To see the other types of publications on this topic, follow the link: File Generator.

Journal articles on the topic 'File Generator'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'File Generator.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Vazquez, Federico, and Guy Hanacek. "Automatic system file generator." ACM SIGSOFT Software Engineering Notes 18, no. 1 (January 1993): 65–73. http://dx.doi.org/10.1145/157397.157407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cai, Rui Zhi, and Chong Chen. "Development of Virtual Prototype Template File Generator." Applied Mechanics and Materials 513-517 (February 2014): 1009–12. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1009.

Full text
Abstract:
In view of ADAMS/Car software' problems, for example, difficult to modeling and error-prone, use the template files' source code that has been completed and successfully debugging and base on vb programming language,write a series of ADAMS/Car template file generator program. The program can generate template file that design needs, so it can greatly improve the efficiency of work.
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, I.-Te. "Random Numbers Generated from Audio and Video Sources." Mathematical Problems in Engineering 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/285373.

Full text
Abstract:
Random numbers are very useful in simulation, chaos theory, game theory, information theory, pattern recognition, probability theory, quantum mechanics, statistics, and statistical mechanics. The random numbers are especially helpful in cryptography. In this work, the proposed random number generators come from white noise of audio and video (A/V) sources which are extracted from high-resolution IPCAM, WEBCAM, and MPEG-1 video files. The proposed generator applied on video sources from IPCAM and WEBCAM with microphone would be the true random number generator and the pseudorandom number generator when applied on video sources from MPEG-1 video file. In addition, when applying NIST SP 800-22 Rev.1a 15 statistics tests on the random numbers generated from the proposed generator, around 98% random numbers can pass 15 statistical tests. Furthermore, the audio and video sources can be found easily; hence, the proposed generator is a qualified, convenient, and efficient random number generator.
APA, Harvard, Vancouver, ISO, and other styles
4

Underwood, William. "Grammar-Based Specification and Parsing of Binary File Formats." International Journal of Digital Curation 7, no. 1 (March 9, 2012): 95–106. http://dx.doi.org/10.2218/ijdc.v7i1.217.

Full text
Abstract:
The capability to validate and view or play binary file formats, as well as to convert binary file formats to standard or current file formats, is critically important to the preservation of digital data and records. This paper describes the extension of context-free grammars from strings to binary files. Binary files are arrays of data types, such as long and short integers, floating-point numbers and pointers, as well as characters. The concept of an attribute grammar is extended to these context-free array grammars. This attribute grammar has been used to define a number of chunk-based and directory-based binary file formats. A parser generator has been used with some of these grammars to generate syntax checkers (recognizers) for validating binary file formats. Among the potential benefits of an attribute grammar-based approach to specification and parsing of binary file formats is that attribute grammars not only support format validation, but support generation of error messages during validation of format, validation of semantic constraints, attribute value extraction (characterization), generation of viewers or players for file formats, and conversion to current or standard file formats. The significance of these results is that with these extensions to core computer science concepts, traditional parser/compiler technologies can potentially be used as a part of a general, cost effective curation strategy for binary file formats.
APA, Harvard, Vancouver, ISO, and other styles
5

Ebling, Maria R., and M. Satyanarayanan. "SynRGen: an extensible file reference generator." ACM SIGMETRICS Performance Evaluation Review 22, no. 1 (May 1994): 108–17. http://dx.doi.org/10.1145/183019.183030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Long, Fei, Robert A. Nicholls, Paul Emsley, Saulius Gražulis, Andrius Merkys, Antanas Vaitkus, and Garib N. Murshudov. "AceDRG: a stereochemical description generator for ligands." Acta Crystallographica Section D Structural Biology 73, no. 2 (February 1, 2017): 112–22. http://dx.doi.org/10.1107/s2059798317000067.

Full text
Abstract:
The programAceDRGis designed for the derivation of stereochemical information about small molecules. It uses local chemical and topological environment-based atom typing to derive and organize bond lengths and angles from a small-molecule database: the Crystallography Open Database (COD). Information about the hybridization states of atoms, whether they belong to small rings (up to seven-membered rings), ring aromaticity and nearest-neighbour information is encoded in the atom types. All atoms from the COD have been classified according to the generated atom types. All bonds and angles have also been classified according to the atom types and, in a certain sense, bond types. Derived data are tabulated in a machine-readable form that is freely available fromCCP4.AceDRGcan also generate stereochemical information, provided that the basic bonding pattern of a ligand is known. The basic bonding pattern is perceived from one of the computational chemistry file formats, including SMILES, mmCIF, SDF MOL and SYBYL MOL2 files. Using the bonding chemistry, atom types, and bond and angle tables generated from the COD,AceDRGderives the `ideal' bond lengths, angles, plane groups, aromatic rings and chirality information, and writes them to an mmCIF file that can be used by the refinement programREFMAC5 and the model-building programCoot. Other refinement and model-building programs such asPHENIXandBUSTERcan also use these files.AceDRGalso generates one or more coordinate sets corresponding to the most favourable conformation(s) of a given ligand.AceDRGemploysRDKitfor chemistry perception and for initial conformation generation, as well as for the interpretation of SMILES strings, SDF MOL and SYBYL MOL2 files.
APA, Harvard, Vancouver, ISO, and other styles
7

Cooper, E. "Design of a disk-file reference-velocity generator." IEEE Transactions on Magnetics 21, no. 5 (September 1985): 2097–103. http://dx.doi.org/10.1109/tmag.1985.1064043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Page, G. J. "Rapid, parallel CFD grid generation using octrees." Aeronautical Journal 117, no. 1188 (February 2013): 133–46. http://dx.doi.org/10.1017/s0001924000007910.

Full text
Abstract:
Abstract As Large Eddy Simulation is increasingly applied to flows containing complex geometry, grid generation becomes difficult and time consuming when using software originally developed for RANS flow solvers. The traditional ‘pipeline’ approach of grid generation → solve → visualise entails the time consuming transfer of large files and conversion of file formats. This work demonstrates a grid generation methodology developed specifically to be integrated with parallel LES. The current approach is to use a Cartesian grid with adaptive refinement based upon geometry intersection, surface detail and surface curvature. The grid is defined by an octree data structure with the geometry defined by triangular facets using the STL file format. The result is a set of ‘cubical’ subdomains, each with identical numbers of cells and uniform distributions within the cube. Some subdomains will be entirely fluid and can be solved using straightforward CFD techniques, whilst some cubes will be cut by the surfaces. Individual cells are then tagged as ‘solid’, ‘fluid’ or ‘cut’ with the solver expected to use an immersed boundary approach to model the surface. A key feature is the design of the algorithm to be parallelisable on both shared and distributed memory systems. The distributed memory parallel dynamically partitions the grid as it is being generated, so that the partitioning is suitable for a subsequent flow solver. Grid generation testing has been carried out on a variety of input CAD files ranging up to 350,000 facets. A landing gear case shows how the grid generator correctly finds the fluid inside of the tire and other cavities within the hub. In scalar mode, a grid with 4,916 cubes and 468 million cells is generated in less than 100 seconds, whilst in parallel on 32 processor cores this can be achieved in 4·6 seconds.
APA, Harvard, Vancouver, ISO, and other styles
9

McMillan, Matthew Leslie, Marten Jurg, Martin Leary, and Milan Brandt. "Programmatic generation of computationally efficient lattice structures for additive manufacture." Rapid Prototyping Journal 23, no. 3 (April 18, 2017): 486–94. http://dx.doi.org/10.1108/rpj-01-2016-0014.

