摘要:
A wear resistant material containing no cobalt is used for a sliding portion of a control rod driving mechanism of a nuclear plant for reducing the exposure dose due to elution of cobalt and ensuring smooth driving of a control rod under a high load for a long time. A control rod driving mechanism employs a roller and a pin, each of which is made of a wear resisting alloy comprising coarse particles of a hard phase, having a particle size of from 20 to 100 .mu.m, and dispersed in a soft matrix made of an iron-based or nickel-based alloy containing chromium and having a hardness of 300 Hv or less. A nuclear reactor employs this control rod driving mechanism.
摘要:
A data providing system includes a first communication apparatus and a plurality of second communication apparatuses that provide data to the first communication apparatus using a communication protocol capable of performing authentication by identification information. The first communication apparatus includes an identification information request sending section, an individual identification information receiving section, a first data request sending section, a first common identification information storage section, a second data request sending section, and a data receiving section. At least one of the second communication apparatuses includes an individual identification information storage section, a second common identification information storage section, an identification information request receiving section, an individual identification information sending section, a data request receiving section, a first data sending section and a second data sending section. The first data sending section sends first type data to the first communication apparatus when the identification information included in the received data request is the stored individual identification information. The second data sending section sends second type data to the first communication apparatus when the identification information included in the received data request is the stored common identification information.
摘要:
A wireless communication device is provided. The wireless communication device includes a first obtainer configured to obtain an identifier of a wireless network to which a first external device belongs, the identifier of the wireless network being detected based on radio waves transmitted from the first external device, a second obtainer configured to obtain an identifier of a wireless network to which a second external device belongs, the identifier of the wireless network being obtained from the second external device through an IP network to which the wireless communication device has been connected, and an output controller configured to output a first identifier obtained commonly by the first obtainer and the second obtainer to an output unit so that the first identifier is presented to be distinguishable from other identifiers obtained by solely one of the first obtainer and the second obtainer.
摘要:
A management device transmits to a target device a first GETNEXT request comprising a first group of Ma-combined IDs. Each combined ID is a combination of a target ID and one of Ma-index values. Each index value has a first value in its highest digit(s) and one of consecutive values in its lowest digit. The management device obtains Ma-partial information and a second group of an Ma-combined IDs corresponding to the Ma-partial information, identifies a greatest combined ID having a greatest index value from the second group, and transmits a second GETNEXT request comprising Mb-combined IDs comprising the identified greatest combined ID. Each combined ID is a combination of the target ID and one of Mb-index values. Each index value has a second value different from the second value in its highest digit(s) and one of consecutive values in its lowest digit.
摘要:
A method to connect a wireless communication device to an intended wireless network is provided. The method includes a first step, in which options of authorization methods are presented to be selectable to a user, a second step, in which a first authorization method is automatically selected if an option of a third authorization item is selected, a third step, in which options of encryption methods corresponding to the selected first authorization method are presented to be selectable to the user, a fourth step, in which a first encryption method is automatically selected if a third encryption item is selected, and a fifth step, in which establishment of the connection is attempted by use of the selected first authorization method and the selected first encryption method.
摘要:
A management device for managing a device has: a control unit including: a status acquiring unit that acquires a status of the device; and a notifying unit that, if the device is in a specific status, notifies information about the specific status to another device; and a first management screen supply unit supplying first management screen data to a display unit, wherein the control unit determines whether a notifying function of the notifying unit is valid or invalid, if the notifying function is valid, the control unit controls the status acquiring unit to periodically acquire the status of the device regardless of whether the first management screen supply unit starts up, and if the notifying function is invalid, the control unit controls the status acquiring unit to acquire the status of the device when the first management screen supply unit starts up in response to an instruction from a user.
摘要:
A method to connect a wireless communication device to an intended wireless network is provided. The method includes a first step, in which options of authorization methods are presented to be selectable to a user, a second step, in which a first authorization method is automatically selected if an option of a third authorization item is selected, a third step, in which options of encryption methods corresponding to the selected first authorization method are presented to be selectable to the user, a fourth step, in which a first encryption method is automatically selected if a third encryption item is selected, and a fifth step, in which establishment of the connection is attempted by use of the selected first authorization method and the selected first encryption method.