摘要:
In an image filtering system including an input device for inputting image data, a memory unit for storing an image data or the result derived by performing operation on the input image data, an arithmetic unit for performing operations between the image data inputted by the input device or between the input image data and the image data stored in the memory unit or between the image data stored in the memory unit, a loading unit for storing the results of the operation performed by the arithmetic unit in the memory, and an addressing device for designating the addresses of the memory in or from which the data is to be written or read out, an image filtering method in which a predetermined operation is performed 3(n-1) times on 2n inputs or input rows of the image data succeeding one another in a predetermined direction with a filter of a size n, to thereby determine (n+1) results or rows thereof.
摘要:
A urine receiver which is sanitary, easy to attach, and furthermore, prevents urine leakage even when a wearer repeatedly changes positions is provided. A urine receiver 10 is implemented in a urine collection processing system wherein urine discharged from the wearer is suctioned into a urine tank via a urethral tube. The urine receiver 10 comprises, at the least: a liquid permeable, air-impermeable sheet 21 which is placed opposite of and covering the urethral meatus of the wearer; a leak-proof sheet 22 which is placed on the surface of the air-impermeable sheet 21 opposite to the urethral meatus and bonds to the outer border of the air-impermeable sheet 21; a suction part 26 which is provided between the air-impermeable sheet 21 and the leak-proof sheet 22 and to which the urethral tube 11 is connected; and a gathers part 16 for sealing the space between the air-impermeable sheet 21 and the wearer's skin surface which is provided on the outer border part of the air-impermeable sheet 21 on the urethral meatus side.
摘要:
A distributed storage system includes one or a plurality of storage units including a plurality of physical storage devices, and a plurality of computers connected to the one or plurality of storage units via a communication network. When receiving a write request for a logical volume, the computer writes write data corresponding to the write request and redundant data for making the write data redundant in a plurality of physical storage devices of the storage unit in a distributed manner, and collectively controls writing of a journal of write data for managing a write history of the write data and a journal of redundant data for managing a write history of the redundant data.
摘要:
A corrosive environment monitoring device that suppresses a decline in measurement precision in an initial period of monitoring the corrosivity of an environment and measures the corrosivity of the environment continuously and with high precision over a long period of time. The corrosive environment monitoring device includes: a layered body having an insulating plate, a base metal thin film that is formed on the insulating plate and is corrosion resistant with respect to a corrosive substance, and a sensing metal thin film that is formed on the base metal thin film and is corrosion susceptible with respect to the corrosive substance; and a housing that encloses the layered body, has an opening oriented in a side face direction, and forms a gas passage inside for the corrosive substance, wherein the sensing metal thin film is formed in a limited region on the base metal thin film.
摘要:
An unauthorized intrusion analysis support apparatus is configured to receive an input of a field related to an unauthorized intrusion; is configured to extract at least one word in the inputted field relevant to the unauthorized intrusion to an apparatus communicably coupled to a predetermined network from a text relevant to the unauthorized intrusion to the apparatus; is configured to calculate a relevance degree between the extracted word and a mode of the unauthorized intrusion based on the extracted word and information on a word of the mode of the unauthorized intrusion in the inputted field and assume that the text is a text about the unauthorized intrusion in the inputted field when the calculated relevance degree is equal to or higher than a predetermined threshold; and is configured to output information indicating that the text is the text about the unauthorized intrusion in a user field.
摘要:
Cooperation in supply and demand balance of renewable energy in a region is implemented by operation of infrastructures of an infrastructure service such as water supply. In an energy management system including: a processor; and a storage device, the processor predicts an electric power supply amount utilizing renewable energy in a predetermined region, predicts an electric power demand amount in the region, predicts a demand amount of an infrastructure service different from an electric power service in the region, predicts an electric power demand amount corresponding to the infrastructure service on the basis of the predicted demand amount of the infrastructure service in the region, and determines use time of electric power corresponding to the infrastructure service such that the electric power demand amount in the region approaches the electric power supply amount.
摘要:
A data analysis apparatus executes: a selection process selecting a first feature variable group that is a trivial feature variable group contributing to prediction and a second feature data group other than the first feature variable group from a set of feature variables; an operation process operating a first regularization coefficient related to a first weight parameter group corresponding to the first feature variable group in a manner that the loss function is larger, and operating a second regularization coefficient related to a second weight parameter group corresponding to the second feature variable group in a manner that the loss function is smaller, among a set of weight parameters configuring a prediction model, in a loss function related to a difference between a prediction result output in a case of inputting the set of feature variables to the prediction model and ground truth data corresponding to the feature variables.
摘要:
A storage apparatus includes a plurality of drives and has a parity group constituted by a plurality of drives. The storage apparatus stores a hash management table to manage hash values of a prescribed data unit of data of the drives constituting the parity group and a hash value of a prescribed data unit of data stored in another drive other than the drives constituting the parity group. A processor is configured to determine whether a same data unit as a data unit included in data stored in a replacement target drive exists in the other drive on a basis of the hash values, and copy the same data unit of the other drive to a replacement destination drive when the same data unit exists.
摘要:
A controller and a rectangular parallelepiped power supply apparatus are coupled to a rear surface of a midplane, to which a plurality of storage media drives are coupled in a front surface of the midplane. A plurality of interface connectors arranged in a left-right direction are provided at a front end of a controller substrate. The rear surface of the midplane includes a plurality of connectors for controller, which are a plurality of connectors arranged in the left-right direction to which interface connectors of the controller are respectively coupled, and a connector for power supply, which are connectors to which a power supply apparatus set horizontally is coupled. A part of a row of the connectors for controller is present below the power supply apparatus coupled sideways to the connector for power supply.
摘要:
Whether a connected drive is an unauthorized drive or not can be judged before it becomes possible for the connected drive to access a memory for a storage controller. When a storage device is connected, an information processing apparatus forms a first communication channel via a first interface incapable of accessing a built-in memory even when the communication connection is established; and a second communication channel via a second interface capable of accessing the built-in memory when the communication connection is established. At a specified timing when the communication connection via the second communication channel is not established, a processor executes authenticity verification processing for verifying authenticity of the storage device on the basis of information acquired from the storage device by using the first communication channel and permits establishment of the communication connection via the second communication channel when the authenticity is confirmed by the authenticity verification processing.