Full text
Abstract:
Purpose Additive manufacturing (AM) enables the fabrication of complex geometries beyond the capability of traditional manufacturing methods. Complex lattice structures have enabled engineering innovation; however, the use of traditional computer-aided design (CAD) methods for the generation of lattice structures is inefficient, time-consuming and can present challenges to process integration. In an effort to improve the implementation of lattice structures into engineering applications, this paper aims to develop a programmatic lattice generator (PLG). Design/methodology/approach The PLG method is computationally efficient; has direct control over the quality of the stereolithographic (STL) file produced; enables the generation of more complex lattice than traditional methods; is fully programmatic, allowing batch generation and interfacing with process integration and design optimization tools; capable of generating a lattice STL file from a generic input file of node and connectivity data; and can export a beam model for numerical analysis. Findings This method has been successfully implemented in the generation of uniform, radial and space filling lattices. Case studies were developed which showed a reduction in processing time greater than 60 per cent for a 3,375 cell lattice over traditional CAD software. Originality/value The PLG method is a novel design for additive manufacture (DFAM) tool with unique advantages, including full control over the number of facets that represent a lattice strut, allowing optimization of STL data to minimize file size, while maintaining suitable resolution for the implemented AM process; programmatic DFAM capability that overcomes the learning curve of traditional CAD when producing complex lattice structures, therefore is independent of designer proficiency and compatible with process integration; and the capability to output both STL files and associated data for numerical analysis, a unique DFAM capability not previously reported.
APA, Harvard, Vancouver, ISO, and other styles
10

Keller, Lukas, and Michael Huth. "Pattern generation for direct-write three-dimensional nanoscale structures via focused electron beam induced deposition." Beilstein Journal of Nanotechnology 9 (September 27, 2018): 2581–98. http://dx.doi.org/10.3762/bjnano.9.240.

Full text
Abstract:
Fabrication of three-dimensional (3D) nanoarchitectures by focused electron beam induced deposition (FEBID) has matured to a level that highly complex and functional deposits are becoming available for nanomagnetics and plasmonics. However, the generation of suitable pattern files that control the electron beam’s movement, and thereby reliably map the desired target 3D structure from a purely geometrical description to a shape-conforming 3D deposit, is nontrivial. To address this issue we developed several writing strategies and associated algorithms implemented in C++. Our pattern file generator handles different proximity effects and corrects for height-dependent precursor coverage. Several examples of successful 3D nanoarchitectures using different precursors are presented that validate the effectiveness of the implementation.
APA, Harvard, Vancouver, ISO, and other styles
11

Wu, Mao Liang, and Lin Jun Hua. "Algorithm of the Scanning Path Based on SLC Files in Rapid Prototyping." Applied Mechanics and Materials 29-32 (August 2010): 1022–26. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.1022.

Full text
Abstract:
The paper analyzes the structure of SLC file format which is used in rapid prototyping technology, and studies the algorithm of the scanning path through improving the line-filling algorithm. The scanning path is carried out with VC++ software and the wind power generator blade and car logo are dissected to validate the algorithm. At last, the paper analyzes the influences of the slice thickness and hatch gap on the paths, and compares the file sizes and the scanning path length under different file formats and scanning parameters.
APA, Harvard, Vancouver, ISO, and other styles
12

Yong Moon and Deog-Kyoon Jeong. "A 32×32-b adiabatic register file with supply clock generator." IEEE Journal of Solid-State Circuits 33, no. 5 (May 1998): 696–701. http://dx.doi.org/10.1109/4.668983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Zhang, Chun Yang, Peng Wang, and Zong Xiao Yang. "Software System Development of the Outer Rotor Permanent Magnet Generator Experimental Platform." Advanced Materials Research 953-954 (June 2014): 448–52. http://dx.doi.org/10.4028/www.scientific.net/amr.953-954.448.

Full text
Abstract:
In order to show the performance of the outer rotor permanent magnet generator timely and accurately under different input parameters, we coupled two software of outer rotor permanent magnet generator experimental platform based on LabVIEW (Laboratory Virtual Instrumentation Engineering Workbench)-Virtual torque and Three-phase electric parameter tester. Firstly, we picked up the DLL (Dynamic Link Library) of virtual torque and generated an excel file through VB (Visual Basic), through LabVIEW we picked up the excel form to acquire the system input parameters (torque and speed); Secondly, we collected the real-time parameters (voltage and current) of three-phase power meter by means of the LabVIEW serial communication; Lastly, we could see the efficiency of the outer rotor permanent magnet generator on the LabVIEW front panel. The experiment show that we can couple the input and output parameters of the system based on LabVIEW, and we can see the efficiency of the outer rotor permanent magnet generator under each fixed input parameters. This experiment avoid the tedious work that people deal with data, optimize the software system of outer rotor permanent magnet generator experimental platform, and provide the technical support for optimal design of permanent magnet generator.
APA, Harvard, Vancouver, ISO, and other styles
14

Liu, Ri Liang, Cheng Rui Zhang, A. Nassehi, and S. T. Newman. "A STEP-NC Programming System for Prismatic Parts." Materials Science Forum 532-533 (December 2006): 1108–11. http://dx.doi.org/10.4028/www.scientific.net/msf.532-533.1108.

Full text
Abstract:
To comply with STEP-NC (ISO 14649), a new paradigm for NC programming, many computer systems involved in NC manufacture are required to reshape in both functionality and structure. This paper reports a feature-based NC programming system for prismatic parts to be machined using STEP-NC machine tools. The proposed system consists of three functional modules, i.e. a feature-based modeler, a process planner and a part program generator. The modeler provides a graphical environment for the part model, which is created by adding manufacturing features on a 2.5 D sweep primitive shape. The process planner determines which operations are to be performed for the features, generates workingsteps and then produces a reasonable workplan. Finally both the geometrical and the process information are passed to the part program generator to form a complete ISO 14649-compliant file. The proposed system is demonstrated through the generation of the STEP-NC part program for an example part, and major issues such as the feature-operation mapping and the workingstep sequencing etc are also addressed in this paper.
APA, Harvard, Vancouver, ISO, and other styles
15

Honfi, Dávid, and Zoltán Micskei. "Supporting Unit Test Generation via Automated Isolation." Periodica Polytechnica Electrical Engineering and Computer Science 61, no. 2 (February 10, 2017): 116. http://dx.doi.org/10.3311/ppee.9768.

