Using Schemas to Simplify Access Control for XML Documents
专题03必修二Unit3单元基础达标练高考英语一轮科学解决方案(人教版2019)
专题03 必修二Unit3根底学问一遍过单元根底达标练Ⅰ.依据汉语意思填写1.The salesgirl pretended not to hear me and went on _______(闲谈) with a lady in blue.2.The 600 km/h maglev trains contribute to the establishment of a multidimensional transportation system with plete, efficient, flexible and ____________ (便利的) features in China. 3.The exact ________(功能) of sleep is still a mystery, but we know that reduced sleep or sleep loss is related to reduced performance, health and survival.4.So far the eticket service has been ________(采纳) in highspeed railway stations so that passengers don’t need printed tickets any more.5.Researchers found that ______ (流播) an album over the Internet will use 27 times energy than it takes to produce a single CD.6.The ____________ (目标) audience for this advertisement was mainly teenagers.7.I’m writing to __________(确认) the book ng for a single room for the night of January 30. 8.Professor Smith’s lecture on the Internet ________ (使……受益) me a lot .9.Is there a ________ (折扣) for staying at your hotel for several days?10.I was the first to ask him an ____ (令人为难的) question.Ⅰ.用单词的适当形式完成句子11.The newbuilt mall has provided seats for the ________(convenient) of its customers. 12.Knowledge gained from studying earthquake waves__________(apply) in various fields recently.13.Our parents live some ________ (distant) away.14.Her trust in me has inspired me ________(attempt) to do what I never imagined possible. 15.So far, power ________(restore) in most parts that were hit by high winds last night. 16.Justtell us the colour and design you have________ mind. We’ll change them accordingly. 17.She was faced with a new job, in ________(familiar) surroundings with strange people. 18.This part of the city is an area ________ which I have been familiar since childhood. 〔用19.So far this year, no measures ________ (take) against cruelty to animals despite their protest in the newspaper.20._________(confirm) a booking is very important for travelling in summer holiday.Ⅰ.阅读理解AOver the last seven years, most states have banned texting by drivers, and public service campaigns have tried a wide range of methods to persuade people to put down their phones when they are behind the wheel.Yet the problem, by just about any measure, appears to be getting worse. Americans are still texting while driving, as well as using social networks and taking photos. Road accidents, which had fallen for years, are now rising sharply.That is partly because people are driving more, but Mark Rosekind, the chief of the National Highway Traffic Safety Administration, said distracted〔分心〕driving was "only increasing, unfortunately.""Big change requires big ideas." he said in a speech last month, referring broadly to the need to improve road safety. So to try to change a distinctly modern behavior, lawmakers and public health experts are reaching back to an old approach: They want to treat distracted driving like drunk driving.An idea from lawmakers in New York is to give police officers a new device called the Textalyzer. It would work like this: An officer arriving at the scene of a crash could ask for the phones of the drivers and use the Textalyzer to check in the operating system for recent activity. The technology could determine whether a driver had just texted, emailed or done anything else that is not allowed under New York's handsfree driving laws."We need something on the books that can change people's behavior,〞said Félix W. Ortiz, who pushed for the state's 2001 ban on handheld devices by drivers. If the Textalyzer bill bees law, he said, "people are going to be more afraid to put their hands on the cell phone."21.Which of the following best describes the ban on drivers' texting in the US?A.Ineffective.B.Unnecessary.C.Inconsistent.D.Unfair.22.What can the Textalyzer help a police officer find out?A.Where a driver came from.B.Whether a driver used their phone.C.How fast a driver was going.D.When a driver arrived at the scene.23.What does the underlined word "something" in the last paragraph refer to?A.Advice.B.Data.C.Tests.D.Laws.24.What is a suitable title for the text?A.To Drive or Not to Drive? Think Before You StartB.Texting and Driving? Watch Out for the TextalyzerC.New York Banning HandHeld Devices by Drivers.D.The Next Generation Cell Phone: The TextalyzerBAccording to the Solar Energy Industry Association, the number of solar panels installed(安装)has grown rapidly in the past decade, and it has to grow even faster to meet climate goals. But all of that growth will take up a lot of space, and though more and more people accept the concept of solar energy, few like large solar panels to be installed near them.Solar developers want to put up panels as quickly and cheaply as possible, so they haven’t given much thought to what they put under them. Often, they’ll end up filling the area with small stones and using chemicals to control weeds. The result is that many munities, especially infarming regions, see solar farms as destroyers of the soil.“Solar projects need to be good neighbors,〞says Jordan Macknick, the head of the Innovative Site Preparation and Impact Reductions on the Environment(InSPIRE)project. “They need to be protectors of the land and contribute to the agricultural economy.〞InSPIRE is investigating practical approaches to “lowimpact〞solar development, which focuses on establishing and operating solar farms in a way that is kinder to the land. One of the easiest lowimpact solar strategies is providing habitat for pollinators(传粉昆虫).Habitat loss, pesticide use, and climate change have caused dramatic declines in pollinator populations over the past couple of decades, which has damaged the U.S. agricultural economy. Over 28 states have passed laws related to pollinator habitat protection and pesticide use. Conservation organizations put out pollinatorfriendliness guidelines for home gardens, businesses, schools, cities—and now there are guidelines for solar farms.Over the past few years, many solar farm developers have transformed the space under their solar panels into a shelter for various kinds of pollinators, resulting in soil improvement and carbon reduction. “These pollinatorfriendly solar farms can have a valuable impact on everything that’s going on in the landscape,〞says Macknick.25.What do solar developers often ignore?A.The decline in the demand for solar energy.B.The negative impact of installing solar panels.C.The rising labor cost of building solar farms.D.The most recent advances in solar technology.26.What does InSPIRE aim to do?A.Improve the productivity of local farms.B.Invent new methods for controlling weeds.C.Make solar projects environmentally friendly.D.Promote the use of solar energy in rural areas.27.What is the purpose of the laws mentioned in paragraph 4?A.To conserve pollinators.B.To restrict solar development.C.To diversify the economy.D.To ensure the supply of energy.28.Which of the following is the best title for the text?A.Pollinators: To Leave or to StayB.Solar Energy: Hope for the FutureC.InSPIRE: A Leader in AgricultureD.Solar Farms: A New DevelopmentⅠ.完形填空“Dad, just touch the green button! The one with a little picture of a telephone on it!〞I wasHowever, I can say the iPhone has 43 our relationship. 29.A.cheatedB.askedC.coachedD.followed 30.A.enrichB.fundC.simplifyD.save 31.A.slightlyB.stronglyC.bravelyD.successfully 32.A.threwB.boughtC.forgotD.accepted 33.A.turnedB.progressedC.repliedD.contributed 34.A.humorousB.proudC.urgentD.quiet 35.A.understandB.seeC.hearD.treat36.A.eyeB.earC.mouthD.hand 37.A.pictureB.observeC.preventD.mind 38.A.angryB.cautiousC.crazyD.patient39.A.searching forB.testing outC.paying forD.figuring out 40.A.wordB.newsC.routineD.weather 41.A.strangeB.impressiveC.worryingD.easy 42.A.reformB.resistanceC.addictionD.limitation 43.A.plicatedB.startedC.destroyedD.enhancedⅠ.读后续写44.阅读下面材料,依据其内容和所给段落开头语续写两段,使之构成一篇完整的短文。
gopubmed
Gopubmed1. IntroductionGopubmed is a web-based application that provides a convenient interface to access PubMed, a comprehensive database of scientific publications in the field of biomedicine. Developed using the Go programming language, Gopubmed aims to simplify the search and retrieval of scientific articles by leveraging the extensive capabilities of the PubMed database.2. FeaturesGopubmed offers several key features that enhance the user experience and make it easier to access relevant scientific publications:2.1 Search FunctionalityGopubmed allows users to perform advanced searches across the PubMed database based on various criteria such as author, title, keyword, and publication date. The search results are displayed in a user-friendly format, providing essential details about each publication, including the title, authors, abstract, and publication date.2.2 Article DetailsUpon selecting a specific publication from the search results, Gopubmed retrieves and displays detailed information about the article. This includes the abstract, keywords, MeSH terms (Medical Subject Headings), publication type, and other relevant metadata. This feature helps users gather comprehensive information about an article before deciding to further explore its content.2.3 Saved SearchesGopubmed allows users to save their frequently used searches for future reference. This feature enables users to quickly repeat a search without having tore-enter the search criteria. Saved searches can be easily managed and edited, providing flexibility and convenience to the users.2.4 Export and SharingGopubmed provides the ability to export search results and individual articles in various formats including plain text, CSV, and BibTeX. This feature enables users to save, share, and cite articles according to their requirements. The export function further enhances the utility of Gopubmed as a research tool.2.5 User ManagementGopubmed offers user management capabilities, allowing users to create accounts, log in, and personalize their experience. The user accounts enable features such as saving searches, managing preferences, and organizing collections of articles. This functionality adds a level of customization and personalization to the Gopubmed experience.3. BenefitsGopubmed offers several benefits to users in the scientific community:3.1 Easy Access to PubMedPubMed is a vast and well-respected repository of scientific articles, but navigating and searching through the database can be challenging. Gopubmed simplifies the process by providing a user-friendly interface and advanced search options, making it easier for researchers to access the information they need.3.2 Efficient Retrieval of Relevant ArticlesBy leveraging the advanced search capabilities of the PubMed database, Gopubmed enables users to retrieve the most relevant scientific articles based on their specific criteria. This saves time and effort by filtering out irrelevant publications and delivering focused results.3.3 Enhanced Organization and CollaborationWith features such as saved searches, export options, and user accounts, Gopubmed allows users to efficiently organize their research, collaborate with colleagues, and share findings. This promotes knowledge sharing and facilitates collaboration within the scientific community.3.4 Customization and PersonalizationThrough user accounts, Gopubmed enables users to personalize their search experience, save preferences, and create collections of articles. This customization feature enhances usability and tailors the application to the specific needs and interests of individual users.4. ConclusionGopubmed is a powerful web application designed to simplify access to the PubMed database, offering advanced search options, article details, and export capabilities. With its user-friendly interface and personalized features, Gopubmed aims to enhance the research workflow, enabling users to efficiently find and retrieve relevant scientific publications. Whether you are an academic researcher,medical professional, or science enthusiast, Gopubmed can be a valuable tool in your journey for knowledge discovery.Note: This document is a fictional representation and does not describe an actual product or service.。
Allegro基本规则设置指导书之Spacing规则Class to Class
Allegro基本规则设置指导书之Spacing规则Class to Class 下面介绍基本规则设置指导书之Spacing规则Class to Class1.当我们需要给组和组之间设置一个间距规则时候需要用到这个功能在需要的Net Class地方创建一个Class to Class2.Class to Class匹配一个规则This section is describe what the function allegro have ,helpfully could let user know more about allegroAllegro Design and Analysis includes design authoringPCB layout and Library and Design Data ManagementWith. It can ensure the end-to-end design of PCB with high quality and efficiencyRealize smooth data transfer between tools, shorten PCB design cycle, and shorten productMarket time1. Design authoringProvide a flexible logic constraint driven flow, management design rules, network hierarchy,Bus and differential pair.1.1.1 Main features and functionsThrough hierarchical and design "derivation" function, improve the original of complex designMap editing efficiency.Powerful CIS helps users quickly determine part selection and accelerate design flowAnd reduce project cost.1.2.1 Main featuresSchematic designers and PCB design engineers can work in parallel. Advanced design efficiency improves functions, such as copying the previous schematic design Select multiplexing with or by page. Seamless integration into pre simulation and signal analysis.1.2.2 Main FunctionsProvide schematic diagram and HDL/Verilog design input.Assign and manage high-speed design rules.Support netclasses, buses, extension networks and differential pairs. Powerful library creation and management functions.Allows synchronization of logical and physical designs.Realize multi-user parallel development and version control.Pre integration simulation and signal analysis.Support customizable user interface and enterprise customization development.1.3 o Allegro n Design Publisher1.3.1 Main Features and FunctionsAllows you to share designs with others using PDF files.The entire design is represented in a single, compact PDF format. Improve design readability.Provide content control - users can select the content to be published.1.4 Allegro A FPGA m System Planner1 1.4.1 Main features and functionsComplete and scalable FPGA/PCB collaborative design technology for ideal "Design and correct "pin assignment.Scalable FPGA/PCB protocol from OrCAD Capture to Allegro GXLSame as the design solution.Shorten the optimization pin allocation time and accelerate the PCB design cycle.2. B PCB layoutIt provides expandable and easy to use PCB design (including RFPCB) Then drive PCB design solution. It also includes innovative new automatic deliveryMutual technology can effectively improve the wiring of high-speed interfaces; Apply EDMD (IDX) mode, which makes ECAD/MCAD work smoothly; Execute modern industry standard IPC-2581,Ensure that the design data is simply and high-quality transferred to the downstream link.2.1.1 Main featuresSpeed up the design process from layout, wiring to manufacturing. Including powerful functions, such as design zoning, RF design functions and global design rules Stroke.It can improve productivity and help engineers to quickly move up to mass production* g- M4 G8 |6 }9 k7 G2.1.2 Main FunctionsProvide scalable full function PCB design solutions.Enable constraint driven design processes to reduce design iterations. Integrated DesignTrueDFM technology provides real-time DFM inspection. Provide a single, consistent context for management.Minimize design iterations and reduce overall Flex and rigid flexible designCost, and has advanced rigid and flexible design functions.Realize dynamic concurrent team design capability, shorten design cycle, and greatly reduceTime spent in routing, winding and optimization.Provide integrated RF/analog design and mixed signal design environment. Provides interactive layout and component placement.Provide design partitions for large distributed development teams. Realize real-time, interactive push editing of routing.It is allowed to use dynamic copper sheet technology to edit and update in real time.Manage netscheduling, timing, crosstalk, routing by designated layer and area Bundle.Provide proven PCB routing technology for automatic routing.Realize hierarchical route planning and accelerate the completion of design.Shorten interconnect planning and cabling time for high-speed interface intensive design.Provide a comprehensive, powerful and easy-to-use tool suite to help designersEfficient and successful manufacturing switch: DFM Checker is aimed at the company/manufacturerReview the specific rules of manufacturing partners; Used to reduce manufacturing and assembly documentsThe document editing time of the file can reach 70%; The panel editor will assemble the panel designThe intention is communicated to the manufacturing partners; Output design data in various manufacturing formats.3. y Library d and n Design a Data ManagementFor cost-effective projects that need to be delivered on time, it is easy to obtainCurrent component information and design data are critical. library and designData management is a collaborative control of the company's internal cooperation and design processAdvanced functions are provided. As the design cycle shortens and the complexity increases, youThere must be a design approach that increases predictability and accelerates design turnaround.3.1.1 Main featuresReduce time and optimize library development related resources. Improve the precision in the process of parts manufacturing. Q9 b3.1.2 Main functionsReduce time and optimize library development and validation through integrated creation and validation processes Certification related resources.A simple method to develop devices with large pin count can shorten the time from a few days to A few minutes.Powerful graphic editor supports custom shape and spreadsheet importforSchematic symbols are created to ensure the reliability and integrity of data.Supports the import of part information from general industry formats, allowing rapid creation and Update part information.Common library development environment supporting schematic tools from different suppliers, including Mentor Graphics Design Architect and Mentor Graphics Viewdraw。
斑马斑马GK420t桌面热敏打印机手册说明书
