XFM Extreme Formal Method for Capturing Formal Specification into Abstract Models
- 格式:pdf
- 大小:419.99 KB
- 文档页数:20
认证之家 EUROPEAN STANDARDEN 55022 NORME EUROPÉENNEEUROPÄISCHE NORM September 2006CENELECEuropean Committee for Electrotechnical StandardizationComité Européen de Normalisation ElectrotechniqueEuropäisches Komitee für Elektrotechnische NormungCentral Secretariat: rue de Stassart 35, B - 1050 Brussels© 2006 CENELEC - All rights of exploitation in any form and by any means reserved worldwide for CENELEC members.Ref. No. EN 55022:2006 E ICS 33.100.10Supersedes EN 55022:1998 + A1:2000 + A2:2003English versionInformation technology equipment -Radio disturbance characteristics -Limits and methods of measurement(CISPR 22:2005, modified)Appareils de traitement de l'information - Caractéristiques des perturbationsradioélectriques -Limites et méthodes de mesure(CISPR 22:2005, modifiée)Einrichtungen der Informationstechnik - Funkstöreigenschaften - Grenzwerte und Messverfahren (CISPR 22:2005, modifiziert)This European Standard was approved by CENELEC on 2005-09-13. CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for giving this European Standard the status of a national standard without any alteration.Up-to-date lists and bibliographical references concerning such national standards may be obtained on application to the Central Secretariat or to any CENELEC member.This European Standard exists in three official versions (English, French, German). A version in any other language made by translation under the responsibility of a CENELEC member into its own language and notified to the Central Secretariat has the same status as the official versions.CENELEC members are the national electrotechnical committees of Austria, Belgium, Cyprus, the Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, the Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland and the United Kingdom.EN 55022:2006– 2 –ForewordThe text of the International Standard CISPR 22:2003 as well as A1:2004 and CISPR/I/136/FDIS (Amendment 3) and CISPR/I/128/CDV (Amendment 2, fragment 17), prepared by CISPR SC I "Electromagnetic compatibility of information technology equipment, multimedia equipment and receivers", together with the common modifications prepared by the Technical Committee CENELEC TC 210, Electromagnetic compatibility (EMC), was submitted to the CENELEC Unique Acceptance Procedure for acceptance as a European Standard.In addition, the text of CISPR/I/135A/FDIS (future A2, fragment 1) to CISPR 22:2003, also prepared by CISPR SC I "Electromagnetic compatibility of information technology equipment, multimedia equipment and receivers", was submitted to the CENELEC formal vote as prAD to prEN 55022:2005, with the intention of the two documents being merged and ratified together as a new edition of EN 55022.During the period of voting on these CENELEC drafts, the amendments CISPR/I/135A/FDIS and CISPR/I/136/FDIS (Amendments 2 and 3 respectively) made to CISPR 22:2003, resulted in the publication of a new (fifth) edition of CISPR 22, in accordance with IEC rules. The resulting CISPR 22:2005 was published in April 2005.This resulting version of EN 55022, which was ratified on 2005-09-13, is therefore identical to CISPR 22:2005 except for the common modifications that were included in the document submitted to the CENELEC Unique Acceptance Procedure. The common modifications include CISPR/I/128/CDV, as this draft was not implemented in the unamended CISPR 22:2005.This European Standard supersedes EN 55022:1998 and its amendments A1:2000 and A2:2003.The following dates were fixed:–latest date by which the EN has to be implementedat national level by publication of an identicalnational standard or by endorsement (dop) 2007-04-01–latest date by which the national standards conflictingwith the EN have to be withdrawn (dow) 2009-10-01This European Standard has been prepared under a mandate given to CENELEC by the European Commission and the European Free Trade Association and covers essential requirements of EC Directives 89/336/EEC, 2004/108/EC and 1999/5/EC. See Annex ZZ.__________– 3 – EN 55022:2006CONTENTS INTRODUCTION (6)1Scope and object (7)2Normative references (7)3Definitions (8)4Classification of ITE (9)4.1Class B ITE (9)4.2Class A ITE (10)5Limits for conducted disturbance at mains terminals and telecommunication ports (10)5.1Limits of mains terminal disturbance voltage (10)5.2Limits of conducted common mode (asymmetric mode) disturbanceat telecommunication ports (11)6Limits for radiated disturbance (11)7Interpretation of CISPR radio disturbance limit (12)7.1Significance of a CISPR limit (12)7.2Application of limits in tests for conformity of equipment in series production (12)8General measurement conditions (13)8.1Ambient noise (13)8.2General arrangement (14)8.3EUT arrangement (16)8.4Operation of the EUT (18)8.5Operation of multifunction equipment (19)9Method of measurement of conducted disturbance at mains terminals and telecommunication ports (20)9.1Measurement detectors (20)9.2Measuring receivers (20)9.3Artificial mains network (AMN) (20)9.4Ground reference plane (21)9.5EUT arrangement (21)9.6Measurement of disturbances at telecommunication ports (23)9.7Recording of measurements (27)10Method of measurement of radiated disturbance (27)10.1Measurement detectors (27)10.2Measuring receivers (27)10.3Antenna (27)10.4Measurement site (28)10.5EUT arrangement (29)10.6Recording of measurements (29)10.7Measurement in the presence of high ambient signals (30)10.8User installation testing (30)11Measurement uncertainty (30)EN 55022:2006– 4 –Annex A (normative) Site attenuation measurements of alternative test sites (41)Annex B (normative) Decision tree for peak detector measurements (47)Annex C (normative) Possible test set-ups for common mode measurements (48)Annex D (informative) Schematic diagrams of examples of impedance stabilization networks (ISN) (55)Annex E (informative) Parameters of signals at telecommunication ports (64)Annex F (informative) Rationale for disturbance measurements and methods (67)Annex ZA (normative) Normative references to international publications with their corresponding European publications (75)Annex ZZ (informative) Coverage of Essential Requirements of EC Directives (76)Bibliography (74)Figure 1 – Test site (31)Figure 2 – Minimum alternative measurement site (32)Figure 3 – Minimum size of metal ground plane (32)Figure 4 – Example test arrangement for tabletop equipment (conducted and radiated emissions) (plan view) (33)Figure 5 – Example test arrangement for tabletop equipment (conducted emission measurement – alternative 1a) (34)Figure 6 – Example test arrangement for tabletop equipment (conducted emission measurement – alternative 1b) (34)Figure 7 – Example test arrangement for tabletop equipment (conducted emission measurement – alternative 2) (35)Figure 8 – Example test arrangement for floor-standing equipment (conductedemission measurement) (36)Figure 9 – Example test arrangement for combinations of equipment (conductedemission measurement) (37)Figure 10 – Example test arrangement for tabletop equipment (radiated emission measurement) (37)Figure 11 – Example test arrangement for floor-standing equipment (radiated emission measurement) (38)Figure 12 – Example test arrangement for floor-standing equipment with vertical riserand overhead cables (radiated and conducted emission measurement) (39)Figure 13 – Example test arrangement for combinations of equipment (radiatedemission measurement) (40)Figure A.1 – Typical antenna positions for alternate site NSA measurements (44)Figure A.2 – Antenna positions for alternate site measurements for minimumrecommended volume (45)Figure B.1 – Decision tree for peak detector measurements (47)Figure C.1 – Using CDNs described in IEC 61000-4-6 as CDN/ISNs (49)Figure C.2 – Using a 150 Ω load to the outside surface of the shield ("in situCDN/ISN") (50)Figure C.3 – Using a combination of current probe and capacitive voltage probe (50)Figure C.4 – Using no shield connection to ground and no ISN (51)Figure C.5 – Calibration fixture (53)Figure C.6 – Flowchart for selecting test method (54)Figure D.1 − ISN for use with unscreened single balanced pairs (55)– 5 – EN 55022:2006 Figure D.2 − ISN with high longitudinal conversion loss (LCL) for use with either oneor two unscreened balanced pairs (56)Figure D.3 − ISN with high longitudinal conversion loss (LCL) for use with one, two,three, or four unscreened balanced pairs (57)Figure D.4 − ISN, including a 50 Ω source matching network at the voltage measuringport, for use with two unscreened balanced pairs (58)Figure D.5 − ISN for use with two unscreened balanced pairs (59)Figure D.6 − ISN, including a 50 Ω source matching network at the voltage measuringport, for use with four unscreened balanced pairs (60)Figure D.7 − ISN for use with four unscreened balanced pairs (61)Figure D.8 − ISN for use with coaxial cables, employing an internal common modechoke created by bifilar winding an insulated centre-conductor wire and an insulatedscreen-conductor wire on a common magnetic core (for example, a ferrite toroid) (61)Figure D.9 − ISN for use with coaxial cables, employing an internal common modechoke created by miniature coaxial cable (miniature semi-rigid solid copper screen or miniature double-braided screen coaxial cable) wound on ferrite toroids (62)Figure D.10 − ISN for use with multi-conductor screened cables, employing an internal common mode choke created by bifilar winding multiple insulated signal wires and an insulated screen-conductor wire on a common magnetic core (for example, a ferrite toroid) (62)Figure D.11 − ISN for use with multi-conductor screened cables, employing an internal common mode choke created by winding a multi-conductor screened cable on ferrite toroids (63)Figure F.1 – Basic circuit for considering the limits with defined TCM impedance of 150 Ω..70 Figure F.2 – Basic circuit for the measurement with unknown TCM impedance (70)Figure F.3 – Impedance layout of the components used in Figure C.2 (72)Figure F.4 – Basic test set-up to measure combined impedance of the 150 Ω and ferrites (73)Table 1 – Limits for conducted disturbance at the mains ports of class A ITE (10)Table 2 – Limits for conducted disturbance at the mains ports of class B ITE (11)Table 3 – Limits of conducted common mode (asymmetric mode) disturbanceat telecommunication ports in the frequency range 0,15 MHz to 30 MHz for class A equipment (11)Table 4 – Limits of conducted common mode (asymmetric mode) disturbance at telecommunication ports in the frequency range 0,15 MHz to 30 MHz for class B equipment (11)Table 5 – Limits for radiated disturbance of class A ITE at a measuring distance of10 m (12)Table 6 – Limits for radiated disturbance of class B ITE at a measuring distance of10 m (12)Table 7 – Acronyms used in figures (31)Table A.1 – Normalized site attenuation (A N (dB)) for recommended geometries with broadband antennas (43)Table F.1 – Summary of advantages and disadvantages of the methods described inAnnex C (68)EN 55022:2006– 6 –INTRODUCTIONThe scope is extended to the whole radio-frequency range from 9 kHz to 400 GHz, but limits are formulated only in restricted frequency bands, which is considered sufficient to reach adequate emission levels to protect radio broadcast and telecommunication services, and to allow other apparatus to operate as intended at reasonable distance.– 7 – EN 55022:2006 INFORMATION TECHNOLOGY EQUIPMENT –RADIO DISTURBANCE CHARACTERISTICS –LIMITS AND METHODS OF MEASUREMENT1 Scope and objectThis International Standard applies to ITE as defined in 3.1.Procedures are given for the measurement of the levels of spurious signals generated by the ITE and limits are specified for the frequency range 9 kHz to 400 GHz for both class A and class B equipment. No measurements need be performed at frequencies where no limits are specified.The intention of this publication is to establish uniform requirements for the radio disturbance level of the equipment contained in the scope, to fix limits of disturbance, to describe methods of measurement and to standardize operating conditions and interpretation of results.2 Normative referencesThe following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.IEC 60083:1997, Plugs and socket-outlets for domestic and similar general use standardized in member countries of IECIEC 61000-4-6:2003, Electromagnetic compatibility (EMC) – Part 4-6: Testing and measurement techniques – Immunity to conducted disturbances, induced by radio-frequency fieldsCISPR 11:2003, Industrial, scientific, and medical (ISM) radio-frequency equipment – Electro-magnetic disturbance characteristics – Limits and methods of measurementCISPR 13:2001, Sound and television broadcast receivers and associated equipment – Radio disturbance characteristics – Limits and methods of measurementCISPR 16-1-1:2003, Specification for radio disturbance and immunity measuring apparatus and methods – Part 1-1: Radio disturbance and immunity measuring apparatus – Measuring apparatusCISPR 16-1-2:2003, Specification for radio disturbance and immunity measuring apparatus and methods – Part 1-2: Radio disturbance and immunity measuring apparatus – Ancillary equipment – Conducted disturbances 1Amendment 1 (2004)___________1There exists a consolidated edition 1.1 (2004) including edition 1.0 and its Amendment 1.EN 55022:2006– 8 –CISPR 16-1-4:2004, Specification for radio disturbance and immunity measuring apparatus and methods – Part 1-4: Radio disturbance and immunity measuring apparatus – Ancillary equipment – Radiated disturbancesCISPR 16-4-2:2003, Specification for radio disturbance and immunity measuring apparatus and methods – Part 4-2: Uncertainties, statistics and limit modelling – Uncertainty in EMC measurements3 DefinitionsFor the purposes of this document the following definitions apply:3.1information technology equipment (ITE)any equipment:a) which has a primary function of either (or a combination of) entry, storage, display,retrieval, transmission, processing, switching, or control, of data and of telecommuni-cation messages and which may be equipped with one or more terminal ports typically operated for information transfer;b) with a rated supply voltage not exceeding 600 V.It includes, for example, data processing equipment, office machines, electronic business equipment and telecommunication equipment.Any equipment (or part of the ITE equipment) which has a primary function of radio trans-mission and/or reception according to the ITU Radio Regulations are excluded from the scope of this publication.NOTE Any equipment which has a function of radio transmission and/or reception according to the definitions of the ITU Radio Regulations should fulfil the national radio regulations, whether or not this publication is also valid. Equipment, for which all disturbance requirements in the frequency range are explicitly formulated in other IEC or CISPR publications, are excluded from the scope of this publication.3.2equipment under test (EUT)representative ITE or functionally interactive group of ITE (system) which includes one or more host unit(s) and is used for evaluation purposes3.3host unitpart of an ITE system or unit that provides the mechanical housing for modules, which may contain radio-frequency sources, and may provide power distribution to other ITE. Power distribution may be a.c., d.c., or both between the host unit(s) and modules or other ITE3.4modulepart of an ITE which provides a function and may contain radio-frequency sources3.5identical modules and ITEmodules and ITE produced in quantity and within normal manufacturing tolerances to a given manufacturing specification– 9 – EN 55022:20063.6telecommunications/network portpoint of connection for voice, data and signalling transfers intended to interconnect widely-dispersed systems via such means as direct connection to multi-user telecommunications networks (e.g. public switched telecommunications networks (PSTN) integrated services digital networks (ISDN), x-type digital subscriber lines (xDSL), etc.), local area networks (e.g. Ethernet, Token Ring, etc.) and similar networksNOTE A port generally intended for interconnection of components of an ITE system under test (e.g. RS-232, IEEE Standard 1284 (parallel printer), Universal Serial Bus (USB), IEEE Standard 1394 (“Fire Wire”), etc.) and used in accordance with its functional specifications (e.g. for the maximum length of cable connected to it), is not considered to be a telecommunications/network port under this definition.3.7multifunction equipmentinformation technology equipment in which two or more functions subject to this standard and/or to other standards are provided in the same unitNOTE Examples of information technology equipment include–a personal computer provided with a telecommunication function and/or broadcast reception function; – a personal computer provided with a measuring function, etc.3.8total common mode impedanceTCM impedanceimpedance between the cable attached to the EUT port under test and the reference ground planeNOTE The complete cable is seen as one wire of the circuit, the ground plane as the other wire of the circuit. The TCM wave is the transmission mode of electrical energy, which can lead to radiation of electrical energy if the cable is exposed in the real application. Vice versa, this is also the dominant mode, which results from exposition of the cable to external electromagnetic fields.3.9arrangementphysical layout of the EUT that includes connected peripherals/associated equipment within the test area3.10configurationmode of operation and other operational conditions of the EUT3.11associated equipmentAEequipment needed to maintain the data traffic on the cable attached to the EUT port under test and (or) to maintain the normal operation of the EUT during the test. The associated equipment may be physically located outside the test areaNOTE The AE can be another