Full text
Abstract:
Testing is a significantly time-consuming, yet commonly employed activity to improve the quality of software. Thus, techniques like dynamic symbolic execution were proposed for generating tests only from source code. However, current approaches usually could not create thorough tests for software units with dependencies (e.g. calls to file system or external services). In this paper, we present a novel approach that synthesizes an isolation sandbox, which interacts with the test generator to increase the covered behaviour in the unit under test. The approach automatically transforms the code of the unit under test, and lets the test generator choose values for parameters in the calls to dependencies. The paper presents a prototype implementation that collaborates with the IntelliTest test generator. The automated isolation is evaluated on source code from open-source projects. The results show that the approach can significantly increase the code coverage achieved by the generated tests.
APA, Harvard, Vancouver, ISO, and other styles
16

Zivkovic, Srdjan. "NX CAM post processing errors: Machine data file generator vs. post builder." FME Transaction 44, no. 2 (2016): 159–64. http://dx.doi.org/10.5937/fmet1602159z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Lee, Sehoon, Myungseo Park, and Jongsung Kim. "Magniber v2 Ransomware Decryption: Exploiting the Vulnerability of a Self-Developed Pseudo Random Number Generator." Electronics 10, no. 1 (December 24, 2020): 16. http://dx.doi.org/10.3390/electronics10010016.

Full text
Abstract:
With the rapid increase in computer storage capabilities, user data has become increasingly important. Although user data can be maintained by various protection techniques, its safety has been threatened by the advent of ransomware, defined as malware that encrypts user data, such as documents, photographs and videos, and demands money to victims in exchange for data recovery. Ransomware-infected files can be recovered only by obtaining the encryption key used to encrypt the files. However, the encryption key is derived using a Pseudo Random Number Generator (PRNG) and is recoverable only by the attacker. For this reason, the encryption keys of malware are known to be difficult to obtain. In this paper, we analyzed Magniber v2, which has exerted a large impact in the Asian region. We revealed the operation process of Magniber v2 including PRNG and file encryption algorithms. In our analysis, we found a vulnerability in the PRNG of Magniber v2 developed by the attacker. We exploited this vulnerability to successfully recover the encryption keys, which was by verified the result in padding verification and statistical randomness tests. To our knowledge, we report the first recovery result of Magniber v2-infected files.
APA, Harvard, Vancouver, ISO, and other styles
18

Apdilah, Dicky, and Heru Swanda. "Penerapan Kriptografi RSA Dalam Mengamankan File Teks Berbasis PHP." JURNAL TEKNOLOGI INFORMASI 2, no. 1 (December 7, 2018): 45. http://dx.doi.org/10.36294/jurti.v2i1.407.

Full text
Abstract:
Abstract - Along with the development of communication technology human needs in the use of technology are increasing, especially in data storage. One way to improve security for data is by using cryptographic methods. RSA Algorithm (Rivest Shamir Adleman) is one method in the branch of cryptography, where RSA is a type of asymmetric cryptography that uses 2 keys, namely public and private keys. The problem of increasing the security of the public key and private key in RSA (Rivest Shamir Adlema) is that the Linear Congruential Generator (LCG) method is needed, LCG is used to generate a set of random numbers to n, where a set of random numbers will be taken that have a number value prime. One method for generating prime numbers is The Sieve Of Eratosthenes algorithm, The Sieve Of Eratosthenes algorithm is a classic algorithm for determining all prime numbers until the n-number is specified. The way the The Sieve Of Eratosthenes method works is to eliminate numbers that are not prime numbers, resulting in a collection of prime numbers. The prime number generated by the The Sieve Of Eratosthenes algorithm will be used for the public key and private key in the RSA criterion. Keywords - RSA, LCG, The Sieve of Eratosthenes.
APA, Harvard, Vancouver, ISO, and other styles
19

Jia, Hui Qin. "Design of EMC Test Software Based on Configurable File." Applied Mechanics and Materials 48-49 (February 2011): 387–90. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.387.

Full text
Abstract:
According to EMC Standard,fulfilling one Test-Item generally includes below process: select and configure the parameters of instrument,form and execute the Test-Flow, therefore the main task of EMC is to configure instrument and form the Test-Item. In this paper the authors present a new method using configuration file to describe EMC Test-Item to improve the expansibility and maintainability of EMC test software. Multi-layered software architecture is designed according to EMC test operating sequence, and COM component technology is used to design the core module of each layer to guarantee plug&play for the new program-controlled instruments. Because of using the form of configuration file to describe Test-Item, the new Test-Item will be produced through Test-Engine calling Test-Item Configuration Generator. The Virtual Instrument Software Architecture is used to design and realize the frame of EMC software, and the Visual C++ software platform is used to realize the above design method. Application using configuration file make EMC software has the features of easy to use, easy update and expandability.
APA, Harvard, Vancouver, ISO, and other styles
20

Zeman, Andrej, K. Tuček, G. Daquino, L. Debarberis, and A. Hogenbirk. "Scoring Analysis of Design, Verification and Optimization of High Intensity Positron Source (HIPOS)." Materials Science Forum 733 (November 2012): 297–305. http://dx.doi.org/10.4028/www.scientific.net/msf.733.297.

Full text
Abstract:
As part of an exploratory research project at the Institute for Energy (Joint Research Centre of the European Commission), a feasibility assessment was performed for the design and construction of a high-intensity positron facility (HIPOS) in a neutron beam tube, HB9, at the High Flux Reactor (HFR) in Petten. The full model of reactor core, reflector and reactor instrumentation at the neutron beam line HB9 were modeled and full neutronic and photonic calculations were carried out by MCNP4C3. The source file was generated in two formats: SDEF and WESSA. Consequently, two different codes were used for scoring analysis for the optimization of the concept and geometry of positron generator. The main concept including key design parameters have been evaluated independently by two computer codes, in particular MCNP-X and GEANT4. The parametric design analysis including the optimization of positron generator at the pre-selected neutron beam line is reported in this paper. The detailed assessment of the critical design parameters, specifically from technological point of view is summarised. The results of independent analysis confirmed that the best approach is to combine two concepts of positron generation, which are based on the exploiting of neutron and gamma radiation. The results verified that the proposed concept can reach the defined threshold of the positron yield and the positron beam can reach an intensity of 1013e+/sec (un-moderated). The details of completed work are reported in this paper.
APA, Harvard, Vancouver, ISO, and other styles
21

Abdullah, Dhuha. "Design and Analysis of a Sound Generator for wave file format via Parallel Printer Port." AL-Rafidain Journal of Computer Sciences and Mathematics 6, no. 1 (March 1, 2009): 49–61. http://dx.doi.org/10.33899/csmj.2009.163765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Riansah, Wahyu. "Aplikasi QR Code Generator Dan QR Code Reader Menggunakan Metode Stroke Histogram." J-SISKO TECH (Jurnal Teknologi Sistem Informasi dan Sistem Komputer TGD) 4, no. 1 (February 4, 2021): 38. http://dx.doi.org/10.53513/jsk.v4i1.2610.

