A unified approach to multiuser detectors for CDMA and their geometrical interpretations
华为认证试题及答案
华为认证最新试题及答案1.(判断题) HDFS采用的是“一次写入、屡次读取”的文件访问模型。
所以推荐一个文件经过创立、写入和关闭之后,就不要再去修改。
A. TrueB. False2.(多项选择题) HDFS的应用开发中,以下哪些是HDFS效劳支持的接口?A. BufferedOutputStream.writeB. BufferedOutputStream.flushC. FileSystem.createD. FileSystem.append3. (多项选择题) 关于kinit操作命令,如下哪些说法是错误的?A. 只能使用人机账号。
B. 只能使用机机账号。
C. 一个客户端不支持多个账号同时使用。
D. 执行此命令得到的票据在24小时后会超时,需再次执行kinit命令去重新。
4.(多项选择题)对于HBase Rowkey的设计原那么,如下描述正确的选项是?A. 访问权重高的属性值放在Rowkey前面。
B. 访问权重高的属性值放在Rowkey后半局部。
C. 离散度好的属性值放在Rowkey前半局部。
D. 离散度好的属性值放在Rowkey后半局部。
5.(单项选择题)HBase表的Rowkey设计是一个很重要的开发设计环节。
假设存在如下场景,最频繁的查询场景是基于手机号查询每个月、每半年的历史通话记录,以下哪个Rowkey设计是最优的?A. 姓名+手机号B. 日期+手机号C. 手机号+日期D. 手机号+姓名6.(单项选择题) FusionInsight HD中,关于Hive的分区(partition)功能,如下描述错误的选项是?A. 分区字段要在创立表时定义。
B. 分区字段只能有一个,不可以创立多级分区。
C. 使用分区,可以减少某些查询的数据扫描范围,进而提高查询效率。
D. 分区字段可以作为where字句的条件。
7.(判断题) FusionInsight HD系统的V100R002C60版本中,Hive仅支持基于MapReduce引擎的查询效劳,不支持基于Spark引擎的查询效劳。
UAP-nanoHD 四流802.11ac Wave 2 访问点数据手册说明书
D atasheet4x4 MU-MIMO 802.11ac Wave 2 Access PointModel: UAP-nanoHDFour-Stream 802.11ac Wave 2 Technology802.3af PoE CompatibilityScalable Enterprise Wi-Fi Management UniFi® is the revolutionary Wi-Fi system that combinesenterprise performance, unlimited scalability, and a central management controller. The UniFi nanoHD AP has a refined industrial design and can be easily installed using the included mounting hardware.Easily accessible through any standard web browser and the UniFi app (iOS or Android™), the UniFi Controller software is a powerful software engine ideal forhigh-density client deployments requiring low latency and high uptime performance.Use the UniFi Controller software to quickly configure and administer an enterprise Wi-Fi network – no special training required. RF map and performance features, real-time status, automatic UAP device detection, and advanced security options are all seamlessly integrated.FeaturesSave Money and Save Time UniFi comes bundled with a non-dedicated software controller that can be deployed on an on-site PC, Mac, or Linux machine; in a private cloud; or using a public cloud service. You also have the option of deploying the compact UniFi Cloud Key with built-in software.Powerful Hardware The UniFi nanoHD AP features the latest in Wi-Fi 802.11ac Wave 2 MU-MIMO technology. Intuitive UniFi Controller Software Configure and manage your APs with the easy-to-learn user interface. Expandable Unlimited scalability: build wireless networks as big or small as needed. Start with one (or upgrade to a five‑pack) and expand to thousands while maintaining a single unified management system.Extend Your CoverageWith the UniFi Controller software running in a NOC or in the cloud, administrators can manage multiple sites: multiple, distributed deployments and multi-tenancy for managed service providers. Below are some deployment examples.D a t a s h e eUniFi ControllerPacked with FeaturesUse the UniFi Controller to provision thousands of UniFi APs, map out networks, quickly manage system traffic, and provision additional UniFi APs.View Your RF EnvironmentUse the RF environment functionality of the UniFi nanoHD AP to detect and troubleshoot nearby interference, analyze radio frequencies, choose optimal AP placement, and configure settings.Powerful RF Performance FeaturesAdvanced RF performance and configuration features include spectral analysis, airtime fairness, and band steering.Detailed AnalyticsUse the configurable reporting and analytics to manage large user populations and expedite troubleshooting.Wireless UplinkWireless Uplink functionality enables wirelessconnectivity between APs for extended range. One wired UniFi AP uplink supports up to four wireless downlinks on a single operating band, allowing wireless adoption of devices in their default state and real-time changes to network topology.Guest Portal/Hotspot SupportEasy customization and options for Guest Portals include authentication, Hotspot setup, and the ability to use your own external portal server. Use UniFi’s rate limiting for your Guest Portal/Hotspot package offerings. Apply different bandwidth rates (download/upload), limit total data usage, and limit duration of use.All UniFi APs include Hotspot functionality:• Built-in support for billing integration using major credit cards.• Built-in support for voucher-based authentication.• Built-in Hotspot Manager for voucher creation, guest management, and payment refunds.• Full customization and branding of Hotspot portal pages.Multi-Site ManagementA single UniFi Controller running in the cloud can manage multiple sites: multiple, distributed deployments and multi-tenancy for managed service providers. Each site is logically separated and has its own configuration, maps, statistics, guest portal, and administrator read/write and read-only accounts.WLAN GroupsThe UniFi Controller can manage flexible configurations of large deployments. Create multiple WLAN groups and assign them to an AP’s radio. Each WLAN can be VLAN tagged.Dynamic VLAN tagging per Wi‑Fi station (or RADIUS VLAN) is also supported.DashboardUniFi provides a visual representation of your network’s status and delivers basic information about each network segment.RF MapMonitor UniFi APs and analyze the surrounding RF environment.InsightsUniFi displays the client types for a specific time period.UniFi AppManage your UniFi devices from your smartphone or tablet.802.11ac TechnologyInitial 802.11ac Wave 1 SU-MIMO (Single-User,Multiple Input, Multiple Output) technology allows an earlier-generation AP , such as the UniFi AC Pro AP , to communicate with only one client at a time.802.11ac Wave 2 MU-MIMO (Multi-User, Multiple Input, Multiple Output) technology allows a Wave 2 AP , such as the UniFi nanoHD AP , to communicate with multiple clients at the same time – significantly increasing multi‑user throughput and overall user experience. The following describes a 5-client scenario:MU-MIMO Assuming the same conditions, a Wave 2 AP provides up to 75% improvement 1 overall over a Wave 1 AP . This improvement increases wireless performance and/or serves more clients at the same performance level.4x4 Spatial Streams At any single time, a Wave 2 AP can communicate with the following MU-MIMO clients:• four 1x1 clients • two 2x2 clients• one 2x2 client and two 1x1 clients •one 3x3 client and one 1x1 clientA 4x4 Wave 2 AP delivers up to 33% greater performance 1 than a Wave 1 AP that is 3x3 in both radio bands.Real-World Performance The UniFi nanoHD AP is the UniFi 802.11ac Wave 2 AP with the smallest form factor. Combining the performance increases from MU-MIMO technology and the use of 4x4 spatial streams, the UniFi nanoHD AP delivers up to 125% greater performance 1 than a typical Wave 1 AP .Client Compatibility For optimal performance, use MU‑MIMO clients. SU‑MIMO clients will also benefit and gain up to 10-20% greater performance when used with the UniFi nanoHD AP .1 Actual performance values may vary depending on environmental and installation conditions.Single-Client Aggregate Throughput56%ImprovementUniFi AC Pro AP UniFi nanoHD AP10-Client Aggregate Throughput238%ImprovementUniFi AC Pro AP UniFi nanoHD APMbps100-Client Aggregate Throughput900%ImprovementUniFi AC Pro AP UniFi nanoHD APMbps* MbpsHigh-Density ScenariosFor high-density environments, such as a theater where there are numerous clients in a relatively small space, we recommend the UniFi nanoHD AP when a minimal footprint is also required.Both Wave 1 and Wave 2 APs offer 28 independent(non-overlapping) channels: three for the 2.4 GHz band and twenty‑five for the 5 GHz band, including DFS channels.When you use the 2.4 GHz band in a high-density location, you encounter self-interference and channel saturation. When you use the 5 GHz band, you can deploy smaller cells (coverage areas), so you can support more clients in any cell that deploys more than one AP .With the advantages of MU-MIMO technology and 4x4 spatial streams, the UniFi nanoHD AP can support more than triple the number of users 2 than a typical Wave 1 AP .Recommended Maximum Number of UsersUniFi AC Pro AP UniFi nanoHD APUsersTheoretical Maximum Number of UsersUniFi AC Pro AP UniFi nanoHD APUsersFor more information, go to:ubnt.link/UniFi-UAPs-High-Density2 Actual numbers may vary depending on environmental and installation conditions.Client Support802.11ac Wave 1 SU-MIMOUAP-AC-PROSU-MIMO: A Wave 1 AP communicates with oneclient at a time.802.11ac Wave 2 MU-MIMOUAP-nanoHDMU-MIMO with 1x1 clients: Each client radio ofthe UniFi nanoHD AP communicates with four 1x1clients at a time.UAP-nanoHDMU-MIMO with 2x2 and 1x1 clients: Each client radioof the UniFi nanoHD AP communicates with one 2x2client and two 1x1 clients at a time.UAP-nanoHDMU-MIMO with 3x3 and 1x1 clients: Each client radioof the UniFi nanoHD AP communicates with one 3x3client and one 1x1 client at a time.EnvironmentSimultaneous Dual-Band2.4 GHz Radio Rate2.4 GHz MIMO5 GHz Radio Rate5 GHz MIMOPoE ModeCeiling MountWall MountWireless UplinkDFS CertificationCamoWoodMarbleConcreteFabricBlackHardware OverviewDeploy the UniFi nanoHD AP in high-densityenvironments requiring maximum wireless performance and minimal footprint. The UniFi nanoHD AP features simultaneous, dual-band, 4x4 MU-MIMO technology and convenient 802.3af PoE compatibility. Available in single‑ and five‑packs.Low-Profile Mounting The UniFi nanoHD AP’slow‑profile ceiling mount (sold separately) allows you to seamlessly integrate the AP into its pact Form Factor The compact design delivers a cost-effective combination of value and performance.LED The unique LED provisioning ring providesadministrator location tracking and alerts for each device.Power over Ethernet (PoE) Standard The UniFi nanoHD AP can be powered by an 802.3af PoE compliant switch. We recommend powering your UniFi devices with a UniFi PoE Switch (sold separately). The UniFi nanoHD AP is compatible with all UniFi PoE Switches and 48V adapters.Superior Processing Power The UniFi nanoHD AP is capable of complex operations (guest control, filtering, and other resource-intensive tasks) that may slow down a lesser-equipped AP .Designed for Seamless IntegrationOptional covers (sold separately) allow the UniFi nanoHD AP to discreetly blend into its setting. Choose from the following designs:AccessoriesThe use of optional accessories* makes the UniFi nanoHD AP extremely versatile in its deployment. The UniFi nanoHD AP offers a variety of mounting and stylistic options to fit your individual application needs.* All accessories sold separately.nanoHD CoversThe UniFi nanoHD AP covers allow the nanoHD AP to integrate into a wide variety of backgrounds. Whether you are mounting your AP against a marble, concrete, or wood backdrop, the UniFi nanoHD AP will blend in seamlessly. The following nanoHD cover models are available in three-packs: • nHD-cover-Fabric-3• nHD-cover-Camo-3• nHD-cover-Concrete-3• nHD-cover-Wood-3• nHD-cover-Marble-3•nHD-cover-Black-3Versatile Mounting OptionsRecessed Ceiling MountModel: nanoHD-RCM-3Use the UniFi nanoHD AP Recessed Ceiling Mount for an integrated ceiling deployment. Designed as a low‑profile mounting option, the Recessed Ceiling Mount sits discreetly within your ceiling to create a sleek look. Available in three-packs.RetroFit MountModel: nanoHD-RetroFit-3The UniFi nanoHD AP RetroFit Mount makes upgrading to the UniFi nanoHD AP quick andconvenient. The RetroFit Mount allows you to mount the UniFi nanoHD AP over existing UniFi AP mounting brackets, with no additional tools needed. Available in three-packs.SpecificationsSpecifications are subject to change. Ubiquiti products are sold with a limited warranty described at: /support/warrantyThe limited warranty requires the use of arbitration to resolve disputes on an individual basis, and, where applicable, specify arbitration instead of jury trials or class actions.©2018-2019 Ubiquiti Networks, Inc. All rights reserved. Ubiquiti, Ubiquiti Networks, the Ubiquiti U logo, the Ubiquiti beam logo, airTime, andUniFi are trademarks or registered trademarks of Ubiquiti Networks, Inc. in the United States and in other countries. Apple and the Apple logo aretrademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc., registered in the U.S. and other countries. Android, Google, Google Play, the Google Play logo and other marks are trademarks of Google LLC. All other trademarks are the property of their respectiveowners.。
Apricorn Aegis Padlock SSD 加密USB 3.0 移动硬盘 产品说明说明书
FIPS VALIDATED 140-2 LEVEL 2 PORTABLE USB 3.0 DRIVE AES-XTS 256-BIT HARDWARE ENCRYPTIONSOFTWARE-FREE SETUP & OPERATIONONBOARD KEYPAD AUTHENTICATION SHARES NO CRITICAL SECURITY PARAMETERS WITH HOSTAEGIS CONFIGURATOR COMPATIBLEADMIN FORCED ENROLLMENTUSER FORCED ENROLLMENTINDEPENDENT ADMIN / USER PINSDATA RECOVERY PINSNO ADMIN RIGHTS NEEDEDIP66 CERTIFIED: DUST & WATER RESISTANTINTEGRATED SUPER SPEED USB 3.0 CABLEADMINISTRATOR MODE COMPATIBLE WITH ANY USB PORT AND OPERATING SYSTEM WINDOWS ®, MAC ®, LINUX, ETC.BUS-POWERED DRIVE RESET FEATURE UNATTENDED AUTO LOCK & SELF DESTRUCT PIN BRUTE FORCE PROTECTION TAA COMPLIANT / GSA DISCOUNTS 3-YEAR WARRANTY Visit our web site at or call 1-800-458-5448©2018 Apricorn, Inc. Corporate Offices: 12191 Kirkham Rd., Poway, CA. 92064FIPS 140-2 ENCRYPTED USB 3.0 SOLID STATE DRIVE Aegis Padlock SSD Aegis Padlock Solid State Drive Where super tough meets ultra secure you’ll find Apricorn’s Aegis Padlock SSD. Boasting a crush resistant, aluminum enclosure that is water resistant and impervious to dust and grit, this secure solid state USB 3.0 drive is as tough as they come. With no moving parts, this drive is drop and vibration resistant, unaffected by high humidity and works in extremes of itary-Grade 100% Hardware Encryption: Featuring AES-XTS 256-bit hardware encryption, the Aegis Padlock SSD seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is removed from its enclosure.Software-Free Design: The Aegis Padlock SSD is ready to use right out of no software, no drivers, no updates. It can even be utilized where no keyboard present. Completely cross-platform compatible, the Fortress excels virtually anywhere–PCs, MACs, Linux, or any OS with a powered USB port and a storage file system. Configurable: Create custom profiles and mass configure multiple Configurator-compatible Aegis devices at once with Apricorn’s new Configurator / Powered Hub bundle.Embedded Keypad: All PIN entries and controls are performed on the keypad of the Aegis Padlock SSD. No critical security parameters are ever shared with the host computer. FIPS 140-2 Level 2 Validated: The Aegis Padlock SSD’s FIPS 140-2 validation is the cryptography standard required by the US federal government for protection of sensitive data. It covers 11 areas of its cryptographic security system, including physical security, cryptographic key management and design integrity. Tested and validated by the National Institute of Standards and Technology (NIST) for use by the Federal governments of the USA, Canada and others, the Aegis Padlock SSD Drive is based on Apricorn’s FIPS 140-2 Level 2 validated encryption module as indicated by certificate #2835. The Padlock’s security policy is located on the NIST site at /groups/STM/cmvp/documents/140-1/140sp/140sp2835.pdf . The epoxy coated boundary includes all encryption functions and all Critical Security Parameters (CSPs) such as PIN storage, encryption key generation and storage, random number and seed generators, and all firmware storage. The FIPS module is a complete encryption system, and all CSPs never leave the boundary and are never shared with a host system. By design, the HDD/SSD that stores the encrypted data is excluded from this boundary to both maximize affordability and product line flexibility in capacity and form factor offerings.Lock-Override Mode: Designated for specific cases in which the drive needs to remain unlocked, e.g., during reboot, passing the drive through a virtual machine, or other similar situations that would normally prompt the Padlock SSD to automatically lock. When enabled, Lock-Override Mode allows the drive to remain unlocked through USB port re-enumeration and will not re-lock until USB power is interrupted.Two Read-Only Modes: Perfect for accessing data on the drive in a public setting to protect against USB viruses. Particularly important in forensics, Read-Only Mode is ideal for applications that require data to be preserved in its original, unaltered state and can’t be overwritten or modified. The Padlock SSD has two read-only modes. One is set by the admin within the admin mode and can’t be modified or disabled by anyone other than the admin. The second read-only mode can be set and disabled by anyone with a recognized PIN. Auto Lock feature and Self Destruct PIN: With the Aegis Padlock SSD you can set the unattended drive to lock after a pre-determined amount of time. In addition you can pre-program your own unique Self Destruct PIN which, once implemented, instantly destroys all PINs, data and creates a new encryption key.Brute Force Protection: The Aegis Padlock uses a three pronged approach to protect against a Brute Force attack. The first step is to deny access to the drive until the drive can verify the user PIN. After several incorrect attempts the drive will lock itself, requiring the drive to be plugged in again to input a PIN. This feature blocks automated attempts to enter PIN numbers. Lastly, after a predetermined number of failed PIN entries, the Padlock assumes it is being attacked and will destroy the encryption key and lock itself, rendering the data useless and requiring a total reset to redeploy the Padlock.Wear Resistant Key Pad - Water & Dust Resistant: Designed with protection in mind, the Aegis Padlock’s ‘wear resistant’ keypad and case is impervious to dust, grit and water , and hides key usage to avoid tipping off a potential hacker to the commonly used keys.Integrated USB 3.0 Cable: Never forget your cables again. Connect the drive at the flick of a fingertip.WORKS WITH:CONFIGURABLEFor more information on Aegis Padlock SSD and other innovative Apricorn products visit our web site at or call 1-800-458-5448 ©2018 Apricorn, Inc. Corporate Offices: 12191 Kirkham Rd., Poway, CA. 92064Revised July 2018*One gigabyte (GB) = one billion bytes; accessible capacity will be less and actual capacity depends on the operating environment and formatting.Aegis Padlock SSDFIPS 140-2 ENCRYPTED USB 3.0 SOLID STATE DRIVE。
再验证方案用英文
Verification Program: A comprehensive guide IntroductionIn today’s competitive digital landscape, it is essential to ensure the reliability and accuracy of software systems. Verification programs play a crucial role in validating the functionality and performance of various software applications. This document aims to provide a comprehensive guide to verification program design, emphasizing the utilization of English for better understanding and collaboration among international teams.Table of Contents1.What is Verification?2.Why is Verification Important?3.Types of Verification4.Key Components of a Verification Program–Test Planning–Test Design–Test Execution–Test Reporting5.Verification Program Workflow6.Challenges in Verification7.Best Practices for Successful Verification8.Conclusion1. What is Verification?Verification is the process of evaluating software systems to determine whether they comply with the specified requirements. It involves conducting systematic tests, inspections, and analyses to ensure that the software behaves as intended and meets the customer’s expectations.2. Why is Verification Important?Effective verification is critical to the success of software systems. It helps identify defects, ensures compliance with regulations and standards, and enhances the overall quality of the software. By thoroughly testing and validating the software, potential issues and risks can be mitigated, resulting in increased user satisfaction and reduced development costs.3. Types of VerificationThere are various types of verification techniques employed in software development. Some common types include:•Static Testing: This technique involves analyzing the software code or documentation without executing it. It includes techniques like code reviews, inspections, and walkthroughs.•Dynamic Testing: Unlike static testing, dynamic testing involves the execution of software to test its behavior. This includes techniques such as unit testing, integration testing, system testing, and acceptance testing.•Model-based Testing: This approach involves creating a model of the system and generating test scenarios based on the model.•Performance Testing: Performance testing focuses on evaluating system performance under different load conditions to identify performance bottlenecks and ensure optimal performance.4. Key Components of a Verification ProgramTest PlanningTest planning involves defining the objectives, scope, and resources required for the verification process. It includes tasks such as identifying test scenarios, creating test plans, and allocating resources.Test DesignTest design encompasses the creation of test cases and test scenarios based on the specified requirements. It involves defining inputs, expected results, and test execution steps.Test ExecutionTest execution involves running the test cases and scenarios on the software system and validating the actual results against the expected results. It includes tasks like test environment setup, test data generation, and test execution.Test ReportingTest reporting is the process of documenting and communicating the results of the verification process. It includes generating test reports, defect reports, and providing recommendations for further improvement.5. Verification Program WorkflowA typical verification program follows the following workflow:1.Define Verification Objectives: Clearly define the objectives andgoals of the verification program.2.Identify Verification Scope: Determine the scope of the verificationprogram, including the software modules and functionalities to be tested.3.Plan Verification Activities: Develop a detailed test plan, includingtest scenarios, test cases, and resource allocation.4.Execute Verification Tests: Execute the test cases and scenarios,ensuring that each step is documented and executed as planned.5.Analyze Test Results: Analyze the test results and identify anydeviations from expected outcomes.6.Report and Document: Generate test reports, defect reports, anddocumentation that summarize the results and findings.7.Perform Root Cause Analysis: Investigate the root causes of anydefects or issues encountered during the verification process.8.Iterate and Improve: Incorporate lessons learned from theverification process and implement necessary improvements for future cycles.6. Challenges in VerificationWhile verification plays a crucial role in software development, several challenges need to be addressed:•Complexity: As software systems become more complex, verification becomes more challenging, as it involves testing various functionalities andcomponents.•Time and Resource Constraints: Limited time and resources can impede the thoroughness of the verification process.•Requirement Changes: Changes in project requirements can affect the scope and planning of the verification program.•Lack of Standardization: A lack of standardized verification practices can hinder effective collaboration among international teams.7. Best Practices for Successful VerificationTo overcome the challenges and ensure successful verification, developers can follow these best practices:•Early Verification: Start the verification process as early as possible, even during the software requirements gathering phase.•Clearly Defined Requirements: Ensure that requirements are well-documented and clearly understood by all stakeholders.•Utilize Test Automation: Automation can improve the efficiency and effectiveness of the verification process.•Collaboration and Communication: Foster effective communication and collaboration among team members to exchange ideas and share insights.•Standardized Practices: Establish standardized verification practices across teams to ensure consistency and facilitate collaboration.ConclusionVerification programs are essential for the successful development and deployment of software systems. By following this comprehensive guide, software developers can design and implement effective verification programs that minimize defects, meet customer expectations, and enhance overall software quality. Emphasizing the use of English is crucial to facilitate collaboration among international teams and ensure clarity in communication.。
CISP试题-11月考试最新题目-红字为模糊的题目_CISP试题_CISP试题
CISP 2012.111. 关于信息安全保障,下列说法正确的是:A. 信息安全保障是一个客观到主观的过程,即通过采取技术、管理等手段,对信息资源的保密性、完整性、可用性提供保护,从而给信息系统所有者以信心B. 信息安全保障的需求是由信息安全策略所决定的,是自上而下的一个过程,这个过程中,决策者的能力和决心非常重要C. 信息系统安全并不追求万无一失,而是要根据基金预算,做到量力而行D. 以上说法都正确2. 人们对信息安全的认识从信息技术安全发展到信息安全保障,主要是由于:A. 为了更好地完成组织机构的使命B. 针对信息系统的攻击方式发生重大变化C. 风险控制技术得到革命性的发展D. 除了保密性,信息的完整性和可用性也引起了人们的关注3. 关于信息安全发展的几个阶段,下列说法中错误的是:A. 信息安全的发展是伴随着信息技术的发展,为应对其面临的不同威胁而发展起来的B. 通信安全阶段中,重要的是通过密码技术保证所传递信息的保密性、完整性和可用性C. 信息安全阶段,综合了通信安全阶段和计算机安全阶段的需求D. 信息安全保障阶段,最重要的目标是保障组织机构使命(任务)的正常进行4. 按照技术能力、所拥有的资源和破坏力来排列,下列威胁中哪种威胁最大?A. 个人黑客B. 网络犯罪团伙C. 网络战士D. 商业间谍5. 信息系统安全主要从哪几个方面进行评估?A. 1个(技术)B. 2个(技术、管理)C. 3个(技术、管理、工程)D. 4个(技术、管理、工程、应用)6. 完整性机制可以防范以下哪种攻击?A. 假冒源地址或用户的地址的欺骗攻击B. 抵赖做过信息的递交行为C. 数据传输中被窃听获取D. 数据传输中被篡改或破坏没拍到7的问题,缺。
A. 策略B. 检测C. 响应D. 加密8. 依据信息系统安全保障评估框架,确定安全保障需求考虑的因素不包括下列哪一方面?A. 法规政策的需求B. 系统的价值C. 系统需对抗的威胁D. 系统的技术构成9. 依据国家标准GB/T20274《信息系统安全保障评估框架》,在信息系统安全目标中,评估对象包括哪些内容?A. 信息系统管理体系、技术体系、业务体系B. 信息系统整体、信息系统安全管理、信息系统安全技术和信息系统安全工程C. 信息系统安全管理、信息系统安全技术和信息系统安全工程D. 信息系统组织机构、管理制度、资产10.关于信息安全保障管理体系建设所需要重点考虑的因素,下列说法错误的是:A. 国家、上级机关的相关政策法规需求B. 组织的业务使命C. 信息系统面临的风险D. 项目的经费预算11. 在密码学的Kerchhoff假设中,密码系统的安全性仅依赖于____________。
产品说明书:FCC规则部分15的合规设备
I N S T A L L A T I O N I N S T R U C T I O N SThis device complies with part 15 of the FCC rules. Operation is subject to the following 2 conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.This equipment has been tested and found to comply with the limits of a Class B digital device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio or televisioncommunications. However, there is no guarantee that the interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:•Reorient or relocate the receiving antenna •Increase the separation between the equipment and receiver •Connect the equipment to an outlet on a circuit other than that to which the receiver is connected Consult the dealer or an experienced radio/TV technician for helpSL151SMART-LIFT™ Electric Ceiling LiftSL151Installation Instructions2DISCLAIMERMilestone AV Technologies, and its affiliated corporations and subsidiaries (collectively, "Milestone"), intend to make thismanual accurate and complete. However, Milestone makes no claim that the information contained herein covers all details,conditions or variations, nor does it provide for every possible contingency in connection with the installation or use of this product. The information contained in this document is subject to change without notice or obligation of any kind. Milestone makes no representation of warranty, expressed or implied,regarding the information contained herein. Milestone assumes no responsibility for accuracy, completeness or sufficiency of the information contained in this document.Chief® is a registered trademark of Milestone AV Technologies.All rights reserved.IMPORTANT SAFETY INSTRUCTIONSWARNING alerts you to the possibility ofserious injury or death if you do not follow the instructions.CAUTIONalerts you to the possibility ofdamage or destruction of equipment if you do not follow thecorresponding instructions.WARNING :FAILURE TO READ ANDFOLLOW THE FOLLOWING INSTRUCTIONS CAN RESULT IN SERIOUS PERSONAL INJURY , DAMAGE TO EQUIPMENTOR VOIDING OF FACTORY WARRANTY . It is the installer’sresponsibility to make sure all components are properly assembled and installed using the instructions provided.IMPORTANT ! :Model SL151 is suitable for use in OtherEnvironmental Air Space in Accordance with Section 300.22(C)of the National Electrical Code.When using an electrical mounting system, basic precautionsshould always be followed, including the following:READ ALL INSTRUCTIONS BEFORE USING THISPRODUCTDANGER:TO REDUCE THE RISK OFELECTRIC SHOCK:1.Always turn off power at source before cleaning.WARNING:TO REDUCE THE RISK OFBURNS, FIRE, ELECTRIC SHOCK, OR INJURY TO PERSONS:•Always turn off power at source before putting on or taking off parts.•Use this mounting system only for its intended use as described in these instructions. Do NOT useattachments not recommended by the manufacturer.•Never operate this mounting system if it has a damaged test cord or test plug. If it is not working properly during testing, return the mounting system to a service center for examination and repair.•Keep the test power cord away from heated surfaces.•Never operate the mounting system with the airopenings blocked. Keep the air openings free of lint,hair, and the like.•Never drop or insert any object into any opening.•Do not use outdoors unless marked for outdoor use.•Route cords and cables as shown in the installation instructions.•To disconnect, turn all controls to the off position, then turn off power at source.WARNING :RISK OF ELECTRIC SHOCK!Connect this mounting system to a properly grounded outlet only. See Grounding Instructions.CAUTION:Changes or modifications to thisunit not expressly approved by the manufacturer can void the units FCC compliance rating and make the unit illegal to operate.WARNING :Failure to provide adequatestructural strength for this component can result in serious personal injury or damage to equipment! It is the installer’s responsibility to make sure the structure to which thiscomponent is attached can support five times the combined weight of all equipment. Reinforce the structure as required before installing the component.WARNING :Exceeding the weight capacitycan result in serious personal injury or damage to equipment! It is the installer’s responsibility to make sure the weight of all components attached to the SL151 does not exceed 35 lbs (15.9 kg).WARNING :RISK OF INJURY! Do not placevideo equipment such as televisions or computer monitors on the ceiling panel of the SL151.NOTE:This system has no user serviceable parts.--SAVE THESE INSTRUCTIONS--Installation Instructions SL1513TOOLS REQUIRED FOR INSTALLATIONPARTSLEGENDTighten FastenerApretar elemento de fijación Befestigungsteil festziehen Apertar fixador Serrare il fissaggio Bevestiging vastdraaien Serrez les fixations Loosen FastenerAflojar elemento de fijación Befestigungsteil lösen Desapertar fixador Allentare il fissaggio Bevestiging losdraaien Desserrez les fixationsPhillips Screwdriver Marcar con lápiz Stiftmarkierung Marcar com lápis Segno a matita Potloodmerkteken Marquage au crayon Adjust Ajustar Einstellen Ajustar Regolare Afstellen AjusterSL151Installation Instructions4DIMENSIONSTABLE OF CONTENTSDisclaimer.....................................................2Tools Required For Installation.................... 3Parts..............................................................3Legend..........................................................3Dimensions...................................................4Installation Requirements..............................5Power Requirements.....................................5Pre-test Lift Before Installation.......................5Power Requirements And Wiring...................5Grounding Instructions.................................. 6Removing Ceiling Panel................................ 6Installing in Ceiling.........................................6-Installing In A Suspended Ceiling...............6-Installing In A Wood Framework (Joists)....7Installing Projector On SL151 (7)Adjustments...................................................7Connecting Control Wiring.............................8Connecting To Power Supply.........................8Wiring Options............................................... 9Re-Attaching Ceiling Panel............................9Table 1: Wiring Table...................................10Table 2: Internal Terminal Descriptions........11Internal/External Wiring TerminalDescriptions (12)Installation Instructions SL1515Figure 25.Place the jumper wire (H) on the external wiring terminal contacts labeled 2and 5, and wire the push button assembly (D) to contacts 1 (red) and 6 (black). (See Figure 3).Figure 36.Plug in the SL151 test cord. (See Figure 2)NOTE:(See Figure 2) for location of external wiring terminal.(See Figure 4) for location of internal wiring terminal.Figure 4Power Requirements and WiringThe SL151 requires 120VAC, 60 Hz and 12 amps power to operate.IMPORTANT ! :This product must be grounded. If it shouldmalfunction or break down, grounding provides a path of least resistance for electric current to reduce the risk of electric shock.Grounding InstructionsThis product is equipped with a test cord having an equipment-grounding conductor and a grounding plug. The plug must be plugged into an appropriate outlet that is properly installed and grounded in accordance with all local codes and ordinances.Wire push button assembly (D) (1-red,6-black)[Some parts not shown for clarity]Internalwiring terminalSL151Installation Instructions6WARNING:RISK OF ELECTROCUTION! All electricalwiring required for installation should be installed by aqualified electrician.WARNING:PINCH HAZARD! FINGERS OR HANDSBETWEEN MOVING PARTS CAN LEAD TO SEVERE PERSONAL INJURY! Keep fingers and hands away from mount when operating.7.Press the push button to test the SL151 while it is still in the pre-test position.•Press when the lift is at its extended position and it willretract.•Press when the lift is at its retracted position and it willextend.•Press while the lift is moving and it will stop.•Leave SL151 in the open position.Removing Ceiling Panel1.Remove and save screws attaching guide wires to ceiling panel. (See Figure 5)Figure 52.Lift up on each corner of ceiling panel to remove pan from clips. (See Figure 6) and (See Figure 7)Figure 6Figure 7INSTALLING IN CEILINGWARNING:IMPROPER INSTALLATION CAN LEAD TOLIFT FALLING CAUSING SEVERE PERSONAL INJURY ORDAMAGE TO EQUIPMENT! It is the installers responsibility to make certain the structure to which the lift is beingmounted is capable of supporting five times the weight of the lift and all attached equipment. Reinforce the structure as required before installing the lift.NOTE:The following instructions assume a suitable mountingstructure and surface exists prior to installation and all power and signal wires and cables have been properly installed.Installing in a Suspended CeilingNOTE:The SL151 may be suspended from three 3/8 in.diameter x 8 in. length (minimum) Grade 2 or better threaded rods (not provided) which are secured to a 1-5/8" x 1-5/8" 12ga metal framing channel (spanning a maximum of 5 feet--not provided) by Grade 2 or better 3/8" channel nuts (not provided).1.Turn SL151 over and place onto threaded rods, inserting the rods into the three slots on top of the SL151 housing.(See Figure 8)2.Secure the threaded rods to the SL151 with Grade 2 or better 3/8 in. jam nuts (not provided) and washers (one of each on inside and one of each on outside-not provided).Figure 8Guide Wire(one on each side)Remove Screw (one on each side)Ceiling PanelGuide WireCeiling PanelClipCeiling Panel RemovedCAUTION:Avoid stressing or bending the lift during installation.e the provided push button (D) to operate the SL151 upand down, ensuring that all clearances are adequate. Installing Projector on SL151NOTE:bracket (a Listed accessory).1.Attach the SLB bracket to the projector following theinstructions included with the bracket.2.Attach the bracket with the projector to the SL151, adjustingleft or right by using the various attachment points in theSL151. (See Figure 10)•Adjust one or the other side of the bracket backward or forward by loosening two screws on each side. (SeeFigure 12)•Adjust bracket as required.•Tighten screws. (See Figure 12)78Unplug the SL151’s test cord (used for testing).Remove the jumper wire and supplied push button wiring (previously installed in the section) from the external terminal block. (See Figure 3)Connect control wiring following instructions included withthe controller and information in Table 1: Wiring Table NOTE:Any knockouts removed in the SL151 must bereplaced with a supplied rubber grommet (G).Feed the video and/or communications cables through theknockout in the rear or top of the lift and connect it to the projector.Ensure there is enough slack in the cables to allow forup and down movement of the lift.Secure cables as necessary using supplied mounting pads (E) and cable ties (B).CAUTION:KEEP SL151 OPEN WHILE PROJECTOR ISRUNNING OR IN COOLING MODE! Premature bulb failure or damage to electrical components may occur if lift closes.NOTE:If SL151 is cycled up and down repeatedly the motor’sthermal overload protection will stop operation.Operation will resume when the thermal overload resets (usually within 3 to 5 minutes).Connecting to Power SupplyIMPORTANT ! :This product must be connected to agrounded metal, permanent wiring system, or an equipment-grounding conductor must be run with the circuit conductors and connected to the equipment-grounding terminal or lead on the product.1.Disconnect and remove power inlet from interior junctionbox.2.Hardwire unit to a 120V 60Hz 12-amp power source.NOTE:This unit was designed to have conduit run directly intothe back of the interior junction box.WARNING:performed by a licensed electricianfollowing all local codes and ordinances.WARNING:DISCONNECT AND TERMINATE POWER LEADS PROPERLY MAY RESULT IN PERSONAL INJURY OR EQUIPMENT DAMAGE!! Licensed electrician must disconnect and terminate the leads to the power cord receptacle, and must hard wire the SL151 to a 12-amp power source.CAUTION:not lined up properly with rectangular holes.Figure 142.Carefully insert clips into rectangular holes in ceiling panel.3.Reattach guide wires (two places) to ceiling panel, usingscrews removed earlier. (See Figure 15)9SL151Installation Instructions10Table 1: WIRING TABLEFigure 16NOTE:The numbers listed in the SL151 Internal and SL151 External columns refer to the corresponding numbers located whereindicated in the wiring pictures. (See Figure 16)EXTERNAL WIRINGINTERNAL WIRINGTable 2: INTERNALTERMINAL DESCRIPTIONS1112Figure 17131415Chief Manufacturing, a products division of Milestone AV Technologies8820-000041 Rev022010 Milestone AV Technologies, a Duchossois Group Company04/10USA/International A8401 Eagle Creek Parkway, Savage, MN 55378P800.582.6480 / 952.894.6280F877.894.6918 / 952.894.6918Europe A Fellenoord 130 5611 ZB EINDHOVEN, The NetherlandsP+31 (0)40 2668620F+31 (0)40 2668615Asia Pacific A Office No. 1 on 12/F, Shatin Galleria18-24 Shan Mei StreetFotan, Shatin, Hong KongP852 2145 4099F852 2145 4477。
加密方案是无条件安全的。但是除非是一次一密(one产品
河海大学硕士学位论文于2E移动支付安基JM的全方案研究与实践果由一个加密方案产生的密文中包含的信息不足以惟一决定文,对应的明则称此加密无条方案是件安全的。
但是除非是一次一密(nte)oeipd方案,-am实际中是没有无条件安全的加密算法的W因加密.此,算法的户所能。
用做的就是满足下列准则中的一个或两个:一个是破译该密码的成本超过被加密信息的价值;另一个是破译该密码的时间超过该信息有用的生命周期。
.22.1.3可用性和互操作性问题,除了安全性可用性也非常关键。
也就是移动支付服务是否易于使用以及使用所带来的用户体验的好坏也是影响移动支付发展的一个重要因素门。
由于现有的用户终端设备的硬件条件,移动通信网络所采用的协议都有相当大的局限性,在可用性设计的方面仍有许多限制。
由于移动支付必须要在移动终端设备上进行操作,而像手机等移动终端设备在色屏幕大小、彩表现力、芯片键盘、处理能力、内存大小等硬件配置方面都是有限的,此外还要受到无线网络的带宽和延时问题的影响,这就决定了移动设备不C可能像P机一样提供给用户很好的用户体冈验或易用性。
另外,互操作问题也不仅仅局限于用户终端,还包括用户在支付时直接打交机、O机、自道的收款PS动贩售机等等,这些都需要制定一些行业标准,与相关行业企业达成共识。
13现有研究关键技术.现在国内外对于移动支付的安全研究比多,也提出了许多安全方案。
较20年,AioriHlae等人提出了一种称为WS’ 102atealFua.lKflI” E{的方法。
它结E和TSS优势,T合了STWL/L的加强了AL的基于WPO移动支付系统的安全性。
它E使用ST协议的三个方面:永久签名保证完整性:提供端到端交易网关证书:被支付者对交易进行确认。
外也另TSL协议的T使用了WL/S两个方面:安全参数商定和支付者与被支付者的证明。
这样使得有用数据与加密数据分离,保障了端到端的机密性:也能防止被支付者的击。
也避免了重放攻同时移动环境E的注册和下ST验证过程太繁重,使?煌 耐ㄑ恫棵?可以L证书使用相同的TS进行各种操作。
官方PCTI考试题
PCTI认证考试模拟题一、选择题(单选,35题,每题2分)1. HTML 的主体内容放在:()A. <head〉.。
</head> 中间B. 〈title>。
.。
〈/title> 中间C。
<body>。
</body> 中间D. 〈form〉。
.〈/form> 中间2。
以下哪种语句是实现表单提交的动作()A。
〈input type=submit name=**〉B. 〈input type=reset name=**〉C。
〈input type=text name=**>D。
<input type=password name=**>3. 以下哪种类型是B/S构架的正确描述()A. 需要安装客户端的软件B. 不需要安装就可以使用的软件C. 依托IE浏览器的邮件系统D. 依托outlook等软件的邮件系统4. 以下哪种表达方式是错误的()A. <form action=”url” method=*target=#> 〈/form〉B. 〈input type=submit>〈/input>C。
<select name=*〉〈option value=*selected〉。
</select〉D。
〈html〉〈head〉〈title></title>〈/head>〈/html>5。
以下哪种提交方式是隐藏提交()A. type = hiddenB。
type = textC. type = passwordD。
type = checkbox6。
以下对于CSS的表达哪个是错误的()A。
可以将CSS的代码保存在其它文件中,在需要时调用比如〈link href=”text/text.css” rel=”stylesheet" type=”text/css"> B. 可以把CSS的代码直接写在HTML中〈style type=”text/css”>〈!-- .类名{属性。
纹理物体缺陷的视觉检测算法研究--优秀毕业论文
摘 要
在竞争激烈的工业自动化生产过程中,机器视觉对产品质量的把关起着举足 轻重的作用,机器视觉在缺陷检测技术方面的应用也逐渐普遍起来。与常规的检 测技术相比,自动化的视觉检测系统更加经济、快捷、高效与 安全。纹理物体在 工业生产中广泛存在,像用于半导体装配和封装底板和发光二极管,现代 化电子 系统中的印制电路板,以及纺织行业中的布匹和织物等都可认为是含有纹理特征 的物体。本论文主要致力于纹理物体的缺陷检测技术研究,为纹理物体的自动化 检测提供高效而可靠的检测算法。 纹理是描述图像内容的重要特征,纹理分析也已经被成功的应用与纹理分割 和纹理分类当中。本研究提出了一种基于纹理分析技术和参考比较方式的缺陷检 测算法。这种算法能容忍物体变形引起的图像配准误差,对纹理的影响也具有鲁 棒性。本算法旨在为检测出的缺陷区域提供丰富而重要的物理意义,如缺陷区域 的大小、形状、亮度对比度及空间分布等。同时,在参考图像可行的情况下,本 算法可用于同质纹理物体和非同质纹理物体的检测,对非纹理物体 的检测也可取 得不错的效果。 在整个检测过程中,我们采用了可调控金字塔的纹理分析和重构技术。与传 统的小波纹理分析技术不同,我们在小波域中加入处理物体变形和纹理影响的容 忍度控制算法,来实现容忍物体变形和对纹理影响鲁棒的目的。最后可调控金字 塔的重构保证了缺陷区域物理意义恢复的准确性。实验阶段,我们检测了一系列 具有实际应用价值的图像。实验结果表明 本文提出的纹理物体缺陷检测算法具有 高效性和易于实现性。 关键字: 缺陷检测;纹理;物体变形;可调控金字塔;重构
Keywords: defect detection, texture, object distortion, steerable pyramid, reconstruction
II
PFUlimited 2022年版FI-8150扫描仪说明书
E ciency optimized, simplicity achie v ed, with expanded software functionalities The scanner driver, PaperStream IP, comes with a simplified, user-friendly interface thatprovides icon visibility for easy setting config-urations. Users can consistently achieve scanned outputs of correct orientations withthe "Automatic Rotation" function, and store frequently scanned documents in specific formats using the "pattern matching" method.Efficiency with simplification brings users, a reduction to operation time as well on frequent and routine operations like deleting blank pages, or correcting page orientations, just by following the optimal settings suggest-ed by the “Settings Assistant” on the integrat-ed PaperStream Capture software. Documents can be retrieved more efficiently with the "PDFkeyword setting" function, instead of being constrained to file names alone.Optimized high-quality imagesThe fi-8150 comes with “Clear Image Capture”, a unique and dedicated image correction technology that generates unparalleled, high-definition images while keeping power consumption to the minimum. Quality images with no missing edges can be ensured with the scanner’s Skew Reducer mechanism.Better usability and exibility for any environ-mentThe fi-8150 supports multiple operation modes according to users’ environments, may that require sharing among teams with PC-less colleagues, or LAN connectivity and USB 3.2.The flexibility to use with imprinter options opens up the capability for total document management and assists in documentarchiving requirements that are prevalent in many industries. Reliable. State-of-art feeding and optical technologies.Quality images. The best you can get.Paper handling. Scan with confidence.State-of-art feeding technology - streamline work owIn the “Manual Feed Mode”, the fi-8150 scanscopy forms and passports or booklets up to thicknesses of 7 mm with the carrier sheet. Precise multi-feed detection on a wide range of documents like plastic cards and documents with attachments, enable contin-ual scanning with the same profiles. In addition, the “Automatic Separation Control” optimizes paper feed to match the number of sheets loaded, preventing interruptions. “Image Monitoring” also performs checks, real-time, for image skews, and providesenhanced paper protection.Efficiency at new heights with evolved feedingDatasheetFUJITSU Image Scanner fi-8150Datasheet FUJITSU Image Scanner fi-8150ContactTrademarksISIS is a trademark of Open Text. Microsoft, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. macOS is a trademark of Apple Inc., registered in the U.S. and other countries. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. Any other products or company names appearing in this document are the trademarks or registered trademarks of the respective companies.Safety PrecautionsPlease carefully read the safety precautions prior to the use of this device and follow the recommended instructions for correct use. Do not place this device in wet, moist, highly humid, dusty or oily areas. Use of this device under such conditions may result in electrical shock, fire or damage to the device. Please use this device within the power ratings listed.ENERGY STAR®PFU Limited, a Fujitsu company, has determined that this product meets the ENERGY STAR® guidelines for energy efficiency. ENERGY STAR® is a registered trademark of the United States.Specifications are subject to change without notice. Visit your local Fujitsu website for more information.*1 Actual scanning speeds may vary with data transmission and software processing times. *2 Indicated speeds are from using JPEG compression. *3 Indicated speeds are from using TIFF CCITT Group 4 compression.*4 Selectable maximum resolution may vary depending on the length of the scanned document. *5 Limitations may apply to the size of documents that can be scanned, depending on system environment, when scanning at high resolution (over 600 dpi). *6 Maximum document width possible for scanning is 240 mm (9.5 inch). *7 For use with PaperStream NX Manager, the maximum resolution supported is 400 dpi, with maximum lengths ranging with resolution. Simplex: 1,828.8 mm (72 in.) [below 300 dpi], 355.6 mm (14 in.) [below 400 dpi]. Duplex: 863.6 mm (34 in.) [below 300 dpi], 355.6 mm (14 in.) [below 400 dpi]. *8 Thicknesses of up to 128 to 209 g/m² (34 to 56 lb) can be scanned for A8 (52 x 74 mm / 2.1 x 2.9 inch) sizes. *9 Booklet scanning requires use of Booklet Carrier Sheets. Indicated thickness is inclusive of Booklet Carrier Sheet thickness. *10 Continuous feeding is supported when scanning up to 10 unembossed cards with thicknesses of 0.76 mm or less. *11 Maximum capacity depends on paper weight and may vary. *12 Capable of setting additional documents while scanning. *13 Numbers are calculated using scanning speeds and typical hours of scanner use, and are not meant to guarantee daily volume or unit durability. *14 Excludes the ADF paper chute and stacker. *15 Functions equivalent to those offered by PaperStream IP may not be available with the Image Scanner Driver for macOS/Linux or WIA Driver. *16 Refer to the fi Series Support Site for driver/software downloads and full lineup of all supported operating system versions. https:///global/support/products/computing/peripheral/scanners/fi/.4,000,000 printed characters or 6 months after opening the packageCA00050-0262Print CartridgeEvery 200,000 sheets or one year PA03670-0002Pick Roller Every 200,000 sheets or one year PA03810-0001Brake Roller ConsumablesPaperStream Capture Pro optional licensePA43404-A665PaperStream Capture Pro Scan Station (WG)Reads PDF417, QR code, Data Matrix, Aztec CodePA43404-A4332D Barcode for PaperStreamPack of single sheetPA03810-0020Booklet Carrier Sheet Pack of 3 sheets PA03770-0015 Photo Carrier Sheets Pack of 5 sheets PA03360-0013 Carrier Sheets Prints on the back of the document PA03810-D201 Post Imprinter (FI-819PRB) OptionsADF paper chute, AC cable, AC adapter, USB cable, Setup DVD-ROMIncluded ItemsMulti image output, Automatic color detection, Blank page detection, Dynamic threshold (iDTC), Advanced DTC, SDTC,Error diffusion, Dither, De-Screen, Emphasis, Dropout color (None/Red/Green/Blue/White/Saturation/Custom), sRGBoutput, Hole punch removal, Index tab cropping, Split image,De-Skew, Edge filler, Vertical streaks reduction, Background pattern removal, Cropping, Static thresholdImage Processing FunctionsPaperStream IP Driver (TWAIN/TWAIN x64/ISIS), WIA Driver *¹⁵, Image Scanner Driver for macOS (ICA)*¹⁵*¹⁶, Image Scanner Driver for Linux (SANE)*¹⁵*¹⁶, PaperStream Capture,PaperStream ClickScan *¹⁶, Software Operation Panel, Error Recovery Guide, ABBYY FineReader for ScanSnap™*16, Scanner Central AdminIncluded Software / DriversWindows® 11, Windows® 10, Windows® 8.1, Windows® 7, Windows Server® 2022, Windows Server® 2019, Windows Server® 2016, Windows Server® 2012 R2, Windows Server® 2012, Windows Server® 2008 R2, macOS, Linux (Ubuntu)Supported Operating System4 kg (8.8 lb)Weight300 x 170 x 163 mm (11.8 x 6.7 x 6.4 inch )Dimensions *¹⁴(Width x Depth x Height)ENERGY STAR®, RoHSEnvironmental Compliance 15 to 80% (non-condensing)Relative Humidity5 to 35 °C (41 to 95 °F)Temperature Operating Environment 0.2 W or lessAuto Standby (Off) Mode 2.0 W or less (LAN) / 1.4 W or less (USB)Sleep Mode21 W or less / 17 W (Eco mode)Operating Mode Power Consumption AC 100V - 240V 50/60 Hz Power Requirements 10BASE-T, 100BASE-TX, 1000BASE-T EthernetUSB 3.2 Gen1x1 / USB 2.0 / USB 1.1USB Interface Image monitoringPaper Protection Overlap detection (Ultrasonic sensor), Length detection Multifeed Detection 8,000 sheetsExpected Daily Volume *¹³100 sheets (A4 80 g/m² or Letter 20 lb)ADF Capacity *¹¹*¹²Less than 7 mm (0.276 inch )*⁹20 to 465 g/m² (5.3 to 124 lb)*⁸Plastic Card 1.4 mm (0.055 inch ) or less *¹⁰Booklet Paper Paper Weight (Thickness)6,096 mm (240 inch )Long Page Scanning *⁷48 x 50 mm (1.9 x 2 inch)Minimum215.9 x 355.6 mm (8.5 x 14 inch)Maximum *⁶Document Size White / Black (selectable)Background Colors Color: 24-bit, Grayscale: 8-bit, Monochrome: 1-bit Output Format 50 to 600 dpi (adjustable by 1 dpi increments),1,200 dpi (driver)*⁵Output Resolution *⁴(Color / Grayscale / Monochrome)600 dpiOptical ResolutionRGB LED x 2 (front x 1, back x 1)Light Source CIS x 2 (front x 1, back x 1)Image Sensor Type Simplex: 50 ppm (200/300 dpi)Duplex: 100 ipm (200/300 dpi)Scanning Speed *¹ (A4 Portrait)(Color *²/Grayscale *²/Monochrome *³)ADF (Automatic Document Feeder) / Manual Feed, DuplexScanner TypeTechnical InformationDatasheet FUJITSU Image Scanner fi-8150IndonesiaPT Fujitsu Indonesia Tel: +62 21 570 9330*************************/id/scannersMalaysiaFujitsu (Malaysia) Sdn Bhd Tel: +603 8230 4188askfujitsu .my @/my/scannersPhilippinesFujitsu Philippines, Inc. Tel: +63 2 841 8488 ***************.com/ph/scannersSingaporeFujitsu Asia Pte Ltd Tel: +65 6512 7555 *******************/sg/scannersThailandFujitsu (Thailand) Co., Ltd. Tel: +66 2 302 1500 info .th @/th/en/scannersVietnamFujitsu Vietnam Limited Tel: + 84 4 2220 3113 sales -vn @/vn/en/scanners。
CedCommerce Inc. 客户信用限额扩展用户指南说明书
CUSTOMER CREDIT LIMITUSER GUIDECedCommerce Inc.This document will explains the feature and functionality of CUSTOMER CREDIT LIMIT extension by CedCommerce for your Magento® Store.Magento® Editions CompatibilityCommunity- 2.0.x , 2.1.x , 2.2.xFront End Demo: h ttp:///magento2/customer-credit-limitBackend Demo: h ttp:///magento2/customer-credit-limit/adminConfidential Information NoticeCopyright © CedCommerce 2018 All Rights Reserved. Any unauthorized reproduction of this document is prohibited.The document and the information it contains may not be reproduced or disclosed to any unauthorized users without the prior written permission from CedCommerce Inc.Product DescriptionThe Customer Credit Limit extension facilitates admin to set the credit limit for customers thereby adding payment method"Pay on Account",that works towards accepting credit orders.The customer can place an order via"Pay on Account"payment method as long as he does not exceeds the credit limit. This Feature allows a merchant to brand their Store Credit as their own.When we talk about a B2B business where bulk purchasing is done,allowing your customers to purchase goods keeping in terms with your approved credit limit,plays a major role in uplifting your business.Credit limit2.x adds a payment method"Pay on Account",which is used to accept credit orders.If a customer exceeds the credit limit provided him by the admin,the customer can no longer order with the "Pay on Account"method,Credit Limit exceed limit message is shown on the Checkout page.With our Customer Credit Limit Extension even customers can also keep a track of their available credit.Outstanding Features of ExtensionFor Customers:●Use Store Credit Limit provided to him to pay for his order●Customer can check the details of their Used and Remaining limit●Refund for the product ordered via credit limit is easily managed for the customer.For Admin:●Select the customer whom to award the Credit Limit●View the list of customers who are using the Credit Limit feature●Manually Add or Subtract Credit for Customers●Refund for the product ordered via credit limit is easily managed for the customer.Benefit:●100% open source●Easy Installation and Extension Configuration Process●User-friendly interfaceGeneral ConfigurationIn order to configure your Customer Credit Limit Extension,login into the Magento administrative panel, and select Stores > Configuration > Credit LimitEnable Customer Credit Limit Option t o Y ES t o enable the feature for you store.Assign Credit Limit to CustomerTo configure the Credit Limit for any customer admin need to assign the credit amount for each customer individually as per the history.He can even close close the feature for any of the individual customer any time.To assign the credit limit to any customer,admin can navigate to C ustomer<Credit Limits<Add Credit LimitAdding the Credit Limit AmountSelecting the Customer to whom to provide the Credit LimitNow the Credit limit to the customer has been provided and he can purchase the product from store for the amount.Admin can also track the customer Credit details(Credit Amount Provided/Used Credit Amount/ Remaining Credit Amount)Store Credit Page (Logged In User)To view the credit limit customer can check his detail from the My Account option and then move to Credit Limit tab.Here he can view all the information regarding his total credit that was provided by the admin,amount how credit he has utilized and the amount of credit that has been left.Customer can also view all of his order placed via credit limit option, and track the detail for that.Customer Purchase via Credit ProvidedIf a customer has been assigned with the Credit Limit,the Credit component will display above the payment method at the time of checkout.If the customer does not have a Credit balance,the component will not display.Check Credit Limit UpdateNote:T o clear the credit amount used by the customer,he need to pay via offline method to the admin and then admin update his detail in the system therefore his limit his refreshed again.Admin Updating the Credit LimitWhen the customer make the payment for his outstanding credit limit to the admin via any offline method, then customer need to update the detail in the panel.Customer < Credit Limit < Pay AmountCustomer now update the client payment for future trackingFrom the P aid History Tab admin can check all the payment made by customer to clear his outstandingcredit history.SupportIf you need further support or have any questions directly related to Customer Credit Limit extension, ********************************************************************************Best Regards,CedCommerce Team。
jstd035声学扫描
JOINT INDUSTRY STANDARDAcoustic Microscopy for Non-HermeticEncapsulatedElectronicComponents IPC/JEDEC J-STD-035APRIL1999Supersedes IPC-SM-786 Supersedes IPC-TM-650,2.6.22Notice EIA/JEDEC and IPC Standards and Publications are designed to serve thepublic interest through eliminating misunderstandings between manufacturersand purchasers,facilitating interchangeability and improvement of products,and assisting the purchaser in selecting and obtaining with minimum delaythe proper product for his particular need.Existence of such Standards andPublications shall not in any respect preclude any member or nonmember ofEIA/JEDEC or IPC from manufacturing or selling products not conformingto such Standards and Publications,nor shall the existence of such Standardsand Publications preclude their voluntary use by those other than EIA/JEDECand IPC members,whether the standard is to be used either domestically orinternationally.Recommended Standards and Publications are adopted by EIA/JEDEC andIPC without regard to whether their adoption may involve patents on articles,materials,or processes.By such action,EIA/JEDEC and IPC do not assumeany liability to any patent owner,nor do they assume any obligation whateverto parties adopting the Recommended Standard or ers are alsowholly responsible for protecting themselves against all claims of liabilities forpatent infringement.The material in this joint standard was developed by the EIA/JEDEC JC-14.1Committee on Reliability Test Methods for Packaged Devices and the IPCPlastic Chip Carrier Cracking Task Group(B-10a)The J-STD-035supersedes IPC-TM-650,Test Method2.6.22.For Technical Information Contact:Electronic Industries Alliance/ JEDEC(Joint Electron Device Engineering Council)2500Wilson Boulevard Arlington,V A22201Phone(703)907-7560Fax(703)907-7501IPC2215Sanders Road Northbrook,IL60062-6135 Phone(847)509-9700Fax(847)509-9798Please use the Standard Improvement Form shown at the end of thisdocument.©Copyright1999.The Electronic Industries Alliance,Arlington,Virginia,and IPC,Northbrook,Illinois.All rights reserved under both international and Pan-American copyright conventions.Any copying,scanning or other reproduction of these materials without the prior written consent of the copyright holder is strictly prohibited and constitutes infringement under the Copyright Law of the United States.IPC/JEDEC J-STD-035Acoustic Microscopyfor Non-Hermetic EncapsulatedElectronicComponentsA joint standard developed by the EIA/JEDEC JC-14.1Committee on Reliability Test Methods for Packaged Devices and the B-10a Plastic Chip Carrier Cracking Task Group of IPCUsers of this standard are encouraged to participate in the development of future revisions.Contact:EIA/JEDEC Engineering Department 2500Wilson Boulevard Arlington,V A22201 Phone(703)907-7500 Fax(703)907-7501IPC2215Sanders Road Northbrook,IL60062-6135 Phone(847)509-9700Fax(847)509-9798ASSOCIATION CONNECTINGELECTRONICS INDUSTRIESAcknowledgmentMembers of the Joint IPC-EIA/JEDEC Moisture Classification Task Group have worked to develop this document.We would like to thank them for their dedication to this effort.Any Standard involving a complex technology draws material from a vast number of sources.While the principal members of the Joint Moisture Classification Working Group are shown below,it is not possible to include all of those who assisted in the evolution of this Standard.To each of them,the mem-bers of the EIA/JEDEC and IPC extend their gratitude.IPC Packaged Electronic Components Committee ChairmanMartin FreedmanAMP,Inc.IPC Plastic Chip Carrier Cracking Task Group,B-10a ChairmanSteven MartellSonoscan,Inc.EIA/JEDEC JC14.1CommitteeChairmanJack McCullenIntel Corp.EIA/JEDEC JC14ChairmanNick LycoudesMotorolaJoint Working Group MembersCharlie Baker,TIChristopher Brigham,Hi/FnRalph Carbone,Hewlett Packard Co. Don Denton,TIMatt Dotty,AmkorMichele J.DiFranza,The Mitre Corp. Leo Feinstein,Allegro Microsystems Inc.Barry Fernelius,Hewlett Packard Co. Chris Fortunko,National Institute of StandardsRobert J.Gregory,CAE Electronics, Inc.Curtis Grosskopf,IBM Corp.Bill Guthrie,IBM Corp.Phil Johnson,Philips Semiconductors Nick Lycoudes,MotorolaSteven R.Martell,Sonoscan Inc. Jack McCullen,Intel Corp.Tom Moore,TIDavid Nicol,Lucent Technologies Inc.Pramod Patel,Advanced Micro Devices Inc.Ramon R.Reglos,XilinxCorazon Reglos,AdaptecGerald Servais,Delphi Delco Electronics SystemsRichard Shook,Lucent Technologies Inc.E.Lon Smith,Lucent Technologies Inc.Randy Walberg,NationalSemiconductor Corp.Charlie Wu,AdaptecEdward Masami Aoki,HewlettPackard LaboratoriesFonda B.Wu,Raytheon Systems Co.Richard W.Boerdner,EJE ResearchVictor J.Brzozowski,NorthropGrumman ES&SDMacushla Chen,Wus Printed CircuitCo.Ltd.Jeffrey C.Colish,Northrop GrummanCorp.Samuel J.Croce,Litton AeroProducts DivisionDerek D-Andrade,Surface MountTechnology CentreRao B.Dayaneni,Hewlett PackardLaboratoriesRodney Dehne,OEM WorldwideJames F.Maguire,Boeing Defense&Space GroupKim Finch,Boeing Defense&SpaceGroupAlelie Funcell,Xilinx Inc.Constantino J.Gonzalez,ACMEMunir Haq,Advanced Micro DevicesInc.Larry A.Hargreaves,DC.ScientificInc.John T.Hoback,Amoco ChemicalCo.Terence Kern,Axiom Electronics Inc.Connie M.Korth,K-Byte/HibbingManufacturingGabriele Marcantonio,NORTELCharles Martin,Hewlett PackardLaboratoriesRichard W.Max,Alcatel NetworkSystems Inc.Patrick McCluskey,University ofMarylandJames H.Moffitt,Moffitt ConsultingServicesRobert Mulligan,Motorola Inc.James E.Mumby,CibaJohn Northrup,Lockheed MartinCorp.Dominique K.Numakura,LitchfieldPrecision ComponentsNitin B.Parekh,Unisys Corp.Bella Poborets,Lucent TechnologiesInc.D.Elaine Pope,Intel Corp.Ray Prasad,Ray Prasad ConsultancyGroupAlbert Puah,Adaptec Inc.William Sepp,Technic Inc.Ralph W.Taylor,Lockheed MartinCorp.Ed R.Tidwell,DSC CommunicationsCorp.Nick Virmani,Naval Research LabKen Warren,Corlund ElectronicsCorp.Yulia B.Zaks,Lucent TechnologiesInc.IPC/JEDEC J-STD-035April1999 iiTable of Contents1SCOPE (1)2DEFINITIONS (1)2.1A-mode (1)2.2B-mode (1)2.3Back-Side Substrate View Area (1)2.4C-mode (1)2.5Through Transmission Mode (2)2.6Die Attach View Area (2)2.7Die Surface View Area (2)2.8Focal Length(FL) (2)2.9Focus Plane (2)2.10Leadframe(L/F)View Area (2)2.11Reflective Acoustic Microscope (2)2.12Through Transmission Acoustic Microscope (2)2.13Time-of-Flight(TOF) (3)2.14Top-Side Die Attach Substrate View Area (3)3APPARATUS (3)3.1Reflective Acoustic Microscope System (3)3.2Through Transmission AcousticMicroscope System (4)4PROCEDURE (4)4.1Equipment Setup (4)4.2Perform Acoustic Scans..........................................4Appendix A Acoustic Microscopy Defect CheckSheet (6)Appendix B Potential Image Pitfalls (9)Appendix C Some Limitations of AcousticMicroscopy (10)Appendix D Reference Procedure for PresentingApplicable Scanned Data (11)FiguresFigure1Example of A-mode Display (1)Figure2Example of B-mode Display (1)Figure3Example of C-mode Display (2)Figure4Example of Through Transmission Display (2)Figure5Diagram of a Reflective Acoustic MicroscopeSystem (3)Figure6Diagram of a Through Transmission AcousticMicroscope System (3)April1999IPC/JEDEC J-STD-035iiiIPC/JEDEC J-STD-035April1999This Page Intentionally Left BlankivApril1999IPC/JEDEC J-STD-035 Acoustic Microscopy for Non-Hermetic EncapsulatedElectronic Components1SCOPEThis test method defines the procedures for performing acoustic microscopy on non-hermetic encapsulated electronic com-ponents.This method provides users with an acoustic microscopy processflow for detecting defects non-destructively in plastic packages while achieving reproducibility.2DEFINITIONS2.1A-mode Acoustic data collected at the smallest X-Y-Z region defined by the limitations of the given acoustic micro-scope.An A-mode display contains amplitude and phase/polarity information as a function of time offlight at a single point in the X-Y plane.See Figure1-Example of A-mode Display.IPC-035-1 Figure1Example of A-mode Display2.2B-mode Acoustic data collected along an X-Z or Y-Z plane versus depth using a reflective acoustic microscope.A B-mode scan contains amplitude and phase/polarity information as a function of time offlight at each point along the scan line.A B-mode scan furnishes a two-dimensional(cross-sectional)description along a scan line(X or Y).See Figure2-Example of B-mode Display.IPC-035-2 Figure2Example of B-mode Display(bottom half of picture on left)2.3Back-Side Substrate View Area(Refer to Appendix A,Type IV)The interface between the encapsulant and the back of the substrate within the outer edges of the substrate surface.2.4C-mode Acoustic data collected in an X-Y plane at depth(Z)using a reflective acoustic microscope.A C-mode scan contains amplitude and phase/polarity information at each point in the scan plane.A C-mode scan furnishes a two-dimensional(area)image of echoes arising from reflections at a particular depth(Z).See Figure3-Example of C-mode Display.1IPC/JEDEC J-STD-035April1999IPC-035-3 Figure3Example of C-mode Display2.5Through Transmission Mode Acoustic data collected in an X-Y plane throughout the depth(Z)using a through trans-mission acoustic microscope.A Through Transmission mode scan contains only amplitude information at each point in the scan plane.A Through Transmission scan furnishes a two-dimensional(area)image of transmitted ultrasound through the complete thickness/depth(Z)of the sample/component.See Figure4-Example of Through Transmission Display.IPC-035-4 Figure4Example of Through Transmission Display2.6Die Attach View Area(Refer to Appendix A,Type II)The interface between the die and the die attach adhesive and/or the die attach adhesive and the die attach substrate.2.7Die Surface View Area(Refer to Appendix A,Type I)The interface between the encapsulant and the active side of the die.2.8Focal Length(FL)The distance in water at which a transducer’s spot size is at a minimum.2.9Focus Plane The X-Y plane at a depth(Z),which the amplitude of the acoustic signal is maximized.2.10Leadframe(L/F)View Area(Refer to Appendix A,Type V)The imaged area which extends from the outer L/F edges of the package to the L/F‘‘tips’’(wedge bond/stitch bond region of the innermost portion of the L/F.)2.11Reflective Acoustic Microscope An acoustic microscope that uses one transducer as both the pulser and receiver. (This is also known as a pulse/echo system.)See Figure5-Diagram of a Reflective Acoustic Microscope System.2.12Through Transmission Acoustic Microscope An acoustic microscope that transmits ultrasound completely through the sample from a sending transducer to a receiver on the opposite side.See Figure6-Diagram of a Through Transmis-sion Acoustic Microscope System.2April1999IPC/JEDEC J-STD-0353IPC/JEDEC J-STD-035April1999 3.1.6A broad band acoustic transducer with a center frequency in the range of10to200MHz for subsurface imaging.3.2Through Transmission Acoustic Microscope System(see Figure6)comprised of:3.2.1Items3.1.1to3.1.6above3.2.2Ultrasonic pulser(can be a pulser/receiver as in3.1.1)3.2.3Separate receiving transducer or ultrasonic detection system3.3Reference packages or standards,including packages with delamination and packages without delamination,for use during equipment setup.3.4Sample holder for pre-positioning samples.The holder should keep the samples from moving during the scan and maintain planarity.4PROCEDUREThis procedure is generic to all acoustic microscopes.For operational details related to this procedure that apply to a spe-cific model of acoustic microscope,consult the manufacturer’s operational manual.4.1Equipment Setup4.1.1Select the transducer with the highest useable ultrasonic frequency,subject to the limitations imposed by the media thickness and acoustic characteristics,package configuration,and transducer availability,to analyze the interfaces of inter-est.The transducer selected should have a low enough frequency to provide a clear signal from the interface of interest.The transducer should have a high enough frequency to delineate the interface of interest.Note:Through transmission mode may require a lower frequency and/or longer focal length than reflective mode.Through transmission is effective for the initial inspection of components to determine if defects are present.4.1.2Verify setup with the reference packages or standards(see3.3above)and settings that are appropriate for the trans-ducer chosen in4.1.1to ensure that the critical parameters at the interface of interest correlate to the reference standard uti-lized.4.1.3Place units in the sample holder in the coupling medium such that the upper surface of each unit is parallel with the scanning plane of the acoustic transducer.Sweep air bubbles away from the unit surface and from the bottom of the trans-ducer head.4.1.4At afixed distance(Z),align the transducer and/or stage for the maximum reflected amplitude from the top surface of the sample.The transducer must be perpendicular to the sample surface.4.1.5Focus by maximizing the amplitude,in the A-mode display,of the reflection from the interface designated for imag-ing.This is done by adjusting the Z-axis distance between the transducer and the sample.4.2Perform Acoustic Scans4.2.1Inspect the acoustic image(s)for any anomalies,verify that the anomaly is a package defect or an artifact of the imaging process,and record the results.(See Appendix A for an example of a check sheet that may be used.)To determine if an anomaly is a package defect or an artifact of the imaging process it is recommended to analyze the A-mode display at the location of the anomaly.4.2.2Consider potential pitfalls in image interpretation listed in,but not limited to,Appendix B and some of the limita-tions of acoustic microscopy listed in,but not limited to,Appendix C.If necessary,make adjustments to the equipment setup to optimize the results and rescan.4April1999IPC/JEDEC J-STD-035 4.2.3Evaluate the acoustic images using the failure criteria specified in other appropriate documents,such as J-STD-020.4.2.4Record the images and thefinal instrument setup parameters for documentation purposes.An example checklist is shown in Appendix D.5IPC/JEDEC J-STD-035April19996April1999IPC/JEDEC J-STD-035Appendix AAcoustic Microscopy Defect Check Sheet(continued)CIRCUIT SIDE SCANImage File Name/PathDelamination(Type I)Die Circuit Surface/Encapsulant Number Affected:Average%Location:Corner Edge Center (Type II)Die/Die Attach Number Affected:Average%Location:Corner Edge Center (Type III)Encapsulant/Substrate Number Affected:Average%Location:Corner Edge Center (Type V)Interconnect tip Number Affected:Average%Interconnect Number Affected:Max.%Length(Type VI)Intra-Laminate Number Affected:Average%Location:Corner Edge Center Comments:CracksAre cracks present:Yes NoIf yes:Do any cracks intersect:bond wire ball bond wedge bond tab bump tab leadDoes crack extend from leadfinger to any other internal feature:Yes NoDoes crack extend more than two-thirds the distance from any internal feature to the external surfaceof the package:Yes NoAdditional verification required:Yes NoComments:Mold Compound VoidsAre voids present:Yes NoIf yes:Approx.size Location(if multiple voids,use comment section)Do any voids intersect:bond wire ball bond wedge bond tab bump tab lead Additional verification required:Yes NoComments:7IPC/JEDEC J-STD-035April1999Appendix AAcoustic Microscopy Defect Check Sheet(continued)NON-CIRCUIT SIDE SCANImage File Name/PathDelamination(Type IV)Encapsulant/Substrate Number Affected:Average%Location:Corner Edge Center (Type II)Substrate/Die Attach Number Affected:Average%Location:Corner Edge Center (Type V)Interconnect Number Affected:Max.%LengthLocation:Corner Edge Center (Type VI)Intra-Laminate Number Affected:Average%Location:Corner Edge Center (Type VII)Heat Spreader Number Affected:Average%Location:Corner Edge Center Additional verification required:Yes NoComments:CracksAre cracks present:Yes NoIf yes:Does crack extend more than two-thirds the distance from any internal feature to the external surfaceof the package:Yes NoAdditional verification required:Yes NoComments:Mold Compound VoidsAre voids present:Yes NoIf yes:Approx.size Location(if multiple voids,use comment section)Additional verification required:Yes NoComments:8Appendix BPotential Image PitfallsOBSERV ATIONS CAUSES/COMMENTSUnexplained loss of front surface signal Gain setting too lowSymbolization on package surfaceEjector pin knockoutsPin1and other mold marksDust,air bubbles,fingerprints,residueScratches,scribe marks,pencil marksCambered package edgeUnexplained loss of subsurface signal Gain setting too lowTransducer frequency too highAcoustically absorbent(rubbery)fillerLarge mold compound voidsPorosity/high concentration of small voidsAngled cracks in package‘‘Dark line boundary’’(phase cancellation)Burned molding compound(ESD/EOS damage)False or spotty indication of delamination Low acoustic impedance coating(polyimide,gel)Focus errorIncorrect delamination gate setupMultilayer interference effectsFalse indication of adhesion Gain set too high(saturation)Incorrect delamination gate setupFocus errorOverlap of front surface and subsurface echoes(transducerfrequency too low)Fluidfilling delamination areasApparent voiding around die edge Reflection from wire loopsIncorrect setting of void gateGraded intensity Die tilt or lead frame deformation Sample tiltApril1999IPC/JEDEC J-STD-0359Appendix CSome Limitations of Acoustic MicroscopyAcoustic microscopy is an analytical technique that provides a non-destructive method for examining plastic encapsulated components for the existence of delaminations,cracks,and voids.This technique has limitations that include the following: LIMITATION REASONAcoustic microscopy has difficulty infinding small defects if the package is too thick.The ultrasonic signal becomes more attenuated as a function of two factors:the depth into the package and the transducer fre-quency.The greater the depth,the greater the attenuation.Simi-larly,the higher the transducer frequency,the greater the attenu-ation as a function of depth.There are limitations on the Z-axis(axial)resolu-tion.This is a function of the transducer frequency.The higher the transducer frequency,the better the resolution.However,the higher frequency signal becomes attenuated more quickly as a function of depth.There are limitations on the X-Y(lateral)resolu-tion.The X-Y(lateral)resolution is a function of a number of differ-ent variables including:•Transducer characteristics,including frequency,element diam-eter,and focal length•Absorption and scattering of acoustic waves as a function of the sample material•Electromechanical properties of the X-Y stageIrregularly shaped packages are difficult to analyze.The technique requires some kind offlat reference surface.Typically,the upper surface of the package or the die surfacecan be used as references.In some packages,cambered packageedges can cause difficulty in analyzing defects near the edgesand below their surfaces.Edge Effect The edges cause difficulty in analyzing defects near the edge ofany internal features.IPC/JEDEC J-STD-035April1999 10April1999IPC/JEDEC J-STD-035Appendix DReference Procedure for Presenting Applicable Scanned DataMost of the settings described may be captured as a default for the particular supplier/product with specific changes recorded on a sample or lot basis.Setup Configuration(Digital Setup File Name and Contents)Calibration Procedure and Calibration/Reference Standards usedTransducerManufacturerModelCenter frequencySerial numberElement diameterFocal length in waterScan SetupScan area(X-Y dimensions)Scan step sizeHorizontalVerticalDisplayed resolutionHorizontalVerticalScan speedPulser/Receiver SettingsGainBandwidthPulseEnergyRepetition rateReceiver attenuationDampingFilterEcho amplitudePulse Analyzer SettingsFront surface gate delay relative to trigger pulseSubsurface gate(if used)High passfilterDetection threshold for positive oscillation,negative oscillationA/D settingsSampling rateOffset settingPer Sample SettingsSample orientation(top or bottom(flipped)view and location of pin1or some other distinguishing characteristic) Focus(point,depth,interface)Reference planeNon-default parametersSample identification information to uniquely distinguish it from others in the same group11IPC/JEDEC J-STD-035April1999Appendix DReference Procedure for Presenting Applicable Scanned Data(continued) Reference Procedure for Presenting Scanned DataImagefile types and namesGray scale and color image legend definitionsSignificance of colorsIndications or definition of delaminationImage dimensionsDepth scale of TOFDeviation from true aspect ratioImage type:A-mode,B-mode,C-mode,TOF,Through TransmissionA-mode waveforms should be provided for points of interest,such as delaminated areas.In addition,an A-mode image should be provided for a bonded area as a control.12Standard Improvement FormIPC/JEDEC J-STD-035The purpose of this form is to provide the Technical Committee of IPC with input from the industry regarding usage of the subject standard.Individuals or companies are invited to submit comments to IPC.All comments will be collected and dispersed to the appropriate committee(s).If you can provide input,please complete this form and return to:IPC2215Sanders RoadNorthbrook,IL 60062-6135Fax 847509.97981.I recommend changes to the following:Requirement,paragraph number Test Method number,paragraph numberThe referenced paragraph number has proven to be:Unclear Too RigidInErrorOther2.Recommendations forcorrection:3.Other suggestions for document improvement:Submitted by:Name Telephone Company E-mailAddress City/State/ZipDate ASSOCIATION CONNECTING ELECTRONICS INDUSTRIESASSOCIATION CONNECTINGELECTRONICS INDUSTRIESISBN#1-580982-28-X2215 Sanders Road, Northbrook, IL 60062-6135Tel. 847.509.9700 Fax 847.509.9798。
切尔姆-拨力电子传感器 E58-30 系列通光传感器操作手册说明书
Models c overed i n t his m anual:AC/DC M odels w / C ableAC/DC M odels w / C onnectorDC-only M odels w / C ableDC-only M odels w / C onnectorLight Operate Dark Operate Light Operate Dark Operate Light Operate Dark Operate Light Operate Dark Operate Detector E58-30TD250-GL E58-30TD250-GDE58-30TD250-GLP E58-30TD250-GDPE58-30TD250-HL E58-30TD250-HDE58-30TD250-HLP E58-30TD250-HDPSourceE58-30TS250-GAE58-30TS250-GAPE58-30TS250-HAE58-30TS250-HAPInstallation Instructions—E58-30 Series Thru-Beam Sensors Document 108623-100 Rev 02Cutler-Hammer Photoelectric SensorsD C 10 t o 30 V*Note: No connection when using thru-beam sources+V( - )D C 15 t o 30 V*Note: No connection when using thru-beam sources+VAC/DC Models (DC Connection, see Warning above)DC ModelsWIRING DIAGRAMSFor wiring cable versions, the color codes shown are the actual wire colors emanating from the sensor. For connector versions, the pin numbering and color codes shown are typical of several manufacturers, however, variations are possible. In case of discrepancies, rely on function indicated and pin location rather than pin number or color code.AC/DC Models (AC Connection)A C 20 t o 264 V*Note: No connection when using thru-beam sources L1L2MOUNTINGhole, or a variety of accessory mounting brackets. 1.The source emits visible red light. Look at thesource with your eye positioned close to the detector. Mount the detector in the area where the source light is brightest.2.Place a retroreflector over the lens of the detector. Look at the detector with your eye positioned close to the source. Mount the source in the area where the light reflected from the retroreflector is the brightest.Obtain final alignment by moving the detector back and forth in the horizontal axis to find the extreme positions where the output indicator on the detector goes “off” (for dark operate models,or “on” for light operate models). Position the detector midway between the two extremes.Repeat this procedure for the vertical axis, then tighten the source in place.Now repeat the final alignment procedure for the source.MOUNTING LOCATION AND SET-UPMount the source and detector units so they are aimed directly at each other from opposite sides of the target. (The detector should be on the dirtier side because the light scattering effect of dirt collecting on the lens is less significant if it takes place at the detector.) Ensure that the area of the target to be detected will block the entire effective beam. Apply power to both the source and detector.Accurate sensing depends on proper alignment of the source and detector. To begin, the source and detector must be positioned in rough alignment so that source light is received by the detector (check by placing a solid object in front of the source beam--the output indicator on the detector will change when the object blocks the beam, and change back when the object is removed). If the output indicator does not change,follow one or both of these two rough alignment methods:The source must be placed within the detector field of view for the detection system to operate.(Detection Zone)b lock this beam in order to be detected.The detector must be placed w ithin t he s ource WARNING!•These products are not designed, tested, or recommended for use in human safety applications.•This product has no user-serviceable parts—please return it to the factory for repairs. The cable clamp on the back of the sensor does not require adjustment. Any attempt to tighten or loosen this part will compromise sealing and void warranty.•AC/DC connector version sensors are equipped with an AC-type connector. The use of DC power with AC-type connectors may not conform with established standards.*This manual also covers the model numbers above with the options suffix -FC and -FSC (see “Specifications” on last page for differences)INTRODUCTIONThe E58-30 Photoelectric Sensor line was designed to withstand your harshest physical,chemical, and optical environments.Environments like the Forest Industry where the sensor withstands high-impact shock and heavy vibration. It also resists anti-fungal and anti-stain agents, preservatives, pitch and lubricants,and operates reliably outdoors while constantly exposed to weather and bright sunlight.RUGGED PHYSICAL CONSTRUCTION A strong metal housing with mechanical seals and surface mount electronics stand up to heavy shock and vibration. Tempered glass lens cover provides protection from abrasive objects and the sturdy cable is physically clamped to the sensor body.EXCEPTIONAL ENVIRONMENTAL PROTECTION AND CHEMICAL COMPATIBILITYExtensive research dictated the choice of materials used in this sensor to provide exceptional protection in harsh environments. Stainless steel,PVDF and tempered glass components are mechanically assembled using Viton seals to ensure complete sealing and resistance to industry chemicals.UNPARALLELED OPTICAL PERFORMANCE Advanced 30 mm optics and extremely high sensing power combine to produce a thru-beam sensor with an impressive 800 foot sensing range. In addition, the visible sensing beam and wide field of view help to simplify the installation and alignment process.Cutler-Hammer Photoelectric SensorsCutler-Hammer 720 80th Street SW Everett, WA 98203-6299206/353-0900 Fax: 206/513-5302Cutler-Hammer Canada 3228 South Service Road Burlington, ON L7N 3H8800/268-3578 905/333-6442 Fax: 905/333-2724For service or more information call:1-800-426-9184DIRECTLINE Application Assistance:Fax-206-513-5356Specifications subject to change without notice.108623-100; Printed in USA (11/99)AC/DC MODELS (AC Operation)AC/DC MODELS (DC Operation)DC-ONLY MODELSInput Voltage 20 to 132 V ac, 50/60 Hz 15 to 30 V dc 10 to 30 V dc Power Dissipation 3 W maximum 3 W maximum 2 W maximum Output Type VMOS (bi-directional)NPN (sink)NPN and PNP (dual outputs)Current Switching 300 mA maximum 300 mA maximum PNP (source): 100 mA max.; NPN (sink): 250 mA max.Voltage Switching 375 V peak maximum 375 V peak maximum 30 VDC maximum Off-State Leakage 250 µA typical; 500 µA maximum 250 µA typical; 500 µA maximum 10 µA maximum Surge Current 2 A maximum 2 A maximum 1 A maximum On-State Voltage Drop - - - 1.8 V at 10 mA; 4.0 V at 300 mA NPN: 1.2 V at 10 mA, 2.0 V at 250 mA; PNP: 2.8 V at 100 mAResponse Time 10 mS 1 mS 1 mSShort Circuit Protection Sensor will turn off immediately when a short or overload is detected (Indicator LED will flash). Turn power OFF and back ON to reset.Light/Dark Operation By model Temperature Range Operating and Storage: -40° to +131° F (-40° to +55° C)Enclosure Material Cable Jacket: PVC Cable Clamp: 303 Stainless SteelIndicator Ring: PVDF (high-density fluorinated polymer)Body: 303 Stainless Steel (or 316 Stainless Steel for models ending in FC or FSC)Seals: Viton ® (registered trademark of Dupont)Lens Cover: Tempered Glass (or hard-coated polycarbonate for models ending in FC or FSC)Cable/Connector 6-foot cable, 3-wire (AC/DC models), 4-wire (DC-only models); Micro Connector, 4-pin male Vibration and Shock Vibration: 30 g over 20 Hz to 2 kHz; Shock: 100 g for 3 mS 1/2 sinewave pulse Indicator LED Source: Lights when power is ON; Detector: Lights steady when output is ON, Flashes when short circuit protection is in latch condition Sunlight Immunity 10,000 foot-candles Enclosure Ratings NEMA 1, 2, 3, 3R, 3S, 4, 4X, 6, 6P, 12, 12K, and 13; This product is suitable for high temperature, high pressure washdown (1200 psi).Chemical Compatibility This product was designed to withstand chemicals commonly used in the automotive, machine tool, food processing and forest industries.Consult factory for compatibility with specific chemicals.Approvals Contact factory for the latest list of agency approvalsSPECIFICATIONSOPTICAL PERFORMANCEAll optical specifications are guaranteed to be the minimum performance under clean conditions of any product delivered from stock.Typical performance may be higher.Dirt in the environment will affect optical performance by reducing the amount of light the sensor receives. For best results, sensors should be used at distances where excess gain is higher than 1.5 (1.5 times the amount of sensing power required to detect an object under ideal conditions). Higher excess gain will allow the sensor to overcome higher levels ofcontamination on the lens.APPROXIMATE DIMENSIONS (SHOWN IN INCHES EXCEPT WHERE NOTED)THREADED MODELSSMOOTH-BODY MODELS (model numbers ending in FSC)E58-30 Thru-Beam Source Light Visible red, 680 nm Optimum Range 0.1 to 300 feet (0.03 to 90 m)Maximum Range 800 feet (250 m)Field of View33 inch diameter at 25 feet10001011011001000RANGE (feet)E X C E S S G A I N100RANGE (m)0.33053.030.5。
Anomaly Detection A Survey(综述)
A modified version of this technical report will appear in ACM Computing Surveys,September2009. Anomaly Detection:A SurveyVARUN CHANDOLAUniversity of MinnesotaARINDAM BANERJEEUniversity of MinnesotaandVIPIN KUMARUniversity of MinnesotaAnomaly detection is an important problem that has been researched within diverse research areas and application domains.Many anomaly detection techniques have been specifically developed for certain application domains,while others are more generic.This survey tries to provide a structured and comprehensive overview of the research on anomaly detection.We have grouped existing techniques into different categories based on the underlying approach adopted by each technique.For each category we have identified key assumptions,which are used by the techniques to differentiate between normal and anomalous behavior.When applying a given technique to a particular domain,these assumptions can be used as guidelines to assess the effectiveness of the technique in that domain.For each category,we provide a basic anomaly detection technique,and then show how the different existing techniques in that category are variants of the basic tech-nique.This template provides an easier and succinct understanding of the techniques belonging to each category.Further,for each category,we identify the advantages and disadvantages of the techniques in that category.We also provide a discussion on the computational complexity of the techniques since it is an important issue in real application domains.We hope that this survey will provide a better understanding of the different directions in which research has been done on this topic,and how techniques developed in one area can be applied in domains for which they were not intended to begin with.Categories and Subject Descriptors:H.2.8[Database Management]:Database Applications—Data MiningGeneral Terms:AlgorithmsAdditional Key Words and Phrases:Anomaly Detection,Outlier Detection1.INTRODUCTIONAnomaly detection refers to the problem offinding patterns in data that do not conform to expected behavior.These non-conforming patterns are often referred to as anomalies,outliers,discordant observations,exceptions,aberrations,surprises, peculiarities or contaminants in different application domains.Of these,anomalies and outliers are two terms used most commonly in the context of anomaly detection; sometimes interchangeably.Anomaly detectionfinds extensive use in a wide variety of applications such as fraud detection for credit cards,insurance or health care, intrusion detection for cyber-security,fault detection in safety critical systems,and military surveillance for enemy activities.The importance of anomaly detection is due to the fact that anomalies in data translate to significant(and often critical)actionable information in a wide variety of application domains.For example,an anomalous traffic pattern in a computerTo Appear in ACM Computing Surveys,092009,Pages1–72.2·Chandola,Banerjee and Kumarnetwork could mean that a hacked computer is sending out sensitive data to an unauthorized destination[Kumar2005].An anomalous MRI image may indicate presence of malignant tumors[Spence et al.2001].Anomalies in credit card trans-action data could indicate credit card or identity theft[Aleskerov et al.1997]or anomalous readings from a space craft sensor could signify a fault in some compo-nent of the space craft[Fujimaki et al.2005].Detecting outliers or anomalies in data has been studied in the statistics commu-nity as early as the19th century[Edgeworth1887].Over time,a variety of anomaly detection techniques have been developed in several research communities.Many of these techniques have been specifically developed for certain application domains, while others are more generic.This survey tries to provide a structured and comprehensive overview of the research on anomaly detection.We hope that it facilitates a better understanding of the different directions in which research has been done on this topic,and how techniques developed in one area can be applied in domains for which they were not intended to begin with.1.1What are anomalies?Anomalies are patterns in data that do not conform to a well defined notion of normal behavior.Figure1illustrates anomalies in a simple2-dimensional data set. The data has two normal regions,N1and N2,since most observations lie in these two regions.Points that are sufficiently far away from the regions,e.g.,points o1 and o2,and points in region O3,are anomalies.Fig.1.A simple example of anomalies in a2-dimensional data set. Anomalies might be induced in the data for a variety of reasons,such as malicious activity,e.g.,credit card fraud,cyber-intrusion,terrorist activity or breakdown of a system,but all of the reasons have a common characteristic that they are interesting to the analyst.The“interestingness”or real life relevance of anomalies is a key feature of anomaly detection.Anomaly detection is related to,but distinct from noise removal[Teng et al. 1990]and noise accommodation[Rousseeuw and Leroy1987],both of which deal To Appear in ACM Computing Surveys,092009.Anomaly Detection:A Survey·3 with unwanted noise in the data.Noise can be defined as a phenomenon in data which is not of interest to the analyst,but acts as a hindrance to data analysis. Noise removal is driven by the need to remove the unwanted objects before any data analysis is performed on the data.Noise accommodation refers to immunizing a statistical model estimation against anomalous observations[Huber1974]. Another topic related to anomaly detection is novelty detection[Markou and Singh2003a;2003b;Saunders and Gero2000]which aims at detecting previously unobserved(emergent,novel)patterns in the data,e.g.,a new topic of discussion in a news group.The distinction between novel patterns and anomalies is that the novel patterns are typically incorporated into the normal model after being detected.It should be noted that solutions for above mentioned related problems are often used for anomaly detection and vice-versa,and hence are discussed in this review as well.1.2ChallengesAt an abstract level,an anomaly is defined as a pattern that does not conform to expected normal behavior.A straightforward anomaly detection approach,there-fore,is to define a region representing normal behavior and declare any observation in the data which does not belong to this normal region as an anomaly.But several factors make this apparently simple approach very challenging:—Defining a normal region which encompasses every possible normal behavior is very difficult.In addition,the boundary between normal and anomalous behavior is often not precise.Thus an anomalous observation which lies close to the boundary can actually be normal,and vice-versa.—When anomalies are the result of malicious actions,the malicious adversaries often adapt themselves to make the anomalous observations appear like normal, thereby making the task of defining normal behavior more difficult.—In many domains normal behavior keeps evolving and a current notion of normal behavior might not be sufficiently representative in the future.—The exact notion of an anomaly is different for different application domains.For example,in the medical domain a small deviation from normal(e.g.,fluctuations in body temperature)might be an anomaly,while similar deviation in the stock market domain(e.g.,fluctuations in the value of a stock)might be considered as normal.Thus applying a technique developed in one domain to another is not straightforward.—Availability of labeled data for training/validation of models used by anomaly detection techniques is usually a major issue.—Often the data contains noise which tends to be similar to the actual anomalies and hence is difficult to distinguish and remove.Due to the above challenges,the anomaly detection problem,in its most general form,is not easy to solve.In fact,most of the existing anomaly detection techniques solve a specific formulation of the problem.The formulation is induced by various factors such as nature of the data,availability of labeled data,type of anomalies to be detected,etc.Often,these factors are determined by the application domain inTo Appear in ACM Computing Surveys,092009.4·Chandola,Banerjee and Kumarwhich the anomalies need to be detected.Researchers have adopted concepts from diverse disciplines such as statistics ,machine learning ,data mining ,information theory ,spectral theory ,and have applied them to specific problem formulations.Figure 2shows the above mentioned key components associated with any anomaly detection technique.Anomaly DetectionTechniqueApplication DomainsMedical InformaticsIntrusion Detection...Fault/Damage DetectionFraud DetectionResearch AreasInformation TheoryMachine LearningSpectral TheoryStatisticsData Mining...Problem CharacteristicsLabels Anomaly Type Nature of Data OutputFig.2.Key components associated with an anomaly detection technique.1.3Related WorkAnomaly detection has been the topic of a number of surveys and review articles,as well as books.Hodge and Austin [2004]provide an extensive survey of anomaly detection techniques developed in machine learning and statistical domains.A broad review of anomaly detection techniques for numeric as well as symbolic data is presented by Agyemang et al.[2006].An extensive review of novelty detection techniques using neural networks and statistical approaches has been presented in Markou and Singh [2003a]and Markou and Singh [2003b],respectively.Patcha and Park [2007]and Snyder [2001]present a survey of anomaly detection techniques To Appear in ACM Computing Surveys,092009.Anomaly Detection:A Survey·5 used specifically for cyber-intrusion detection.A substantial amount of research on outlier detection has been done in statistics and has been reviewed in several books [Rousseeuw and Leroy1987;Barnett and Lewis1994;Hawkins1980]as well as other survey articles[Beckman and Cook1983;Bakar et al.2006].Table I shows the set of techniques and application domains covered by our survey and the various related survey articles mentioned above.12345678TechniquesClassification Based√√√√√Clustering Based√√√√Nearest Neighbor Based√√√√√Statistical√√√√√√√Information Theoretic√Spectral√ApplicationsCyber-Intrusion Detection√√Fraud Detection√Medical Anomaly Detection√Industrial Damage Detection√Image Processing√Textual Anomaly Detection√Sensor Networks√Table parison of our survey to other related survey articles.1-Our survey2-Hodge and Austin[2004],3-Agyemang et al.[2006],4-Markou and Singh[2003a],5-Markou and Singh [2003b],6-Patcha and Park[2007],7-Beckman and Cook[1983],8-Bakar et al[2006]1.4Our ContributionsThis survey is an attempt to provide a structured and a broad overview of extensive research on anomaly detection techniques spanning multiple research areas and application domains.Most of the existing surveys on anomaly detection either focus on a particular application domain or on a single research area.[Agyemang et al.2006]and[Hodge and Austin2004]are two related works that group anomaly detection into multiple categories and discuss techniques under each category.This survey builds upon these two works by significantly expanding the discussion in several directions. We add two more categories of anomaly detection techniques,viz.,information theoretic and spectral techniques,to the four categories discussed in[Agyemang et al.2006]and[Hodge and Austin2004].For each of the six categories,we not only discuss the techniques,but also identify unique assumptions regarding the nature of anomalies made by the techniques in that category.These assumptions are critical for determining when the techniques in that category would be able to detect anomalies,and when they would fail.For each category,we provide a basic anomaly detection technique,and then show how the different existing techniques in that category are variants of the basic technique.This template provides an easier and succinct understanding of the techniques belonging to each category.Further, for each category we identify the advantages and disadvantages of the techniques in that category.We also provide a discussion on the computational complexity of the techniques since it is an important issue in real application domains.To Appear in ACM Computing Surveys,092009.6·Chandola,Banerjee and KumarWhile some of the existing surveys mention the different applications of anomaly detection,we provide a detailed discussion of the application domains where anomaly detection techniques have been used.For each domain we discuss the notion of an anomaly,the different aspects of the anomaly detection problem,and the challenges faced by the anomaly detection techniques.We also provide a list of techniques that have been applied in each application domain.The existing surveys discuss anomaly detection techniques that detect the sim-plest form of anomalies.We distinguish the simple anomalies from complex anoma-lies.The discussion of applications of anomaly detection reveals that for most ap-plication domains,the interesting anomalies are complex in nature,while most of the algorithmic research has focussed on simple anomalies.1.5OrganizationThis survey is organized into three parts and its structure closely follows Figure 2.In Section2we identify the various aspects that determine the formulation of the problem and highlight the richness and complexity associated with anomaly detection.We distinguish simple anomalies from complex anomalies and define two types of complex anomalies,viz.,contextual and collective anomalies.In Section 3we briefly describe the different application domains where anomaly detection has been applied.In subsequent sections we provide a categorization of anomaly detection techniques based on the research area which they belong to.Majority of the techniques can be categorized into classification based(Section4),nearest neighbor based(Section5),clustering based(Section6),and statistical techniques (Section7).Some techniques belong to research areas such as information theory (Section8),and spectral theory(Section9).For each category of techniques we also discuss their computational complexity for training and testing phases.In Section 10we discuss various contextual anomaly detection techniques.We discuss various collective anomaly detection techniques in Section11.We present some discussion on the limitations and relative performance of various existing techniques in Section 12.Section13contains concluding remarks.2.DIFFERENT ASPECTS OF AN ANOMALY DETECTION PROBLEMThis section identifies and discusses the different aspects of anomaly detection.As mentioned earlier,a specific formulation of the problem is determined by several different factors such as the nature of the input data,the availability(or unavailabil-ity)of labels as well as the constraints and requirements induced by the application domain.This section brings forth the richness in the problem domain and justifies the need for the broad spectrum of anomaly detection techniques.2.1Nature of Input DataA key aspect of any anomaly detection technique is the nature of the input data. Input is generally a collection of data instances(also referred as object,record,point, vector,pattern,event,case,sample,observation,entity)[Tan et al.2005,Chapter 2].Each data instance can be described using a set of attributes(also referred to as variable,characteristic,feature,field,dimension).The attributes can be of different types such as binary,categorical or continuous.Each data instance might consist of only one attribute(univariate)or multiple attributes(multivariate).In To Appear in ACM Computing Surveys,092009.Anomaly Detection:A Survey·7 the case of multivariate data instances,all attributes might be of same type or might be a mixture of different data types.The nature of attributes determine the applicability of anomaly detection tech-niques.For example,for statistical techniques different statistical models have to be used for continuous and categorical data.Similarly,for nearest neighbor based techniques,the nature of attributes would determine the distance measure to be used.Often,instead of the actual data,the pairwise distance between instances might be provided in the form of a distance(or similarity)matrix.In such cases, techniques that require original data instances are not applicable,e.g.,many sta-tistical and classification based techniques.Input data can also be categorized based on the relationship present among data instances[Tan et al.2005].Most of the existing anomaly detection techniques deal with record data(or point data),in which no relationship is assumed among the data instances.In general,data instances can be related to each other.Some examples are sequence data,spatial data,and graph data.In sequence data,the data instances are linearly ordered,e.g.,time-series data,genome sequences,protein sequences.In spatial data,each data instance is related to its neighboring instances,e.g.,vehicular traffic data,ecological data.When the spatial data has a temporal(sequential) component it is referred to as spatio-temporal data,e.g.,climate data.In graph data,data instances are represented as vertices in a graph and are connected to other vertices with ter in this section we will discuss situations where such relationship among data instances become relevant for anomaly detection. 2.2Type of AnomalyAn important aspect of an anomaly detection technique is the nature of the desired anomaly.Anomalies can be classified into following three categories:2.2.1Point Anomalies.If an individual data instance can be considered as anomalous with respect to the rest of data,then the instance is termed as a point anomaly.This is the simplest type of anomaly and is the focus of majority of research on anomaly detection.For example,in Figure1,points o1and o2as well as points in region O3lie outside the boundary of the normal regions,and hence are point anomalies since they are different from normal data points.As a real life example,consider credit card fraud detection.Let the data set correspond to an individual’s credit card transactions.For the sake of simplicity, let us assume that the data is defined using only one feature:amount spent.A transaction for which the amount spent is very high compared to the normal range of expenditure for that person will be a point anomaly.2.2.2Contextual Anomalies.If a data instance is anomalous in a specific con-text(but not otherwise),then it is termed as a contextual anomaly(also referred to as conditional anomaly[Song et al.2007]).The notion of a context is induced by the structure in the data set and has to be specified as a part of the problem formulation.Each data instance is defined using following two sets of attributes:To Appear in ACM Computing Surveys,092009.8·Chandola,Banerjee and Kumar(1)Contextual attributes.The contextual attributes are used to determine thecontext(or neighborhood)for that instance.For example,in spatial data sets, the longitude and latitude of a location are the contextual attributes.In time-series data,time is a contextual attribute which determines the position of an instance on the entire sequence.(2)Behavioral attributes.The behavioral attributes define the non-contextual char-acteristics of an instance.For example,in a spatial data set describing the average rainfall of the entire world,the amount of rainfall at any location is a behavioral attribute.The anomalous behavior is determined using the values for the behavioral attributes within a specific context.A data instance might be a contextual anomaly in a given context,but an identical data instance(in terms of behavioral attributes)could be considered normal in a different context.This property is key in identifying contextual and behavioral attributes for a contextual anomaly detection technique.TimeFig.3.Contextual anomaly t2in a temperature time series.Note that the temperature at time t1is same as that at time t2but occurs in a different context and hence is not considered as an anomaly.Contextual anomalies have been most commonly explored in time-series data [Weigend et al.1995;Salvador and Chan2003]and spatial data[Kou et al.2006; Shekhar et al.2001].Figure3shows one such example for a temperature time series which shows the monthly temperature of an area over last few years.A temperature of35F might be normal during the winter(at time t1)at that place,but the same value during summer(at time t2)would be an anomaly.A similar example can be found in the credit card fraud detection domain.A contextual attribute in credit card domain can be the time of purchase.Suppose an individual usually has a weekly shopping bill of$100except during the Christmas week,when it reaches$1000.A new purchase of$1000in a week in July will be considered a contextual anomaly,since it does not conform to the normal behavior of the individual in the context of time(even though the same amount spent during Christmas week will be considered normal).The choice of applying a contextual anomaly detection technique is determined by the meaningfulness of the contextual anomalies in the target application domain. To Appear in ACM Computing Surveys,092009.Anomaly Detection:A Survey·9 Another key factor is the availability of contextual attributes.In several cases defining a context is straightforward,and hence applying a contextual anomaly detection technique makes sense.In other cases,defining a context is not easy, making it difficult to apply such techniques.2.2.3Collective Anomalies.If a collection of related data instances is anomalous with respect to the entire data set,it is termed as a collective anomaly.The indi-vidual data instances in a collective anomaly may not be anomalies by themselves, but their occurrence together as a collection is anomalous.Figure4illustrates an example which shows a human electrocardiogram output[Goldberger et al.2000]. The highlighted region denotes an anomaly because the same low value exists for an abnormally long time(corresponding to an Atrial Premature Contraction).Note that that low value by itself is not an anomaly.Fig.4.Collective anomaly corresponding to an Atrial Premature Contraction in an human elec-trocardiogram output.As an another illustrative example,consider a sequence of actions occurring in a computer as shown below:...http-web,buffer-overflow,http-web,http-web,smtp-mail,ftp,http-web,ssh,smtp-mail,http-web,ssh,buffer-overflow,ftp,http-web,ftp,smtp-mail,http-web...The highlighted sequence of events(buffer-overflow,ssh,ftp)correspond to a typical web based attack by a remote machine followed by copying of data from the host computer to remote destination via ftp.It should be noted that this collection of events is an anomaly but the individual events are not anomalies when they occur in other locations in the sequence.Collective anomalies have been explored for sequence data[Forrest et al.1999; Sun et al.2006],graph data[Noble and Cook2003],and spatial data[Shekhar et al. 2001].To Appear in ACM Computing Surveys,092009.10·Chandola,Banerjee and KumarIt should be noted that while point anomalies can occur in any data set,collective anomalies can occur only in data sets in which data instances are related.In contrast,occurrence of contextual anomalies depends on the availability of context attributes in the data.A point anomaly or a collective anomaly can also be a contextual anomaly if analyzed with respect to a context.Thus a point anomaly detection problem or collective anomaly detection problem can be transformed toa contextual anomaly detection problem by incorporating the context information.2.3Data LabelsThe labels associated with a data instance denote if that instance is normal or anomalous1.It should be noted that obtaining labeled data which is accurate as well as representative of all types of behaviors,is often prohibitively expensive. Labeling is often done manually by a human expert and hence requires substantial effort to obtain the labeled training data set.Typically,getting a labeled set of anomalous data instances which cover all possible type of anomalous behavior is more difficult than getting labels for normal behavior.Moreover,the anomalous behavior is often dynamic in nature,e.g.,new types of anomalies might arise,for which there is no labeled training data.In certain cases,such as air traffic safety, anomalous instances would translate to catastrophic events,and hence will be very rare.Based on the extent to which the labels are available,anomaly detection tech-niques can operate in one of the following three modes:2.3.1Supervised anomaly detection.Techniques trained in supervised mode as-sume the availability of a training data set which has labeled instances for normal as well as anomaly class.Typical approach in such cases is to build a predictive model for normal vs.anomaly classes.Any unseen data instance is compared against the model to determine which class it belongs to.There are two major is-sues that arise in supervised anomaly detection.First,the anomalous instances are far fewer compared to the normal instances in the training data.Issues that arise due to imbalanced class distributions have been addressed in the data mining and machine learning literature[Joshi et al.2001;2002;Chawla et al.2004;Phua et al. 2004;Weiss and Hirsh1998;Vilalta and Ma2002].Second,obtaining accurate and representative labels,especially for the anomaly class is usually challenging.A number of techniques have been proposed that inject artificial anomalies in a normal data set to obtain a labeled training data set[Theiler and Cai2003;Abe et al.2006;Steinwart et al.2005].Other than these two issues,the supervised anomaly detection problem is similar to building predictive models.Hence we will not address this category of techniques in this survey.2.3.2Semi-Supervised anomaly detection.Techniques that operate in a semi-supervised mode,assume that the training data has labeled instances for only the normal class.Since they do not require labels for the anomaly class,they are more widely applicable than supervised techniques.For example,in space craft fault detection[Fujimaki et al.2005],an anomaly scenario would signify an accident, which is not easy to model.The typical approach used in such techniques is to 1Also referred to as normal and anomalous classes.To Appear in ACM Computing Surveys,092009.Anomaly Detection:A Survey·11 build a model for the class corresponding to normal behavior,and use the model to identify anomalies in the test data.A limited set of anomaly detection techniques exist that assume availability of only the anomaly instances for training[Dasgupta and Nino2000;Dasgupta and Majumdar2002;Forrest et al.1996].Such techniques are not commonly used, primarily because it is difficult to obtain a training data set which covers every possible anomalous behavior that can occur in the data.2.3.3Unsupervised anomaly detection.Techniques that operate in unsupervised mode do not require training data,and thus are most widely applicable.The techniques in this category make the implicit assumption that normal instances are far more frequent than anomalies in the test data.If this assumption is not true then such techniques suffer from high false alarm rate.Many semi-supervised techniques can be adapted to operate in an unsupervised mode by using a sample of the unlabeled data set as training data.Such adaptation assumes that the test data contains very few anomalies and the model learnt during training is robust to these few anomalies.2.4Output of Anomaly DetectionAn important aspect for any anomaly detection technique is the manner in which the anomalies are reported.Typically,the outputs produced by anomaly detection techniques are one of the following two types:2.4.1Scores.Scoring techniques assign an anomaly score to each instance in the test data depending on the degree to which that instance is considered an anomaly. Thus the output of such techniques is a ranked list of anomalies.An analyst may choose to either analyze top few anomalies or use a cut-offthreshold to select the anomalies.2.4.2Labels.Techniques in this category assign a label(normal or anomalous) to each test instance.Scoring based anomaly detection techniques allow the analyst to use a domain-specific threshold to select the most relevant anomalies.Techniques that provide binary labels to the test instances do not directly allow the analysts to make such a choice,though this can be controlled indirectly through parameter choices within each technique.3.APPLICATIONS OF ANOMALY DETECTIONIn this section we discuss several applications of anomaly detection.For each ap-plication domain we discuss the following four aspects:—The notion of anomaly.—Nature of the data.—Challenges associated with detecting anomalies.—Existing anomaly detection techniques.To Appear in ACM Computing Surveys,092009.。
NetApp Storage Admin SMB CIFS ACLs Guide
NetApp Storage Admin SMB/CIFS ACLs GuideOverviewThis document is to enable Storage Administrators to properly configure a NetApp core filer for enabling SMB/CIFS ACLenforced access to an NTFS security style share for Windows clients. After completing the steps in this guide, the process continues in the FXT Admin SMB/CIFS ACLs Guide and the AD Administrator CIFS ACLs Guide. Choose one of the two checklists depending on whether using a new volume or an existing volume.NetApp Checklist ‐ New volume1.Create a new volume.2.Change to NTFS security style.3.Modify volume export policy to provide root access for FXT Cluster IP addresses and Client IPaddresses. Verify using e x p o r t f s q /<V O L N A M E>4.Create a CIFS share.5.Verify volume security style is NTFS using f s e c u r i t y s h o w /<V O L N A M E>.6.Enable the NFS root user to bypass ACL processing.7.Map root UNIX user to the Active Directory user with Full Control permissions, usually DomainAdministrator account.NetApp Checklist ‐ Existing volume1.Verify volume security style is NTFS using f s e c u r i t y s h o w /<V O L N A M E>.2.Verify that the export is configured to enable NFS read/write and root access from the Avere clientand cluster IP addresses using e x p o r t f s q /<V O L N A M E>3.Enable the NFS root user to bypass ACL processing.4.Map root UNIX user to the Active Directory Domain Administrator account.Configuring a volume on the NetApp Core filerConfigure a volume on the core filerTo access a CIFS share on a NetApp core filer, there needs to be an export configured with a corresponding CIFS share.1.Log in to the NetApp via telnet/ssh.2.Verify that the export is configured to enable read/write and root access from the Avere client andcluster IP addresses. Verify using e x p o r t f s q /<V O L N A M E>3.Export the volume and enable NFS root access for the volume.e x p o r tf s p r o o t=<N E T W O R K_I P/C I D R_S U B N E T>,s e c=s y s,r w,a n o n=0,n o s u i d/<V O L N A M E>Example: e x p o r t f s p r o o t=10.0.0.0/8,s e c=s y s,r w,a n o n=0,n o s u i d/v o l/c i f s d e m o4.Enable NTFS security style on the core filer volume.q t r e e s e c u r i t y /<V O L N A M E> n t f s5.Create the CIFS share for the volume by using c i f s s h a r e s a d d <S H A R E N A M E> /<V O L N A M E>6.Verify the Effective security style is NTFS with “Everyone” having “Full Control” of the root of theexport. Example:f s e c u r i t y s h o w /<V O L N A M E>Example output (red font added for emphasis):[/v o l/c i f s d e m o D i r e c t o r y (i n u m 64)]S e c u r i t y s t y l e: N T F SE f f e c t i v e s t y l e: N TF SD O S a t t r i b u t e s: 0x0030 (A D)U n i x s e c u r i t y:u i d: 0 (r o o t)g i d: 0 (w h e e l)m o d e: 0777 (r w x r w x r w x)N T F S s e c u r i t y d e s c r i p t o r:O w n e r: B U I L T I N\A d m i n i s t r a t o r sG r o u p: B U I L T I N\A d m i n i s t r a t o r sD A C L:A l l o w E v e r y o n e 0x001f01f f (F u l l C o n t r o l)A l l o w E v e r y o n e 0x10000000 O I|C I|I O7.Avere OS utilizes NFSv3 for data path communications. To accomplish this, we require the UNIXroot user to bypass ACL processing. We recommend isolating root access to Avere client cluster IPs and management hosts. Use export policies to restrict root user access to NTFS volumes that are exported via NFS. Use the global command o p t i o n s c i f s.n f s_r o o t_i g n o r e_a c l o n8.Map the root user to the Domain Administrator account, where <DOMAIN> is substituted with thereal Active Directory domain name.Check if this mapping exists:r d f i l e /v o l/v o l0/e t c/u s e r m a p.c f gTo write the change to the file:w r f i l e a /v o l/v o l0/e t c/u s e r m a p.c f g "<D O M A I N>\A d m i n i s t r a t o r == r o o t"9.Exit t he telnet/ssh session using Ctrl D.Steps to verify everything is workingExample NetApp commands to test LDAP configuration:priv set advancedgetXXbyYY getpwbyname_r "AvereUser"getXXbyYY getpwbyuid_r ${UID_ASSIGNED_TO_AVEREUSER}getXXbyYY getgrbyname "Domain Users"getXXbyYY getgrbygid ${GID_ASSIGNED_TO_DOMAIN_USERS}wcc u "AvereUser"wcc s "AvereUser"cifs lookup "AvereUser"cifs lookup "Domain Users"note that the getXXbyYY command requires "priv set advanced" to be active.。
MIC2033 高精度高侧固定电流限制电源分布开关说明书
MIC2033 Evaluation BoardHigh-Accuracy, High-Side, Fixed Current Limit Power SwitchMicrel Inc. • 2180 Fortune Drive • San Jose, CA 95131 • USA • tel +1 (408) 944-0800 • fax + 1 (408) 474-1000 •General DescriptionThe MIC2033 is a high-side MOSFET power distribution switch providing increased system reliability using 5% current limit accuracy.The MIC2033 has an operating input voltage range from 2.5V to 5.5V, is internally current limited, and has thermal shutdown to protect the device and system. The MIC2033 is offered with either active-high or active-low logic level enable input controls. It has an open drain fault status output flag with a built-in 32ms delay that asserts low during overcurrent or thermal shutdown conditions.The MIC2033 is available with several different fixed current limit options: 0.5A, 0.8A, 1A, and 1.2A. A capacitor-adjustable soft-start circuit minimizes inrush current in applications using high capacitive loads.The MIC2033 is offered in both 6-pin SOT-23 and 6-pin 2mm x 2mm thin DFN packages. It has an operating junction temperature range of −40°C to +125°C. RequirementsThe MIC2033 evaluation board requires a single power supply to provide V IN . The V IN power supply must be able to deliver a minimum of 2.5V and more than 1.5A capability. The output load can either be active or passive. PrecautionsThe evaluation board does not have reverse polarity protection. Applying a negative voltage to the V IN terminal can damage the device. In addition, the maximum V IN operating voltage of the MIC2033 evaluation board is 5.5V. Exceeding 5.5V on V IN can permanently damage the device.Getting Started1. Connect an external supply to the V IN terminal .Apply the desired input voltage to the V IN and ground terminals of the evaluation board, paying careful attention to polarity and supply voltage. The user can place an ammeter between the input supply and the V IN terminal to the evaluation board. Make sure that the supply voltage is monitored at the V IN terminal. The ammeter and/or power lead resistance can reduce the voltage supplied to the input.2. Connect the load to the V OUT and ground terminals.The load can be either passive (resistive) or active (as in an electronic load). The user can place an ammeter between the load and the V OUT terminal. Make sure that the output voltage is monitored at the V OUT terminal.3. Enable the switchThe MIC2033-12AYxx evaluation boards are configured for default enable using a 10k Ω pull-up resistor from the ENABLE pin to VIN. To disable the switch, place a jumper short across the jumper pins at TP2. The MIC2033-05BYxx evaluation boards are configured for default disable. To enable the switch, place a jumper short across the jumper pins at TP2. 4. Fault detectionThe MIC2033 is equipped with an error flag, FAULT/. TP3 is provided to monitor the FAULT/ pin.Ordering InformationPart Number DescriptionMIC2033-05BYM6 EV Evaluation board featuring the MIC2033-05BYM6 500mA Switch MIC2033-12AYM6 EV Evaluation board featuring the MIC2033-12AYM6 1.2A Switch MIC2033-05BYMT EV Evaluation board featuring the MIC2033-05BYMT 500mA Switch MIC2033-12AYMT EVEvaluation board featuring the MIC2033-12AYMT 1.2A SwitchApplication InformationSoft-StartSoft-start reduces the power supply input surge current at startup by controlling the output voltage rise time. The input surge appears while the output capacitor is charged up. A slower output rise time draws a lower input surge current.During soft-start, an internal current sink discharges the external capacitor at CSLEW to ground to control the ramp of the output voltage. The output voltage rise time depends on the value of C CSLEW, the input voltage, output voltage, and the current limit. Micrel recommends that the value of the CSLEW external capacitor be in the range of 0.1µF to 1µF. For the MIC2033 evaluation board, CSLEW = C3 = 0.1µF. Output VoltageThe MIC2033 evaluation board is available with either a 0.5A or 1.2A fixed current limit. If the output current exceeds the current limit, the MIC2033 switch enters constant current limit mode. The maximum allowable current limit can be less than the full specified and/or expected current if the MIC2033 is not mounted on a circuit board with sufficiently low thermal resistance. The MIC2033 responds to short circuits within 10µs to limit the output current. It also provides an output fault flag that asserts (low) for an overcurrent condition that lasts longer than the overcurrent fault response delay time (t FAULT/), which is typically 32ms.MIC2033-xxxYMx Evaluation Board SchematicsMIC2033-xxxYMT Evaluation BoardMIC2033-xxxYM6 Evaluation BoardBill of MaterialsNumber Manufacturer Description Qty. Item PartC1608X5R0J105K TDK(1)C1, C21.0µF/6.3V ceramic capacitor, X5R, 0603 206036D105KAT2A AVX(2)06033C104KAT2A TDK0.1µF/25V ceramic capacitor, X7R, 0603 1C3C1608X7R1E104K AVXR1, R2 CRCW060310K0FKEA Vishay/Dale(3) 10.0kΩ, film resistor, 0603, 1% 2U1 MIC2033-xxxYMx Micrel(4)High-accuracy, high-side, fixed current limit power switch 1Notes:1. TDK: .2. AVX: .3. Vishay: .4. Micrel, Inc.: .Evaluation Board PCB LayoutMIC2033-xxxYMT Evaluation Board – Top LayerMIC2033-xxxYMT Evaluation Board – Bottom LayerEvaluation Board PCB Layout (Continued)MIC2033-xxxYM6 Evaluation Board – Top LayerMIC2033-xxxYM6 Evaluation Board – Bottom Layer。
BW Clip 操作手册说明书
Part Number 50115903-067 | OM-EN-PALO-A6 | BW Clip Operator Manual BW Clip is a portable, single-gas detector manufactured byBW Technologies by Honeywell (BW). BW Clip continuously measuresthe concentration of a specific gas in the ambient environment, andactivates an alarm when concentrations exceed alarm setpoints. It is yourresponsibility to respond appropriately to the alarms.BW Clip is a member of the GasAlert family of products. It is compatiblewith IntelliDoX and MicroDock II automatic test and calibration stations,as well as Fleet Manager II software version 4.0 or higher. For moreinformation, visit the product website at Safety Information: Read First1. Substitution of components may impair Intrinsic Safety.2. Periodically test the response of the sensor by exposing the detectorto a target gas concentration that exceeds the low alarm setpoint.Manually verify that the audible and visual alarms are activated.3. Detectors in hibernation mode are not functional.1. Activate the detector before the activation date on the package.2. This product is a gas detector, not a measurement device.3. Ensure that the sensor grill is free of dirt, debris, and is not obstructed.4. Clean the exterior with a soft, damp cloth.5. Bump test the detector in a normal atmosphere that is free ofhazardous gas.6. For optimal performance, periodically zero the sensor in a normalatmosphere (20.9% v/v O2) that is free of hazardous gas.Informations de sécurité – À lire au préalableAVERTISSEMENT1. Le remplacement d’un composant de l’appareil peut compromettre lasécurité intrinsèque du détecteur.2. T estez périodiquement la réponse du capteur en exposant le détecteurà une concentration de gaz supérieure au seuil d’alarme basse. Vérifiezmanuellement que les alarmes sonores et visuelles sont activées.3. Détecteurs en mode veille prolongée ne sont pas fonctionnels.MISE EN GARDE1. Activez le détecteur avant la date d’activation sur l’emballage.2. Ce produit est un détecteur de gaz, pas un dispositif de mesure.3. Veillez à assurer que la grille du capteur est exempt de saleté, lesdébris, et ne soit pas obstrué.4. Nettoyez l’extérieur de l’appareil à l’aide d’un chiffon doux et humide.5. Veillez à effectuer un test fonctionnel du capteur dans une atmosphèrenormale qui est exempte de gaz dangereux6. Pour des performances optimales, zéro périodiquement le capteurdans une atmosphère normale (20,9% v/v O2) qui est exempte de gazdangereux.BW Clip Factory Calibration CertificateThis instrument was factory inspected, tested and calibrated in accordance with the conditions and requirements of our registered Quality System, Operating Standards and Sales Agreements.Getting Startedwith product nameand gas typeLEDLCD and SymbolsPushbutton prompt. When this symbol is displayed,press and hold the pushbutton until the symboldisappears.BW Clip O2models only. Oxygen concentration ismeasured as percent by volume.BW Clip H2S, CO and SO2models only. Toxic gasconcentration is measured in parts per million.Low alarm and high alarm. These symbols aredisplayed when a gas concentration that exceedsalarm setpoints is detected.Non-compliance warning. This symbol is displayedwhen a diagnostic or compliance test fails; when theoperating life countdown reaches 24 hours or less;and for up to 30 days after operating life expiry. It isalso displayed when certain notifications are enabledthrough Fleet Manager II via an IntelliDoX station.Real-time clock. This symbol is displayed when real-time clock is enabled through Fleet Manager II via anIntelliDoX station.End of operating life warning. This symbol is displayedwhen the operating life countdown reaches 24 hoursor less.Peak reading. This symbol is displayed when amaximum gas exposure event has occurred within thepast 24 hours.Bump test reminder. If the detector is configured todisplay a bump test reminder, this symbol is displayedwhen a bump test is due. indicates a failed test.BW Clip O2models only. This symbol is displayedwhen more than 24 hours have elapsed since the lastsuccessful zero procedure was performed. indicatesa failed test.Operating life remaining in months (MM) or days (DD).Activate a New Detector1. Move to a normal atmosphere (20.9% v/v O2) that is free of hazardousgas.2. Press and hold the pushbutton until a 5 second countdown is displayed,and then continue to hold until the countdown is complete.3. When the countdown is complete, the LCD and LEDs turn on and thenturn off. The detector performs an internal diagnostic test.4. When the diagnostic test is successful, the alarm setpoints aredisplayed and the LEDs flash.5. The sensor stabilization countdown is displayed. During the countdown,the detector vibrates continuously for 20 seconds. The time required to stabilize varies depending on sensor type. When the countdownreaches 0, the LEDs flash and the audible alarm beeps.6. When the type of gas detected and the operating life countdown aredisplayed, the detector is in normal operating mode.When the detector is in normal operating mode, the typeof gas detected is permanently displayed. The remainingoperating life is displayed until it is disrupted by apushbutton action, gas alarm, or error event.When the detector is activated for the first time, theoperating life countdown is displayed. The countdowndisplays remaining operating life in months until thecountdown reaches 90 days or less before expiry.When the operating life countdown reaches 90 days orless before expiry, the countdown display changes todays. The countdown displays the remaining operatinglife in days until the countdown reaches 24 hours or lessbefore expiry.When the operating life countdown reaches 24 hours orless before expiry, the countdown display changes tohours, and the EXPIRY! warning and non-compliancesymbol are displayed.When the operating life countdown ends, the detectordeactivates and detector safety functions are disabled. Itis possible to retrieve event logs for a limited time afterexpiry. The EXPIRY! warning and non-compliance symbolare displayed for up to 30 days after expiry.Internal Diagnostic TestsActivated detectors automatically perform one internal diagnostic test every24 hours. If the internal diagnostic test fails, the diagnostic fail-safe begins.Diagnostic Fail-Safe1. The EXPIRY! warning and non-compliance symbol are displayed.2. The detector beeps and vibrates.3. The LEDs flash 2 times per second for 15 seconds.4. OFF or an error code is displayed. The detector is deactivated.It is possible to retrieve the event logs for a limited time after expiry. If youare unable to retrieve the event logs, contact BW.Alarms and WarningsAn alarm is initiated when the sensor is exposed to a gas concentrationthat exceeds alarm setpoints. The alarm persists until the alarmgas concentration returns to an acceptable range. You can useFleet Manager II via an IntelliDoX station to enable the display of the gasconcentration reading during an alarm. Battery life decreases rapidly whenthe detector is in alarm condition.Low AlarmAudible: 1 beep per secondVisual: 1 flash per secondVibration: 1 vibration per secondHigh AlarmAudible: 2 beeps per secondVisual: 2 flashes per secondVibration: 2 vibrations per secondOver-Limit and Under-Limit AlarmsIf the gas concentration is beyond the sensor range, OL(over-limit) or -OL (under-limit) is displayed.Audible: 2 beeps per secondVisual: 2 flashes per secondVibration: 2 vibrations per second2ModelsFor O2models only, the Automatic Zero Reminderisdisplayed when more than 24 hours have elapsed sincethe last successful zero procedure was performed.Peak ReadingsThe peak readings symbol is displayed when the sensoris exposed to a gas concentration that exceeds the alarmsetpoints. It is no longer displayed when more than24 hours have passed since the last alarm, or when asuccessful bump test is performed via an IntelliDoX or MicroDock II station.Non-compliance Symbol and LED IndicatorsThe non-compliance warning symbol is displayed when:• an internal diagnostic test fails;• a bump test or zero procedure fails;• a bump test is due, if enabled;• the sensor is exposed to a gas concentration that exceeds alarmsetpoints, if enabled.The non-compliance warning symbol is no longer displayed when morethan 24 hours have passed since the last alarm, or when a successfulbump test is performed via an IntelliDoX or MicroDock II station. The non-compliance warning symbol is permanently displayed when the service-lifecountdown reaches 24 hours or less before expiry, and for up to 30 daysafter expiry.When Non-compliance after gas exposure is enabled throughFleet Manager II via an IntelliDoX station, the LEDs flash in an alternatingpattern when the non-compliance warning symbol is displayed. When thesymbol is first displayed, the top LEDs flash. After 30 seconds, the sideLEDs flash. After 30 seconds, the pattern repeats until the non-compliancewarning symbol is no longer displayed.When the detector is bump tested via a MicroDock II station, an abnormaltest result may occur if non-compliance LEDs are flashing. To suspend theflashing for up to 10 minutes, press and release the pushbutton. When theflashing stops, insert the detector and perform the test. If the bump testfails, the LEDs resume flashing.Recall Events and SettingsWhen the detector is in normal operating mode, press the pushbuttonat any time to scroll through events and settings that are not empty ordisabled through Fleet Manager II via an IntelliDoX station. Events andsettings are displayed in this order:1. Peak Reading, if available, and when a maximum gas exposure eventhas occurred within the past 24 hours.2. Time of Peak Reading, if Real-time Clock display is enabled.3. Low Alarm Setpoint4. High Alarm Setpoint5. Real-time Clock, if enabled.6. Firmware Version7. Next Bump Due, if enabled.8. Hibernation, for 2-year H2S and CO hibernation models only.While an event or setting is displayed, press the pushbutton to scroll to thenext available event or setting. If you do not press the pushbutton, or if you have reached the last available event or setting, the detector returns to normal operation.Zero the SensorOver time and through use, the sensor baseline at zero exposure may drift from the manufacturer’s baseline. For optimal performance of O 2 models, BW recommends that you zero the O 2 sensor once every 24 hours or when the Automatic Zero Reminder is displayed. For all other models, BW recommends that you zero the sensor periodically.Zero Procedure1. Move to a normal atmosphere (20.9% v/v O 2) that is free of hazardous gas.2. Press and hold the pushbutton until a 5 second countdown is displayed, and then continue to hold until the countdown is complete.3. When the countdown is complete, the Zero procedure begins and ZErO is displayed.4. When Zero is successful, PASS is displayed, and thenthe detector returns to normal operation.5. If Zero is not successful, the non-compliance LED flashes. FAIL and the non-compliance warning symbol are displayed. Press the pushbutton to acknowledge the result and return to normal operation. The non-compliance warning symbol is displayed and the non-compliance LED flashes. Perform the Zero procedure again. If the procedure fails again, contact BW.Bump TestsWhen the detector is configured to display a bump test reminder, the bump test symbol is displayed when a bump test is due. For best results, bump test the detector via an IntelliDoX or MicroDock II station. Bump tests performed via an IntelliDoX or MicroDock II station are logged as bump tests. Manual bump tests are logged as unsafe gas concentrations.Event LogsThe detector stores the last 35 events that occurred, including peak readings, bump tests and auto zeros. Each record contains:• detector serial number, sensor type and life-remaining;• total number of events that have occurred;• event type and duration;• alarm level(s) in ppm or %;• time elapsed since the alarm occurred in days/hours/minutes; • duration of the alarm (minutes/seconds).Use Fleet Manager II via an IntelliDoX or MicroDock II station to transfer event logs from the detector to a computer. When logs are transferred via an IntelliDoX station, the most recent 35 events are transferred. When logs are transferred via a MicroDock II station, the most recent 10 events are transferred.Optional SettingsUse Fleet Manager II via an IntelliDoX station to enable the following optional settings for BW Clip detectors.Display Gas Reading During AlarmWhen Display gas reading during alarm is enabled, the gas concentration is displayed when a gas alarm event is detected. The gas concentration is displayed until the alarm event ends.Non-compliance After Gas ExposureWhen Non-compliance after gas exposure is enabled, the LEDs flash in an alternating pattern when the sensor is exposed to a gas concentration that exceeds alarm setpoints. When the gas exposure is detected, the top LEDs flash. After 30 seconds, the side LEDs flash. After 30 seconds, the pattern repeats until more than 24 hours have passed since the last alarm, or when a successful bump test is performed via an IntelliDoX or MicroDock II station.Real-time Clock DisplayWhen Real-time Clock Display is enabled, you can display the current time by pressing the pushbutton to Recall Events and Settings , and then continuing to press the pushbutton until the time is displayed.Time may be displayed in 12-hour or 24-hour clock format.HibernationHibernation is a factory installed feature that is available for 24-month H 2S and CO detectors. When Hibernation is activated, the operating life countdown is suspended. Use Hibernation to deactivate the detector for 7 days or longer, up to a maximum of 12 months. When Hibernation is activated, all detector safety functions are disabled.Activate Hibernation via BW Clip Hibernation Case1. Have ready a BW Clip Hibernation Case. To purchase a Case, contact BW or an authorized distributor.2. Move to a normal atmosphere (20.9% v/v O 2) that is free of hazardous gas.3. Verify that the detector is in normal operating mode.4. Press the pushbutton to Recall Events and Settings , and then continue to press the pushbutton until Hib is displayed.5. While Hib is displayed, press the pushbutton until a 5 second countdown is displayed. When the countdown is complete, the 20-second Hibernation counter is displayed.6. While the Hibernation counter is displayed, place the detector into a BW Clip Hibernation Case and then close the case firmly. The detector enters Hibernation mode. All detector safety functions are disabled.7. To reactivate the detector, open the case.Activate Hibernation through Fleet Manager II via IntelliDoX1. Use Fleet Manager II to activate Hibernation on Insertion via an IntelliDoX station, and then insert the detector in the configuredstation. The detector event logs are retrieved, and the detector enters Hibernation mode. All safety functions are disabled, and the detector may be removed from the IntelliDoX station.2. To reactivate the detector, press and hold the pushbutton until a5 second countdown is displayed, and then continue to hold until the LCD and LEDs turn on and off. The detector performs a self-diagnostic test. When the test is successful, the type of gas detected and the remaining operating life are displayed. The detector is in normal operating mode.3. For more information, refer to the operator manuals for the IntelliDoX station and Fleet Manager II software version4.0 or higher.About this PublicationThis publication is an operator guide for BW Clip portable single-gas detectors manufactured by BW Technologies by Honeywell. It is intended for use with the following models:• 24- and 36-month H 2S and CO Detectors • 24-month O 2 detector • 24-month SO 2 detectorCopyright, Notice, TrademarksWhile this information is presented in good faith and believed to be accurate,BW Technologies by Honeywell (BW) disclaims the implied warranties of merchantability and fitness for a particular purpose and makes no express warranties except as may be stated in its written agreement with and for its customers.In no event is BW liable to anyone for any indirect, special or consequential damages. The content in this document is subject to change.Contact UsCorporate HeadquartersBW Technologies by Honeywell 2840 – 2nd Avenue SECalgary AB Canada T2A 7X9Toll-free: 1-800-663-4164BW Clip2 OR3 YEAR H2S, CO, O2, SO2SINGLE-GAS DETECTORAmericasBW Technologies by Honeywell405 Barclay Blvd.Lincolnshire IL USA 60069Toll-free:1-888-749-8878EuropeBW Technologies by HoneywellHatch Pond House4 Stinsford RoadNuffield Industrial EstatePoole Dorset BH17 0RZ United Kingdom Toll-free: +44(0)1295 700300Web Warranty Registration/support/product-registrationMaximum Operating Life24-month Detector2 years after activation, assuming2 minutes of alarm time per day.Note: 24-month H2S and CO detectorsthat use hibernation may extend theservice period of the detector up to anadditional year. The service life will endonce the detector reaches 24 months ofactual operation. Hibernation provides amaximum service life of 36 months.36-month Detector3 years after activation, assuming 1 minuteof alarm time per day.Detection RangeH2S 0 to 100 ppmCO 0 to 300 ppmO20 to 25% by volumeSO20 to 100 ppmFactory Alarm SetpointsLow Alarm High AlarmH2S 10 ppm 15 ppmCO 35 ppm 200 ppmO219.5% vol 23.5% volSO25 ppm 10 ppmUse Fleet Manager II via an IntelliDoXstation to adjust alarm setpoints. For more information, refer to the operator manuals for Fleet Manager II software version4.0 and the IntelliDoX automatic test andcalibration station.Ratings and CertificationsThe BW Clip is in conformity with the following standards:UL 913 8th EditionUL 60079-0:2013,UL 60079-11:2013CSA C22.2 No. 157-92:2012,CSA C22.2 No. 60079-0:2011,CSA C22.2 No. 60079-11:2014EN 60079-0:2012 +A11:2013,EN 60079-11:2012EN 60079-26:2007IEC 60079-0:2011IEC 60079-11:2011IEC 60079-26:2006ABNT NBR IEC 60079-0:2008ABNT NBR IEC 60079-11:2009ABNT NBR IEC 60079-26:2008ULClassified by UL to both US and Canadian Standards as intrinsically safe for Class I, Division 1, Group A, B, C, D and Class I,Zone 0, Group IIC.ATEXCE 0539 II 1GEx ia IIC T4 Ga IP66/67DEMKO 14 ATEX 1356CEEuropean ConformityEU Declaration of ConformityIECExEx ia IIC T4 Ga IP66/67IECEx UL 14.0063INMETROEx ia IIC T4 GaDNV 15.0024KTL15-KA4BO-03061Eac ExRU С-US.ГБ08.В.01381SpecificationsShelf LifeH2S One (1) year before activationCO One (1) year before activationO2Six (6) months before activationSO2One (1) year before activationInstrument Weightalligator clip included92 grams (3.2 ounces)Instrument Dimensionsalligator clip included41 x 50 x 87 millimeters(1.6 x 2.0 x 3.4 inches)Operating TemperaturesH2S -40° to +50°C (-40° to +122°F)CO -30° to +50°C (-22° to +122°F)O2-20° to +50°C (-4° to +122°F)SO2-30° to +50°C (-22° to +122°F)Internal VibratingOperates to -10°C (+14°F)Intrinsic Safety Temperature Range-40 °C ≤ Ta ≤ +50°COperating Humidity5% to 95% relative humidity(non-condensing)Audible Alarm≈ 95 dB at 10 cm (3.9 in)Visual AlarmLEDs plus alarm LCD readoutDisplayLiquid crystal display (LCD)Sensor TypeElectrochemical cellsBatteryLithium, non-replaceableIngress ProtectionIP 66/67Alarm SetpointsInstant low and instant highCalibrationH2S not requiredCO not requiredSO2not requiredO2Perform the Zerodisplayed.Intended Usethan 21% v/v O2Recycling14bo0306Products may contain materials that areregulated for transportation under domesticand international dangerous goods regulations.Return product in compliance with appropriatedangerous goods regulations. Contact freightcarrier for further instructions.Limited Warranty andLimitation of LiabilityBW Technologies (BW) warrants this productto be free from defects in material andworkmanship under normal use and servicefor a period of two or three years (dependingupon detector), beginning on the date ofactivation. 24-month H2S and CO detectorsare covered for up to an additional 12 monthswhen hibernation is used, limited by a total of24 months of detector operation. This Warrantyis valid only if the detector is activated by thedate on the package. This warranty extendsonly to the sale of new and unused products tothe original buyer.BW’s warranty obligation is limited, at BW’soption, to refund of the purchase price, repair,or replacement of a defective product that isreturned to a BW authorized service centerwithin the warranty period.In no event shall BW’s liability hereunderexceed the purchase price actually paid by thebuyer for the Product.This warranty does not include:• fuses, disposable batteries or the routinereplacement of parts due to the normal wearand tear of the product arising from use;• any product which in BW’s opinion,has been misused, altered, neglectedor damaged by accident or abnormalconditions of operation, handling or use; or• any damage or defects attributable to repairof the product by any person other thanan authorized dealer, or the installation ofunapproved parts on the product.The obligations set forth in this warranty areconditional on:1)proper storage, installation, calibration,use, maintenance and compliance with theproduct manual instructions and any otherapplicable recommendations of BW;2)the buyer promptly notifying BW of anydefect and, if required, promptly making theproduct available for correction. No goodsshall be returned to BW until receipt by thebuyer of shipping instructions from BW; and3)the right of BW to require that the buyerprovide proof of purchase such as theoriginal invoice, bill of sale or packing slipto establish that the product is within thewarranty period.THE BUYER AGREES THAT THISWARRANTY IS THE BUYER’S SOLE ANDEXCLUSIVE REMEDY AND IS IN LIEU OFALL OTHER WARRANTIES, EXPRESSOR IMPLIED, INCLUDING BUT NOTLIMITED TO ANY IMPLIED WARRANTY OFMERCHANTABILITY OR FITNESS FOR APARTICULAR PURPOSE. BW SHALL NOTBE LIABLE FOR ANY SPECIAL, INDIRECT,INCIDENTAL OR CONSEQUENTIALDAMAGES OR LOSSES, INCLUDING LOSSOF DATA, WHETHER ARISING FROMBREACH OF WARRANTY OR BASED ONCONTRACT, TORT OR RELIANCE OR ANYOTHER THEORY.Since some countries or states do not allowlimitation of the term of an implied warranty,or exclusion or limitation of incidental orconsequential damages, the limitations andexclusions of this warranty may not apply toevery buyer. If any provision of this warrantyis held invalid or unenforceable by a court ofcompetent jurisdiction, such holding will notaffect the validity or enforceability of any otherprovisions.。
关于应用隐私泄露的英语作文
关于应用隐私泄露的英语作文Privacy leakage is a growing concern in the era of advanced technology. With the increasing use of mobile apps and online platforms, our personal information is at risk of being exposed to unauthorized parties. In this essay, I will discuss the implications of privacy leakage and provide possible solutions to address this issue.Privacy leakage can have serious consequences for individuals. Firstly, it can lead to identity theft. When our personal information, such as our name, address, and social security number, falls into the wrong hands, it can be used for fraudulent activities. For example, someone could use our identity to open credit card accounts or apply for loans, leaving us with a damaged credit history and financial burden.Moreover, privacy leakage can also result in invasion of our personal space. When our private messages, photos, or videos are accessed without our consent, it can causeemotional distress and violate our right to privacy. For instance, imagine if intimate photos or messages were leaked online, it could lead to humiliation and damage our reputation.Furthermore, privacy leakage can have detrimental effects on businesses and organizations. If sensitive corporate data, trade secrets, or customer information is exposed, it can lead to financial losses and damage the reputation of the company. For instance, a competitor gaining access to a company's confidential product design can replicate it and undermine the original company's market position.To tackle the issue of privacy leakage, bothindividuals and organizations need to take proactive measures. Firstly, individuals should be cautious about the apps they download and the information they provide. Reading privacy policies and reviews can help identify apps that prioritize data security. Additionally, individuals should regularly update their passwords and enable two-factor authentication for added security.Organizations also have a responsibility to protect user data. They should implement robust security measures, such as encryption and firewalls, to safeguard sensitive information. Regular security audits and employee training can also help prevent internal breaches. Moreover, organizations should be transparent about their data collection and usage practices, ensuring that users are aware of how their information is being handled.In conclusion, privacy leakage poses significant risks to individuals and organizations. It can lead to identity theft, invasion of personal space, and financial losses. To address this issue, individuals should be cautious about the apps they use and regularly update their security settings. Organizations, on the other hand, shouldprioritize data protection and transparency. By working together, we can create a safer digital environment for everyone.中文回答:随着科技的进步,隐私泄露成为一个日益严重的问题。
恒力视觉设备说明书
If connectsUD25844B-BUse only power supplies listed in the user instructions:©2021Hangzhou Hikvision Digital Technology Co.,Ltd.All rights reserved.This Manual is the property of Hangzhou Hikvision Digital Technology Co.,Ltd.or its affiliates(hereinafterreferred to as“Hikvision”),and it cannot be reproduced,changed,translated,or distributed,partially orwholly,by any means,without the prior written permission of Hikvision.Unless otherwise expressly statedherein,Hikvision does not make any warranties,guarantees or representations,express or implied,regarding to the Manual,any information contained herein.About this ManualThe Manual includes instructions for using and managing the Product.Pictures,charts,images and all otherinformation hereinafter are for description and explanation only.The information contained in the Manual issubject to change,without notice,due to firmware updates or other reasons.Please find the latest versionof this Manual at the Hikvision website(https:///).Please use this Manual with the guidance and assistance of professionals trained in supporting the Product.Trademarks Acknowledgementand other Hikvision’s trademarks and logos are the properties of Hikvision in variousjurisdictions.Other trademarks and logos mentioned are the properties of their respective owners.LEGAL DISCLAIMERTO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW,THIS MANUAL AND THE PRODUCT DESCRIBED,WITH ITS HARDWARE,SOFTWARE AND FIRMWARE,ARE PROVIDED“AS IS”AND“WITH ALL FAULTS ANDERRORS”.HIKVISION MAKES NO WARRANTIES,EXPRESS OR IMPLIED,INCLUDING WITHOUT LIMITATION,MERCHANTABILITY,SATISFACTORY QUALITY,OR FITNESS FOR A PARTICULAR PURPOSE.THE USE OF THEPRODUCT BY YOU IS AT YOUR OWN RISK.IN NO EVENT WILL HIKVISION BE LIABLE TO YOU FOR ANY SPECIAL,CONSEQUENTIAL,INCIDENTAL,OR INDIRECT DAMAGES,INCLUDING,AMONG OTHERS,DAMAGES FOR LOSSOF BUSINESS PROFITS,BUSINESS INTERRUPTION,OR LOSS OF DATA,CORRUPTION OF SYSTEMS,OR LOSS OFDOCUMENTATION,WHETHER BASED ON BREACH OF CONTRACT,TORT(INCLUDING NEGLIGENCE),PRODUCTLIABILITY,OR OTHERWISE,IN CONNECTION WITH THE USE OF THE PRODUCT,EVEN IF HIKVISION HAS BEENADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR LOSS.YOU ACKNOWLEDGE THAT THE NATURE OF INTERNET PROVIDES FOR INHERENT SECURITY RISKS,ANDHIKVISION SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL OPERATION,PRIVACY LEAKAGE OROTHER DAMAGES RESULTING FROM CYBER-ATTACK,HACKER ATTACK,VIRUS INSPECTION,OR OTHERINTERNET SECURITY RISKS;HOWEVER,HIKVISION WILL PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED.YOU AGREE TO USE THIS PRODUCT IN COMPLIANCE WITH ALL APPLICABLE LAWS,AND YOU ARE SOLELYRESPONSIBLE FOR ENSURING THAT YOUR USE CONFORMS TO THE APPLICABLE LAW.ESPECIALLY,YOU ARERESPONSIBLE,FOR USING THIS PRODUCT IN A MANNER THAT DOES NOT INFRINGE ON THE RIGHTS OFTHIRD PARTIES,INCLUDING WITHOUT LIMITATION,RIGHTS OF PUBLICITY,INTELLECTUAL PROPERTY RIGHTS,OR DATA PROTECTION AND OTHER PRIVACY RIGHTS.YOU SHALL NOT USE THIS PRODUCT FOR ANYPROHIBITED END-USES,INCLUDING THE DEVELOPMENT OR PRODUCTION OF WEAPONS OF MASSDESTRUCTION,THE DEVELOPMENT OR PRODUCTION OF CHEMICAL OR BIOLOGICAL WEAPONS,ANYACTIVITIES IN THE CONTEXT RELATED TO ANY NUCLEAR EXPLOSIVE OR UNSAFE NUCLEAR FUEL-CYCLE,OR INSUPPORT OF HUMAN RIGHTS ABUSES.IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW,THE LATER PREVAILS.Data ProtectionDuring the use of device,personal data will be collected,stored and processed.To protect data,thedevelopment of Hikvision devices incorporates privacy by design principles.For example,for device withfacial recognition features,biometrics data is stored in your device with encryption method;for fingerprintdevice,only fingerprint template will be saved,which is impossible to reconstruct a fingerprint image.As data controller,you are advised to collect,store,process and transfer data in accordance with theapplicable data protection laws and regulations,including without limitation,conducting security controls tosafeguard personal data,such as,implementing reasonable administrative and physical security controls,conduct periodic reviews and assessments of the effectiveness of your security controls.Scan the QR code to get the user manual for detailed information.select face,Fingerprint:Tap icon,.Set We password characters,fingerprint 4.Tap instruc�ons.picture.the save the light Regulatory InformationFCC InformationPlease take attention that changes or modification not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment.FCC compliance:This equipment has been tested and found to comply with the limits for a Class B digital device,pursuant to part 15of the FCC Rules.These limits are designed to provide reasonable protection against harmful interference in aresidential installation.This equipment generates,uses and can radiate radio frequency energy and,if not installed and used in accordance with the instructions,may cause harmful interference to radio communications.However,there is no guarantee that interference will not occur in aparticular installation.If this equipment does cause harmful interference to radio or televisionreception,which can be determined by turning the equipment off and on,the user is encouraged to try to correct the interference by one or more of the following measures:—Reorient or relocate the receiving antenna.—Increase the separation between the equipment and receiver.—Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.—Consult the dealer or an experienced radio/TV technician for help.This equipment should be installed and operated with a minimum distance 20cm between the radiator and your body.FCC ConditionsThis device complies with part 15of the FCC Rules.Operation is subject to the following two conditions:1.This device may not cause harmful interference.2.This device must accept any interference received,including interference that may cause undesired operation.This product and -if applicable -the supplied accessories too are marked with "CE"and comply therefore with the applicable harmonized Europeanstandards listed under the RE Directive 2014/53/EU,the EMC Directive 2014/30/EU,the RoHS Directive 2011/65/EU.2006/66/EC (battery directive):This product contains a battery that cannot be disposed of as unsorted municipal waste in the European Union.See the product documentation for specific battery information.The battery is marked with this symbol,which may include lettering to indicate cadmium (Cd),lead (Pb),or mercury (Hg).For proper recycling,return the battery to your supplier or to a designatedcollection point.For more information see:2012/19/EU (WEEE directive):Products marked with this symbol cannot be disposed of as unsorted municipal waste in the EuropeanUnion.For proper recycling,return this product to your local supplier upon the purchase of equivalent new equipment,or dispose of it atdesignated collection points.For more information see:。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
1
Introduction
CDMA has been recognised as an important access scheme for third generation mobile radio communication systems [1]. However, the attractive flexibility of CDMA comes at the price of multiple access interference (MAI) and also intersymbol interference (ISI) which is magnified in the mobile radio channel where time varying multipath propagation is present [1]. ISI and, more importantly, MAI can be mitigated by multiuser detection techniques, [2]–[8], which are also termed joint detection (JD) techniques [9, 10]. Unfortunately the optimum
Abstract In this paper we align a class of known multiuser detectors for code division multiple access (CDMA) along with some new multiuser detectors in a unified group. The new multiuser detectors are devised by completing the structure of the group. The unified group structure is a binary tree obtained by splitting • sequence and single symbol detection, • maximum a–posteriori (MAP) and maximum likelihood (ML) detection, and • unconstrained as well as constrained detection. The link between sequence and single symbol estimators is explained revealing the increased complexity of single symbol estimators as compared to sequence estimators. Finally, the aforementioned group structure is supported by a geometrical technique depicting the detection process performed by the multiuser detectors.
Page 1
A Unified Approach to Multiuser Detectors for CDMA and Their Geometrical Interpretations
Peter Jung
University of Kaiserslautern Department of Electrical Engineering Research Group for RF Communications P.O. Box 3049 D–67653 Kaiserslautern, Germany E-Mail: wowbag@rhrk.uni-kl.de
Paul D. Alexander
University of South Australia Signal Processing Research Institute Mobile Communications Research Centre Warrendi Road, The Levels SA 5095, Australia E-Mail: palex@.au
P. Jung, P. D. Alexander: A Unified Approach to Multiuser Detectors for CDMA and Their Geometrical Interpretations
Page 2
multiuser detectors (MD’s) for both sequence detection (SD) and single symbol detection (SSD) are not practical due to the performance/cost ratio exhibited by today’s technology. To alleviate this complexity problem many linear complexity MD’s have been proposed in the literature, cf. e.g. [3], [7]–[11]. These MD’s trade performance for complexity and thus become candidates for implementation in third generation mobile radio systems [1]. The viability of such linear complexity MD’s has already been demonstrated in a recently proposed cellular CDMA mobile radio system applying JD which is termed JD–CDMA [10, 12]. The optimum and linear complexity MD’s have been developed independently and the similarities between them have not been illustrated yet. This shall be done in this paper. Moreover, we shall give an illustrative geometrical description of the detection process carried out by the aforementioned MD’s. To allow a better understanding of the following explanations, we shall first give a definition of the terms detection and estimation. An elaborate presentation of estimation and detection theory can be found in [13]. Detection is the deciding on the cause of an output that is random in character, based on the observation of the mentioned output. For example, the cause could be a data symbol transmitted over a radio channel, resulting in a particular output signal after the channel. This output signal represents the aforementioned observation. Assume that the symbol alphabet has cardinality M . The symbol alphabet is therefore a constrained set. There are M different possible causes that might have resulted in the observation. Hence, the detection outcome is a random variable taken from a constrained set, which is identical to the symbol alphabet. The detection outcome is hence M –ary. Estimation is the determining of the value of a parameter which has influenced the aforementioned observation. The estimation outcome is hence not constrained to a set with finite cardinality. It is rather taken from an unconstrained set. Estimation is hence the continuous extension of detection. In what follows, we will use the term detection in most cases, however, being well aware of the fact that detectors can also be seen as estimators. Two categories of MD’s are conceivable, namely SD based MD’s and SSD based MD’s. In the case of the SD based MD’s the objective is to find that particular data sequence which was most probably transmitted according to some hypothesis criterion. SSD based MD’s try to find that particular data symbol which was most probably transmitted at a particular time, again satisfying some hypothesis criterion. SSD based MD’s are not widely known and to the knowledge of the authors have not yet been studied thoroughly. The authors shall concisely explain the basis of such rather new SSD based MD’s and shall also demonstrate