Journal articles on the topic 'Application file'

To see the other types of publications on this topic, follow the link: Application file.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Application file.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Liu, Hui, Hanxing Xue, and Hui Lu. "A Sensitive File Abnormal Access Detection Method Based on Application Classification." Security and Communication Networks 2021 (March 13, 2021): 1–7. http://dx.doi.org/10.1155/2021/6684456.

Full text
Abstract:
As the access control mode of notepad files cannot meet the requirements of risk control for sensitive file hierarchical access, this paper proposes an application classification-based detection method for abnormal access to sensitive files. The application classification and file classification, access control policy mapping, and basic and preset policy detection are designed. Combining the operating system’s identification control of different applications at runtime, we monitor the abnormal access of sensitive files by hierarchical applications. The cross-access experiment of different levels of application to different sensitive files verified the effectiveness and security of hierarchical access control strategy and sensitive file abnormal access detection and reduced the risk of disclosure of sensitive files.
APA, Harvard, Vancouver, ISO, and other styles
2

Patil, Vedika, Sakshi Jain, and Yogita Shah. "Secure Cryptography by Using Hash Application." Journal of Cyber Security in Computer System 1, no. 1 (May 11, 2022): 18–24. http://dx.doi.org/10.46610/jcscs.2022.v01i01.002.

Full text
Abstract:
This project is basically design for ensuring security to all kinds of data format file such as pdf, text, images, audio, videos etc. This is carried out using various keys and hashing algorithm. This project basically helps the end user to protect his/her personal files from the unauthorized user and can also restrict its access to the limited people. This complete process is carried out in two methods that are encryption and decryption. Encryption process required varchar key while encryption the data file which convert the original file in to incomprehensible format. Further in decryption process, again by providing the same key file can be converted in to its original format. This helps the user to protect personal file on a public systems like schools, colleges, cyber cafes, hospitals, banks etc. The cryptography is acquired through various algorithms and keys. We are using a XOR key function and Hash function for encrypting and decrypting the data. In this certain key given by user will be XOR with the actual byte code of file for encryption and vice versa for decryption. This ensures to restrict the personal files on a public system.
APA, Harvard, Vancouver, ISO, and other styles
3

Hidayat, Rahmat, Marza Ihsan Marzuki, Yuliarman Saragih, Ibrahim Ibrahim, Edmund Ucok Armin, Safrian Andromeda, Imam Budi Santoso, and Suroyo Suroyo. "THE COMPARATIVE STUDY ANALYSIS LOGICAL FILES RECOVERY AND LOW LEVEL FILES RECOVERY USING DIGITAL FORENSIC METHODS." TEKNOKOM 5, no. 2 (November 10, 2022): 143–48. http://dx.doi.org/10.31943/teknokom.v5i2.84.

Full text
Abstract:
The development of application and network technology is currently so rapid. This technology is widely used as a solution to overcome data inspection problems in the field of Digital Forensics. The importance of Digital Forensics as evidence, especially on computers and mobile devices, is increasing, along with the rapid use of these mobile devices in daily communication. Data and files on computers and smartphones can be deleted intentionally or unintentionally. To recover the data, it is necessary to have Files Recovery. Furthermore, Logical Files Recovery can be made through password encryption, obtained through hack/attack password applications such as Password or even hacked with the "RecoveryMyFile" application. In addition, a search with a file that has a password description can be done. One of the file recovery applications that can be used is the Agent ransack search application, which is more powerful and convenient than Windows Search, which is more complicated if you need to search faster, indexing needs to be done, and restarts. By using Files Recovery analysis, the development of file or data deletion crimes can be overcome with increasingly rapid and advanced information technology, in this case through applications that can be used for file recovery and to restore deleted files.
APA, Harvard, Vancouver, ISO, and other styles
4

Moon, Yangchan, and Mingyu Lim. "An Enhanced File Transfer Mechanism Using an Additional Blocking Communication Channel and Thread for IoT Environments." Sensors 19, no. 6 (March 13, 2019): 1271. http://dx.doi.org/10.3390/s19061271.

Full text
Abstract:
In this paper, we propose an enhanced file transfer mechanism for a communication framework (CM) for Internet of Things (IoT) applications. Our previous file transfer method uses a basic non-blocking communication channel and thread for the CM (non-blocking method), but this method has a cost of adding additional bytes to each original file block. Therefore, it is not suitable for the transfer of large-sized files. Other existing file transfer methods use a separate channel to transfer large-sized files. However, the creation of a separate channel increases the total transmission delay as the transfer frequency increases. The proposed method uses a dedicated blocking communication channel in a separate thread (blocking method). The blocking method uses a separate channel and thread which are dedicated to transferring file blocks. As it creates the separate channel in advance before the file transfer task, the proposed method does not have an additional channel creation cost at the moment of the file transfer. Through file transfer experiments, the blocking method showed a shorter file transfer time than the non-blocking method, and the transmission delay was increased as the file size grew. By supporting both non-blocking and blocking methods, an application can flexibly select the desirable method according to its requirement. If the application requires the transfer of small-sized files infrequently, it can use the non-blocking method. If the application needs to transfer small-sized or large-sized files frequently, a good alternative is to use the blocking method.
APA, Harvard, Vancouver, ISO, and other styles
5

Aqilah Mohd Nahar, Nur Farah, Nurul Hidayah Ab Rahman, and Kamarudin Malik Mohammad. "E-Raser: File Shredder Application With Content Replacement by Using Random Words Function." JOIV : International Journal on Informatics Visualization 2, no. 4-2 (September 10, 2018): 313. http://dx.doi.org/10.30630/joiv.2.4-2.175.

Full text
Abstract:
Data shredding indicates a process of irreversible file destruction while file shredder is the program designed to render computer-based files unreadable by implementing overwriting method to destroy data in the content of a file. The addressable problem with existence of file recovery tools is it may lead to data leakage, exploitation or dissemination from an unauthorized person. Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. A file shredder application named E-Raser was developed to shred Microsoft Word documents with (.doc) or (.docx) format. The implemented algorithm replaced the original content of the files with uninformative words provided by the application. After rewriting phase is complete, shredding process take place to make the file unrecoverable. Object Oriented Software Development was used as the methodology to develop this application. As a result, E-Raser achieved the objectives to add, remove, rewrite, display and shred files. Also, E-Raser is significantly facilitates users to securely dispose their file, protect the confidentiality and privacy of the file’s content.
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Hoo-Ki, Sung-Hwa Han, and Daesung Lee. "Kernel-Based Container File Access Control Architecture to Protect Important Application Information." Electronics 12, no. 1 (December 23, 2022): 52. http://dx.doi.org/10.3390/electronics12010052.