Full text
Abstract:
Quick Response Code (QR Code) is a two-dimensional image that has the ability to store data. QR Code is commonly used to store data in the form of text, be it numeric, alphanumeric, or binary code. QR Code is widely used for commercial purposes, especially in Japan, usually contains a url link to a specific address or simply text containing advertisements, promotions, and others. One of the things that is not commonly used in QR codes is inserting images into the information it stores. This can increase readers' appeal, especially for advertising, posters, and other commercial matters.This research conducted a study on the possibility of making a QR Code from text input data. Therefore an analysis is carried out on how to make the image the content of the information contained in the QR Code. The solution offered is to convert the text into another representation that can be understood by the QR Code generator and QR Code reader. Previously, the text file was converted into binary.This research also generates QR Code Generator and QR Code Reader, where the input data is in the form of text, then tested to be applied in the real world. The software implementation is done using PHP with MySQL database.
APA, Harvard, Vancouver, ISO, and other styles
23

Hernandes, Andre, Hartini Hartini, and Dewi Sartika. "Steganografi Citra Menggunakan Metode Least Significant Bit (LSB) dan Linear Congruential Generator (LCG)." JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 5, no. 2 (March 9, 2019): 137–46. http://dx.doi.org/10.35957/jatisi.v5i2.134.

Full text
Abstract:
Steganografi merupakan sebuah cara yang digunakan untuk menyembunyi-kan pesan rahasia dari orang yang tidak berhak mengetahuinya. Pada penelitian ini penulis menggunakan salah satu metode steganografi yaitu metode least significant bit (LSB) untuk menyisipkan bit-bit pesan rahasia berupa teks kedalam citra digital RGB berekstensi file bitmap, dengan cara menggabungkan metode LSB dan linear congruential generator (LCG) untuk membangkitkan bilangan acak dari posisi pixel yang akan disisipkan pesan rahasia. Hasil dari penelitian ini penulis berhasil membangun aplikasi steganografi dengan bahasa pemrograman java dan menguji kualitas stego image yang menghasilkan nilai rata-rata Peak Signal to Noise Ratio (PSNR) yang mencapai 51 dB. Dari penilaian ini, disimpulkan bahwa stego image yang dihasilkan dalam kualitas baik dan tidak mengalami perubahan yang signifikan.
APA, Harvard, Vancouver, ISO, and other styles
24

Chęciński, Jakub, and Marek Frankowski. "MAGE (M-file/Mif Automatic GEnerator): A graphical interface tool for automatic generation of Object Oriented Micromagnetic Framework configuration files and Matlab scripts for results analysis." Computer Physics Communications 207 (October 2016): 487–98. http://dx.doi.org/10.1016/j.cpc.2016.06.021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Hardi, S. M., R. Syah Ramadhani, E. Muisa Zamzami, JT Tarigan, and I. Jaya. "Security of Image File with Tiny Encryption Algorithm And Modified Significant Bit Pseudo Random Number Generator." Journal of Physics: Conference Series 1566 (June 2020): 012108. http://dx.doi.org/10.1088/1742-6596/1566/1/012108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Sommer, Philipp S., and Jed O. Kaplan. "A globally calibrated scheme for generating daily meteorology from monthly statistics: Global-WGEN (GWGEN) v1.0." Geoscientific Model Development 10, no. 10 (October 16, 2017): 3771–91. http://dx.doi.org/10.5194/gmd-10-3771-2017.

Full text
Abstract:
Abstract. While a wide range of Earth system processes occur at daily and even subdaily timescales, many global vegetation and other terrestrial dynamics models historically used monthly meteorological forcing both to reduce computational demand and because global datasets were lacking. Recently, dynamic land surface modeling has moved towards resolving daily and subdaily processes, and global datasets containing daily and subdaily meteorology have become available. These meteorological datasets, however, cover only the instrumental era of the last approximately 120 years at best, are subject to considerable uncertainty, and represent extremely large data files with associated computational costs of data input/output and file transfer. For periods before the recent past or in the future, global meteorological forcing can be provided by climate model output, but the quality of these data at high temporal resolution is low, particularly for daily precipitation frequency and amount. Here, we present GWGEN, a globally applicable statistical weather generator for the temporal downscaling of monthly climatology to daily meteorology. Our weather generator is parameterized using a global meteorological database and simulates daily values of five common variables: minimum and maximum temperature, precipitation, cloud cover, and wind speed. GWGEN is lightweight, modular, and requires a minimal set of monthly mean variables as input. The weather generator may be used in a range of applications, for example, in global vegetation, crop, soil erosion, or hydrological models. While GWGEN does not currently perform spatially autocorrelated multi-point downscaling of daily weather, this additional functionality could be implemented in future versions.
APA, Harvard, Vancouver, ISO, and other styles
27

Demir, Saniye, and İrfan Oğuz. "Validation of The Weather Generator CLIGEN with Season Precipitation Data in Tokat Province." Turkish Journal of Agriculture - Food Science and Technology 7, no. 10 (October 12, 2019): 1589. http://dx.doi.org/10.24925/turjaf.v7i10.1589-1596.2633.

Full text
Abstract:
In models that predict hydrologic, ecological and product-yield relationship, the climate interface file is widely used. Today, CLIGEN is the most widely used climate model. While this model is extensively used in many countries around the world, it is not used commonly in our country. In this study, daily data belonging to Tokat climate conditions were simulated with CLIGEN. Observed and simulated precipitation was classified as the wet/dry period. The performance of the CLIGEN climate model was evaluated in both wet and dry periods according to the seasons. The relationship between the obtained precipitation data was statistically determined by Kolmogorov-Smirnov and t-test. Tokat province is located in the arid and semi-arid climate zone. The performance of the model in predicting precipitation in all seasons during the dry period was found to be quite successful.
APA, Harvard, Vancouver, ISO, and other styles
28

Ling, Wei Qing, and Jian Wang. "Research and Implementation of Parameter Mapping in Computational Method Combined Execution." Advanced Materials Research 308-310 (August 2011): 2319–27. http://dx.doi.org/10.4028/www.scientific.net/amr.308-310.2319.

Full text
Abstract:
In view of the issues of computational method combined execution that need parameters transfer in the process of complex product engineering analysis, the execution principle and parameter file formats of computational method are discussed. Through parsed the computational parameters, the mapping relationship among multi-computational methods are established and parameters passing between computational methods is realized. A product design analysis environment system, called PDAE, is developed. With the application of PDAE in the analysis process for CFB boiler and turbo-generator, the feasibility and validity of the approach proposed is demonstrated.
APA, Harvard, Vancouver, ISO, and other styles
29

Muraru, Sorin. "Junction-Producing Algorithm Connecting Carbon Nanotube to Carbon Nanocone to Obtain Funnel-Like Nanostructure: Nanochimney Generator." Coatings 10, no. 12 (December 21, 2020): 1267. http://dx.doi.org/10.3390/coatings10121267.

Full text
Abstract:
This study aims to provide a computational algorithm which contributes to the understanding and implementation of carbon nanochimneys. The structure resembles a tube ending with an inverted funnel, with a connection region that uses non-hexagonal rings as defects in order to match the boundaries of the two linked nanostructures. They are important for applications such as thermal transport, gas storage, or separation. The algorithm is written in Python 3.7 and provides a .pdb file with the coordinates of all the atoms included in the system. The parameters that can be specified are the carbon nanotube dimensions, for either armchair or zigzag conformations, five levels of disclination for the carbon nanocone along with the base diameter of the latter.
APA, Harvard, Vancouver, ISO, and other styles
30

Karavaev, A. S., and S. P. Kopysov. "A modification of the hexahedral mesh generator based on voxel geometry representation." Vestnik Udmurtskogo Universiteta. Matematika. Mekhanika. Komp'yuternye Nauki 30, no. 3 (September 2020): 468–79. http://dx.doi.org/10.35634/vm200308.

