Academic literature on the topic 'Dagesh 2 (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Dagesh 2 (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Dagesh 2 (Computer file)"

1

Hesselink, Wim H., and Muhammad Ikram Lali. "Formalizing a hierarchical file system." Formal Aspects of Computing 24, no. 1 (December 17, 2010): 27–44. http://dx.doi.org/10.1007/s00165-010-0171-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Narjis Mezaal Shati and Ali Jassim Mohamed Ali. "Hiding Any Data File Format into Wave Cover." journal of the college of basic education 16, no. 69 (October 31, 2019): 1–10. http://dx.doi.org/10.35950/cbej.v16i69.4739.

Full text
Abstract:
In the current study a steganography approach utilized to hide various data file format in wave files cover. Lest significant bit insertion (LSB) used to embedding a regular computer files (such as graphic, execution file (exe), sound, text, hyper text markup language (HTML) …etc) in a wave file with 2-bits hiding rates. The test results achieved good performance to hide any data file in wave file.
APA, Harvard, Vancouver, ISO, and other styles
3

Darwis, Mochammad. "Penambahan Fitur Tampilan LCD dan Micro SD Card Reader pada mesin Laser Engraver and Cutter di Laboratorium Pengemudian Listrik." Jurnal Pengelolaan Laboratorium Pendidikan 2, no. 1 (January 20, 2020): 8–18. http://dx.doi.org/10.14710/jplp.2.1.8-18.

Full text
Abstract:
Laser engraver and cutter machine that have been made in previous research, can only be controlled by a computer. The addition of LCD display and Card Reader will make it work alone without using a computer (offline). Card reader is used to read gcode files from 2-dimensional design that have been made on a computer. LCD display is used to display a menu or a list of existing settings, the percentage of loading data from a gcode file and displays the 2-dimensional design of the gcode file. To move the menu on the LCD display an encoder switch is used. This additional feature was created using a microcontroller STM32F1 type as a core control system which performs serial communication with a laser machine. 32 bit ARM microcontroller is used because a lot of tasks has to perform. It must be able to read data from the SD card, display the image form from the gcode file and send it to the laser machine. Compared 3 types of gcode file of different file sizes and the speed of loading the data. The laser machine can perform its function by using the controls of the additional feature modules that have been made.
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Qingyu, Longsheng Wu, Li Li, Xuhan Ma, and Xu An Wang. "Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart." International Journal of Information Technology and Web Engineering 10, no. 3 (July 2015): 17–32. http://dx.doi.org/10.4018/ijitwe.2015070102.

Full text
Abstract:
Data security in the register file significantly decreases as a result of technology scaling. Based on pipeline restart, the method of improving the data security and reliability in register files is presented in this paper. As the data and its replica simultaneously exist as a redundant copy of each other in half-custom register files, when an uncorrectable error is detected in the data during the access of the register file, its replica will be checked for subsequent processor operation by the restart of pipeline. In addition, the correctable error in data or its replica can also be scrubbed by rollback and restart of pipeline. Finally, the proposed method is evaluated and the results show that the hardware overhead increases by only 2%, whereas the reliability of data in register file increases by more than 2.5 times. This method can significantly improve the data security in the register file without distinct overhead increasing.
APA, Harvard, Vancouver, ISO, and other styles
5

Huizinga, D. M., and K. Heflinger. "DOC-a file system cache to support mobile computers." Distributed Systems Engineering 2, no. 3 (September 1995): 152–60. http://dx.doi.org/10.1088/0967-1846/2/3/003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

NAKANO, SHIN-ICHI, and TAKAO NISHIZEKI. "SCHEDULING FILE TRANSFERS UNDER PORT AND CHANNEL CONSTRAINTS." International Journal of Foundations of Computer Science 04, no. 02 (June 1993): 101–15. http://dx.doi.org/10.1142/s0129054193000079.

