摘要:
In the field of industrial automation, a method and device are for determining a data reading period for determining a data reading period of data in an industrial control system, and are capable of automatically configuring the data reading period to obtain a better configuration result. In embodiments of the present invention, an industrial control system in different states is simulated by using simulation software to obtain a simulation model and simulation data. Data features of the industrial control system in different states that is simulated can be extracted respectively, and a data reading period is determined according to the extracted data features. Automatic configuring of a data reading period is implemented.
摘要:
The popularly used toilets waste tons of water every year, and laying sewage is very costly. To save money and prevent environment, the present invention is an apparatus and method of environment-friendly collecting and processing human excreta including but not limited to environment-friendly bag (EB), man's environment-friendly bag (MEB), and woman's environment-friendly bag (WEB). Each of them is constituted by a pair of flexible film panels with a desired shape, a pair of lockable track/structures and a slider. Every part is made from biodegradable, waterproofing, and flexible material with suitable mechanical properties. The present invention also includes an environmental-friendly toilet with light and cheap material allowing EB to be adapted and a processing equipment converting human excreta into methane and fertilizer. The present invention allows human excreta to be collected and processed, and helps saving money and water.
摘要:
Embodiments provide a data transmission method and apparatus. The method includes: after obtaining information of a target input port of a data receiving device and information of a target protocol used by a target Internet of Things device connected to the target input port, the data receiving device determines the target input port and the target protocol, and decapsulates, according to the target protocol, a first data packet transmitted by the target Internet of Things device via means of the target input port to obtain data. The data receiving device can adaptively determine a target protocol according to the information of the target protocol used by the target Internet of Things device, without configuring the target protocol for the target Internet of Things device in advance.
摘要:
Techniques are described for deploying a security credential for an application deployed in a cloud. An encrypted security credential is received from a remote system and is inserted into a virtual machine instance associated with the application. Upon deploying the virtual machine instance, embodiments transmit a request to a cryptex server for a decrypted security credential, the request including the encrypted security credential and a virtual machine identifier for the deployed virtual machine instance. The cryptex server is configured to retrieve metadata associated with the virtual machine identifier and to authenticate the deployed virtual machine instance using the retrieved metadata. Embodiments receive, from the cryptex server, the decrypted security credential for use by the application.
摘要:
Techniques are described for deploying a security credential for an application deployed in a cloud. An encrypted security credential is received from a remote system and is inserted into a virtual machine image associated with the application. Upon deploying the virtual machine image as a virtual machine instance, embodiments transmit a request to a cryptex server for a decrypted security credential, the request including the encrypted security credential and a virtual machine identifier for the virtual machine instance. The cryptex server is configured to retrieve metadata associated with the virtual machine identifier and to authenticate the virtual machine instance using the retrieved metadata. Embodiments receive, from the cryptex server, the decrypted security credential for use by the application.
摘要:
A reader and method for adjusting the transmission time of a continuous wave (CW), wherein the method comprises setting an initial value for a response waiting time, sending the CW to a tag after sending a command to the tag and waiting for a response from the tag, judging whether the response from the tag is received within the response waiting time. If the response from the tag is received within the response waiting time, then sending of the CW is stopped and the response waiting time is adjusted. If the response from the tag is still not received beyond the response waiting time, then sending of the CW is stopped. The time for the reader to wait for a response from the tag is far less than 20 ms. Consequently, a command failure can be found early, so as to improve the processing efficiency of an RFID system.
摘要:
A reader and method for adjusting the transmission time of a continuous wave (CW), wherein the method comprises setting an initial value for a response waiting time, sending the CW to a tag after sending a command to the tag and waiting for a response from the tag, judging whether the response from the tag is received within the response waiting time. If the response from the tag is received within the response waiting time, then sending of the CW is stopped and the response waiting time is adjusted. If the response from the tag is still not received beyond the response waiting time, then sending of the CW is stopped. The time for the reader to wait for a response from the tag is far less than 20 ms. Consequently, a command failure can be found early, so as to improve the processing efficiency of an RFID system.
摘要:
A technique for managing a web page having at least one URL supporting search engine preferred Universal Resource Locator (URL) links through URL mapping and shadow page support is provided. Because a search engine crawler typically does not want to crawl through dynamic URLs, a search engine friendly page would typically contain static URLs. Support is provided for obtaining the web page containing the at least one URL link and determining the at least one URL link to be of a dynamic format then converting the dynamic format of the at least one URL link into a static format. Next, a shadow page of the web page is created, containing the static format link, and placed in the shadow page repository. A web application server may then enabled to provide a URL mapping function to convert such a static URL to a desired dynamic format, based on a provided mapping file. Web administrators or developers may then define an entry in such a mapping file for each URL key that needs to be mapped.
摘要:
The present disclosure provides a method and device for assessing a lifecycle of a component. In an embodiment, the method includes: obtaining, using a simulation device, model description information that corresponds to component models of some or all components in the production line; obtaining at least one piece of data information that is needed by at least one component model that corresponds to the model description information; performing event marking based on the event information on the obtained data information; obtaining component status information of a corresponding component of each model based on the marked data information; and generating a corresponding analysis report based on the component status information from. An advantage of an embodiment is that, a failure mode, a key module, and a measurement rule no longer rely on manual operations and experience of an expert. Instead corresponding information may be precisely provided by using a PLM system.