ITE, a traffic simulator or a connection to a network. The AE can be situated close to the measurement set-up, outside the measurement room or be represented by the connection to a network. AE should not have any appreciable influence on the test results.4 Classification of ITE4.1 Class B ITEClass B ITE is a category of apparatus which satisfies the class B ITE disturbance limits. ITE is subdivided into two categories denoted class A ITE and class B ITE.EN 55022:2006 – 10 – Class B ITE is intended primarily for use in the domestic environment and may include:– equipment with no fixed place of use; for example, portable equipment powered by built-inbatteries;– telecommunication terminal equipment powered by a telecommunication network; – personal computers and auxiliary connected equipment.NOTE The domestic environment is an environment where the use of broadcast radio and television receivers may be expected within a distance of 10 m of the apparatus concerned.4.2 Class A ITE WarningThis is a class A product. In a domestic environment this product may cause radio inter-ference in which case the user may be required to take adequate measures.5 Limits for conducted disturbance at mains terminalsand telecommunication portsThe equipment under test (EUT) shall meet the limits in Tables 1 and 3 or 2 and 4, as appli-cable, including the average limit and the quasi-peak limit when using, respectively, an average detector receiver and quasi-peak detector receiver and measured in accordance with the methods described in Clause 9. Either the voltage limits or the current limits in Table 3 or 4, as applicable, shall be met except for the measurement method of C.1.3 where both limits shall be met. If the average limit is met when using a quasi-peak detector receiver, the EUT shall be deemed to meet both limits and measurement with the average detector receiver is unnecessary.If the reading of the measuring receiver shows fluctuations close to the limit, the reading shall be observed for at least 15 s at each measurement frequency; the higher reading shall be recorded with the exception of any brief isolated high reading which shall be ignored.5.1 Limits of mains terminal disturbance voltageTable 1 – Limits for conducted disturbance at the mains portsof class A ITE Limits dB(μV) Frequency rangeMHzQuasi-peak Average 0,15 to 0,5079 66 0,50 to 30 73 60NOTE The lower limit shall apply at the transition frequency.Class A ITE is a category of all other ITE which satisfies the class A ITE limits but not the class B ITE limits. The following warning shall be included in the instructions for use:Table 2 – Limits for conducted disturbance at the mains portsof class B ITE Limits dB(μV) Frequency rangeMHzQuasi-peak Average 0,15 to 0,5066 to 56 56 to 46 0,50 to 556 46 5 to 30 60 50NOTE 1 The lower limit shall apply at the transition frequencies.NOTE 2 The limit decreases linearly with the logarithm of the frequency in therange 0,15 MHz to 0,50 MHz.5.2 Limits of conducted common mode (asymmetric mode) disturbanceat telecommunication ports 2)Table 3 – Limits of conducted common mode (asymmetric mode) disturbanceat telecommunication ports in the frequency range 0,15 MHz to 30 MHzfor class A equipment Voltage limits dB (μV) Current limits dB (μA) Frequency rangeMHzQuasi-peak Average Quasi-peak Average0,15 to 0,597 to 87 84 to 74 53 to 43 40 to 30 0,5 to 30 87 74 43 30 NOTE 1 The limits decrease linearly with the logarithm of the frequency in the range 0,15 MHz to 0,5 MHz.NOTE 2 The current and voltage disturbance limits are derived for use with an impedance stabilization network (ISN) which presents a common mode (asymmetric mode) impedance of 150 Ω to the telecommunication port under test (conversion factor is 20 log 10 150 / I = 44 dB).Table 4 – Limits of conducted common mode (asymmetric mode) disturbanceat telecommunication ports in the frequency range 0,15 MHz to 30 MHzfor class B equipment Voltage limits dB(μV) Current limits dB(μA) Frequency rangeMHzQuasi-peak Average Quasi-peakAverage 0,15 to 0,584 to 74 74 to 64 40 to 30 30 to 20 0,5 to 30 74 64 30 20 NOTE 1 The limits decrease linearly with the logarithm of the frequency in the range 0,15 MHz to 0,5 MHz.NOTE 2 The current and voltage disturbance limits are derived for use with an impedance stabilization network (ISN) which presents a common mode (asymmetric mode) impedance of 150 Ω to the telecommunication port under test (conversion factor is 20 log 10 150 / I = 44 dB).6 Limits for radiated disturbanceThe EUT shall meet the limits of Table 5 or Table 6 when measured at the measuring distance R in accordance with the methods described in Clause 10. If the reading on the measuring receiver shows fluctuations close to the limit, the reading shall be observed for at least 15 s at each measurement frequency; the highest reading shall be recorded, with the exception of any brief isolated high reading, which shall be ignored.___________2) See 3.6.Table 5 – Limits for radiated disturbance of class A ITE at a measuring distance of 10 mFrequency rangeMHz Quasi-peak limits dB(μV/m)30 to 230 40230 to 1 000 47NOTE 1 The lower limit shall apply at the transition frequency.NOTE 2 Additional provisions may be required for cases where interference occurs.Table 6 – Limits for radiated disturbance of class B ITEat a measuring distance of 10 mFrequency rangeMHz Quasi-peak limits dB(μV/m)30 to 230 30230 to 1 000 37NOTE 1 The lower limit shall apply at the transition frequency.NOTE 2 Additional provisions may be required for cases where interferenceoccurs.7 Interpretation of CISPR radio disturbance limit7.1 Significance of a CISPR limit7.1.1 A CISPR limit is a limit which is recommended to national authorities for incorporation in national publications, relevant legal regulations and official specifications. It is also recom-mended that international organizations use these limits.7.1.2The significance of the limits for equipment shall be that, on a statistical basis, at least 80 % of the mass-produced equipment complies with the limits with at least 80 % confidence.7.2 Application of limits in tests for conformity of equipment in series production7.2.1Tests shall be made:7.2.1.1Either on a sample of equipment of the type using the statistical method of evaluation set out in 7.2.3.7.2.1.2Or, for simplicity's sake, on one equipment only.7.2.2Subsequent tests are necessary from time to time on equipment taken at random from production, especially in the case referred to in 7.2.1.2.7.2.3Statistically assessed compliance with limits shall be made as follows:This test shall be performed on a sample of not less than five and not more than 12 items of the type. If, in exceptional circumstances, five items are not available, a sample of four or three shall be used. Compliance is judged from the following relationship:x kS +≤n L wherex is the arithmetic mean of the measured value of n items in the sample()S n x x n 2n 211=−−∑x n is the value of the individual itemL is the appropriate limitk is the factor derived from tables of the non-central t -distribution which assures with 80 %confidence that 80 % of the type is below the limit; the value of k depends on the sample size n and is stated below.The quantities x n , x , S n and L are expressed logarithmically: dB(μV), dB(μV/m) or dB(pW). n3 4 5 6 7 8 9 10 11 12 k 2,04 1,69 1,52 1,42 1,35 1,30 1,27 1,24 1,21 1,207.2.4 The banning of sales, or the withdrawal of a type approval, as a result of a dispute shall be considered only after tests have been carried out using the statistical method of evaluation in accordance with 7.2.1.1.8 General measurement conditions8.1 Ambient noiseA test site shall permit disturbances from the EUT to be distinguished from ambient noise. The suitability of the site in this respect can be determined by measuring the ambient noise levels with the EUT inoperative and ensuring that the noise level is at least 6 dB below the limits specified in Clauses 5 and 6.If at certain frequency bands the ambient noise is not 6 dB below the specified limit, the methods shown in 10.5 may be used to show compliance of the EUT to the specified limits. It is not necessary that the ambient noise level be 6 dB below the specified limit where both ambient noise and source disturbance combined do not exceed the specified limit. In this case the source emanation is considered to satisfy the specified limit. Where the combined ambient noise and source disturbance exceed the specified limit, the EUT shall not be judged to fail the specified limit unless it is demonstrated that, at any measurement frequency for which the limit is exceeded, two conditions are met:a) the ambient noise level is at least 6 dB below the source disturbance plus ambient noiselevel;b) the ambient noise level is at least 4,8 dB below the specified limit.。
Semi-supervised and unsupervised extreme learningmachinesGao Huang,Shiji Song,Jatinder N.D.Gupta,and Cheng WuAbstract—Extreme learning machines(ELMs)have proven to be an efficient and effective learning paradigm for pattern classification and regression.However,ELMs are primarily applied to supervised learning problems.Only a few existing research studies have used ELMs to explore unlabeled data. In this paper,we extend ELMs for both semi-supervised and unsupervised tasks based on the manifold regularization,thus greatly expanding the applicability of ELMs.The key advantages of the proposed algorithms are1)both the semi-supervised ELM (SS-ELM)and the unsupervised ELM(US-ELM)exhibit the learning capability and computational efficiency of ELMs;2) both algorithms naturally handle multi-class classification or multi-cluster clustering;and3)both algorithms are inductive and can handle unseen data at test time directly.Moreover,it is shown in this paper that all the supervised,semi-supervised and unsupervised ELMs can actually be put into a unified framework. This provides new perspectives for understanding the mechanism of random feature mapping,which is the key concept in ELM theory.Empirical study on a wide range of data sets demonstrates that the proposed algorithms are competitive with state-of-the-art semi-supervised or unsupervised learning algorithms in terms of accuracy and efficiency.Index Terms—Clustering,embedding,extreme learning ma-chine,manifold regularization,semi-supervised learning,unsu-pervised learning.I.I NTRODUCTIONS INGLE layer feedforward networks(SLFNs)have been intensively studied during the past several decades.Most of the existing learning algorithms for training SLFNs,such as the famous back-propagation algorithm[1]and the Levenberg-Marquardt algorithm[2],adopt gradient methods to optimize the weights in the network.Some existing works also use forward selection or backward elimination approaches to con-struct network dynamically during the training process[3]–[7].However,neither the gradient based methods nor the grow/prune methods guarantee a global optimal solution.Al-though various methods,such as the generic and evolutionary algorithms,have been proposed to handle the local minimum This work was supported by the National Natural Science Foundation of China under Grant61273233,the Research Fund for the Doctoral Program of Higher Education under Grant20120002110035and20130002130010, the National Key Technology R&D Program under Grant2012BAF01B03, the Project of China Ocean Association under Grant DY125-25-02,and Tsinghua University Initiative Scientific Research Program under Grants 2011THZ07132.Gao Huang,Shiji Song,and Cheng Wu are with the Department of Automation,Tsinghua University,Beijing100084,China(e-mail:huang-g09@;shijis@; wuc@).Jatinder N.D.Gupta is with the College of Business Administration,The University of Alabama in Huntsville,Huntsville,AL35899,USA.(e-mail: guptaj@).problem,they basically introduce high computational cost. One of the most successful algorithms for training SLFNs is the support vector machines(SVMs)[8],[9],which is a maximal margin classifier derived under the framework of structural risk minimization(SRM).The dual problem of SVMs is a quadratic programming and can be solved conveniently.Due to its simplicity and stable generalization performance,SVMs have been widely studied and applied to various domains[10]–[14].Recently,Huang et al.[15],[16]proposed the extreme learning machines(ELMs)for training SLFNs.In contrast to most of the existing approaches,ELMs only update the output weights between the hidden layer and the output layer, while the parameters,i.e.,the input weights and biases,of the hidden layer are randomly generated.By adopting squared loss on the prediction error,the training of output weights turns into a regularized least squares(or ridge regression)problem which can be solved efficiently in closed form.It has been shown that even without updating the parameters of the hidden layer,the SLFN with randomly generated hidden neurons and tunable output weights maintains its universal approximation capability[17]–[19].Compared to gradient based algorithms, ELMs are much more efficient and usually lead to better generalization performance[20]–[22].Compared to SVMs, solving the regularized least squares problem in ELMs is also faster than solving the quadratic programming problem in standard SVMs.Moreover,ELMs can be used for multi-class classification problems directly.The predicting accuracy achieved by ELMs is comparable with or even higher than that of SVMs[16],[22]–[24].The differences and similarities between ELMs and SVMs are discussed in[25]and[26], and new algorithms are proposed by combining the advan-tages of both models.In[25],an extreme SVM(ESVM) model is proposed by combining ELMs and the proximal SVM(PSVM).The ESVM algorithm is shown to be more accurate than the basic ELMs model due to the introduced regularization technique,and much more efficient than SVMs since there is no kernel matrix multiplication in ESVM.In [26],the traditional RBF kernel are replaced by ELM kernel, leading to an efficient algorithm with matched accuracy of SVMs.In the past years,researchers from variesfields have made substantial contribution to ELM theories and applications.For example,the universal approximation ability of ELMs has been further studied in a classification context[23].The gen-eralization error bound of ELMs has been investigated from the perspective of the Vapnik-Chervonenkis(VC)dimension theory and the initial localized generalization error model(LGEM)[27],[28].Varies extensions have been made to the basic ELMs to make it more efficient and more suitable for specific problems,such as ELMs for online sequential data [29]–[31],ELMs for noisy/missing data[32]–[34],ELMs for imbalanced data[35],etc.From the implementation aspect, ELMs has recently been implemented using parallel tech-niques[36],[37],and realized on hardware[38],which made ELMs feasible for large data sets and real time reasoning. Though ELMs have become popular in a wide range of domains,they are primarily used for supervised learning tasks such as classification and regression,which greatly limits their applicability.In some cases,such as text classification, information retrieval and fault diagnosis,obtaining labels for fully supervised learning is time consuming and expensive, while a multitude of unlabeled data are easy and cheap to collect.To overcome the disadvantage of supervised learning al-gorithms that they cannot make use of unlabeled data,semi-supervised learning(SSL)has been proposed to leverage both labeled and unlabeled data[39],[40].The SSL algorithms assume that the input patterns from both labeled and unlabeled data are drawn from the same marginal distribution.Therefore, the unlabeled data naturally provide useful information for exploring the data structure in the input space.By assuming that the input data follows some cluster structure or manifold in the input space,SSL algorithms can incorporate both la-beled and unlabeled data into the learning process.Since SSL requires less effort to collect labeled data and can offer higher accuracy,it has been applied to various domains[41]–[43].In some other cases where no labeled data are available,people may be interested in exploring the underlying structure of the data.To this end,unsupervised learning(USL)techniques, such as clustering,dimension reduction or data representation, are widely used to fulfill these tasks.In this paper,we extend ELMs to handle both semi-supervised and unsupervised learning problems by introducing the manifold regularization framework.Both the proposed semi-supervised ELM(SS-ELM)and unsupervised ELM(US-ELM)inherit the computational efficiency and the learn-ing capability of traditional pared with existing algorithms,SS-ELM and US-ELM are not only inductive (straightforward extension for out-of-sample examples at test time),but also can be used for multi-class classification or multi-cluster clustering directly.We test our algorithms on a variety of data sets,and make comparisons with other related algorithms.The results show that the proposed algorithms are competitive with state-of-the-art algorithms in terms of accuracy and efficiency.It is worth to mention that all the supervised,semi-supervised and unsupervised ELMs can actually be put into a unified framework,that is all the algorithms consist of two stages:1)random feature mapping;and2)output weights solving.Thefirst stage is to construct the hidden layer using randomly generated hidden neurons.This is the key concept in the ELM theory,which differs it from many existing feature learning methods.Generating feature mapping randomly en-ables ELMs for fast nonlinear feature learning and alleviates the problem of over-fitting.The second stage is to solve the weights between the hidden layer and the output layer, and this is where the main difference of supervised,semi-supervised and unsupervised ELMs lies.We believe that the unified framework for the three types of ELMs might provide us a new perspective to understand the underlying behavior of the random feature mapping in ELMs.The rest of the paper is organized as follows.In Section II,we give a brief review of related existing literature on semi-supervised and unsupervised learning.Section III and IV introduce the basic formulation of ELMs and the man-ifold regularization framework,respectively.We present the proposed SS-ELM and US-ELM algorithms in Sections V and VI.Experiment results are given in Section VII,and Section VIII concludes the paper.II.R ELATED WORKSOnly a few existing research studies on ELMs have dealt with the problem of semi-supervised learning or unsupervised learning.In[44]and[45],the manifold regularization frame-work was introduce into the ELMs model to leverage both labeled and unlabeled data,thus extended ELMs for semi-supervised learning.However,both of these two works are limited to binary classification problems,thus they haven’t explore the full power of ELMs.Moreover,both algorithms are only effective when the number of training patterns is more than the number of hidden neurons.Unfortunately,this condition is usually violated in semi-supervised learning since the training data is relatively scarce compared to the hidden neurons,whose number is commonly set to several hundreds or several thousands.Recently,a co-training approach have been proposed to train ELMs in a semi-supervised setting [46].In this algorithm,the labeled training sets are augmented gradually by moving a small set of most confidently predicted unlabeled data to the labeled set at each loop,and ELMs are trained repeatedly on the pseudo-labeled set.Since the algo-rithm need to train ELMs repeatedly,it introduces considerable extra computational cost.The proposed SS-ELM is related to a few other mani-fold assumption based semi-supervised learning algorithms, such as the Laplacian support vector machines(LapSVMs) [47],the Laplacian regularized least squares(LapRLS)[47], semi-supervised neural networks(SSNNs)[48],and semi-supervised deep embedding[49].It has been shown in these works that manifold regularization is effective in a wide range of domains and often leads to a state-of-the-art performance in terms of accuracy and efficiency.The US-ELM proposed in this paper are related to the Laplacian Eigenmaps(LE)[50]and spectral clustering(SC) [51]in that they both use spectral techniques for embedding and clustering.In all these algorithms,an affinity matrix is first built from the input patterns.The SC performs eigen-decomposition on the normalized affinity matrix,and then embeds the original data into a d-dimensional space using the first d eigenvectors(each row is normalized to have unit length and represents a point in the embedded space)corresponding to the d largest eigenvalues.The LE algorithm performs generalized eigen-decomposition on the graph Laplacian,anduses the d eigenvectors corresponding to the second through the(d+1)th smallest eigenvalues for embedding.When LE and SC are used for clustering,then k-means is adopted to cluster the data in the embedded space.Similar to LE and SC,the US-ELM are also based on the affinity matrix,and it is converted to solving a generalized eigen-decomposition problem.However,the eigenvectors obtained in US-ELM are not used for data representation directly,but are used as the parameters of the network,i.e.,the output weights.Note that once the US-ELM model is trained,it can be applied to any presented data in the original input space.In this way,US-ELM provide a straightforward way for handling new patterns without recomputing eigenvectors as in LE and SC.III.E XTREME LEARNING MACHINES Consider a supervised learning problem where we have a training set with N samples,{X,Y}={x i,y i}N i=1.Herex i∈R n i,y i is a n o-dimensional binary vector with only one entry(correspond to the class that x i belongs to)equal to one for multi-classification tasks,or y i∈R n o for regression tasks,where n i and n o are the dimensions of input and output respectively.ELMs aim to learn a decision rule or an approximation function based on the training data. Generally,the training of ELMs consists of two stages.The first stage is to construct the hidden layer using afixed number of randomly generated mapping neurons,which can be any nonlinear piecewise continuous functions,such as the Sigmoid function and Gaussian function given below.1)Sigmoid functiong(x;θ)=11+exp(−(a T x+b));(1)2)Gaussian functiong(x;θ)=exp(−b∥x−a∥);(2) whereθ={a,b}are the parameters of the mapping function and∥·∥denotes the Euclidean norm.A notable feature of ELMs is that the parameters of the hidden mapping functions can be randomly generated ac-cording to any continuous probability distribution,e.g.,the uniform distribution on(-1,1).This makes ELMs distinct from the traditional feedforward neural networks and SVMs. The only free parameters that need to be optimized in the training process are the output weights between the hidden neurons and the output nodes.By doing so,training ELMs is equivalent to solving a regularized least squares problem which is considerately more efficient than the training of SVMs or backpropagation algorithms.In thefirst stage,a number of hidden neurons which map the data from the input space into a n h-dimensional feature space (n h is the number of hidden neurons)are randomly generated. We denote by h(x i)∈R1×n h the output vector of the hidden layer with respect to x i,andβ∈R n h×n o the output weights that connect the hidden layer with the output layer.Then,the outputs of the network are given byf(x i)=h(x i)β,i=1,...,N.(3)In the second stage,ELMs aim to solve the output weights by minimizing the sum of the squared losses of the prediction errors,which leads to the following formulationminβ∈R n h×n o12∥β∥2+C2N∑i=1∥e i∥2s.t.h(x i)β=y T i−e T i,i=1,...,N,(4)where thefirst term in the objective function is a regularization term which controls the complexity of the model,e i∈R n o is the error vector with respect to the i th training pattern,and C is a penalty coefficient on the training errors.By substituting the constraints into the objective function, we obtain the following equivalent unconstrained optimization problem:minβ∈R n h×n oL ELM=12∥β∥2+C2∥Y−Hβ∥2(5)where H=[h(x1)T,...,h(x N)T]T∈R N×n h.The above problem is widely known as the ridge regression or regularized least squares.By setting the gradient of L ELM with respect toβto zero,we have∇L ELM=β+CH H T(Y−Hβ)=0(6) If H has more rows than columns and is of full column rank,which is usually the case where the number of training patterns are more than the number of the hidden neurons,the above equation is overdetermined,and we have the following closed form solution for(5):β∗=(H T H+I nhC)−1H T Y,(7)where I nhis an identity matrix of dimension n h.Note that in practice,rather than explicitly inverting the n h×n h matrix in the above expression,we can use Gaussian elimination to directly solve a set of linear equations in a more efficient and numerically stable manner.If the number of training patterns are less than the number of hidden neurons,then H will have more columns than rows, which often leads to an underdetermined least squares prob-lem.In this case,βmay have infinite number of solutions.To handle this problem,we restrictβto be a linear combination of the rows of H:β=H Tα(α∈R N×n o).Notice that when H has more columns than rows and is of full row rank,then H H T is invertible.Multiplying both side of(6) by(H H T)−1H,we getα+C(Y−H H Tα)=0,(8) This yieldsβ∗=H Tα∗=H T(H H T+I NC)−1Y(9)where I N is an identity matrix of dimension N. Therefore,in the case where training patterns are plentiful compared to the hidden neurons,we use(7)to compute the output weights,otherwise we use(9).IV.T HE MANIFOLD REGULARIZATION FRAMEWORK Semi-supervised learning is built on the following two assumptions:(1)both the label data X l and the unlabeled data X u are drawn from the same marginal distribution P X ;and (2)if two points x 1and x 2are close to each other,then the conditional probabilities P (y |x 1)and P (y |x 2)should be similar as well.The latter assumption is widely known as the smoothness assumption in machine learning.To enforce this assumption on the data,the manifold regularization framework proposes to minimize the following cost functionL m=12∑i,jw ij ∥P (y |x i )−P (y |x j )∥2,(10)where w ij is the pair-wise similarity between two patterns x iand x j .Note that the similarity matrix W =[w ij ]is usually sparse,since we only place a nonzero weight between two patterns x i and x j if they are close,e.g.,x i is among the k nearest neighbors of x j or x j is among the k nearest neighbors of x i .The nonzero weights are usually computed using Gaussian function exp (−∥x i −x j ∥2/2σ2),or simply fixed to 1.Intuitively,the formulation (10)penalizes large variation in the conditional probability P (y |x )when x has a small change.This requires that P (y |x )vary smoothly along the geodesics of P (x ).Since it is difficult to compute the conditional probability,we can approximate (10)with the following expression:ˆLm =12∑i,jw ij ∥ˆyi −ˆy j ∥2,(11)where ˆyi and ˆy j are the predictions with respect to pattern x i and x j ,respectively.It is straightforward to simplify the above expression in a matrix form:ˆL m =Tr (ˆY T L ˆY ),(12)where Tr (·)denotes the trace of a matrix,L =D −W isknown as the graph Laplacian ,and D is a diagonal matrixwith its diagonal elements D ii =l +u∑j =1w i,j .As discussed in [52],instead of using L directly,we can normalize it byD −12L D −12or replace it by L p (p is an integer),based on some prior knowledge.V.S EMI -SUPERVISED ELMIn the semi-supervised setting,we have few labeled data and plenty of unlabeled data.We denote the labeled data in the training set as {X l ,Y l }={x i ,y i }l i =1,and unlabeled dataas X u ={x i }ui =1,where l and u are the number of labeled and unlabeled data,respectively.The proposed SS-ELM incorporates the manifold regular-ization to leverage unlabeled data to improve the classification accuracy when labeled data are scarce.By modifying the ordinary ELM formulation (4),we give the formulation ofSS-ELM as:minβ∈R n h ×n o12∥β∥2+12l∑i =1C i ∥e i ∥2+λ2Tr (F T L F )s.t.h (x i )β=y T i −e T i ,i =1,...,l,f i =h (x i )β,i =1,...,l +u(13)where L ∈R (l +u )×(l +u )is the graph Laplacian built fromboth labeled and unlabeled data,and F ∈R (l +u )×n o is the output matrix of the network with its i th row equal to f (x i ),λis a tradeoff parameter.Note that similar to the weighted ELM algorithm (W-ELM)introduced in [35],here we associate different penalty coeffi-cient C i on the prediction errors with respect to patterns from different classes.This is because we found that when the data is skewed,i.e.,some classes have significantly more training patterns than other classes,traditional ELMs tend to fit the classes that having the majority of patterns quite well but fits other classes poorly.This usually leads to poor generalization performance on the testing set (while the prediction accuracy may be high,but the some classes are neglected).Therefore,we propose to alleviate this problem by re-weighting instances from different classes.Suppose that x i belongs to class t i ,which has N t i training patterns,then we associate e i with a penalty ofC i =C 0N t i.(14)where C 0is a user defined parameter as in traditional ELMs.In this way,the patterns from the dominant classes will not be over fitted by the algorithm,and the patterns from a class with less samples will not be neglected.We substitute the constraints into the objective function,and rewrite the above formulation in a matrix form:min β∈R n h×n o 12∥β∥2+12∥C 12( Y −Hβ)∥2+λ2Tr (βT H TL Hβ)(15)where Y∈R (l +u )×n o is the training target with its first l rows equal to Y l and the rest equal to 0,C is a (l +u )×(l +u )diagonal matrix with its first l diagonal elements [C ]ii =C i ,i =1,...,l and the rest equal to 0.Again,we compute the gradient of the objective function with respect to β:∇L SS −ELM =β+H T C ( Y−H β)+λH H T L H β.(16)By setting the gradient to zero,we obtain the solution tothe SS-ELM:β∗=(I n h +H T C H +λH H T L H )−1H TC Y .(17)As in Section III,if the number of labeled data is fewer thanthe number of hidden neurons,which is common in SSL,we have the following alternative solution:β∗=H T (I l +u +C H H T +λL L H H T )−1C Y .(18)where I l +u is an identity matrix of dimension l +u .Note that by settingλto be zero and the diagonal elements of C i(i=1,...,l)to be the same constant,(17)and (18)reduce to the solutions of traditional ELMs(7)and(9), respectively.Based on the above discussion,the SS-ELM algorithm is summarized as Algorithm1.Algorithm1The SS-ELM algorithmInput:The labeled patterns,{X l,Y l}={x i,y i}l i=1;The unlabeled patterns,X u={x i}u i=1;Output:The mapping function of SS-ELM:f:R n i→R n oStep1:Construct the graph Laplacian L from both X l and X u.Step2:Initiate an ELM network of n h hidden neurons with random input weights and biases,and calculate the output matrix of the hidden neurons H∈R(l+u)×n h.Step3:Choose the tradeoff parameter C0andλ.Step4:•If n h≤NCompute the output weightsβusing(17)•ElseCompute the output weightsβusing(18)return The mapping function f(x)=h(x)β.VI.U NSUPERVISED ELMIn this section,we introduce the US-ELM algorithm for unsupervised learning.In an unsupervised setting,the entire training data X={x i}N i=1are unlabeled(N is the number of training patterns)and our target is tofind the underlying structure of the original data.The formulation of US-ELM follows from the formulation of SS-ELM.When there is no labeled data,(15)is reduced tomin β∈R n h×n o ∥β∥2+λTr(βT H T L Hβ)(19)Notice that the above formulation always attains its mini-mum atβ=0.As suggested in[50],we have to introduce addtional constraints to avoid a degenerated solution.Specifi-cally,the formulation of US-ELM is given bymin β∈R n h×n o ∥β∥2+λTr(βT H T L Hβ)s.t.(Hβ)T Hβ=I no(20)Theorem1:An optimal solution to problem(20)is given by choosingβas the matrix whose columns are the eigenvectors (normalized to satisfy the constraint)corresponding to thefirst n o smallest eigenvalues of the generalized eigenvalue problem:(I nh +λH H T L H)v=γH H T H v.(21)Proof:We can rewrite the problem(20)asminβ∈R n h×n o,ββT Bβ=I no Tr(βT Aβ),(22)Algorithm2The US-ELM algorithmInput:The training data:X∈R N×n i;Output:•For embedding task:The embedding in a n o-dimensional space:E∈R N×n o;•For clustering task:The label vector of cluster index:y∈N N×1+.Step1:Construct the graph Laplacian L from X.Step2:Initiate an ELM network of n h hidden neurons withrandom input weights,and calculate the output matrix of thehidden neurons H∈R N×n h.Step3:•If n h≤NFind the generalized eigenvectors v2,v3,...,v no+1of(21)corresponding to the second through the n o+1smallest eigenvalues.Letβ=[ v2, v3,..., v no+1],where v i=v i/∥H v i∥,i=2,...,n o+1.•ElseFind the generalized eigenvectors u2,u3,...,u no+1of(24)corresponding to the second through the n o+1smallest eigenvalues.Letβ=H T[ u2, u3,..., u no+1],where u i=u i/∥H H T u i∥,i=2,...,n o+1.Step4:Calculate the embedding matrix:E=Hβ.Step5(For clustering only):Treat each row of E as a point,and cluster the N points into K clusters using the k-meansalgorithm.Let y be the label vector of cluster index for allthe points.return E(for embedding task)or y(for clustering task);where A=I nh+λH H T L H and B=H T H.It is easy to verify that both A and B are Hermitianmatrices.Thus,according to the Rayleigh-Ritz theorem[53],the above trace minimization problem attains its optimum ifand only if the column span ofβis the minimum span ofthe eigenspace corresponding to the smallest n o eigenvaluesof(21).Therefore,by stacking the normalized eigenvectors of(21)corresponding to the smallest n o generalized eigenvalues,we obtain an optimal solution to(20).In the algorithm of Laplacian eigenmaps,thefirst eigenvec-tor is discarded since it is always a constant vector proportionalto1(corresponding to the smallest eigenvalue0)[50].In theUS-ELM algorithm,thefirst eigenvector of(21)also leadsto small variations in embedding and is not useful for datarepresentation.Therefore,we suggest to discard this trivialsolution as well.Letγ1,γ2,...,γno+1(γ1≤γ2≤...≤γn o+1)be the(n o+1)smallest eigenvalues of(21)and v1,v2,...,v no+1be their corresponding eigenvectors.Then,the solution to theoutput weightsβis given byβ∗=[ v2, v3,..., v no+1],(23)where v i=v i/∥H v i∥,i=2,...,n o+1are the normalizedeigenvectors.If the number of labeled data is fewer than the numberTABLE ID ETAILS OF THE DATA SETS USED FOR SEMI-SUPERVISED LEARNINGData set Class Dimension|L||U||V||T|G50C2505031450136COIL20(B)2102440100040360USPST(B)225650140950498COIL2020102440100040360USPST1025650140950498of hidden neurons,problem(21)is underdetermined.In this case,we have the following alternative formulation by using the same trick as in previous sections:(I u+λL L H H T )u=γH H H T u.(24)Again,let u1,u2,...,u no +1be generalized eigenvectorscorresponding to the(n o+1)smallest eigenvalues of(24), then thefinal solution is given byβ∗=H T[ u2, u3,..., u no +1],(25)where u i=u i/∥H H T u i∥,i=2,...,n o+1are the normal-ized eigenvectors.If our task is clustering,then we can adopt the k-means algorithm to perform clustering in the embedded space.We summarize the proposed US-ELM in Algorithm2. Remark:Comparing the supervised ELM,the semi-supervised ELM and the unsupervised ELM,we can observe that all the algorithms have two similar stages in the training process,that is the random feature learning stage and the out-put weights learning stage.Under this two-stage framework,it is easy tofind the differences and similarities between the three algorithms.Actually,all the algorithms share the same stage of random feature learning,and this is the essence of the ELM theory.This also means that no matter the task is a supervised, semi-supervised or unsupervised learning problem,we can always follow the same step to generate the hidden layer. The differences of the three types of ELMs lie in the second stage on how the output weights are computed.In supervised ELM and SS-ELM,the output weights are trained by solving a regularized least squares problem;while the output weights in the US-ELM are obtained by solving a generalized eigenvalue problem.The unified framework for the three types of ELMs might provide new perspectives to further develop the ELM theory.VII.E XPERIMENTAL RESULTSWe evaluated our algorithms on wide range of semi-supervised and unsupervised parisons were made with related state-of-the-art algorithms, e.g.,Transductive SVM(TSVM)[54],LapSVM[47]and LapRLS[47]for semi-supervised learning;and Laplacian Eigenmap(LE)[50], spectral clustering(SC)[51]and deep autoencoder(DA)[55] for unsupervised learning.All algorithms were implemented using Matlab R2012a on a2.60GHz machine with4GB of memory.TABLE IIIT RAINING TIME(IN SECONDS)COMPARISON OF TSVM,L AP RLS,L AP SVM AND SS-ELMData set TSVM LapRLS LapSVM SS-ELMG50C0.3240.0410.0450.035COIL20(B)16.820.5120.4590.516USPST(B)68.440.9210.947 1.029COIL2018.43 5.841 4.9460.814USPST68.147.1217.259 1.373A.Semi-supervised learning results1)Data sets:We tested the SS-ELM onfive popular semi-supervised learning benchmarks,which have been widely usedfor evaluating semi-supervised algorithms[52],[56],[57].•The G50C is a binary classification data set of which each class is generated by a50-dimensional multivariate Gaus-sian distribution.This classification problem is explicitlydesigned so that the true Bayes error is5%.•The Columbia Object Image Library(COIL20)is a multi-class image classification data set which consists1440 gray-scale images of20objects.Each pattern is a32×32 gray scale image of one object taken from a specific view.The COIL20(B)data set is a binary classification taskobtained from COIL20by grouping thefirst10objectsas Class1,and the last10objects as Class2.•The USPST data set is a subset(the testing set)of the well known handwritten digit recognition data set USPS.The USPST(B)data set is a binary classification task obtained from USPST by grouping thefirst5digits as Class1and the last5digits as Class2.2)Experimental setup:We followed the experimental setup in[57]to evaluate the semi-supervised algorithms.Specifi-cally,each of the data sets is split into4folds,one of which was used for testing(denoted by T)and the rest3folds for training.Each of the folds was used as the testing set once(4-fold cross-validation).As in[57],this random fold generation process were repeated3times,resulted in12different splits in total.Every training set was further partitioned into a labeled set L,a validation set V,and an unlabeled set U.When we train a semi-supervised learning algorithm,the labeled data from L and the unlabeled data from U were used.The validation set which consists of labeled data was only used for model selection,i.e.,finding the optimal hyperparameters C0andλin the SS-ELM algorithm.The characteristics of the data sets used in our experiment are summarized in Table I. The training of SS-ELM consists of two stages:1)generat-ing the random hidden layer;and2)training the output weights using(17)or(18).In thefirst stage,we adopted the Sigmoid function for nonlinear mapping,and the input weights and biases were generated according to the uniform distribution on(-1,1).The number of hidden neurons n h wasfixed to 1000for G50C,and2000for the rest four data sets.In the second stage,wefirst need to build the graph Laplacian L.We followed the methods discussed in[52]and[57]to compute L,and the hyperparameter settings can be found in[47],[52] and[57].The trade off parameters C andλwere selected from。
YE4系列超超高效率三相异步电动机效率验证的研究严蓓兰(国家中小电机质量监督检验中心,上海200063)摘要:IE4超超高效率为国际电工委员会发布的IEC 60034-30-l:2014标准中电动机的最高效率等 级。
采用B法—测量输人-输出功率的损耗分析法对Y E4系列(IP55)三相异步电动机的各大损耗的精准测试,以及采用不同降耗设计措施所达效果等进行了实际验证,确保了全系列电机达到了 %4效率等级规定。
Y E4系列产品的成功开发及推广应用,将对进一步推进我国的落实做出的。
关键词:I E4;超超高效率;三相异步电动机;B法;低不确定度中图分类号:TM 306 文献标志码:A 文章编号:1673-6540(2018)05-0115-05Research on Efficiency Verification of YE4 Series Super Premium MficiencyThree Phase Asynchronous MotorYANBeilan(China National Center for Quality Supervision and Test of S&M Size Electric Machines,Shanghai 200063,China)Abstract: IE4 super premium efficiency IEC60034-30-1:2014 issued by IEC the highest efficiency level of the motor in the standard. T he Bmethod was used to measure the input and output power loss analysis method to test thelarge loss of the YE4 series (IP55) three phase asynchronous motor,and to verify the effect of different c design measures. Thus,the whole series motor had reached the level of IE4 efficiency level. The successfuldevelopment and application of YE4 products would made an important contribution to further promoting theimplementation of China ’ s energy saving and emission reduction policies.Key words:IE4;super premium efficiency; three phase asynchronous motor; B method; low uncertainty0引言全 源的日趋紧张,美国自1992年起在全 发布了三相 应电动机EPACT) NEMAPremium标准,中国、)、加拿大、巴西等国家及 发布了高效率三相异步电动机的相关标准。
Compact 机柜空调Compact Cooling Unit目录目录 (2)1应用场合 (4)2技术参数 (4)3壁挂式安装 (4)4安全须知 (4)5操作和控制方式 (4)5.1控制器控制 (4)5.1.1控制器的操作 (4)5.1.2参数列表 (5)5.1.3参数设置 (6)5.1.4设定目标温度 (6)5.1.5设定温度范围 (6)5.1.6屏幕显示 (6)5.1.7按键显示 (7)5.1.8开机与关机 (7)5.2报警说明 (7)5.3报警信息及系统状态 (8)5.4强制制冷 (8)6过滤网 (8)7技术信息 (8)7.1.1空调的运行 (8)7.1.2冷凝水的排放 (8)8使用说明 (8)8.1空调的安装 (8)8.1.1空调的外部式安装 (9)8.1.2空调的半嵌入式安装 (9)8.2电源连接 (10)8.2.1连接要点 (10)8.2.2过压保护和电源线载荷 (10)9检验和维修 (11)9.1概述 119.1.1用压缩空气清吹 (11)10存放和处理 (13)11供货范围和保修 (13)2威图机柜空调装配说明书ContentsContents (3)1Application (14)2Technical data (14)3Assembly (14)4Safety notes (14)5Commencing operation and controlbehavior (14)5.1Controller control (14)5.1.1Operation of the controller (14)5.1.2Editable parameters (15)5.1.3Parameter navigation (15)5.1.4Setting the target temperature (16)5.1.5Setting the temperature range (16)5.1.6Controller display (16)5.1.7Display buttons (16)5.1.8Compressor: On / Off (17)5.2Alarm parameters (17)5.3Evaluating system messages (17)5.4Forced cooling (17)6Filter mats (17)7Technical informations (18)7.1.1Operation of the cooling unit (18)7.1.2Condensate discharge (18)8Handling instructions (18)8.1Fitting the cooling unit (18)8.1.1External mounting of the cooling unit (19)8.1.2Partial internal mounting of the coolingunit (accessories not included) (19)8.2Electrical connection (20)8.2.1Connection data (20)8.2.2Overvoltage protection and power lineload (20)9Inspection and maintenance (21)9.1Compressed air cleaning (21)10Storage and disposal (23)11Scope of supply and guarantee (23)Rittal cooling unit assembly and operating instructions31 应用场合4威图机柜空调装配说明书1应用场合控制机柜空调是被设计并用于把控制柜的空气冷却同时把柜内热量排出柜外,从而保护温度敏感部件。
1 SPA DESIGN Fire Suppression manua lT hank you for purchasing one of our latest range of systems Homologated to the latest FIA standard 8865-2015. This manual covers the following system XTREME-X 1.4-2.3M³It is important that you read the following instructions carefully beforeattempting to install your fire suppression systemsThe performance of these systems could be affected if they are in any waymodified or tampered with and will void its homologation. Please ensure you only use genuine SPA parts should any parts need replacingShould you require assistance with this please call +44(0)1543 434580 or ********************.ukPages 2-34 5-67-1113-141215-16IndexContentsSystem fitting instructionsElectrical installationEngine bay /cockpit nozzlelocationConnecting Copper pipeSystem picturesBottle dimensionsData sheetsInstallation Notes17182Engine System1 X SPA-XTR-APS-B BOTTLE ONLY1 X SP387 BOTTLE PLINTH2 X SP386 BOLTED STRAPS1 X SP287 EXTENSION PIPE2 X SP280 10MM COPPER PIPE PER METER1 X SP281 DEFLECTOR NOZZLE1 X SP282 BULKHEAD CONNECTOR ¼ BSP-M201 X SP283 10mm ¼ BSP COMPRESSION FITTING1 X SPA-E X T-APS-B BOTTLE ONLY1 X SP388 BOTTLE PLINTH2 X S P386 BOLTED STRAPS1 X SP281 DEFLECTOR NOZZLE1 X SP288 ½ METER 12.7MM COPPER PIPE1 X SP282 BULKHEAD CONNECTOR ¼ BSP-M201 X SP287 EXTENSION PIPE1 X SP289 12.7MM ¼ BSP COMPRESSION FITTINGELECTRICAL KIT3 X SP005H HIRSCHMAN PLUG & LEADS1 X SP277 NEW FIA STANDARD POWER PACK HIRSCHMAN TYPE 1 x SP011 INTERNAL FIRE BUTTON1 X SP012 EXTERNAL FIRE BUTTON1 X SP017 E LOCATION STICKER LARGE1 X SP129 E LOCATION STICKER SMALLSYSTEM FITTING INSTRUCTIONSU npack all parts and check co mponents against check list on pages 2 & 3.Mount the engine bay system in or around the passenger footwell ideally in a transverse position page 7-11Mount the cockpit system ideally as detailed on page s7-11 behind driver or passenger seat.The extinguisher label, detailing contents etc. should be visible, mount the plinth securely to the vehicle and secure the bottle with the straps provided.Mount the power pack in a clearly visible position.Switch with Shroud (SP011) to be fitted in the cockpit within easy reach of both driver and co-driver when sitting in normal driving position and wearing fastened seatbelts.External switch (SP012) to be fitted to outside of vehicle, close to master switch (to activate by marshals when required).Electrical system to be wired as shown on page 6.TEST POSITIONWith the switch in the test position, the power pack is not armed and draws no current until either the internal switch (SP011) or external switch (SP012) is pressed.To initiate the test routine, press either internal or external switch .Test all goodIf all the tests are good, the n the amber test lamp will light for 6 seconds and then go off. This means that the system has not been operated and the Co2 canister is still charged and all wiring continuity is good. Test failedIf one of the tests fails, the amber light will flash the fault indication for 12 seconds and go off.Fault IndicationIf the amber test lamp flashes one pulse at a time, this is error 1 = low batteryIf the amber test lamp flashes two pulses at a time, this is error 2 = Continuity Ohms too highIf there is a short in the wiring or if the firing button is not released, then the amber light will change from good (no flashing) to error (flashing error 3) after 6 seconds.If the amber test lamp flashes three pulses at a time , this is error 3 = short circuitWarning error 3 will continue to flash until the fault is removed – DO NOT switch system to armed if error 3 is flashing as this may operate the fire suppression systems, you must locate the fault in the wiring harness or switches.If no lights come on when you press the button, then there is no continuity. This can be due to a loom fault, a switch fault, an expended firing head, incorrect wiring, firing head not plugged in or a flatbattery(check the battery by disconnecting the loom and momentarily switching to Armed position). no A RMED POS I TION With the switch in armed position, the power pack is providing full battery power to the output socket. If power pack switch and the battery volts are good, then the Red Armed LED will flash constantly. The Red LED only uses a very small amount of power; the battery should be replaced every 6 Test positionSystem armed positionPower PackHirschman External Firing Button Internal Firing Button Brown Blue Blue Brown BrownBlue Hirschman HirschmanJoinJoin Black1.INSTALLATION DU SYSTEME D’EXTINCTION / FIRE EXTINGUISHER SYSTEM INSTALLATION101.INSTALLATION DANS L’HABITACLE / COCKPIT INSTALLATIONa)Emplacement et orientation du corpsLocation and orientation of body Horizontally mounted behind passenger or driver seat or in front ofdriver or passenger seat.b)Emplacement et orientation des busesLocation and orientation of nozzles Located between driver and passenger seat or towards the frontcentre of car.c)Précaution à prendre lors de l’installation du systèmeSpecial care to take with the installation of the systemE1-1) Installation dans l’habitacle (emplacement et orientation du corps)Cockpit installation (location and orientation of body) E1-2) Installation dans l’habitacle (emplacement et orientation des buses)Cockpit installation (location and orientation of nozzles)102.INSTALLATION DANS LE MOTEUR / ENGINE INSTALLATIONa)Emplacement et orientation du corpsLocation and orientation of bodyHorizontally mountedb)Emplacement et orientation des busesLocation and orientation of nozzlesMount off bulk head, central to enginec)Précaution à prendre lors de l’installation du systèmeSpecial care to take with the installation of the systemE2-1) Installation dans le moteur (emplacement et orientation du corps)Engine installation (location and orientation of body) E2-2) Installation dans le moteur (emplacement et orientation des buses)Engine installation (location and orientation of nozzles)ENGINE NOZZLE LOCATIONlocationBOTTLE LOCATION ENGINE Ideally m ount bottle in passenger footwell areaDEFLECTOR NOZZLE ORIENTATION ENGINE BAYNozzle locationIdeally m ount cockpit bottle either behind driver seat or passenger seatENG INE BAY NOZZLE CONNECTIONSThe engine bay Nozzle comes preassembled.1.Measure length of pipe required, cut to size using pipe cutter or hacksaw, deburr pipe.2.Push one end of pipe into 10mm fitting on bottle.3.Make 21mm hole in bulkhead.4.Insert bulkhead Fitting into hole from engine bay side5.Keep Deflector nozzle in position as shown on page 86.Turn M20 nut onto bulkhead Fitting until tight against bulkhead7.Screw ¼ BSP compression fitting into bulkhead connector until tight8.Place Compression nut and then olive onto 10mm pipe9.Insert pipe into compression fitting and tighten using two spannersCONNECTING COPPER PIPE – COMPRESSION FITTINGSOnce the pipes have been cut square – make sure all components are clean; you can use steel wool for this.Place the first nut over one of the sections of pipe.Next, place the olive over the pipe and push it along a little. Some olives have a right and wrong way round. If this is the case, they will have a different size chamfer on each side.The longest one goes against the middle of the joint.Place the fitting over the pipe and push it home. Line up the nut and hand-tighten.Using two spanners, hold the body of the fitting still with one, whilst tightening the nut with the other. It is important to tighten this nut by the right amount. If it is not fully tightened, the joint could leak.If the nut is over tightened, the olive and pipe can become distorted and the connection will leak. As a guide, the nut will usually require one complete revolution in addition to the hand-tightening. As the spanner is turned, you will feel some obvious resistance as the olive is pushed against the pipe. At this point, it will only need a little additional tightening to become watertight.This routine is to be applied to all compression fittings where pipework is connected.COCKPIT SYSTEMSENGINE SYSTEMS11417Data sheetsEXTREMEComposition Dodecafluoro-2-methylpentan-3-one,(CF3CF2C(O)CF(CF3)2)Ozone depletion NoneOperating temperature -40 to + 85 CFreeze point -108 CCritical temperature 168.7 CPhysiological properties no observed adverse effect level and lowest observed adverse effect level for cardiac sensitization (halocarbons) and oxygen depletion (Inert gas)Nozzle installation, install the bulkhead fitting as shownon page 11, apply a small amount of Loctite 243 orequivalent threadlocking medium strength adhesive toprevent vibration Fig 4.Now rotate the nozzle into the correct position asshown on page 8 or 9 and allow threadlocking adhesiveto cure.fig 1fig 2。
XFEM*DAMAGE STABILIZATIONSpecify viscosity coefficients for the damage model for fiber-reinforced materials, surface-based cohesive behavior or cohesive behavior in enriched elements.*损伤稳定指定纤维增强材料、基于表面的粘结特性或增强单元的粘结特性的损伤模型粘度系数。
This option is used to specify viscosity coefficients used in the viscous regularization scheme for the damage model for fiber-reinforced materials, surface-based traction-separation behavior in contact or cohesive behavior in enriched elements. For fiber-reinforced materials, you can use this option in conjunction with the *DAMAGE INITIATION, CRITERION=HASHIN and *DAMAGE EVOLUTION options; for surface-based traction-separation behavior, you can use this option in conjunction with the *DAMAGE INITIATION, CRITERION=MAXS, MAXE, QUADS, or QUADE and *DAMAGE EVOLUTION options.这个选项是用来指定损伤模型的粘度系数用于粘性正规化,损伤模型包括纤维增强材料,基于表面的粘结特性或增强单元的粘结特性。
DIRECTIVE NUMBER: CPL 02-00-150 EFFECTIVE DATE: April 22, 2011 SUBJECT: Field Operations Manual (FOM)ABSTRACTPurpose: This instruction cancels and replaces OSHA Instruction CPL 02-00-148,Field Operations Manual (FOM), issued November 9, 2009, whichreplaced the September 26, 1994 Instruction that implemented the FieldInspection Reference Manual (FIRM). The FOM is a revision of OSHA’senforcement policies and procedures manual that provides the field officesa reference document for identifying the responsibilities associated withthe majority of their inspection duties. This Instruction also cancels OSHAInstruction FAP 01-00-003 Federal Agency Safety and Health Programs,May 17, 1996 and Chapter 13 of OSHA Instruction CPL 02-00-045,Revised Field Operations Manual, June 15, 1989.Scope: OSHA-wide.References: Title 29 Code of Federal Regulations §1903.6, Advance Notice ofInspections; 29 Code of Federal Regulations §1903.14, Policy RegardingEmployee Rescue Activities; 29 Code of Federal Regulations §1903.19,Abatement Verification; 29 Code of Federal Regulations §1904.39,Reporting Fatalities and Multiple Hospitalizations to OSHA; and Housingfor Agricultural Workers: Final Rule, Federal Register, March 4, 1980 (45FR 14180).Cancellations: OSHA Instruction CPL 02-00-148, Field Operations Manual, November9, 2009.OSHA Instruction FAP 01-00-003, Federal Agency Safety and HealthPrograms, May 17, 1996.Chapter 13 of OSHA Instruction CPL 02-00-045, Revised FieldOperations Manual, June 15, 1989.State Impact: Notice of Intent and Adoption required. See paragraph VI.Action Offices: National, Regional, and Area OfficesOriginating Office: Directorate of Enforcement Programs Contact: Directorate of Enforcement ProgramsOffice of General Industry Enforcement200 Constitution Avenue, NW, N3 119Washington, DC 20210202-693-1850By and Under the Authority ofDavid Michaels, PhD, MPHAssistant SecretaryExecutive SummaryThis instruction cancels and replaces OSHA Instruction CPL 02-00-148, Field Operations Manual (FOM), issued November 9, 2009. The one remaining part of the prior Field Operations Manual, the chapter on Disclosure, will be added at a later date. This Instruction also cancels OSHA Instruction FAP 01-00-003 Federal Agency Safety and Health Programs, May 17, 1996 and Chapter 13 of OSHA Instruction CPL 02-00-045, Revised Field Operations Manual, June 15, 1989. This Instruction constitutes OSHA’s general enforcement policies and procedures manual for use by the field offices in conducting inspections, issuing citations and proposing penalties.Significant Changes∙A new Table of Contents for the entire FOM is added.∙ A new References section for the entire FOM is added∙ A new Cancellations section for the entire FOM is added.∙Adds a Maritime Industry Sector to Section III of Chapter 10, Industry Sectors.∙Revises sections referring to the Enhanced Enforcement Program (EEP) replacing the information with the Severe Violator Enforcement Program (SVEP).∙Adds Chapter 13, Federal Agency Field Activities.∙Cancels OSHA Instruction FAP 01-00-003, Federal Agency Safety and Health Programs, May 17, 1996.DisclaimerThis manual is intended to provide instruction regarding some of the internal operations of the Occupational Safety and Health Administration (OSHA), and is solely for the benefit of the Government. No duties, rights, or benefits, substantive or procedural, are created or implied by this manual. The contents of this manual are not enforceable by any person or entity against the Department of Labor or the United States. Statements which reflect current Occupational Safety and Health Review Commission or court precedents do not necessarily indicate acquiescence with those precedents.Table of ContentsCHAPTER 1INTRODUCTIONI.PURPOSE. ........................................................................................................... 1-1 II.SCOPE. ................................................................................................................ 1-1 III.REFERENCES .................................................................................................... 1-1 IV.CANCELLATIONS............................................................................................. 1-8 V. ACTION INFORMATION ................................................................................. 1-8A.R ESPONSIBLE O FFICE.......................................................................................................................................... 1-8B.A CTION O FFICES. .................................................................................................................... 1-8C. I NFORMATION O FFICES............................................................................................................ 1-8 VI. STATE IMPACT. ................................................................................................ 1-8 VII.SIGNIFICANT CHANGES. ............................................................................... 1-9 VIII.BACKGROUND. ................................................................................................. 1-9 IX. DEFINITIONS AND TERMINOLOGY. ........................................................ 1-10A.T HE A CT................................................................................................................................................................. 1-10B. C OMPLIANCE S AFETY AND H EALTH O FFICER (CSHO). ...........................................................1-10B.H E/S HE AND H IS/H ERS ..................................................................................................................................... 1-10C.P ROFESSIONAL J UDGMENT............................................................................................................................... 1-10E. W ORKPLACE AND W ORKSITE ......................................................................................................................... 1-10CHAPTER 2PROGRAM PLANNINGI.INTRODUCTION ............................................................................................... 2-1 II.AREA OFFICE RESPONSIBILITIES. .............................................................. 2-1A.P ROVIDING A SSISTANCE TO S MALL E MPLOYERS. ...................................................................................... 2-1B.A REA O FFICE O UTREACH P ROGRAM. ............................................................................................................. 2-1C. R ESPONDING TO R EQUESTS FOR A SSISTANCE. ............................................................................................ 2-2 III. OSHA COOPERATIVE PROGRAMS OVERVIEW. ...................................... 2-2A.V OLUNTARY P ROTECTION P ROGRAM (VPP). ........................................................................... 2-2B.O NSITE C ONSULTATION P ROGRAM. ................................................................................................................ 2-2C.S TRATEGIC P ARTNERSHIPS................................................................................................................................. 2-3D.A LLIANCE P ROGRAM ........................................................................................................................................... 2-3 IV. ENFORCEMENT PROGRAM SCHEDULING. ................................................ 2-4A.G ENERAL ................................................................................................................................................................. 2-4B.I NSPECTION P RIORITY C RITERIA. ..................................................................................................................... 2-4C.E FFECT OF C ONTEST ............................................................................................................................................ 2-5D.E NFORCEMENT E XEMPTIONS AND L IMITATIONS. ....................................................................................... 2-6E.P REEMPTION BY A NOTHER F EDERAL A GENCY ........................................................................................... 2-6F.U NITED S TATES P OSTAL S ERVICE. .................................................................................................................. 2-7G.H OME-B ASED W ORKSITES. ................................................................................................................................ 2-8H.I NSPECTION/I NVESTIGATION T YPES. ............................................................................................................... 2-8 V.UNPROGRAMMED ACTIVITY – HAZARD EVALUATION AND INSPECTION SCHEDULING ............................................................................ 2-9 VI.PROGRAMMED INSPECTIONS. ................................................................... 2-10A.S ITE-S PECIFIC T ARGETING (SST) P ROGRAM. ............................................................................................. 2-10B.S CHEDULING FOR C ONSTRUCTION I NSPECTIONS. ..................................................................................... 2-10C.S CHEDULING FOR M ARITIME I NSPECTIONS. ............................................................................. 2-11D.S PECIAL E MPHASIS P ROGRAMS (SEP S). ................................................................................... 2-12E.N ATIONAL E MPHASIS P ROGRAMS (NEP S) ............................................................................... 2-13F.L OCAL E MPHASIS P ROGRAMS (LEP S) AND R EGIONAL E MPHASIS P ROGRAMS (REP S) ............ 2-13G.O THER S PECIAL P ROGRAMS. ............................................................................................................................ 2-13H.I NSPECTION S CHEDULING AND I NTERFACE WITH C OOPERATIVE P ROGRAM P ARTICIPANTS ....... 2-13CHAPTER 3INSPECTION PROCEDURESI.INSPECTION PREPARATION. .......................................................................... 3-1 II.INSPECTION PLANNING. .................................................................................. 3-1A.R EVIEW OF I NSPECTION H ISTORY .................................................................................................................... 3-1B.R EVIEW OF C OOPERATIVE P ROGRAM P ARTICIPATION .............................................................................. 3-1C.OSHA D ATA I NITIATIVE (ODI) D ATA R EVIEW .......................................................................................... 3-2D.S AFETY AND H EALTH I SSUES R ELATING TO CSHO S.................................................................. 3-2E.A DVANCE N OTICE. ................................................................................................................................................ 3-3F.P RE-I NSPECTION C OMPULSORY P ROCESS ...................................................................................................... 3-5G.P ERSONAL S ECURITY C LEARANCE. ................................................................................................................. 3-5H.E XPERT A SSISTANCE. ........................................................................................................................................... 3-5 III. INSPECTION SCOPE. ......................................................................................... 3-6A.C OMPREHENSIVE ................................................................................................................................................... 3-6B.P ARTIAL. ................................................................................................................................................................... 3-6 IV. CONDUCT OF INSPECTION .............................................................................. 3-6A.T IME OF I NSPECTION............................................................................................................................................. 3-6B.P RESENTING C REDENTIALS. ............................................................................................................................... 3-6C.R EFUSAL TO P ERMIT I NSPECTION AND I NTERFERENCE ............................................................................. 3-7D.E MPLOYEE P ARTICIPATION. ............................................................................................................................... 3-9E.R ELEASE FOR E NTRY ............................................................................................................................................ 3-9F.B ANKRUPT OR O UT OF B USINESS. .................................................................................................................... 3-9G.E MPLOYEE R ESPONSIBILITIES. ................................................................................................. 3-10H.S TRIKE OR L ABOR D ISPUTE ............................................................................................................................. 3-10I. V ARIANCES. .......................................................................................................................................................... 3-11 V. OPENING CONFERENCE. ................................................................................ 3-11A.G ENERAL ................................................................................................................................................................ 3-11B.R EVIEW OF A PPROPRIATION A CT E XEMPTIONS AND L IMITATION. ..................................................... 3-13C.R EVIEW S CREENING FOR P ROCESS S AFETY M ANAGEMENT (PSM) C OVERAGE............................. 3-13D.R EVIEW OF V OLUNTARY C OMPLIANCE P ROGRAMS. ................................................................................ 3-14E.D ISRUPTIVE C ONDUCT. ...................................................................................................................................... 3-15F.C LASSIFIED A REAS ............................................................................................................................................. 3-16VI. REVIEW OF RECORDS. ................................................................................... 3-16A.I NJURY AND I LLNESS R ECORDS...................................................................................................................... 3-16B.R ECORDING C RITERIA. ...................................................................................................................................... 3-18C. R ECORDKEEPING D EFICIENCIES. .................................................................................................................. 3-18 VII. WALKAROUND INSPECTION. ....................................................................... 3-19A.W ALKAROUND R EPRESENTATIVES ............................................................................................................... 3-19B.E VALUATION OF S AFETY AND H EALTH M ANAGEMENT S YSTEM. ....................................................... 3-20C.R ECORD A LL F ACTS P ERTINENT TO A V IOLATION. ................................................................................. 3-20D.T ESTIFYING IN H EARINGS ................................................................................................................................ 3-21E.T RADE S ECRETS. ................................................................................................................................................. 3-21F.C OLLECTING S AMPLES. ..................................................................................................................................... 3-22G.P HOTOGRAPHS AND V IDEOTAPES.................................................................................................................. 3-22H.V IOLATIONS OF O THER L AWS. ....................................................................................................................... 3-23I.I NTERVIEWS OF N ON-M ANAGERIAL E MPLOYEES .................................................................................... 3-23J.M ULTI-E MPLOYER W ORKSITES ..................................................................................................................... 3-27 K.A DMINISTRATIVE S UBPOENA.......................................................................................................................... 3-27 L.E MPLOYER A BATEMENT A SSISTANCE. ........................................................................................................ 3-27 VIII. CLOSING CONFERENCE. .............................................................................. 3-28A.P ARTICIPANTS. ..................................................................................................................................................... 3-28B.D ISCUSSION I TEMS. ............................................................................................................................................ 3-28C.A DVICE TO A TTENDEES .................................................................................................................................... 3-29D.P ENALTIES............................................................................................................................................................. 3-30E.F EASIBLE A DMINISTRATIVE, W ORK P RACTICE AND E NGINEERING C ONTROLS. ............................ 3-30F.R EDUCING E MPLOYEE E XPOSURE. ................................................................................................................ 3-32G.A BATEMENT V ERIFICATION. ........................................................................................................................... 3-32H.E MPLOYEE D ISCRIMINATION .......................................................................................................................... 3-33 IX. SPECIAL INSPECTION PROCEDURES. ...................................................... 3-33A.F OLLOW-UP AND M ONITORING I NSPECTIONS............................................................................................ 3-33B.C ONSTRUCTION I NSPECTIONS ......................................................................................................................... 3-34C. F EDERAL A GENCY I NSPECTIONS. ................................................................................................................. 3-35CHAPTER 4VIOLATIONSI. BASIS OF VIOLATIONS ..................................................................................... 4-1A.S TANDARDS AND R EGULATIONS. .................................................................................................................... 4-1B.E MPLOYEE E XPOSURE. ........................................................................................................................................ 4-3C.R EGULATORY R EQUIREMENTS. ........................................................................................................................ 4-6D.H AZARD C OMMUNICATION. .............................................................................................................................. 4-6E. E MPLOYER/E MPLOYEE R ESPONSIBILITIES ................................................................................................... 4-6 II. SERIOUS VIOLATIONS. .................................................................................... 4-8A.S ECTION 17(K). ......................................................................................................................... 4-8B.E STABLISHING S ERIOUS V IOLATIONS ............................................................................................................ 4-8C. F OUR S TEPS TO BE D OCUMENTED. ................................................................................................................... 4-8 III. GENERAL DUTY REQUIREMENTS ............................................................. 4-14A.E VALUATION OF G ENERAL D UTY R EQUIREMENTS ................................................................................. 4-14B.E LEMENTS OF A G ENERAL D UTY R EQUIREMENT V IOLATION.............................................................. 4-14C. U SE OF THE G ENERAL D UTY C LAUSE ........................................................................................................ 4-23D.L IMITATIONS OF U SE OF THE G ENERAL D UTY C LAUSE. ..............................................................E.C LASSIFICATION OF V IOLATIONS C ITED U NDER THE G ENERAL D UTY C LAUSE. ..................F. P ROCEDURES FOR I MPLEMENTATION OF S ECTION 5(A)(1) E NFORCEMENT ............................ 4-25 4-27 4-27IV.OTHER-THAN-SERIOUS VIOLATIONS ............................................... 4-28 V.WILLFUL VIOLATIONS. ......................................................................... 4-28A.I NTENTIONAL D ISREGARD V IOLATIONS. ..........................................................................................4-28B.P LAIN I NDIFFERENCE V IOLATIONS. ...................................................................................................4-29 VI. CRIMINAL/WILLFUL VIOLATIONS. ................................................... 4-30A.A REA D IRECTOR C OORDINATION ....................................................................................................... 4-31B.C RITERIA FOR I NVESTIGATING P OSSIBLE C RIMINAL/W ILLFUL V IOLATIONS ........................ 4-31C. W ILLFUL V IOLATIONS R ELATED TO A F ATALITY .......................................................................... 4-32 VII. REPEATED VIOLATIONS. ...................................................................... 4-32A.F EDERAL AND S TATE P LAN V IOLATIONS. ........................................................................................4-32B.I DENTICAL S TANDARDS. .......................................................................................................................4-32C.D IFFERENT S TANDARDS. .......................................................................................................................4-33D.O BTAINING I NSPECTION H ISTORY. .....................................................................................................4-33E.T IME L IMITATIONS..................................................................................................................................4-34F.R EPEATED V. F AILURE TO A BATE....................................................................................................... 4-34G. A REA D IRECTOR R ESPONSIBILITIES. .............................................................................. 4-35 VIII. DE MINIMIS CONDITIONS. ................................................................... 4-36A.C RITERIA ................................................................................................................................................... 4-36B.P ROFESSIONAL J UDGMENT. ..................................................................................................................4-37C. A REA D IRECTOR R ESPONSIBILITIES. .............................................................................. 4-37 IX. CITING IN THE ALTERNATIVE ............................................................ 4-37 X. COMBINING AND GROUPING VIOLATIONS. ................................... 4-37A.C OMBINING. ..............................................................................................................................................4-37B.G ROUPING. ................................................................................................................................................4-38C. W HEN N OT TO G ROUP OR C OMBINE. ................................................................................................4-38 XI. HEALTH STANDARD VIOLATIONS ....................................................... 4-39A.C ITATION OF V ENTILATION S TANDARDS ......................................................................................... 4-39B.V IOLATIONS OF THE N OISE S TANDARD. ...........................................................................................4-40 XII. VIOLATIONS OF THE RESPIRATORY PROTECTION STANDARD(§1910.134). ....................................................................................................... XIII. VIOLATIONS OF AIR CONTAMINANT STANDARDS (§1910.1000) ... 4-43 4-43A.R EQUIREMENTS UNDER THE STANDARD: .................................................................................................. 4-43B.C LASSIFICATION OF V IOLATIONS OF A IR C ONTAMINANT S TANDARDS. ......................................... 4-43 XIV. CITING IMPROPER PERSONAL HYGIENE PRACTICES. ................... 4-45A.I NGESTION H AZARDS. .................................................................................................................................... 4-45B.A BSORPTION H AZARDS. ................................................................................................................................ 4-46C.W IPE S AMPLING. ............................................................................................................................................. 4-46D.C ITATION P OLICY ............................................................................................................................................ 4-46 XV. BIOLOGICAL MONITORING. ...................................................................... 4-47CHAPTER 5CASE FILE PREPARATION AND DOCUMENTATIONI.INTRODUCTION ............................................................................................... 5-1 II.INSPECTION CONDUCTED, CITATIONS BEING ISSUED. .................... 5-1A.OSHA-1 ................................................................................................................................... 5-1B.OSHA-1A. ............................................................................................................................... 5-1C. OSHA-1B. ................................................................................................................................ 5-2 III.INSPECTION CONDUCTED BUT NO CITATIONS ISSUED .................... 5-5 IV.NO INSPECTION ............................................................................................... 5-5 V. HEALTH INSPECTIONS. ................................................................................. 5-6A.D OCUMENT P OTENTIAL E XPOSURE. ............................................................................................................... 5-6B.E MPLOYER’S O CCUPATIONAL S AFETY AND H EALTH S YSTEM. ............................................................. 5-6 VI. AFFIRMATIVE DEFENSES............................................................................. 5-8A.B URDEN OF P ROOF. .............................................................................................................................................. 5-8B.E XPLANATIONS. ..................................................................................................................................................... 5-8 VII. INTERVIEW STATEMENTS. ........................................................................ 5-10A.G ENERALLY. ......................................................................................................................................................... 5-10B.CSHO S SHALL OBTAIN WRITTEN STATEMENTS WHEN: .......................................................................... 5-10C.L ANGUAGE AND W ORDING OF S TATEMENT. ............................................................................................. 5-11D.R EFUSAL TO S IGN S TATEMENT ...................................................................................................................... 5-11E.V IDEO AND A UDIOTAPED S TATEMENTS. ..................................................................................................... 5-11F.A DMINISTRATIVE D EPOSITIONS. .............................................................................................5-11 VIII. PAPERWORK AND WRITTEN PROGRAM REQUIREMENTS. .......... 5-12 IX.GUIDELINES FOR CASE FILE DOCUMENTATION FOR USE WITH VIDEOTAPES AND AUDIOTAPES .............................................................. 5-12 X.CASE FILE ACTIVITY DIARY SHEET. ..................................................... 5-12 XI. CITATIONS. ..................................................................................................... 5-12A.S TATUTE OF L IMITATIONS. .............................................................................................................................. 5-13B.I SSUING C ITATIONS. ........................................................................................................................................... 5-13C.A MENDING/W ITHDRAWING C ITATIONS AND N OTIFICATION OF P ENALTIES. .................................. 5-13D.P ROCEDURES FOR A MENDING OR W ITHDRAWING C ITATIONS ............................................................ 5-14 XII. INSPECTION RECORDS. ............................................................................... 5-15A.G ENERALLY. ......................................................................................................................................................... 5-15B.R ELEASE OF I NSPECTION I NFORMATION ..................................................................................................... 5-15C. C LASSIFIED AND T RADE S ECRET I NFORMATION ...................................................................................... 5-16。
RP-2002(E)Agent Release Control PanelDN-60240:C3R P 2002.j p gGeneralThe RP-2002 is a six-zone FACP for single and dual hazard agent releasing applications. The RP-2002 provides reliable fire detection, signaling and protection for commercial, indus-trial and institutional buildings requiring agent-based releasing.The RP-2002 is compatible with System Sensor’s i 3 detectors which are conventional smoke detectors that can transmit a maintenance trouble signal to the FACP indicating the need for cleaning and a supervisory ‘freeze’ signal when the ambient temperature falls below the detector rating of approximately 45°F (7.22°C). In addition, the control panel is compatible with conventional input devices such as two-wire smoke detectors,four-wire smoke detectors, pull stations, waterflow devices,tamper switches and other normally-open contact devices.Refer to the Notifier Device Compatibility Document for a com-plete listing of compatible devices.Four outputs are programmable as NACs (Notification Appli-ance Circuits) or releasing circuits. Three programmable Form-C relays (factory programmed for Alarm, Trouble and Supervisory) and 24 VDC special application resettable and non-resettable power outputs are also included on the main circuit board. The RP-2002 supervises all wiring, AC voltage,battery charger and battery level.Activation of a compatible smoke detector or any normally-open fire alarm initiating device will activate audible and visual signaling devices, illuminate an indicator, display alarm infor-mation on the panel’s LCD, sound the piezo sounder at the FACP , activate the FACP alarm relay and operate an optional module used to notify a remote station or initiate an auxiliary control function.The RP-2002E offers the same features as the RP-2002 but allows connection to 220/240 VAC. Unless otherwise speci-fied, the information in this data sheet applies to both the 110/120 VAC and 220/240 VAC versions of the panels.Features•Listed to UL Standard 864, 9th edition.•FM Approved.•Designed for agent releasing standards NFPA 12, 12A,12B, and 2001.•Meets International Building Code (IBC) seismic require-ments.•Disable/Enable control per input zone and output zone.•Extensive transient protection.•Dual hazard operation.•Adjustable pre-discharge, discharge and waterflow delay timers.•Cross-zone (double-interlock) capability.•Six programmable Style B (Class B) IDCs (Initiating Device Circuit).•System Sensor i 3 series detector compatible.•Four programmable Style Y (Class B) output circuits - (spe-cial application power).•Strobe synchronization:–System Sensor –Wheelock–Gentex –Faraday –Amseco•Three programmable Form-C relays.•7.0 amps total 24 VDC output current.•Resettable and non-resettable output power.•Built-in Programmer.•ANN-BUS connector for communication with optional devices (up to 8 total of any of the following):–N-ANN-80 Remote LCD Annunciator –N-ANN-I/O LED Driver–N-ANN-S/PG Printer Modules –N-ANN-RLY Relay Module–N-ANN-LED Annunciator Module •80-character LCD display (backlit).•Real-time clock/calendar with daylight savings time control.•History log with 256 event storage.•Piezo sounder for alarm, trouble and supervisory.•24 volt operation.•Low AC voltage sense.•Outputs Programmable for:–Releasing Circuits or NACS •NACs programmable for:–Silence Inhibit –Auto-Silence–Strobe Synchronization–Selective Silence (horn-strobe mute)–Temporal or Steady Signal–Silenceable or Non-silenceable –Release Stage Sounder•Automatic battery charger with charger supervision.•Optional Dress Panel DP-51050 (red).•Optional Trim Ring TR-CE (red) for semi-flush mounting the cabinet.•Optional N-CAC-5X Class A Converter Module for Outputs and IDCs.•Optional 4XTM Municipal Box Transmitter Module.•Optional Digital Alarm Communicators (411, 411UD, 411UDAC).•Optional ANN-SEC card for a secondary ANN-BUS.PROGRAMMING AND SOFTWARE:•Custom English labels (per point) may be manually entered or selected from an internal library file.•Programmable Abort operation.•Three programmable Form-C relay outputs.•Pre-programmed and custom application templates.•Continuous fire protection during online programming at the front panel.•Program Check automatically catches common errors not linked to any zone or input point.USER INTERFACE:•Integral 80-character LCD display with backlighting.•Real-time clock/calendar with automatic daylight savings adjustments.•ANN-Bus for connection to remote annunciators.•Audible or silent walk test capabilities.•Piezo sounder for alarm, trouble, and supervisory. Controls and IndicatorsLED INDICATORS•FIRE ALARM (red)•SUPERVISORY (yellow)•TROUBLE (yellow)•AC POWER (green)•ALARM SILENCED (yellow)•DISCHARGED (red)•PRE-DISCHARGE (red indicator)•ABORT (yellow indicator)CONTROL BUTTONS•ACKNOWLEDGE•ALARM SILENCE•SYSTEM RESET (lamp test)•DRILLAC Power – TB1•RP-2002: 120 VAC, 60 Hz, 3.66 amps.•RP-2002E: 240 VAC, 50/60 Hz, 2.085 amps.•Wire size: minimum #14 AWG (2.0 mm2) with 600V insula-tion.•Supervised, nonpower-limited.Battery (sealed lead acid only) – J12:•Maximum Charging Circuit - Normal Flat Charge: 27.6 **********.Supervised,nonpower-limited.•Maximum Charger Capacity: 26 Amp Hour battery (two18 Amp Hour batteries can be housed in the FACP cabinet.Larger batteries require separate battery box such as the BB-26 or NFS-LBBR).•Minimum Battery Size: 7 Amp Hour.Initiating Device Circuits - TB4 and TB6•Zones 1 - 5 on TB4.•Zone 6 on TB6.•Supervised and power-limited circuitry.•Style B (Class B) wiring with Style D (Class A) option.•Normal Operating Voltage: Nominal 20 VDC.•Alarm Current: 15 mA minimum.•Short Circuit Current: 40 mA max.•Maximum Loop Resistance: 100 Ohms.•End-of-Line Resistor: 4.7K Ohms, 1/2 watt (PN 71252).•Standby Current: 4 mA.Refer to the Notifier Device Compatibility Document for listed compatible devices.Notification Appliance and Releasing Circuit(s) - TB5 and TB7•Four Output Circuits.•Style Y (Class B) or Style Z (Class A) with optional con-verter module.•Special Application power.•Supervised and power-limited circuitry.•Normal Operating Voltage: Nominal 24 VDC.•Maximum Signaling Current: 7.0 amps (3.0 amps special application, 300 mA regulated maximum per NAC).•End-of-Line Resistor: 4.7K Ohms, 1/2 watt (PN 71252).•Max. Wiring Voltage Drop: 2 VDC.Refer to the Notifier Device Compatibility Document for com-patible listed devices.Form-C Relays - Programmable - TB8•Relay 1 (factory default programmed as Alarm Relay)•Relay 2 (factory default programmed as fail-safe Trouble Relay)•Relay 3 (factory default programmed as Supervisory Relay)•Relay Contact Ratings:–2 amps @ 30 VDC (resistive)–0.5 amps @ 30 VAC (resistive)Auxiliary Trouble Input – J6The Auxiliary Trouble Input is an open collector circuit which can be used to monitor external devices for trouble conditions. It can be connected to the trouble bus of a peripheral, such as a power supply, which is compatible with open collector cir-cuits.Special Application Resettable Power - TB9•Operating Voltage: Nominal 24 VDC.•Maximum Available Current: 500 mA - appropriate for powering 4-wire smoke detectors (see note).•Power-limited Circuitry.Refer to the Notifier Device Compatibility Document for com-patible listed devices.NOTE: Total current for resettable power, nonresettable power and Output Circuits must not exceed 7.0 amps.Special Application Resettable or Nonresettable Power -TB9•Operating Voltage: Nominal 24 VDC.•Maximum Available Current: 500 mA (see note 1).•Power-limited Circuitry.•Jumper selectable by JP31 for resettable or nonresettable power.Refer to the Notifier Device Compatibility Document for com-patible listed devices.Product Line InformationRP-2002: Six-zone, 24 volt Agent Release Control Panel (includes backbox, power supply, technical manual, and a frame & post operating instruction sheet) for single and dual hazard agent releasing applications.RP-2002E: Same as above but allows connection to 220/240 VAC.N-CAC-5X: Class A Converter Module can be used to convert the Style B (Class B) Initiating Device Circuits to Style D (Class A) and Style Y (Class B) Output Circuits to Style Z (Class A). NOTE: Two Class A Converter modules are required to convert all four Output Circuits and six Initiating Device Circuits.4XTM: Transmitter Module provides a supervised output for local energy municipal box transmitter and alarm and trouble reverse polarity. It includes a disable switch and disable trou-ble LED.N-ANN-80(-W): LCD Annunciator is a remote LCD annuncia-tor that mimics the information displayed on the FACP LCD display. Recommended wire type is un-shielded. (Basic model is black; order -W version for white; s ee DN-7114.)N-ANN-LED: Annunciator Module provides three LEDs for each zone: Alarm, Trouble and Supervisory. Ships with red or black enclosure (see DN-60242).N-ANN-RLED: Provides alarm (red) indicators for up to 30 input zones or addressable points. (See DN-60242).N-ANN-RLY: Relay Module, which can be mounted inside or outside the cabinet, provides 10 programmable Form-C relays. (See DN-7107).N-ANN-S/PG: Serial/Parallel Printer Gateway module pro-vides a connection for a serial or parallel printer. (See DN-7103).N-ANN-I/O: LED Driver Module provides connections to a user supplied graphic annunciator. (See DN-7105).ANN-SEC: Optional card for a secondary ANN-BUS. See #53944.NBG-12LR: Agent Release Pull Stations designed for use with Notifier Fire Alarm Control Panels with releasing capabili-ties.DP-51050: Dress panel (red) is available as an option. The dress panel restricts access to the system wiring while allow-ing access to the membrane switch panel.TR-CE: Trim-ring (red) is available as an option. The trim-ring allows semi-flushing mounting of the cabinet.BB-26: Battery box, holds up to two 26 Amp Hour batteries and CHG-75.NFS-LBBR: Battery box, houses two 55 Amp Hour batteries, red.SEISKIT-COMMENC: Seismic mounting kit; required for seis-mic-certified installations.BAT Series Batteries: Refer to DN-6933.PRN-6: UL-listed compatible event printer. Dot-matrix, tractor-fed paper, 120 VAC.PRN-7: UL-listed compatible event printer. Dot-matrix, tractor-fed paper, 120 VAC.PRT-PK-CABLE: Programming cable. Used to update the FACP’s flash firmware. (Also requires an RS485 to RS232 converter).System Capacity•Annunciators (8)Electrical Specifications•RP-2002 (FLPS-7 Power Supply): 120 VAC, 60 Hz, 3.66amps•RP-2002E (FLPS-7 Power Supply): 240 VAC, 50/60 Hz,2.085 amps•Wire size: minimum 14 AWG (2.0 mm²) with 600 V insula-tion, supervised, nonpower-limitedCabinet SpecificationsDoor: 19.26" (48.92 cm.) high x 16.82" (42.73 cm.) wide x 0.72" (1.82 cm.) deep. Backbox: 19.00" (48.26 cm.) high x 16.65" (42.29 cm.) wide x 5.25" (13.34 cm.) deep. Trim Ring (TR- CE): 22.00" (55.88 cm.) high x 19.65" (49.91 cm.) wide.Shipping SpecificationsWeight: 24.05 lbs. (10.9 kg)Dimensions:–Height 20.00" (50.80cm)–Width 22.50" (57.15cm)–Depth 8.50" (21.59cm)Temperature and Humidity RangesThis system meets NFPA requirements for operation at 0 –49°C/32 – 120°F and at a relative humidity 93% ± 2% RH (noncondensing) at 32°C ± 2°C (90°F ± 3°F). However, the useful life of the system's standby batteries and the electronic components may be adversely affected by extreme tempera-ture ranges and humidity. Therefore, it is recommended that this system and its peripherals be installed in an environment with a normal room temperature of 15 – 27°C/60 – 80°F.NFPA StandardsThe RP-2002(E) complies with the following NFPA 72 Fire Alarm Systems requirements:–NFPA 12 CO 2 Extinguishing Systems–NFPA 12A Halon 1301 Extinguishing Systems –NFPA 12B Halon 1211 Extinguishing Systems–NFPA 72 National Fire Alarm Code for Local Fire Alarm Systems and Remote Station Fire Alarm Systems (requires an optional Remote Station Output Module)–NFPA 2001 Clean Agent Fire Extinguishing SystemsAgency Listings and ApprovalsThe listings and approvals below apply to the basic RP-2002(E) control panels. In some cases, certain modules may not be listed by certain approval agencies, or listing may be in process. Consult factory for latest listing status. •UL: S635•FM approved•CSFM: 7165-0028:0245•MEA: 333-07-E•Seismic Listing: Reference certificiate of compliance VMA - 45894-01 by the VMC GroupNOTE: For ULC-listed model, see DN-60444.NOTIFIER® and System Sensor® are registered trademarks of Honeywell International Inc.©2017 by Honeywell International Inc. All rights reserved. Unauthorized useof this document is strictly prohibited.This document is not intended to be used for installation purposes. We try to keep our product information up-to-date and accurate. We cannot cover all specific applications or anticipate all requirements.All specifications are subject to change without notice.For more information, contact Notifier. Phone: (203) 484-7161, FAX: (203) 484-7118.SYSTEM SPECIFICATIONS。
Advanced methods for materialscharacterizationMaterials characterization is an essential aspect of material science and engineering that helps in understanding the fundamental properties and behavior of materials. It is a critical component of the research and development process in various industries, including aerospace, energy, and pharmaceuticals.Advanced characterization techniques help researchers to obtain detailed information about a material's structure, properties, and behavior, which can help in improving its performance and functionality. In this article, we will discuss some of the most advanced methods for materials characterization.1. SpectroscopySpectroscopy is a powerful technique for materials characterization, which involves the interaction of materials with electromagnetic radiation. Spectroscopy techniques such as infrared spectroscopy, Raman spectroscopy, and UV-Vis spectroscopy provide valuable information about the electronic and vibrational properties of materials.The analysis of spectroscopic data can reveal information about a material's composition, molecular structure, and chemical bonding, making it an essential tool in materials science. Spectroscopy is widely used in the fields of chemistry, electronic engineering, and materials science.2. X-ray Diffraction (XRD)X-ray diffraction (XRD) is a technique for determining the atomic and molecular structure of a material. XRD analysis involves the scattering of X-rays by atoms in a crystalline material, producing a diffraction pattern that provides information about the material's structure.XRD is widely used in the field of materials science for the analysis of crystalline materials, such as metals, ceramics, and minerals. It is a popular technique for investigating the crystal structure of materials, and it is widely used in the pharmaceutical industry for drug development.3. Scanning Electron Microscopy (SEM)Scanning electron microscopy (SEM) is a powerful technique for the analysis of the surface properties of materials. SEM involves the use of a focused beam of electrons to produce images of a material at high magnification, providing information about its topography, composition, and morphology.SEM is widely used in the fields of materials science, biology, and engineering, and it has numerous applications in industry, including the development of new materials, quality control, and failure analysis.4. Transmission Electron Microscopy (TEM)Transmission electron microscopy (TEM) is a technique for analyzing the internal structure of materials. TEM involves the transmission of a beam of electrons through a thin specimen, producing a high-resolution image of the material's internal structure.TEM is widely used in materials science for the analysis of nanomaterials, semiconductors, and metals. It is a powerful technique for the analysis of the crystal structure, defects, and grain boundaries of materials.5. Atomic Force Microscopy (AFM)Atomic force microscopy (AFM) is a technique for analyzing the surface properties of materials. AFM involves the use of a small probe that is scanned over the surface of a material, producing a three-dimensional image of its surface.AFM is widely used in the fields of materials science, biology, and engineering. It has numerous applications, including the characterization of thin films, the analysis of chemical and physical properties, and the measurement of mechanical properties.ConclusionIn conclusion, the development of advanced characterization techniques has revolutionized the field of materials science, providing researchers with a wide range of tools for the analysis of materials. These techniques have enabled the development of new materials with unique properties and helped in the understanding of complex material behavior. Materials characterization plays a fundamental role in the development of new technologies and the improvement of existing ones, making it a critical aspect of material science and engineering.。
专利名称:Fast convergence method for bit allocationstage of MPEG audio layer 3 encoders发明人:Shahab Layeghi,Fahri Surucu申请号:US09790029申请日:20010220公开号:US06999919B2公开日:20060214专利内容由知识产权出版社提供专利附图:摘要:A method for an improved QSS (bit allocator) algorithm is disclosed. Thedisclosed method is capable of greatly improving determination time; thereby, improving the efficiency of converting a signal from an audio format to an MP3 format. The startingpoint of the QSS determination for a present frame (N) is the QSS of a previous frame (N−1). This starting point provides for improved efficiency for determining actual QSS of frame N as QSS[N−1] will be closer to QSS[N] than an arbitrary starting point. Thus, fewer iterations are required to determine QSS[N] as compared to conventional encoders. The algorithm of the present is more efficient than conventional methods in that it makes use of the fact that audio signal statistics usually do not change abruptly during the period of one audio frame to another.申请人:Shahab Layeghi,Fahri Surucu地址:Redwood City CA US,Fremont CA US国籍:US,US代理机构:Rosenberg, Klein & Lee更多信息请下载全文后查看。
CSCP 399模拟考试题Q:1 The effectiveness of the CRM strategy must be ______ to ensure that thestrategy is having the desired effects of establishing lifetime customers and increasing the organization's profitability?You answered: C) MeasuredThe correct answer was: C) MeasuredExplanation: The CRM strategy must be measured to ensure that the strategy ishaving the desired effects of establishing lifetime customers and increasing theorganization's profitability.Q:1 The obvious way organizations can gauge their success at establishing loyalcustomers is to measure customer ______ ?You answered: A) RetentionThe correct answer was: C) SatisfactionQ:1 _____ customer feedback questionnaires are a good source of data for measuring timely customer satisfaction levels?You answered: B) ExtensiveThe correct answer was: D) TransactionExplanation: Transaction customer feedback questionnaires are a good source of data for measuring timely customer satisfaction levels. Q:1 If a customer indicates dissatisfaction employees are _______________to address the problem or concern immediately?You answered: A) EncouragedThe correct answer was: D) TrainedExplanation: When a customer indicates dissatisfaction employees are trained to address the problem or concern immediately.Q:1 The organizational or team goal must be to give customers what they wantand achieve a ______ percent customer satisfaction rate? You answered: B) 90The correct answer was: A) 100Explanation: Organizations and teams must have the goal of giving customers what they want every time and achieve a 100 percent customer satisfaction rate.Q:1 During a ______ review key customers (B2B) can provide valuable customer satisfaction data by evaluating their account manager's or team's results?You answered: A) PerformanceThe correct answer was: A) PerformanceExplanation: During a performance review key customers (B2B) can providevaluable customer satisfaction data by evaluating their account manager's or team's results?Q:1 The first step toward effective outsourcing is to establish clear performance________________ from the vendor who will provide theservice?You answered: C) ExpectationsThe correct answer was: C) ExpectationsExplanation: Clear performance expectations must be addressed up front the vendor who will provide the services.Q:1 It is important that an organization measure vendor performance at_______________ intervals to ensure customer needs are satisfactory being met?You answered: B) RegularThe correct answer was: B) RegularExplanation: An organization must measure vendor performance at regular intervals and make any necessary adjustments needed to ensure customer needs are satisfactory being met.Q:1 It is essential for organizations working with ______ vendors to coordinate activities and to establish a formal sharing of best practices among the vendors?You answered: B) OutsourcedThe correct answer was: D) MultipleExplanation:Organizations working with multiple vendors need to activities and establish a formal sharing of best practices among all the.Q:1 When an organization’s need for a new outsourced vendorarises,organizations need to be prepared with an exit strategy?You answered: B) AlternativeThe correct answer was: A) ExitExplanation: Spreading out organizational needs among a number of vendors provides an exit strategy should a vendor need to be replaced. Q:1 _____ sourcing is the development and management of supplier relationships to acquire goods and services in a way that aids in achieving the immediate needs of a business?You answered: C) StrategicThe correct answer was: C) StrategicExplanation: Strategic sourcing is the development and management of supplier relationships to acquire goods and services in a way that aids in achieving the immediate needs of a business.Q:1 While traditional purchasing focuses on purchase price; strategic sourcingfocuses on the true cost to the ______?You answered: C) BusinessThe correct answer was: D) CustomerExplanation: With traditional purchasing focuses on purchase price; strategic sourcing focuses on the true cost to the customer.Q:1 Traditional purchasing sees each purchase as a discrete transaction and as a result traditional purchasing is transactional;but strategic sourcing is _________________ ?You answered: C) CollaborativeThe correct answer was: C) CollaborativeExplanation: Traditional purchasing sees each purchase as a discrete transaction and as a result traditional purchasing is transactional; but strategic sourcing is collaborative.Q:1 Strategic sourcing redesigns workflow and information flow to eliminateredundancies and non-value-added work?You answered: C) RedesignsThe correct answer was: C) RedesignsExplanation: Strategic sourcing redesigns workflow and information flow and this allows opportunities for realigned and collaborative business processes, information flows, and workflows.Q:1 The use of the Internet and compatible software systems allows purchasersand suppliers to share information and ______ demand and supply from any point in the network?You answered: B) SynchronizeThe correct answer was: B) SynchronizeExplanation: Compatible software systems allow purchasers and suppliers to share information and synchronize demand and supplyfrom any point in the network at any time.Q:1 Traditional purchasing does not increase the______of the entire supply chain the way strategic sourcing can?You answered: B) VisibilityThe correct answer was: B) VisibilityExplanation: With strategic sourcing enhanced visibility of the supply chain provides many opportunities for improvement.Q:1 Expanded information sharing can lessen the bullwhip effect and provide early problem detection and faster ______?You answered: D) ResponseThe correct answer was: D) ResponseExplanation: Strategic sourcing provides expanded information sharing,lessening of the bullwhip effect and provides for early problem detection and faster response.Q:1 ‘ on the market’ is a traditional approach to purchasing in which organizations buy in response to immediate needs, choosing freely from among all the suppliers that can meet those needs?You answered: A) BuyThe correct answer was: A) BuyExplanation: ‘Buy on the market’ is a traditional approach to purchasing in which organizations buy in response to immediate needs.Q:1 This type of relationship is seen as a long-term arrangement that is ruled more by agreements than by contracts?You answered: C) CollaborationThe correct answer was: C) CollaborationExplanation: Collaboration relationship is seen as a long-term arrangement that is ruled more by agreements than by contracts Q:1 In this type of relationship, business goals are shared and suppliers are folded into the purchasing entity?You answered: D) MergerThe correct answer was: D) MergerExplanation: The Merger sets up a relationship where business goals are shared and suppliers are folded into the purchasing entity.Q:1 The level of ______, communication and shared values will vary,depending on the effectiveness of a business acquisition?You answered: C) TrustThe correct answer was: C) TrustExplanation: Depending on the effectiveness of the merger the level of trust,communication and shared values may vary.Q:1 From a purely reactive stance, companies with certain types of supply situations maybe able to manage ______ better in a strategic alliance?You answered: C) RiskThe correct answer was: C) RiskExplanation: In a strategic alliance companies with certain types of supply situations maybe able to manage risk better.Q:1 _____ refers to the interfaces between the component procured and the final products as well as the complexity of the supply chain itself?You answered: A) ArchitectureThe correct answer was: B) ComplexityExplanation: Complexity refers to the interfaces between the component procured and the final products as well as the complexity of the supply chain.Q:1 Managing ______ through purchasing more than one needs or gambling on quality can be costly strategies?You answered: C) AvailabilityThe correct answer was: B) UncertaintyExplanation: Managing uncertainty through purchasing more than one needs or gambling on quality can be costly strategies.Q:1 _____ alliances may improve time to market, gets product into the hands Of Customers more quickly, or help ensure quality, and increased customer satisfaction?You answered: C) DevelopedThe correct answer was: A) StrategicExplanation: Strategic alliances may improve time to market, gets product into the hands of customers more quickly, or help ensure quality, and increased customer satisfaction.Q:1 Alliances may enable organizations to combine resources to overcome______ to entry and search for and develop new opportunities?You answered: D) ChallengesThe correct answer was: C) BarriersExplanation: Alliances may enable organizations to combine resources to overcome barriers to entry and search for and develop new opportunities.Q:1 Partnerships that lead to better advertising or increased ______ to new market channels can be beneficial?You answered: C) AccessThe correct answer was: C) AccessExplanation: Partnerships that lead to better advertising or increased access to new market channels can be beneficial.Q:1 Building alliances between organizations can help improve operations by lowering system costs and using ______ more effectively? You answered: D) ResourcesThe correct answer was: D) ResourcesExplanation: Building alliances between organizations can helpimprove operations by lowering system costs and using resources more effectively.Q:1 Partnering with an organization that has expertise in a certain area makes it easier to implement new ______?You answered: A) SystemsThe correct answer was: D) TechnologyExplanation: Partnering with an organization that has expertise in a certain area makes it easier to implement new technology.Q:1 Strategic alliances provide an excellent opportunity for within the organization and help them to become more adaptable? You answered: B) ResearchThe correct answer was: A) LearningExplanation: Strategic alliances provide an excellent opportunity for learning within the organization and help them to become more adaptable.Q:1 Alliances can help improve overall financial position by increasing revenue while sharing ________________ costs?You answered: B) InventoryThe correct answer was: A) AdministrativeExplanation: Alliances can help improve overall financial position by increasing revenue while sharing administrative costs.Q:1 The ability to ______, appreciate and deliver customer satisfactiondrives the modern supply chain?You answered: A) ModernizeThe correct answer was: C) PredictExplanation: The ability to predict, appreciate and deliver customersatisfaction drives the modern supply chain.Q:1 Strategic alliances are defined by the, ______ and supply chains in which they occur as well as by their business goals?You answered: A) PartnershipsThe correct answer was: B) MarketsExplanation: Strategic alliances are defined by the markets and supply chains in which they occur as well as by their business goals.Q:1 _____ logistics" refers to the use of a company or organization to perform all or part of the organization's material management and product distribution?You answered: D) Third-partyThe correct answer was: D) Third-partyExplanation: Third-party logistics" refers to the use of a company or organization to perform all or part of the organization's material managementand product distribution.Q:1 _____ logistics may manage global contracts and supervise he work ofvarious 3PLs and offer more than logistical support to their customers?You answered: A) Fourth-partyThe correct answer was: A) Fourth-partyExplanation: Fourth-party logistics may manage global contracts andsupervise the work of various 3PLs and offer more than logistical support totheir customers.Q:1 Sharing information through SRM systems can be used to tie suppliers intothe supply/demand cycle at the distribution and ______ levels?You answered: A) RetailThe correct answer was: A) RetailExplanation: Sharing information through SRM systems can be used to tiesuppliers into the supply/demand cycle at the distribution and retail levels.Q:1 In the _____________ response model, suppliers receive point-of-saledata from retailers and use this information to synchronize their production andinventory activities with actual sales at the retailer? You answered: A) IntegratedThe correct answer was: C) QuickExplanation: The quick response model, allows suppliers to receivepoint-of-sale data from retailers and use this information to synchronize theirQ:1 In the ____________________ replenishment model, suppliersarenotified daily of actual sales or warehouse shipments and commit toreplenishing inventory?You answered: D) ContinuousThe correct answer was: D) ContinuousExplanation: The continuous replenishment model is when suppliers arenotified daily of actual sales or warehouse shipments and commit toreplenishing inventory.Q:1 In the ______________________ model, vendors, through mutualagreement have access to customers’ inventory data for the items they supplyand are responsible for maintaining inventory levels? You answered: C) VMIThe correct answer was: C) VMIExplanation: In the VMI-vendor-managed inventory model, vendors, throughmutual agreement have access to customers’ inventory data for the items theysupply and are responsible for maintaining inventory levels required by thecustomer.Q:1 Distributor ________________ occurs when distributors utilize modern information technology so the expertise and inventory located at onedistributor are available to others?You answered: D) CoordinationThe correct answer was: C) IntegrationExplanation: Distributor integration (DI) occurs when distributorsutilizemodern information technology so the expertise and inventory located at onedistributor are available to others.Q:1 With a CTM the ______ phase defines the front-end agreement tocollaborate and formalizes the period of time and scope of the relationship?You answered: D) InitialThe correct answer was: A) StrategicExplanation: The strategic phase defines the front-end agreement tocollaborate and formalizes the period of time and scope of the relationshipQ:1 The tactical phase defines the process flow, beginning with theproduct/order ______, which is combined with a shipping forecast according topredetermined strategies?You answered: A) RequirementsThe correct answer was: C) ForecastExplanation: The tactical phase defines the process flow, beginning with theproduct/order forecast, which is combined with a shipping forecast accordingto predetermined strategies.Q:1 This phase uses the agreed-upon standards, distribution methods (such asaggregation pooling, and load building), and carrier assignments to translate theorders into shipments?You answered: B) OperationalThe correct answer was: D) StrategicExplanation: This operational phase uses the agreed-upon standards, distribution methods and carrier assignments to translate the orders intoshipmentsQ:1 _____ procurement defines how carriers can anticipate demand rather thanhaving to guess where and when it will surface?You answered: B) CapacityThe correct answer was: B) CapacityExplanation: Capacity procurement defines how carriers can anticipatedemand rather than having to guess where and when it will surface.Q:1 With ______ movements shippers and receivers benefit from a decrease infreight expenses and an increase in the amount of committed usage, andimproved service?You answered: A) CommittedThe correct answer was: C) IntegratedExplanation: Through the use of integrated movements shippers and receiversbenefit from a decrease in freight expenses and an increase in the amount ofcommitted usage, and improved service.Q:1 Despite their benefits, approximately 40 to 50 percent of all alliances failand one of the main reasons alliances fail is that many organizationsdo notunderstand the ___________________ of the alliance?You answered: C) PurposeThe correct answer was: C) PurposeExplanation: One of the main reasons alliances fail is that many organizationsdo not understand the purpose of the alliance.Q:1 Successful alliances are more than the exchange of goods and services;they are true ___________________ managed within the scope ofbusiness objectives?You answered: D) CommitmentsThe correct answer was: C) RelationshipsExplanation: Successful alliances are more than the exchange of goods andservices; they are true relationships managed within the scope of businessobjectives.Q:1 In order to ensure long-term success with supply chain partners, a____________________ process for developing and maintaining a healthyrelationship is necessary?You answered: B) SystematicThe correct answer was: B) SystematicExplanation: Ensuring a long-term success with supply chain partnersrequires a systematic process for developing and maintaining a healthy relationship is necessaryQ:1 Relationship _____________ refers to a supply chain partnerbelievingthat an on going relationship with another is so important as to warrantmaximum efforts at maintaining it?You answered: B) CommitmentThe correct answer was: B) CommitmentExplanation: Relationship commitment refers to a supply chain partner believing that an on going relationship with another is so important as towarrant maximum efforts at maintaining it.Q:1 Open and _______________ communication regarding objectives is vital to a successful supply chain relationship?You answered: D) EffectiveThe correct answer was: A) ContinuousExplanation: Open and continuous communication regarding objectives isvital to a successful supply chain relationship.Q:1 Before entering an alliance it is best to begin by identifying key issues anddecisions as well as involving key ______?You answered: C) EmployeesThe correct answer was: D) StakeholdersExplanation: Before entering an alliance it is best to begin by identifying keyissues and decisions as well as involving key stakeholdersQ:1 When considering potential partners, look beyond strategic and financial fit by evaluating differences in corporate ______, operatingstyle, and business practices?You answered: A) CultureThe correct answer was: A) CultureExplanation: Look beyond strategic and financial fit by evaluatingdifferences in corporate culture, operating style, and business practicesQ:1 During ______ a win/win proposal should be the goal, as this sets the tonefor the future alliance?You answered: C) NegotiationsThe correct answer was: C) NegotiationsExplanation: During negotiations a win/win proposal should be the goal, as this sets the tone for the future alliance.Q:1 The intent of the alliance ______ is to promote relationships between partners, build joint initiatives, bring them to market to generate revenues and acquire customers?You answered: D) ManagerThe correct answer was: D) ManagerExplanation: The alliance manager must be to promote relationships between partners, build joint initiatives, bring them to market to generate revenues and acquire customers.Q:1 To manage the complex interactions companies need the organization-wide ability to identify, discuss, and ______ allrelationships with a given partner and understand their potential interactions?You answered: C) TrackThe correct answer was: C) TrackExplanation: An organization-wide ability to identify, discuss, and track allrelationships with a given partner and understand their potential interactions.Q:1 _____ partner relationships is more than just ensuring that business objectives are met but also includes formally monitoring the health and trust of the working relationship?You answered: C) MaintainingThe correct answer was: D) AuditingExplanation: Auditing partner relationships is more than just ensuring that business objectives are met but also includes formally monitoring the health and trust of the working relationship.Q:1 Partners in an alliance must recognize and allow for incidental and inevitable changes as well as planning for the __________________ changes that need to occur within the alliance?You answered: C) BusinessThe correct answer was: D) PositiveExplanation: Alliance partners must recognize and allow for incidental and inevitable changes as well as planning for the positive changesthat need tooccur within the alliance.Q:1 An organization must know its goals, resources and _______________before it decide which suppliers can play roles in corporate strategies andintegration levels?You answered: A) LimitationsThe correct answer was: A) LimitationsExplanation: An organization must know its goals, resources and limitationsbefore it decide which suppliers can play roles in corporate strategies andintegration levelsQ:1 Once criteria are determined, a _________________ plan is developed that will be used at the operational level to differentiate preferredsuppliers from others?You answered: C) CollaborativeThe correct answer was: A) CategorizationExplanation: Once criteria are determined, a categorization plan is developedthat will be used at the operational level to differentiate preferred suppliersfrom other categories.Q:1 A, ______ alliance is proposed to suppliers who have been designated ascritical to the organization's success?You answered: A) SupplyThe correct answer was: C) StrategicExplanation: A strategic alliance is proposed to suppliers who have beendesignated as critical to the organization's success.Q:1 The lifeblood of the organization revolves around ________________ between customers, employees, contractors, new channels, new customers,suppliers, new markets, and demand chain links?You answered: D) CommunicationThe correct answer was: D) CommunicationExplanation: The lifeblood of the organization revolves aroundcommunication between customers, employees, contractors, new channels, newcustomers, suppliers, new markets, and demand chain links.Q:1 A _______________ program may be established to only involve a portion of the organizations activities or areas of operation?You answered: D) TrialThe correct answer was: A) PilotExplanation: A pilot program may be established to only involve a portion ofthe organizations activities or areas of operationQ:1 The organization should devise a framework of metrics to be used in_________________ as to whether a partner is meeting the company’s desired bottom-line goals and objectives?You answered: D) AuditingThe correct answer was: C) MonitoringExplanation: A framework of metrics can be used in monitoring as to wh ethera partner is meeting the company’s desired bottom-line goals and objectives.Q:1 Communication regarding _______________ issues may initially take place once a month for both parties, either face to face or via Web, video, orteleconferencing?You answered: D) RoutineThe correct answer was: D) RoutineExplanation: Communication regarding routine issues may initially takeplace once a month for both parties, either face to face or via Web, video, or teleconferencing.Q:1 Two components of strategic sourcing that should be integrated are contract deployment and _____________ management?You answered: C) ComplianceThe correct answer was: C) ComplianceExplanation: The two components of strategic sourcing that are critical andshould be integrated are contract deployment and compliance management.Q:1 Throughout the monitoring phase, opportunities for improvement areidentified and projects for specific improvements are developed, tested,and ?You answered: C) EvaluatedThe correct answer was: B) ImplementedExplanation: At periodic times throughout the monitoring phase,opportunities for improvement are identified and projects for specific improvements are developed, tested, and implemented.______ to ensure performance and high availability of web-accessed applications?You answered: B) PlatformsThe correct answer was: C) ServersExplanation: Organizations implementing SRM should be equipped to perform load balancing across multiple servers to ensure performance and highavailability.。
专利名称:METHOD AND DEVICE FOR USE INDETECTING PRESSURE发明人:GUI, Xintao,CHEN, Xiaoxiang,ZHONG, Xiang 申请号:EP16892935.4申请日:20160531公开号:EP3270272B1公开日:20200212专利内容由知识产权出版社提供摘要:A method for detecting a force, including: acquiring a plurality of sample data of a first electronic device, where each of the plurality of sample data of the first electronic device comprises a preset force of the first electronic device and rawdata of the first electronic device, the rawdata of the first electronic device is obtained by detecting a deformation signal which is generated by applying the preset force of the first electronic device on an input medium of the first electronic device; and determining a fitting function according to the plurality of sample data of the first electronic device, where the fitting function denotes a corresponding relationship between a force applied to the input medium of the first electronic device and detected rawdata, and the fitting function is for allowing a second electronic device to determine a force corresponding to rawdata detected when an input medium of the second electronic device is subjected to an acting force. The above method may determine a corresponding relationship between a force and detected rawdata according to multiple sets of sample data of an electronic device.代理机构:Herrero & Asociados, S.L.更多信息请下载全文后查看。
XFEM*DAMAGE STABILIZATIONSpecify viscosity coefficients for the damage model for fiber-reinforced materials, surface-based cohesive behavior or cohesive behavior in enriched elements.*损伤稳定指定纤维增强材料、基于表面的粘结特性或增强单元的粘结特性的损伤模型粘度系数。
This option is used to specify viscosity coefficients used in the viscous regularization scheme for the damage model for fiber-reinforced materials, surface-based traction-separation behavior in contact or cohesive behavior in enriched elements. For fiber-reinforced materials, you can use this option in conjunction with the *DAMAGE INITIATION, CRITERION=HASHIN and *DAMAGE EVOLUTION options; for surface-based traction-separation behavior, you can use this option in conjunction with the *DAMAGE INITIATION, CRITERION=MAXS, MAXE, QUADS, or QUADE and *DAMAGE EVOLUTION options.这个选项是用来指定损伤模型的粘度系数用于粘性正规化,损伤模型包括纤维增强材料,基于表面的粘结特性或增强单元的粘结特性。