Co-Simulation Sample Clauses

Co-Simulation. Execution A co-simulation can be performed by the XXX as shown in Figure 16, where transitions to the two states User configuration configured and User simula- tion start-end time configured are triggered by the user through the INTO- CPS Application by calling one of the initialize or simulate com- mands from the protocol described in Appendix A. The state machine Initialize is shown in detail in Figure 17. It shows the phases through which the XXX goes as it initializes for a given simulation. The Simulate state represents the simulation proper, and is shown in detail in Figure 18. Initial user input User configuration configured User simulation start-end time configured user input Initialize Simulate [error] [error] Simulation Completed Initialization Error Simulation Error Figure 16: Top level state machine of the XXX. The Initialization State The state machine starts by reading all model description files embedded in the FMUs and validating their structure using the schema from the FMI standard. In addition to this, it also validates them using the semantic rules obtained from the textual description of the FMI standard (i.e. rules which cannot be enforced by schema-based validation). These include how scalar variables may be configured with their attributes, and how the model structure must be laid out. After the model descriptions are validated, the XXX uses the co-simulation configuration supplied by the user, through the INTO-CPS Application, to configure inputs and outputs of all FMUs, checking that all connections are valid, and caches these in lookup tables for execution. Then the libraries implementing the FMU behaviour are extracted from the FMU zip archives and dynamically loaded, followed by creation of all required FMU instances. The number and name of the instances are obtained from the cached con- nection tables. Finally, the XXX extracts the log categories from the model description of each FMU and returns these, together with a session ID, to the INTO-CPS Application. The Simulation State The simulation state machine shown in Figure 18 can only be entered if the XXX has initialized the current session and if the user has supplied the required start and the optional end time, and the optional set of activated logging categories. It starts by setting the logging categories, if supplied, followed by experiment setup, setting start and op- tionally end times, allowing the FMUs to allocate internal memory for the simulation. Initialization ...
AutoNDA by SimpleDocs

Related to Co-Simulation

  • Simulation An activity that mimics the reality of the clinical environment that is designed to demonstrate procedures, decision-making, and critical thinking through techniques such as role- playing and the use of devices (AANC, 2008). Wellness: Wellness is the optimal state of health of individuals or groups. There are two focal concerns: the realization of the fullest potential of an individual physically, psychologically, socially, spiritually, and economically; and the fulfillment of one’s role expectations in the family, community, place of worship, workplace and other settings (Xxxxx, Xxxx, & Xxxxxxx, 2006). References Accreditation Commission for Education in Nursing (ACEN). (2013). ACEN 2013 standards and criteria baccalaureate. Retrieved from xxxx://xxx.xxxxxxxxxx.xxx/manuals/SC2013_BACCALAUREATE.pdf. American Association of Colleges of Nursing (AACN). (2008). The essentials of baccalaureate education for professional nursing practice. Retrieved from xxxx://xxx.xxxx.xxxx.xxx/education-resources/baccessentials08.pdf. Xxxxxx, X., & Xxxxxx, S. (2012). Xxxxxx & Xxx’x fundamentals of nursing (9th ed.). Upper Saddle River, New Jersey: Person Education, Inc. Xxxxxx, X., & Xxxxx, S. (2014). Contemporary nursing: Issues, trends, and management (6th ed.). St. Louis, Missouri: Elsevier Xxxxx. Commission on Collegiate Nursing Education (CCNE). (2009). Standards for accreditation of baccalaureate and graduate degree nursing programs. Retrieved from xxxx://xxx.xxxx.xxxx.xxx/ccne-accreditation/standards09.pdf. Xxxxxxxxxx, X., Xxxxxxxx, X., Xxxxxxxxxxx, J., Xxxxx, X., Xxxxxxx, X., Xxxxxxxx, P., … (2007). Quality and safety education for nurses. Nursing Outlook, 55(3), 122-131. Institute of Medicine (IOM). (2003). Health professions education: A bridge to quality. Retrieved from xxxx://xxx.xxx.xxx/Reports/2003/health-professions-education-a-bridge- to-quality.aspx Xxxxxxx, X., & Xxxxxx, C. (2012). Leadership roles and management functions in nursing: Theory and application (6th ed.). Hong Kong, China: Wolters Kluwer Health/Lippincott Xxxxxxxx & Xxxxxxx Xxxxx, X. (Ed.). (2009). Xxxxx’x dictionary of medicine, nursing and health professions (8th ed.). St. Louis, Missouri: Xxxxx Elsevier.

  • Firmware The Contractor shall deliver firmware required for production acceptance testing in accordance with CDRL A009 Contractor’s Supplier Configuration Management Plan. The Contractor shall use Government furnished software for testing. Deliverable Data Item (See DD-1423): CDRL A009: “Contractor’s Supplier Configuration Management Plan”

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Construction Sequencing In general, the sequence of the proposed dates of Initial Operation of Interconnection Customers seeking interconnection to the Transmission System will determine the sequence of construction of Network Upgrades.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Compressed Work Week The Company and Union recognize the concept of the compressed work week. It is further understood that the compressed work week conditions will apply only to those departments that are on the compressed work week.

  • Outputs 11. The objectives and outcomes of this Agreement will be achieved by:

  • Provisioning of High Frequency Spectrum and Splitter Space 3.2.1 BellSouth will provide <<customer_name>> with access to the High Frequency Spectrum as follows:

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!