Full text
Abstract:
The file transfer scheduling problem was introduced and studied by Coffman, Garey, Johnson and LaPaugh. The problem is to schedule transfers of a large collection of files between various nodes of a network under port constraint so as to minimize the overall finishing time. This paper extends their model to include communication channel constraint in addition to port constraint. We formulate the problem with both port and channel constraints as a new type of edge-coloring of multigraphs, called an fg-edge-coloring, and give an efficient approximation algorithm with absolute worst-case ratio 3/2.
APA, Harvard, Vancouver, ISO, and other styles
7

Carthen, Chase D., Araam Zaremehrjardi, Vinh Le, Carlos Cardillo, Scotty Strachan, Alireza Tavakkoli, Frederick C. Harris Jr., and Sergiu M. Dascalu. "A Novel Spatial Data Pipeline for Orchestrating Apache NiFi/MiNiFi." International Journal of Software Innovation 12, no. 1 (November 1, 2023): 1–14. http://dx.doi.org/10.4018/ijsi.333164.

Full text
Abstract:
In many smart city projects, a common choice to capture spatial information is the inclusion of lidar data, but this decision will often invoke severe growing pains within the existing infrastructure. In this article, the authors introduce a data pipeline that orchestrates Apache NiFi (NiFi), Apache MiNiFi (MiNiFi), and several other tools as an automated solution to relay and archive lidar data captured by deployed edge devices. The lidar sensors utilized within this workflow are Velodyne Ultra Puck sensors that produce 6-7 GB packet capture (PCAP) files per hour. By both compressing the file after capturing it and compressing the file in real-time; it was discovered that GZIP and XZ both saved considerable file size being from 2-5 GB, 5 minutes in transmission time, and considerable CPU time. To evaluate the capabilities of the system design, the features of this data pipeline were compared against existing third-party services, Globus and RSync.
APA, Harvard, Vancouver, ISO, and other styles
8

Yang, Hua, Gang Cui, Hong-Wei Liu, and Xiao-Zong Yang. "Compacting register file via 2-level renaming and bit-partitioning." Microprocessors and Microsystems 31, no. 3 (May 2007): 178–87. http://dx.doi.org/10.1016/j.micpro.2006.08.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, TaeGuen, Yeo Reum Lee, BooJoong Kang, and Eul Gyu Im. "Binary executable file similarity calculation using function matching." Journal of Supercomputing 75, no. 2 (December 9, 2016): 607–22. http://dx.doi.org/10.1007/s11227-016-1941-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alekseev, V. M. "METHOD OF CONSTRUCTING SECURITY MODELS OF COMPUTER SYSTEMS." World of Transport and Transportation 14, no. 6 (December 28, 2016): 14–23. http://dx.doi.org/10.30932/1992-3252-2016-14-6-2.

Full text
Abstract:
[For the English abstract and full text of the article please see the attached PDF-File (English version follows Russian version)].ABSTRACT The article considers issues related to the construction of monitoring systems that provide detection of threats in the information environment. In particular, the recognition method for implementing models of analyzers in the zone of a given space of trusted and possible untrusted information traffic routes. Keywords: information security, isolated software environment, hidden channels, monitoring of subjects.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Dagesh 2 (Computer file)"

1

Tuna, Buket. "A web based IT support tracking system." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2542.

Full text
Abstract:
This project proposes an automated system that allows a registered user to post questions to a web-based database of technical experts. This enables the user to have a quicker response time to their questions. The users questions and answers are posted to the website.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Dagesh 2 (Computer file)"

1

maḥshevim, Kiṿun. דגש 2: Meʻabed ha-tamlilim ha-Yiśreʼeli ha-ṭov ba-ʻolam bi-sevivat Ḥalonot : madrikh la-mishtamesh. Yerushalayim: Kiṿun maḥshevim, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Inc, Logical Operations, ed. WordPerfect 5.0 for OS/2: Level 2 : student manual. Rochester, N.Y. (595 Blossom Rd., Rochester 14610): Logical Operations, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Charles, Calvert. Delphi 2 unleashed. 2nd ed. Indianapolis, IN: Sams Pub., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

McKelvy, Michael. Delphi 2 tutor. Indianapolis, IN: Que, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gold, Rebecca. HyperCard 2 Quickstart. Carmel, IN: Que, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yee, Bernard. MechWarrior 2: Strategies & secrets. San Francisco: Sybex, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Colantonio, Ernest S. Using DOS with OS/2. Lexington, Mass: D.C. Heath, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Anderton, Craig. Sonar 2. Bremen: Wizoo Publishing, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Simpson, Toby. Creatures 2: Official strategies & secrets. San Francisco: Sybex, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Michael, Day. Troubleshooting LAN manager 2. Redwood City, Ca: M & T, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Dagesh 2 (Computer file)"

1

Penfold, David. "File and Directory Structures." In ECDL Module 2: Using the Computer and Managing Files, 72–85. London: Springer London, 2000. http://dx.doi.org/10.1007/978-1-4471-0491-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"File Processing." In Advances in Systems Analysis, Software Engineering, and High Performance Computing, 241–304. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-6687-2.ch011.