Full text
Abstract:
We consider a modification of the previously developed voxel-based mesh algorithm to generate models given in STL-geometry format. Proposed hexahedral mesh generator belongs to the family of grid methods, and is general-purpose in terms of a capability to use as source data both volume (voxel) and STL-surface representation of model geometry. For now, the algorithm works with CAD models described in the well-known STL format. However, it also allows to handle higher-order surface patches defined in an arbitrary format if appropriate procedures for projection and intersection operations will be specified. To define the initial position of mesh nodes, a “signed distance field” volume data file, obtained from the STL-geometry, is used. A special projection technique was developed to adapt constructed orthogonal mesh on the model's boundary. It provides an approximation of sharp edges and corners and is performed before running any other operations with the mesh. Finally, to improve the quality of the mesh, additional procedures were implemented, including boundary layers insertion, bad quality cells splitting, and optimization-based smoothing technique. The algorithm has been tested on a sufficient number of models, some of which are given as examples.
APA, Harvard, Vancouver, ISO, and other styles
31

Boboshin, I. N., and V. V. Varlamov. "?Program generator-program bank? conception and block-modular software design for the ensdf international nuclear spectroscopic data file." Computational Mathematics and Modeling 3, no. 3 (1992): 282–87. http://dx.doi.org/10.1007/bf01133899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Darwin, Ian. "AnnaBot: A Static Verifier for Java Annotation Usage." Advances in Software Engineering 2010 (December 20, 2010): 1–7. http://dx.doi.org/10.1155/2010/540547.

Full text
Abstract:
This paper describes AnnaBot, one of the first tools to verify correct use of Annotation-based metadata in the Java programming language. These Annotations are a standard Java 5 mechanism used to attach metadata to types, methods, or fields without using an external configuration file. A binary representation of the Annotation becomes part of the compiled “.class” file, for inspection by another component or library at runtime. Java Annotations were introduced into the Java language in 2004 and have become widely used in recent years due to their introduction in the Java Enterprise Edition 5, the Hibernate object-relational mapping API, the Spring Framework, and elsewhere. Despite that, mainstream development tools have not yet produced a widely-used verification tool to confirm correct configuration and placement of annotations external to the particular runtime component. While most of the examples in this paper use the Java Persistence API, AnnaBot is capable of verifying anyannotation-based API for which “claims”—description of annotation usage—are available. These claims can be written in Java or using a proposed Domain-Specific Language, which has been designed and a parser (but not the code generator) have been written.
APA, Harvard, Vancouver, ISO, and other styles
33

Simbolon, Buha Johannes. "Steganografi Penyisipan Pesan Pada File Citra Dengan Menggunakan Metode LSB (Least Significant Bit)." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 4, no. 1 (February 5, 2021): 1–6. http://dx.doi.org/10.32672/jnkti.v4i1.2656.

Full text
Abstract:
The rapid development of technology not only has a positive impact, but can also have a negative impact on the users of this technology. One of them is the development of cyber crime which causes messages to be unsafe to protect. Message security can be protected by using steganography to convert messages into secret passwords. To make the secret password more secure, steganography techniques are used. Steganography is a technique for hiding messages by inserting messages into other containers. In this study, a combination of two algorithms is used, namely the RC4 and Base Cryptography algorithm, which is better known as the Super Encryption algorithm and the steganography technique using the Least Significant Bit (LSB) method with random pixel insertion using a pseudorandom number generator (PRNG). Algorithm use. the scope of the problem is the information insertion media used, the process of making data into information and sending to message recipients, the method used in writing the thesis using LSB (Least Significant Bit) and the programming language used in building this system is PHP (Hypertext Preprocessor) with MySQL database (My Structured Query Language) on PhpMyAdmin.
APA, Harvard, Vancouver, ISO, and other styles
34

Lagun, A., and O. Polotai. "FEATURES OF HIDING INFORMATION IN IMAGES WITH USING THE LEAST SIGNIFICANT BIT." Bulletin of Lviv State University of Life Safety 20 (January 23, 2020): 17–22. http://dx.doi.org/10.32447/20784643.20.2019.03.

Full text
Abstract:
In the article has considered the peculiarities of steganographic algorithms implemenation for hiding information in inmoveable images. Authors has described different embedding algorithms which use the method of least significant bit. In particular, the use of digital filtering allows you to better select the necessary pixels for embedding, and the use of a pseudorandom sequence generator allows you to more effectively hide secret information, complicating the search for secret information to the attacker.From the existing color palettes to represent inmoveable images have been selected the most common RGB pal-ette, which contains red, green, and blue intensities to produce image pixels. Colors that are less sensitive to the human eye are used to form the filled steganographic containers to provide additional visual stability.Also, in the paper authors have investigated the features of hiding digital text information in a inmoveable image as a BMP file and have realized an algorithm that for images of different size allows you to hide a text file of the necessary size. In particular, the number of bytes of the secret message is written to the original container to retrieve the required number of characters during searching. In addition, it takes into account the peculiarities of forming a BMP file that contains additional alignment bytes of the string.In general, the algorithm allows you to select a container file of the appropriate size to hide the secret information, as well as the colors of the palette in which the information will be embedded. The extracting of secret information occurs until the number of bytes of the hidden message is reached. This value has recorded at the beginning of the hiding text. You can use encryption or compression algorithms to complication searching of clear text by attacker. Only users those who are aware of the algorithms used and perhaps the keys will be able to read the hidden information correctly.
APA, Harvard, Vancouver, ISO, and other styles
35

Pestotnik, Rok. "Belle2Lab - An Interactive Tool for a Public Analysis of the Belle II Data." EPJ Web of Conferences 214 (2019): 06009. http://dx.doi.org/10.1051/epjconf/201921406009.

Full text
Abstract:
Several data samples from a Belle II experiment will be available to the public as a part of the experiment outreach activities. A Belle2Lab tool is designed as an interactive graphical user interface to reconstructed particles, offering users basic particle selection tools. The tool is based on a Blockly JavaScript graphical code generator and can be run in an HTML5 capable browser. It allows a description of different particle decays by selecting and combining particles from the data file, easy histogramming tools and a display of the results by using the JSROOT library. During the analysis, the user has the possibility to apply cuts to the selected variables. A pseudo-code generated by the user interface is sent to the execution server which returns the histograms, that can also be interactively fitted. The Belle2Lab is accessible in two ways: hosted on a single public web server or as a part of the virtual appliance which consists of an Ubuntu 16.04 LTS operating system, a data sample, an analysis framework, and a private web server. The public web server can be used for a single access while the virtual appliance is more suited for a use in a classroom.
APA, Harvard, Vancouver, ISO, and other styles
36

De Luca, Davide Luciano, and Andrea Petroselli. "STORAGE (STOchastic RAinfall GEnerator): A User-Friendly Software for Generating Long and High-Resolution Rainfall Time Series." Hydrology 8, no. 2 (May 3, 2021): 76. http://dx.doi.org/10.3390/hydrology8020076.

Full text
Abstract:
The MS Excel file with VBA (Visual Basic for Application) macros named STORAGE (STOchastic RAinfall GEnerator) is introduced herein. STORAGE is a temporal stochastic simulator aiming at generating long and high-resolution rainfall time series, and it is based on the implementation of a Neymann–Scott Rectangular Pulse (NSRP) model. STORAGE is characterized by two innovative aspects. First, its calibration (i.e., the parametric estimation, on the basis of available sample data, in order to better reproduce some rainfall features of interest) is carried out by using data series (annual maxima rainfall, annual and monthly cumulative rainfall, annual number of wet days) which are usually longer than observed high-resolution series (that are mainly adopted in literature for the calibration of other stochastic simulators but are usually very short or absent for many rain gauges). Second, the seasonality is modelled using series of goniometric functions. This approach makes STORAGE strongly parsimonious with respect to the use of monthly or seasonal sets for parameters. Applications for the rain gauge network in the Calabria region (southern Italy) are presented and discussed herein. The results show a good reproduction of the rainfall features which are mainly considered for usual hydrological purposes.
APA, Harvard, Vancouver, ISO, and other styles
37

Chew, Kok Kia, and Masayoshi Tomizuka. "Steady-State and Stochastic Performance of a Modified Discrete-Time Prototype Repetitive Controller." Journal of Dynamic Systems, Measurement, and Control 112, no. 1 (March 1, 1990): 35–41. http://dx.doi.org/10.1115/1.2894136.

Full text
Abstract:
Perfect regulation may be too stringent a condition in repetitive control. In this paper, the rigid stability requirement is relaxed by including an appropriately chosen filter in the repetitive signal generator. Lacking an internal model, perfect regulation is not assured in the modified system. The steady-state and stochastic performances of the resulting system are analyzed. These analyses reveal that under certain conditions the dual objectives of good steady-state and stochastic performances are conflicting. A high repetitive gain may give good steady-state performance, but the variance propagation of stochastic disturbances is large (extremely large for some choice of a parameter in the modified controller). The converse is true when the repetitive gain is small. The performance of the modified scheme is evaluated by applying it to a simulated disk-file actuator system.
APA, Harvard, Vancouver, ISO, and other styles
38

Ciancio, Virgilio, Serena Falasca, Iacopo Golasi, Pieter de Wilde, Massimo Coppi, Livio de Santoli, and Ferdinando Salata. "Resilience of a Building to Future Climate Conditions in Three European Cities." Energies 12, no. 23 (November 27, 2019): 4506. http://dx.doi.org/10.3390/en12234506.

Full text
Abstract:
Building energy need simulations are usually performed using input files that contain information about the averaged weather data based on historical patterns. Therefore, the simulations performed are not able to provide information about possible future scenarios due to climate change. In this work, future trends of building energy demands due to the climate change across Europe were studied by comparing three time steps (present, 2050, and -2080) in three different European cities, characterized by different Köppen-Geiger climatic classes. A residential building with modern architectural features was taken into consideration for the simulations. Future climate conditions were reached by applying the effects of climate changes to current hourly meteorological data though the climate change tool world weather file generator (CCWorldWeatherGen) tool, according to the guidelines established by the Intergovernmental Panel on Climate Change. In order to examine the resilience of the building, the simulations carried out were compared with respect to: peak power, median values of the power, and energy consumed by heating and cooling system. The observed trend shows a general reduction in the energy needs for heating (–46% for Aberdeen, –80% for Palermo, –36% for Prague in 2080 compared to the present) and increase (occurrence for Aberdeen) in cooling requirements. These results imply a revaluation of system size.
APA, Harvard, Vancouver, ISO, and other styles
39

Muhammad, Arif Wirawan, and Faza Alameka. "Integrasi Normalized Relative Network Entropy Dan Neural Network Backpropagation (BP) Untuk Deteksi Dan Peramalan Serangan DDOS." Jurnal Rekayasa Teknologi Informasi (JURTI) 1, no. 1 (June 10, 2017): 1. http://dx.doi.org/10.30872/jurti.v1i1.630.

Full text
Abstract:
Distributed denial-of-service (DDoS) merupakan jenis serangan dengan volume dan intensitas DDoS terus meningkat dengan biaya mitigasi yang terus meningkat seiring berkembangnya skala organisasi. Penelitian ini memiliki tujuan untuk mengembangkan sebuah pendekatan baru untuk mendeteksi dan membentuk cluster jenis serangan DDoS, berdasarkan pada karakteristik aktivitas jaringan dengan mengintegrasikan metode Normalized Relative Network Entropy (NRNE) sebagai estimator awal terhadap anomali aktivitas jaringan, dan metode Neural Network Backpropagation (BP) sebagai fungsi supervised learning terhadap pola anomali berdasarkan output dari NRNE. Data training yang digunakan dalam adalah log file dari KDD Cup 1999 yang diterbitkan oleh DARPA. Untuk pengujian real-world attack, digunakan data yang diterbitkan oleh CAIDA 2007. Pengujian simulation attack digunakan software DDoS Generator. Pengujian normal traffic digunakan data CAIDA 2011. Adanya pendekatan baru dalam mendeteksi serangan DDoS, diharapkan bisa menjadi sebuah komplemen terhadap sistem IDS dalam meramalkan terjadinya serangan DDoS.
APA, Harvard, Vancouver, ISO, and other styles
40

Willighagen, Lars G. "Citation.js: a format-independent, modular bibliography tool for the browser and command line." PeerJ Computer Science 5 (August 12, 2019): e214. http://dx.doi.org/10.7717/peerj-cs.214.

Full text
Abstract:
Background Given the vast number of standards and formats for bibliographical data, any program working with bibliographies and citations has to be able to interpret such data. This paper describes the development of Citation.js (https://citation.js.org/), a tool to parse and format according to those standards. The program follows modern guidelines for software in general and JavaScript in specific, such as version control, source code analysis, integration testing and semantic versioning. Results The result is an extensible tool that has already seen adaption in a variety of sources and use cases: as part of a server-side page generator of a publishing platform, as part of a local extensible document generator, and as part of an in-browser converter of extracted references. Use cases range from transforming a list of DOIs or Wikidata identifiers into a BibTeX file on the command line, to displaying RIS references on a webpage with added Altmetric badges to generating ”How to cite this” sections on a blog. The accuracy of conversions is currently 27% for properties and 60% for types on average and a typical initialization takes 120 ms in browsers and 1 s with Node.js on the command line. Conclusions Citation.js is a library supporting various formats of bibliographic information in a broad selection of use cases and environments. Given the support for plugins, more formats can be added with relative ease.
APA, Harvard, Vancouver, ISO, and other styles
41

Reynolds, Kellin, Danny Barnhill, Jamie Sias, Amy Young, and Florencia Greer Polite. "Use of the QR Reader to Provide Real-Time Evaluation of Residents' Skills Following Surgical Procedures." Journal of Graduate Medical Education 6, no. 4 (December 1, 2014): 738–41. http://dx.doi.org/10.4300/jgme-d-13-00349.1.