Standard Features∙Maximum speed 5 ips (127 mm/sec)∙OpenACCESS™design for easy media loading∙203 dpi print resolution (8 dots/mm)∙Direct thermal (d) and Thermal transfer (t) printing of bar codes, text, and graphics∙Fully-enclosed 5.0" (127 mm) media compartment∙Dual-wall frame construction∙ZPL II®programming language∙EPL2 page mode programming language∙EPL Line Mode support (GK420d)∙32 bit RISC processor∙8 MB Standard SDRAM memory (3 MB available to user)∙ 4 MB Standard Flash memory (1.5 MB available to user)∙Zebra E3™Printhead Energy Control∙Triple communications interface: Serial, USB & Parallel ∙User interface feed button (ZPL®style)∙Odometer for print length tracking∙Unicode™compliant for multi-language printing∙Auto-calibration of media∙16 resident expandable bitmap fonts (ZPL language)∙One resident scalable font (ZPL language)∙ 5 resident expandable bitmap fonts (EPL language)∙Auto-switching 100-240V power supply∙IEC 60601-1 Certified (GK420 Healthcare models only)∙Transmissive and reflective media sensing∙Head-up sensor∙Programmable print speed: 2, 3, 4 & 5 ips(51, 76, 102, 127 mm/sec)∙Standard tear-off mode feature∙Zebra printer driver for Windows®∙ENERGY STAR®2.0qualified Optional Features∙Dispenser (peeler)–Label peel and present with label present sensor(not available on GK420 Healthcare)∙Ethernet-10/100 internal offered in combination with USB interface(replaces Serial and Parallel ports)∙Font Packs–Asian and other international font kits∙Power Cord–US, Europe, UK, Australia, Argentina, Japan, and China∙ZBI 2.0™–Field installed via activation key Accessories∙ZKDU™and KDU Plus™–keyboard display units for stand-alone printing solutionsZebraLink SolutionsSoftware∙ZebraDesigner™Pro–An intuitive,easy-to-use software program for creating complex label designs (option)∙ZebraDesigner–Offers basic features for simple label design(standard)∙ZebraNet™Bridge Enterprise–Centrally manage Zebra printers anywhere on your global network from a single PC screen(option)∙ZebraNet Utilities v7.0–Provides printeradministration, management,alerting capabilities and more for Windows®95/98/2000/2003/ME/NT/XP(standard)∙ZebraDesigner™Windows Driver–Microsoft certified for Windows Vista®, Windows 7, Windows 8 Windows8.1, Windows 2008, and Windows 2012 (downloadablefrom )ZEBRA®GK420D™& GK420T™PRINTER SPECIFICATIONS Specifications are provided for reference and are based on printer tests using Genuine Zebra™supplies and accessories. Results may vary in actual application settings or when using other-than-recommended Zebra supplies. Zebrarecommends always qualifying any application with thorough testing.∙ZBI 2.0–Powerful programming language that lets printers run standalone applications, connect toperipherals, and much more (option)∙ZBI-Developer–Programming environment for developers to simplify creation, testing and distribution to printers of complex ZBI 2.0 programs (standard with ZBI 2.0)∙POS Driver–Supports i ntegration with Windows-based point-of-sale applications.Networking OptionsEthernet-10/100internal-Offered in combination with USB & Serial interface (replaces Serial and Parallel ports) Firmware∙EPL2–Eltron Programming Language simplifies label formatting and enables format compatibility with legacy applications∙EPL–Line Mode support (GK420d) enables format compatibility with legacy applications∙ZPL II–Zebra Programming Language Provides sophisticated label formatting and printer control.Compatible with tabletop and mobile Zebra printers.∙Web View–Connect and control Zebra bar code printers via the printer’s Web interface using a common Web browser∙Alert–Printers equipped with ZebraNet print servers will notify you via any email-enabled, wired, or wireless device to minimize downtimePrinting SpecificationsParameter203 dpi (8 dots/mm)Dot pitch0.0049" (0.125 mm) Maximum print length39.0" (991 mm)Minimum print length0.005" (0.127 mm–one dot) Print length in line mode Unlimited (GK420d) Maximum print width 4.09" (104 mm)Minimum print width0.005" (0.127 mm–one dot)Programmable print speed 2, 3, 4 & 5 ips (51, 76, 102, 127 mm/sec)Bar code modulus “X”dimension 203 dpi = 5 mil to 50 milMedia SpecificationsNOTE:For optimum print quality and printer performance,use of Zebra genuine supplies is recommended.∙Media Width: 0.75" (19 mm)–4.25" (108 mm)∙Label Length:-Using tear off mode:Minimum Length Model Printing Mode0.38" (9.7mm)GK420d Direct thermal0.38" (9.7mm)GK420t Thermal transfer0.5"(12.7mm)GK420t Direct thermal-Minimum using dispenser-0.50" (12.7 mm)-Maximum-39.00" (990 mm)∙Core Inner Diameter: 0.5" (12.7 mm), 1.0" (25.4 mm),1.5" (37.1 mm)∙Max Roll Diameter: 5.00" (127 mm)∙Media Thickness: 0.003" (0.08 mm)-0.0075" (0.19mm)∙Media Sensing: fixed reflective and transmissive gap,black line, and notch∙Media Types: Roll-fed or fan-fold,die cut or continuousdirect thermal labels with or without black line,tagstock, continuous receipt paper, and wristbands∙Dispenser peeler(optional) may not work with all mediatypes and should be tested for media compatibility.Calibration Procedure∙The GK420 is equipped with a standard auto-calibrationfeature that can be set to initiate automatically duringstart-up of the printer–utilizing two to four labels tocalibrate for efficient operation and less waste. Theprinter will also save the new settings in memory untilthe next calibration is performed.∙ A manual calibration procedure can also be performed,if required. Consult your User’s Guide for more detailson the specific manual calibration steps.ZPL Programming Language (ZPL/ZPL II)∙Communicates in printable ASCII characters∙Compatible with mainframe, mini, and PC hosts∙Downloadable objects include graphics and bitmapfonts, label templates and formats∙Automatic memory allocation for format while printing∙Automatic serialization of fields∙Format inversion (white on black)∙Mirror-image printing∙Four position field rotation (0º, 90º, 180º, 270º)∙Slew command∙Programmable label quantities with print, pause ∙Status messages to host upon requestZPL Font Specifications203 dpi (8 dots/mm)FontMatrix(in dots)(H x W)Type*MinimumChar.Size(H x W)MaximumC.P.I.A9x5U-L-D.044" x.030"33.3B11 x 7U.054" x.044"22.7 C,D18 x10U-L-D.089" x.059"16.9E28 x15OCR-B.138" x.098"10.2F26 x13U-L-D.128" x.079"12.7G60 x40U-L-D.295" x.236" 4.2H21 x13OCR-A.103" x.093"10.8 GS24 x24SYMBOL.118" x.118"8.5P-V U-L-D Backward compatible w/S-300Ø15 x12U-L-D Scalable(Smooth)Font*U = upper case, L = lower case, D = descenders∙Character Fonts: Standard bitmapped Zebra fonts: A, B, C, D, E (OCR-B), F, G, H (OCR-A), GS, P, Q, R, S, T, U, V & Ø Smooth font (CG Triumvirate™BoldCondensed)∙Supports user defined fonts and graphics–including custom logos∙Bitmap fonts are expandable up to 10 times, height and width independent. Fonts E and H (OCR-B and OCR-A), however, are not considered in spec whenexpanded.∙Smooth scalable font Ø (CG Triumvirate Bold Condensed) is expandable dot-by-dot, height and width independent, while maintaining edges to a max. 1500 x 1500 dots ZPL Barcode Symbologies∙Barcode Ratios: 2:1 (non-rotated) and 3:1∙Linear Barcodes:Code 11, Code 39, Code93, Code ∙128, UPC-A, UPC-E, EAN-8, EAN-13, EAN-14, UPC-∙ A and UPC-E with EAN 2 or 5 digit extensions, Plessey, POSTNET, Standard 2 of 5, Industrial 2 of 5, Interleaved2 of 5, LOGMARS, MSI, Codabar, andGS1 DataBar(formerly RSS)∙2-dimensional Barcodes:PDF417, MicroPDF-417, Code49, Maxicode, Codablock, Data Matrix, QR code, and AztecEPL Programming Language (EPL2)∙ASCII EPL2 programming language (Page Mode)∙Field Rotations∙Variable field support (up to 100)∙Counter support (up to 10)∙Variable field addition and subtraction∙Status reporting∙Form, fonts, and graphics storage∙Simple set of formatting commandsEPL Font Specifications203 dpi (8 dots/mm)Font Width (dot)Height (dot)CPI 181220.3 2101616.9 31220 4.5 4142412.7 53248 5.68-Simp3232 6.3*8-Trad3232 6.3** Spacing of Asian characters is controlled via the i command. The formula for CPI is 203 / (32 + i). Thus as i increases, CPI decreases. For example: If i = 2, CPI = 203/34 = 6.0EPL Barcodes Symbologies∙Linear barcodes: Code 39, Code 128A, B &C (User selectable/Auto), UCC/EAN-128, Code 93, Codabar, Interleaved 2 of 5, UPC-A, UPC-E, UPC-A with 2 and 5 add on, UPC-E with 2 and 5 add on, EAN 13, EAN 8, EAN 13 with 2 and 5 add on, EAN 8 with 2 and 5 add on, Postnet (5, 9, 11, & 13 digit)Japanese Postnet, Plessey (MSI-1), MSI-3, GermanPost Code, and GS1 DataBar(formerly RSS)∙2-dimensional Barcodes:Maxicode (modes 2,3,4,6), PDF417, MacroPDF417, QR Code, Data Matrix, and AztecCommunications Specifications∙Centronics®Parallel (36 Pin) connector ports∙RS-232auto-sensing, adaptive Serial interface, DB-9∙USB V1.1, bi-directional∙Internal 10/100 Ethernet–optional (replaces Serial and Parallel ports)Electrical Specifications∙Auto-detectable (PFC Compliant) 100-240VAC,50-60Hz rated at 70Watts∙ENERGY STAR2.0qualified printers∙IEC 60601-1 Certified(GK420 Healthcare models only) Agency ApprovalsG-Series GK420Models(excluding Healthcare):∙Emissions:FCC Part 15, Subpart B (Class B), ICES 003 ,VCCI, C-Tick, CQC, EAC, KCC, BSMI, ICES-003∙Emissions and Susceptibility:EN55022 (Class B), EN55024, EN61000-3-2, EN61000-3-3∙Safety:CB Scheme IEC 60950-1, TUV NRTL, C-Tick, CCC, NOM, EAC, KCC, BSMI, BISGK420 Healthcare Models:∙Emissions:FCC Part 15,Subpart B (Class B), ICES 003∙Emissions and Susceptibility: EN55022 (Class B), EN55024, EN61000-3-2, EN61000-3-3∙Safety: CB Scheme IEC 60950-1, TUV NRTL Physical Specifications(no options installed)GK420d GK420t Height 6.0"(152mm)7.5"(191mm)Width: 6.75"(171mm)7.6"(193mm)Depth:8.25"(210mm)10.0”(254mm)Weight: 3.0lbs (1.4kg) 4.6lbs (2.1kg) Environmental Specifications∙Operating Temperature: 40º to 105ºF (4.4º to 41ºC)∙Storage Temperature:-40º to 140ºF (-40º to 60ºC)∙Operating Humidity: 10% to 90% non-condensing R.H.∙Storage Humidity: 5% to 95% non-condensing R.H. Healthcare Features(Healthcare models only)∙Disinfectant-ready plastics∙Approved cleaning agent ingredients (see separate “Guide to Disinfecting and Cleaning Zebra Healthcare Printers” for more details):-Isopropyl and Ethyl alcohol (including wipes)-Ammonium-Hydrogen peroxide-Phosphoric acid-Bleach/sodium hypochlorite-Mild dish soap∙Medical-grade power supply certified to IEC 60601-1 standards to protect patient and staff safety by reducing the risk of electrical shock∙Enable production of labels that meet the Clinical and Laboratory Standards Institute®(CLSI) harmonization standard∙Certified and recommended by all of the leading Electronic Health Records (EHR) providers555Preventative MaintenanceZebra recommends cleaning the printer on a regular basis using standard Zebra printer parts and cleaning supplies. Consult your User’s Guide for further details.Cleaning:The exterior is cleaned with a lint-free cloth and, if necessary, a mild detergent solution or desktop cleaner. Interior components are cleaned with 70% isopropyl alcohol (IPA) or blown air to remove any particles. (For Healthcare models see separate “Guide to Disinfecting and Cleaning Zebra Healthcare Printers”)。
Adobe Acrobat SDK 开发者指南说明书
This guide is governed by the Adobe Acrobat SDK License Agreement and may be used or copied only in accordance with the terms of this agreement. Except as permitted by any such agreement, no part of this guide may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the prior written permission of Adobe. Please note that the content in this guide is protected under copyright law.
HAL.H
/****************************************************************************** * * * ********** * * ************ * * *** *** * * *** ++ *** * * *** + + *** CHIPCON * * *** + * * *** + + *** * * *** ++ *** * * *** *** * * ************ * * ********** * * * *******************************************************************************Filename: hal.hTarget: cc2430Author: EFU/ KJARevised: 1/3-2007Revision: 1.1Description:Hardware Abstraction Layer, Utility Library.******************************************************************************/#ifndef HAL_H#define HAL_H#include "ioCC2430.h"/****************************************************************************** ******************* Chip revisions *************************************************************************************************/ #define REV_A 0x00#define REV_B 0x01#define REV_C 0x02#define REV_D 0x03#define REV_E 0x04/****************************************************************************** ******************* Commonly used types ******************* ******************************************************************************/ typedef unsigned char BOOL;// Datatypedef unsigned char BYTE;typedef unsigned short WORD;typedef unsigned long DWORD;// Unsigned numberstypedef unsigned char UINT8;typedef unsigned short UINT16;typedef unsigned long UINT32;// Signed numberstypedef signed char INT8;typedef signed short INT16;typedef signed long INT32;// Common values#ifndef FALSE#define FALSE 0#endif#ifndef TRUE#define TRUE 1#endif#ifndef NULL#define NULL 0#endif#ifndef HIGH#define HIGH 1#endif#ifndef LOW#define LOW 0#endif/****************************************************************************** ******************* Bit, byte and word macros *************************************************************************************************/// bit mask#define BM( b ) ( 0x01 << ( b ))#define HIBYTE(a) (BYTE) ((WORD)(a) >> 8 )#define LOBYTE(a) (BYTE) (WORD)(a)#define SET_WORD(regH, regL, word) \do{ \(regH) = HIBYTE( word ); \(regL) = LOBYTE( word ); \}while(0)#define GET_WORD(regH, regL, word) \do{ \word = (WORD)regH << 8; \word |= regL; \}while(0)/****************************************************************************** ******************* Port functions/macros ************************************************************************************************** Macros for simplifying access to I/O pin setup and usage.MCU pin configuration:---------------------------------------------| Peripheral I/O signal | Alt1 | Alt2 |---------------------------------------------| Timer1 channel0 | P0.2 | P1.2 || Timer1 channel1 | P0.3 | P1.1 || Timer1 channel2 | P0.4 | P1.0 || Timer3 channel0 | P1.3 | P1.6 || Timer3 channel1 | P1.4 | P1.7 || Timer4 channel0 | P1.0 | P2.0 || Timer4 channel1 | P1.1 | P2.3 || USART0 TXD/MOSI | P0.3 | P1.5 || USART0 RXD/MISO | P0.2 | P1.4 || USART0 RTS/SCK | P0.5 | P1.3 || USART0 CTS/SS_N | P0.4 | P1.2 || USART1 TXD/MOSI | P0.4 | P1.6 || USART1 RXD/MISO | P0.5 | P1.7 || USART1 RTS/SCK | P0.3 | P1.5 || USART1 CTS/SS_N | P0.2 | P1.4 |---------------------------------------------******************************************************************************/// Macros for configuring IO peripheral location:// Example usage:// IO_PER_LOC_TIMER1_AT_PORT0_PIN234();// IO_PER_LOC_TIMER4_AT_PORT2_PIN03();// IO_PER_LOC_USART1_AT_PORT0_PIN2345();#define IO_PER_LOC_TIMER1_AT_PORT0_PIN234() do { PERCFG = (PERCFG&~0x40)|0x00; } while (0)#define IO_PER_LOC_TIMER1_AT_PORT1_PIN012() do { PERCFG = (PERCFG&~0x40)|0x40; } while (0)#define IO_PER_LOC_TIMER3_AT_PORT1_PIN34() do { PERCFG = (PERCFG&~0x20)|0x00; } while (0)#define IO_PER_LOC_TIMER3_AT_PORT1_PIN67() do { PERCFG = (PERCFG&~0x20)|0x20; } while (0)#define IO_PER_LOC_TIMER4_AT_PORT1_PIN01() do { PERCFG = (PERCFG&~0x10)|0x00; } while (0)#define IO_PER_LOC_TIMER4_AT_PORT2_PIN03() do { PERCFG = (PERCFG&~0x10)|0x10; } while (0)#define IO_PER_LOC_USART1_AT_PORT0_PIN2345() do { PERCFG = (PERCFG&~0x02)|0x00; } while (0)#define IO_PER_LOC_USART1_AT_PORT1_PIN4567() do { PERCFG = (PERCFG&~0x02)|0x02; } while (0)#define IO_PER_LOC_USART0_AT_PORT0_PIN2345() do { PERCFG = (PERCFG&~0x01)|0x00; } while (0)#define IO_PER_LOC_USART0_AT_PORT1_PIN2345() do { PERCFG = (PERCFG&~0x01)|0x01; } while (0)// Macros for configuring IO direction:// Example usage:// IO_DIR_PORT_PIN(0, 3, IO_IN); // Set P0_3 to input// IO_DIR_PORT_PIN(2, 1, IO_OUT); // Set P2_1 to output#define IO_DIR_PORT_PIN(port, pin, dir) \do { \if (dir == IO_OUT) \P##port##DIR |= BM( pin ); \else \P##port##DIR &= ~BM( pin ); \}while(0)// Where port={0,1,2}, pin={0,..,7} and dir is one of:#define IO_IN 0#define IO_OUT 1// Macros for configuring IO input mode:// Example usage:// IO_IMODE_PORT_PIN(0, 0, IO_IMODE_PUD);// IO_IMODE_PORT_PIN(2, 0, IO_IMODE_TRI);// IO_IMODE_PORT_PIN(1, 3, IO_IMODE_PUD);#define IO_IMODE_PORT_PIN(port, pin, imode) \do { \if (imode == IO_IMODE_TRI) \P##port##INP |= BM( pin ); \else \P##port##INP &= ~BM( pin ); \} while (0)// where imode is one of:#define IO_IMODE_PUD 0 // Pull-up/pull-down#define IO_IMODE_TRI 1 // Tristate// Macro for configuring IO drive mode:// Example usage:// IIO_PUD_PORT(0, IO_PULLUP);// IIO_PUD_PORT(1, IO_PULLDOWN);// IIO_PUD_PORT(2, IO_PULLUP);// IO口输入驱动模式#define IO_PUD_PORT(port, pud) \do { \if (pud == IO_PULLDOWN) \P2INP |= BM( port + 5 ); \else \P2INP &= ~BM( port + 5 ); \} while (0)#define IO_PULLUP 0#define IO_PULLDOWN 1// Macros for function select (General purpose I/O / Peripheral function): // Example usage:// IO_FUNC_PORT0_PIN0(0, 0, IO_FUNC_PERIPH);// IO_FUNC_PORT0_PIN1(0, 1, IO_FUNC_GIO);// IO_FUNC_PORT2_PIN3(2, 3, IO_FUNC_PERIPH);// IO口的外围功能配置#define IO_FUNC_PORT_PIN(port, pin, func) \do { \if((port == 2) && (pin == 3)){ \if (func) { \P2SEL |= 0x02; \} else { \P2SEL &= ~0x02; \} \} \else if((port == 2) && (pin == 4)){ \if (func) { \P2SEL |= 0x04; \} else { \P2SEL &= ~0x04; \} \} \else{ \if (func) { \P##port##SEL |= BM( pin ); \} else { \P##port##SEL &= ~BM( pin ); \} \} \} while (0)// where func is one of:#define IO_FUNC_GIO 0 // General purpose I/O#define IO_FUNC_PERIPH 1 // Peripheral function// Macros for configuring the ADC input:// Example usage:// IO_ADC_PORT0_PIN(0, IO_ADC_EN);// IO_ADC_PORT0_PIN(4, IO_ADC_DIS);// IO_ADC_PORT0_PIN(6, IO_ADC_EN);// ADC输入设置#define IO_ADC_PORT0_PIN(pin, adcEn) \do { \if (adcEn) \ADCCFG |= BM( pin ); \else \ADCCFG &= ~BM( pin ); \}while (0)// where adcEn is one of:#define IO_ADC_EN 1 // ADC input enabled#define IO_ADC_DIS 0 // ADC input disab/****************************************************************************** ******************* Interrupt functions/macros **************************************************************************************************Macros which simplify access to interrupt enables, interrupt flags andinterrupt priorities. Increases code legibility.******************************************************************************/#define INT_ON 1#define INT_OFF 0#define INT_SET 1#define INT_CLR 0// Global interrupt enables#define INT_GLOBAL_ENABLE(on) EA = (!!on)#define DISABLE_ALL_INTERRUPTS() (IEN0 = IEN1 = IEN2 = 0x00)#define INUM_RFERR 0#define INUM_ADC 1#define INUM_URX0 2#define INUM_URX1 3#define INUM_ENC 4#define INUM_ST 5#define INUM_P2INT 6#define INUM_UTX0 7#define INUM_DMA 8#define INUM_T1 9#define INUM_T2 10#define INUM_T3 11#define INUM_T4 12#define INUM_P0INT 13#define INUM_UTX1 14#define INUM_P1INT 15#define INUM_RF 16#define INUM_WDT 17#define NBR_OF_INTERRUPTS 18// Macro used together with the INUM_* constants// to enable or disable certain interrupts.// Example usage:// INT_ENABLE(INUM_RFERR, INT_ON);// INT_ENABLE(INUM_URX0, INT_OFF);// INT_ENABLE(INUM_T1, INT_ON);// INT_ENABLE(INUM_T2, INT_OFF);#define INT_ENABLE(inum, on) \ do{ \ if (inum==INUM_RFERR) { RFERRIE = on; } \else if (inum==INUM_ADC) { ADCIE = on; } \else if (inum==INUM_URX0) { URX0IE = on; } \else if (inum==INUM_URX1) { URX1IE = on; } \else if (inum==INUM_ENC) { ENCIE = on; } \else if (inum==INUM_ST) { STIE = on; } \else if (inum==INUM_P2INT) { (on) ? (IEN2 |= 0x02) : (IEN2 &= ~0x02); } \else if (inum==INUM_UTX0) { (on) ? (IEN2 |= 0x04) : (IEN2 &= ~0x04); } \else if (inum==INUM_DMA) { DMAIE = on; } \ else if (inum==INUM_T1) { T1IE = on; } \else if (inum==INUM_T2) { T2IE = on; } \else if (inum==INUM_T3) { T3IE = on; } \else if (inum==INUM_T4) { T4IE = on; } \else if (inum==INUM_P0INT) { P0IE = on; } \else if (inum==INUM_UTX1) { (on) ? (IEN2 |= 0x08) : (IEN2 &= ~0x08); } \else if (inum==INUM_P1INT) { (on) ? (IEN2 |= 0x10) : (IEN2 &= ~0x10); } \else if (inum==INUM_RF) { (on) ? (IEN2 |= 0x01) : (IEN2 &= ~0x01); } \else if (inum==INUM_WDT) { (on) ? (IEN2 |= 0x20) : (IEN2 &= ~0x20); } \ } while (0)// Macro for setting interrupt group priority// Example usage:// INT_PRIORITY(RFERR_RF_DMA, 3);// 中断优先级设置#define INT_PRIORITY(group, pri) \ do { \ if (pri == 0) { IP0 &= ~group; IP1 &= ~group; } \if (pri == 1) { IP0 |= group; IP1 &= ~group; } \if (pri == 2) { IP0 &= ~group; IP1 |= group; } \if (pri == 3) { IP0 |= group; IP1 |= group; } \ } while (0)// Where pri is one of:// 0 = Level 0 (lowest priority)// 1 = Level 1// 2 = Level 2// 3 = Level 3 (highest priority)// Where group is one of#define RFERR_RF_DMA 0x01 // Group IP0#define ADC_P2INT_T1 0x02 // Group IP1#define URX0_UTX0_T2 0x04 // Group IP2#define URX1_UTX1_T3 0x08 // Group IP3#define ENC_P1INT_T4 0x10 // Group IP4#define ST_WDT_P0INT 0x20 // Group IP5// Macro used together with the INUM_* constants// to read the interrupt flags.// Example usage:// if (INT_GETFLAG(INUM_URX0))// ...// while (!INT_GETFLAG(INUM_URX0));#define INT_GETFLAG(inum) ( \ (inum==INUM_RFERR) ? RFERRIF : \(inum==INUM_ADC) ? ADCIF : \(inum==INUM_URX0) ? URX0IF : \(inum==INUM_URX1) ? URX1IF : \(inum==INUM_ENC) ? ENCIF_0 : \(inum==INUM_ST) ? STIF : \(inum==INUM_P2INT) ? P2IF : \(inum==INUM_UTX0) ? UTX0IF : \(inum==INUM_DMA) ? DMAIF : \(inum==INUM_T1) ? T1IF : \(inum==INUM_T2) ? T2IF : \(inum==INUM_T3) ? T3IF : \(inum==INUM_T4) ? T4IF : \(inum==INUM_P0INT) ? P0IF : \(inum==INUM_UTX1) ? UTX1IF : \(inum==INUM_P1INT) ? P1IF : \(inum==INUM_RF) ? S1CON &= ~0x03 : \(inum==INUM_WDT) ? WDTIF : \0 \)// Macro used to set or clear certain interrupt flags.// Example usage:// INT_SETFLAG(INUM_URX0, INT_SET);// INT_SETFLAG(INUM_T3, INT_CLR);// 清除中断标志#define INT_SETFLAG(inum, f) \ do{ \ if (inum==INUM_RFERR) { RFERRIF= f; } \ else if (inum==INUM_ADC) { ADCIF = f; } \else if (inum==INUM_URX0) { URX0IF = f; } \else if (inum==INUM_URX1) { URX1IF = f; } \else if (inum==INUM_ENC) { (f) ? (S0CON |= 0x03) : (S0CON &= ~0x03); } \else if (inum==INUM_ST) { STIF = f; } \else if (inum==INUM_P2INT) { P2IF = f; } \else if (inum==INUM_UTX0) { UTX0IF= f; } \ else if (inum==INUM_DMA) { DMAIF = f; } \ else if (inum==INUM_T1) { T1IF = f; } \else if (inum==INUM_T2) { T2IF = f; } \else if (inum==INUM_T3) { T3IF = f; } \else if (inum==INUM_T4) { T4IF = f; } \else if (inum==INUM_P0INT) { P0IF = f; } \else if (inum==INUM_UTX1) { UTX1IF= f; } \ else if (inum==INUM_P1INT) { P1IF = f; } \else if (inum==INUM_RF) { (f) ? (S1CON |= 0x03) : (S1CON &= ~0x03); } \else if (inum==INUM_WDT) { WDTIF = f; } \ } while (0)/****************************************************************************** ************************** DMA structures / macros ********************************************************************************************************The macros and structs in this section simplify setup and usage of DMA.******************************************************************************/#define DMA_CHANNEL_0 0x01#define DMA_CHANNEL_1 0x02#define DMA_CHANNEL_2 0x04#define DMA_CHANNEL_3 0x08#define DMA_CHANNEL_4 0x10#define VLEN_USE_LEN 0x00 // Use LEN for transfer count#define VLEN_FIXED 0x00 // Use LEN for transfer count#define VLEN_1_P_VALOFFIRST 0x01 // Transfer the first byte + the number of bytes indicated by the first byte#define VLEN_VALOFFIRST 0x02 // Transfer the number of bytes indicated by the first byte (starting with the first byte)#define VLEN_1_P_VALOFFIRST_P_1 0x03 // Transfer the first byte + the number of bytes indicated by the first byte + 1 more byte#define VLEN_1_P_VALOFFIRST_P_2 0x04 // Transfer the first byte + the number of bytes indicated by the first byte + 2 more bytes#define WORDSIZE_BYTE 0x00 // Transfer a byte at a time#define WORDSIZE_WORD 0x01 // Transfer a 16-bit word at a time#define TMODE_SINGLE 0x00 // Transfer a single byte/word after each DMA trigger #define TMODE_BLOCK 0x01 // Transfer block of data (length len) after each DMA trigger#define TMODE_SINGLE_REPEATED 0x02 // Transfer single byte/word (after len transfers, rearm DMA)#define TMODE_BLOCK_REPEATED 0x03 // Transfer block of data (after len transfers, rearm DMA)#define DMATRIG_NONE 0 // No trigger, setting DMAREQ.DMAREQx bit starts transfer#define DMATRIG_PREV 1 // DMA channel is triggered by completion of previous channel#define DMATRIG_T1_CH0 2 // Timer 1, compare, channel 0#define DMATRIG_T1_CH1 3 // Timer 1, compare, channel 1#define DMATRIG_T1_CH2 4 // Timer 1, compare, channel 2#define DMATRIG_T2_COMP 5 // Timer 2, compare#define DMATRIG_T2_OVFL 6 // Timer 2, overflow#define DMATRIG_T3_CH0 7 // Timer 3, compare, channel 0#define DMATRIG_T3_CH1 8 // Timer 3, compare, channel 1#define DMATRIG_T4_CH0 9 // Timer 4, compare, channel 0#define DMATRIG_T4_CH1 10 // Timer 4, compare, channel 1#define DMATRIG_ST 11 // Sleep Timer compare#define DMATRIG_IOC_0 12 // Port 0 I/O pin input transition#define DMATRIG_IOC_1 13 // Port 1 I/O pin input transition#define DMATRIG_URX0 14 // USART0 RX complete#define DMATRIG_UTX0 15 // USART0 TX complete#define DMATRIG_URX1 16 // USART1 RX complete#define DMATRIG_UTX1 17 // USART1 TX complete#define DMATRIG_FLASH 18 // Flash data write complete#define DMATRIG_RADIO 19 // RF packet byte received/transmit#define DMATRIG_ADC_CHALL 20 // ADC end of a conversion in a sequence, sample ready#define DMATRIG_ADC_CH0 21 // ADC end of conversion channel 0 in sequence, sample ready#define DMATRIG_ADC_CH1 22 // ADC end of conversion channel 1 in sequence, sample ready#define DMATRIG_ADC_CH2 23 // ADC end of conversion channel 2 in sequence, sample ready#define DMATRIG_ADC_CH3 24 // ADC end of conversion channel 3 in sequence, sample ready#define DMATRIG_ADC_CH4 25 // ADC end of conversion channel 4 in sequence, sample ready#define DMATRIG_ADC_CH5 26 // ADC end of conversion channel 5 in sequence, sample ready#define DMATRIG_ADC_CH6 27 // ADC end of conversion channel 6 in sequence, sample ready#define DMATRIG_ADC_CH7 28 // ADC end of conversion channel 7 in sequence, sample ready#define DMATRIG_ENC_DW 29 // AES encryption processor requests download input data#define DMATRIG_ENC_UP 30 // AES encryption processor requests upload output data#define SRCINC_0 0x00 // Increment source pointer by 0 bytes/words after each transfer#define SRCINC_1 0x01 // Increment source pointer by 1 bytes/words after each transfer#define SRCINC_2 0x02 // Increment source pointer by 2 bytes/words after each transfer#define SRCINC_M1 0x03 // Decrement source pointer by 1 bytes/words aftereach transfer#define DESTINC_0 0x00 // Increment destination pointer by 0 bytes/words after each transfer#define DESTINC_1 0x01 // Increment destination pointer by 1 bytes/words after each transfer#define DESTINC_2 0x02 // Increment destination pointer by 2 bytes/words after each transfer#define DESTINC_M1 0x03 // Decrement destination pointer by 1 bytes/words after each transfer#define IRQMASK_DISABLE 0x00 // Disable interrupt generation#define IRQMASK_ENABLE 0x01 // Enable interrupt generation upon DMA channel done#define M8_USE_8_BITS 0x00 // Use all 8 bits for transfer count#define M8_USE_7_BITS 0x01 // Use 7 LSB for transfer count#define PRI_LOW 0x00 // Low, CPU has priority#define PRI_GUARANTEED 0x01 // Guaranteed, DMA at least every second try#define PRI_HIGH 0x02 // High, DMA has priority#define PRI_ABSOLUTE 0x03 // Highest, DMA has priority. Reserved for DMA port access.#pragma bitfields=reversedtypedef struct {BYTE SRCADDRH;BYTE SRCADDRL;BYTE DESTADDRH;BYTE DESTADDRL;BYTE VLEN : 3;BYTE LENH : 5;BYTE LENL : 8;BYTE WORDSIZE : 1;BYTE TMODE : 2;BYTE TRIG : 5;BYTE SRCINC : 2;BYTE DESTINC : 2;BYTE IRQMASK : 1;BYTE M8 : 1;BYTE PRIORITY : 2;} DMA_DESC;#pragma bitfields=default#define DMA_SET_ADDR_DESC0(a) \do{ \DMA0CFGH = HIBYTE( a ); \DMA0CFGL = LOBYTE( a ); \} while(0)#define DMA_SET_ADDR_DESC1234(a) \do{ \DMA1CFGH = HIBYTE( a ); \DMA1CFGL = LOBYTE( a ); \} while(0)#define DMA_ARM_CHANNEL(ch) \DMAARM = ((0x01 << ch) & 0x1F);#define DMA_ABORT_CHANNEL(ch) DMAARM = (0x80 | ( BM( ch ) & 0x1F) ) #define DMA_MAN_TRIGGER(ch) DMAREQ = BM( ch )#define DMA_START_CHANNEL(ch) DMA_MAN_TRIGGER( ch )// Macro for quickly setting the destination address of a DMA structure#define SET_DMA_DEST(pDmaDesc, dest) \ do{ \pDmaDesc->DESTADDRH = HIBYTE( dest ); \pDmaDesc->DESTADDRL = LOBYTE( dest ); \} while (0);// Macro for quickly setting the source address of a DMA structure#define SET_DMA_SOURCE(pDmaDesc, source) \ do{ \pDmaDesc->SRCADDRH = HIBYTE( source ); \pDmaDesc->SRCADDRL = LOBYTE( source ); \ } while (0)// Macro for quickly setting the number of bytes to be transferred by the DMA. // Max lenght is 0x1FFF#define SET_DMA_LENGTH(pDmaDesc, length) \ do{ \pDmaDesc->LENH = HIBYTE( length ); \pDmaDesc->LENL = LOBYTE( length ); \} while (0)// Macro for getting the destination address of a DMA channel#define GET_DMA_DEST(pDmaDesc) \( (WORD)pDmaDesc->DESTADDRL | ( (WORD)pDmaDesc->DESTADDRH << 8 ))// Macro for getting the source address of a DMA channel#define GET_DMA_SOURCE(pDmaDesc) \( (WORD)pDmaDesc->SRCADDRL | ( (WORD)pDmaDesc->SRCADDRH << 8 ))/****************************************************************************** ******************* Common USART functions/macros ******************* *******************************************************************************The macros in this section are available for both SPI and UART operation.******************************************************************************/// Example usage:// USART0_FLUSH();#define USART_FLUSH(num) (U##num##UCR |= 0x80)#define USART0_FLUSH() USART_FLUSH(0)#define USART1_FLUSH() USART_FLUSH(1)// Example usage:// if (USART0_BUSY())// ...#define USART_BUSY(num) (U##num##CSR & 0x01)#define USART0_BUSY() USART_BUSY(0)#define USART1_BUSY() USART_BUSY(1)// Example usage:// while(!USART1_BYTE_RECEIVED())// ...#define USART_BYTE_RECEIVED(num) (U##num##CSR & 0x04)#define USART0_BYTE_RECEIVED() USART_BYTE_RECEIVED(0)#define USART1_BYTE_RECEIVED() USART_BYTE_RECEIVED(1)// Example usage:// if(USART1_BYTE_TRANSMITTED())// ...#define USART_BYTE_TRANSMITTED(num) (U##num##CSR & 0x02)#define USART0_BYTE_TRANSMITTED() USART_BYTE_TRANSMITTED(0)#define USART1_BYTE_TRANSMITTED() USART_BYTE_TRANSMITTED(1)/****************************************************************************** ******************* USART-UART specific functions/macros *************************************************************************************************/ // The macros in this section simplify UART operation.#define BAUD_E(baud, clkDivPow) ( \(baud==2400) ? 6 +clkDivPow : \(baud==4800) ? 7 +clkDivPow : \(baud==9600) ? 8 +clkDivPow : \(baud==14400) ? 8 +clkDivPow : \(baud==19200) ? 9 +clkDivPow : \(baud==28800) ? 9 +clkDivPow : \(baud==38400) ? 10 +clkDivPow : \(baud==57600) ? 10 +clkDivPow : \(baud==76800) ? 11 +clkDivPow : \(baud==115200) ? 11 +clkDivPow : \(baud==153600) ? 12 +clkDivPow : \(baud==230400) ? 12 +clkDivPow : \(baud==307200) ? 13 +clkDivPow : \0 )#define BAUD_M(baud) ( \(baud==2400) ? 59 : \(baud==4800) ? 59 : \(baud==9600) ? 59 : \(baud==14400) ? 216 : \(baud==19200) ? 59 : \(baud==28800) ? 216 : \(baud==38400) ? 59 : \(baud==57600) ? 216 : \(baud==76800) ? 59 : \(baud==115200) ? 216 : \(baud==153600) ? 59 : \(baud==230400) ? 216 : \(baud==307200) ? 59 : \0)// Macro for setting up a UART transfer channel. The macro sets the appropriate// pins for peripheral operation, sets the baudrate, and the desired options of// the selected uart. _uart_ indicates which uart to configure and must be// either 0 or 1. _baudRate_ must be one of 2400, 4800, 9600, 14400, 19200, // 28800, 38400, 57600, 76800, 115200, 153600, 230400 or 307200. Possible // options are defined below.//// Example usage://// UART_SETUP(0,115200,HIGH_STOP);//// This configures uart 0 for contact with "hyperTerminal", setting:// Baudrate: 115200// Data bits: 8// Parity: None// Stop bits: 1// Flow control: None//#define UART_SETUP(uart, baudRate, options) \do { \if ((options) & FLOW_CONTROL_ENABLE){ \if((uart) == 0){ /* USART0 */\if(PERCFG & 0x01){ /* Alt 2 */\P1SEL |= 0x3C; \} else { /* Alt 1 */\P0SEL |= 0x3C; \} \} \else { /* USART1 */\if(PERCFG & 0x02){ /* Alt 2 */\P1SEL |= 0xF0; \} else { /* Alt 1 */\P0SEL |= 0x3C; \} \} \} \else{ /* Flow Ctrl Dis*/\if((uart) == 0){ /* USART0 */\if(PERCFG & 0x01){ /* Alt 2 */\P1SEL |= 0x30; \} else { /* Alt 1 */\P0SEL |= 0x0C; \} \} \else { /* USART1 */\if(PERCFG & 0x02){ /* Alt 2 */\P1SEL |= 0xC0; \} else { /* Alt 1 */\P0SEL |= 0x30; \} \ } \ } \\ U##uart##GCR = BAUD_E((baudRate), CLKSPD); \U##uart##BAUD = BAUD_M(baudRate); \\ U##uart##CSR |= 0x80; \\ U##uart##UCR |= ((options) | 0x80); \\ if((options) & TRANSFER_MSB_FIRST){ \U##uart##GCR |= 0x20; \ } \ } while(0)// Options for UART_SETUP macro#define FLOW_CONTROL_ENABLE 0x40#define FLOW_CONTROL_DISABLE 0x00#define EVEN_PARITY 0x20#define ODD_PARITY 0x00#define NINE_BIT_TRANSFER 0x10#define EIGHT_BIT_TRANSFER 0x00#define PARITY_ENABLE 0x08#define PARITY_DISABLE 0x00#define TWO_STOP_BITS 0x04#define ONE_STOP_BITS 0x00#define HIGH_STOP 0x02#define LOW_STOP 0x00#define HIGH_START 0x01#define TRANSFER_MSB_FIRST 0x80#define TRANSFER_MSB_LAST 0x00// Example usage:// if(UART0_PARERR())// ...#define UART_PARERR(num) (U##num##CSR & 0x08) #define UART0_PARERR() UART_PARERR(0)#define UART1_PARERR() UART_PARERR(1)// Example usage:// if(UART1_FRAMEERR())// ...#define UART_FRAMEERR(num) (U ##num## CSR & 0x10)#define UART0_FRAMEERR() UART_FRAMEERR(0)#define UART1_FRAMEERR() UART_FRAMEERR(1)// Example usage:// char ch = 'A';// UART1_SEND(ch);// ...// UART1_RECEIVE(ch);#define UART_SEND(num, x) U##num##DBUF = x#define UART0_SEND(x) UART_SEND(0, x)#define UART1_SEND(x) UART_SEND(1, x)#define UART_RECEIVE(num, x) x = U##num##DBUF#define UART0_RECEIVE(x) UART_RECEIVE(0, x)#define UART1_RECEIVE(x) UART_RECEIVE(1, x)/****************************************************************************** ******************* USART-SPI specific functions/macros ************************************************************************************************** The macros in this section simplify SPI operation.******************************************************************************/// Macro for setting up an SPI connection. The macro configures the appropriate// pins for peripheral operation, sets the baudrate if the chip is configured// to be SPI master, and sets the desired clock polarity and phase. Whether to// transfer MSB or LSB first is also determined. _spi_ indicates whether// to use spi 0 or 1. _baudRate_ must be one of 2400, 4800, 9600, 14400, 19200,// 28800, 38400, 57600, 76800, 115200, 153600, 230400 or 307200.// Possible options are defined below.#define SPI_SETUP(spi, baudRate, options) \do { \U##spi##UCR = 0x80; \U##spi##CSR = 0x00; \\ if((options) & SPI_SLAVE){ /* Slave */\if(spi == 0){ /* USART0 */\if(PERCFG & 0x01){ /* Alt 2 */\P1SEL |= 0x3C; \} else { /* Alt 1 */\P0SEL |= 0x3C; \} \ } else { /* USART1 */\if(PERCFG & 0x02){ /* Alt 2 */\P1SEL |= 0xF0; \} else { \P0SEL |= 0x3C; /* Alt 1 */\} \ } \U##spi##CSR = 0x20; \ } \else { /* Master */\ if(spi == 0){ /* USART0 */\if(PERCFG & 0x01){ /* Alt 2 */\P1SEL |= 0x38; \P1SEL &= ~0x04; \} else { /* Alt 1 */\P0SEL |= 0x2C; \P0SEL &= ~0x10; \} \ } else { /* USART 1 */\if(PERCFG & 0x02){ /* Alt 2 */\P1SEL |= 0xE0; \P1SEL &= ~0x10; \} else { /* Alt 1 */\P0SEL |= 0x38; \P0SEL &= ~0x04; \} \ } \U##spi##GCR = BAUD_E(baudRate, CLKSPD); \U##spi##BAUD = BAUD_M(baudRate); \ } \U##spi##GCR |= ((options) & 0xE0); \ } while(0)// Options for the SPI_SETUP macro.#define SPI_SLAVE 0x01#define SPI_MASTER 0x00#define SPI_CLOCK_POL_LO 0x00#define SPI_CLOCK_POL_HI 0x80#define SPI_CLOCK_PHA_0 0x00#define SPI_CLOCK_PHA_1 0x40#define SPI_TRANSFER_MSB_FIRST 0x20#define SPI_TRANSFER_MSB_LAST 0x00/****************************************************************************** ******************* FLASH programming functions ******************* *******************************************************************************_halFlashWritePage(...)_ writes a whole flash page. Because code memory cannotbe read during flash write, the writing routines are copied to XDATA RAM. Thefunction is implemented in assembly code with file extensions .s51 rather than .cThe Direct Memory Access (DMA) may also be used for flash write.******************************************************************************///Macro for erasing a given flash page#define FLASH_ERASE_PAGE(page) \do{ \FADDRH = (page) << 1; \FCTL = 0x01; \asm("NOP"); \while(FCTL == 0x80); \}while (0)#define SET_FLASH_WRITE_TIME() \FWT = 0x2A >> CLKSPD;/****************************************************************************** * @fn halFlashDmaTrigger** @brief* This function gives the first FLASH DMA trigger.** Parameters:。
FortiOS 7.4 操作系统用户手册说明书
FortiOS Is the Foundation of the Fortinet Security FabricExecutive SummaryFortiOS, Fortinet’s operating system, is the foundation of the Fortinet SecurityFabric. The Security Fabric is the industry’s highest-performing and most expansivecybersecurity platform, organically built on a common management and securityframework. FortiOS ties all of the Fabric’s security and networking componentstogether to ensure seamless integration. This enables the convergence ofnetworking and security functions to deliver a consistent user experience andresilient security posture across all manner of environments. On-premises, cloud,hybrid, and converging IT/OT/IoT infrastructure are included.FortiOS 7.4 is packed with powerful new features that give IT leadersunprecedented visibility and enforcement across even the most complex hybridenvironments. Updates include:"FortiOS … improves operational efficiency and provides consistent security no matter where users or applications are distributed.”1SOLUTION BRIEF n Industry-first unified networking and security architecture for OT, IoT, and IT devicesn Industry-first unified management and analytics capabilities across Fortinet’s entire secure networking portfolio through FortiAnalyzern Greater automation and real-time response capabilities for SOC teams to protect against and reduce time to resolution for sophisticated attacks such as weaponized AI attacks, targeted ransomware, and criminal-sponsored APTsn Enhancements to reduce alert triage and incident investigation across early detection solutions including FortiEDR,FortiXDR, FortiRecon, and FortiDeceptorn New features to reduce risk across converging OT/IT/IoT environmentsFortiOS and the Fortinet Security Fabric Enable Broad, Integrated, and Automated SecurityFigure 1: The Fortinet Security FabricHaving one unifying operating system that spans the entire distributed Security Fabric ensures:n Consistent, centralized management and orchestration of security policy and configurationsn Broad reach and control across the expanded attack surface and at every step of the attack cyclen High-performance enforcement of context-aware security policyn Artificial intelligence (AI)-based threat detection and recommendationsn AI-based data correlation for analysis and reporting across a unified Fabric-level datasetn Automated, multipronged response in real time to cyberattacks across the attack surface and throughout the attack cyclen Improved threat response and reduced risk through enhanced security orchestration, automation, and response (SOAR) capabilitiesFortiOS 7.4 Delivers New CapabilitiesFortiOS uniquely empowers organizations to run their businesses without compromising performance, protection, or puttingthe brakes on innovation. A few of the key FortiOS 7.4 and Security Fabric enhancements designed to address today’s unique challenges are listed below.Secure networking and managementNew innovations to Fortinet’s Secure Networking Portfolio and FortiOS 7.4 span FortiManager, hybrid mesh firewall, Secure SD-WAN, single-vendor SASE, Universal zero-trust network access (ZTNA), and secure WLAN/LAN.Unified management and analytics across hybrid networksFortiManager provides IT leaders with unprecedented visibility and enforcement across all secure networking elements, including hybrid mesh firewall, single-vendor SASE, Universal ZTNA, Secure SD-WAN, and secure WLAN/LAN.Hybrid mesh firewall for data center and cloudFortiGate 7080F is a new series of next-generation firewalls (NGFWs) that eliminates point products, reduces complexity, and delivers higher performance through purpose-built ASIC technology and AI/ML-powered advanced security.FortiFlex is a points-based consumption program with support for hybrid mesh firewall deployments and a variety of products, such as virtual machines, FortiGate appliances, and SaaS-based services, among others.Secure SD-WAN for branch officesFortinet Secure SD-WAN enables consistent security and superior user experience for business-critical applications, whether in the cloud or on-premises, and supports a seamless transition to single-vendor SASE. New enhancements include automation in overlay orchestration to accelerate site deployments and a redesign of the monitoring map view to provide global WAN status for each.Single-vendor SASE for remote users and branch officesFortiSASE converges cloud-delivered security and networking to simplify operations across hybrid networks. FortiSASEnow integrates with FortiManager, allowing unified policy management for Secure SD-WAN and SASE along with unmatched visibility across on-premises and remote users.Universal ZTNA for remote users and campus locationsFortinet Universal ZTNA provides the industry’s most flexible zero-trust application access control no matter where the user or application is located. Universal ZTNA now delivers user-based risk scoring as part of our continuous checks for ongoing application access.“Via the power of the FortiOS operating system, FortiGate delivers one of the top secure SD-WAN solutions, includes a powerful LAN edge controller, enables the industry’s only Universal ZTNA application gateway, and facilitates the convergence of NOC and SOC.”2WLAN/LAN for branch offices and campus locationsFortiAP secure WLAN access points now integrate with FortiSASE, marking theindustry’s first AP integration with SASE. This enables secure micro-brancheswhere an AP is deployed to send traffic to a FortiSASE solution and ensurecomprehensive security of all devices at the site.Prevention, early detection, and real-time responseFortinet has added new real-time response and automation capabilities acrossthe Security Fabric to enable SOC teams to protect against and reduce time toresolution for sophisticated attacks such as weaponized AI attacks, targetedransomware, and criminal-sponsored APTs. New solutions and enhancementsacross five key areas include:Endpoint security and early responseFortiEDR and FortiXDR now provide additional interactive incident visualizationwith enriched contextual incident data using multiple threat intelligence feeds toenable customers to simplify and expedite investigations.FortiNDR Cloud combines robust artificial intelligence, complemented by pragmatic analysis and breach protectiontechnology. The solution provides 365-day retention and visibility into network data, built-in playbooks, and threat hunting capabilities to detect anomalous and malicious behavior on the network. Choose from a self-contained, on-premisesdeployment powered by the Fortinet Virtual Security Analyst, or a new guided SaaS offering maintained by advanced threat experts from FortiGuard Labs.FortiRecon , supported by threat experts from FortiGuard Labs, now delivers enhanced proactive threat intelligence into critical risks associated with supply chain vendors and partners, including external exposed assets, leaked data, and ransomware attack intelligence.FortiDeceptor now offers vulnerability outbreak defense. When a vulnerability is reported by FortiGuard Labs, it is automatically pushed as a feed to the outbreak decoy to redirect attackers to fake assets and quarantine the attack early in the kill chain.Further, a SOAR playbook can automatically initiate the creation of and strategically place deception assets to gather granular intel and stop suspicious activities. FortiDeceptor also now offers a new attack exchange program that allows FortiDeceptor users to anonymously exchange valuable intel on the most current attacks and take proactive steps to avoid a breach.SOC automation and augmentationFortiAnalyzer enables more sophisticated event correlation across different types of log sources using a new intuitive rules editor that can be mapped to MITRE ATT&CK use cases.FortiSOAR now offers a turnkey SaaS subscription option, inline playbook recommendations driven by machine learning, extensive OT security features and playbooks, and unique no/low-code playbook creation enhancements.FortiSIEM now includes new link graph technology that allows for easy visualization of relationships between users, devices, and incidents. The solution is also now powered by an advanced machine learning framework, which enhances protection by detecting anomalies and outliers that may be missed by traditional methods.FortiGuard SOC-as-a-Service now offers AI-assisted incident triage as well as new SOC operations readiness andcompromise assessment services from FortiGuard Labs.AI-powered threat intelligenceFortiGuard Industrial Security Service significantly reduces time to protection with enhanced automated virtual patching for both OT and IT devices based on global threat intelligence, zero-day research, and Common Vulnerabilities and Exposures (CVE) query service.FortiGuard IoT Service enhances granular OT security at the industry level with Industrial-Internet-of-Things (IIoT) and Internet-of-Medical-Things (IoMT) device convergence.FortiSIEM unified security analytics dashboards now incorporate mapping of industrial devices and communication paths to the Purdue model hierarchy, include new OT-specific playbooks for threat remediation, and use of the ICS MITRE ATT&CK matrix for OT threat analysis.Identity and accessFortiPAM privileged account management provides remote access for IT and OT networks. It now includes ZTNAcontrols when users try to access critical assets. The ZTNA tags can be applied to check device posture continuously for vulnerabilities, updated AV signatures, location, and machine groups.Application securityFortiDevSec provides comprehensive application security testing for application code and runtime applications. The solution incorporates SAST, DAST, and SCA, for early vulnerability and misconfigurations detection, and protection including secret discovery. Risk reduction for cyber-physical and industrial control systemsFortinet’s portfolio of solutions and our Security Fabric for OT are designed specifically for cyber-physical security. New enhancements include:FortiGate 70F Rugged Next-Generation Firewall (NGFW) is the latest addition to Fortinet’s rugged portfolio designed for harsh environments. It features a new compact design with converged networking and security capabilities on a single processor. FortiDeceptor Rugged 100G is now available as an industrially hardened rugged appliance, ideal for harsh industrial environments. FortiPAM offers enterprise-grade privileged access management for both IT and OT ecosystems.FortiSIEM unified security analytics dashboards now include event correlation and mapping of security events to the Purdue model. FortiSOAR now offers features to reduce alert fatigue and enable security automation and orchestration across IT andOT environments.FortiGuard Industrial Security Service now includes more than 2,000 application control signatures for OT applications and protocols that support deep packet inspection.Fortinet Cyber Threat Assessment Program (CTAP) for OT validates OT network security effectiveness, application flows, and includes expert guidance.OT tabletop exercises for OT security teams are led by FortiGuard Incident Response team facilitators with expertise in threat analysis, mitigation, and incident response.FortiOS and the Fortinet Security Fabric Address Current and Emerging Security Challenges FortiOS 7.4 provides features and enhancements to support today’s fast-changing hybrid networking and security needs. FortiOS is continually updated to ensure organizations stay ahead of today’s ever-evolving threat landscape. With an expansive Fortinet Security Fabric solution in place, organizations of any size can be assured that they have the tools they need to address all their security and networking challenges, no matter how broadly their users and networks are distributed, today and in the future.1 “Ken Xie Q&A: Growth, Differentiators, and FortiSP5,” Fortinet, February 13, 2023.2 John Maddison, “Setting the Record Straight on Competitor Misinformation,” Fortinet, November 11, 2022. Copyright © 2023 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiCare and FortiGuard, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise。
Parrot MKi9000 用户指南说明书
Parrot MKi9000User guideContentsContents (2)Installation (3)Before you begin (3)Checking the car configuration (3)Caution (3)Removing the car stereo (3)Installing the kit (4)Car stereo with ISO connectors (4)Car stereo with line-in (5)Installing the electronic box (5)Installing the kit’s power cable (6)Installing the audio connectors (6)Installing the individual components (7)Installing the double microphone (7)Installing the remote control (8)Getting started (10)Navigating through the menus (10)Associating the remote control to the electronic box (10)Commands (11)Establishing a Bluetooth connection with a phone (12)Using a phone with the Parrot MKi9000 for the first time (12)Using the Parrot MKi9000 with 2 phones (12)Dual mode allows you to simultaneously connect two phones to the Parrot MKi9000. (12)Managing the “Memory full” problem (13)Synchronizing the phonebook (14)Phone (15)Making and receiving calls (15)Making a call (15)Receiving a call (15)Using the Parrot MKi9000 while on a call (16)Using voice recognition (18)Receiving a call via voice recognition (18)Making a call via voice recognition (18)Music (20)Using the Parrot MKi9000 with an external source (20)Using the Parrot MKi9000 with an iPod / iPhone (20)Using the Parrot MKi9000 with a USB peripheral (21)Using the Parrot MKi9000 with an audio player connected via Bluetooth (21)Using the Parrot MKi9000 with an analogue audio player (21)Commands (22)Settings (23)Using the Virtual Super Bass effect (23)Deactivating the Mute on Streaming (23)InstallationBefore you beginChecking the car configuration∙The cables supplied with the kit feature ISO connectors and two pairs of line-out jacks. The line-out jacks can be used if your audio system features this option (use of an amplifier). Several set-ups aretherefore possible depending on the type of car stereo and your vehicle.∙If your car stereo is not fitted with ISO connectors, you need to purchase an ISO adapter cable to simplify the wiring procedure. Refer to the range of ISO adapters on our website.Caution∙Unplug the battery before installing the kit’s power cable.∙Before you install the individual components, check that the installation locations have been selected in such a way that the cable length is sufficient to connect every element.∙Do not install any component (remote control, microphone…) in the airbag deployment area.∙Once the installation is complete, make sure that no cables are pinched or trapped.Removing the car stereo∙Remove your car stereo from you vehicle. You may need release keys to do so.► Refer to your car stereo user guide or contact your car dealer for more information.∙Remove the audio system from your vehicles dashboard to access the wiring harness.∙The mute function is used to cut the sound of your car stereo to enable a phone call. The choice of the mute-in jack depends on your car stereo’s configuration.Installing the kitCar stereo with ISO connectors1.Connect the male connectors of the hands-free kit to the car stereo.2.Join the vehicle’s audio and power supply cables to the female connectors of the Parrot MKi9000.3.On the installation cable, connect the free yellow wir e to one of the audio system’s correspondingmute-in jacks if available (mute in 1, mute in 2 or mute in 3).Car stereo with line-in∙Use this type of connection by wiring the line-out (brown & white wire or red & black wire) to your car stereo’s line-in.∙Using the two pairs of line-out will enable you to take advantage of the music function in stereo over your veh icle’s speakers.∙On the installation cable, connect the free yellow wire to the corresponding audio system’s mute-input if available (mute in 1, mute in 2 or mute in 3).Installing the electronic box∙Avoid installing the electronic box near heating or air-conditioning system, on a spot directly exposed to sunlight or behind metal walls.∙Make sure the electronic box stays fixed once it is installed and that it will not move while you are driving.∙Do not reinstall the car stereo forcibly. If you are short of space behind the car stereo to install the electronic box, consider installing it in the glove box.Install ing the kit’s power cable∙Refer to your car stereo’s wiring diagram.∙The red wire of the kit’s cable must correspond to the constant +12V supply, the orange wire to the ignition +12V and the black wire to ground. Check that the orange wire is not connected to theconstant +12V supply, as you could run down the vehicle’s battery.Installing the audio connectorsInstalling the music cable Connect the music cable to the electronic box and place the USB / iPod / Jack connectors into the glove box, the central console or the parcel tray depending on the configuration of your dashboard. Make sure that the cable is not pinched.Installing the music cable grommet system The music cable grommet system allows you to adjust the cable lengthwhile reducing its wear.1.Drill a 20 mm hole in your dashboard (glove compartment or parcel tray).2.Insert manually two flexible arms of the grommet system.e a flat screwdriver in order to insert the last two arms.> You can now connect your music cable to the bluebox.Installing the individual componentsInstalling the double microphoneSelecting a location In order to get hi-quality conversations, we advise you to respect the followingrecommendations:∙Make sure the microphone is installed as close to the mouth of the user as possible.The ideal distance is 60 cm. The best possible location for the microphone is nearthe rear-view mirror.∙The microphone needs to be pointed towards the user.D < 60 cmα < 45°∙Make sure the microphone is not exposed to the air stream from air vents.∙Do not install the microphone cable in heating, ventilation or air conditioning systems.Mounting the double microphone ∙The mounting location for the microphone must be clean and free from grease or dust. Prior to installation, clean the area with an appropriate cleansing product.∙Once you have stuck the support on the dashboard, wait for approximately 2 hours to make sure the adhesive tape adheres well.Installing the remote controlInstalling the remote control on the steering wheel If you want to place the remote control on the steering wheel, make sure it is securely attached, so that it does not move when you are driving.Installing the remote control on the dashboardIf you want to place the remote control on the dashboard, stick the double-sided tape located on the flat side of the bracket to fix it against the dashboard. You can then insert the remote onto the bracket.Replacing the battery∙ The remote control only works with a 3V CR2032 battery.∙ Make sure the battery is correctly positioned before inserting it into the remote control.Getting startedNavigating through the menusAssociating the remote control to the electronic boxIf the remote control doesn’t seem to be associated to the electronic box while using the Parrot MKi9000:After verifying the CR2032 battery is properly inserted inthe remote unit, press and hold the and buttonsthen press the button several times. This has to be doneduring a 30 seconds period once the ignition is turned on.Within 1 to 2 seconds, you should then hear a voicemessage saying “Remote control pairing successful”. Atthat time, you can release the buttons and the remoteshould then be paired with the kit and the message will goaway. Youcan verify remote operation by navigatingthrough the menus.CommandsAccessing the main menu Press the central jog wheel to access the menus. > The kit says the name of the current menu.Browsing through themenus∙Turn the jog wheel to browse through the menus.∙Press the button or the jog wheel to confirm.∙Press the button to get back to the previous menu.Establishing a Bluetooth connection with a phoneUsing a phone with the Parrot MKi9000 for the first timePairing a phone 1.From your phone, search for Bluetooth® peripherals.2.Select «MKi9000» in the list.3.Enter «0000» on your phone when prompted.> The Parrot MKi9000 says «Pairing successful».Automatic connection Once your phone is paired to the Parrot MKi9000, the connection between both devices will be automatically established each time you enter your vehicle.Using the Parrot MKi9000 with 2 phonesDual mode allows you to simultaneously connect two phones to the Parrot MKi9000.Activating dual mode To activate dual mode and connect two phones, select Dual mode.Connecting two phones to the Parrot MKi9000 When the Parrot MKi9000 is switched on, it attempts to connect all paired phones in the vehicle. If there are more than two paired phones in the vehicle, the device connects the two phones with the oldest pairing.Main and secondary phones ∙When two phones are connected to the Parrot MKi9000, one of them becomes the main phone and the other is the secondary phone.∙By default, the main phone is the one with the oldest pairing to the Parrot MKi9000.∙To define the secondary phone as your main phone (and make your main phonethe new secondary phone), press and hold for two seconds.Making and receiving calls ∙You can receive calls (manually or through voice recognition) to your main or secondary phones. The Parrot MKi9000 ringtone varies according to the phone receiving the call.∙Only the phonebook for your main phone may be accessed through the ParrotMKi9000. You can only make calls using your main phone. However, you caneasily switch between the connected phones by pressing and holding for twoseconds.∙If you receive a call to one of your phones while you are on the other phone,only the latter will ring. You can take the call directly on that phone but not viathe Parrot MKi9000.Managing the “Memory full” problemYou can pair up to 10 devices with the Parrot MKi9000.If you attempt to pair a 11th phone, the Parrot MKi9000 says “Memory full”. To pair a new phone, you mustclear the memory by holding down simultaneously the and button for 3 seconds. Doing so will also delete all your contacts.Synchronizing the phonebookAutomatic synchronisation With most of the Bluetooth phones, the phonebook is automatically synchronized in the kit’s memory. Refer to the compatibility section of our website for more information.Sending contacts via Object Push If your phone doesn’t support automatic synchronization, you can also send contacts from your mobile to the car kit via Object Push. To do so:1.Press the jog wheel and select Settings > Receive contacts.2.Refer to your phones ‘user guide for more information about sending contactsvia Object Push.PhoneBefore using your Parrot MKi9000 telephone function, you first have to connect it with your phone.► For more information,refer to the Establishing a Bluetooth connection with a phone section.Making and receiving callsMaking a callCalling a contact in the phonebook If the contact you want to call is in the phonebook of the phoneconnected to the Parrot MKi9000:1.Press the jog wheel to enter the main menu and select Phonebook.2.Select a letter and press the jog wheel.> Once the contact chosen:- Press the button to call this contact.- Or use the jog wheel to choose between different numbersof the same contact.Bringing up the last dialled number Hold down the key of the Parrot MKi9000 for two seconds to redial the last dialled number.Receiving a callAn incoming call is indicated by a ringtone. The name of the caller is announced if his details are stored in the phonebook of the phone connected to the Parrot MKi9000.Answering a call Press the button to answer an incoming call.Declining a call Press the button to decline an incoming call.Using the Parrot MKi9000 while on a callAdjusting the volume Use the jog wheel during a call to adjust the communication volume. > The volume setting is saved for subsequent calls.Transfering a call to thephone∙ During a call, if you want to continue the conversation on your phone (private conversation), press the button of the Parrot MKi9000. > The call is automatically transferred to the phone.∙ If you want to switch back to the kit, press the button again.Muting a call∙If you want to deactivate the microphone during a call, press the button : you will still hear your caller but your caller will not be able to hear you.∙Press the button to reactivate it again.Managing a second callDuring a call, you can receive another call if your phone supports thisfunctionality.∙Press the button to accept the second incoming call. > The first call is automatically put on hold.∙Press the button to decline the second incoming call. You can also hang up directly from your phone.∙Press the button to switch from a call to another.Managing voice mail During a call, the Parrot MKi9000 allows you to send DTMFs to manageyour voice mail for example. To do so:1.Press the jog wheel to access the DTMF menu.> « 0 » is said by the kit.e the jog wheel to select your DTMF between the followingpossibilities : 0,1,2,3,4,5,6,7,8,9,# or *.3.Press the jog wheel to send this DTMF to your phone.Ending a call Press the button to end a call.Using voice recognitionReceiving a call via voice recognitionTo receive a call via voice recognition, magic words must be activated.Activating / deactivatingthe magic words1.Press the jog wheel and select Settings > Magic words.2.Press the jog wheel to activate/deactivate the magic words. Accepting a call Say « Accept » to answer an incoming call.Declining a call Say « Reject » to decline an incoming call.Making a call via voice recognitionCalling a contact with one phone number 1.Press the button to launch the voice recognition feature.> The Parrot MKi9000 asks you the name of the contact you want to call.2.Say the name of the contact.> The call is automatically launched if the voice tag is correctlyunderstood.> If it is not the case, a confirmation message is asked.3. Confirm if necessary by saying “Yes” or “call”.Calling a contact with several phone numbers ∙If there are several phone numbers associated to the contact you want to call, you can specify the type of number.∙To do so, the following vocal commands are available:-Home-At home-Work-At work-Office-At office-At the office-Mobile-Cellular-Cell-On mobile-On cellular-On cell-On mobile phone-On cellular phone-On cell phone-Mobile phone-Cellular phone-Cell phone-Other-General-Default-PreferredExiting voice recognition modePress the button to exit voice recognition mode.Music Using the Parrot MKi9000 with an external sourceUsing the Parrot MKi9000 with an iPod / iPhoneCompatibility ∙If you are using the Parrot MKi9000 with the iPod Mini, iPod Photo,iPod 3G and iPod Shuffle, then connect your iPod to the ParrotMKi9000 using the Jack cable.∙Use the iPod connector if you are using another model of iPod or aniPhone.Playing music files ∙If your iPod / iPhone is connected to the Parrot MKi9000 via the iPodconnector, press the jog wheel and select iPod.∙If your iPod is connected to the Parrot MKi9000 via the jack cable,refer to the Using the Parrot MKi9000 with an analogue playersection.Using the Parrot MKi9000 with a USB peripheral1.Connect the USB flash drive or the MP3 player using the USB cable.2.Press the jog wheel and select USB.Using the Parrot MKi9000 with an audio player connected via BluetoothCompatibility You can use the Parrot MKi9000 to listen to songs stored on your mobile phone/ PDA / smartphone. Your mobile phone must support the Bluetooth® A2DPprofile (Advanced Audio Distribution Profile).Playing a music file ∙If you are using a Bluetooth audio player for the 1st time, you have topair both devices.►Refer to the Pairing a phone section.∙If both devices are already paired :1.Select Audio Bluetooth.2.Start playing a song on your audio player.Using the Parrot MKi9000 with an analogue audio player1.Connect your audio player to the Parrot MKi9000 using the Jack connector.2.Press the jog wheel and select Line In.3.Start playing a song on your audio player.CommandsTo do so Proceed this wayPause a songPress the button.Resume playbackPress the button.Raise or lower the volume Turn the jog wheel.Rewind or fast-forwardHold down the or buttons.Restart a songPress the button.Skip to the next songPress the button.Skip to the previous songPress the button twice.Activate the Virtual Super Bass effectHold down the button for 2 seconds.SettingsUsing the Virtual Super Bass effectThe Virtual Super Bass effect allows you to amplify the low frequencies. To activate or deactivate it:1.Press the jog wheel and select Settings > Virtual Super Bass.2.Press the jog wheel to activate or deactivate this option.Deactivating the Mute on Streaming∙This option automatically mutes the tuner when a song is played. This option is activated by default.∙You can deactivate this option and mute the tuner manually via the Mute cable. To do so, hold downthe and buttons simultaneously to activate / deactivate this option.。
IBM Cognos Transformer V11.0 用户指南说明书
华为USG6620 6630下一代防火墙产品介绍说明书
Huawei USG6620/6630 next-generation firewalls are designed for network egresses of medium-sized businesses or branch offices of large enterprises. The firewalls accurately identify more than 6,000 applications and implement fine-grained access control. Application-layer defense functions, such as Intrusion Prevention System (IPS) and antivirus, are used with application identification technologies to improve the threat prevention efficiency and accuracy, providing users with full-fledged network border protection capabilities. The firewalls use the industry-leading Smart Policy technology to automatically fine-tune and simplify existing security policies, reducing the overall operational costs and delivering continuous, simple, and effective next-generation network security.HighlightsThird-party proven security capability• Obtained Firewall, IPS, IPsec, and SSL VPN certifications from the ICSA Labs• Obtained the highest-level CC certificate (EAL4+), ranking among the highest security levels in the world Comprehensive and integrated protection• Multiple security functions, including firewall, VPN, intrusion prevention, and online behaviormanagement, for complete versatility• Accurately identify more than 6000 applications to deliver fine-grained access control and improve thequality of key services• Detection and prevention of unknown threats, such as zero-day attacks, using sandboxing and the reputation system*Flexible bandwidth management, improving Internet access experience•Differentiated user bandwidth and quota management for fair and prioritized bandwidth usage • Application-based bandwidth management to prioritize bandwidth for mission-critical applications • Modification of URL category priorityHUAWEI USG6620/6630 Next-Generation Firewalls---Best-in-Class Security for Medium-sized BusinessesVisualized management and operation• Deliver diversified reports to provide all-around visibility into service status, network environment, security posture, and user behavior• Provide a web UI that offers a variety of easy-to-use and visualized management and maintenance functions, with which you can easily view logs and reports, manage configurations, and diagnose faults.The quick wizard on the web UI helps you configure important features with ease• Support both NETCONF and RESTCONF northbound APIs, which enable you to centrally configure and maintain the firewalls using an upper-level controller to simplify O&MDeploymentBorder protection for medium-sized businesses• Block all unauthorized access attempts at enterprise network egresses.• Provide real-time 10-Gigabit-level application-layer threat prevention, even when IPS is enabled.• P erform data filtering and auditing on files transmitted through sources such as email and IM to monitor social network applications and prevent data leaks.• D eliver user- and application-specific bandwidth management to guarantee service quality for core users and of mission-critical services.• S upport online behavior management based on URL categories and applications to block access to malicious websites and websites irrelevant to work.Enterprise networkHardwareUSG6620/6630Interfaces1. 2 x USB Ports2. Console Port3. 1 x GE (RJ45) Management Port4. 8 x GE (RJ45) Ports5. 4 x GE (SFP) PortsTable 1. Wide Service Interface Cards (WSICs) for USG6600 SeriesSoftware Features1: I f no hard disk is inserted, you can view and export system and service logs. By inserting a hard disk, you can also view, export, customize, and subscribe to reports.Functions marked with * are supported only in USG V500R001 and later versions.Specifications *System Performance and Capacity1. P erformance is tested under ideal conditions based on RFC 2544 and RFC 3511. The actual result may vary with deployment environments.2. Antivirus, IPS, and SA performances are measured using 100 KB of HTTP files.3. Throughput is measured with the Enterprise Traffic Model.4. SSL inspection throughput is measured with IPS-enabled and HTTPS traffic using TLS v1.2 with AES256-SHA.5. SSL VPN throughput is measured using TLS v1.2 with AES128-SHA.6. USG6000 V100R001 supports only the RESTCONF interface and cannot interwork with sandbox or third-party tools.* SA indicates Service Awareness.* This content is applicable only to regions outside mainland China. Huawei reserves the right to interpret this content. Hardware Specifications1. WISC is not hot-swappable.2. the equipment is operating in an ambient temperature equal to +23°C and fan speed 50%CertificationsRegulatory, Safety, and EMC ComplianceOrdering GuideAbout This PublicationThis publication is for reference only and does not constitute any commitments or guarantees. All trademarks, pictures, logos, and brands mentioned in this document are the property of Huawei Technologies Co., Ltd. or a third party.For more information, visit /en/products/enterprise-networking/security.Copyright©2018 Huawei Technologies Co., Ltd. All rights reserved.。
写提意见的英语小作文
写提意见的英语小作文英文回答:In order to allow teachers to concentrate on engaging students and fostering academic achievement, it isessential to reduce their administrative burden. By implementing efficient administrative processes, leveraging technology, and providing ongoing support, we can create a more streamlined and efficient work environment for educators.Streamlining administrative processes can significantly reduce the time teachers spend on non-teaching tasks. This can be achieved by automating repetitive tasks, such as grading assignments and calculating attendance, using digital tools. Additionally, consolidating multiple systems into a single platform can simplify access to essential information and reduce the need for manual data entry.Technology can play a transformative role in reducingthe administrative burden for teachers. Digital tools can facilitate communication and collaboration, allowing teachers to share resources, ask questions, and provide feedback to students and parents. Online platforms can also be used to track student progress, manage assignments, and provide personalized learning experiences.Providing ongoing support to teachers is crucial to ensuring their success and reducing their administrative burden. This can involve offering professional development opportunities, such as training on new technologies or strategies for managing administrative tasks. Additionally, providing access to technical support and having a dedicated staff member to assist with administrative tasks can alleviate the burden for teachers.By implementing these strategies, we can create a more supportive and efficient work environment for teachers, allowing them to focus on what they do best: inspiring and educating students.中文回答:为了让老师们专注于吸引学生和促进学术成就,减轻他们的行政负担至关重要。
solidworks孔标注文件简化修改说明 -回复
solidworks孔标注文件简化修改说明-回复“How to Simplify and Modify Solidworks Hole Annotation Files”is the main theme of this article. In this article, we will provide a step-by-step guide on how to simplify and modify Solidworks hole annotation files, focusing on the content within the square brackets, and it will be a 1500-2000-word article. Let's begin.Solidworks is a popular 3D modeling software used in various industries for designing and engineering purposes. It offers a wide range of tools and features to enhance the design and manufacturing process. One of the key features of Solidworks is the ability to annotate holes in a 3D model, providing vital information for manufacturing and assembly processes.However, sometimes the default hole annotation files in Solidworks can be complex or may not fit the specific requirements of a project. In such cases, it becomes necessary to simplify and modify these files to suit the design needs. Let's explore the step-by-step process of simplifying and modifying Solidworks hole annotation files.Step 1: Identify the Hole Annotation FileThe first step is to identify the hole annotation file that needs modifications. In Solidworks, hole annotations are typically created using the Hole Wizard tool. These annotations are represented by feature control frames (FCF) that contain various dimensions and symbols. Once the file is identified, it can be accessed and modified using Solidworks' annotation editing features.Step 2: Assess the RequirementsBefore making any modifications, it is essential to assess the specific requirements for the hole annotation file. This includes evaluating the dimensions, symbols, and other annotations needed for the design or manufacturing process. Collect all the necessary information and references that will be required during the modification process.Step 3: Access the Annotation PropertiesTo simplify and modify the hole annotation file, it is necessary to access the annotation properties in Solidworks. Right-click on the hole annotation and select "Properties" from the context menu.This will open the Annotation Properties dialog box, allowing you to make changes to the annotation's dimensions, tolerances, and other attributes.Step 4: Modify the DimensionsIn the Annotation Properties dialog box, navigate to the "Dimensions" tab. Here, you can modify the dimensions of the hole annotation according to the specific requirements of the project. You can change the dimension values, units, precision, and other parameters as needed. Ensure that the modifications adhere to the design standards and tolerances.Step 5: Customize Symbols and TextsApart from dimensions, hole annotations often include symbols and texts for additional information. You can customize these symbols and texts in the Annotation Properties dialog box. Navigate to the "Symbols" and "Text" tabs to modify or add symbols and texts in accordance with the project requirements. Make sure that the symbols and texts provide clear and concise information to the manufacturing and assembly process.Step 6: Save and Apply ModificationsOnce you have made the necessary modifications to the hole annotation file, click on the "Apply" button in the Annotation Properties dialog box. This will apply the changes to the annotation and update it accordingly. To save the modified hole annotation file, click on the "Save" button or choose the "Save As" option to create a new file. Ensure that the modifications are saved in the appropriate location to avoid any confusion or loss of data.Step 7: Review and ValidateAfter saving the modified hole annotation file, it is essential to review and validate the changes. Inspect the hole annotation in the 3D model to ensure that all the modifications have been implemented correctly. Verify that the dimensions, symbols, and texts are accurate and meet the project requirements. If any further modifications are needed, repeat the steps mentioned earlier.In conclusion, simplifying and modifying Solidworks hole annotation files is a straightforward process that requires carefulassessment and customization. By following the step-by-step guide provided in this article, you can adapt the default hole annotation files to align with the specific requirements of your project. Streamlining the hole annotation files will enhance the clarity and accuracy of the design and manufacturing process, ultimately leading to better product quality and improved efficiency.。
科技是否让人们越来越懒英语作文
科技是否让人们越来越懒英语作文In the age of technology, people are becoming more reliant on digital devices to simplify their daily tasks. From ordering groceries online to using voice assistants to set reminders, technology has undoubtedly made life more convenient. However, some argue that this convenience has led to a decrease in physical activity and productivity, ultimately making people lazier.One of the most common arguments against technology making people lazier is the rise of sedentary lifestyles. With the advent of smartphones, tablets, and computers, people are spending more time sitting and staring at screens than ever before. This sedentary behavior has been linked to a host of health issues, including obesity, heart disease, and poor mental health. Additionally, the convenience of modern technology has made people less inclined to engage in physical activities such as walking or cycling, further contributing to a decline in overall fitness levels.Furthermore, the ease of access to information and services through technology has led to a decline in critical thinking and problem-solving skills. With search engines readily available at our fingertips, many people no longer feel the need to engage indeep thinking or research to find answers. This has the potential to hinder cognitive development and creativity, as individuals become more dependent on technology to provide solutions for them.In addition to physical and mental health concerns, technology has also been blamed for decreasing productivity in the workplace. With the rise of automation and AI, many routine tasks that once required human input can now be handled by machines. While this can streamline processes and increase efficiency, it also means that people are becoming less engaged in their work and less motivated to strive for excellence.Despite these concerns, it is important to note that technology has also brought about many benefits to society. From improving healthcare outcomes to increasing communication and connectivity, technology has revolutionized the way we live and work. It is up to individuals to strike a balance between using technology to enhance their lives and ensuring that it does not lead to laziness or complacency.In conclusion, while technology has undoubtedly made people's lives more convenient, it is essential to be mindful of the potential negative impacts it can have on physical activity, critical thinking, and productivity. By being intentional abouthow we use technology and incorporating healthy habits into our daily routines, we can mitigate the effects of laziness that may arise from excessive reliance on digital devices. Ultimately, technology should be seen as a tool to enhance our lives, rather than a crutch that enables laziness.。
MagTek 小型文件扫描仪产品介绍说明书
For check processing speed and reliability……MagTek delivers the solutions you need.Retailers and financial institutions rely on MagTek. Millions of check transactions every day are processed with MagTek check readers and scanners. For some of the industry’s biggest retailers and financial institutions to the smallest businesses, MagTek check readers and scanners deliver flexibility, accuracy and value. With solutions for both auto- and single-feed operation and advanced features including integrated, secure card reader authenticators and color scanning, MagTek check readers and scanners fit the needs of a wide range of check transaction applications. For check processing that’s easy and secure, put your trust in MagTek.2Small Document ScannersExcella™A 45+ document per minute (DPM), multifeed check reader and scanner with a capacity of up to 70 documents in its hopper.ImageSafeA multi-purpose, compact check reader and dual-sided scanner with an integrated MagneSafe™ secure card reader authenticator.Mini MICRA small, single-feed MICR reader ideal for applications where fast and accurate MICR reading is required.3Excella™ STXFull-featured, single-feed check reader and scanner with an integrated MagneSafe™ secure card reader authenticatorMICRSafeOptimized to reduce transaction time and manual entry errors, the MICRSafe is a single-feed MICR reader built for reliability and security with its integrated MagneSafe™ secure card reader authenticator.MICRImage™An easy-to-use, single-sided small document scanner featuring a sleek, small-footprint design.Conventional ProductsExcella™Excella is the ideal desktop check reading device for early-image capture in high-volume electronic check applications, including BOC, Check 21 and remote deposit capture. With a small footprint and striking modern design, Excella is an auto-feed check reader which captures both the front and back image of checks in a single pass at 45+ DPM. The automatic feeder has a capacity of up to 70 documents to easily support even the most active check processing applications.BenefitsWhen high performance check processing is an integral part of your application, Excella delivers both the speed and efficiency you need. The Excella reads both E13B and CMC7 MICR fonts and features a programmable endorsement message. Excella captures check images at a 200 dpi resolution and offers CCITT G4 or JPEG image compression to optimize your applications’ storage use. The easy-maintenance, high-speed unit is API and protocol compatible with MagTek’s Excella STX single-feed scanner for optimum application flexibility. Features• Reads E13B and CMC7 MICR fonts• Captures front and back image of checks in a single pass• Single line programmable printer for rear side endorsement printing• Black/white and grayscale images are standard• Image resolution: 200 dpi (scaling to 100 dpi)• Image compression: CCITT G4 or JPEG• Image files: TIFF 6.0 (other formats can be made available)• 45+ DPM automatic feeder with capacity for up to 70 documents and alternate input tray to feed single checks • USB 2.0 (USB 1.1 compatible) and Ethernet 100Base-T • Easy access to check path and scan bars for maintenance and cleaning• API and protocol compatible with MagTek’s Excella STX (single-feed, dual-side scanner)4to-Feed.st.ficient.5ImageSafeThe multi-purpose ImageSafe is a compact check reader and dual-sided scanner that offers a cost-effective alternative to implement PC-based electronic check applications. Ideal for use with Check 21, BOC, and remote deposit capture applications, ImageSafe also enables secure card-based payment transactions with its integrated MagneSafe™ secure card reader authenticator that encrypts card data at the point of swipe. The flexible device can also be used with an ID card for strong two-factor authentication during online financial transactions.BenefitsThe ImageSafe is a full-featured device in a compact footprint.It enables the double-sided capture of complete check images in a single pass and supports E13B and CMC7 fonts. Using the MagneSafe secure card reader authenticator, users can easily secure credit, debit and gift card transactions in addition to capturing check images. ImageSafe connects to PCs and terminals through USB 2.0 or 1.1 interfaces and features an easy-to-read LED indicator for visibility into device status. It’s everything retailers need in a secure transaction device, and more.Features• Duplex, dual-sided scanning for complete image capture of both sides of the check in one pass• MagneSafe secure card reader authenticator• Front and back side virtual endorsement• USB 2.0 or 1.1 interface• LED indicator to provide device status• Cover swings open for easy access to check path and scan bars for maintenance and cleaning.• MICR reading: E13B and CMC7• Automatic parsing of MICR fields: transit, account, etc • Black/white and grayscale image rendition and 200dpi image resolution• Image files: TIFF 6.0, JFIF with EXIF tags, BMP• Image compression: CCITT G4 or JPEG• Ability to capture up to four images per check• SHA1 digital signature for image file authentication • Small footprint6mpact.cure.gh-Value.7Excella™ STXExcella STX is check reading made easy. For merchants and financial institutions that need an affordable method for rapid image capture at the earliest entry point when processing BOC, Check 21 and remote deposit capture transactions. The Excella STX leads the industry in reliability and ease-of-use. Featuring a front and back printer for franking and endorsing, Excella STX scans front and back images in a quick, single pass. The small footprint unit also offers single-side scanning for standard ID cards and offers an optional color scanning feature.BenefitsThe full-featured Excella STX is a single-feed check reader and scanner designed to meet the dynamic requirements of many retail and financial applications. The duplex reader offers MICR reading for E13B and CMC7 fonts and connects to standard PCs and terminals through a USB or Ethernet 100Base-T interface. The unit also features easy access to check path and scan bars to simplify maintenance and cleaning. With an integrated MagneSafe™ secure card reader authenticator; this device may be everything your application needs for secure payment processing.Features• Single-feed check operation• MICR reading: E13B and CMC7• Scans front and back images of a check in a single pass • Single-side scanning of standard ID cards• MagneSafe secure card reader authenticator• Optional front and back printers for frankingand endorsing• Optional color scanning available• Interfaces: USB and Ethernet 100Base-T• Small footprint• Easy access to path and scan bars for maintenance and cleaning• API and protocol compatible with MagTek’s Excella (auto-feed scanner)8cure.liable.exible.9MICRSafeOptimized to reduce transaction time and manual entry errors, the MICRSafe is a single-feed MICR reader built for reliability and security with its integrated MagneSafe™ secure card reader authenticator. Ideal for applications where fast and accurate MICR reading is required, the MICRSafe offers a range of interfaces options, including connectivity to PCs and the most popular POS terminals. With a simple drop-and-push check feed movement, the MICRSafe significantly speeds check verification and conversion.BenefitsThe MICRSafe enables users to easily format the MICR data to match any application input requirements. In a single pass, the MICRSafe reads E13B and CMC7 MICR fonts and connects to POS terminals through a USB, RS-232 or PC keyboard wedge interface. Designed for multi-use environments, the MICRSafe also offers an integrated 3-track MagneSafe secure card reader authenticator to read ISO and AAMVA standard credit and debit cards and ID cards. This highly dependable device will deliver superior performance throughout years of daily use.Features• Reads E13-B and CMC-7 MICR fonts• Reads MICR characters on checks and otherMICR encoded documents• Small footprint with high accuracy and dependability • Interfaces include USB, RS-232 and PC Keyboard Wedge • T riple DES encryption• DUKPT key management• MagnePrint® card authentication• Tokenization• Card and data authentication• Device and host mutual authentication1011ngle feed. mpact design. exible.Mini MICROptimized to reduce transaction time and manual entry errors, the Mini MICR is a single-feed MICR reader with a reliable and durable design. Ideal for retail applications where fast and accurate MICR reading is required, the Mini MICR offers a range of interfaces options, including connectivity to the most popular POS terminals. With a simple drop-and-push check feed movement, the Mini MICR significantly speeds check verification and conversion.BenefitsThe Mini MICR enables users to easily format the MICR data to match any application input requirements. In a single pass, the Mini MICR reads E13B and CMC7 MICR fonts and connects to POS terminals through a USB, RS-232 or PC keyboard wedge inter-face. Designed for multi-use environments, the Mini MICR also offers an optional 3-track magnetic stripe reader to read ISO standard credit and debit cards and ID cards. This highly dependable device will deliver superior performance throughout years of daily use.Features• Reads E13-B and CMC-7 MICR fonts• Reads MICR characters on checks and otherMICR-encoded documents• Small footprint with high accuracy and dependability • Optional 3-track MSR (magnetic stripe reader) for ISO and AAMVA cards• Interfaces include USB, RS-232 and PC keyboard wedge. • Other interfaces available12urable.curate.mpact.13MICRImage™Designed to interface with PC applications and the most popular POS terminals in the market, the MICRImage is the ideal solution for retail Check Conversion and ACH applications where both size and ease-of-use are critical factors. With a small footprint and an advanced ergonomic design, the MICRImage delivers the accuracy and compatibility retailers of all sizes require for electronic check transactions. Reading MICR data and scanning a check’s front image in a single pass, MICRImage can store up to 100 black and white check images using standard CCITT or G4 compression.BenefitsMICRImage provides the highest MICR read accuracy available to ensure successful electronic check transactions. The efficient device combines design, function and value to provide the best solution for electronic check conversion. The ergonomic design features visual indicators for ease of use and rapid training while multiple interface ports ensure simple connectivity. The MICRImage is the ideal check reader and scanner for electronic check applications of all types including NACHA’s POP, ARC and RCK.Features• Reads E13-B and CMC-7 fonts• Image resolution: 200 dpi• Image compression: CCITT or G4• Image files: TIFF 6.0 (other formats can be made available)• Image storage capacity for up to 100 black & white images• Each model includes two interface ports: RS-232/RS-232, RS-232/Ethernet, or RS-232/Modem• USB connectivity is also available• Easy-access feature allows convenient cleaning ofscan bar and check path (no tools required)• Optional 3-track MSR (magnetic stripe reader)• Also available: MICR ER (enhanced reading) feature used for automated confirmation of MICR data14eek.werful.sy-to-Use.15。
fingertip access中翻英
fingertip access中翻英Fingertip Access: Unlocking the Convenience of TechnologyIntroductionIn today's fast-paced world, technology plays an integral role in our daily lives. We rely on various devices and applications to ease our tasks, connect with others, and access information instantaneously. One such convenience that technology provides is "fingertip access," which refers to the ability to access and control various functions with just a touch or a tap of our fingers. In this article, we will explore the concept of fingertip access, its evolution, its impact on our lives, and its future implications.Definition and Evolution of Fingertip AccessFingertip access can be defined as the ability to control and manipulate various functions using our fingers, primarily by touching or tapping on a screen or a surface. It relies on touchscreens, sensors, and sophisticated algorithms to convert our gestures into commands for the devices we interact with.The concept of fingertip access has undergone significant evolution over the years. It started with the invention of touchscreens that allowed us to directly interact with devices using our fingers. From resistive touchscreens to capacitive touchscreens, the technology advanced rapidly, enabling gestures such as pinching, swiping, and scrolling. This evolution paved the way for the development of smartphones and tablets, which became the primary devices where fingertip access found its widespread adoption.Impact on Everyday LifeFingertip access has revolutionized the way we interact with technology and has become an essential component of our daily lives. Firstly, it has transformed communication. With just a few taps on our smartphones, we can call, message, or video chat with anyone across the globe. Social media platforms enable us to stay connected to friends and family, all with the swipe of a finger.Moreover, fingertip access has made accessing information effortless. Whether we want to search for a recipe, look up a fact, or engage in online learning, we can simply type or voice our query,and the information is at our fingertips. This convenience has expanded our knowledge and empowered us with instant access to vast amounts of information.Furthermore, fingertip access has revolutionized various industries, such as banking, e-commerce, and entertainment. With mobile banking applications, we have unprecedented control over our finances, just a touch away. Shopping has also become a seamless experience, with intuitive interfaces and secure payment options. Additionally, streaming services allow us to access our favorite movies, shows, and music without leaving the comfort of our homes.The Future Implications of Fingertip AccessAs technology continues to advance, we can expect even more exciting developments in fingertip access. One such possibility is the integration of augmented reality (AR) and virtual reality (VR). With AR and VR technology becoming more accessible, we could potentially interact with virtual environments and objects using our fingers, opening new possibilities for gaming, education, and design.Furthermore, the Internet of Things (IoT) and smart homes will offer fingertip access to control various devices and appliances seamlessly. Imagine being able to turn on the lights, adjust the thermostat, or even start your coffee maker with a simple gesture or tap on your smartphone screen. This level of convenience will transform our homes into smart and interconnected spaces.However, the widespread adoption of fingertip access also raises concerns regarding privacy, security, and dependency on technology. As we become more reliant on our devices for various tasks, ensuring the security of our personal information and protecting ourselves from potential threats becomes crucial. Striking the right balance between convenience and security will be essential in the future development of fingertip access.ConclusionFingertip access has brought unparalleled convenience to our lives. It has made communication, information access, and various tasks effortlessly accessible with just a tap or a swipe of our fingers. Itsevolution has transformed our smartphones and tablets into powerful tools that empower us with fingertip control. As technology advances, we can expect even more exciting developments in fingertip access, enhancing our daily lives further. However, it is essential to navigate the challenges that come with this convenience to ensure a secure and balanced future.。
AOBRD to ELD Fast Track Guide for Fleets说明书
AOBRD to ELD Fast Track Guide for FleetsGet Ready for the ELD Full Compliance DeadlineWhen the United States Congress mandated the use of electronic logging devices (ELD), trucks with existing automatic on-board recording devices (AOBRDs) were grandfathered in for two years. That two-year extension will be expiring on December 16, 2019, at which time all commercial vehicle drivers who are required to prepare Hours of Service records of duty status (RODS) will have to do so using an ELD.About This GuideThis guide is intended to help fleets make a smooth transition from AOBRDs to ELDs, by providing an overview of the technology and the changeover process. It will explain what needs to be done to get started down the path tofull compliance.What you’ll learn:+Differences between AOBRDs and ELDs+ELD Technical Overview+Transition Plan+Proper TrainingELD Rule Implementation TimelineDecember 16, 2015ELD Final Rule Published+ELD use is voluntary+P aper logs, logging software and AOBRDsare also permitted+A wareness and Transition Phase beginsDecember 18, 2017ELD Final Rule Compliance Date+E LD use is mandatory+E xisting AOBRDs can be used for 2 more years December 16, 2019Full Compliance Phase+M andatory ELD use for all drivers and carriersubject to the ELD rule+E LDs must be self-certified and registeredwith the FMCSAWhy Transition Now?Although the deadline requiring the switch from AOBRDs to ELDs isn’t until December 2019, fleets should consider starting to switch now. Here are some reasons why:+T ake Time for Driver Training — ELDs work differently than AOBRDs and additional driver training will be required, especially in the areas of unassigned logs, yard moves and data transfer, just to name a few.+G et Ahead of the Pack — Migrating to ELDs sooner rather than later could give a fleet a competitive advantage over those that choose to switch at the last minute. By the time the deadline hits, ELD fleets will have already worked out any issues their drivers may have experienced and will have determined how to offset any losses to productivity that may have resulted from the switch.+E asier Roadside Inspections — The FMCSA’s eRODS software is designed to receive ELD data from any ELD vendor in a standardized format, to simplify the roadside inspection process. Having AOBRDs slows down inspections, and your drivers end up spending more time on the roadside, due to the lack of a standardized inspection process.According to the Journal of Commerce, eight months into the use of ELDs, the biggest effect of the mandate wasn’t a loss of drivers, but of driving hours.The reality is that like it or not, ELDs will soon replace AOBRDs. Although there are some exemptions, electronic logging is now an industry standard and for many fleets, will become an integral part of their day-to-day operations. The Good NewsELDs offer many benefits, the biggest being access to real-time data. Other key benefits include the ability to monitor fuel usage and manage driver safety, improve Hours of Service performance, and track arrival and departure times. Like any technology solution there will be a learning curve with ELDs. Fleets need to take action today to get a transition process in place and devise a training program for drivers and office staff to ensure the smoothest transition possible.AOBRD vs. ELDAn AOBRD, or automatic on-board recording device, is an electronic device that records a driver’s Hours of Service (HOS) as laid out in the U.S. Hours of Service of Drivers Regulations Section § 395.15 by the Federal Motor Carrier Safety Administration (FMCSA). As mentioned earlier, AOBRDs were grandfathered in as being compliant when the ELD mandate went into effect on December 18, 2017.According to FMCSA, an ELD is:“technology that automatically records a driver’s driving time. This allows easier, more accurate Hoursof Service recordkeeping. An ELD monitors a vehicle’s engine to capture data on whether the engine isrunning, whether the vehicle is moving, miles driven, and duration of engine operation (engine hours). ELD manufacturers must certify that their products meet the technical standards in the ELD rule.”Key Differences Between AOBRD and ELDsWhile both AOBRDs and ELDs are designed to record a driver’s duty status, ELDs have a number ofimportant advancements:+Internal synchronization is more clearly defined in ELDs.+R ecords location information about the truck at each duty cycle change, plus every 60 minutes while the vehicle is in motion.+Provides a graph grid of the driver’s duty status changes.+Warns driver of unassigned driver time/miles upon login.+D efaults to on-duty not driving status when the vehicle has stopped for five consecutive minutes and there is no driver response to prompt the ELD.+Synchronizes to Universal Coordinated Time.+Enhanced resistance to tampering.NEW INSPECTION NO UNREADGeotab Cloud ELD withGeotab GO fleet tracking deviceAOBRD vs. ELD – More DifferencesData transfer With ELDs, drivers have two electronic options for transferring data to law enforcementofficers. The first is a telematics transfer in which data is transferred via wireless web servicesand email. The second is called a local transfer and involves transferring data via USB2.0 andBluetooth. With both methods, records are sent directly to the FMCSA’s eRODS software.In-cab documents The ELD must have records of the current day and the seven previous days. Drivers also needto have the user’s manual and an instruction sheet that shows how to transfer data during aroadside inspection. A sheet that details malfunctions and contains appropriate actions thedriver needs to take if the device malfunctions is necessary as well. The driver also needs asupply of blank paper logs to cover at least eight days in the event the device fails.Special driving categories There are two main special driving categories drivers need to be aware of: personalconveyance and yard moves. In November 2018, FMCSA issued a new guidance on personalconveyance. It said that the commercial motor vehicle may be used for personal conveyanceeven if it is laden, since the load is not being transported for the commercial benefit of thecarrier at that time. Personal conveyance could mean moving a truck into a rest spot in aperiod of time that exceeded the limits on for on-duty hours. A yard move applies when thedriver is driving the vehicle off of public roads. The status is considered on-duty but does notcount toward the driver’s driving time limit.Unassigned driving time This occurs when someone drives a vehicle without logging in to the ELD. Before the ELDmandate, there were no unassigned driving events. According to FMCSA all unassigned drivetime records must be either annotated or reassigned to a driver. Both drivers and carriers areaccountable for all unassigned drive time.Editing logs All edits to the logs have to be approved by the driver. Drivers also can enter missinginformation and make edits, but all edits made by a supervisor have to be approved by thedriver. Edits must include an explanation of why the change is being made.Speed threshold ELDs have to be configured to have a maximum speed threshold of no greater than 5 mph.There is no distance or duration threshold that can be specified. Before the ELD mandate,many AOBRDs allowed customers to customize the threshold at which automatic drive logswould be created. This will be much tighter in the ELD realm.Electronic Logging Devices — Technical OverviewELDs have to capture more data than AOBRDs. This includes: date and time, location (accurate to within one mile in normal operation), engine hours, vehicle miles, driver information, vehicle information, and carrier .On its website, FMCSA lists the features all ELDs are required to have.1 Some key things to note include that the device must show the driver as driving when the vehicle reaches 5 mph and the device must automatically default to on duty when the vehicle is stopped, unless the driver takes action. The device also has to automatically generate vehicle location. Anyone using the ELD must have an account, and only one driver is allowed on each account.FMCSA also requires ELD manufacturers to self-certify that their devices meet the ELD specifications contained in the rule.The Geotab Cloud ELD platform interconnects the Geotab GO telematics device with a mobile device running theGeotab Drive app (available for Android and iOS) through a secured cloud-based server operating the MyGeotab fleet management software. Unlike hard-wired or Bluetooth paired solutions that use a time-based approach with periodic status checks, the GO device continuously records and transmits data to the cloud-based program to effectively monitor and record HOS, including RODS and Driver Vehicle Inspection Reports (DVIRs).Geotab has registered its Geotab Cloud ELD with FMCSA indicating that it meets the necessary specifications.8:00 left 8:00 l e f t+ R equired Engine Data+Location+Duty Status LogsTransition Plan for ELDsWhen it comes to transitioning to ELDs, it does not have to be all or nothing. If a fleet begins now, it can complete a slow rollout by the December 2019 deadline.Conduct a Pilot ProgramStart by reviewing the offerings from various ELD makers. Once the fleet has determined which ELD it is going to use, fleet management needs to ask for a pilot program.Top drivers or those who are technology-savvy and enthusiastic are a good choice as the first users of the ELDs. Get them properly trained and allow them one to two weeks to practice using the ELDs. Once they are trained and successfully using the ELD, they will become champions for it and can help the fleet roll it out to the rest of the drivers.What a Successful Transition Looks LikeHere is a quick overview of the steps to successful deployment:Pre-deployment Pilot Training(Drivers)Training(Back Office Staff) P re-deployment is the time to reinforce the benefits of ELDs with drivers and to make sure vehicles are ready to have ELDs installed. It’s also a good time to review andupdate HOS policies and stress that the fleet’s goal is 100% compliance with HOS rules.D uring the initial pilot deployment , set drivers up with accounts, make sure they know how to log in to the devices, and ensure all necessary documentation is in the cab of the vehicle.D river training needs to hit on all the areas that differ from what drivers using AOBRDs are familiar with. Emphasize points like thresholds for duty status changes, personal conveyance and yard moves, proper data transfer methods and edits. T raining of back office staff is also important for helping them understand that they can only suggest changes to logs and to ensure they know how to transfer logs in theevent of an audit.Training TipsTo be successful in switching to ELDs, training is critical. The top areas to focus on during training are:+M aking sure drivers understand the thresholds for automatic duty status+T eaching them how to successfully transfer data from the ELD to the law enforcement official via either the telematics or local transfer method+E xplaining the various ways the ELD can malfunction. FMCSA has information on both the types of malfunctions and what drivers need to do in the event of a malfunction.2 Educate your back office staff about their responsibilities when malfunctions are reported by drivers.+E nsuring drivers understand how to edit logs and are aware that they must approve all edits made by supervisors. Take a step-by-step approach when transitioning from AOBRDs to ELDs. Make sure the plan covers what needs to be done prior to deploying the ELDs, driver training and training for back office staff.Giving drivers and ELD administrators ample time to learn and ask questions will result in the smoothest transition. Once the fleet has begun the transition from AOBRDs to ELDs, schedule ongoing training sessions with drivers and offer coaching where needed.Putting It All TogetherAlthough making the switch from AOBRDs to ELDs may seem daunting, it doesn’t have to be. With some basic planning and training, ELDs can become a valuable part of your fleet management program for compliance and beyond.The FMCSA web site (/hours-service/elds/electronic-logging-devices) is a good source of information about ELDs. It provides definitions and technical information about ELDs, has an FAQ section, as well as a section for drivers and carriers in addition to a list of resources.For more information and training tips on ELDs, please visit: /eldReferences1.h ttps:///hours-service/elds/choosing-electronic-logging-device-checklist2. https:///hours-service/elds/eld-malfunctions-and-data-diagnostic-eventsAbout GeotabGeotab is advancing security, connecting commercial vehicles to the internet and providing web-based analytics to help customers better manage their fleets. Geotab’s open platform and Marketplace, offering hundreds of third-party solution options, allows both small and large businesses to automate operations by integrating vehicle data with their other data assets. As an IoT hub, the in-vehicle device provides additional functionality through IOX Add-Ons. Processing billions of data points a day, Geotab leverages data analytics and machine learning to help customers improve productivity, optimize fleets through the reduction of fuel consumption, enhance driver safety, and achieve strong compliance to regulatory changes. Geotab’s products are represented and sold worldwide through Authorized Geotab Resellers.© 2018 Geotab Inc. All Rights Reserved.This white paper is intended to provide information and encourage discussion on topics of interest to the telematics community. Geotab is not providing technical, professional or legal advice through this white paper. While every effort has been made to ensure that the information in this white paper is timely and accurate, errors and omissions may occur, and the information presented here may become out-of-date with the passage of time.。
Xyle 水泵控制器说明书
FEATURES ArrayQuickly and easily calibrates any submersible or centrifugal pump to jobsite conditions (voltage and current).Available installed in new QD style, NEMA 3R Rainproof (outside) enclosures or shipped loose for installation in existing control panels. Single phase units work with the hand held Informer for simple, fast troubleshooting and system diagnostics.Available in single and three phase models.Insider Plus models fit in Goulds Water Technology, Pentair and Franklin Electric Quick Disconnect type control boxes from ½ - 1 HP. Insider Plus units include a Fiber Optic Kit as standard. It is used to signal the optional Informer.Protect against dry wells, low and high voltage, over and under current, rapid cycling, jammed pump, dead heading (flow restriction).Automatic reset selectable, 2-225 minutes or can be set on manualreset.Adjustable underload sensitivity on Plus models.PAGE 2APPLICATIONS – SINGLE PHASE ONLY• All submersible pumps, regardless of motor manufacturer• Centrifugal pumps • Circulating pumps • Cooling pumps• Environmental pumps • Residential water wells • Commercial water wells • Irrigation wells• Golf course systemsProtects From:• Dry well (run dry condition)• Flow restrictions (dead head)• Over current (jammed impeller)• Over voltage • Under voltage • Rapid cyclingPUMPSAVER PLUS 111 / 233, 23315 AND 235PLUS MODEL FEATURES• Can be calibrated to specific pump / motor combi-nations and various conditions• Will work with destaged pump models ending in 05R• Infrared LED communication with the INFORMER makes diagnostics simple• “Run Light” indicates the unit is functioning• “Run Light” and “Cal. Light” used as diagnostic indi-cators• Restart delay can be set up to 225 minutes or placed in manual reset mode• Micro-controller provides better accuracy and higher reliability than analog designs• Plus units feature more data storage memory which is viewable using an Informer• Sensitivity adjustment for dry well trip point• Installing PumpSaver Plus equipment on all your installations allows fast, simple troubleshooting with an Informer, eliminate guesswork, get all the data within minutes of arriving at a jobsite.• 5-year warrantyPAGE 3ORDER NUMBERS AND SPECIFICATIONSEnclosure ProvidedOrder No. SymComPhaseNotes HP RangeVoltageYes / NoTypeNew Part Numbers ** 111Insider 111-Insider-P 1115 N/A N/A231Insider 231-Insider-P 1 1/3 - 1 230 N/A N/A 111 111P — 115 No — 1113RL 111P-ENCL 2115 Yes QD – ENCL23315 233P-1.5 — 1/3 - 1½ 230 No — 233153R L 233P-1.5-ENC L 12230 Yes QD – ENCL 233 233P — 1/3 - 3 230 No — 2333RL 233P-ENCL 2 230 Yes QD – ENCL 2353RL50 235P-ENCL + CT0050D10 2, 3 5 - 7½ 230 Yes QD – ENCL 2353RL75 235P-ENCL + CT0075D10 2, 3 10 230 Yes QD – ENCL 2353RL100 235P-ENCL + CT0100D10 2, 3 15 230 Yes QD – ENCL 235 235P 4 5 - 15 230 No — 777KWHP 3—1/3 - 150 200-480 No —** – P signifies the Plus version which has enhanced electronic features and memory.** – ENCL denotes the new, N3R QD Enclosure effective July/August 2009.NOTES:1 – The Insiders install in submersible single phase quick d isconnect control boxes and require no enclosure.2 – Models with a ...3RL suffix are installed in a NEMA 3R enclosure which has both Run and Calibrate lights.3 – Models contain a current transformer.4 – The 235 always requires a Current Transformer, use this model for repairs. Order the 2353RL- _ _ units which contain current transformers for new applications.ACCESSORY ORDER NUMBERSCT0050D10 Model 235, 5 - 7.5 HP , 50 Amp Current Transformer CT0075D10 Model 235, 10 HP , 75 Amp Current Transformer CT0100D10 Model 235, 15 HP , 100 Amp Current TransformerINFORMERHand Held Diagnostic ToolOUTSIDE OF NEW N3R - ENCL INSIDE OF NEW N3R- ENCL WITH A 233P INSTALLEDDimensions: 3.5” deep, 5.4” wide, 8” high Knockouts: ½” (1 each side, 2 bottom)¾” (1 each side, 1 bottom)PAGE 4PUMPSAVER 111INSIDER (115V) AND 231INSIDER (230V)APPLICATION• Submersible pump with a quick disconnect style control boxProtects From:• Dry well (run dry condition)• Flow restrictions (dead head)• Over current (jammed impeller)• Over voltage • Under voltageFEATURES• Fits inside a 3 wire quick disconnect style control box• Can be calibrated to specific pump / motor combi-nations and various conditions• Will work with destaged pump models ending in 05R• Infrared LED communication with the INFORMER makes diagnostics simple• Quick and easy installation – less than 30 seconds • “Run Light” indicates the unit is functioning• “Run Light” and “Cal. Light” used as diagnostic indi-cators• Restart delay can be set up to 225 minutes or placed in manual reset mode• 5-year warrantyINFORMERFEATURES• The Informer is a handheld diagnstic tool designed for use with single-phase PumpSaver models.• The Informer uses an infrared receiver to access data sent from the PumpSaver, which can be helpful for troubleshooting the system.The Informer displays parameters including:• Real-time voltage, current and power • Dry-well and overload trip points • Calibration voltage • Last 20 fault conditions• Voltage, current and power at last fault condition • Highest/lowest voltage and current since last calibration• Line power and dry well trip point • Total pump run time • Number of pump starts• Restart delay setting and time maining (if tripped)• Pump amperageGOULDS WATER TECHNOLOGY CONTROL BOX WITH INSIDER INSTALLEDTo install in CP, QD control box:• Remove the cover from the front of the 3-wire Goulds Water Technology control box.• Remove the yellow wire from the terminal strip at L2.• Remove the black wire between L1 and the capaci-tor.• Press the PumpSaver onto the L1 and L2 terminals.• Reconnect the yellow wire to L2 on the PumpSaver.• Connect the blue wire attached to the PumpSaver to the dual-lug terminal (with the black wire) of the capacitor.INSIDER MOUNTED IN FE, Q-D SUBMERSIBLE CONTROL BOXTo install in FE, QD control box:• Remove blue wire from terminal strip and solid state switch (blue relay) and set aside.• Remove yellow jumper wire from terminal L2.• Install Insider by aligning tabs with upper L2 and L1 tabs and pushing onto tabs.• Connect yellow wire onto L2 terminal on Insider.• Connect blue wire attached to Insider to L1 on solid state switch (blue relay).PAGE 5PUMPSAVER 777KWHPAPPLICATIONSThe Model 777-KW/HP can be used on ANY 3-phase motor. Some examples include: Can Pumps, Mag Drive Pumps, Fractional Horsepower Pumps and Motors, Submersible Pumps and Coal Bed Methane Wells.DESCRIPTIONThe Model 777-KW/HP is a fully-programmable motor and pump protection relay with power-monitoring capability. Voltage, current and power measurements are displayed on the three-digit display, as well as fault information and setpoints. The display simplifies troubleshooting and allows the user to easily and pre-cisely configure setpoints. The Model 777-KW/HP has the following adjustable protection features: STANDARD FEATURES OF 777KWHP• UL Listed as an overload device• Digitally programmable for precise customization • 15 parameters can be programmed for maximum protection• Alphanumeric LED diagnostic display• Last fault memory provides instant troubleshoot-ing diagnostics• Recordable voltage, current, last four faults, KWhusage, and power factor with communicationspackage.• Compact design saves panel space• Agency Listings: UL, cUL, CSA, CE• RS485 communication port• Tamper guard• Remote reset• Surface and DIN rail mount• 5-year warranty• Made in U.S.A.ADJUSTABLE PROTECTION FEATURES OF777KWHP:• Low voltage• High voltage• Voltage unbalance• UL Listed/CSA approved overload• Trip class (5, 10, 15, 20, 30)• Current unbalance• Ground fault• Low power• High power (via network only)• Rapid-cycle timer• Fault/overload restart delay• Underload restart delay• Underpower/overpower trip delayOther user adjustable features include:• CT/loop multiplier so overcurrent and power setpoints can be made in actual amps, kW or HP.• Number of restarts after faults - manual, automatic and semiautomatic options.• Number of restarts after underload - manual, automatic and semiautomatic options• Network addressAdding the optional RS485MS-2W communications module activates the built-in Modbus RTU bus capabilities.PAGE 6PAGE 7WIRING CONFIGURATION BASED ON MOTOR AMPSTYPICAL WIRING DIAGRAM FOR MODEL 777-KW/HP (20-90 AMPS) AND 777-LR-KW/HP (2-9 AMPS)CURRENT TRANSFORMER WIRING DIAGRAM FOR MODEL 777-KW/HP (80-800 AMPS)PUMPSAVER 777KWHP (continued)Dimensions for All 777-KW/HP UnitsSYMCOM RECOMMENDS USING CTs WITH TERMINALS TO SIMPLIFY INSTALLATION.Note: All CTs must be faced the same direction and all CT secondaries must be wired identically, i.e. all X1 terminals enter the main (round) window and returns to H1 terminal after exiting the loop conductor window (rectangle).Every CT secondary must make five passes through the corresponding main conductor window on the Model 777-KW/HP .12-18 AWG Stranded WireCONTACTORCONTACTORCOILCONTROLPOWERSTARTSTOPAUTOTO MOTOR3 ØMOTORPUMPSAVER 111 / 233 TYPICAL WIRING DIAGRAMPUMPSAVER 235 TYPICAL WIRINGDIAGRAM WITH DELUXE CONTROL BOX Xylem, Inc.2881 East Bayard Street Ext., Suite A Seneca Falls, NY 13148Phone: (866) 325-4210 Fax: (888) /gouldsXylem is a registered trademark of Xylem Inc. or one of its subsidiaries. Goulds is a registered trademark of ITT Manufacturing Enterprises LLC and is used under license. All other trademarks or registered trademarks are property of their respective owners.© 2023 Xylem Inc. BCPSAVER R2 March 2023。
社会救助创新实践案例范文
社会救助创新实践案例范文Social assistance is a system designed to help individuals and families meet their basic needs when they are unable to do so on their own. This assistance typically comes in the form of financial aid, food assistance, housing assistance, and medical assistance.社会救助是一个旨在帮助个人和家庭满足基本需要的系统,当他们无法自己做到时。
这种帮助通常以经济援助、食品援助、住房援助和医疗援助的形式提供。
One innovative practice in the field of social assistance is the development of comprehensive case management systems. These systems help social workers and case managers streamline the process of identifying and addressing the needs of individuals and families in need. By using technology to simplify administrative tasks, case managers are able to spend more time working directly with clients to develop personalized assistance plans.社会援助领域的一种创新实践是开发全面的案例管理系统。
这些系统帮助社会工作者和案例经理简化识别和解决有需要的个人和家庭需求的流程。
数据库原理外文原文
Database Management SystemSource:Database and Network JournalAuthor:David AndersonYou know that a data is a collection of logically related data elements that may be structured in various ways to meet the multiple processing and retrieval needs of orga nizations and individuals. There’s nothing new about data base-early ones were chiseled in stone, penned on scrolls, and written on index cards. But now database are commonly recorded on magnetically media, and computer programs are required to perform the necessary storage and retrieval operations.The system software package that handles the difficult tasks associated with created, accessing, and maintaining database records is in a DBMS package establish an interface between the database itself and the users of the database. (These users may be applications programmers, managers and others with information needs, and various OS programmers.)A DBMS can organize, process, and present selected data elements from the database. This capability enables decision makers to search. Probe, and query data contents in order to extract answers to nonrecurring and unplanned questions that aren’t available in regular reports. These questions might initially be vague and/or poorly defined, but people can “browse” through the database until they have the needed information. In short, the DBMS will “manage” the stored data items and assemble the needed items from the common database in response to the queries of those who aren’t programmers. In a file-oriented system, users needing special information may communicate their needs to a programmers, who, when time permits, will information. The availability of a DBMS, however, offers users a much faster alternative communications patch (see figure).Special, direct, and other file processing approaches ate used to organize and structure data in single files. But a DBMS is able to integrate data elements from several files to answer specific user inquiries fir information. This means that the DBMS is able to structure and tie together the logically related data from several large files.Logical structures. Identifying these logical relationships is a job of the data administrator. A data definition language is used for this purpose. The DBMS maythenEmploy one of the following logical structuring techniques during storage access, and retrieval operation: list structures, hierarchical (tree) structures, and network structures, relational structures.1. List structures. In this logical approach, records are linked together by the use of pointers. A pointer is a data item in one record that identifies the storage location of another logically related record. Records in a customer master file, for example, will contain the name and address of each customer, and an account number identifies each record in this file. During an accounting period, a customer may maintain an invoice file to reflect these transactions. A list structure could be used in this situation to show the unpaid invoices at any given time. Each in the customer file would point to the record location of the first invoice for that customer in the invoice file. This invoice record, in turn would be linked to later invoice for the customer. The last invoice in the chain would be identified by the use of a special character as a pointer.2. Hierarchical structures. In this logical approach, data units are structured in multiple levels that graphically resemble an “upside down” tree with the root at the top and the branches formed below, there’s a superior-subordinate relationship in a hierarchical structure. Below the single-root data component are subordinate elements (or one) has only a single owner. Thus, as we see in figure, a customer owns an invoice, and the invoice has subordinate items. The branches in a tree structure are not connected.3. Network structures. Unlike the tree approach, which dose not permit the connection of branches, the network structure permits the connection of the nodes in a multidirectional manner. Thus, each node may have several owners and may, in turn, own any number of other data units. Data, management software permits the extraction of the needed information from such a structure by beginning with any record in a file.4. Relational structures. A relational structure is made up of many tables. The data are stored in the form of “relations” in these tables. For example, relation tables could be established to link a college course with the instructor of the course, and with the location of the in order to find the name of the instructor and the location of the English class, the course/instructor relation is searched to get the name, and the course/location relation is searched to get the class location. Many other relations are of course, possible. This is a relatively new database structuring approach that’sexpected to be widely implemented in the future.5. Physical structure. People visualize or structure data in logical ways for there Own purposes. Thus, records R1 and R2 may always be logically linked and processed in sequence in one particular application. However, in a computer system it’s quite possible that these records that are logically contiguous in one application are not physically stored together. Rather, the physical structure of the I/O and storage devices techniques used, but also on the different logical relationships that users may assign to the data found on R1 and R2. For example, R1 and R2 may be records of credit customers who have shipments send to the same block in the same city every two weeks. From the shipping depart ment manager’s perspective, then, R1 and R2 are sequential entries on a geographically organized shipping report. But may be identified, and their accounts may be processed, according to their account numbers which are widely separated. In short, then the physical location of the stored records in many computer-based information systems is invisible to users.During the past five years, Microsoft has promoted Data Access Objects (DAO), and then Remote Data Objects (RDO), and now ActiveX Data Objects (ADO) as the primary data access technology for Visual Basic developers. It seems that Microsoft has been pushing a different data access technology with each successive version of Microsoft Visual Studio. Today, new versions of ADO are available on Microsoft's Web site and ship with other products and technologies, such as Microsoft Windows 2000, Microsoft Windows NT 4 Service Packs, Microsoft Internet Explorer versions 3 and later, Microsoft SQL Server 6.5 Service Pack 5 and SQL Server 7, Microsoft Office 2000, and even Microsoft Expedia Streets & Trips 2000.One of the goals of ADO is to simplify data access. ADO is built upon some fairly complex technologies—OLE DB and ODBC (open database connectivity)—and is designed to allow you to programmatically access and modify data stored in a wide variety of databases. This broad reach is a departure from previous data access technologies. For the sake of comparison, let's take a quick glance at ADO's predecessors: DAO and RDO.Data Access ObjectsDAO was originally designed to interact with Microsoft Access databases. Although you can use DAO to access SQL Server and Oracle databases, many developers complain about DAO's performance with these large database systems. Others complain that DAO doesn't permit programmers to access some of the richer,more powerful features of SQL Server and Oracle, such as output and return parameters on stored procedures.One of my coworkers likes to say that using DAO to work with an Oracle database is like performing brain surgery on you…without anesthetics…while wearing oven mitts. Extreme? Yes—but he does have a point. DAO is tuned to work with desktop databases, not client/server databases. Frustrated by DAO's performance and access limitations, developers who wanted to work with SQL Server and Oracle databases generally sought other options.Remote Data ObjectsMicrosoft provided another option in RDO, which originally released with Visual Basic 4 Enterprise Edition. RDO's object model closely resembles the hierarchy of structures in the ODBC API. Programmers found that RDO provided much faster access to client/server database systems, such as SQL Server and Oracle, than DAO did. Although those familiar with the ODBC API quickly learned how to work with the RDO object model, developers lacking experience with that API, such as those who had been using DAO, found the RDO technology difficult to use.The object model itself wasn't the problem for most programmers learning RDO: the nuances inherited from the ODBC API posed the greatest obstacles. Suddenly, programmers had to bone up on cursors and bookmarks. They had to learn many of the ins and outs of specific database systems. Does the error message "The connection is busy with results from another hstmt" ring any bells out there? If you try to do the impossible on an ODBC connection to your database, RDO won't save you. Instead, you'll get that error. DAO hid the problem from you by automatically creating another connection to your database to perform the action you requested.Another challenge that RDO posed for programmers accustomed to writing DAO code was that RDO lacked many of DAO's features, such as sorting, searching, and filtering. Other DAO functionality unavailable in the RDO world includes data definition language (DDL) interfaces to ODBC API functions such as Create Table and Create Field.Best of Both Worlds: ActiveX Data ObjectsProgrammers clamored for a data access technology that combined the simplicity and relative ease of use of DAO with the speed, power, and control of RDO. Initially introduced as part of the Microsoft Internet Information Server 3 package, ADO was intended to be all things to all people. Of course, such lofty goals are rarely fulfilled.While the initial release of ADO lacked many of Rod’s features, I b elieve that ADO 2.0 offered comparable functionality. Certain RDO features, such as mixed cursors, have yet to be implemented in ADO, but these features are few and far between. In fact, I'm at a loss to name a single significant feature available in RDO that was not available in ADO 2.0 in one form or another. (I'm sure someone will tell me otherwise; a great way to find such features is to make a statement like that in a book like this.)With the release of version 2.1, ADO and its supporting libraries began offering nearly all features available in DAO. DDL libraries were added to ADO in version 2.1 to provide functionality similar to functions available with DAO, such as Create Table, Create Field, and Create Index. Microsoft Jet and Replication Objects (JRO) in ADO 2.1 offers much of the Jet-specific functionality available via the DB Engine object in DAO. ADO 2.1 also added functionality to simplify the retrieval of newly generated identity values. ADO 2.5 adds no new functionality to more closely match the capabilities of DAO and RDO, because perhaps the only place where ADO lags behind DAO is in its searching and filtering capabilities.So ADO has most of the functionality of RDO and DAO as well as many helpful features not available in previous data access technologies.Database ManagementThere are problems with traditional data management. A more subtle problem is data dependency. When a problem’s logic is tied to it’s physical data structure, changing that structure will almost certainly require changing the program. As a result, programs using traditional access methods can be difficult to maintain. The solution to both problems id often organizing the data as a single, integrated database. The task of controlling access to all the data can then be concentrated in a centralized database management system.How dose the use of a centralized database solve the data redundancy problem? All data are collected and stored in a single place; consequently, there is one and only one copy of any given data element. When the value of an element (an address, for example) changes, the single database copy is corrected. Any program requiring access to this data element gets the same value, because there is only one value.How dose a database help to solve the data dependency problem? Since the responsibility for accessing the physical data rests with the database management system, the programmer can ignore the physical data structure. As a result, programstend to be much less dependent upon their data, and are generally much easier to maintain. Expect the trend toward database management to continue.。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Using Schemas to Simplify Access Control for XMLDocumentsIndrakshi Ray and Marianna MullerComputer Science DepartmentColorado State UniversityFort Collins,CO80523-1873iray,muller@anizations are increasingly using the the eXtensible Markup Lan-guage(XML)for document representation and exchange on the Web.To protectan XML document from unauthorized access,authorizations are specified on theXML document itself or on the Document Type Definition(DTD)that defines thetype of the XML document.Each XML document or DTD is associated with anXML Access Sheet(XAS)that specifies the authorizations.The DTD not beingan XML document complicates the specification and enforcement of authoriza-tion policies.To overcome the above mentioned problem,XML Schemas need tobe used instead of DTDs.In this paper,we show how XAS DTDs can be spec-ified using XML Schemas and propose an access control architecture that canprocess XAS authorizations.Enforcement of access control allows users to viewonly those parts of the documents that they are authorized to view.These partsmay not conform to the schema of the original document and hence may not bevalid.Towards this end we propose a schema loosening algorithm that generatesa schema that will be satisfied by documents satisfying the access control require-ments.1IntroductionOrganizations are increasingly using the world wide web to disseminate and distribute information.Most of this information is specified in XML which is emerging as the de-facto standard language for document representation and exchange over the Web. In order to be processed an XML document must be well-formed(obeys the syntax of XML)and valid(conforms to a proper Document Type Definition(DTD)that defines the particular type of XML document).The information distributed by organizations via the web have different levels of sensitivity:some of this information must be dis-tributed internally,some must be shared with other organizations,and others must be disseminated for public use.Protecting information with different levels of sensitivity is non-trivial.To address this problem,researchers[1–9]have proposed models and mechanisms for controlling access to XML documents.To protect XML documents,authorization policies may be specified on the XML document or on the associated DTD.If an authorization policy is specified on the DTD,the policy applies to all XML documents conforming to the DTD.Such authorization policies are specified in a document known as XML Access Sheet(XAS).XAS is an XML document and must be well-formed and valid.DTDs not being XML documents do not satisfy the well-formedness and validity requirements of XML.As pointed out by Zhang et al.[9],using DTDs to validate XML documents causes a number of problems in the specification and enforcement of authorization policies.First,the authorization policies for XML documents and DTDs cannot be specified in an uniform manner because the structure of the documents differ. Second,an XML parser is not sufficient for interpreting the authorizations on a given XML document.Third,the use of DTD limits interoperability.In this paper,we propose the use of XML Schemas,instead of DTDs,for vali-dating XML documents.This simplifies the specification and enforcement of autho-rization policies.We show how authorization templates can be specified in the form of XML Schemas.We propose an access control system that can process any authorization specified as an XAS that conforms to some XML schema.Enforcing access control on an XML document often results in a pruned document;the pruned document contains only those information that the user is authorized to see.This pruned document may not conform to the schema of the original document.We propose an algorithm by which the original schema can be transformed to a loosened schema.This loosened schema will be satisfied by all the documents generated from the original XML document that satisfy the access control requirements.The rest of the paper is organized as follows.Section2shows how XML schemas can be used to specify authorization templates.Section3presents an access control system that can process different kinds of authorizations associated with the documents. Section4concludes the paper with some pointers to future directions.2Specifying Authorization Templates using SchemasOur approach allows for the specification of different kinds of authorization models.We show how authorization policies adapted from the model proposed by Damiani et al.[6]can be expressed using a schema.Each authorization is of the form(subject,object, action,sign,type),where subject is the entity to whom the authorization is granted or denied,object is either a uniform resource identifier(URI)of the resource or is of the form URI:PE,where PE is a path expression on the tree of document URI,action is the operation being authorized or forbidden,sign is either‘+’(denoting allow access)or‘-’(denoting forbid access),type is one of LHD,RDH,L,R,LD,RD,LS,RS depending on the kind of authorization.Figure1shows an authorization template for such a model can be specified as an XML schema.3Access Control SystemIn this section we present an access control system for authorizing XML documents. This architecture is adapted from that proposed in[6].Since we use XAS Schemas instead of DTD,our architecture is not confined to intra-organizational applications.<?xml version="1.0"encoding="UTF-8"?><xs:schema xmlns:xs="/2001/XMLSchema"><xs:simpleType name="stringtype"><xs:restriction base="xs:string"/></xs:simpleType><xs:simpleType name="signvaluetype"><xs:restriction base="xs:string"><xs:pattern value="+|-"/></xs:restriction></xs:simpleType><xs:simpleType name="typevaluetype"><xs:restriction base="xs:string"><xs:enumeration value="LDH"/><xs:enumeration value="RDH"/><xs:enumeration value="L"/><xs:enumeration value="R"/><xs:enumeration value="LD"/><xs:enumeration value="RD"/><xs:enumeration value="LS"/><xs:enumeration value="RS"/></xs:restriction></xs:simpleType><xs:complexType name="actiontype"><cs:attribute name="value"type="stringtype"fixed="read"use="required"/> </xs:complexType><xs:complexType name="signtype"><cs:attribute name="value"type="signvaluetype"use="required"/></xs:complexType><xs:complexType name="typetype"><cs:attribute name="value"type="typevaluetype"use="required"/></xs:complexType><xs:complexType name="authorizationtype"><xs:sequence><xs:element name="subject"type="stringtype"/><xs:element name="object"type="stringtype"/><xs:element name="action"type="actiontype"/><xs:element name="sign"type="signtype"/><xs:element name="type"type="typetype"/></xs:sequence></xs:complexType><xs:complexType name="set_of_authorizations_type"><xs:element name="authorization"type="authorizationtype"minOccurs="1"maxOccurs="unbounded"/><xs:attribute name="about"type="stringtype"use="required"/></xs:complexType><xs:element name="set_of_authorizations"type="set_of_authorizations_type"/> </xs:schema>Fig.1.XAS Syntax Specified as a SchemaFigure 2shows the architecture of such a system.The following reasons motivate the need for implementing such a system on the server side.First,this prevents the client (user)from viewing or processing information that he is not allowed to see or process.Second,this obviates the need for the client browser to provide XML support for translating XML documents to HTML.This architecture is based on the fact that an XML document is internally repre-sented as an object-oriented document graph according to the Document Object Model (DOM)Level 1specification.DOM provides an object-oriented Application Program-ming Interface (API)for HTML and XML documents.++++−−−XML/HTML Translation ++−Unparsing HTML DocumentXML Document SchemaXML Document XASs XAS SchemaXAS DOM treeXML DOM tree XML Document User’s View +ParsingTree LabelingTree Transform +Fig.2.Architecture of the Access Control SystemThe following steps are performed by the access control system after receiving a request to access an XML document.The input to the process is the document being requested,the XML Schema against which the document must be validated,the XAS for the document and the Schema,the XAS Schema against which the XAS is validated,and the identity of the requester.Parsing:The goal of this step is to generate DOM trees for XML and XAS doc-uments.First,the syntax of the XML document is checked with respect to the XML Schema.If the syntax is correct,the XML document is compiled.The compilation re-sults in generating the object-oriented document graph according to the DOM format.The same process is followed for the XAS documents.The output of this step are XML DOM tree and XAS DOM tree(s).Tree Labeling:The goal of this step is to label the nodes of the XML DOM tree that indicates whether the requester has or does not have access to the node.We follow other researchers and label a node with ‘+’indicating that the requester has access,anode with‘-’indicating that the requester does not have access.The XAS DOM tree(s) are consulted to determine the access the requester has on the different nodes of the XML document.Note that,in determining the access the entire XAS DOM tree need not be consulted.We can prune the parts of the tree that are not related to the access request.The output of this step is a labeled XML DOM tree.Tree Transformation:The goal of this step is to generate an XML DOM tree that represents the information the requester is permitted to view.The step proceeds as fol-lows.The label of the tree is consulted and the tree is pruned using a preorder traversal. The output is the pruned XML DOM tree.Note that this document may not satisfy the validity requirements of the original XML schema.For this reason,the XML Schema is transformed into a loosened XML Schema that this new document will satisfy.The generation of loosened schema is defined by algorithm1.We propose generating the loosened schema off-line and not while the access request is getting processed.Unparsing:The goal of this step is to convert the pruned XML DOM tree into a text version.The step involves a translation process.The output is a text form of the pruned XML document.Translation:The goal of this step is to translate the XML document such that users having browsers without XML capability can view the document.This step is a trans-lation of the XML Document to an HTML document that can be viewed by the user. Algorithm1Schema Loosening Algorithmtions.We identify the object pertaining to this authorization and get the tree corre-sponding to the object.In this tree,we mark all the required attributes and elements as optional.Repeating this process for all the negative authorizations,we get all the set of attributes and elements of the tree that are optional.Generating the schema from the modified tree gives us the loosened schema.4ConclusionIn this paper we propose an access control system that is suitable for XML documents that are validated using XML schemas instead of DTDs.We show how to specify au-thorization templates in the form of XML schemas,and provide an architecture of an access control system that can process the authorizations specified on XML documents and schemas.Enforcement of access control results in pruning of the document such that the users have the authorization to view this pruned document.The pruned doc-ument may not conform to the schema of the original document and hence may not be valid.Towards this end we propose a schema loosening algorithm that generates a schema that will be satisfied by documents satisfying the access control requirements. In future,we plan to investigate how to reduce the time taken for evaluating the autho-rizations specified on XML documents.References1. E.Bertino,S.Castano,and E.Ferrari.On Specifying Security Policies for Web Documentswith an XML-based Language.In Proceedings of the First ACM Symposium on Access Con-trol Models and Technologies,pages57–65,May2001.2. E.Bertino,S.Castano,and E.Ferrari.Securing XML Documents with Author-χ.IEEEInternet Computing,5:21–151,June2001.3. E.Bertino,S.Castano,E.Ferrari,and M.Mesiti.Specifying and Enforcing Access ControlPolicies for XML Document Sources.World Wide Web Journal,3(3):139–151,May2001. 4. E.Bertino and E.Ferrari.Secure and Selective Dissemination of XML Documents.ACMTransactions on Information and System Security,5(3):290–331,August2002.5. E.Damiani,S.Paraboschi,and P.Samarati.A Fine-Grained Access Control System forXML Documents.ACM Transactions on Information and System Security,5(2):169–202, May2002.6. E.Damiani,S.Vimercati,S.Paraboschi,and P.Samarati.Design and Implementation ofAccess Control Processor for XML Documents.In Proceedings of the Ninth International World Wide Web Conference,May2000.7. A.Gabillon and E.Bruno.Regulating Access to XML Documents.In Proceedings of theFifteenth IFIP WG11.3Working Conference on Data and Applications Security,Niagara On the Lake,Canada,July2001.8.J.P.Yoon.Bitmap-based High-speed Access Control for XML Documents.In Proceedings ofthe Seventeenth IFIP WG11.3Working Conference on Data and Applications Security,Estes Park,CO,August2003.9.X.Zhang,J.Park,and R.Sandhu.Schema Based XML Security:RBAC Approach.InProceedings of the Seventeenth IFIP WG11.3Working Conference on Data and Applications Security,Estes Park,CO,August2003.。