task. We have respected this flexibility. It is therefore up to the modelers to take account of this flexibility and not to use these extensions properly, that is to say between two tasks belonging to different corridors.V.G RAPHICAL R EPRESENTATIONWe propose to provide the following graphical representations for the interoperability extensions in figure III.(a)(b)FIGURE III. DATAINTEROPERABILITYBARRIER ANDDATAINTEROPERABILITYSOLUTEWe have extended the graphical representation of the Data Object to which we have added two inverse arrows, representing interoperability. The barred means that interoperability is not assured, as presented in Figure III left (a): dataInteroperabilityBarrier, is placed in the BPMN model with the same rules and constraints as the Data Object. In case of dataInteroperabilitySolute extension, Figure III right (b), the representation is similar, except the arrows are not barred, indicating that interoperability is assured.VI.U SE C ASETo illustrate the interest of dataInteroperabilityBarrier and dataInteroperabilitySolute extensions, we will study the case of Onetik SME. This company of the Basque Country manufactures and markets cheeses. It uses the Nodhos ERP. The shipment management module of this ERP does not give it complete satisfaction, and its use is source of errors and therefore, among other things, disputes with customers that are costly for the company. The replacement of the ERP is not envisaged in the short term mainly for financial reasons. The management of Onetik has then decided to graft the shipment management module of another ERP (Integraal Agro).In the framework of this project, two models were carried out using BPMN: one is corresponding to the existing system (AS IS) and the other to the desired system (TO BE). Each model consisted of several models of the various processes. We will represent the (simplified) process of order preparation.This AS IS model (Figure IV) is representing real case proposed by the current organization of the information system in the enterprise. This is to be developed by describing the problem faced by the enterprise and the problem that isengendered by this situation.FIGURE IV.DATAINTEROPERABILITYBARRIER On the TO BE model (Figure V), it can be seen that the BP document must be transmitted from the Nodhos ERP to the Integraal Agro module. The transmitted data is represented by the dataInteroperabilitySolute icon to specify that an interoperability problem among the two tasks has to be solved.FIGURE V.DATAINTEROPERABILITYSOLUTE Similarly, once the package has been weighed, the BP, together with the weight of the package and the batch number of the cheeses used, is transmitted in the opposite direction (from Integraal Agro to Nodhos).VII.P ERSPECTIVES AND I MPLEMENTATION These works are still under development. The next phase will consist in implementing the proposition within a software solution. The SLMToolBox [11] has been selected for its capacity to integrate a Model Driven approach, BPMN 2.0 models and simulation aspects. This extension will be validated and then will be the baseline for representing performance aspects on the BPMN model. We are working now on extending on performance aspects in the process modeling. We will refer to reference works in this domain such as the works of [13] and [14].VIII.C ONCLUSIONThis paper is proposing an extension to BPMN 2.0 in the context of interoperability identification and solving. This extension makes explicit the modeling of interoperability barriers and problem solved thanks to two graphical icons added to the original data item of BPMN. The interest of this approach has been illustrated on a use case from industry. These new features of BPMN allow bringing to light to all participants of a CBP project (managers, IT technicians, processes owners, etc.) the presence of an interoperability barrier and its solution.REFERENCES[1]ATHENA, D.A2.1: Cross-Organisational Business Process requirementsand the State of the Art in Research, Technology and Standards Version2. ATHENA Project No. (507849), 2005[2]OMG, OMG: MDA Guide Version 1.0.1, /mda/ 2003[3]Harmon, The State of Business Process Management 2016. BusinessProcess Trends, 2016[4]Braun R., W. Esswein, Classification of domain-specific bpmnextensions, in: The Practice of Enterprise Modeling, Springer, 2014 [5] A. Geraci, Katki F., McMonegal L., Meyer B., Lane J., Wilson, P.,Radatz J., Yee M., Porteous H., and Springsteel F., IEEE standard computer dictionary: Compilation of IEEE std computer glossaries, 1991 [6] D. Konstantas., Bourrières J. P., Léonard M., and Boudjlida N.,Interoperability of enterprise software and applications, 2005[7]S. Truptil, F. Bénaben, H. Pingaud. A Mediation Information System toHelp to Coordinate the Response to a Crisis. Luis M. Camarinha-Matos;Xavier Boucher; Hamideh Afsarmanesh. Collaborative Networks for a Sustainable World, 336, Springer, pp.173-180, 2010, IFIP Advances in Information and Communication Technology, 978-3-642-15960-2.[8] D. Chen, N. Daclin, Framework for Enterprise Interoperability, In book:Interoperability for Enterprise Software and Applications: Proceedings of the Second IFAC/IFIP I-ESA International Conference: EI2N, WSI, IS-TSPQ 2006, pp.77 - 88 2006[9]M. Jankovic, M. Ljubicic, N. Anicic, and Z. Marjanovic, EnhancingBPMN 2.0 Informational Perspective to Support Interoperability for Cross-Organizational Business Processes, 2015[10]M. Cortes-Cornax, S. Dupuy-Chessa, D. Rieu and M. Dumas,Evaluating Choreographies in BPMN 2.0 Using an Extended Quality Framework, 2014[11]H. Bazoun, Y. Bouanan, G. Zacharewicz, Y. Ducq, Hadrien Boye:Business process simulation: transformation of BPMN 2.0 to DEVS models (WIP). SpringSim (TMS-DEVS) 2014: 20[12]W. Mu, Caractérisation et logique d'une situation collaborative, 2012[13] C.J. Pavlovski, J., Zou, (2008). Non-functional requirements in businessprocess modeling. In proceedings of the fifth Asia-Pacific conference on Conceptual Modelling, Vol. 79, pp. 103-112, Australian Comp. Soc., Inc.[14]K. Saeedi, L., Zhao, P., Sampaio, (2010). Extending BPMN forsupporting customer- facing service quality requirements. In Web Services (ICWS’10), pp. 616–623.。
全球定位系统地理参考系 WGS 84说明书
•Changes to NGA processes are coordinated with GPS OCS
6 Approved for Public Release 09-478
WGS 84 Aligned to ITRF
ILRS SLR Obs.
IGS GPS/GLONASS
Obs.
IVS VLBI Obs.
