Initial Setup Sample Clauses

Initial Setup. Jurisdiction shall furnish the following items in order to use the SUTS System:
AutoNDA by SimpleDocs
Initial Setup. Initial setup consists of:
Initial Setup. Verily will provide County personnel with: (i) the Playbook, (ii) training on the Platform, including the scheduling and booking system required for County personnel to input schedule and test availability at the site, and (iii) a recommendation for requisition and label printing hardware. Each County will be responsible for establishing appropriate IT and internet infrastructure.
Initial Setup. The performance of the system with the initial setup is summarized in Table 1. False calls were the most common type of detection error, with an accumulated frequency of about 0.55% of the total number of activations generated by the radar units. Most of the false calls were created by bicycles and pedestrians, and the remaining errors were due to calls generated when no objects were in the crossing or when the gates were moving. A relatively low number of vehicles were missed by one of the two radar units (0.07%), but there were no cases in which both radar units missed the same vehicle. This finding indicates that the redundancy provided by the two radar units prevented missed vehicles for the system as a whole in the selected datasets. Similarly, no stuck-on calls or dropped calls were found. Recall that the total number of activations from loop and radar detectors may not be the same even if no errors are reported, or when subtracting false calls and adding missed calls to the activations by the radars. As explained in the Methodology section, closely-spaced vehicles and turning movements may cause a single call in one of the systems, but two separate calls in the other without generating any type of error. Therefore, differences in the total number of activations between the two systems are dependent on traffic patterns for the specific days analyzed. Table 1. Analysis of Initial Setup NORMAL WEATHER - Initial Setup (Fall 2012) Date Activations Trains False calls (including bicycles and pedestrians that radars detected, but loops did not) Missed Calls Stuck-on Calls Not detected by subject radar in any lane Not detected by any radar in any lane Wavetronix Loop Bicycles Pedestrians No object Gates Moving TOTAL Oct 9, 2012 (24hrs) 7956 7440 129 6 8 19 8 41 8 0 0 Oct 15, 2012 (24hrs) 7219 6832 121 8 9 6 2 25 3 0 0 TOTAL 40864 38834 625 107 60 38 14 226 27 0 0 0.26% 0.15% 0.09% 0.03% 0.55% 0.07% 0.00% 0.00% * A total of 7 activations due to motorcycles were generated by radar. All cases were small scooter-type motorcycles riding inside the traveled lane not detected by the loops. The total number of motorcycles using the crossing and detected by the two systems is unknown. In addition to the summary by day, results are also presented by radar unit and lane in Table 2. As shown in Table 2, the two radar units generated a similar number of calls caused by bicycles, pedestrian, and motorcycles. However, Radar1–Lane1 was slightly more prone to false calls whe...
Initial Setup. In consideration of the Initial Services described in Section 2 of this Agreement and on Schedule B, to be provided by Enron to NGPL, NGPL will pay to Enron US$ 150,000.00, payable five (5) Business Days after the effective date of this Agreement<, provided that, if such date is not a Business Day, then such payment will be made on the next succeeding Business Day>.
Initial Setup. Enron will set up, on EnronOnline, up to three (3) Product Types, and up to thirty (30) Products, for NGPL, if and as requested by NGPL, the Initial Setup will involve the provision of the following services:
Initial Setup. 2.1.1.1. A technician will assist in setting up BYOD technologies, and is not expected to stay throughout the duration of the class.
AutoNDA by SimpleDocs
Initial Setup. The principal goal of the setup is for each MANET member to build their own individual definition of normal behavior, which will be ultimately used during admission control. MANET members are not clients or servers but rather peers i.e., all members are considered equal and can execute client or server activities simultaneously. As a result, MANET members can have both input and out- put behavior profiles for the same service (port). Throughout, we assume that the behavior profiles are computed from previous interactions of the device or alternatively are provided as built-in profiles from the vendor. We further as- sume that the profiles of the initial MANET members are clean and provide an accurate representation of the typical behavior in the MANET. During setup, all the initial members broadcast their output behavior pro- files to all the other MANET members. Each member proceeds to calculate the distance between its own input behavior profile and the output behavior profiles received from the other devices. Given the distributed nature of the mechanism, MANET members are only required to provide their output behavior profiles. This step prevents any member from crafting attacks based on the knowledge of the input profiles of the others. The distance between a member i and each of the other MANET members j = 1, .., n is given by di,j = d(Pi,in, Pj,out), where Pi,in is the input behavior profile for i and Pj,out is the output behav- ior profile received from node j. Each pair (Pj,out, di,j) computed by member i is then stored as an entry Qi[j] in its local table Qi. The entries are sorted by member i according to their distance values such that the closest profiles to Pi,in are placed at the top of the table. In general, distances can be interpreted as a measure of confidence between a local device and the rest of the MANET members. Specifically, profiles at shorter distances would be trusted more than their more distant counterparts. Armed with its sorted table, each MANET member proceeds to calculate its local threshold τi that will determine acceptance or rejection of new devices during admission control. The threshold τi is defined as the maximum distance between its input profile Pi,in and its top t-1 most similar/trusted profiles. In this context, t corresponds to the value from the (t,n) threshold cryptographic scheme. Thus, τi = Qi[t − 1], where Qi[t − 1] represents the t − 1th entry at the local table of member i. Simultaneously, the members of...
Initial Setup. Using the MK-312BT for the first time is very simple. Just follow these easy steps:
Initial Setup. 5.4.1.1. Personnel. Provide qualified personnel to meet TAR requirements.
Time is Money Join Law Insider Premium to draft better contracts faster.