Full text
Abstract:
Container platforms ease the deployment of applications and respond to failures. The advantages of container platforms have promoted their use in information services. However, the use of container platforms is accompanied by associated security risks. For instance, malware uploaded by users can leak important information, and malicious operators can cause unauthorized modifications to important files to create service errors. These security threats degrade the quality of information services and reduce their reliability. To overcome these issues, important container files should be protected by file-access control functions. However, legacy file-access control techniques, such as umask and SecureOS, do not support container platforms. To address this problem, we propose a novel kernel-based architecture in this study to control access to container files. The proposed container file-access control architecture comprises three components. The functionality and performance of the proposed architecture were assessed by implementing it on a Linux platform. Our analysis confirmed that the proposed architecture adequately controls users’ access to container files and performs on par with legacy file-access control techniques.
APA, Harvard, Vancouver, ISO, and other styles
7

Kolte, Prof Roshan R. "FTS: File Tracking System for Railway Board." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 2278–80. http://dx.doi.org/10.22214/ijraset.2021.39741.

Full text
Abstract:
Abstract: The aim of this paper proposes a project based implementation File Tracking System (FTS) used in private and mostly in government sector. This project is built on Railway System using three tier architecture. This application is used to prevent corruption. There are a large number of departments in the Railway Department where file transfer is done from one department to another. The number of files moving within the specific time duration, file allocated to any employee and whether the file has been forwarded or not. Sometimes if someone has to do corruption then they does not send that file forward, seeing all this problem we have developed File Tracking System (FTS), which track the movements of the file within the organization. This application will keep track the movement of files from one desk to another inside the department.
APA, Harvard, Vancouver, ISO, and other styles
8

Rahim, Robbi, Solly Aryza, Pristisal Wibowo, Adek Khadijatul Z Harahap, Abdul Rahman Suleman, Edi Epron Sihombing, Yuswin Harputra, et al. "Prototype File Transfer Protocol Application for LAN and Wi-Fi Communication." International Journal of Engineering & Technology 7, no. 2.13 (April 15, 2018): 345. http://dx.doi.org/10.14419/ijet.v7i2.13.16917.

Full text
Abstract:
FTP (File Transfer Protocol) is one of the earliest Internet protocols developed. An FTP server can be accessed by using a URI (Universal Resource Identifier), using FTP file exchange between client and server is easier to do because the communication is done directly without going through an intermediary, for communication using FTP need to be designed an application that allows communication between the client and server directly without using the browser, for it is designed an FTP application using programming language in this case is Borland Delphi programming language, the ease of sending files between computers based on IP is a value added from the FTP application that is designed because most existing FTP applications can only send files between the server and the client in the internet network means that online must not be local area network or wide area network.
APA, Harvard, Vancouver, ISO, and other styles
9

Maulana, Moh, Andri Permana Wicaksono, and Atma Deharja. "Pembuatan Aplikasi Peminjaman Berkas Rekam Medik Berbasis Web di RSUP Klaten." J-REMI : Jurnal Rekam Medik dan Informasi Kesehatan 2, no. 1 (December 30, 2020): 149–54. http://dx.doi.org/10.25047/j-remi.v2i1.2153.

Full text
Abstract:
Medical records according to Permenkes No. 269 of 2008 is a file containing notes and documents about patient identity. The problem that often arises in Klaten General Hospital is the length of the file search process due to the absence of applications that control the entry and exit of files, when officers borrow and return only to write in the control book. Supporting all the problems and objectives needed by the data, so the data collection methods used are observation and interviews. Analysis of the data obtained from the interview and observation process is to draw conclusions and identify the most urgent problems. The goal to solve this problem is to make an application that controls the borrowing and return of the RM file so that the officer knows quickly where the file will be sought. The application is made using the waterfall method in the workflow process and uses several programming languages such as PHP, HTML and CSS. The results of the application have been tested by several users using blackbok testing, but still do not know how effective and efficient when the application is tested in actual service.
APA, Harvard, Vancouver, ISO, and other styles
10

Paramita, Cinantya, and Usman Sudibyo. "Kriptografi Audio MP3 Menggunakan RSA dan Transposisi Kolom." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 3 (June 19, 2021): 483–88. http://dx.doi.org/10.29207/resti.v5i3.2996.

Full text
Abstract:
Mp3 is one form of audio file extension that is widely used today. With a variety of uses in a variety of mp3 systems become one of the audio extensions that are commonly found in technology systems of the Internet of Things era. However, with the many uses of the .mp3 file extension, there is a new problem, namely the security of the data itself. From these problems, the author aims to examine the security of the mp3 file by designing cryptographic science-based applications. The cryptographic algorithm used in the application is a combination of the asymmetric RSA 2048 algorithm and symmetric columnic transpositions. RSA 2048 algorithm was chosen because it has a key length in accordance with NIST standards in securing data. By combining the two algorithms, the application system will have the ability to manage mp3 files and encrypt mp3 files with the results of data that cannot be played like mp3 files in general. This application system will be developed by prototype method which is the best method in developing a system with trial and error in algorithm development.
APA, Harvard, Vancouver, ISO, and other styles
11

Tejaswini, K. "Cross-Platform File Explore with NW.JS." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 10, 2021): 500–504. http://dx.doi.org/10.22214/ijraset.2021.34950.

Full text
Abstract:
Our typical desktop file explorer applications are written in high-level programming languages and frameworks. Those apps are depending on the operating system. It can only operate on one operating system at a time. Windows&, for example, has My Computer, Windows 10 has This PC, Ubuntu has Files, and so on. Any web browser will not be able to operate this old file explorer desktop programme. This file explorer is a desktop application written in NW.js that runs on any platform. The application is created using Web-based programming languages. HTML, CSS, and JavaScript are examples of basic and straightforward languages. This programme is OS agnostic. As a result, it may operate on a variety of operating systems, including Windows, Linux, and MacOS. It cuts down on time spent on development and training. The cross-platform desktop programme has basic features such as file opening, copying, and pasting, directory navigation, showing the current directory path, and windowing functions such as maximise, minimise, and dismiss the window.
APA, Harvard, Vancouver, ISO, and other styles
12

Cui, Litao. "A Preliminary Study on the Management Strategy of University Personnel Files based on Artificial Intelligence Technology." Journal of Electronic Research and Application 5, no. 2 (June 18, 2021): 1–4. http://dx.doi.org/10.26689/jera.v5i2.2192.

