Models to Code by Leon Starr Andrew Mangogna & Stephen Mellor
Author:Leon Starr, Andrew Mangogna & Stephen Mellor
Language: eng
Format: epub
Publisher: Apress, Berkeley, CA
Knowing which Continuous Input Points refer to injector pressure and knowing which Point Thresholds we need to apply to satisfy the pressure alerts, we can populate the instances of Range Limitation. Consider a single Injector, IN2, which happens to be a model IHN4 injector. Its related Injector Design specifies the following values: Min delivery pressure ⇒ 19 MPa
Max system pressure ⇒ 35 MPa
Max dissipation pressure ⇒ 32 MPa
This means that there are three corresponding instances of Point Threshold called PT1, PT2, and PT3. We already know from the bridge that updates the Injector.Pressure attribute, IN2 maps to the Continuous Input Point IOP2. Three instances of Range Limitation must be created in SIO to monitor IOP2, one for each Point Threshold that reflects the marked Threshold attributes of the Injector Design. These are identified in SIO as PT1-IOP2, PT2-IOP2, and PT3-IOP2. In total, we have nine instances of Range Limitation for the three Continuous Input Points, and the three distinct Point Thresholds corresponding to each Injector Design.
For each newly acquired point value, each associated instance of Range Limitation compares the value to its corresponding threshold limit. When the threshold is crossed, an In range or Out of range signal is sent to the NOTIFY external entity in SIO. The task is to ensure that this signal triggers the appropriate event or method in Lubrication and directs it to the correct instance of Injector. Because the Lubrication domain expects the alerts to be delivered as either a domain operation or as an event signaled to an Injector instance, we’ll need two bridge tables to accomplish the mapping, as shown in Figure 8-15. One maps to the Injector max pressure domain operation, and the other maps to our alert events.
Figure 8-15.Mapping range limits
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(12579)
Hello! Python by Anthony Briggs(9918)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9797)
The Mikado Method by Ola Ellnestam Daniel Brolund(9780)
Dependency Injection in .NET by Mark Seemann(9341)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8303)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7764)
Grails in Action by Glen Smith Peter Ledbrook(7699)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7558)
Becoming a Dynamics 365 Finance and Supply Chain Solution Architect by Brent Dawson(7104)
Microservices with Go by Alexander Shuiskov(6873)
Practical Design Patterns for Java Developers by Miroslav Wengner(6785)
Test Automation Engineering Handbook by Manikandan Sambamurthy(6731)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6420)
Angular Projects - Third Edition by Aristeidis Bampakos(6143)
The Art of Crafting User Stories by The Art of Crafting User Stories(5666)
NetSuite for Consultants - Second Edition by Peter Ries(5599)
Demystifying Cryptography with OpenSSL 3.0 by Alexei Khlebnikov(5407)
Kotlin in Action by Dmitry Jemerov(5068)