Full text
Abstract:
During software deployment, different kinds of file will be used depending on the specific case. The book will show the series of four file types: Text File, Serialize File, XML File, JSon File so that readers have more options in file processing. Why does program have to store data? As computer architecture is mentioned, a program wants to work, every resource must be loaded into memory, namely the RAM (Random Access Memory). The principle of RAM is the clipboard, when the software is turned off the data in the memory will no longer there. Assuming customers are entering 100 products, and the power is suddenly cut, if there is no mechanism to save data from RAM memory to the hard drive, customers will be losing all the data. Kotlin uses JVM libraries to interact with the file, so programmers can invoke these libraries. This chapter provides examples of handling saving and reading files with different cases, which help readers to cover most of the processing cases in practice. At the end of the chapter, there are exercises to improve readers skills with file processing.
APA, Harvard, Vancouver, ISO, and other styles
3

UNDERWOOD, JEAN, JANET SPAVOLD, and GEOFFREY UNDERWOOD. "NOVICE USE OF A RELATIONAL DATABASE: A CASE STUDY OF A LOCAL HISTORY DATA FILE." In Computer Assisted Learning, 227–32. Elsevier, 1990. http://dx.doi.org/10.1016/b978-0-08-040249-9.50036-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Saurabh, Atul, and Swapnil M. Parikh. "Evolution of Distributed File System and Hadoop: A Mathematical Appraisal." In Recent Advances in Mathematical Research and Computer Science Vol. 2, 105–12. Book Publisher International (a part of SCIENCEDOMAIN International), 2021. http://dx.doi.org/10.9734/bpi/ramrcs/v2/5273f.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Desain, Peter, and Henkjan Honing. "Session 2: New Computer Applications in Musicology." In Musicology And Sister Disciplines Past,Present,Future, 655–66. Oxford University PressOxford, 2000. http://dx.doi.org/10.1093/oso/9780198167341.003.0131.

Full text
Abstract:
Abstract Musical performance data often require a lot of pre-processing, matching performances and scores, adding musical structure, filtering, and tabulation before further analyses can be made or performance expression can be manipulated. For the generation of musical stimuli (for example, of manipulated or artificially generated performances), some kind of flexible support is very useful. POCO is a workbench for analysing, modifying, and generating expression in music. It is aimed to be used in a research context. It is based on a consistent and flexible representation of musical objects and musical structure. Tools are made available in a modular form, all based on a shared representation of musical data in textual and MIDI file formats. A lot of attention has been given to the openness, integration, and extendibility of the system. Recent additions include better support for matching performances and scores, manipulation of audio and spectral data, and graphical editors. The system is freely available to researchers.
APA, Harvard, Vancouver, ISO, and other styles
6

Bougoulias, Konstantinos, Ioannis Kouris, Marios Prasinos, Kostas Giokas, and Dimitris Koutsouris. "Ob/Gyn EMR Software." In Healthcare Policy and Reform, 852–62. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-6915-2.ch039.

Full text
Abstract:
In this chapter, the collection and the analysis for the development of an Ob/Gyn EMR software for small Obstetrics and Gynecology organizations is analyzed. The necessary gynecological information was gathered via research concerning the needs of the practice and was organized and categorized according to its importance to the clinicians. The user interface of the developed software provides access to obstetrics, gynecological, surgical, sterilization and PAP test data, along with video and image file storage capabilities. An integrated appointment scheduling module, as well as an expected labor day prediction module, are also part of the application. The developed software is self-contained so that it can be installed on the clinician's computer or accessed within the clinic.
APA, Harvard, Vancouver, ISO, and other styles
7

Al-Bahadili, Hussein, and Haitham Y. Adarbah. "Modeling of TCP Reno with Packet-Loss and Long Delay Cycles." In Simulation in Computer Network Design and Modeling, 257–83. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0191-8.ch012.

