Condroid Remote Management Work Procedure. Download the document in http://csd.xen.ssvl.kth.se/csdlive/content/remote-management-system-analysis-design
This document provides an overview of new features and enhancements included in 3GPP Release 11. Key areas covered include:
- Improvements to machine type communications, IP interconnection services, emergency services, and voice over LTE.
- Enhancements to network functions like location services, charging management, security, and operations/maintenance.
- Continued development of LTE technologies including carrier aggregation, positioning support, and multimedia broadcast services.
- Work items across different 3GPP groups relating to the Evolved Packet System, the UICC, inter-RAT handover, and testing specifications.
Co-funded by the European Community.
Views expressed in this site/presentation are those of the individuals, partners and the consortium and do not represent the opinion of the Community. The Community is not responsible for any use that might be made of information contained herein.
Comodo Time Machine is a system backup and restoration utility that allows users to easily restore their system to an earlier point in time. The document provides details on installing and using Comodo Time Machine, including taking snapshots of the system, viewing and managing snapshots, restoring the system from a snapshot, scheduling tasks, and resetting the baseline snapshot. Instructions are also included for using the quick operation console, sub-console, and Windows command line interface.
The document is the owner's manual for the Garmin eTrex personal navigator. It contains information about features of the eTrex, basic operation instructions, and reference materials. The manual instructs users to read it thoroughly to understand how to operate the eTrex safely and properly. It also contains warnings about using the eTrex responsibly and legal statements regarding its compliance with FCC regulations.
This document provides help and instructions for using the Cambium Network Updater tool, including recommended system requirements, key concepts, installation instructions, and configuration settings. It describes functions like auto discovery of network elements, grouping elements in folders, installing software packages, estimating upgrade timelines, and accessing subscriber modules. The document also covers copyrights, licenses, related documentation, and providing feedback on the tool or help file.
Động cơ Maxon - Điều khiển chuyển động cho người mớimilotechvn
Động cơ Maxon - Điều khiển chuyển động cho người mới
Bộ tài liệu cho các bạn mới bắt đầu tìm hiểu về động cơ Maxon.
Phân phối động cơ Maxon http://www.milotech.vn
Final thesis report on eye tracking based driver fatigue hardeep singh pec un...HardeepSingh Dhillon
Published in: Power Electronics (IICPE), 2010 India International Conference on
Date of Conference: 28-30 Jan. 2011
Date Added to IEEE Xplore: 10 March 2011
ISBN Information:
Electronic ISBN: 978-1-4244-7882-8
Print ISBN: 978-1-4244-7883-5
CD-ROM ISBN: 978-1-4244-7881-1
Print on Demand(PoD) ISBN: 978-1-4244-7883-5
ISSN Information:
INSPEC Accession Number: 11873780
DOI: 10.1109/IICPE.2011.5728062
Publisher: IEEE
ABSTRACT The Project entitled “Eye Tracking based Driver Fatigue Monitoring and Warning System” consists of the hardware and the software modules. The main idea behind this project is to develope a non-intrusive system which can detect fatigue of driver and issue a timely warning. Since large number of road accidents are caused by driver drowsiness. Hence this system will be helpful in preventing many accidents, and consequently save money and reduce personal suffering. This system will detect eye movement to detect the fatigue state of driver. By monitoring the eyes using camera and developing an algorithm we can detect symptoms of driver fatigue early enough to avoid an accident. So this project will be helpful in detecting driver fatigue in advance and will gave a warning output in form of sound and vibration. For indication of warning we will use two approaches i.e one by blowing alarm and second by seat belt vibration whose frequency will vary between 100 to 300 Hzs. Moreover the warning will be deactivated manually rather than automatically. So for this purpose a deactivation switch will be used to deactivate warning. Moreover if driver felt drowsy there is possibility of sudden acceleration or de-acceleration hence we can judge this by plotting a graph in time domain and when all three input variables shows a possibility of fatigue at one moment then a warning signal is shown in form of text or red colour circle. This will directly give an indication of drowsiness/fatigue which can be further used as record of driver performance or can be used by traffic police which can take further action accordingly.
This document provides a manual for using WCDMA Radio Network Analysis software. It covers topics such as installing the software, using the universal template windows to view measurement parameters in tables, grids, charts and conduct statistics. It also describes how to analyze signaling, events, KPIs, delays, geographical information, cells/neighbors, and how to conduct various types of analysis including filtering, custom events, bins and delays. Troubleshooting, GPS related functions, reporting and auto-reporting are also outlined.
This document provides an overview of new features and enhancements included in 3GPP Release 11. Key areas covered include:
- Improvements to machine type communications, IP interconnection services, emergency services, and voice over LTE.
- Enhancements to network functions like location services, charging management, security, and operations/maintenance.
- Continued development of LTE technologies including carrier aggregation, positioning support, and multimedia broadcast services.
- Work items across different 3GPP groups relating to the Evolved Packet System, the UICC, inter-RAT handover, and testing specifications.
Co-funded by the European Community.
Views expressed in this site/presentation are those of the individuals, partners and the consortium and do not represent the opinion of the Community. The Community is not responsible for any use that might be made of information contained herein.
Comodo Time Machine is a system backup and restoration utility that allows users to easily restore their system to an earlier point in time. The document provides details on installing and using Comodo Time Machine, including taking snapshots of the system, viewing and managing snapshots, restoring the system from a snapshot, scheduling tasks, and resetting the baseline snapshot. Instructions are also included for using the quick operation console, sub-console, and Windows command line interface.
The document is the owner's manual for the Garmin eTrex personal navigator. It contains information about features of the eTrex, basic operation instructions, and reference materials. The manual instructs users to read it thoroughly to understand how to operate the eTrex safely and properly. It also contains warnings about using the eTrex responsibly and legal statements regarding its compliance with FCC regulations.
This document provides help and instructions for using the Cambium Network Updater tool, including recommended system requirements, key concepts, installation instructions, and configuration settings. It describes functions like auto discovery of network elements, grouping elements in folders, installing software packages, estimating upgrade timelines, and accessing subscriber modules. The document also covers copyrights, licenses, related documentation, and providing feedback on the tool or help file.
Động cơ Maxon - Điều khiển chuyển động cho người mớimilotechvn
Động cơ Maxon - Điều khiển chuyển động cho người mới
Bộ tài liệu cho các bạn mới bắt đầu tìm hiểu về động cơ Maxon.