Full text
Abstract:
In order to improve the management strategy for personnel files in colleges and universities, simplify the complex process of file management, and improve file management security and content preservation of the files. This paper elaborates on the application of Artificial Intelligence (AI) technology in university personnel file management through theoretical analysis based on the understanding of AI technology.
APA, Harvard, Vancouver, ISO, and other styles
13

Muryadi, Muryadi, Achmad Udin Zailani, and Yudi Kurniawan. "RANCANG BANGUN APLIKASI CHATTING BERBASIS WEB PADA PT SKEMANUSA CONSULTAMA TEKNIK." Infotech: Journal of Technology Information 6, no. 2 (November 26, 2020): 91–100. http://dx.doi.org/10.37365/jti.v6i2.94.

Full text
Abstract:
Communication, discussion, and file sharing between divisions in a company is something every employee often does. The problem in this research is that not all users are connected smoothly so that it hinders communication and file transfers and in communication between divisions they have to install various applications on cellphones and PC users. This reduces the duration of time and efficiency in work. To solve this problem, a web-based chat application was designed. Because the development of these applications must use a good and structured design. Web-based chat application was created to solve this problem. This web-based application can be accessed via a web browser without having to install the application on a cellphone or laptop user. Based on the design of a web-based chat application that has been created, it is expected to be a solution for discussing, communicating and sharing files between employees in a company. In addition, it is useful to keep in touch and share files without having to install applications on cellphone or laptop users. The result of this research is that this web-based chat application can be a solution to keep communicating between employees who have difficulty accessing the internet.
APA, Harvard, Vancouver, ISO, and other styles
14

Adelina. "Rancang Bangun Aplikasi Duplicate Docx Scanner Menerapkan Metode SHA-256." Journal of Informatics Management and Information Technology 2, no. 2 (April 30, 2022): 48–53. http://dx.doi.org/10.47065/jimat.v2i2.150.

Full text
Abstract:
Hard drives are one of the core components of a computer in various types and sizes. Large hard disks can become full, even though they don't feel like storing large files. The possibility of saving the same file in the directory is very difficult and will take a long time. The Duplicate Docx Scanner application is able to solve this problem. The Duplicate Docx Scanner application is able to find out the same file is located in a different directory by determining the directory on the hard disk and other storage media. This application can calculate the hash value so that it can find the same file. The Duplicate Docx Scanner application uses the SHA-256 hash method. SHA-256 is used to perform file integrity checks in a variety of situations. This Duplicate Docx Scanner application is designed to use the Microsoft Visual Basic.Net 2008 programming language
APA, Harvard, Vancouver, ISO, and other styles
15

ALEKSEY S., GERASKIN, and UKOLOV RODION V. "RESEARCH ON APPLICATION OF NEURAL NETWORKS FOR RESTORING DAMAGED VIDEO FILES OF AVI AND MP4 FORMATS." CASPIAN JOURNAL: Control and High Technologies 55, no. 3 (2021): 25–32. http://dx.doi.org/10.21672/2074-1707.2021.55.3.025-032.

Full text
Abstract:
In the modern world, video files play a special role. The development of video compression algorithms and the growth of the Internet’s capabilities make it possible to transfer video files. Damage inevitably occurs when transferring video files. Accordingly, the question arises about restoring a damaged file and obtaining information from it. The article discusses the most commonly used video file extensions AVI, MP4. As a result of the study, it was revealed that the most common damage is in the headers, which leads to errors when opening files by players, data is damaged less often. Data corruption leads to the fact that a certain fragment of the video file is either played with errors, distortions, or is skipped. The article discusses the possibility of recovering damaged video file using the removal of undistorted data and proposes an algorithm for analyzing frames using a neural network. As part of the algorithm, a neural network is used to identify damaged frames in video data. The algorithm was implemented as a software product. For the first stage of checking the efficiency of the algorithm, deliberate distortions of one frame were made for each video file under study. As a result of experimental verification of the developed algorithm, it was revealed that it provides high accuracy in detecting distorted frame sequences.
APA, Harvard, Vancouver, ISO, and other styles
16

Yunianta, Arda, Norazah Yusof, Arif Bramantoro, Haviluddin Haviluddin, Mohd Shahizan Othman, and Nataniel Dengen. "Data mapping process to handle semantic data problem on student grading system." International Journal of Advances in Intelligent Informatics 2, no. 3 (December 1, 2016): 157. http://dx.doi.org/10.26555/ijain.v2i3.84.

Full text
Abstract:
Many applications are developed on education domain. Information and data for each application are stored in distributed locations with different data representations on each database. This situation leads to heterogeneity at the level of integration data. Heterogeneity data may cause many problems. One major issue is about the semantic relationships data among applications on education domain, in which the learning data may have the same name but with a different meaning, or learning data that has a different name with same meaning. This paper discusses on semantic data mapping process to handle semantic relationships problem on education domain. There are two main parts in the semantic data mapping process. The first part is the semantic data mapping engine to produce data mapping language with turtle (.ttl) file format as a standard XML file schema, that can be used for Local Java Application using Jena Library and Triple Store. The Turtle file contains detail information about data schema of every application inside the database system. The second part is to provide D2R Server that can be accessed from outside environment using HTTP Protocol. This can be done using SPARQL Clients, Linked Data Clients (RDF Formats) and HTML Browser. To implement the semantic data process, this paper focuses on the student grading system in the learning environment of education domain. By following the proposed semantic data mapping process, the turtle file format is produced as a result of the first part of the process. Finally, this file is used to be combined and integrated with other turtle files in order to map and link with other data representation of other applications.
APA, Harvard, Vancouver, ISO, and other styles
17

Taufik, Ichsan, Undang Syaripudin, Faiz M. Kaffah, Jaka Giri Sobirin, Nanang Ismail, and Teddy Surya Gunawan. "Concealment of Files Blocked by Gmail with EOF-Based Image Steganography." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (November 1, 2018): 716. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp716-721.