Full text
Abstract:
The Transport Control Protocol (TCP) is the dominant transport layer protocol in the Internet Protocol (IP) suite, as it carries a significant amount of the Internet traffic, such as Web browsing, file transfer, e-mail, and remote access. Therefore, huge efforts have been devoted by researchers to develop suitable models that can help with evaluating its performance in various network environments. Some of these models are based on analytical or simulation approaches. This chapter presents a description, derivation, implementation, and comparison of two well-known analytical models, namely, the PFTK and PLLDC models. The first one is a relatively simple model for predicting the performance of the TCP protocol, while the second model is a comprehensive and realistic analytical model. The two models are based on the TCP Reno flavor, as it is one of the most popular implementations on the Internet. These two models were implemented in a user-friendly TCP Performance Evaluation Package (TCP-PEP). The TCP-PEP was used to investigate the effect of packet-loss and long delay cycles on the TCP performance, measured in terms of sending rate, throughput, and utilization factor. The results obtained from the PFTK and PLLDC models were compared with those obtained from equivalent simulations carried-out on the widely used NS-2 network simulator. The PLLDC model provides more accurate results (closer to the NS-2 results) than the PFTK model.
APA, Harvard, Vancouver, ISO, and other styles
8

Pujeri, Uma Ramachandra, Sharmishta Suhas Desai, and Amit Savyanavar. "Encryption Techniques for Modern World." In Theoretical and Applied Mathematics in International Business, 285–319. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-8458-2.ch013.

Full text
Abstract:
Encryption is the process of converting confidential private data into unreadable form and securing information in the file from unauthorized access using various encryption algorithms. We live in the information age where the exchange of private information has become the integral part of our day-to-day activities. Billions of e-mails and business data are sent throughout the world through internet daily. The success of the information age is to keep private secure data from unauthorized access and key to access the private and secure data for authorized users. Encryption in this information age plays a vital role in the protecting the confidential data from unauthorized access. In the last few decades, the computer network has created a revolution in the use of information. Authorized users access their data or send their private data from anywhere in the world; hence, it has become very important to secure the private data not only where it is stored, but also to maintain high level of confidentiality while transmission of this private data from one machine to another.
APA, Harvard, Vancouver, ISO, and other styles
9

Manzo, V. J. "Audio Playback and Pitch Tracking." In Max/MSP/Jitter for Music. Oxford University Press, 2011. http://dx.doi.org/10.1093/oso/9780199777679.003.0018.

Full text
Abstract:
In this chapter, we will look at some of the ways that you can play back and record sound files. As you know, Max lets you design the way you control the variables in your patch. We will apply these design concepts to the ways we control the playback of recorded sound. We will also look at some ways to track the pitch of analog audio and convert it into MIDI numbers. By the end of this chapter, you will have written a program that allows you to play back sound files using a computer keyboard as a control interface as well as a program that tracks the pitch you’re singing from a microphone and automatically harmonizes in real time. We will create a simple patch that plays back some prerecorded files I have prepared. Please locate the8 “.aif ” audio files located in the Chapter 13 Examples folder. 1. Copy these 8 audio files to a new folder somewhere on your computer 2. In Max, create a new patch 3. Click File>Save As and save the patch as playing_sounds.maxpat in the same folder where you put these 8 audio files. There should be 9 files total in the folder (8 audio and 1 Max patch) 4. Close the patch playing_sounds.maxpat 5. Re-open playing_sounds.maxpat (the audio files will now be in the search path of the Max patch) We can play back the prerecorded audio files we just copied using an object called sfplay~. The sfplay~ object takes an argument to specify how many channels of audio you would like the object to handle. For instance, if you are loading a stereo (two channel) file, you can specify the argument 2. Loading a sound file is easy: simply send the sfplay~ object the message open. Playing back the sound is just as easy: send it a 1 or a 0 from a toggle. Let’s build a patch that plays back these files.
APA, Harvard, Vancouver, ISO, and other styles
10

Manzo, V. J. "Control Interfaces." In Max/MSP/Jitter for Music. Oxford University Press, 2011. http://dx.doi.org/10.1093/oso/9780199777679.003.0012.