Comparison of NGA and IGS GPS orbits (~ 6 cm)
•NGA contributes its GPS observational data to IGS
–Supports consistency between WGS 84 and ITRF
8 Approved for Public Release 09-478
GPS Reference Frame
World Geodetic System 1984 (WGS 84) ― Reference for Positioning and Navigation ― Aligned to International Terrestrial Reference Frame (ITRF) ― Consistent with international standards ― Supports GPS Operational Control Segment (OCS)
Prime Meridian
X
0,0,0
Y
Equator
• GPS coordinates tie WGS 84 to physical Earth
• Key component for interoperability
3 Approved for Public Release 09-478
(extended abstract)
Toward Automated Provability-Based Semantic Interoperability Between Ontologies for the Intelligence Community(extended abstract)Andrew Shilliday,Joshua Taylor,Selmer Bringsjord,Konstantine Arkoudas {shilla,tayloj,selmer}@,konstantine@Department of Cognitive ScienceDepartment of Computer ScienceRensselaer AI&Reasoning(RAIR)Lab:/research/rair/Troy NY12180USAJuly15,20071IntroductionThe need for interoperability is dire:Knowledge repre-sentation systems employ ontologies that use disparate formalisms to describe related domains;to be truly use-ful to the intelligence community,they must meaningfully share information.Ongoing research[3,4,7,15]strives toward the holy grail of complete interoperability,but has been hindered by techniques that are specialized for par-ticular ontologies,and that lack the expressivity needed to describe complex ontological relationships.In the sequel, we describe provability-based semantic interoperability (PBSI)[16],a means to surmount these hindrances;trans-lation graphs,one of our key formalism for describing the complex relationships among arbitrary ontologies;and ways in which these techniques might be automated.2PBSI and PBSI+We clarify our uses of syntactic and semantic.The syntax of a knowledgebase regiments the structure of expressions in it(e.g.,that(mother-of Amy)is a well-formed KIF term owes to KIF’s syntax);semantics attribute meaning to otherwise abstract constructs((mother-of Amy)des-ignates Amy’s mother according to the semantics of an ontology).A syntactic translation occurs when knowl-edge from one ontology is moved into another using the same semantics.In other words,when ontologies de-scribe the same kind of things,and differ only in the way object-level information is structured,interoperabil-ity is achieved by mere syntactic translation.When on-tologies differ not only in syntax,but also in semantics (yet relate meaningfully),a stronger form of translation is needed:semantic translation enables the transfer of in-formation across such ontologies.Systems capable of se-mantic translation(e.g.,[4,6])provide some language in which to formalize the semantic connections between on-tologies.Unfortunately,the relationships associating on-tologies may be so complex that translation of knowledge from one ontology into another is not feasible.Moreover, when interoperability is achieved between complex on-tologies,justification is needed to support trust that the meaning of the data has been preserved.PBSI provides a language for formalizing the rela-tionships between ontologies via bridging axioms,and our extension,PBSI+,associates each information ex-change with a proof certifying the conservation of seman-tic meaning.The basic construct of PBSI+is the signa-ture,a collection of statements in the meta-theory which, coupled with a set of axioms,captures a given ontology.A signatureΣconsists of a setσof sorts,and a setφof functors.A sort s∈σis a domain—a collection whose elements are considered the same kind of thing,1(e.g.,the months in the year,boolean values,natural numbers,US citizens).A functor f∈φmaps between objects of the sorts inσ.In the case that f maps onto the boolean val-1Our current formalization draws on many-sorted logic,and so do-mains are disjoint.While this is a limitation on the expressitivity of the language(many ontologies require a subsort hierarchy),it is not a technical restriction.Specifically,we are investigating the use of other ontology representation languages[11,8].1Figure1:A sample translation graph enabling interoper-ability between four related ontologies.ues,f is a relation;if it also takes no arguments,it is a proposition.Having defined signatures,the specifications of ontologies,we present translation graphs,a framework for bridging signatures(and so,ontologies)while preserv-ing semantics.3Translation GraphsA translation graph,like the one infigure1,is a directed graph G=(V,E)where the vertices v∈V are each unique signatures,and each edge e=(u,v)∈E describes the ap-plication of a primitive operation to u yielding v,viz., adding or removing either a sort or functor.The addition of a new functor also has associated information poten-tially relating the new functor to existing functors of the modified signature.As a toy example,let signatureΣ1consist of the do-mainsσ1={People,Firearms}and just one functorφ1= {OwnerOf:Firearms→People},which is understood to map afirearm to its owner.Furthermore,signature Σ2consists of the domainσ2={People}and the func-torφ2={IsArmed:People→Boolean}so that IsArmed holds for those people who own guns(in this example, all signatures implicitly have the boolean domain).A translation graph enabling interoperability between these signatures might apply the following primitive operations bridgingΣ1toΣ2:1.AddFunctor(IsArmed)with the bridging axiom∀p[∃g OwnerOf(g)=p]→IsArmed(p) so that the the relation IsArmed holds for any person, p where there is afirearm that p owns.2.RemoveFunctor(OwnerOf)3.RemoveSort(Firearms)PBSI between the two described ontologies is made possible:Suppose that thefirst ontology has among the declarative information in its knowledgebase that Mo-hammed Al Harbi is the owner of an AKS-74U assault riffle,and that the knowledgebase of the second ontol-ogy contains no information about Mohammed Al Harbi except that he is a person.A query of whether or not Mohammed is armed,issued in the second ontology and making use ofσ1’s knowledgebase along with bridging axioms generated by traversing the path fromσ1toσ2, would yield the correct answer and the associated,certi-fying proof.4AutomationIn this section,we discuss ways to automate the process of creating and applying translations graphs.The proce-dure to extract appropriate bridging axioms from a trans-lation graph has been accomplished,and systems whose ontologies are present as nodes in a translation graph can interoperate with other nodes in the graph.PBSI does not always yield translation;in some cases,bridging axioms can be converted to techniques for syntactic translation, but typically interoperability is achieved by a system is-suing a query expressed in its own syntax and semantics and the search for an answer incorporates knowledge from related ontologies.A detailed example of the above is presented in the in-teroperability experiment[2]between our own advanced reasoning system,Slate,and Oculus’geospatial and tem-poral visualization system,GeoTime.In the experiment, Slate and GeoTime collaborate to solve a portion of a case study used at the Joint Military Intelligence College. Additionally,the IKRIS Workshop[12]culminated in a demonstration of interoperability between three systems, Slate[1],Cycorp’s N¨o scape[14],and IBM and Stanford’s KANI[5].2This automation gets us half way there,but the holy grail of PBSI is to automate not only the intoperation be-tween systems,but the generation of translation graphs as well.Translation graphs are of course implemented in code,so the challenge of fully automating PBSI+be-comes the challenge of so-called automatic programming [13].Because of the capability of the system we have de-signed for intelligence analysts(Slate),we are optimistic 2Demonstrations of these experiments and other Slate-related content is made available online at /slate/Demos/2about being able to devise programs that generate the pro-grams that implement translation graphs.Slate integrates deductive,inductive,and abductive reasoning.To the best of our knowledge,there has not been a single effort in automatic programming that synthesizes these three el-ements.The tradition of deductive program automation [10]is based exclusively on deduction;the tradition of machine learning(e.g.,genetic programming[9])is based exclusively on induction;while abduction has not even been explored in thisfield.And yet,typically,when hu-mans approach a programming problem they employ all three of these.They use induction(in tandem with testing and checking)to formulate conjectures about the problem and their tentative solutions;they use deduction in order to reason about the consequences of their design decisions and about the correctness of their solutions;and they use abduction to explain the behavior of their algorithms.We look forward to reporting on our progress toward full au-tomaticity at OIC2007.5A Robust ExampleIn the presentation corresponding to this extended ab-stract at OIC2007itself,we will also describe a PBSI+-enabled interoperabilty example too robust to present within present space constraints.The example will be based on ongoing DTO-sponsored R&D,in which the aforementioned Oculus and Slate systems interoperate to enable analysts,working on a challenging case study,to issue hypotheses and recommendations that would not otherwise be attainable.References[1]B RINGSJORD,S.,S HILLIDAY,A.,AND T AYLOR,J.Slate,/slate/,2007.[2]C HAPPELL, A.,B RINGSJORD,S.,S HILLIDAY,A.,T AYLOR,J.,AND W RIGHT,W.Integra-tion Experiment with GeoTime,Slate,and VIKRS.ARIV A Principal Investigator Meeting Handout, March2007.[3]C HOI,N.,S ONG,I.-Y.,AND H AN,H.A surveyon ontology mapping.SIGMOD Rec.35,3(2006), 34–41.[4]D OU, D.,M C D ERMOTT, D.,AND Q I,P.On-tology Translation by Ontology Merging and Au-tomated Reasoning.Whitestein Series in Soft-ware Agent Technologies and Autonomic Comput-ing.Birkh¨a user Basel,2005,pp.73–94.[5]F IKES,R.E.,F ERRUCCI, D.,AND T HURMAN,D.A.Knowledge Associates for Novel Intelligence.In Proceedings of the2005International Conferenceon Intelligence Analysis(IA2005)(McLean,V A,USA,May2005).[6]G OGUEN,J.A.Data,Schema,Ontology and LogicIntegration.Logic Journal IGPL13,6(2005),685–715.[7]H ENDLER,J.Agents and the Semantic Web.IEEEIntelligent Systems(March/April2001),30–37.[8]K LYNE,G.,AND C ARROLL,J.J.Resourcedescription framework(rdf):Concepts and ab-stract syntax,available at /tr/rdf-concepts/.Tech.rep.,W3C,February2004.[9]K OZA,J.Genetic Programming:On the Program-ming of Computers by Means of Natural Selection.MIT Press,Cambridge,MA,1992.[10]M ANNA,Z.,AND W ALDINGER,R.Fundamentalsof deductive program synthesis.In Logic,Algebra,and Computation,F.L.Bauer,Ed.Springer,Berlin,Heidelberg,1991,pp.41–107.[11]M C G UINNESS,D.L.,AND VAN H ARMELEN,F.OWL Web Ontology Language overview.Tech.rep.,W3C,Available at /TR/owl-features/,2004.[12]MITRE.IKRIS,workshop site:/NRRC/ikris.htm,2007. [13]R ICH,C.,AND W ATERS,R.C.Automatic pro-gramming:Myths and puter21,8(Aug.1988),40–51.[14]S IEGEL,N.,S HEPARD, B.,C ABRAL,J.,ANDW ITBROCK,M.Hypothesis Generation and Evi-dence Assembly for Intelligence Analysis:Cycorp’sNo¨o scape Application.In Proceedings of the2005International Conference on Intelligence Analysis(IA2005)(McLean,V A,USA,May2005). [15]S MITH, B.The basic tools of formal ontology.In Formal Ontology in Information Systems(1998),N.Guarino,Ed.,IOS Press,pp.19–28.[16]T AYLOR,J.,S HILLIDAY,A.,AND B RINGSJORD,S.Provability-based semantic interoperability viatranslation graphs.In International Workshop onOntologies and Information Systems for the Seman-tic Web(ONISW2007)(2007).3。
Certificate of Eligibility (COE) FAQ说明书
Certificate of Eligibility (COE)What is a Certificate of Eligibility (COE)?Please tell me the procedure for obtaining a COE.How long does it take to get a COE?Please tell me the required documents.The scholarship has not been decided yet andI cannot enter the information on the financial support certificate.Certificate of Eligibility (COE)We plan to receive multiple scholarships. In that case, how should I fill in?I've been to Japan several times as a tourist, so do I need to copy all the pages that have Japan immigration stamps on my passport?I don't know where the Japanese Embassy / Consulate is in my country.Where should I send the COE to?Do you know when the COE was issued?I received a COE. What should I do after this?What documents do I need to apply for a VISA?Certificate of Eligibility (COE)Should I take the COE to Japan when I receive it?By when do I need to go to Japan after getting a COE?Is it okay to enter Japan on a different date than