Phân phối động cơ Maxon http://www.milotech.vn
Final thesis report on eye tracking based driver fatigue hardeep singh pec un...HardeepSingh Dhillon
Published in: Power Electronics (IICPE), 2010 India International Conference on
Date of Conference: 28-30 Jan. 2011
Date Added to IEEE Xplore: 10 March 2011
ISBN Information:
Electronic ISBN: 978-1-4244-7882-8
Print ISBN: 978-1-4244-7883-5
CD-ROM ISBN: 978-1-4244-7881-1
Print on Demand(PoD) ISBN: 978-1-4244-7883-5
ISSN Information:
INSPEC Accession Number: 11873780
DOI: 10.1109/IICPE.2011.5728062
Publisher: IEEE
ABSTRACT The Project entitled “Eye Tracking based Driver Fatigue Monitoring and Warning System” consists of the hardware and the software modules. The main idea behind this project is to develope a non-intrusive system which can detect fatigue of driver and issue a timely warning. Since large number of road accidents are caused by driver drowsiness. Hence this system will be helpful in preventing many accidents, and consequently save money and reduce personal suffering. This system will detect eye movement to detect the fatigue state of driver. By monitoring the eyes using camera and developing an algorithm we can detect symptoms of driver fatigue early enough to avoid an accident. So this project will be helpful in detecting driver fatigue in advance and will gave a warning output in form of sound and vibration. For indication of warning we will use two approaches i.e one by blowing alarm and second by seat belt vibration whose frequency will vary between 100 to 300 Hzs. Moreover the warning will be deactivated manually rather than automatically. So for this purpose a deactivation switch will be used to deactivate warning. Moreover if driver felt drowsy there is possibility of sudden acceleration or de-acceleration hence we can judge this by plotting a graph in time domain and when all three input variables shows a possibility of fatigue at one moment then a warning signal is shown in form of text or red colour circle. This will directly give an indication of drowsiness/fatigue which can be further used as record of driver performance or can be used by traffic police which can take further action accordingly.
This document provides a manual for using WCDMA Radio Network Analysis software. It covers topics such as installing the software, using the universal template windows to view measurement parameters in tables, grids, charts and conduct statistics. It also describes how to analyze signaling, events, KPIs, delays, geographical information, cells/neighbors, and how to conduct various types of analysis including filtering, custom events, bins and delays. Troubleshooting, GPS related functions, reporting and auto-reporting are also outlined.
This master's thesis explores integrating a home automation architecture based on EnOcean technology with a telecommunications architecture. It develops an EnOcean resource adaptor for a JAIN SLEE application server to communicate with an EnOcean gateway. It then develops a JAIN service that allows a SIP user agent to control and monitor home automation devices like lamps, motion sensors, and energy meters through an interactive voice response system. The goal is to demonstrate a method for remote management and control of EnOcean-based smart home devices through a telecommunications network and SIP.
This document provides a 3-sentence summary of a Oracle Web Conferencing Administrator's Guide:
The guide instructs administrators on how to deploy, configure, and manage Oracle Web Conferencing. It covers topics such as installation, configuration of core components and ports, clustering, reports, and sample deployment scenarios. The document is intended to help administrators understand Oracle Web Conferencing functionality and architecture, and provide guidance on common administration tasks.
This document provides an overview of the development tools for modifying Infor ERP SyteLine and guidelines for customizing and modifying the system. It describes the toolset used to work with the database, business objects, user interface, and other tiers. It also covers architectural best practices for extensions and changes to ensure compatibility with future upgrades. Additionally, it includes a chapter on external touch points for integrating with external systems and applications.
This thesis describes the development of a data warehouse and web services to collect and provide access to various public data sources for a company called Process Genius. The project involved building Hadoop and HBase systems on Cloudera to store data retrieved from different sources on bus schedules, bridge openings/closings, and more. The data is then made available via web services. The thesis discusses the technologies used, including Hadoop, HDFS, HBase, and MapReduce, and describes the implementation including data retrieval, storage, and provision through the web services.
MobileDecisions ™ provides a middleware solution between your back office
system and a variety of mobile devices. MobileDecisions uses a concept of workflows that can model your business transactions, such as:
Customer Relationship Management (CRM) tasks
Sales order entry
Collections management
Inventory counting, transfer and receiving
Purchase order creation and maintenance
Field service calls
Timesheet entry
Workflows are easily created and maintained using the Desktop Administration tool and are deployed to the mobile device when you decide they are ready for production.
MobileDecisions uses a concept of “build once, deploy across all devices”. The developers of MobileDecisions take the worry out of the device differences and allow the workflow designer to focus on processes, data and the user experience.
Data is securely transferred from your back office system to the mobile devices using industry standard Secure Socket Layers (SSL). You can feel comfortable that your proprietary information is not comprised during any transmissions.
This document provides an overview of the project plan for developing an online hotel room booking system. It discusses the scope, objectives, and problems with the current manual system. It then describes the proposed computerized solution and outlines the tasks involved in project planning and control, including quality assurance plans, documentation standards, programming standards, and project management. It also discusses scheduling, risk management, requirements analysis, process and data modeling, testing approaches, and references. The overall aim is to develop a system that can efficiently manage all hotel activities and operations.
Agm user experience_virtualization_(ue-v)_1.0Steve Xu
Microsoft User Experience Virtualization (UE-V) allows administrators to synchronize application and Windows settings across multiple devices that a user accesses, including desktops, laptops, and virtual desktop sessions. UE-V captures settings changes made by users, stores the settings centrally, and applies the settings to other devices used by that user. It provides a consistent experience for users by keeping their settings and customizations the same regardless of the device they use.
This document outlines the planning, analysis, design, and implementation phases of developing an Entitlements and Balancing Management System. It describes gathering requirements through interviews, modeling system processes and data, designing the user interface and database, and implementing the system using technologies like Java, Oracle, and ADF. The system aims to automate and streamline entitlement and balancing tasks for employees, reducing errors and improving efficiency over a manual process.
This document provides a table of contents for a manual on using Microsoft Access 2007. The table of contents outlines 5 chapters that cover topics such as creating and using tables, queries, forms, and reports in Access. Chapter 1 introduces Access and describes how to open and close the Access application as well as how to create a new database. The following chapters describe how to work with tables, queries, forms and reports in more detail.
This thesis proposes and evaluates several SDN-enabled traffic engineering solutions:
1. An OVX Testing Framework to test the OpenVirteX network hypervisor which virtualizes OpenFlow networks.
2. A Command Line Interface for the ONOS Segment Routing application to retrieve switch statistics and configure tunnels/policies.
3. An emulation of packet-optical networks using ONOS as a multi-layer SDN controller to optimize traffic flow across packet and optical domains.
4. A Maximum Weighted Alpha scheduling algorithm for input queued switches to provide throughput optimality under hybrid data traffic loads. Performance is evaluated in an SDN testbed.
Ibm rtw rtvs_implementation_guide_v4_0_2_public_releaseSarang Tripathy
This document provides guidelines and best practices for using IBM's Rational Test Workbench and Rational Test Virtualization Server products. It discusses key concepts around automated integration testing and service virtualization. In particular, it emphasizes that tests should be created to exercise a system under test, while virtual services should simulate backend systems and services for the system under test. The document also argues that a consumer-centric rather than provider-centric approach to service virtualization is generally more effective, as it allows each consumer team to independently manage their own testing dependencies.
This document provides an overview and introduction to the IBM Tivoli Monitoring for Transaction Performance (TMTP) product. TMTP allows for end-to-end monitoring of complex e-business transactions as they traverse multiple application servers and systems. The key capabilities of TMTP include seamless transaction decomposition and correlation, automatic problem identification and baselining, and policy-based transaction discovery. TMTP utilizes various components like the Web Transaction Performance (WTP) component and Enterprise Transaction Performance (ETP) component to monitor transactions across various technologies and platforms.
This document provides an installation and integration guide for IBM Tivoli Provisioning Manager V7.1.1. It begins with an overview of TPM concepts and architecture. It then covers planning considerations for deployment scenarios including installation requirements, topologies and firewall configurations. The document provides step-by-step instructions for installing TPM and integrating with other IBM products like CCMDB and Tivoli Service Request Manager. Finally, it describes customizing TPM after installation including security, implementing the scalable distribution infrastructure and software deployment capabilities.
This document describes Feature 1331 which implements the Session Initiation Protocol (SIP) in the MSC Server to connect circuit-switched and IP Multimedia Subsystem (IMS) domains. SIP allows for multimedia sessions between participants over IP networks. The feature supports SIP-T and SIP-I interfaces between MSC Servers and uses SIP without ISUP tunneling toward the IMS. Benefits include interworking legacy networks with 3G IP networks and providing an open ISUP tunneling SIP trunk interface. Requirements and functionality like statistics, parameters and charging are also outlined.
This document is an installation and setup guide for the AlarmNet! 7847i/7847i-E Internet/Intranet Communication Modules. The guide contains information on mounting and wiring the module, programming it using different methods like the AlarmNet Direct website or a 7720P programming tool, registering the module, and running network diagnostics. It provides instructions for setting up the module to operate in different modes like ECP, Zone Trigger, 4204, and Two-4204 modes.
This document provides an overview and introduction to identifying components of a DeviceNet network. It discusses the network hierarchy and components that make up a DeviceNet network, including the power supply, cable, wires, taps, connectors, scanner module, and various node devices. The document is intended to teach users about the different parts of a DeviceNet network and how they function.
This document provides an overview of implementing the Tivoli Enterprise Console (TEC). It discusses planning requirements such as the management software, managed devices, event sources, and rule policies. It then covers installing the required relational database management system (RDBMS), either Oracle or Sybase. Finally, it describes setting up the Tivoli Management Framework, installing the TEC software, configuring distributed monitoring and scripts, and deploying event adapters.
This document provides a 3-sentence summary of the contents of an operator guide for the M2000 system:
The guide contains 7 chapters that describe various functions and operations of the M2000 system, including connecting network elements, managing topology, handling alarms, monitoring performance, managing configurations, and other maintenance and management tasks. Each chapter covers topics such as related terminology, operational processes, querying and browsing data, setting parameters, and more. The document is intended to help users understand and utilize the various capabilities of the M2000 system.
This document outlines the project plans for the Virtual Museum Tour (VMT) application. It includes sections on project organization, risk analysis, resource requirements, work breakdown structure, project schedule, monitoring and reporting, and additional plans. The project will use agile methodology and be led by a project manager. Risks are identified and strategies proposed to mitigate them. Hardware needs include PCs and routers while software costs are estimated. The project must be completed by February 2018 to meet the funding deadline.
Mobile Music Business Models in Asia's Emerging MarketsLaili Aidi
Aidi, Laili; Markendahl, Jan; Tollmar, Konrad; Selvakumar, Ekambar; Huang, Jin; and Blennerud, Greger, In proceeding of: 12th International Conference on Mobile Business, Berlin 2013
In the telecom business, there has been a heavy competition from Internet, media and handset vendors companies. These over-the-top (OTT) players offer compiling telecom services, cause a transformation in the telecom business ecosystem, and the most challenging services posed here are media services. China, India and Indonesia, as world’s emerging markets in Asia, are predicted to take the largest share in the global mobile traffic explosion by 2015. It is critical for mobile network operators (MNOs) in this region to explore strategy for mobile media services, as mobile broadband is likely preferred
compared to fixed broadband.
In this paper, we analyze and compare mobile music business models used in these markets and structure the relation models between the key actors, using Actors, Relations and Business Activities (ARA) model. We present the economic models that are emerging, and an insight of why and how these multitudes actors are betting on currently. We found that the MNOs generally have a much stronger position compared to their counterparts in the developed markets, and the personalization services, like ring-back tone, are still a huge success. The actors tend to deliver the services by their own, rather than to collaborate in a horizontal business setting.
Stream Control Transmission Protocol (SCTP) - IntroductionLaili Aidi
The document discusses the Stream Control Transmission Protocol (SCTP), a transport layer protocol that provides reliable message delivery like TCP but with some improvements. SCTP supports multi-homing where an endpoint can be associated with multiple IP addresses simultaneously. It also supports multi-streaming within a single association to reduce head-of-line blocking. SCTP uses a four-way handshake for connection setup and ensures reliable data transfer using transmission sequence numbers and selective acknowledgements.