Full text
Abstract:
In this chapter, we will examine some premade patches demonstrating a few techniques for designing diatonic musical instruments. We will review some of the basic ins and outs of MIDI, learn some ways to program more efficiently, and discuss a number of control options for your patches. As we examine some working patches and encounter many new objects, please read carefully and, in your mind, follow the flow of data from one object to the next as the process is described in the text. Remember that it will be beneficial to look at the Help file for any objects you may have forgotten about or do not fully understand as you encounter them in this chapter. In the last chapter, you installed the EAMIR SDK (Soft ware Development Kit) which, in addition to putting the Modal Object Library into the Max search path, put a bunch of patches I’ve created into the path as well. In fact, if you select Extras from the top menu, you will see an item marked EAMIR among the other extras. 1. Click on Extras>EAMIR from the top menu to view the main menu of the EAMIR SDK 2. In the umenu labeled Examples, click the first item 1.EAMIR _MIDI_Basics.maxpat If you did a manual install of the EAMIR SDK, you will need to locate the EAMIR_SDK folder on your computer and open the file EAMIR.maxpat. A patch will open containing two rectangular boxes. Unlock the patch to see that these two rectangular boxes have inlets and outlets just like the objects we’ve been working with, except that they, in themselves, contain other objects. These two boxes are called bpatchers. A bpatcher is an object that allows an existing Max patch to be loaded into a viewable window; that window is the bpatcher object itself. 3. Open the Inspector for the upper bpatcher Note that the line Patcher File within the Inspector displays the filename of the Max patch currently loaded in the bpatcher: EAMIR_MIDI_in.maxpat. This is just a Max patch that is being displayed in the bpatcher.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Dagesh 2 (Computer file)"

1

Ohzeki, Kazuo, Yuan Yu Wei, Eizaburo Iwata, and Ulrich Speidel. "Basic consideration of MPEG-2 coded file entropy and lossless re-encoding." In 2010 International Multiconference on Computer Science and Information Technology (IMCSIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/imcsit.2010.5679744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hu, Kevin, Yu Sun, and Yujia Zhang. "A Fully Automated Music Equalizer based on Music Genre Detection using Deep Learning and Neural Network." In 13th International Conference on Computer Science, Engineering and Applications (CCSEA 2023). Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130517.

Full text
Abstract:
Recent years have witnessed the dramatic popularity of online music streaming and the use of headphones likeAirPods, which millions of people use daily [1]. Melodic EQ was inspired by these users to create the best audiolistening experience for listeners with various preferences [2]. Melodic EQ is a project that creates customEQs tothe user's custom music tastes and filters the audio to fit their favorite settings. To achieve this goal, the processstarts with a song file taken from an existing file, for example, Spotify downloads or mp3s. This file is then uploadedto the app. The software sorts the song in a genre detecting Algorithm and assigns a genre label to that song. Insidethe app, the user will create or select EQs for that genre and apply it to their music. The interface is easy to use andthe app aims to make everyone's preferences achievable and on the fly. That’s why there are presets for eachcategory for users who are unfamiliar with equalizers, and custom settings for advanced users to create their perfect sound for each genre.
APA, Harvard, Vancouver, ISO, and other styles
3

Shao, Chenyue, and Garret Washburn. "Enhancing File Organization in the Modern Computing Era: An AI-Driven Approach with the File Sorter Application." In 12th International Conference of Security, Privacy and Trust Management. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.141108.

Full text
Abstract:
In the modern computing age, where it seems that almost everyone has a computer, the organization of individuals file structures has become increasingly more and more unorganized [1]. In an effort to solve this problem, the File Sorter application proposed in this paper enables a user to easily sort their files with the help of an AI model designed to sort files accurately and efficiently. The File Sorter application utilizes AI to predict where a file should go given a dataset [2]. To test this application, we employed experiments to design how time efficient the File Sorter was as well as how accurately it sorted files, in which both experiments displayed no inefficiency. The public should use the File Sorter application because it accurately and efficiently sorts files in varying manners, and it is good practice for an individual to maintain a healthy file structure because it enables a productive file structure workflow.
APA, Harvard, Vancouver, ISO, and other styles
4

Fu, Chun Kit, and Yu Sun. "Airbnb Research: An Analysis in Nexus BetweenVisual Description and Product Rating." In 13th International Conference on Computer Science, Engineering and Applications (CCSEA 2023). Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130520.

Full text
Abstract:
Hosts are often desperate to find ways to rent their house, However, most of them do not have possess theknowledge of knowing what type of image cover would grasp the attention of their customer. Gilded by these needs, I have designed an application that uses machine learning to find the relationship between the images andtheirrating [1]. I first used JSON to convert the HTML file resource to a format where we can use in python for webscraping [2]. This paper designs an application tool to find all the object or characters inside images by webscraping and changes it into a model for machine learning [3]. Applied our application to predict the ratingandconducted a qualitative evaluation of the approach. In order to prove our result, I imported an image fromAirbnband found its rating. It turns out that the predicted rating is extremely close to the real rating, Proving The system’susability.
APA, Harvard, Vancouver, ISO, and other styles
5

Yasukawa, K., D. Iguchi, S. Yamaguchi, A. Murakami, T. Nomiyama, K. Takahashi, and K. Ueyanagi. "10ms direct seeking of 90mm magneto-optical disk with flying optical head." In Optical Data Storage. Washington, D.C.: Optica Publishing Group, 1991. http://dx.doi.org/10.1364/ods.1991.tuc3.

Full text
Abstract:
We have developed a flying optical head to attain high speed accessing which is the important issue in applying optical disks for computer file memories1)2). This time, we studied direct seeking technology with the flying optical head and successfully applied the technology for 90mm magneto-optical disks.
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Yirina, and Yu Sun. "An Intelligent and Data-Based Skate Analyzer to Assist in Analyzing Movements of Skate on Ice." In 13th International Conference on Computer Science, Engineering and Applications (CCSEA 2023). Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130516.

Full text
Abstract:
Ever since the start of Figure Skating, there has been an emphasis on skating technique, especially in the step sequences of a skater’s choreography [1]. But Figure Skaters often are not able to detect the motion, edge, or placement of their blade on the ice without watching themselves skate. The solution to this problem would be to have a skate analyzer. A skate analyzer would record the movements of a skate on ice and one would be able to playback the recorded data and view their skate motion precisely [2]. Three main components that my project links together are the QTPY-ESP 32 microcontroller, the sensor that combines the accelerometer, gyroscope, and magnetometer, and the SD card reader. The QTPY-ESP32 is a microcontroller that acts as a main computer controlling the whole board. The QTPY is then connected to a sensor board through an I2c protocol. Then, through an SPI protocol, the QTPY is connected to an SD card reader. After the skater is finished recording, they can insert the SD card in a computer, upload the data into the app, and play it back. There is also a slider on the top of the screen that the skater can slide back and forth to view the skate at specific times in the file. This would be a great technology to use for skaters as they can playback their movements on ice and improve their technique [3].
APA, Harvard, Vancouver, ISO, and other styles
7

Wilson, Christopher G., Robert Dean, George T. Flowers, and John Y. Hung. "A Technique for Embedding SPICE in a Simulink Environment for MEMS Simulations." In ASME 2010 International Mechanical Engineering Congress and Exposition. ASMEDC, 2010. http://dx.doi.org/10.1115/imece2010-38394.

Full text
Abstract:
Computer simulations are powerful tools in the designer’s toolbox, giving an estimate of what the device will actually do once realized. Two such tools, Simulink and SPICE are commonly used to design, simulate, and verify models in the mechanical and electronic domains, respectively. Challenges can arise, however, when attempting to simulate behaviors of hybrid systems that possies both electronic and mechancial subsystems. For example, in microelectromechanical systems (MEMS) designs, variable capacitors are frequent methods for sensing and actuating. While straightforward to model in Simulink, MEMS are not intuitive to model in SPICE, where the control electronics are simulated. On the other hand, SIMULINK is a less mature tool than SPICE for simulating electronic behaviors — SPICE already posseses large libraries of electronic device models. Thus, current MEMS designers lack a straightforward method to simulate and verify variable capacitors in a transient electronic circuit in SPICE, since the entire mechanical system must be converted from Simulink and verified. This paper presents a technique for embedding NGSPICE, an open-source SPICE implementation, inside a Simulink model via a S-function block, enabling a full system model for transient responses to be realized. A Level 2 M-file S-function block implements the calling and parsing of the associated electronic subsystem circuit file. The required modifications for the circuit file to the Simulink model are described. Validation testing using a low-pass filter type circuits with constant and variable capacitance are presented. Some examples are presented and discussed.
APA, Harvard, Vancouver, ISO, and other styles
8

Karinathi, R., V. Jagannathan, V. Montan, J. Petro, M. Sobolewski, R. Raman, G. Trapp, Stephen Deng, G. Almasi, and Xi Li. "Modeling Enterprise Information and Enabling Access Using Information Sharing Server." In ASME 1993 International Computers in Engineering Conference and Exposition. American Society of Mechanical Engineers, 1993. http://dx.doi.org/10.1115/edm1993-0116.

Full text
Abstract:
Abstract The engineering data of a large enterprise is typically distributed over a wide area and archived in a variety of databases and file systems. Access to such information is crucial to a team member, particularly in a concurrent engineering setting. However, this is not easy, because (1) a model of the relevant information is not available, and (2) there is no simple way to access the information without being knowledgeable about various computer data formats, file systems, and networks. However, in a concurrent engineering environment, there is every need to be aware of the perspectives of the other members of the team. We have developed a system called the Information Sharing Server (ISS) to enable access to diverse and distributed information within a corporation. Such data could be stored in different repositories such as databases (relational, object oriented, etc.) and file systems including those that contain multiple media (text, graphics, audio, etc.). The ISS maintains an enterprise model that is visible to the user. The modeling of the enterprise is done in a language called EXPRESS developed by the STEP consortium as an international standard. The ISS also stores mappings from the model to the actual data residing in the repositories. The ISS accepts requests from the user and converts them into requests specific to a repository. The request is then communicated to the repository over the network and the results are fetched back to the user. The ISS is currently integrated with engineering data of two domains: electrical and mechanical. Our paper describes the methodology of the ISS, the details of the implementation and extensions planned for the future. We believe the transparency offered by the ISS will make it a very useful tool for an engineer and make it very convenient to integrate heterogeneous legacy databases.
APA, Harvard, Vancouver, ISO, and other styles
9

Kirk, J. A., D. K. Anand, M. Anjanappa, and W. K. Rickert. "The Use of IGES in Rapid and Automated Design Prototyping." In ASME 1988 Design Technology Conferences. American Society of Mechanical Engineers, 1988. http://dx.doi.org/10.1115/detc1988-0004.

Full text
Abstract:
Abstract The Initial Graphic Exchange Specification (IGES) for design data and the EIA standard M and G Codes for Numerically Controlled machines (N/C) is used to develop an automated interface between existing computer aided design systems and N/C manufacturing systems. The Flexible Manufacturing Protocol, developed at the University of Maryland, outlines such an interface to control automated manufacturing cells used for prototyping quick design changes. This paper demonstrates one application of the protocol, developing an automated IGES to CNC interface to control a 3 axis CNC machining center given the geometric representation of the part in IGES format. Wireframe representations of 2-1/2 dimensional parts, composed of linear elements, are the primary tools used for design representation. The automated production of the sample part, presented in this paper, demonstrates that rapid prototyping is possible using an IGES design data file as input to the protocol.
APA, Harvard, Vancouver, ISO, and other styles
10

Joo, Sung-Hwan. "Assessment of Three Dimensional CAD Models Using CAD Application Programming Interface." In ASME 2018 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/imece2018-87776.

Full text
Abstract:
It has been always a challenge to grade and assess the students’ CAD (Computer-Aided Design) three-dimensional models in the class. The high number of the files and complexity of models make the task time-consuming and tedious many times. For example, even opening and closing each CAD file takes a lot of time. When hundreds of CAD models need to open and verified, it takes more than one hour to finish the task. The work has been done to simplify this task and make it easy using Commercial CAD software’s API (Application Programming Interface), which can be used to automate and customize the CAD software. The API contains hundreds of functions that you can call from Visual Basic for Applications (VBA), VB.NET, Visual C#, Visual C++ 6.0, and Visual C++/CLI. These functions provide direct access to CAD functionality such as opening a file, check the important physical properties of three-dimensional models. Custom API program has been programmed for the task. The custom program executes the internal commends in CAD software and retrieve the data you need from each CAD file automatically. The program opens the multiple CAD files in the folder and check each file’s physical properties and save the information in MS Excel for the review. The program checks the volume (w.r.t the given coordinates) in two standard units (English and S.I. Units), the creator of model (to prevent the plagiarism) and degrees of sketch. In this paper, the following topics will be discussed and presented. 1) The problem with manual grading and assessment, 2) History and background of API functionality in commercial CAD software, 3) Examples of simple source code for API usage, 4) Running example of the API program for the given task, 5) Comparison between manual assessment and automatic assessment using API in terms of spent time. 6) Future improvement with API program. Actual demonstration of the program will be given during the presentation.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography