摘要:
A mechanism for operating one or more hinged doors on a hopper car including an elongated operating shaft having a fixed axis of rotation and a linkage system for operably connecting the operating shaft to the hinged doors on the railroad hopper car. The linkage system includes an actuating link operably connected to and rotatable with the operating shaft and a connecting link for operably connecting the actuating link to each door. The linkage system links includes a primary lock for holding each door in the closed position. A selectively operated secondary lock is rotatable about a fixed axis disposed above the fixed axis of the operating shaft assembly. The secondary lock rotates between a first condition, wherein a stop engages with at least one link of the linkage assembly, and a second condition, wherein each door is permitted to move to the open position. A release mechanism is provided for releasing the primary lock by moving at least one of the links of the linkage system relative to the other thereby allowing the door to be forcibly moved toward their open position under the influence of the columnar load being placed thereon by the lading in the hopper.
摘要:
An apparatus for controlling the discharge of materials from a railcar having a hopper carried on a mobile frame. The hopper defines a longitudinally disposed discharge opening. The railcar has a door pivotally mounted for movement between an open position and a closed position relative to the discharge opening. The apparatus for controlling the discharge of materials from the railcar includes an operating shaft and a drive operably coupled between the door and the operating shaft for causing the door to move from the closed position toward the open position in response to rotation of the operating shaft. The drive also includes a lost motion connection for protecting the operating shaft as the door freely pivots toward the open position during collapsing movement of the lost motion connection and after the operating shaft has been rotated a predetermined amount to open the door.
摘要:
A computer-executable method for allocating resource discovery and identification processes among a plurality of management tools and resources in a distributed and heterogeneous IT management system includes providing at least one authoritative manageable resource having minimal or no responsibility for reporting its identity, minimal or no responsibility for advertising any lifecycle-related creation event for the resource, and minimal or no responsibility for advertising any lifecycle-related destruction event for the resource; using a service oriented architecture (SOA) to define one or more services needed to manage the resource within the management system; and using a component model to define one or more interfaces and one or more interactions to be implemented by the manageable resource within the management system.
摘要:
A computer-executable method for allocating resource discovery and identification processes among a plurality of management tools and resources in a distributed and heterogeneous IT management system includes providing at least one authoritative manageable resource having minimal or no responsibility for reporting its identity, minimal or no responsibility for advertising any lifecycle-related creation event for the resource, and minimal or no responsibility for advertising any lifecycle-related destruction event for the resource; using a service oriented architecture (SOA) to define one or more services needed to manage the resource within the management system; and using a component model to define one or more interfaces and one or more interactions to be implemented by the manageable resource within the management system.
摘要:
A statistical approach implementing Singular Value Decomposition (SVD) to a policy-based management system for autonomic and on-demand computing applications. The statistical approach empowers a class of applications that require policies to handle ambiguous conditions and allow the system to “evolve” in response to changing operation and environment conditions. In the system and method providing the statistical approach, observed event-policy associated data, which is represented by an event-policy matrix, is treated as a statistical problem with the assumption that there are some underlying or implicit higher order correlations among events and policies. The SVD approach enables such correlations to be modeled, extracted and modified. From these correlations, recommended policies can be selected or created without exact match of policy conditions. With a feedback mechanism, new knowledge can be acquired as new situations occur and the corresponding policies to manage them are recorded and used to generate new event and policy correlations. Consequently, based on these new correlations, new recommended policies can be derived.
摘要:
A statistical approach implementing Singular Value Decomposition (SVD) to a policy-based management system for autonomic and on-demand computing applications. The statistical approach empowers a class of applications that require policies to handle ambiguous conditions and allow the system to “evolve” in response to changing operation and environment conditions. In the system and method providing the statistical approach, observed event-policy associated data, which is represented by an event-policy matrix, is treated as a statistical problem with the assumption that there are some underlying or implicit higher order correlations among events and policies. The SVD approach enables such correlations to be modeled, extracted and modified. From these correlations, recommended policies can be selected or created without exact match of policy conditions. With a feedback mechanism, new knowledge can be acquired as new situations occur and the corresponding policies to manage them are recorded and used to generate new event and policy correlations. Consequently, based on these new correlations, new recommended policies can be derived.
摘要:
Method, system and computer program product for collaboratively processing a data object in a client-server hierarchy based on meta-information associated with the object. Processing results are indicated by the server that performed the processing as updates to the meta-information associated with the data object. The PICS protocol may be used to communicate the meta-information. Digital signing and authentication of the object and associated meta-information are also described. Further, servers can determine processing by considering various factors, e.g., their current load condition; if the object is to be multicast; if the object can be cached; and/or if the specified cost and time constraints can be met. The overall processing applied to data objects can be divided between servers based on object types, steps, functions, software packages or versions/releases. Other aspects of the invention are also described.
摘要:
A searching method determines, given a specified encryption method (or set of encryption methods) and a specified pattern (or set of patterns), whether a given text contains an encryption, with any key, of anything fitting the pattern or patterns. The procedure detects and locates patterns that are present within data that has been encrypted, provided that the encryption method is one of a variety of simple methods that are often employed by computer programs such as computer viruses. The method includes:1. applying an invariance transformation to the chosen pattern (or set of patterns) to be matched, to obtain a "reduced pattern";2. applying the same reduction to the encrypted data to obtain "reduced data";3. using standard string searching techniques to detect the existence of a match between the reduced pattern and the reduced data, thereby signalling the likely existence of the pattern in encrypted form within the encrypted data;4. corroborating any such likely matches by using techniques specialized to the particular form of encryption; and5. providing information about the match.Depending on the nature of the encryption method and the desired degree of certainty about the match, item 4 may not be necessary. In one embodiment, the patterns and an indication of the encryption method(s) for which they are appropriate are incorporated into the database of a computer virus searcher. The searcher applies each of several different invariant transformations to the searched data (one for each encryption method of interest), and uses search techniques, such as parallel search techniques currently employed by virus searchers, to detect any patterns that may be encrypted within the searched data.
摘要:
A copy-protection scheme is implemented for software which may be stored on a magnetic storage medium such as a disk. The medium is comprised of sections which are divided into subsections, with an original having indicia on at least one subsection of at least one section that is not modifiable by the medium write process, with a copy having no such indicia, or having indicia in a different pattern. A product program may be stored on the medium, and is executable only if the particular medium is an original. A medium test program may also be stored on the particular medium, and is used to test if the medium is an original or a copy. The test program writes the sections with a test pattern which generates a change in the pattern of magnetic domains of the medium, a subsection at a time, with a subsection responding to the test pattern only in the absence of indicia thereon, to form a stored pattern on the given section. An expected pattern and the stored pattern are compared at least a subsection at a time to determine if corresponding subsections have a predetermined pattern of magnetic domains. The product program is executed only in response to the comparison determining that corresponding subsections have predetermined patterns of magnetic domains which is indicative of the presence of said indicia, and the particular medium being an original.
摘要:
A constant contact side bearing assembly for a railcar including a housing with wall structure defining a central axis for the side bearing assembly and a multipiece cap. The cap is arranged in operable combination with the housing and includes a movable first member or spring seat and a movable second member or top cap carried by the first member. A spring resiliently urges the cap members toward railcar body structure. The cap members define cooperating angled surfaces therebetween for urging wall structure on the first member and wall structure on the second member into frictional engagement with the wall structure on the housing in response to a vertical load acting on the friction contacting surface on the cap. At least the top cap is structured to establish a coefficient of friction ranging between about 0.4 and about 0.9 with the railcar during operation of the side bearing assembly.