when I applied for the COE?Is it okay to enter Japan from a different airport than when I applied for COE?I haven't received my Certificate of Eligibility (COE),but please tell me the situation.I have not received a COE. Can I go on a trip?I am coming from a visa exempt country.Can I enter and study abroad without a COE?Certificate of Eligibility (COE)What if I already have a "Study" visa ?What should I do if I already have a visa for "resident", "family stay", etc.?What if I already have a "Temporary Stay" visa?Certificate of Eligibility (COE)I currently have a status of residence other than ""Student"",but I would like to change to a "Student" visa. What should I do.I will come to Japan with my family. Are there any documentsother than the visa and COE required when entering the country?I will come to Japan with my family. Are there any documentsother than the visa and COE required when entering the country?I am currently attending a Japanese language school, but due to my privatereasons, I decided to drop out of the school and return to my home country.How do I get a visa to continue studying at university after this?資格外活動の許可I am in Japan with a “Tourist" visa. Is it okay if I go to the Immigration Bureauand apply for a Certificate of Eligibility for Status of Residence (COE)?資格外活動の許可I would like to work part-time.Do international students need special procedures?What is a non-qualification activity permit?When I enter Japan,can I apply for a permit activity permit at the port of entry and departure?How long can I work with a non-qualification activity permit?資格外活動の許可How do I apply for an activity permit for non-qualification activities?their status of residence, we will hand out the application formwith the application for extend your period of stay.Where can I have a part-time job?I got a permit other than my qualification.Is there a type of part-time job you should not do?What is illegal work?資格外活動の許可I would like to work as a lecture assistant at a university.Is it necessary to obtain permission for activities outside of my qualifications?niversity Resident Status Support Officeniversity Global Services Co., Ltd.)Hakusan Campus Building No.8, 2nd floor****************.jpCan I work part-time while on leave of absence?How do I find a part-time job?Is it possible to apply for an activity permit outside the status of qualification even if the part-time job destination has not been decided?Extension of Period of StayI want to renew my period of stay, what should I do?ronavirus infection, however, it will be mailed to your home addressn PUGS during the period of enrollment.When can I start the procedure to renew my period of stay?Please tell me the documents required to renew your period of stay.I entered a Japanese language school (other university) and want to renewmy residence immediately. What should I do with the transcript?Extension of Period of StayI am an international student, but I need a certificate of enrollment to renewmy period of stay. Where can I get it published?I need a transcript to update my period of stay, but I cannot issue it.Can you issue a replacement?I am a researcher, but I need a certificate of enrollment in order to renewmy period of stay. Where can I get a certificate of enrollment?I am an international student, but I need a certificate of enrollment torenew my period of stay. Where can I get it published?Will the regional immigration bureau, etc. keep my passport while myapplication to extend my period of stay is being considered?If I’m permitted to keep my passport while they are consideringthe application, may I go overseas during this time?Extension of Period of StayHow soon will a new residence card be issued after the procedurefor renewing the period of stay?I attended a language school after coming to Japan, but now I am enrollingat a university. Do I need to submit some kind of notification to theimmigration bureau? (Accepting organization)"Should I always carry my residence card with me?Designated ActivitiesI'm graduating from university, but I haven't decided where to work. I want to continue job hunting. Can I still have the status of residence as "Student"?Designated ActivitiesWhat is required to change the status of residence to "the Designated Activities for Job-seeking Activities status of residence " ?ww.toyo.ac.jp/en/international-exchange/international/guide/How long can you stay in Japan with the status of residence of “theDesignated Activities for Job-seeking Activities status of residence "?Is it okay to work part-time after changing my status of residence to "the Designated Activities for Job-seeking Activities status of residence "?Designated ActivitiesAn international student who graduated from university at the end of March of this year and was conducting job hunting with the status of residence of “the Designated Activities for Job-seeking Activities status of residence ".I got a job, but I will join the company in April next year. Is it ok to keep thestatus of residence as “the Designated Activities for Job-seeking Activities status of residence "?I am planning to bring my family to Japan and live together.What kind of procedure is required?A child was born. Is it necessary to submit a birth notification tothe Immigration Seervice Agency?A child was born. Is birth notification required at the ward office?Designated ActivitiesI would like to return to Japan for a long vacation such as summer vacationor winter vacation. Do I need special procedures for re-entry?t the airport, and check a statement to your Embarkation andkation Card for Re-entrants (ED card for Re-entrants) “You wish toapan”.te that if your Status of Residence expires while you are abroad,ot be able to enter Japan unless you obtain a new Status ofe.nformation about the special re-entry system and ED card fornts, please check the website of the Ministry of Justice below.re-entry permit systemwww.immi-moj.go.jp/tetuduki/zairyuu/minashisainyukoku.htmlation and Disembarkation Card (ED card)www.immi-moj.go.jp/re-ed/EDcard_leaf_ja.pdf。
美国军队结构及中英文翻译对照
国防部各部门负责审计的副部长(审计长/首席财务官)审计长首席助理(Principal Deputy Under Secretary of Defense (Comptroller))项目分析评估主任(Director for Program Analysis and Evaluation)负责采办、技术与后勤的副部长(Under Secretary of Defense for Acquisition, Technology and Logistics)国防研究与工程局局长(Director of Defense Research and Engineering)负责采办与技术的副部长助理(Deputy Under Secretary of Defense (Acquisition and Technology))负责后勤与物资战备的副部长助理(Deputy Under Secretary of Defense (Logistics and Material Readiness))负责三防(核生化)项目的国防部长助手(Assistant to the Secretary of Defense (Nuclear and Chemical and Biological Defense Programs))弱小企业综合利用主任(Director of Small and Disadvantaged Business Utilization)负责采办改革的副部长助理(Deputy Under Secretary of Defense (Acquisition Reform))负责先进系统与概念的副部长助理(Deputy Under Secretary of Defense (Advanced Systems and Concepts))负责环境安全的副部长助理(Deputy Under Secretary of Defense (Environmental Security))负责工业事务的副部长助理(Deputy Under Secretary of Defense (Industrial Affairs))负责各种设施的副部长助理(Deputy Under Secretary of Defense (Installations))负责科学技术的副部长助理(Deputy Under Secretary of Defense (Science and Technology))负责人事与战备的副部长(Under Secretary of Defense for Personnel and Readiness)负责部队管理政策的助理部长(Assistant Secretary of Defense (Force Management Policy))负责卫生事务的助理部长(Assistant Secretary of Defense (Health Affairs))负责后备队的助理部长(Assistant Secretary of Defense (Reserve Affairs))负责战备的副部长助理(Deputy Under Secretary of Defense (Readiness))负责项目集成的副部长助理(Deputy Under Secretary of Defense (Program Integration))负责规划的副部长助理(Deputy Under Secretary of Defense (Planning))负责政策的副部长(Under Secretary of Defense for Policy)负责政策的副部长首席助理(Principal Deputy Under Secretary of Defense (Policy))负责国际安全事务的助理部长(Assistant Secretary of Defense (International Security Affairs))负责战略与缓解威慑的助理部长(Assistant Secretary of Defense (Strategy and Threat Reduction))负责特种作战与低强度冲突的助理部长(Assistant Secretary of Defense (Special Operations and Low-Intensity Conflict))负责政策支持的副部长助理(Deputy Under Secretary of Defense (Policy Support))负责科技安全政策的副部长助理(Deputy Under Secretary of Defense (Technology Security Policy))北约美国代表团防务顾问,Defense Advisor, U.S. Mission NATO负责情报的副部长(Under Secretary of Defense for Intelligence)负责指挥、控制、通讯与情报(C3I)的助理部长(Assistant Secretary of Defense (Command, Control, Communication s, and Intelligence))负责法律事务的助理部长(Assistant Secretary of Defense (Legislative Affairs))负责公共事务的助理部长(Assistant Secretary of Defense (Public Affairs))总法律顾问(General Counsel of the Department of Defense)作战试验与论证局局长(Director of Operational Test and Evaluation)负责情报监督的副部长助理(Assistant to the Secretary of Defense (Intelligence Oversight))行政管理局局长(Director of Administration and Management)基本评估办公室主任(Director of Net Assessment)总监察长办公室国防部总监察长(Inspector General of the Department of Defense): 汤马斯·金波第一副总检察长(Principal Deputy Inspector General)条令局局长(Dean of Instruction)就业机会平等委员对(EEO)高级军事官员(Senior Military Officer)负责行政管理的总监察长助理(Assistant Inspector General for Administration and Management)负责在国会等机构任联络官的总监察长助理(Assistant Inspector General, Congressional/Committee Liaison)总顾问(General Counsel)负责审计的副总监察长(Deputy Inspector General for Auditing)负责审计的总监察长第一助理(Principal Assistant Inspector General (Audit))负责审计的总监察长助理(Assistant Inspector General (Auditing))负责审计的总监察长副助理(Deputy Assistant Inspector General (Auditing))各军种各审计局(Service Audit Agencies)负责政策与监督的副总监察长(Deputy Inspector General for Policy and Oversight)负责审计政策监督的总监察长助理(Assistant Inspector General (Audit Policy Oversight))负责审查与评估的总监察长助理(Assistant Inspector General (Inspection & Evaluations))负责调查政策和监督的总监察长助理(Assistant Inspector General (Investigation Policy & Oversight))热线处处长(Director of Hotline})反诈骗处处长(Director of ADU)定量方法处处长(Director of QMD)反旅行诈骗处处长(TAD)?数据挖掘处处长(Director of Data Mining)各军种总监察长(Service Inspector Generals)负责调查的副总监察长(Deputy Inspector General for Investigations)高级官员调查处处长(Director for Investigations of Senior Officials)军人赔偿调查处处长(Director for Military Reprisal Investigation)平民赔偿调查处处长(Director for Civilian Reprisal Investigation)国防刑事调查处处长(Director for enefense Criminal Investigative Service)国防刑事调查处副处长(Deputy Director for Defense Criminal Investigative Service)美国陆军犯罪调查司令部(en:U.S. Army Criminal Investigation Command)海军罪案调查处(en:Naval Criminal Investigative Service)空军特别调查处(en:Air Force Office of Special Investigations)负责情报的副总监察长(Deputy Inspector General for Intelligence)负责情报审查的总监察长副助理(Deputy Assistant Inspector General (Intelligence Audits))负责情报评估的总监察长副助理(Deputy Assistant Inspector General (Intelligence Evaluation))国家侦察局(en:National Reconnaissance Office)国防情报局(enefense Intelligence Agency)国家安全局(en:National Security Agency)国家地理空间情报局(en:National Geospatial-Intelligence Agency)参谋长联席会议及其成员参谋长联系会议以及成员组织结构图参谋长联席会议主席: 海军上将迈克尔·马伦参谋长联席会议副主席: 海军陆战队上将詹姆斯·卡特莱特海军作战部长: 海军上将加里·罗海德陆军总参谋长: 陆军上将乔治·凯西空军总参谋长: 空军上将诺顿·施瓦兹海军陆战队总司令: 海军陆战队上将詹姆斯·康威联合参谋部参谋长联席会议主席助理(Assistant to the Chairman)高级军事顾问(Senior Enlisted Advisor of the Chairman)联合参谋部主任(Director, the Joint Staff)人力与人事部(J-1)(Manpower and Personnel)情报部(J-2)(Joint Staff Intelligence)作战部(J-3)(Operations)后勤部(J-4)(Logistics)战略计划与政策部(J-5)(Strategic Planning and Policy)指挥、控制通信与计算机系统部(J-6)(Command, Control, Communication s and Computer Systems)作战计划与联合部队发展部(原为作战计划与协调部)(J-7)(Operational Plans and Interoperability)部队结构、资源与评估部(J-8)(Force Structure Resources and Assessment)管理部(J-9)(Directorate of Management)海军部(Department of the Navy)海军部长Department of the Navy海军部副部长海军作战部部长海军作战部副部长海军人事局军医局海军海上系统指挥部海军空中系统指挥部海军设施工程指挥部海军补给系统指挥部空间与海军武器系统指挥部战略系统指挥部美国海军军官学校教育与训练局局长气象与海洋科学指挥部法务司令部海军天文台海军打击与航空战术中心海军安全中心海军安全大队司令部海军后备队作战测试评估部队海军特种作战司令部美国海军中央司令部海军网络战司令部[5]美国驻欧海军军事海运司令部美国舰队司令部美国太平洋舰队海军设施司令部海军核动力计划局局长海军陆战队总司令海军陆战队总司令助理情报部长法务部长总审计长行政助理弱小企业综合利用主任负责研究、发展与采购的海军部长助理海军研究办公室负责人力与后备队事务的海军部长助理负责财务管理与审计的海军部长助理负责设施与环境的海军部长助理海军部总顾问首席信息官海军军法署署长海军总监察长项目评估处处长陆军部(Department of the Army)陆军部部长(Secretary of the Army)陆军部副部长(Under Secretary of the Army)陆军总监察长(Inspector General of the Army)陆军总审计长(Army Auditor General)副部长助理(Deputy Under Secretary of the Army)负责商业转型的陆军部副部长助理(Deputy Under Secretary of the Army for Business Transformation)立法联络局局长(Chief, Legislative Liaison)公共事务局局长(Chief, Public Affairs)弱小企业综合利用办公室(Small and Disadvantaged Business Utilization Office)陆军总顾问(General Counsel of the Army)陆军部长行政助理(Administrative Assistant to the Secretary of the Army)负责采办、后勤与技术的助理部长(Assistant Secretary of the Army (Acquisition, Logistics and Technology)负责民用工程的助理部长(Assistant Secretary of the Army (Civil Works))负责财务管理与审计的助理部长(Assistant Secretary of the Army (Financial Management and Comptroller))负责设施与环境的助理部长(Assistant Secretary of the Army (Installations and Environment))负责人力与后备役事务的助理部长(Assistant Secretary of the Army (Manpower and Reserve Affairs))首席情报官(Chief Information Officer)美国陆军网络事业技术司令部/第9通信司令部(United States Army Network Enterprise Technology Command/9th Signal Command)陆军参谋部主任(Director, Army Staff)美国陆军军官学校(The en:United States Military Academy)美国陆军情报与安全司令部(United States Army Intelligence and Security Command)美国陆军测试与评估司令部(United States Army Test and Evaluation Command)美国陆军刑事调查司令部(United States Army Criminal Investigation Command)美国陆军医务司令部(United States Army Medical Command)美国陆军华盛顿卫戍区(United States Army Military District of Washington)美国陆军工程兵部队(United States Army Corps of Engineers)美国陆军后备队司令部(United States Army Reserve Command)美国陆军采办支持中心(United States Army Acquisition Support Center)陆军参谋长(Chief of Staff of the Army)陆军第一副参谋长(Vice Chief of Staff of the Army)陆军医务部部长(Surgeon General of the Army)国民警卫队局局长(Chief, National Guard Bureau)陆军后备队局局长(Chief, Army Reserve)总法律顾问(Judge Advocate General)牧师长(Chief of Chaplains)陆军总军士长(en:Sergeant Major of the Army)负责后勤的副参谋长(Deputy Chief of Staff (Logistics))(G-4)工程兵主任(Chief of Engineers)负责项目的副参谋长(Deputy Chief of Staff (Programs))(G-8)负责设施管理的助理参谋长(Assistant Chief of Staff, Installation Management)美国陆军设施管理司令部(United States Army Installation Management Command)负责人事的副参谋长(Deputy Chief of Staff (Manpower))(G-1)负责情报的副参谋长(Deputy Chief of Staff (Intelligence))(G-2)负责计划、作战与转型的副参谋长(Deputy Chief of Staff (Plans, Operations and Transformation))(G-3/5/7)美国陆军训练与条令司令部(en:United States Army Training and Doctrine Command)美国陆军装备司令部(en:United States Army Materiel Command)美国陆军司令部(en:United States Army Forces Command)美国陆军中央司令部(United States Army Central)美国陆军欧洲司令部(United States Army Europe)美国陆军北方司令部(United States Army North)美国陆军南方司令部(United States Army South)美国陆军太平洋司令部(United States Army Pacific)美国陆军特种作战司令部(United States Army Special Operations Command)军事地面部署与配给司令部(Military Surface Deployment and Distribution Command)美国陆军太空、火箭及防卫司令部/陆军战略司令部(United States Army Space and Missile and Defense Command/Army Strategic Command)第8军(Eighth Army)空军部(Department of the Air Force)空军部长(en:Secretary of the Air Force)空军部副部长(Under Secretary of the Air Force)行政助理(Administrative Assistant)审计长(Auditor General)负责采办的助理部长(Assistant Secretary of the Air Force (Acquisition))通信处处长(Director of Communication)负责财务管理与审计的助理部长(Assistant Secretary of the Air Force (Financial Management and Comptroller)}负责设施、环境与后勤的助理部长(Assistant Secretary of the Air Force (Installations, Environment and Logistics)负责国际事务的副部长助理(Deputy Under Secretary of the Air Force (International Affairs))负责人力与后备队事务的助理部长(Assistant Secretary of the Air Force (Manpower and Reserve Affairs))公共事务处处长(Director of Public Affairs)立法联络局局长(Director, Legislative Liaison)空军总监查长(Inspector General of the Air Force)空军总顾问(General Counsel of the Air Force)战斗集成局局长(Chief of Warfighting Integration)首席信息官(Chief Information Officer)空军军史局局长(Air Force Historian)测试与评估局局长(Director of Test and Evaluation)空军首席科学家(Chief Scientist of the Air Force)空军参谋部组织结构图空军参谋长(Chief of Staff)空军副参谋长Vice Chief of Staff)空军总军士长(Chief Master Sergeant of the Air Force)负责人事的副参谋长(Deputy Chief of Staff (Personnel))(A1)负责情报、监视与侦查的副参谋长(Deputy Chief of Staff (Intelligence, Surveillance and Reconnaissance))(A2)负责航空航天与信息作战、计划、需求的副参谋长(Deputy Chief of Staff (Air, Space and Information Operations, Plans and Requirements) (A3/5))负责后勤、设施以及任务支持的副参谋长(Deputy Chief of Staff (Logistics, Installations and Mission Support))(A4/7)负责战略计划与项目的副参谋长(Deputy Chief of Staff (Strategic Plans and Programs))(A8)学术分析、评估与教程处处长(Director for Studies Analyses, Assessments and Lessons Learned)(A9)牧师长(Chief of Chaplains)总法律顾问(Judge Advocate General)空军后备队局局长(Chief, Air Force Reserve)安全局局长(Chief of Safety空军军医局局长(Surgeon General of the Air Force)空军国民警卫队局局长(Director, Air National Guard)空军战斗司令部(Air Combat Command)空军教育与训练司令部(Air Education and Training Command)空军装备司令部(Air Force Material Command)空军后备队司令部(Air Force Reserve Command)空军航天司令部(Air Force Space Command)空军特种作战司令部(Air Force Special Operations Command)空军信息司令部(Air Force Cyber Command)空军机动司令部(Air Mobility Command)空军太平洋司令部(Pacific Air Forces)空军欧洲司令部(U.S. Air Forces in Europe)。
密钥管理框架
ITL BULLETIN FOR JANUARY 2014A PROFILE OF THE KEY MANAGEMENT FRAMEWORKFOR THE FEDERAL GOVERNMENTElaine Barker, EditorComputer Security DivisionInformation Technology LaboratoryNational Institute of Standards and TechnologyU.S. Department of CommerceThe Computer Security Division within the Information Technology Laboratory has recently provided a draft of NIST Special Publication (SP) 800-152, A Profile for U. S. Federal Cryptographic Key Management Systems, for public comment. The draft and instructions for providing comments are available at this website.NIST SP 800-152 is based on NIST SP 800-130, A Framework for Designing Cryptographic Key Management Systems (CKMS), which is referenced in this article as the “Framework.” SP 800-130 describes the topics to be considered and the documentation requirements to be addressed when designing a CKMS.A CKMS is responsible for managing the cryptographic keys to be employed for protecting stored and transmitted sensitive information by its users. Typically, each user has a device to perform the computational actions required to cryptographically protect the information. This device could be, for example, a personal computer, a tablet, or a smart phone. In order to interact with other users of the CKMS, each device needs to include a CKMS module that is responsible for interacting with other CKMS modules in the CKMS to perform the general CKMS functionality needed for the device, and a cryptographic module to perform the actual cryptographic operations.A CKMS could be set up so that its CKMS modules have the same or similar capabilities. An example of this model might be an email application that cryptographically protects the emails sent between CKMS users.A CKMS could also be set up so that one CKMS module has a “master” relationship with the other CKMS modules in the CKMS. In this case, an example might be a “master” CKMS module that is used by a Key Distribution Center that provides all keys to other CKMS modules in the CKMS.A CKMS designer determines the type of CKMS to be developed and the capabilities to be incorporated into the specific design. The Framework document specifies CKMS topics that need to be considered during the design and requires that the CKMS designer document the capabilities to be incorporated into the design.However, the Framework does not address the specific requirements for a CKMS user organization, such as a federal agency; a profile of the Framework is required for this purpose. SP 800-152 is a profile of the Framework that is intended for CKMSs used by the federal government for protecting sensitive, unclassified information, and is referenced herein as the “Profile.” Other public and private sectors, such as the healthcare and financial sectors, may use this Profile for their own CKMSs or may develop a profile document of their own, perhaps using SP 800-152 as a model.SP 800-152 provides a foundation for designing and implementing federal CKMSs. While the Framework specifies requirements for documenting the design of any CKMS, SP 800-152 provides specific details to be incorporated in the design, such as the use of NIST-approved cryptographic algorithms and Federal Information Processing Standard (FIPS) 140-validated cryptographic modules. However, SP 800-152 goes beyond the Framework by specifying requirements for testing, procuring, installing, managing, operating, maintaining, and using federal CKMSs, including interoperability considerations.The Profile specifies requirements for a “base” Federal CKMS (FCKMS) with the minimum requirements for all FCKMSs that could be further augmented to meet the needs of federal organizations and their contractors. The Profile recommends augmentations to be considered, as well as suggesting features that may be useful, now or in the future. It is anticipated that some federal organizations may develop a more customized profile document to meet their specific needs, using SP 800-152 as a base.SP 800-152 is intended to address key management for all the current environments in use today, including key management in the cloud and mobile applications. While SP 800-152 cannot address all issues relating to these environments, it needs to be flexible enough to serve as a basis for developing further guidance for a variety of such environments. Comments are requested during the public-comment period about how well the Profile document serves as a basis for providing more detailed guidance for key management in these environments.The Profile document also addresses the requirements and guidance in several security documents developed by NIST in the last few years, including FIPS 199, Standards for Security Categorization of Federal Information and Information Systems,and FIPS 200, Minimum Security Requirements for Federal Information and Information Systems. The security categories in FIPS 199 are based on the potential impact on an organization if certain events occur that jeopardize the information and information systems needed by the organization to accomplish its assigned mission, protect its assets, fulfill its legal responsibilities, maintain its day-to-day functions, and protect individuals. FIPS 200 uses the security categories in FIPS 199 to specify and define three information system impact levels: low, moderate, and high.SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations, provides baseline security controls for each FIPS 200 impact level. However, no current guidance exists on the minimum amount of security protection required for each impact level when cryptographic mechanisms are used. The draft of SP 800-152 proposes a mapping between each impact level and a minimum security strength to be provided using NIST-approved algorithms and key lengths, as well as a minimum cryptographic module security level for each impact level. Comments are requested during the public-comment period about the proposed mappings. Once the mappings are solidified, SP 800-53 and any related documents will be modified to reflect these mappings.An open workshop is planned at NIST for March 4-5, 2014, to discuss the document. Information on the workshop is available at this website.ITL Bulletin Publisher: Elizabeth B. LennonInformation Technology LaboratoryNational Institute of Standards and Technologyelizabeth.lennon@Disclaimer: Any mention of commercial products or reference to commercial organizations is for information only; it does not imply recommendation or endorsement by NIST nor does it imply that the products mentioned are necessarily the best available for the purpose.。
Consulting Services
Packaged Consulting Services
“Grey-hair projects”
• Frequently performed studies
– Built on internal intellectual capital – Predictable planning
• For each step of a project phase • In each area of interest
– Business and/or Technical – Implementation, Project Management
• Proven value • Appreciated by customers • Opportunity to benchmark within
each package
E&I Value Review
Assessing the impact of Target-2-Securities
Reviewing your Treasury Operations
Optimising Accord for Treasury
Accord Health Check
Traffic & Data Benchmarking
Business &Tech• nRiceavileCwoinngsyuoltuinr gmessaging architecture
•…
BCP & Security
• Reviewing your business continuity and disaster recovery processes
Analyse
Design Implement Go live
参观车间英文对话范文
参观车间英文对话范文A Visit to the Factory Floor.Visitor: Excuse me, I'm here for the factory tour. Who should I speak to?Receptionist: Good morning, the tour starts at 10 a.m. sharp. You can find the group just outside the main entrance.Visitor: Thank you. Could you please tell me what kind of products are made here?Receptionist: Sure, we specialize in precision machining for various industries. From automotive to aerospace, you'll see a variety of machines and processes.Visitor: That sounds interesting. Do you use any advanced technologies here?Receptionist: Absolutely. We've invested in state-of-the-art CNC machines and robotics for automation. Safety is our top priority, so you'll notice strict safety measures throughout the factory.Visitor: I've heard about CNC machines, but I'm not familiar with robotics in manufacturing. Could you elaborate?Receptionist: Sure. Robotics allows us to perform complex tasks with precision and speed. It reduces human error and improves efficiency. You'll see robots assisting with welding, picking and placing parts, and even quality control.Visitor: That's impressive. I'm looking forward to seeing it all in action.[Later, outside the factory floor]Guide: Welcome to our factory! I'm your tour guide. Today, we'll be visiting various departments to understandthe manufacturing process from start to finish.Visitor: Thank you for guiding us. I'm really excited to learn more.Guide: Great! Let's start with the raw materials. Over here, you'll see where we store and inspect the incoming materials.[In the Raw Materials Department]Guide: As you can see, we have strict quality control measures for incoming materials. Each batch is inspected for purity, strength, and durability.Visitor: It's amazing to see how meticulous you are with quality control.Guide: Absolutely. Quality is our hallmark. Now, let's move on to the machining area.[In the Machining Area]Guide: Over here, you'll see our CNC machines in action. These machines are programmed to cut and shape metal with extreme precision.Visitor: It's incredible how fast and precise these machines are.Guide: Yes, technology has really transformed manufacturing. Now, let's head over to the robotics section.[In the Robotics Section]Guide: As you can see, our robots are busy at work.They perform tasks that require high precision and repeatability.Visitor: It's amazing to watch them work seamlessly. How are they programmed?Guide: They are programmed using advanced software. We can teach them new tasks and even fine-tune their movementsfor optimal performance.Visitor: That's truly remarkable. It seems like the future of manufacturing is here.Guide: Absolutely. Technology is constantly evolving, and we strive to stay ahead of the curve.[Later, in the Quality Control Department]Guide: Before any product leaves our factory, it goes through rigorous quality control. We use advanced testing equipment to ensure every product meets our high standards.Visitor: It's comforting to know that you put so much emphasis on quality.Guide: Yes, we take pride in our work and strive to deliver the best to our customers.[At the End of the Tour]Visitor: Thank you for a wonderful tour. I've learned a lot and was truly impressed with your facility and processes.Guide: You're welcome! We're glad you enjoyed it. Feel free to ask any questions or visit again in the future.Visitor: I definitely will. Thank you again for your time and expertise.Guide: You're very welcome! Have a great day!。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Data expressiveness --Database written in the data model used in Δ1 can be translated into an equivalent database in the data model of Δ2
1
14.1.1 Constraint and Extreme Point Data Models
17
14.2.3 Query Interoperability via a common basis Figure 14.7
Precise data translation --We can translate each of the spatiotemporal data models of Chapter 13 into a syntactically restricted type of constraint database. We can also easily compare the expressive power of several different data models by translating them to restricted types of constraint databases
18
Advantages of common basis
Easy query translation --Many spatiotemporal query languages contain numerous spatial operators and other special language features. Safety and complexity --By knowing the allowed syntax of the constraints in the common basis, we can gain valuable information about the safety and computational complexity of queries.
5
14.1.2 Constraint and Parametric Extreme Point Data Models
Theorem: Any parametric rectangle relation R with m-degree polynomial parametric functions of t is equivalent to a constraint relation C with inequality constraints in which the spatial variables are bound from above or below by m-degree polynomial functions of t and t is bounded from above and below by constants.
12
Theorem: Any parametric 2-spaghetti relation W with m-degree polynomial functions of t is equivalent to a two-dimensional parametric affine transformation object relation G with m-degree polynomial functions of t and a polygonal reference object.
15
14.2 Query Interoperability
14.2.1 Query interoperability via Query Translation
Figure 14.4. 14.2.2 Query Interoperability via Data Translation Figure 14.5
x, y linear for each t
Parametric 2-spaghetti Parametric affine motion polygon reference object
14
14.1.4 Constraint and Geometric Transformation Models
4
Example:
ID
Fountain Road Road Tulip Park Pond
X Y T
x x x x x x y y y y y y t t t t t t x = 10, y = 4, 1980 <= t, t <= 1986 5 <= x, x <= 9, y = -x+15, 1995 <= t, t <=1996 x = 9, 3 <= y, y <= 6, 1995 <= t, t <=1996 2 <= x, x <= 6 ,y <= 9-x, 3 <= y, y <= 7, 1975 <= t, t <= 1990 1 <= x, x <= 12, 2 <= y, y <= 11, 1974 <= t, t <= 1996 x >= 3, y >= 5, y >= x-1, y <= x+5, y <= -x+13, 1991 <= t, t <= 1996
16
Theorem: All the spatiotemporal models appearing in Figure 14.3 are closed under intersection, complement, union, join, projection, and selection with inequality constraints that contain spatiotemporal variables and constants.
2
House2
ID X
1 2 3 3 X X X X
Y
Y Y Y Y
T
T T T T 2<=x, x<=6, 3<=y, y<=6, 100<=t, t<=200 8<=x, x<=11, 3<=y, y<=7, 150<=t, t<=300 2<=x, x<=4, 5<=y, y<=10, 250<=t, t<=400 2<=x, x<=10, 8<=y, y<=10, 250<=t, t<=400
Theorem: Any d-dimensional parametric affine transformation object relation with mdegree polynomial function soft t can be represented as a (d+1) dimensional constraint relation with polynomial constraints
10
Example:
X Y x y T t
Tide2
1 <= x, x <= 3, 1 <= y, y <= 4, 0 <= t’, t’ <=5.75, y >= x - t’ + 3 1 <= x, x <= 3, 1 <= y, y <= 4, 5.75 <= t’, t’<=11.5, y >= x + t’ - 8.5
Each database in the rectangles data model and Worboys’ data model is equivalent to a constraint database with some suitable types of constraints. Theorem: Any rectangle relation R is equivalent to a constraint relation C with only inequality constraints between constants and variables.
13
Constraint
(Parametric) Extreme Point
Rectangles
(Parametric) Geometric Transformation
Identity transformation rectangle reference object
Inequality
x, y linear t inequality Worboys
3
Theorem: Any Worboys relation W is equivalent to a constraint relation C with two spatial variables with linear constraints and one temporal variable with inequality constraints.
Identity transformation polygon reference object
Each xi bounded by a function of t
Parametric rectangles
Parametric scaling +translation rectangle reference object
14. Interoperability
Database interoperability --Is the problem of making the data and queries of one database system usable to the users of another database system. Requires that the data models used in them have the same data expressiveness.