System Setup Sample Clauses

System Setup. 7.2.1.1 Issues relating to current PA projects, system setup, business flow process, or the configuration or installation of products. Different products have different levels of configuration. Configuration includes the parameters, data and logic that a consultant adds to an installed product to deliver a solution. These issues will be escalated to your Inside Account Manager who will contact you to discuss Consulting Services assistance. Note: Current PA project issues are managed as part of the project engagement.
AutoNDA by SimpleDocs
System Setup. The tasks in system setup include designing and finalizing the technical specification for the system, defining the processes used in the system, and specifying any requirements for operating the system. For example, a blockchain governing body (the Governing Body in the present document) needs to define the process for incorporating a new consensus node operator. Or, the governing body needs to set the security requirements an entity must meet in order to host a consensus node. The creation of the present document can be viewed as a system setup task. Other setup tasks include defining system roles and responsibilities as well as the mechanism for authorization and revocation of such roles and responsibilities.
System Setup. A schematic representation of the different gas/liquid systems are depicted in Fig. 2. In system 1, the solvent is presaturated with the gas in the tube-in-tube coil (Fig. 3) [26]. The solvent flows through the inner Teflon AF-2400 permeable tubing (0.5 m, 0.6 mm i.d.) which is enclosed by the outer fluorinated ethylene-propylene (FEP) tubing (0.5 m, 1.55 mm i.d.). The inner tubing is fitted into the outer tubing by polyether ether ketone (PEEK) tee fittings. The liquid compartment in the tube-in-tube coil has a volume of 150 lL. The gas was led into the outer tubing, thereby passively diffusing through the permeable tubing to presaturate the solvent. CO2 was stored in a pressurized cylinder at 725 psi. The cylinder was regulated with a Linde R 200/1-14 valve which was connected to the tube-in-tube coil with 20 cm of FEP tubing. The presaturated solvent/CO2 mixture (A) was then guided into the tempera- ture-controlled (up to 200 °C) microreactor, consisting entirely of glass and having an internal volume of 92 lL (600 lm × 500 lm × 360 mm width × depth × length). Two mixing units (M) within the microreactor were integrated to enhance mixing. FutureChemistry’s FlowStart Evo [27] was used to pump the solution(s) into the microreactor, in which the solvent/CO2 mixture and the substrate (1, B) were reacted to produce the carboxylate salt (2). The excess of Grignard reagent was quenched and the carboxylate was protonated to give benzoic acid 3 by addition of dilute hydrochloric acid (Q). A back pressure regulator of 60 psi was connected end- of-line to keep the gas dissolved in the solution at elevated pressure and force the gas through the membrane into the solution. The outflow was directly pumped through an in- line FTIR system [28]. Similarly, carboxylation was per- formed by pumping the reagent solution directly through the tube-in-tube coil. With this method, the gas consumed by the substrate is continuously replenished from outside the membrane.
System Setup. × → We assume a trusted server S is responsible for private key generation for users in the system. The server selects two groups G1 and G2 of order q for some large prime q (160-bit long). A bilinear mapping eˆ: G1 G1 G2 maps a pair from G1 to G2. The mapping satisfies the following properties:
System Setup. Given security parameter 1k, the KGCs generates two groups G1, G2, and an admissible bilinear map eˆ : G1 × G1 −→ G2, where G1 denotes a cyclic additive group of prime order q and G2 is a multiplicative group of the same order. The KGCs chooses a generator P of G1 and publishes the system parameters params = q {G1, G2, eˆ, P, H1, H2, H3}, here H1 : {0, 1}∗ → Z∗, H2 : G2 → Z∗, H3 : Z∗ × Z∗ → Z∗ are cryptographic hash own subgroup key. Thus, when a member joins or leaves q functions. q q q the communication group, it joins or leaves only its lo- cal subgroup. As a result, only the local subgroup com- munication key needs to be refreshed and the scalability problem is greatly mitigated. We use a ’group’ of key generation centers (KGCs) to share the overall key gener- ation and distribution workload. In our scheme the task The basic idea of our scheme is the usage of an iden- tity tree, where each node in the tree has an identity. The leaf node’s identity is corresponding to a user’s iden- tity and the interior node’s identity is generated from it’s children’s identity. Figure 4 shows an example of identity tree. A node in the identity tree is also associate with a sv)−1P and the node N 1’s private key P 1 = (Q1 +sω)−1P
System Setup. The system administrator deploys each SNj which stores {IDSNj , Pj, Xxxx} into its memory, where Pj = h(IDSNj , Xxxx), Xxxx is a random number and is known to all the GWNs and maintains it securely.
System Setup. Basically, the system setup phase is similar to that of Boneh and Xxxxxxxx’x work. How- ever, in our system, there are total n different PKGs, which do not share common system parameters. Therefore, each PKG must configure its parameters as follows: – Each PKGi chooses its basic system parameter: ⟨G(i), G(i), e(i)⟩, where G(i) is an additive group of order q(i), G(i) is a multiplicative group of order q(i), and e(i) is admissible bilinear map between G(i) and G(i).
AutoNDA by SimpleDocs
System Setup. KGC chooses a random number In this section, we briefly describe the concepts of s ∈ Z * as the KGC’s private key. Ppub = sP is bilinear pairings and discrete logarithm problem. Then we modify the ID-PKI with new system setup and key extraction algorithms. the KGC’s public key. Then the KGC publishes system parameters < q, G1 , G2 , eˆ, P, Ppub , H1 , H 2 , H 3 >
System Setup. Customer agrees to maintain an adequate staff of persons who are knowledgeable with the systems currently used by Customer to process data. Customer further agrees to cooperate fully with any reasonable requests of Cardinal necessary to complete the deployment and conversion in a timely and efficient manner. Cardinal will provide Customer written network and equipment specifications for proper operation of the Software. Customer is responsible for procuring and installing the appropriate equipment in accordance with Cardinal’s specifications, including cabling and any configuration or telecommunications changes required for communications, to enable Customer’s proper use of the Software as well as remote access to the Software by Cardinal for the remote performance of Maintenance Services.
System Setup. The temporary vehicle tracking devices attached to the SamTrans sub-fleet will be configured to send location updates to the LYT cloud platform. Software will collect and process transit bus location updates in real-time. Once approximately 5 weeks of transit bus location information has been saved, LYT will begin training machine learning models capable of predicting the buses arrive time to the piloted traffic signals. The City of East Palo Alto will provide LYT with traffic signal phase diagrams according to the NEMA standard. EPA and Cal-West IT will work with LYT to implement secure communication between traffic signals, Maestro, and the cloud platform. Figure 6: LYT.speed Network Architecture Diagram System Software, Data Collection, & Monitoring The LYT system includes a web portal for EPA, C/CAG and transit staff to login and view how the transit system is performing at each of the piloted traffic signals. Features include: • Secure login with additional One Time Password (OTP) at each login • View entire city, multiple cities, a particular signal or a particular transit vehicle • Troubleshoot issues in real-time at the intersection level with signal performance metrics • Review charts of daily priority calls and their impact on transit performance Figure 7: LYT’s Live Map Figure 8: LYT’s Signal Performance Records Deliverables and Schedule Summarized in the table below, a number of significant metrics will be collected during the pilot time to evaluate the level of success, including, but not limited to: • Setup and installation time • Traffic light delay • Bus speed • Traffic signal network performance Using this information SSV and LYT will provide to all stakeholders a comprehensive report which will include, but is not limited to, the analysis and documentation of: • The security & reliability of the traffic signal communication network • The before and after effects of traffic light delay on average bus speed • Report will document the project challenges • Recommendations on next steps • Potential to add other project evaluation elements into the report Other project-related data and metrics may be added to the report, based on evolving requests from stakeholders and participants. SSV shall submit a report outline to C/CAG for approval prior to drafting the report. SSV will also submit a draft project report to all the partners for comments. With comments from the stakeholders, SSV will then prepare a final project report for submittal to C/C...
Time is Money Join Law Insider Premium to draft better contracts faster.