Full text
Abstract:
Nowadays, due to security concern, not all the process of sending files via email runs smoothly. There are several types of file extensions that are blocked when sent via email. For examples, there are several file extensions blocked by Gmail. This paper discusses steganographic implementation using End of File (EOF) algorithm to insert special file into image cover file with JPG and PNG format so that files with these extensions can be sent via email. Before a special extension file is inserted into the cover file, a compression process should be conducted first to make the file size smaller. The proposed algorithm is implemented on Visual Basic.Net software. Based on the tests performed, the application can insert Gmail-blocked file system to the image cover file, without changing the physical bit of the image cover file or file system that inserted with 100% success rate. The stego-image file is also successfully sent via email without being blocked.
APA, Harvard, Vancouver, ISO, and other styles
18

Modi, Krishna, and Prashasti Kanikar. "Application based File System (ABFS)." International Journal of Computer Applications 41, no. 1 (March 31, 2012): 26–30. http://dx.doi.org/10.5120/5506-7526.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Janssen, Curtis L., Helgi Adalsteinsson, Scott Cranford, Joseph P. Kenny, Ali Pinar, David A. Evensky, and Jackson Mayo. "A Simulator for Large-Scale Parallel Computer Architectures." International Journal of Distributed Systems and Technologies 1, no. 2 (April 2010): 57–73. http://dx.doi.org/10.4018/jdst.2010040104.

Full text
Abstract:
Efficient design of hardware and software for large-scale parallel execution requires detailed understanding of the interactions between the application, computer, and network. The authors have developed a macro-scale simulator (SST/macro) that permits the coarse-grained study of distributed-memory applications. In the presented work, applications using the Message Passing Interface (MPI) are simulated; however, the simulator is designed to allow inclusion of other programming models. The simulator is driven from either a trace file or a skeleton application. Trace files can be either a standard format (Open Trace Format) or a more detailed custom format (DUMPI). The simulator architecture is modular, allowing it to easily be extended with additional network models, trace file formats, and more detailed processor models. This paper describes the design of the simulator, provides performance results, and presents studies showing how application performance is affected by machine characteristics.
APA, Harvard, Vancouver, ISO, and other styles
20

Gao, Jian. "An Improved IPP Planning Algorithm and the Application." Advanced Materials Research 532-533 (June 2012): 1721–25. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.1721.

Full text
Abstract:
Most of planners can’t avoid state combinatorial explosion which is a main problem to planning failure. To solve it, the paper brings forward the arithmetic of goal decomposition and initial decompositioin to partition the fact file for planner, thereby to reduce number of combinated states. But then, for the planners in being can’t deal with the multiple fact files, to settle which, withal, the paper introduces the arithmetic of multi-fact file management. The application for three arithmetics is on IPP possessing preferable performance. The modified planner is called MF-IPP which is able to handle multiple fact files for avoiding the combinatorial explosion. At last, we compared the performance of the two planners, and the result showed that MF-IPP can avoid the combinatorial explosion well, and the test case covering rate is meseasued by two novel rules.
APA, Harvard, Vancouver, ISO, and other styles
21

Wu, Wei Min, Shao Yong Li, Huan Kun Huang, Wei De Chen, and Qing Su. "Research of Disk Operating Technique in UEFI Shell Environment." Applied Mechanics and Materials 263-266 (December 2012): 1888–91. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1888.

Full text
Abstract:
This paper describes the theory and method of programming under the environment of UEFI Shell and also introduces the UDK2010.UP4 install and configuration. The program run in UEFI Shell can get EFI Boot Services through the EFI_SYSTEM_TABLE parameter, after this it can operate disk files through Simple File System Protocol and EFI File Protocol. The work in this paper mainly introduces some file operations in UEFI Shell, such as file creating, data access on a FAT file system disk through a UEFI Application (UEFI App hereafter).
APA, Harvard, Vancouver, ISO, and other styles
22

Koptyra, Katarzyna, and Marek R. Ogiela. "Imagechain—Application of Blockchain Technology for Images." Sensors 21, no. 1 (December 25, 2020): 82. http://dx.doi.org/10.3390/s21010082.

Full text
Abstract:
Imagechain is a cryptographic structure that chain digital images with hash links. The most important feature, which differentiates it from blockchain, is that the pictures are not stored inside the blocks. Instead, the block and the image are combined together in the embedding process. Therefore, the imagechain is built from standard graphic files that may be used in the same way as any other image, but additionally, each of them contains a data block that links it to a previous element of the chain. The presented solution does not require any additional files except the images themselves. It supports multiple file formats and embedding methods, which makes it portable and user-friendly. At the same time, the scheme provides a high level of security and resistance to forgery. This is achieved by hashing the whole file with embedded data, so the image cannot be altered or removed from the chain without losing integrity. This article describes the basic concept of an imagechain together with building blocks and applications. The two most important issues are embedding methods and block structure.
APA, Harvard, Vancouver, ISO, and other styles
23

Westbrook, J. D., S. H. Hsieh, and P. M. D. Fitzgerald. "CIF Applications. VI. CIFLIB: an application program interface to CIF dictionaries and data files." Journal of Applied Crystallography 30, no. 1 (February 1, 1997): 79–83. http://dx.doi.org/10.1107/s0021889896008643.

Full text
Abstract:
A software library is described that provides simple and convenient access to information in Crystallographic Information File (CIF) dictionaries and data files. This library gives the application programmer a collection of high-level functions that can be used to process and check data stored in the CIF format using the full detail of the CIF dictionary of crystallographic terminology. Two applications are presented that demonstrate the features of the library: a CIF browser and a CIF dictionary-to-HTML converter.
APA, Harvard, Vancouver, ISO, and other styles
24

Krismawan, Andi Danang, and Lekso Budi Handoko. "A Video Quality Testing : Review of Human Visual Aspect." Journal of Applied Intelligent System 6, no. 2 (December 6, 2021): 85–93. http://dx.doi.org/10.33633/jais.v6i2.4613.

Full text
Abstract:
Various types of video player applications have been widely used by the community. The emergence of the latest version and a variety of features make people need to make a choice to use a video player application with a good visual level. The type of video that is often played is a file with an MP4 extension. This file type is not heavy but is usually intended for long file durations such as movies. In this paper, we will use a dataset in the form of a movie file with an MP4 extension. The video player applications used include VLC, Quick time, Potplayer, KMPLayer, Media Player Classic (MPC), DivX Player, ACG Player, Kodi, MediaMonkey. Through various empirical calculations, such as Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Structutral Similarity Index Measurement (SSIM), Threshold F-ratio, Visual Signal to Noise Ratio (VSNR), Visual Quality Metric (VQM), and Multiscale - Structutral Similarity Index Measurement (MS-SSIM) has analyzed the visual capabilities of each video player application. Experimental results prove that the KMPlayer application gets the best visual results compared to other selected applications.
APA, Harvard, Vancouver, ISO, and other styles
25

Sun, C., D. Guo, H. Gao, L. Zou, and H. Wang. "A method of version merging for computer-aided design files based on feature extraction." Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science 225, no. 2 (June 20, 2010): 463–71. http://dx.doi.org/10.1243/09544062jmes2159.

Full text
Abstract:
In order to manage the version files and maintain the latest version of the computer-aided design (CAD) files in asynchronous collaborative systems, one method of version merging for CAD files is proposed to resolve the problem based on feature extraction. First of all, the feature information is extracted based on the feature attribute of CAD files and stored in a XML feature file. Then, analyse the feature file, and the feature difference set is obtained by the given algorithm. Finally, the merging result of the difference set and the master files with application programming interface (API) interface functions is achieved, and then the version merging of CAD files is also realized. The application in Catia validated that the proposed method is feasible and valuable in engineering.
APA, Harvard, Vancouver, ISO, and other styles
26

Brik, Vladimir, Patrick Meade, Gonzalo Merino, Jan Oertlin, David Schultz, and Heath Skarlupka. "IceCube File Catalog." EPJ Web of Conferences 214 (2019): 04055. http://dx.doi.org/10.1051/epjconf/201921404055.

Full text
Abstract:
IceCube is a cubic kilometer neutrino detector located at the south pole. Metadata for files in IceCube have traditionally been handled on an application by application basis, with no user-facing access. There has been no unified view of data files, and users often query the filesystem to locate files. Recently effort has been put into creating a unified view in a central metadata catalog. Going for a simple solution, we created a userfacing REST API backed by a NoSQL database. All major data producers add their metadata to this central catalog. Schema generation is identified as an important aspect of multi-application metadata services.
APA, Harvard, Vancouver, ISO, and other styles
27

Liu, Wen Zhi, Qiu Yan Tao, Qin He, and Li Juan Yu. "Application of Log4j in E-Commerce Services." Applied Mechanics and Materials 635-637 (September 2014): 1517–21. http://dx.doi.org/10.4028/www.scientific.net/amm.635-637.1517.

Full text
Abstract:
It is first extended the log4j and then applied the log file distribution function of log4j in E-Commerce service system in this paper. In this way, it can avoid all log information are centralized interspersed in a single log file, effectively disperse the log information of different concerns, easy to monitor and analyze E-Commerce service system operation status. Key words: Log4j, dynamic log file, extension, e-commerce services
APA, Harvard, Vancouver, ISO, and other styles
28

Robertson, Vishal Snedan, and Krishnakant Vilas Redkar. "Application of RSAA for File Encryption." International Journal of Engineering Research and Applications 07, no. 07 (July 2017): 08–10. http://dx.doi.org/10.9790/9622-0707070810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Jankowski, Michał, and Maria Skublewska-Paszkowska. "Analysis of the use of Java and C# languages for building a mobile application for the Android platform." Journal of Computer Sciences Institute 16 (September 30, 2020): 293–99. http://dx.doi.org/10.35784/jcsi.2059.

Full text
Abstract:
Mobile applications for the Android platform can be implemented using Java or C#. The article presents a comparison of the time performance of these languages when sending various text, image and video files in a mobile application. The tests were carried out using two mobile applications with identical functionalities. Based on the collected data, the server application calculated statistics, such as, for example, the time required to send 1MB of data depending on the file type and size. Based on the results obtained, it was proved that in the case of data transfer via a wireless network, an application written in Java is characterized by greater time efficiency than an analogous application written in C#.
APA, Harvard, Vancouver, ISO, and other styles
30

Rizal, Randi, Ruuhwan Ruuhwan, and Septian Chandra. "Signature File Analysis Using The National Institute Standard Technology Method Base on Digital Forensic Concepts." Jurnal Informatika Universitas Pamulang 5, no. 3 (September 30, 2020): 364. http://dx.doi.org/10.32493/informatika.v5i3.6073.

Full text
Abstract:
The number of crimes committed by utilizing advances in information technology such as information leakage, embezzlement of money in banks, credit card fraud, pornography, terrorism, drug trafficking and many more are definitely related to the name digital data. File signatures or magic numbers are one of the forensic science techniques that assist in processing this digital data. The method used in this research is the National Institute Standards Technology method to analyze the authenticity of digital data and the method of proof to obtain valid evidence during the identification process of data or file content. This research is presented in the form of an analysis of the use of signature files in investigations to determine the type of file in the case of leaking company information xyz, the research stage uses evidence handling procedures in the laboratory. Contributions made after conducting a series of case investigations using signature files have been successfully carried out using the Access Data FTK Imager application version 4.2.0 and WinHex version 18.6. Signature files can be used for case investigations in identifying and verifying file types so that files that have been modified can be restored and can be read by the operating system by checking file types through hexadecimal values in the header file (file prefix) that show the characteristics of each type file so that the file type can be found and the file can be read by the operating system.
APA, Harvard, Vancouver, ISO, and other styles
31

Wei, Chong Yu, Zu Ping Gu, and Shuai Huang. "The Application of an SD Card in Debugging an Embedded System." Advanced Materials Research 468-471 (February 2012): 1622–25. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.1622.

Full text
Abstract:
In this paper, a new method using a Secure Digital Card in debugging an embedded system based on Android and its implementation are introduced. In debugging an embedded system, downloading image files to a RAM on a printed circuit board generally uses a net interface module and a server based on Trivial File Transfer Protocol (TFTP). Here a new method using an SD card is introduced. Compared with downloading by a TFTP server, the method is simple and inexpensive. In the paper, an SD card and its controller are introduced first. Then the designed circuit is presented. Third, two operation modes of the SD card, card identification and data transferring are analyzed in detail. Fourth, the structure of the FAT32 file system and the process for downloading image files into a RAM on board are shown.
APA, Harvard, Vancouver, ISO, and other styles
32

Schandl, Bernhard, and Bernhard Haslhofer. "Files are Siles." International Journal on Semantic Web and Information Systems 6, no. 3 (July 2010): 1–21. http://dx.doi.org/10.4018/jswis.2010070101.