More Related Content
Similar to Condroid Remote Management Work Procedure
This master's thesis explores integrating a home automation architecture based on EnOcean technology with a telecommunications architecture. It develops an EnOcean resource adaptor for a JAIN SLEE application server to communicate with an EnOcean gateway. It then develops a JAIN service that allows a SIP user agent to control and monitor home automation devices like lamps, motion sensors, and energy meters through an interactive voice response system. The goal is to demonstrate a method for remote management and control of EnOcean-based smart home devices through a telecommunications network and SIP.
This document provides a 3-sentence summary of a Oracle Web Conferencing Administrator's Guide:
The guide instructs administrators on how to deploy, configure, and manage Oracle Web Conferencing. It covers topics such as installation, configuration of core components and ports, clustering, reports, and sample deployment scenarios. The document is intended to help administrators understand Oracle Web Conferencing functionality and architecture, and provide guidance on common administration tasks.
This document provides an overview of the development tools for modifying Infor ERP SyteLine and guidelines for customizing and modifying the system. It describes the toolset used to work with the database, business objects, user interface, and other tiers. It also covers architectural best practices for extensions and changes to ensure compatibility with future upgrades. Additionally, it includes a chapter on external touch points for integrating with external systems and applications.
This thesis describes the development of a data warehouse and web services to collect and provide access to various public data sources for a company called Process Genius. The project involved building Hadoop and HBase systems on Cloudera to store data retrieved from different sources on bus schedules, bridge openings/closings, and more. The data is then made available via web services. The thesis discusses the technologies used, including Hadoop, HDFS, HBase, and MapReduce, and describes the implementation including data retrieval, storage, and provision through the web services.
MobileDecisions ™ provides a middleware solution between your back office
system and a variety of mobile devices. MobileDecisions uses a concept of workflows that can model your business transactions, such as:
Customer Relationship Management (CRM) tasks
Sales order entry
Collections management
Inventory counting, transfer and receiving
Purchase order creation and maintenance
Field service calls
Timesheet entry
Workflows are easily created and maintained using the Desktop Administration tool and are deployed to the mobile device when you decide they are ready for production.
MobileDecisions uses a concept of “build once, deploy across all devices”. The developers of MobileDecisions take the worry out of the device differences and allow the workflow designer to focus on processes, data and the user experience.
Data is securely transferred from your back office system to the mobile devices using industry standard Secure Socket Layers (SSL). You can feel comfortable that your proprietary information is not comprised during any transmissions.
This document provides an overview of the project plan for developing an online hotel room booking system. It discusses the scope, objectives, and problems with the current manual system. It then describes the proposed computerized solution and outlines the tasks involved in project planning and control, including quality assurance plans, documentation standards, programming standards, and project management. It also discusses scheduling, risk management, requirements analysis, process and data modeling, testing approaches, and references. The overall aim is to develop a system that can efficiently manage all hotel activities and operations.
Agm user experience_virtualization_(ue-v)_1.0Steve Xu
Microsoft User Experience Virtualization (UE-V) allows administrators to synchronize application and Windows settings across multiple devices that a user accesses, including desktops, laptops, and virtual desktop sessions. UE-V captures settings changes made by users, stores the settings centrally, and applies the settings to other devices used by that user. It provides a consistent experience for users by keeping their settings and customizations the same regardless of the device they use.
This document outlines the planning, analysis, design, and implementation phases of developing an Entitlements and Balancing Management System. It describes gathering requirements through interviews, modeling system processes and data, designing the user interface and database, and implementing the system using technologies like Java, Oracle, and ADF. The system aims to automate and streamline entitlement and balancing tasks for employees, reducing errors and improving efficiency over a manual process.
This document provides a table of contents for a manual on using Microsoft Access 2007. The table of contents outlines 5 chapters that cover topics such as creating and using tables, queries, forms, and reports in Access. Chapter 1 introduces Access and describes how to open and close the Access application as well as how to create a new database. The following chapters describe how to work with tables, queries, forms and reports in more detail.
This thesis proposes and evaluates several SDN-enabled traffic engineering solutions:
1. An OVX Testing Framework to test the OpenVirteX network hypervisor which virtualizes OpenFlow networks.
2. A Command Line Interface for the ONOS Segment Routing application to retrieve switch statistics and configure tunnels/policies.
3. An emulation of packet-optical networks using ONOS as a multi-layer SDN controller to optimize traffic flow across packet and optical domains.
4. A Maximum Weighted Alpha scheduling algorithm for input queued switches to provide throughput optimality under hybrid data traffic loads. Performance is evaluated in an SDN testbed.
Ibm rtw rtvs_implementation_guide_v4_0_2_public_releaseSarang Tripathy
This document provides guidelines and best practices for using IBM's Rational Test Workbench and Rational Test Virtualization Server products. It discusses key concepts around automated integration testing and service virtualization. In particular, it emphasizes that tests should be created to exercise a system under test, while virtual services should simulate backend systems and services for the system under test. The document also argues that a consumer-centric rather than provider-centric approach to service virtualization is generally more effective, as it allows each consumer team to independently manage their own testing dependencies.
This document provides an overview and introduction to the IBM Tivoli Monitoring for Transaction Performance (TMTP) product. TMTP allows for end-to-end monitoring of complex e-business transactions as they traverse multiple application servers and systems. The key capabilities of TMTP include seamless transaction decomposition and correlation, automatic problem identification and baselining, and policy-based transaction discovery. TMTP utilizes various components like the Web Transaction Performance (WTP) component and Enterprise Transaction Performance (ETP) component to monitor transactions across various technologies and platforms.
This document provides an installation and integration guide for IBM Tivoli Provisioning Manager V7.1.1. It begins with an overview of TPM concepts and architecture. It then covers planning considerations for deployment scenarios including installation requirements, topologies and firewall configurations. The document provides step-by-step instructions for installing TPM and integrating with other IBM products like CCMDB and Tivoli Service Request Manager. Finally, it describes customizing TPM after installation including security, implementing the scalable distribution infrastructure and software deployment capabilities.
This document describes Feature 1331 which implements the Session Initiation Protocol (SIP) in the MSC Server to connect circuit-switched and IP Multimedia Subsystem (IMS) domains. SIP allows for multimedia sessions between participants over IP networks. The feature supports SIP-T and SIP-I interfaces between MSC Servers and uses SIP without ISUP tunneling toward the IMS. Benefits include interworking legacy networks with 3G IP networks and providing an open ISUP tunneling SIP trunk interface. Requirements and functionality like statistics, parameters and charging are also outlined.
This document is an installation and setup guide for the AlarmNet! 7847i/7847i-E Internet/Intranet Communication Modules. The guide contains information on mounting and wiring the module, programming it using different methods like the AlarmNet Direct website or a 7720P programming tool, registering the module, and running network diagnostics. It provides instructions for setting up the module to operate in different modes like ECP, Zone Trigger, 4204, and Two-4204 modes.
This document provides an overview and introduction to identifying components of a DeviceNet network. It discusses the network hierarchy and components that make up a DeviceNet network, including the power supply, cable, wires, taps, connectors, scanner module, and various node devices. The document is intended to teach users about the different parts of a DeviceNet network and how they function.
This document provides an overview of implementing the Tivoli Enterprise Console (TEC). It discusses planning requirements such as the management software, managed devices, event sources, and rule policies. It then covers installing the required relational database management system (RDBMS), either Oracle or Sybase. Finally, it describes setting up the Tivoli Management Framework, installing the TEC software, configuring distributed monitoring and scripts, and deploying event adapters.
This document provides a 3-sentence summary of the contents of an operator guide for the M2000 system:
The guide contains 7 chapters that describe various functions and operations of the M2000 system, including connecting network elements, managing topology, handling alarms, monitoring performance, managing configurations, and other maintenance and management tasks. Each chapter covers topics such as related terminology, operational processes, querying and browsing data, setting parameters, and more. The document is intended to help users understand and utilize the various capabilities of the M2000 system.
This document outlines the project plans for the Virtual Museum Tour (VMT) application. It includes sections on project organization, risk analysis, resource requirements, work breakdown structure, project schedule, monitoring and reporting, and additional plans. The project will use agile methodology and be led by a project manager. Risks are identified and strategies proposed to mitigate them. Hardware needs include PCs and routers while software costs are estimated. The project must be completed by February 2018 to meet the funding deadline.
Similar to Condroid Remote Management Work Procedure (20)
Mobile Music Business Models in Asia's Emerging MarketsLaili Aidi
Aidi, Laili; Markendahl, Jan; Tollmar, Konrad; Selvakumar, Ekambar; Huang, Jin; and Blennerud, Greger, In proceeding of: 12th International Conference on Mobile Business, Berlin 2013
In the telecom business, there has been a heavy competition from Internet, media and handset vendors companies. These over-the-top (OTT) players offer compiling telecom services, cause a transformation in the telecom business ecosystem, and the most challenging services posed here are media services. China, India and Indonesia, as world’s emerging markets in Asia, are predicted to take the largest share in the global mobile traffic explosion by 2015. It is critical for mobile network operators (MNOs) in this region to explore strategy for mobile media services, as mobile broadband is likely preferred
compared to fixed broadband.
In this paper, we analyze and compare mobile music business models used in these markets and structure the relation models between the key actors, using Actors, Relations and Business Activities (ARA) model. We present the economic models that are emerging, and an insight of why and how these multitudes actors are betting on currently. We found that the MNOs generally have a much stronger position compared to their counterparts in the developed markets, and the personalization services, like ring-back tone, are still a huge success. The actors tend to deliver the services by their own, rather than to collaborate in a horizontal business setting.
Stream Control Transmission Protocol (SCTP) - IntroductionLaili Aidi
The document discusses the Stream Control Transmission Protocol (SCTP), a transport layer protocol that provides reliable message delivery like TCP but with some improvements. SCTP supports multi-homing where an endpoint can be associated with multiple IP addresses simultaneously. It also supports multi-streaming within a single association to reduce head-of-line blocking. SCTP uses a four-way handshake for connection setup and ensures reliable data transfer using transmission sequence numbers and selective acknowledgements.
Public version of my presentation slide as guess lecturer at Politeknik Telkom, Bandung, May 4, 2013, discussing about "Internet of Things" Feel free to comment and/or download
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...Laili Aidi
The increase mobile data traffic from the emerging Internet services, especially multimedia, has posed considerable challenges for the telecom industry. Their initial mobile data services business models are generally not compatible with these emerging Internet services. Thus, there is a substantial need to investigate the suitable options to make media as a profitable telecom business sector. However, there are different challenges and opportunity factors in developing sustainable mobile media business in each market, due to the unique circumstances applied as the result of customer characteristics, mobile market situation and regulatory/law enforcement.
The first purpose of this thesis is to explore the business model options to deliver media services on top of mobile broadband. Although, we limit our focus to Indonesia, we first analyzed the worldwide patterns toward the media services in order to get a broader view of the current trend. We mapped multitudes of actor involved in digital online / on the top (OTT) media service, which together they form different types of constellation in the value network, as well as service, delivery and revenue model. We also put our focus to get the lessons learned from Spotify’s business model, by framing it using Chesbrough and Rosenbloom’s model.
The second purpose is to understand the Indonesian mobile user's characteristic toward the mobile media services. We conducted survey to 119 Indonesians, analyzed and validated the result with the correlation tests (Cronbach Alpha and Pearson correlation), within the Unified theory of acceptance and use of technology (UTAUT) framework. Our findings confirm the low willingness to pay, but an open attitude for the services. The mobile device and network quality are not the barriers for them to adopt the services, and there is a tight connection between the decisions to adopt the services with the perception that the service is popular.
Through those findings, we assessed the feasibility of the identified options and formulated the recommendations. We used our understanding about Indonesian market structure (telecom and media), regulation, and mobile user, as well as the lesson that we got from media services provisioning in Sweden and worldwide trend. We found that the pricing tiers, adjustable pricing, and differentiated features are some of the key success factors. Meanwhile, being part in the point-to-multipoint partnership with the well-known OTT player is the potential position that the Mobile network operators (MNOs) in Indonesia should take in provisioning OTT media services, rather than deliver the services by their own.
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...Laili Aidi
Up until recently, it was rarely direct competition between telecom operators, cable and satellite Pay-TV providers in digital TV/Video, as their business area were different and value chain was well established. However, technology advance has altered digital TV/Video landscape, made these Communication Service Providers (CSPs) cross other’s area and opened door for new actor (OTT player) to enter the market. This triggers second change in the landscape, as it potentially bypasses CSP’s role in digital media value chain.
There are generic potential options for telecom operator to address OTT service‘s treat, where the trend shows gradual shifts toward allowing or promoting. This study assesses telecom operator’s reaction strategies to react to this digital TV/Video convergence trend. Our analysis reveals two typical relation patterns in the value network, used by telecom operators based on strategy options above, which are ”point-to-point” and ”point-to-multipoint” relation model. We explore the underlining motivations that based these strategies, as well as analysis of the eco-systems: actors identification, business roles and distributed responsibilities among them, where we use ARA (Actors, Resource, Activities) point of view to model these value networks.
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...Laili Aidi
The increase mobile data traffic from the emerging Internet services, especially multimedia, has posed considerable challenges for the telecom industry. Their initial mobile data services business models are generally not compatible with these emerging Internet services. Thus, there is a substantial need to investigate the suitable options to make media as a profitable telecom business sector. However, there are different challenges and opportunity factors in developing sustainable mobile media business in each market, due to the unique circumstances applied as the result of customer characteristics, mobile market situation and regulatory/law enforcement.
The first purpose of this thesis is to explore the business model options to deliver media services on top of mobile broadband. Although, we limit our focus to Indonesia, we first analyzed the worldwide patterns toward the media services in order to get a broader view of the current trend. We mapped multitudes of actor involved in digital online / on the top (OTT) media service, which together they form different types of constellation in the value network, as well as service, delivery and revenue model. We also put our focus to get the lessons learned from Spotify’s business model, by framing it using Chesbrough and Rosenbloom’s model.
The second purpose is to understand the Indonesian mobile user's characteristic toward the mobile media services. We conducted survey to 119 Indonesians, analyzed the result with one sample T-tests and validated it with the correlation tests (Cronbach Alpha and Pearson correlation), within the Unified theory of acceptance and use of technology (UTAUT) framework. Our findings confirm the low willingness to pay, but an open attitude for the services. The mobile device and network quality are not the barriers for them to adopt the services, and there is a tight connection between the decisions to adopt the services with the perception that the service is popular.
Through those findings, we assessed the feasibility of the identified options and formulated the recommendations. We used our understanding about Indonesian market structure (telecom and media), regulation, and mobile user, as well as the lesson that we got from media services provisioning in Sweden and worldwide trend. We found that the pricing tiers, adjustable pricing, and differentiated features are some of the key success factors. Meanwhile, being part in the point-to-multipoint partnership with the well-known OTT player is the potential position that the Mobile network operators (MNOs) in Indonesia should take in provisioning OTT media services, rather than deliver the services by their own.
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...Laili Aidi
Up until recently, it was rarely direct competition between telecom operators, cable and satellite Pay-TV providers in digital TV/Video, as their business area were different and value chain was well established. However, technology advance has altered digital TV/Video landscape, made these Communication Service Providers (CSPs) cross other’s area and opened door for new actor (OTT player) to enter the market. This triggers second change in the landscape, as it potentially bypasses CSP’s role in digital media value chain.
There are generic potential options for telecom operator to address OTT service‘s treat, where the trend shows gradual shifts toward allowing or promoting. This study assesses telecom operator’s reaction strategies to react to this digital TV/Video convergence trend. Our analysis reveals two typical relation patterns in the value network, used by telecom operators based on strategy options above, which are ”point-to-point” and ”point-to-multipoint” relation model. We explore the underlining motivations that based these strategies, as well as analysis of the eco-systems: actors identification, business roles and distributed responsibilities among them, where we use ARA (Actors, Resource, Activities) point of view to model these value networks.
Nowadays, more and more we see the collaboration between the Music industry Players with other Players in other industries. It started decade ago by the collaboration with the Internet industry (such as iTunes), and then recently expanded to the collaboration with the players in the different industries.
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...Laili Aidi
This presentation outlines a master's thesis proposal on developing business models for profitable mobile broadband media services in Indonesia. The proposal discusses background on shifting usage patterns and expectations for mobile broadband. It defines the problem of making these media services sustainable businesses while addressing common and unique market challenges in Indonesia. The methodology will use a mixed qualitative and quantitative approach including literature review, data collection from experts and users, and analysis of the broadband ecosystem and value networks. The expected results are identification of strategies by assessing existing business models and Indonesia's telecom landscape, understanding the market by analyzing user characteristics, and providing recommendations to feasibility test solutions and highlight suitable options.
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Laili Aidi
This thesis intends to systematically research the suitable business model options for mobile-broadband media services, which specifically focuses to Indonesia’s telecom market, as one of the world largest emerging economy.
This project figure out the pattern of the bytes in the stego file and how steganalysis tool can identify the bytes appended to the truck file by steganography tool. This analysis is based on basic theory of steganography and steganalysis, and using a hex editor in order to check what kind of bytes that the steganography tool appends to the truck file.
---
Please contact to lailiaidi at gmail.com for download request
These days, the interests in challenged networks are increasing and many researches are performed to seek a reliable end-to-end connectivity under harsh environments, which have a long propagation delay, high error rates, low data rate, and intermittent connectivity. Delay Tolerant Network was introduced to provide challenged networks with reliable transmission and interoperability with an overlay network concept. In this paper, we present comprehensive overview of Delay Tolerant Network and introduce a study case about the implementation of this network. This paper is designed to encourage the exploration of this field by giving basic concept and also motivate to investigate this area by presenting a study case at the end section.
---
Please contact to lailiaidi@gmail.com for download request
These days, the interests in challenged networks are increasing and many researches are performed to seek a reliable end-to-end connectivity under harsh environments, which have a long propagation delay, high error rates, low data rate, and intermittent connectivity. Delay Tolerant Network was introduced to provide challenged networks with reliable transmission and interoperability with an overlay network concept. In this paper, we present comprehensive overview of Delay Tolerant Network and introduce a study case about the implementation of this network. This paper is designed to encourage the exploration of this field by giving basic concept and also motivate to investigate this area by presenting a study case at the end section.
---
Please contact to lailiaidi@gmail.com for download request
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...Laili Aidi
This report contains discussion of the radio access network design and the cost structure analysis of different deployment options of Radio Access Technologies (RATs). The objective is to provide specific amount of user, with specific traffic demand and deployment scenario.
--
Please contact trough lailiaidi at gmail.com for download request
Analysis of WiMAX regulation in South Korea and Indonesia - PresentationLaili Aidi
Abstract—The development and rollout of WiMAX introduces several regulatory and policy issues. This paper highlights the WiMAX Regulation in South Korea, as a country that is already more mature and had become the first to implement Wireless Broadband Access (WBA) of its kind (WiBro) in the world, and Indonesia, as a country that is still in the process of formulating the reconcilable regulation. The paper begins with a brief overview of the technologies behind WiMAX and compared the market situation relative to broadband and 3G mobile networks. Next, the paper examines the potentially significant specific policy and regulatory issues for regulator in each country and competition climate between stockholders. Finally, this data was used to obtain recommendations to overcome the said problems. We found out that WiMAX may prove to be a disruptive technology for existing telecommunication and Internet sector, but careful policy effectuation can ensure that the disruption could create the maximum benefit possible in the society and market.
---
Please contact trough lailiaidi at gmail.com for download request
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringLaili Aidi
This document contains implementation report of a system that is able to monitor the network using SNMP and identify the specific possible attacks (DoS and port scan) using a cluster analysis. In the first task, the program discovers the topology of the network. After successful discovery phase, it will be able to monitor the link utilization (network link-states) for a specified period of time, and then detect the anomaly, using k-means clustering scheme [1]. These anomalies will be analyzed to recognize the attack. Moreover, this program also provides an advance feature, which is defined as optional task, as it executes online monitoring and detects the attacks using Davies-Bouldin Index as quality scoring measurement [2].
--
Please contact trough lailiaidi at gmail.com for download request
This document discusses the actors involved in Sweden's telecom markets and their roles. The key actors identified are: the telecom regulator (Post- och telestyrelsen), mobile network operators such as Telia and Tele2 who own infrastructure, mobile virtual network operators like Easy Telecom who operate on other networks, mobile virtual network enablers like Spinbox AB who provide backend services, mobile phone companies, network equipment vendors, outsourcing companies, mobile software providers, and card vendors. Examples of companies in each category that operate in Sweden are provided.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
1. !
!"#$%"&#'(')"#"(%&&
*"%&+,&,!$-".+!"&
/"!*0$(&121&
2011
!"#$%&'()%*+(,%+-%"( !"#$%&'(&#*&.(
& (
&
Lan Sun (lansun@kth.se), 15 ECTS (((((/#*&.(*01(2"#$%&'(#30%"(
Hervé Ntareme
Qing An (qinga@kth.se), 15 ECTS
/#4&#*&.(
Michel Hognerud
Jun Gao (jungao@kth.se), 15 ECTS
/.*+25#0(
Laili Aidi (aidi@kth.se), 18 ECTS
Björn Pehrson!
Yasir Ali (yasireal@kth.se), 15 ECTS
SUMMER CSD
2. Remote Management Set up Procedure V1.1
!
Revision History
Version Date Responsible Change
V1.0 2011-08-13 Jun Gao & Yasir Ali Initial version of the document
Laili Aidi Cover, Abbreviation, add Step 7, all section’s
V1.1 2011-10-07
structure and content
2
3. Remote Management Set up Procedure V1.1
!
Contents
Contents.................................................................................................................................................................................. 3
Summary ................................................................................................................................................................................. 5
Abbreviation........................................................................................................................................................................... 6
1. Introduction ....................................................................................................................................................................... 7
2. Set up Procedure ............................................................................................................................................................... 8
! Step 1 ................................................................................................................................................8
1. System architecture design .................................................................................................................................. 8
2. System requirement design.................................................................................................................................. 8
! Step 2 ................................................................................................................................................8
1. Hardware Procurement........................................................................................................................................ 8
2. Feature & GUI Design ........................................................................................................................................ 8
3. Software Architecture .......................................................................................................................................... 8
! Step 3 ................................................................................................................................................9
1. Hardware Set up ................................................................................................................................................... 9
2. Hardware Basic Test ............................................................................................................................................ 9
3. UART Test Code.................................................................................................................................................. 9
! Step 4 ................................................................................................................................................9
1. Local Control Module Development ................................................................................................................ 9
2. Setting Module Development............................................................................................................................. 9
3. Connection Information Module Development ...........................................................................................10
4. IOIO Board Connection Module Development...........................................................................................10
5. UART Module Development ...........................................................................................................................10
6. Command Commit Module Development – Part 1 .....................................................................................10
7. Command Parser Module Development – Part 1 .........................................................................................10
8. About Module Development............................................................................................................................10
! Step 5 .............................................................................................................................................. 11
1. Shortcut Module Development........................................................................................................................11
2. Shortcut Generate Module Development ......................................................................................................11
3. Command Commit Module Development – Part 2 .....................................................................................11
4. Command Parser Module Development – Part 2 .........................................................................................11
! Step 6 .............................................................................................................................................. 11
3
4. Remote Management Set up Procedure V1.1
!
1. Standby Module Development.........................................................................................................................11
2. Standby Setting Module Development ...........................................................................................................11
3. Daemon Module Development........................................................................................................................11
4. SMS Communication Module Development .................................................................................................12
! Step 7 .............................................................................................................................................. 12
1. Java Doc Documentation..................................................................................................................................12
2. Installation Guide & User Manual ...................................................................................................................12
3. Verification Test ................................................................................................................................................ 12!
4
5. Remote Management Set up Procedure V1.1
!
Summary
This document describes the complete procedure to set up the Condroid Remote Management application.
5
6. Remote Management Set up Procedure V1.1
!
Abbreviation
Abbreviations used in this document:
Abbreviation Description
UART Universal Asynchronous Reception and Transmission
API Application Program Interface
GUI Graphical User Interface
Minicom Text-based modem control and terminal emulation program for Unix- like OS
UART Universal asynchronous receiver/transmitter
IOIO A USB I/O breakout board for Android
SMS Short Message Service
6
7. Remote Management Set up Procedure V1.1
!
1. Introduction
This document contains the development procedure for the ConDroid Remote Management application
development. It is designed to be used by the Condroid team in order to get the fully functioned ConDroid
Remote Management software and hardware environment.
7
8. Remote Management Set up Procedure V1.1
!
2. Set up Procedure
• Step 1
The first task is to identify the stage for the future development. After the detailed study into this field, we have
got our basic idea of the whole system and how to achieve it. However, we need to clarify the whole system
and define each part of the system, hardware and software identification. We divided this Step into 2 parts:
1. System architecture design
In this part we will clarify the whole system and its components. This will become reference for coming
developing teams and user to get the basic idea of the project.
2. System requirement design
As the project has specific requirement of the hardware, we need to provide this requirement for
procurement as well as it will be needed by user to set up the system.
Deliverable:
System architecture and Requirement document
• Step 2
The second phase is to make more detail design for the software after committing the hardware procurement
and waiting it arrive. This step is divided into 3 parts:
1. Hardware Procurement
After deciding the hardware environment in Step 1 and clarify the requirement, thus the first thing in this
step need to be done is to commit the hardware procurement according to the requirement. We should
make a detailed document for every component and submit to Champion and Project Owner to be
purchased.
2. Feature & GUI Design
During hardware delivery, the first thing we should do is the Feature and GUI design. We need to clarify
all the functions that should be provided based on the system requirement. Moreover, according to the
function design, we can then design the GUI. This design will be reference for the following step and
coming developing teams
3. Software Architecture
Software architecture is needed for software development. We should design the software architecture
according to the Feature and GUI design. Since Java will be the development language for the software,
the architecture will mainly define how many classes we will have to implement, their functions, behavior,
8
9. Remote Management Set up Procedure V1.1
!
and interaction with each other, etc. The design should be recorded into document and will be reference
for the following step and coming developing teams
Deliverable:
1. USB-To-Serial Converter Board for Android Procurement Document
2. Feature & GUI Design Document
3. Software Architecture Document
• Step 3
Step 3 will be the preparation and test stage before the software development. Thus, we assume all the required
hardware has arrived during this step.
1. Hardware Set up
First thing we should do after got the hardware is to set up the hardware environment for our system. In
this part, the main work will be soldering component.
2. Hardware Basic Test
After hardware setup, we need to do the basic test. We will have to test the hardware with the example
code provided by its manufacturer. By using this way, we can check the basic state of the hardware and its
API.
3. UART Test Code
As we mainly use the UART module of the hardware, we should make a test code to test this hardware as
well as getting familiar with its API.
• Step 4
The rest of tasks from here will be the development part and mainly according to the software architecture.
1. Local Control Module Development
The software will be developed so it provides a console-like feature to user to communicate with the
device and software itself through typing command. This subtask may need further device, which might
be unable to be identified in previous steps, due to lack of information.
2. Setting Module Development
Setting activity class is used by user to interact in order to get devices connection information, thus Its
help topic activity class provides help information for its setting.
9
10. Remote Management Set up Procedure V1.1
!
3. Connection Information Module Development
This class is designed to generate, modify or get the information from the connection information file,
which will be used by IOIOThread class (will be mentioned later) to connect to the devices. It will interact
with Setting activity or other classes.
4. IOIO Board Connection Module Development
As we will use the IOIO board, we need to get the board instant first in an individual thread and check its
availability in a loop and generate all the UART channels.
5. UART Module Development
Getting the input from UART module and sending output through UART should be in different thread,
as these 2 channels are separated and can be used at the same time.
6. Command Commit Module Development – Part 1
This class is designed to be used to commit command, thus it will use the ComParser class (will be
mentioned later) to parse command first and after parsing, then commit it according to the parsing. In this
task, we will only achieve the outer command commitment.
7. Command Parser Module Development – Part 1
This class is designed to be used to distinguish the inner command, which is the command for Remote
Management app software and outer command, which is the command that will be sent to devices
directly. This class will return parsed command to ComCmit class to be committed. In this task, we will
achieve only the outer command part. We also need to provide the command format and inner command
list document in this subtask, to be put in the User Manual and Installation Guide later.
8. About Module Development
This is a simple class to display information about the software and project.
Deliverable:
1. Console-like module implemented
2. Setting module implemented
3. Connection Information module implemented
4. IOIO board connection module implemented
5. UART module implemented
6. About module implemented
10
11. Remote Management Set up Procedure V1.1
!
• Step 5
In this step we will have to achieve the shortcut functions.
1. Shortcut Module Development
Shortcut activity and relevant help topic activity classes achieve. Shortcut activity class is for user to
interact in order to read and edit the shortcut command list. Its help topic activity class is to provide help
information for its setting.
2. Shortcut Generate Module Development
This class will generate, modify or get the information from the shortcut command list file. It will interact
with Shortcut activity or other classes.
3. Command Commit Module Development – Part 2
Realize the inner command commitment.
4. Command Parser Module Development – Part 2
We need to finish the inner command part in this task and upgrade the command format and inner
command list document.
Deliverable:
1. Shortcut module implemented
2. Command module (commit and parser) implemented
• Step 6
In this task, we will have to achieve part of the remote control functions. The remote control method we will
achieve in this task is control via SMS. The other remote methods (dialing and internet connection), will be as
secondary priority or should be provided in later versions.
1. Standby Module Development
Standby activity class is for user to interact in order to set security information for remote control. Its help
topic activity class is to provide help information for its setting.
2. Standby Setting Module Development
This class will generate, modify or get the information from the standby setting file. It will interact with
Standby activity or other classes.
3. Daemon Module Development
ConDroid daemon class will run as a daemon after standby setting committed. It will monitor the
incoming SMS, calling and keep and monitor Internet connection. In this project, we will prioritize to
achieve the SMS communication module.
11
12. Remote Management Set up Procedure V1.1
!
4. SMS Communication Module Development
The class will deal with the control via SMS. It will check the coming short message according to standby
setting, commit the command and send back the response.
Deliverable:
1. Standby module implemented
2. Daemon module implemented
3. SMS Communication module implemented
• Step 7
In this task, we will have to make complete documentation, which is devided into parts:
1. Java Doc Documentation
In this task, we will provide the complete Java doc for every methods and classes that are used in the
code. This document can be reference to the coming developers.
2. Installation Guide & User Manual
In this task, we will provide the complete guidance on how to install the hardware and software and to use
the application
3. Verification Test
In this task, we will do the verification test for all the features in the application and then documenting the
result into verification test document.
Deliverable:
1. Java Doc of the Remote Management App
2. Installation Guide & User Manual document of the Remote Management App
3. Remote Management App Verification Test document
12