摘要:
Solar tracking assemblies and methods for tracking the movement of the Sun are described herein. The dual axis solar tracking system generally includes a foundation, a primary layer, a secondary layer, and at least one motor that controls a first and second actuator. The foundation is designed to uniformly distribute the weight of the solar tracking assembly in the absence of additional securing or structural supports. The primary layer is adapted to rotate relative to a primary axis. The secondary layer is adapted to rotate relative to a secondary axis. The secondary layer is adapted for attachment of a payload thereto which may absorb the Sun's energy.
摘要:
Example implementations relate to communication in a federated computing environment. For example, a method includes identifying, by a computing resource, at least one other computing resource within the federated computing environment, where the federated computing environment includes a pool of computing resources. The method also includes exchanging trust parameters with each of the at least one other computing resource, where the trust parameters are indicative of identification and authenticity of computing resources within the pool of computing resources. The method also includes communicating a first set of tokens to each of the at least one other computing resource, and receiving a second set of tokens from the at least one other computing resource, such that the first set of tokens and the second set of tokens form a global set of tokens for accessing the pool of computing resources of the federated computing environment.
摘要:
System pre-processes and computes class distribution of decision attribute and statistics for discretization of continuous attributes through use of compute buckets. System computes the variability of each of the attributes and considers only the non-zero variability attributes. System computes the discernibility strength of each attribute. The software system generates size 1 patterns using compute bucket and calculates if each pattern of size 1 is a reliable pattern for any class. The system calculates if reliable pattern of size 1 is a significant pattern for any class. The system generates size k patterns from size k−1 patterns checking for significance of size k patterns and refinability. The system readjusts pattern statistics for only significant patterns for size k−1 patterns. The system computes a cumulative coverage of the sorted relevant patterns of up to size k by finding out the union of records of that particular class.
摘要:
Aspects of the present disclosure include crystalline bazedoxifene free base, crystalline bazedoxifene acetate Form D, and processes for their preparation. The drug compound having the adopted name “bazedoxifene acetate” has a chemical name 1-[4-(2-azepan-1-yl-ethoxy)benzyl]-2-(4-hydroxyphenyl)-3-methyl-1H-indol-5-ol acetic acid, and has the chemical structure shown below as Formula I.
摘要:
A system for transmitting data packets includes a memory that stores buffer descriptor (BD) rings, packet en-queuing and de-queuing modules, and a network controller. The packet en-queuing module en-queues a first data packet into a first BD ring based on a first priority value of the first data packet and a first set of quality-of-service (QoS) rules. The packet de-queuing module de-queues a second data packet from a second BD ring based on a second set of quality-of-service (QoS) rules and indicates to the network controller that the second data packet is ready for transmission from the second BD ring.
摘要:
Described is a source program code language that facilitates the association of security proofs obtained from a solver (e.g., a Z3 theorem prover) with the program code. The code may include affine types, dependent types and/or refinement types. A derefinement procedure replaces each refinement type with a dependent pair type corresponding to the proof. A target code type checker verifies the target code with respect to the security policies. If verified as complying with security policy, a verified program corresponding to the translated program may then be installed and run.
摘要:
A framework for supporting one or more repair processes of one or more aircraft. The repair processes are based on repair information or repair solution corresponding to the damages to one or more structural components of the aircraft. The framework includes a knowledge engine, and a deployment engine. The knowledge engine automatically generates one or more knowledge interpretation systems based on the user inputs. The knowledge interpretation systems provide the repair information corresponding to the various structural components of the aircraft based on the user inputs. The deployment engine fulfills the deployment requirements corresponding to the one or more knowledge interpretation systems.
摘要:
A method and network device (e.g., a switch) is described for assigning virtual Ethernet bindings. The method may comprise accessing the network device to obtain information related to hardware (e.g., switching hardware) of the network device. Thereafter, an uplink binding from a plurality of physical uplinks is selected based on the information. A virtual network interface of a virtual machine is then mapped to the selected uplink binding.
摘要:
Techniques for performing traffic classification for uplink and bi-directional traffic streams are described. A station receives packets for transmission on the uplink to an access point. The station identifies packets for each uplink traffic stream and packets for each bi-directional traffic stream based on at least one classification parameter for each traffic stream. The station sends packets for each traffic stream in accordance with at least one QoS parameter for the traffic stream. The access point receives packets for transmission on the downlink to at least one station. The access point identifies packets for each downlink traffic stream and packets for each bi-directional traffic stream based on at least one classification parameter for each traffic stream. The access point sends packets for each traffic stream in accordance with at least one QoS parameter for the traffic stream.
摘要:
An object proximity alert system for an object network includes an object module having a data processing unit; a GPS unit; and a transceiver, the latter both connected to the data processing unit. A first object in the network has the module, such that the data processing unit obtains first object position data from the GPS unit, calculates the speed of the object, and transmits position data using the transceiver to other network objects, the data processing unit calculates the respective positions of the first object with the objects in the network based on the data, and compares the position data against a preset target separation between the first object and the other objects. In the event a separation distance between the first object and another object in the network is less than the target separation, the data processing unit generates an alarm in at least the first object.