Full text
Abstract:
With the increasing storage capacity of personal computing devices, the problems of information overload and information fragmentation are apparent on users’ desktops. For the Web, semantic technologies solve this problem by adding a machine-interpretable information layer on top of existing resources. It has been shown that the application of these technologies to desktop environments is helpful for end users. However, certain characteristics of the Semantic Web architecture that are commonly accepted in the Web context are not desirable for desktops. To overcome these limitations, the authors propose the sile model, which combines characteristics of the Semantic Web and file systems. This model is a conceptual foundation for the Semantic Desktop and serves as underlying infrastructure on which applications and further services can be built. The authors present one service, a virtual file system based on siles, which allows users to semantically annotate files and directories and keeps full compatibility to traditional hierarchical file systems. The authors also discuss how Semantic Web vocabularies can be applied for meaningful annotation of files and present a prototypical implementation of the model and analyze the performance of typical access operations, both on the file system and metadata level.
APA, Harvard, Vancouver, ISO, and other styles
33

Teska, Kirk. "Patent Watch: Who's on first?" Mechanical Engineering 134, no. 02 (February 1, 2012): 32–33. http://dx.doi.org/10.1115/1.2012-feb-3.

Full text
Abstract:
This article highlights the significance of being first in a patent system. In a first-to-file patent system, the inventor who files the first patent application wins the patent. All countries except the United States, until now, have first-to-file systems. The United States has been a first-to-invent country. That means, if two or more inventors apply to patent a similar idea, the inventor who can establish that he worked out the idea first will win the patent even if another inventor has filed a patent application first. Who was first to invent the idea can be decided by using a quasi-judicial procedure convened at the Patent Office called an “interference.” During an interference, first to invent means looking at both inventors’ invention conception dates and how and when they each reduced their inventions to practice. Lawyers are hired, invention notebooks are reviewed, and after a lot of time and money are spent, a winner is declared by a patent examiner.
APA, Harvard, Vancouver, ISO, and other styles
34

Ning, Zuoting, Lijun Xiao, Wei Liang, Weiqi Shi, and Kuan-Ching Li. "On the Exploitation of Blockchain for Distributed File Storage." Journal of Sensors 2020 (December 12, 2020): 1–11. http://dx.doi.org/10.1155/2020/8861688.

Full text
Abstract:
Distributed file storage aims to support credible access to data on distributed nodes. There are some application scenarios, for example, data centers, peer-to-peer (P2P) storage systems, and storage in wireless networks. Nevertheless, among these applications, data blocks are inevitably replaced and inaccessible when there exists nodes failure. As a result, data integrity and credibility is absent. To overcome such a challenge, blockchain is explored to protect the distributed data. Through analysis and evaluation, we demonstrate that blockchain advocates data integrity and credibility for distributed file storage, as well as the application of blockchain technology for distributed file storage.
APA, Harvard, Vancouver, ISO, and other styles
35

Sravanti, Veera Kota Lakshmi, Ruchitha Bandla, and Ravi Kumar Reddy Juturi. "Filing of DMF in the US, EU, and India, and its comparative review." International Journal of Drug Regulatory Affairs 9, no. 1 (March 16, 2021): 22–32. http://dx.doi.org/10.22270/ijdra.v9i1.453.

Full text
Abstract:
A Drug Master File (DMF) covers all comprehensive, accurate, and precise information about Active Pharmaceutical Ingredient (API) or Finished Product Dosage Form (FP). It is a confidential document that contains complete, factual, and correct information about the active pharmaceutical ingredient and drug product's chemistry, manufacture, stability, purity, impurity profile, packaging, and the cGMP (Current Good Manufacturing Practices) status of any human drug product. When a DMF is filed, it allows a company to safeguard its intellectual property from its partner while complying with regulatory requirements when its process details are disclosed. There is no legalised or regulatory requirement to file a DMF. A DMF comprises of two parts: (a) the Applicant's Part (Open Part), which contains all the information to assess the quality that the license-holder requires and submit a license or amendment application; and (b) the Restricted Part (Closed Part), which contains confidential information about the manufacturing procedure which is only disclosed to the authorities. A DMF can be used by a holder who establishes the file or by one or more parties to support their files or applications. The present study is to brief an overview of DMF filing in different countries, which are the USA, Europe, and India. It also gives information on regulatory requirements of Drug Master Files by Food and Drug Administration (USA), European Medicines Agency (Europe), and Central Drug and Standard Control Organization (India) and their comparison.
APA, Harvard, Vancouver, ISO, and other styles
36

Zhang, Jin Qu. "A Software to Convert ESRI Shapefile to Flash SWF Format and its Extended Application." Key Engineering Materials 480-481 (June 2011): 758–62. http://dx.doi.org/10.4028/www.scientific.net/kem.480-481.758.

Full text
Abstract:
A shapefile to SWF conversion software was mainly introduced. By converting the traditional GIS files such as ESRI Shapefile to the Shock Wave Flash (SWF) file format, the GIS data was highly compressed and suitable for the Internet publication. The generation of SWF files provided a complement for the current WebGIS technology and by using the converted SWF map files, an extended example of flash-based application in multi-level analysis to the socio-economic data was constructed. The example demenstrated its easy configuration and powerful potential ablities. More powerful applications based on SWF will be continued in the future work.
APA, Harvard, Vancouver, ISO, and other styles
37

Laia, Yonata, Naomi Br Hutagalung, Imanuel Purba, and Juli Rostianita Sitopu. "Improving Population Services With Application of Genetic Algorithm." Paradigma - Jurnal Komputer dan Informatika 24, no. 2 (September 2, 2022): 130–34. http://dx.doi.org/10.31294/paradigma.v24i2.1252.

Full text
Abstract:
The computer system has now become one of the tools that can be used by everyone in doing work such as office work, managing family card applications, birth certificates, ID cards at the sub-district office. In this case, the problem that often occurs in the lurah office or sub-district office is the queue that is too long in the service of each community who will take care of submitting their file maker. So with that there needs to be a system that will help every employee who can minimize the performance of the person in charge of managing the file. In this research will use scheduling method with genetic algorithm. The results of the research succeeded in minimizing the waiting time by the community who would submit files at the Pancur Batu sub-district office. The time required for registration is 5 minutes per person.
APA, Harvard, Vancouver, ISO, and other styles
38

Toby, Inimary, Felix Breden, Adam Buntzman, Scott Christley, Brian Corrie, John Fonner, Namita Gupta, et al. "VDJML – tools for capturing the results of inferring immune receptor rearrangements." Journal of Immunology 196, no. 1_Supplement (May 1, 2016): 209.24. http://dx.doi.org/10.4049/jimmunol.196.supp.209.24.

Full text
Abstract:
Abstract Despite the widespread use of immune repertoire profiling, there is currently no standardized format for output files from VDJ analysis. Researchers utilize software such as IgBlast and IMGT/High V-Quest to perform VDJ analysis and infer germline rearrangements. Each of these software tools produces results in a different file format, and can identify the same result using different labels. These differences make it challenging for users to perform additional analysis using the output file from one software to the next. We have addressed this problem by developing a standardized file format for representing results. The purpose of VDJML is to provide a common standardized format for different VDJ analysis applications and to facilitate downstream processing of the results in an application-agnostic manner. The VDJML file format is accompanied by a suite of analysis tools, which are accessible via command line and written in C++ and python. The VDJML suite will allow users to streamline their VDJ analysis and facilitate the sharing of scientific knowledge within the community. The VDJML suite and documentation are available from https://www.vdjserver.org/software. We welcome participation from others in developing the file format standard, as well as code contributions.
APA, Harvard, Vancouver, ISO, and other styles
39

Sitorus, Michael, and Deki Satria. "INSERTING MESSAGE SECRET ON FILE DATA BANK USING STEGANOGRAPHY ENGINEERING WITH EOF (END OF FILE) METHOD." Jurnal Riset Informatika 2, no. 4 (September 2, 2020): 193–200. http://dx.doi.org/10.34288/jri.v2i4.153.

Full text
Abstract:
Exchanging information does not realize that is important information. Circulates often important information insignificant but such as account bank customer information. The threat of security to information such as interruption, interception, modification, and fabrication. Thefts of information data by irresponsible parties. This research aims to secure information data in the form file digital image to be inserted with a secret message on building application for a secret message security system in the Bank with applying steganography using the End Of File (EOF) method. Steganography application capable of inserting secret messages in digital image data files. The results of the research are able to keep the existence of the message hidden. When other people receive image files, they can only see the images with the naked eye. So all messages are invisible and will not be read for hackers or other people before knowing the security side and open of password or reading the secret message.
APA, Harvard, Vancouver, ISO, and other styles
40

Zhang, Zhi Guo, Lei Gong, and Hong Ping Wang. "Application of XML for Telemetry Data Management." Advanced Materials Research 756-759 (September 2013): 3250–53. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.3250.

Full text
Abstract:
At present, the telemetry data is stored and released in the form of binary file or text file, and the user cant find out the data structure from the file itself, this bring difficulties in query and the information sharing. To deal with the problem, a XML-based telemetry data management method was proposed by taking the advantages of extensible makeup language (XML). Large scale of telemetry data can be stored in sections using this method, index efficiency of telemetry data is increased obviously in the operation of practical system. The distribution ability of telemetry data is increased too.
APA, Harvard, Vancouver, ISO, and other styles
41

Han, Sung-Hwa, and Daesung Lee. "Kernel-Based Real-Time File Access Monitoring Structure for Detecting Malware Activity." Electronics 11, no. 12 (June 14, 2022): 1871. http://dx.doi.org/10.3390/electronics11121871.

Full text
Abstract:
Obfuscation and cryptography technologies are applied to malware to make the detection of malware through intrusion prevention systems (IPSs), intrusion detection systems (IDSs), and antiviruses difficult. To address this problem, the security requirements for post-detection and proper response are presented, with emphasis on the real-time file access monitoring function. However, current operating systems provide only file access control techniques, such as SELinux (version 2.6, Red Hat, Raleigh, NC, USA) and AppArmor (version 2.5, Immunix, Portland, OR, USA), to protect system files and do not provide real-time file access monitoring. Thus, the service manager or data owner cannot determine real-time unauthorized modification and leakage of important files by malware. In this paper, a structure to monitor user access to important files in real time is proposed. The proposed structure has five components, with a kernel module interrelated to the application process. With this structural feature, real-time monitoring is possible for all file accesses, and malicious attackers cannot bypass this file access monitoring function. By verifying the positive and negative functions of the proposed structure, it was validated that the structure accurately provides real-time file access monitoring function, the monitoring function resource is sufficiently low, and the file access monitoring performance is high, further confirming the effectiveness of the proposed structure.
APA, Harvard, Vancouver, ISO, and other styles
42

Nguyen The, Cuong, and Dmitry Shashev. "Methods and Algorithms for Detecting Objects in Video Files." MATEC Web of Conferences 155 (2018): 01016. http://dx.doi.org/10.1051/matecconf/201815501016.

Full text
Abstract:
Video files are files that store motion pictures and sounds like in real life. In today's world, the need for automated processing of information in video files is increasing. Automated processing of information has a wide range of application including office/home surveillance cameras, traffic control, sports applications, remote object detection, and others. In particular, detection and tracking of object movement in video file plays an important role. This article describes the methods of detecting objects in video files. Today, this problem in the field of computer vision is being studied worldwide.
APA, Harvard, Vancouver, ISO, and other styles
43

Zivkovic, Slavoljub, Marijana Popovic-Bajic, and Marija Zivkovic. "Reciprocial movements of endodontic files - simpler and more certain therapeutic procedure." Serbian Dental Journal 69, no. 1 (2022): 22–30. http://dx.doi.org/10.2298/sgs2201022z.

Full text
Abstract:
Numerous technological solutions in recent years have significantly improved the cleaning and shaping of canals and made canal instrumentation simpler, more efficient and safer. Significantly faster and less stressful canal instrumentation for the therapist is enabled by the specific design of the file working part and a special thermal modification of NiTi alloy with a change in the movement dynamics of the file in the canal. Research has shown that the problem of cyclic fatigue and torsional stress of the file during canal preparation can be solved by changing usual continuous rotation of the file. Dental technology has introduced the technique of reciprocal movements as an alternative to full file rotation. This change in file rotation direction during instrumentation, based on the technique of balanced forces, significantly reduces contact surface with the canal wall, eliminates the effect of screwing, extends the life of the file and further increases safety of instrumentation of different canal systems. An important advantage of changing the usual dynamics of file movements is that the concept of reciprocal movements is based on the use of only one file, which in addition to shortening treatment time also makes this intervention safer and with significantly lower percentage of defects and fractures of NiTi files. The aim of this paper was to present the concept of canal instrumentation with NiTi files with reciprocal movements as well as development, properties and possibility of application of these files in different clinical situations.
APA, Harvard, Vancouver, ISO, and other styles
44

Bertolazzi, Marco, and Carlo Caini. "Mars to Earth Data Downloading: A Directory Synchronization Approach." Future Internet 11, no. 8 (August 8, 2019): 173. http://dx.doi.org/10.3390/fi11080173.

Full text
Abstract:
This paper aims to present a possible alternative to direct file transfer in “challenged networks”, by using DTNbox, a recent application for peer-to-peer directory synchronization between DTN nodes. This application uses the Bundle Protocol (BP) to tackle long delays and link intermittency typical of challenged networks. The directory synchronization approach proposed in the paper consists of delegating the transmission of bulk data files to DTNbox, instead of modifying source applications to interface with the API of a specific BP implementation, or making use of custom scripts for file transfers. The validity of the proposed approach is investigated in the paper by considering a Mars to Earth interplanetary environment. Experiments are carried out by means of Virtual Machines running ION, the NASA-JPL implementation of DTN protocols. The results show that the directory synchronization approach is a valid alternative to direct transfer in interplanetary scenarios such as that considered in the paper.
APA, Harvard, Vancouver, ISO, and other styles
45

Xiaolun, ZHOU, CHEN Haifeng, HAO Ganggang, LUO Cheng, and ZHU Wei. "Study on 3D-IDS Based Spacecraft Development Mode." MATEC Web of Conferences 288 (2019): 02006. http://dx.doi.org/10.1051/matecconf/201928802006.

Full text
Abstract:
The functions, applications, developments and current application mode of IDS2.x system are generally introduced in this paper. Then the development mode of spacecraft based on IDS2.x system is described. The existing problems especially the information redundancy of mechanical interface and their effects are pointed out. A new solution is proposed by developing 3D-IDS system. The central functions of 3D-IDS system are shown in this study. A new application mode of 3D-IDS system is explored and described by showing how to fill in, countersign and apply with 3D-IDS file. The 2D drawing and sketch are removed from 3D-IDS system to avoid information redundancy of mechanical interface. The consistency between 3D model and the parameters of IDS file can be guaranteed by the interface tool. The efficiency of filling in, countersigning and applying has been improved significantly, which greatly promotes the coordination and total efficiency of spacecraft system design departments and equipment design departments.
APA, Harvard, Vancouver, ISO, and other styles
46

Solanki, Madan, and Prof (Dr ). Vrinda Tokekar. "Design and Implementation of Strong Security Architecture for Amazon Web Service based on Cloud Applications." International Journal of Innovative Technology and Exploring Engineering 11, no. 12 (November 30, 2022): 17–22. http://dx.doi.org/10.35940/ijitee.l9324.11111222.

Full text
Abstract:
Cloud applications are becoming a necessary part of modern life. Security is one of the most important non-functional requirements of every solution. Early days, security and data privacy was just luxury part of software development and it was an optional requirement but nowadays it plays a critical role in daily life. The presented work will be made to observe the need for symmetric security algorithms in Cloud application with Amazon web service. This work observes that the current security level of existing applications recommend improved security solutions to enhance the security level as well performance of proposed architecture. This work recommends Blowfish, RC6 algorithm (symmetric key cryptography) can be used to achieve confidentiality during communication Amazon web service Platform. It also considers the MD5 algorithm to maintain the integrity and modified Kerberos algorithm to achieve authentication. The complete work will propose a security architecture having solution to achieve confidentiality, integrity with strong authentication policy for Cloud application development in Amazon web service. The strong security architecture provide for data and minimum executive time in upload and download file, different key size, file size and chunking size in file. File size divided into chunk 512 bit, 1024 bit, 2048 bit after process in Amazon web service, we are found the optimum time are chunking file size 2048 bits reduce time in encryption and decryption data process and maintain strong security data file in communication including file size 5, 10, 15 and 20 Megabyte.
APA, Harvard, Vancouver, ISO, and other styles
47

Lou, Ran Miao, and Chang Lu. "Development and Application of GPS Navigator in Ship." Advanced Materials Research 268-270 (July 2011): 1275–82. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1275.

Full text
Abstract:
The localization GPS electronic chart apparatus system adopts 32-bit embedded processor as the controller, which greatly enhanced the processing speed,reduced the volume of electronic chart apparatu, improved the stability, greatly reduced the cost.In the design of system control software, adopted non-real-time operating system; file management using FAT16 file system of DOS to manage 16M file storage space, so, we can easily create and delete documents in an embedded electronic chart apparatus.In addition,used non-standard digital vector charts, making the charts data format and processing display project no different,which improved the security.
APA, Harvard, Vancouver, ISO, and other styles
48

Wang, Jing. "The Application of Big Data Information Technology in Archives Management." Learning & Education 10, no. 2 (September 16, 2021): 60. http://dx.doi.org/10.18282/l-e.v10i2.2269.

Full text
Abstract:
The application of big data technology in the unit file management work is the inevitable development trend of the unit management reform in the era of big data, which can simplify the file management procedures, improve the file management efficiency, and thus promote the development and innovation of the unit management mode, which is of great significance to improve the management level of units.
APA, Harvard, Vancouver, ISO, and other styles
49

Xie, Ying Xing. "The Application of Reverse Engineering in the Mould Injection Parts." Applied Mechanics and Materials 364 (August 2013): 19–23. http://dx.doi.org/10.4028/www.scientific.net/amm.364.19.

Full text
Abstract:
A mold injection molding bottle opener is completed on the basis of reverse engineering technology. First, use laser scanning system to scan split injection molded bottle opener, generate data point cloud. Through reducing the point cloud noise, removing noise point, firing, get accurate data point cloud. Finally, get the physical file based on point cloud files using UG NX 4.0 software.
APA, Harvard, Vancouver, ISO, and other styles
50

Mohan, Prakash, and Saravanakumar Chelliah. "An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password." International Journal of Information Security and Privacy 11, no. 2 (April 2017): 1–10. http://dx.doi.org/10.4018/ijisp.2017040101.

Full text
Abstract:
Objective: The main aim is to de-duplicate the redundant files in the cloud and also to improve the security of files in public cloud service by assigning privileges to the documents when it is uploaded by confidential user. Methods: To achieve the objective the authors have used the AES algorithm to encrypt the file stored after de-duplication in the cloud. De-duplication is done based on comparison of contents, file type and size. For an authorized user to access the file from the cloud, generation of OTP using SSL protocol is adopted. Findings: Files uploaded in the cloud are encrypted using traditional encryption algorithms which don't provide high levels of security. Files can be accessed by anyone who is authorized. Privileges are not considered. During de-duplication, only the name and size of the files are considered. Application: Files within the public cloud can't be viewed by everyone who has registered with the cloud. Those who have the respective privileges can only view the file. Proof of Ownership is assured. Since de-duplication is done based on the content redundancy within the cloud storage is avoided. Usage of OTP ensures that the content is viewed by the individuals who have the respective privileges related to the file. These concepts provide additional security to the files stored in the public environment.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography