摘要:
It is an object of the present invention to find out parts to be a highly possible cause of failure without searching all of part data of all of products. Dispersed parts data on a parts tree are sequentially accessed from a set of known failed products, and part attribute values each having a higher support in the faulty product are extracted. In this process, a subset of parts used in the faulty product is also obtained simultaneously. The part attribute values having higher supports and the subset of parts used in the faulty product are represented as a tree in which a parts type serves as a node. Next, an information gain of a rule that having the two part attribute values is a cause of failure is calculated on two part attribute values having higher supports on the tree of the parts type. This calculation is locally performed on a common parent part of two parts and parts having a certain information gain is outputted as a cause of failure. How to select these two part attributes is performed in such a way that part attributes located closer to each other on the tree are first evaluated, and first found part attributes are made a candidate of a cause of failure.
摘要:
It is an object of the present invention to find out parts to be a highly possible cause of failure without searching all of part data of all of products.Dispersed parts data on a parts tree are sequentially accessed from a set of known failed products, and part attribute values each having a higher support in the faulty product are extracted. In this process, a subset of parts used in the faulty product is also obtained simultaneously. The part attribute values having higher supports and the subset of parts used in the faulty product are represented as a tree in which a parts type serves as a node. Next, an information gain of a rule that having the two part attribute values is a cause of failure is calculated on two part attribute values having higher supports on the tree of the parts type. This calculation is locally performed on a common parent part of two parts and parts having a certain information gain is outputted as a cause of failure. How to select these two part attributes is performed in such a way that part attributes located closer to each other on the tree are first evaluated, and first found part attributes are made a candidate of a cause of failure.
摘要:
A system and method for using design specification and measurements on manufactured products in conceptual design model are provided. In one aspect, a conceptual model is extended to map one or more model elements to corresponding external reference values. The corresponding external reference values include at least design specification values and manufacturing properties associated with one or more model elements. The model elements mapped to corresponding external reference values are presented, for example, for identification and consistency checks of attributes at various stages of product life cycle.
摘要:
The invention provides data processing, data control and information methods and systems for efficiently duplicating contents of a database in the data control system. An example of a data processing system includes: a cache unit acquiring, from a data control system which categorizes a plurality of data elements into a plurality of clusters and stores the plurality of clusters; a group-of-clusters update information acquisition unit for acquiring from the data control system group-of-clusters update information with respect to a group of clusters consisting of two or more clusters; a group-of-clusters update information computation unit for computing group-of-clusters update information with respect to the group of clusters based on two or more pieces of cluster update information; and an update judging unit for judging that a cached data element belonging to the group of clusters is the most updated one.
摘要:
A signature device having an item selection input section which accepts a selection of a group of items formed by combining an item delivered from at least one supplier and an item generated by itself, a path verification information updating section which updates path verification information to verify a delivery route included in the signature information on the delivered item, a signature information preparation section which prepares new signature information from a signature prepared by itself and the updated path verification information with respect to the selected item group, and a signature information transmitting section which transmits the new signature information to the signature verification device. The signature verification device receives the new signature information and verifies the delivery routes for all the items included in the selected item group based on the new signature information.
摘要:
The invention provides data processing, data control and information methods and systems for efficiently duplicating contents of a database in the data control system. An example of a data processing system includes: a cache unit acquiring, from a data control system which categorizes a plurality of data elements into a plurality of clusters and stores the plurality of clusters; a group-of-clusters update information acquisition unit for acquiring from the data control system group-of-clusters update information with respect to a group of clusters consisting of two or more clusters; a group-of-clusters update information computation unit for computing group-of-clusters update information with respect to the group of clusters based on two or more pieces of cluster update information; and an update judging unit for judging that a cached data element belonging to the group of clusters is the most updated one.
摘要:
An access management system includes an access administration apparatus which permits access to a database when the access request satisfies an access permission condition, and a policy determination apparatus which determines whether the access permission condition is satisfied by the access request; in which the access administration apparatus stores decision information containing a decision as to whether the access permission condition is satisfied, determines that the access request satisfies the access permission condition if the decision information has a predetermined inclusion relation with the access request, receives a decision as to whether the access permission condition is satisfied by the access request from the policy determination apparatus if it is determined that the decision information does not have the inclusion relation with the access request, and permits access to the database if it is determined that the access request satisfies the access permission condition.
摘要:
A method and a system for safely generating a cryptographic key that is separately provided to a plurality of servers. Through the collaboration of multiple users a cryptographic key is generated for the servers. Specifically, random values are exchanged among the multiple servers, and based on these values, cryptographic keys are generated. Even though the cyclic feature of the cryptographic keys of the individual servers is lost by the exchange of the random values by at least two servers, the cyclic feature for the overall system can be maintained. Public keys for the multiple cryptographic keys are generated and are published. A new public key is generated by combining a plurality of public keys, and a corresponding cryptographic key is calculated by using the cryptographic keys of the individual servers. A key updating cycle (depending on the number of cryptographic key registers) is introduced for each server, so that decryption key information appears only during a specific cycle (this is called a cyclic system). A time key is generated by the cyclic system, and when a plurality of such cyclic systems are prepared and are autonomically activated, a safer time key can be generated. In the above described distributed system that includes multiple servers, key information can not be obtained even when one system maintains its own state. Since the servers periodically update their cryptographic keys, it is ensured that the calculation of a cryptographic key will be inhibited until a decryption time has been is reached.
摘要:
A solid model is created from a plurality of incomplete drawings. Line segments or curves on each view are calculated from two-dimensional data of a three-view drawing. A wireframe model is created on the basis of the calculated line segments or curves. The wireframe model is corrected by comparing edges of the created wireframe model and the line segments or curves. The corrected wireframe model is converted into a cell-decomposition model. Conditions establishing the line segments or curves as edges of the cell-decomposition model are set by Boolean expressions. A solid model is synthesized on the basis of combinations of cells which are solutions of the expressions. If no solution exists even if the expressions are solved, candidate models are synthesized on the basis of any combination of cells. The synthesized candidate models are displayed in the descending order of the degree of similarity. Alternatively, if a plurality of combinations of cells which are the solutions do exist, a candidate model selected by the operator is determined to be the solid model.
摘要:
A system which implements a method for providing attribute data. A request is received from a user device via a network for a virtual ID token relating to attribute information pertaining to a subscriber associated with the user device. A data record including L attributes of the subscriber is read from a database, L being at least 2. The data record is provided to the user device via the network. A selection of M attributes of the L attributes is received from the user device via the network, M being less than L. A virtual record including the M attributes selected from the data record is generated, the virtual record including a virtual ID (VID) for identifying the virtual record. The generated virtual record is stored in the database. The virtual ID token is provided to the user device via the network, wherein the virtual ID token includes the VID.