Full text
Abstract:
Abstract Background A portable electronic method of providing instructional feedback and recording an evaluation of resident competency immediately following surgical procedures has not previously been documented in obstetrics and gynecology. Objective This report presents a unique electronic format that documents resident competency and encourages verbal communication between faculty and residents immediately following operative procedures. Methods The Microsoft Tag system and SurveyMonkey platform were linked by a 2-D QR code using Microsoft QR code generator. Each resident was given a unique code (TAG) embedded onto an ID card. An evaluation form was attached to each resident's file in SurveyMonkey. Postoperatively, supervising faculty scanned the resident's TAG with a smartphone and completed the brief evaluation using the phone's screen. The evaluation was reviewed with the resident and automatically submitted to the resident's educational file. Results The evaluation system was quickly accepted by residents and faculty. Of 43 residents and faculty in the study, 38 (88%) responded to a survey 8 weeks after institution of the electronic evaluation system. Thirty (79%) of the 38 indicated it was superior to the previously used handwritten format. The electronic system demonstrated improved utilization compared with paper evaluations, with a mean of 23 electronic evaluations submitted per resident during a 6-month period versus 14 paper assessments per resident during an earlier period of 6 months. Conclusions This streamlined portable electronic evaluation is an effective tool for direct, formative feedback for residents, and it creates a longitudinal record of resident progress. Satisfaction with, and use of, this evaluation system was high.
APA, Harvard, Vancouver, ISO, and other styles
42

Shri, Shaima Hamdan, and Ayad Fadhil Mijbas. "Chaotic theory incorporated with PSO algorithm for solving optimal reactive power dispatch problem of power system." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 3 (June 1, 2021): 1739. http://dx.doi.org/10.11591/ijeecs.v22.i3.pp1739-1747.

Full text
Abstract:
In this paper, the chaotic particle swarm optimization (CPSO) algorithm is combined with MATPOWER toolbox and used as an optimization tool for attaining solving the optimal reactive power dispatch (RPD) problem, by finding the optimal adjustment of reactive power control variables like a voltage of generator buses (VG), capacitor banks (QC) and transformer taps (Tap) while satisfying some of equality and inequality constraints at the same time. CPSO and Simple PSO algorithms will be checked in a large system such as IEEE node -118. CPSO and Simple PSO algorithms have been implemented and simulated in the MATLAB program, version (R2013b/m-file). Then compassion these results with the results obtained in the other algorithms in the literature like the comprehensive learning particle swarm optimization (CLPSO) algorithm. The simulation results confirm that the CPSO algorithm has high efficiency and ability in terms of decrease real power losses (P loss), and improve voltage profile compared with the obtained by using the simple (PSO) algorithm and (CLPSO) at light load.
APA, Harvard, Vancouver, ISO, and other styles
43

Ghodke, Shobha, V. Sathian, Yashoda Singh, Tarun Patel, and S. Santra. "ABSOLUTE MEASUREMENT OF 14.57 MeV NEUTRON FLUENCE RATE USING PROTON RECOIL NEUTRON TELESCOPE." Radiation Protection Dosimetry 190, no. 3 (July 2020): 307–19. http://dx.doi.org/10.1093/rpd/ncaa103.

Full text
Abstract:
Abstract A single stage vacuum-type proton recoil neutron telescope (PRT) was used for accurate measurement of 14.57 MeV neutron fluence rate from an indigenously developed D-T neutron generator at Purnima, BARC. The telescope consists of a polyethylene radiator having 4 cm diameter and CsI (Tl) scintillation crystal having thickness 1.5 mm and 4 cm diameter separated by 20.5 cm kept in a vacuum chamber. The neutron detection efficiency of the telescope for 14.57 MeV neutrons was calculated analytically using n-p scattering cross section data from Evaluated Nuclear Data File VII and also evaluated using fluka simulation. The relativistic transformation of n-p differential scattering cross section from centre-of-mass to laboratory system was used for calculating the efficiency of PRT. The 14.57 MeV neutron fluence rate was also measured using copper foils. The comparison of fluence rate measured using PRT and copper foil activation techniques is presented in this paper. The total uncertainty in measurement using PRT and copper foil activation technique is found to be 3.93 and 6.97%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
44

Chapleau, Robert, Martin Trέpanier, Pierre Lavigueur, and Bruno Allard. "Origin-Destination Survey Data Dissemination in Metropolitan Context: A Multimedia Experience." Transportation Research Record: Journal of the Transportation Research Board 1551, no. 1 (January 1996): 26–35. http://dx.doi.org/10.1177/0361198196155100104.

Full text
Abstract:
Since the early 1970s, the Montreal Urban Community Transit Commission has held a series of six major origin-destination surveys in the greater Montreal area. These studies, which include approximately 50,000 households per survey, benefit from a totally disaggregate approach. This framework permits the spatialization of each trip end at the x-y coordinate level and associates multiple variables to every recorded trip. The dissemination of such a vast quantity of data requires different levels of resolution with respect to processing methods and software, zonal aggregation, itineraries, and sociodemographic variables. In this context, two tools have been created for public use: MADEOD (Origin-Destination Survey Data Disaggregate Analysis Model) and MADGEN (Trip Generator Disaggregate Analysis Model). Because of the recent and rapid evolution of multimedia technology, these tools have been developed in an interactive Microsoft Excel worksheet format and in hypertext markup language for the Groupe MADITUC's World Wide Web site on the Internet. Stand-alone multimedia presentations and a Windows help file have also been developed for tutorial use.
APA, Harvard, Vancouver, ISO, and other styles
45

Kongjeen, Yuttana, Krischonme Bhumkittipich, and Nadarajah Mithulananthan. "Optimal DG Sizing and Location in Modern Power Grids using PEVs Load Demand Probability." ECTI Transactions on Electrical Engineering, Electronics, and Communications 17, no. 1 (September 9, 2019): 51–59. http://dx.doi.org/10.37936/ecti-eec.2019171.215410.

Full text
Abstract:
The integration of plug-in electric vehicles (PEVs) to the conventional distribution system has had a major impact upon consumption of energy in the past year. This paper presents optimal distributed generator (DG) sizing and location in the power system using PEVs load demand probability. The MATLAB m-file scripts and OpenDSS were applied to solve the proposed study by varying the percentage penetration level of PEVs. A genetic algorithm optimization technique was used to find the best solution of DG installation. The simulation results showed thatthe PEVs were directly connected to the power grid with 100 PEVs (13.84%), 200 PEVs (27.68%) and 500 PEVs (69.19%), respectively. It was found that the DG sizing also varied with 1.773 MW, 1.663 MW and 1.996 MW, respectively. While the position of the DG also changes according to the sizing of DG. The position of DG was installed at bus No.738, bus No.741 and bus No.711, respectively. Therefore, the optimal DG placement helped to improve and reduce the total line loss and total energy demand from the power grid. The grid increased the power system stability and reduced the impact from the large scale of PEV penetration.
APA, Harvard, Vancouver, ISO, and other styles
46

Bande, Lindita, Afshin Afshari, Dina Al Masri, Mukesh Jha, Leslie Norford, Alexandros Tsoupos, Prashanth Marpu, Yosha Pasha, and Peter Armstrong. "Validation of UWG and ENVI-Met Models in an Abu Dhabi District, Based on Site Measurements." Sustainability 11, no. 16 (August 13, 2019): 4378. http://dx.doi.org/10.3390/su11164378.

Full text
Abstract:
The city of Abu Dhabi is growing every year in population, urban extent and energy demand. This research focuses on the application of two simulation programs to estimate changes in urban climate associated with continued development in Abu Dhabi: The Urban Weather Generator (UWG) and ENVI-met. Simulation with these two software packages are validated with the site data measured in downtown Abu Dhabi. A comparison analysis (in the different seasons) between the rural data, the simulation output, and the site measurements shows the variations of the UHI in this Middle Eastern city and the potential of the validated tools. The main aims of this study are: (a) to make a seasonal validation of the UWG for the city of Abu Dhabi (referring to urban-rural available data). The tool was previously validated for a year (no seasonal division) for Abu Dhabi, Toulouse, Basel, Singapore, Rome and Barcelona. The simulations are based on the 2016 version of the Urban Weather Generator. The analysis is separated into three main seasons (instead of the full year): winter, spring, summer. (b) To make a seasonal validation and improve the second tool evaluated in this study, ENVI-met 4.0. The software can simulate urban temperature, humidity and wind speed. Guides are proposed for the enhancement of the accuracy of both estimation procedures. Referring to the results, UWG tends to overestimate the canyon temperature during the summer and has a more realistic estimation on the winter season. ENVI-met has better estimations of temperatures during the summer season compared to UWG. Finally, the UWG weather file contributes a more detailed energy model on a mesoscale model. It considers the seasonal effect and shows the impact of the climate on profiling the UHI phenomena. ENVI-met needs improvement in calculating the anthropogenic heat and in calculation of the mean radiant temperature.
APA, Harvard, Vancouver, ISO, and other styles
47

Lee, Kyung-Min, and Chul-Won Park. "Ground Fault Detection Using Hybrid Method in IT System LVDC Microgrid." Energies 13, no. 10 (May 20, 2020): 2606. http://dx.doi.org/10.3390/en13102606.

Full text
Abstract:
Low voltage direct current (LVDC) microgrid systems have many advantages over low voltage alternating current (LVAC) systems. Furthermore, LVDC microgrids are growing in use because they are easy to link to distributed energy resources (DER) and energy storage systems (ESS), etc. Currently, IT system LVDC microgrids are widely used in direct current (DC) railways, hospitals, photovoltaic (PV) systems, and so on. When a ground fault occurs in an IT system LVDC microgrid, the ground fault may not be detected because the fault current is very small and there is no current path. In this paper, ground fault detection is proposed using a hybrid method that comprises pulsation signal generator injection and detailed coefficients of discrete wavelet transform (DWT). The LVDC microgrid was modeled and simulated using power systems computer-aided design (PSCAD). In addition, the proposed hybrid method was implemented using MATLAB’s wave menu, a script m-file, and the PSCAD library. The proper threshold was selected and tested by fault resistance change and load variation. In order to verify the superiority of the proposed hybrid method, a comparative study with the conventional method was performed. The results of various simulations show that the proposed hybrid detection method has normal operation and accurately and rapidly detects ground faults.
APA, Harvard, Vancouver, ISO, and other styles
48

Chaudhary, Sarita, Pardeep Kumar, and Prashant Johri. "Maximizing performance of apparel manufacturing industry through CAD adoption." International Journal of Engineering Business Management 12 (January 1, 2020): 184797902097552. http://dx.doi.org/10.1177/1847979020975528.

Full text
Abstract:
Textile and apparel manufacturing industry of India is second highest employment generator sector and largest contributor to India’s GDP. Unfortunately, it lacks behind in innovations and adoption of technology to meet the challenges. The basic problem remains as how to bring varied designs to market quickly with less efforts and cost. The adoption of CAD technology offering enormous benefits to apparel manufacturers in India. It makes quick and efficient revisions in apparel design changes including colour adjustments on fabric pattern and resizing garments. CAD system enable designers to produce more accurate designs with less chance of mistakes by saving cost and time. Its integration with CAM offers many advantages during manufacturing process and makes the apparel production faster with consistent and accurate results every time. As all information related to design and production are stored in file format, it makes very easy to produce the same design again without repetition of previous activities. The introduction of CAD technology in the industry resulted to improved efficiency of the design process due to automation of routine design tasks, increased employee productivity and shortened lead time in the product development process. This study highlights on adoption of CAD technology, limitations and its impact on business.
APA, Harvard, Vancouver, ISO, and other styles
49

Shahmohammadi Beni, Mehrdad, Hiroshi Watabe, and Kwan Ngok Yu. "SecureVision: An Open-Source User-Customizable Image Encryption Program." Applied Sciences 11, no. 17 (August 27, 2021): 7915. http://dx.doi.org/10.3390/app11177915.

Full text
Abstract:
Data security has become indispensable, with a view to keep sensitive information confidential. One important method is through image encryption, upon which features in an image would no longer be visible. The original image with its features could only be restored upon decryption using a set of keys. There are prestigious works in the literature regarding image encryption. However, there is a lack of easy-to-use, GUI-based, user-customizable computer programs for image encryption. In the present work, we developed a GUI-based image encryption and decryption program with server file transfer support, namely, SecureVision. A custom-made random number generator using the equation of an ellipse was developed to randomly shuffle the pixel positions. SecureVision was found to be robust, user-friendly and fast in both encryption and decryption. The program was highly sensitive to the supplied keys, which prevented brute-force attacks. SecureVision provided full user control, where users could modify the program modules to match their desired applications, which was particularly desirable for pedagogical purposes in that interested parties had the freedom to explore the concept of image encryption and decryption. SecureVision is distributed under a GPLv3 license, which would allow everyone to use, modify and distribute the program without any restriction.
APA, Harvard, Vancouver, ISO, and other styles
50

Roda-Casanova, Victor, Álvaro Zubizarreta-Macho, Francisco Sanchez-Marin, Óscar Alonso Ezpeleta, Alberto Albaladejo Martínez, and Agustín Galparsoro Catalán. "Computerized Generation and Finite Element Stress Analysis of Endodontic Rotary Files." Applied Sciences 11, no. 10 (May 11, 2021): 4329. http://dx.doi.org/10.3390/app11104329.

Full text
Abstract:
Introduction: The finite element method has been extensively used to analyze the mechanical behavior of endodontic rotary files under bending and torsional conditions. This methodology requires elevated computer-aided design skills to reproduce the geometry of the endodontic file, and also mathematical knowledge to perform the finite element analysis. In this study, an automated procedure is proposed for the computerized generation and finite element analysis of endodontic rotary files under bending and torsional conditions. Methods: An endodontic rotary file with a 25mm total length, 0.25mm at the tip, 1.20mm at 16mm from the tip, 2mm pitch and squared cross section was generated using the proposed procedure and submitted for analysis under bending and torsional conditions by clamping the last 3mm of the endodontic rotary file and applying a transverse load of 0.1N and a torsional moment of 0.3N·cm. Results: The results of the finite element analyses showed a maximum von Mises stress of 398MPa resulting from the bending analysis and a maximum von Mises stress of 843MPa resulting from the torsional analysis, both of which are next to the encastre point. Conclusions: The automated procedure allows an accurate description of the geometry of the endodontic file to be obtained based on its design parameters as well as a finite element model of the endodontic file from the previously generated geometry.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography