Academic literature on the topic 'GRAM (Computer program)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'GRAM (Computer program).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "GRAM (Computer program)"

1

Cookson, Brad T., Janet D. Curtis, Adam R. Orkand, Thomas R. Fritsche, Leonard Pagliaro, Lee Anne McGonagle, and Michael L. Astion. "GramStain-Tutor: A Personal Computer Program That Teaches Gram Stain Interpretation." Laboratory Medicine 25, no. 12 (December 1, 1994): 803–6. http://dx.doi.org/10.1093/labmed/25.12.803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mandel, L. P., D. C. Schaad, B. T. Cookson, J. D. Curtis, A. R. Orkand, M. H. Wener, C. N. Lecrone, D. Dewitt, and M. L. Astion. "Evaluation of an interactive computer program to teach gram-stain interpretation." Academic Medicine 71, no. 10 (October 1996): S100–2. http://dx.doi.org/10.1097/00001888-199610000-00058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Okubo, Seiya, Takaaki Ayabe, and Tetsuro Nishino. "Cluster Analysis Using N-gram Statistics for Daihinmin Programs and Performance Evaluations." International Journal of Software Innovation 4, no. 2 (April 2016): 33–57. http://dx.doi.org/10.4018/ijsi.2016040103.

Full text
Abstract:
In this paper, the authors elucidate the characteristics of the computer game Daihinmin, a popular Japanese card game that uses imperfect information. They first propose a method to extract feature values using n-gram statistics and a cluster analysis method that employs feature values. By representing the program card hands as several symbols, and the order of hands as simplified symbol strings, they obtain data that is suitable for feature extraction. The authors then evaluate the effectiveness of the proposed method through computer experiments. In these experiments, they apply their method to ten programs that were used in the UEC Computer Daihinmin Convention. In addition, the authors evaluate the robustness of the proposed method and apply it to recent programs. Finally, they show that their proposed method can successfully cluster Daihinmin programs with high probability.
APA, Harvard, Vancouver, ISO, and other styles
4

Mikhailova, Elena, Polina Diurdeva, and Dmitry Shalymov. "N-Gram Based Approach for Text Authorship Classification." International Journal of Embedded and Real-Time Communication Systems 8, no. 2 (July 2017): 24–39. http://dx.doi.org/10.4018/ijertcs.2017070102.

Full text
Abstract:
Automated authorship attribution is actual to identify the author of an anonymous texts, or texts whose authorship is in doubt. It can be used in various applications including author verification, plagiarism detection, computer forensics and others. In this article, the authors analyze an approach based on frequency combination of letters is investigated for solving such a task as classification of documents by authorship. This technique could be used to identify the author of a computer program from a predefined set of possible authors. The effectiveness of this approach is significantly determined by the choice of metric. The research examines and compares four different distance measures between a text of unknown authorship and an authors' profile: L1 measure, Kullback-Leibler divergence, base metric of Common N-gram method (CNG) and a certain variation of dissimilarity measure of CNG method. Comparison outlines cases when some metric outperforms others with a specific parameter combination. Experiments are conducted on different Russian and English corpora.
APA, Harvard, Vancouver, ISO, and other styles
5

Suryani Hormansyah, Dhebys, Eka Larasati Amalia, Luqman Affandi, Dimas Wahyu Wibowo, and Indinabilah Aulia. "N-Gram Accuracy Analysis in the Method of Chatbot Response." International Journal of Engineering & Technology 7, no. 4.44 (December 1, 2018): 152. http://dx.doi.org/10.14419/ijet.v7i4.44.26973.

Full text
Abstract:
Chatbot is a computer program designed to simulate interactive conversations or communication to users. In this study, chatbot was created as a customer service that functions as a public health service in Malang. This application is expected to facilitate the public to find the desired information. The method for user input in this application used N-Gram. N-gram consists of unigram, bigram and trigram. Testing of this application is carried out on 3 N-gram methods, so that the results of the tests have been done obtain the results for unigram 0.436, bigram 0.28, and trigram 0.26. From these results it can be seen that trigrams are faster in answering questions.
APA, Harvard, Vancouver, ISO, and other styles
6

Leal, T., J. J. Parez, R. Vanbinst, and P. E. Wallemacq. "Computerized approach to monitoring aminoglycosides." Clinical Chemistry 37, no. 8 (August 1, 1991): 1415–19. http://dx.doi.org/10.1093/clinchem/37.8.1415.

Full text
Abstract:
Abstract Aminoglycosides are still used extensively in the treatment of nosocomial infections with Gram-negative bacteria. However, the treatment is associated with several adverse effects. Aminoglycosides monitoring is therefore essential to prevent toxic accumulations and to reach therapeutic concentrations. A computer program, PHARMONITOR, has been developed to optimize aminoglycosides monitoring, responding to the demands of most clinical daily situations. This program, based on a one-compartment open pharmacokinetics model, is developed for IBM PC-compatible computers, using D-Base III+. It can calculate t1/2, Vd, Cldrug, Cpmax, and the theoretical optimal dose and interval and also evaluates the creatinine clearance. The program has been conceived to allow maximal speed, flexibility, and reliability by the use of (e.g.) a linear least-squares analysis, the possible reference to previous protocols, the extensive use of keywords to classify and recall patients according to their pathologies, the development of messages recommending maximal dose or minimal dosing interval, and increasing the safety of the analysis. We consider the program a valuable tool for adjusting aminoglycoside dosage in individuals.
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Rong, Cong Tian, and Lin Yan. "Malware Detection Using CNN via Word Embedding in Cloud Computing Infrastructure." Scientific Programming 2021 (September 11, 2021): 1–7. http://dx.doi.org/10.1155/2021/8381550.

Full text
Abstract:
The Internet of Things (IoT), cloud, and fog computing paradigms provide a powerful large-scale computing infrastructure for a variety of data and computation-intensive applications. These cutting-edge computing infrastructures, however, are nevertheless vulnerable to serious security and privacy risks. One of the most important countermeasures against cybersecurity threats is intrusion detection and prevention systems, which monitor devices, networks, and systems for malicious activity and policy violations. The detection and prevention systems range from antivirus software to hierarchical systems that monitor the traffic of whole backbone networks. At the moment, the primary defensive solutions are based on malware feature extraction. Most known feature extraction algorithms use byte N-gram patterns or binary strings to represent log files or other static information. The information taken from program files is expressed using word embedding (GloVe) and a new feature extraction method proposed in this article. As a result, the relevant vector space model (VSM) will incorporate more information about unknown programs. We utilize convolutional neural network (CNN) to analyze the feature maps represented by word embedding and apply Softmax to fit the probability of a malicious program. Eventually, we consider a program to be malicious if the probability is greater than 0.5; otherwise, it is a benign program. Experimental result shows that our approach achieves a level of accuracy higher than 98%.
APA, Harvard, Vancouver, ISO, and other styles
8

PIETRAS, Dariusz, Marek PRASZKIEWICZ, and Konrad CZARNIECKI. "Methodology of determining the input data of control algorithms for a compression-ignition engine." Combustion Engines 178, no. 3 (July 1, 2019): 283–88. http://dx.doi.org/10.19206/ce-2019-349.

Full text
Abstract:
The engine control process is usually carried out based on array control algorithms with a fixed mesh size. Modification of control algorithms based on experimental test data requires the use of programs that make it possible to determine the control algorithm param-eters. The article presents the methodology of determining the compression-ignition engine control algorithms. A custom computer pro-gram was presented, which was used to determine the control algorithm parameters. These control algorithms values were determined based on the results of experimental engine tests, and using the presented program. The parameters were introduced into the laboratory compression-ignition engine controller. The experimental tests performed on the engine, whose operation was managed by the pro-grammed laboratory controller, confirmed the usefulness of the proposed methodology for determining input data of control algorithms.
APA, Harvard, Vancouver, ISO, and other styles
9

Hasnat, Hamima, Sadia Afroz, Faijul Islam, Mohammad Monir Hossain, and Shikha Paul. "Colonization pattern of Gram positive organisms causing neonatal sepsis in pregnant women." Bangladesh Journal of Medical Microbiology 14, no. 2 (July 31, 2020): 12–18. http://dx.doi.org/10.3329/bjmm.v14i2.57793.

Full text
Abstract:
Background: Neonatal sepsis is one of the major causes of mortality and morbidity in neonates. Early onset neonatal sepsis (EONS) is commonly caused by mother’s vaginal and rectal organisms before or during the delivery process. Objective: The aim of this study was to determine the colonization pattern of common gram positive organisms responsible for neonatal sepsis, in women of 35-37 weeks of pregnancy. Methodology: A cross sectional analytical study was conducted from July 2018 to June 2019 at the department of Microbiology of Sir Salimullah Medical College, Dhaka. Total 107 of each vaginal and vaginorectal samples was collected from pregnant women at 35-37 weeks of pregnancy attending at the out-patient department of the Obstetrics and Gynaecology unit of Sir Salimullah Medical College & Mitford Hospital, Dhaka. Vaginal and vaginorectal samples were tested by standard culture technique using Todd– Hewitt broth, blood agar, High chrome UTI agar media. Data was collected by a questionnaire and results were analyzed by statistical package for the social sciences (SPSS) program. Results: In this study, among 107 vaginal swab samples Staphylococcus aureus were the predominant isolate (51.40%), followed by Enterococci (20.56%), Coagulase negative Staphylococcus (14.95%) and Group B Sreptococcus (5.61%). Similarly among 107 vaginorectal swab samples commonest isolates were Staphylococcus aureus (56.1%), followed by Enterococci (52.34%), Coagulase negative Staphylococcus (11.21%) and Group B Streptococcus (6.54%). Conclusion: The organisms from the vaginal and vaginorectal swabs were essentially the same. Staphylococcus aureus and Enterococci were the most abundant organisms that can cause neonatal sepsis, isolated from the vaginal and vaginorectal swab samples. Bangladesh J Med Microbiol 2020; 14 (2): 12-18
APA, Harvard, Vancouver, ISO, and other styles
10

Tong, Jiahong, Zhigang Wu, Qi Liu, Liang Du, Liangde Xu, and Jingxing Yu. "Application of natural language understanding in Chinese power dispatching centre." E3S Web of Conferences 182 (2020): 02002. http://dx.doi.org/10.1051/e3sconf/202018202002.

Full text
Abstract:
It is difficult for computer to understand the texts in unstructured Chinese language, which becomes an obstacle for further application of artificial intelligence in the power dispatch center. Understanding of the orders from human dispatchers is the premise for the collaboration of machine and human being in power system operation. Towards understanding of dispatching texts, this paper proposes a textual semantic analysis framework with active learning of the semantic structure knowledge. Firstly, the words are vectorized by the Skip-gram models. And the hierarchical clustering algorithm is designed to detect the sentence patterns. Then the knowledge base is set up by converting the sentence structure to their regular expressions. In application, define a proprietary semantic framework to extract important device information and to parse the semantic slot using dependency syntax. Application shows that the Chinese texts describing the operation mode switching process can be understood accurately by the computer program.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "GRAM (Computer program)"

1

Ribeiro, Helena Corrêa. "Cálculo: uso de recursos computacionais para inserir conceitos de limites, derivadas e integrais no ensino médio." Universidade Tecnológica Federal do Paraná, 2018. http://repositorio.utfpr.edu.br/jspui/handle/1/2971.

Full text
Abstract:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
O presente trabalho tem como objetivo auxiliar professores de Educação Básica a abordar alguns conceitos básicos de Cálculo Diferencial e Integral no terceiro ano do ensino médio, utilizando os softwares wxMaxima e Geogebra. Nossa proposta visa resgatar o ensino do Cálculo no âmbito escolar, mas de uma maneira diferente da tradicional, utilizando a tecnologia em nosso favor, como uma ferramenta facilitadora no processo ensino-aprendizagem de conceitos de limites, derivadas e integrais. A ideia é que toda a parte algébrica e gráfica, que exige conhecimentos matemáticos específicos, seja feita pelos softwares e que os estudantes aprendam a interpretar as soluções que as ferramentas nos fornecem e a conhecerem um pouco mais sobre a matemática e suas aplicações.
The present work aims to help Basic Education teachers to approach some basic concepts of Differential and Integral Calculus in the third year of high school using the software wxMaxima and Geogebra. Our purpose is to recover the teaching of Calculus in the school context, but in a different way from the traditional one, using the technology in our favor, as a facilitating tool in the teaching-learning process of boundary, derivative and integral concepts. The idea is that all the algebraic and graphic part, which requires specific mathematical knowledge, is done by software and that students learn to interpret the solutions that the tools provide us and to know a little more about mathematics and its applications.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "GRAM (Computer program)"

1

Seitz, Justin. Gray hat Python: Python programming for hackers and reverse engineers. San Francisco: No Starch Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Center, National Institutes of Health (U S. ). Division of Computer Research and Technology Computer. Using TELL-A-GRAF at NIH: A preface to the Tell-A-Graf user's manual : current with TELL-A-Graf version 5.1. Bethesda, Md: Computer Center Branch, Division of Computer Research and Technology, National Institutes of Health, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

National Institutes of Health (U.S.). Division of Computer Research and Technology. Computer Center. Using TELL-A-GRAF at NIH: A preface to the Tell-A-Graf user's manual : current with TELL-A-Graf version 5.1. Bethesda, Md: Computer Center Branch, Division of Computer Research and Technology, National Institutes of Health, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gray, Tara. Essentials for design, Macromedia Director MX 2004 / Tara Gray. Upper Saddle River, N.J: Pearson/Prentice Hall, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

National Institutes of Health (U.S.). Division of Computer Research and Technology. Computer Center. Using TELL-A-GRAF at NIH: A preface to the Tell-A-Graf user's manual : current with TELL-A-Graf version 5.1. Bethesda, Md: Computer Center Branch, Division of Computer Research and Technology, National Institutes of Health, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Using TELL-A-GRAF at NIH: A preface to the Tell-A-Graf user's manual : current with TELL-A-Graf version 5.1. Bethesda, Md: Computer Center Branch, Division of Computer Research and Technology, National Institutes of Health, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

National Institutes of Health (U.S.). Division of Computer Research and Technology. Computer Center. Using TELL-A-GRAF at NIH: A preface to the Tell-A-Graf user's manual : current with TELL-A-Graf version 5.1. Bethesda, Md: Computer Center Branch, Division of Computer Research and Technology, National Institutes of Health, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

National Institutes of Health (U.S.). Division of Computer Research and Technology. Computer Center. Using TELL-A-GRAF at NIH: A preface to the Tell-A-Graf user's manual : current with TELL-A-Graf version 5.1. Bethesda, Md: Computer Center Branch, Division of Computer Research and Technology, National Institutes of Health, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Justus, C. G. The NASA/MSFC global reference atmospheric model--1990 version (GRAM-90). Atlanta, Ga: School of Earth and Atmospheric Sciences, Georgia Institue of Technology, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pichler, Franz, and Roberto Moreno-Daz. Computer Aided Systems Theory - EUROCAST 2003 00: 9th International Workshop on Computer Aided Systems Theory Las Palmas de Gran Canaria, Spain, February 24-28, 2003 Revised Selected Papers. Berlin: Springer-Verlag Berlin Heidelberg, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "GRAM (Computer program)"

1

Hazay, Carmit, and Mor Lilintal. "Gradual GRAM and Secure Computation for RAM Programs." In Lecture Notes in Computer Science, 233–52. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57990-6_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Frantzeskou, Georgia, Stephen G. MacDonell, and Efstathios Stamatatos. "Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process." In Handbook of Research on Computational Forensics, Digital Crime, and Investigation, 470–95. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-836-9.ch020.

Full text
Abstract:
Nowadays, in a wide variety of situations, source code authorship identification has become an issue of major concern. Such situations include authorship disputes, proof of authorship in court, cyber attacks in the form of viruses, trojan horses, logic bombs, fraud, and credit card cloning. Source code author identification deals with the task of identifying the most likely author of a computer program, given a set of predefined author candidates. We present a new approach, called the SCAP (Source Code Author Profiles) approach, based on byte-level n-grams in order to represent a source code author’s style. Experiments on data sets of different programming-language (Java,C++ and Common Lisp) and varying difficulty (6 to 30 candidate authors) demonstrate the effectiveness of the proposed approach. A comparison with a previous source code authorship identification study based on more complicated information shows that the SCAP approach is language independent and that n-gram author profiles are better able to capture the idiosyncrasies of the source code authors. It is also demonstrated that the effectiveness of the proposed model is not affected by the absence of comments in the source code, a condition usually met in cyber-crime cases.
APA, Harvard, Vancouver, ISO, and other styles
3

Brezonik, Patrick L., and William A. Arnold. "Solving Acid-Base Equilibria and the Carbonate System." In Water Chemistry, 271–332. 2nd ed. Oxford University PressNew York, 2022. http://dx.doi.org/10.1093/oso/9780197604700.003.0008.

Full text
Abstract:
Abstract Three types of tools used to solve ionic equilibria are presented: graphical, algebraic, and numerical (computer-based) techniques. Construction and interpretation of single “master-variable” diagrams (pC-pH diagrams) is explained, and their use to solve acid-base problems is illustrated. Because many ionic equilibria problems are too complicated to solve through graphical or algebraic techniques, emphasis is placed on computer-based solutions. A brief history is presented on computer programs for ionic equilibria and their operating principles. Example-based instructions are given for the program Visual MINTEQ. This knowledge is applied to acid-base systems in natural waters, especially the carbonate system. Factors affecting pH and alkalinity and methods of measuring carbonate forms, including Gran titrations, are described. Other acid-base systems in natural waters are discussed, and the kinetics of acid-base reactions is described.
APA, Harvard, Vancouver, ISO, and other styles
4

He, Qiwei, and Matthias von Davier. "Analyzing Process Data from Problem-Solving Items with N-Grams." In Handbook of Research on Technology Tools for Real-World Skill Development, 750–77. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9441-5.ch029.

Full text
Abstract:
This chapter draws on process data recorded in a computer-based large-scale program, the Programme for International Assessment of Adult Competencies (PIAAC), to address how sequences of actions recorded in problem-solving tasks are related to task performance. The purpose of this study is twofold: first, to extract and detect robust sequential action patterns that are associated with success or failure on a problem-solving item, and second, to compare the extracted sequence patterns among selected countries. Motivated by the methodologies of natural language processing and text mining, we utilized feature selection models in analyzing the process data at a variety of aggregate levels and evaluated the different methodologies in terms of predictive power of the evidence extracted from process data. It was found that action sequence patterns significantly differed by performance groups and were consistent across countries. This study also demonstrated that the process data were useful in detecting missing data and potential mistakes in item development.
APA, Harvard, Vancouver, ISO, and other styles
5

Copeland, Jack, and Dani Prinz. "Computer chess—the first moments." In The Turing Guide. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198747826.003.0041.

Full text
Abstract:
The electronic computer has profoundly changed chess. This chapter describes the birth of computer chess, from the very first discussions of computational chess at Bletchley Park during the war to the first chess moves ever calculated by an electronic computer. We cover a number of historic chess programs—including Turing’s own ‘Turochamp’—and recapture some of the atmosphere of those early days of computer chess. Albert Square, Manchester, 2012. The time was coming up to 9 o’clock on a grim summer morning, two days after what would have been Turing’s 100th birthday. Litter from the Olympic torch ceremony still scattered the ground. There were unusual numbers of chess enthusiasts and computer scientists in the square, hurrying past the awkwardly posturing statue of William Gladstone and up the steps at the entrance to Manchester Town Hall. Inside, they filed past more statues—chemist John Dalton, physicist James Joule—and took their seats in the crowded gothic-revival great hall. News of Turing’s centenary celebrations had reached over forty countries: fans in other time zones clicked to join the audience, watching their screens and waiting for the big event to start. Shortly after 9, a flawlessly groomed Garry Kasparov took the stage. Born in the Soviet Union in 1963, Kasparov (Fig. 31.1) became world chess champion at the age of only 22. He has gone down in history as the first reigning champion to be beaten by a computer. In a New York TV studio on the thirty-ninth floor of a Seventh Avenue skyscraper, IBM’s chess computer DeepBlue crushed Kasparov in 1997 (see Ch. 27). Fifteen years later he had come to Manchester to honour Turing, the first pioneer of computer chess. Seeming a bit nervous at first—until his natural ebullience reasserted itself—Kasparov haltingly told the crowd: ‘Apart from personal love of the game, Turing did serious work with chess as a model of mechanical thinking and machine intelligence’. Yet Turing, he said, ‘was a fairly terrible chess player’.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "GRAM (Computer program)"

1

Bukusheva, Aliya. "THE STUDY OF COMPUTATIONAL GEOMETRY IN THE SYSTEM MATHEMATICA." In 1st International Baltic Symposium on Science and Technology Education. Scientia Socialis Ltd., 2015. http://dx.doi.org/10.33225/balticste/2015.27.

Full text
Abstract:
In the ninetieth Alfred Gray developed intensively applications of Mathematica to Euclidean differential geometry of curves and surfaces. He opened completely new approaches to differential geometry in teaching and research. Modern geometry uses the latest computer technology to solve their problems. Advanced mathematical computer programs allow using a fresh approach to the teaching of geometry in universities, taking into account the attraction of students to computers. The paper outlines some thoughts on teaching computational geometry. Key words: bachelor, computational geometry, wolfram mathematica.
APA, Harvard, Vancouver, ISO, and other styles
2

Leitgeb, Thomas, Fabrice Giuliani, Andreas Niederhammer, and Hermann-Peter Pirker. "Computer-Aided Dimensioning and Validation of a Versatile Test Facility for Combustion Chambers and Turbines." In ASME Turbo Expo 2009: Power for Land, Sea, and Air. ASMEDC, 2009. http://dx.doi.org/10.1115/gt2009-59592.

Full text
Abstract:
The continuous flow test facility at Graz University of Technology was originally designed for cold sub- and transonic experimental research on different turbine stages (2001-GT-0489). The operation range of the facility was recently extended to hot flows for investigations on the behavior of high-temperature resistant sensors embedded in gas-turbines and analysis of cooling systems of turbine blades or multiple-burner combustors, where each air supply is driven separately. Therefore, a 5 MW thermal air heater has been connected to the institute’s 3 MW compressor station. The dimensioning of the air system was done with IPSE-pro which is a commercial software package for simulation of basic thermodynamic processes. The standard modules of IPSE-pro were modified for calculating the mass flow distributions with respect to the prevailing pressure drops. As the air system is complex and relies on control valves to maintain specific mass flow rates, IPSEpro allows analysis of the behaviour of the test facility at several compressor station configurations. The main test facility dimensions and characteristics, as well as the most important equations describing the component models of IPSEpro are shown. Simulation results of several operation points are compared to measured data to validate the methodology. This work was done in the frame of the European research program New Aero Engine Core Concepts (NEWAC) at Graz University of Technology.
APA, Harvard, Vancouver, ISO, and other styles
3

Hamade, Ramsey F., Mohammad Karim Elham, Issam El Rassi, Lamya Atweh, Ziad Bulbul, and Fadi Bitar. "Printing 3D Heart Models From CT Scans Using Materialize: A Congenital Heart Disease Program at the American University of Beirut (AUB)." In ASME 2017 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/imece2017-71522.

Full text
Abstract:
Presented in this work is a detailed methodology of how to properly print 3-dimensional (3D) heart models starting from computed tomography (CT) scan and using the Mimics Innovation Suite (Mimics and 3-matic) software package (from Materialize, Leuven, Belgium). The methodology starts by segmenting the clinical DICOM files to retain masks of gray value range of interest. Specifically, retained is the blood volume contained in the heart. Using Mimics, this is accomplished by creating mask and then editing and refining the relevant mask in order to isolate the blood within a certain range of Hounsfield Units (HU). A second mask is created using different gray value ranges to isolate the tissues of the heart. Both 3D models are transferred to 3-matic where integrated Boolean operations are executed to subtract the geometric entities thus retaining the 3D geometry of the heart (including myocardium, cavities, and arteries) of interest. The retained model geometry consists of the muscle surface of the heart and enclosing the hollowed cavities inside that represent the blood volume. Following further processing in 3-matic, the 3D model is now ready for 3D printing. At the American University of Beirut (AUB), a ProJet 3510 SD (3D Systems) is employed to print the heart models (both sectioned and whole). Printed 3D models are employed within the Program for Congenital Heart Disease at AUB that represents a model for clinical applications, education, and research as the first such initiative in Lebanon and the Middle East region.
APA, Harvard, Vancouver, ISO, and other styles
4

Asmari, Ali, and L. L. Hoberock. "Segmenting Fly Ash Particles Using Image Processing Techniques." In ASME 2017 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/imece2017-70042.

Full text
Abstract:
Fly ash is one of the residues generated in combustion, and comprises the fine particles that rise with flue gases. In the US about 43% is recycled and is often used to supplement Portland cement in concrete production. Fly ash can improve the concretes mechanical properties and decrease cost. Depending upon the source and makeup of the coal being burned, the components of fly ash vary considerably. These variations affect the quality of the final product. Accordingly, it is important for cement manufacturers to know the amount and type of the components in these particles. The objective of this project is segmentation of images of fly ash particles acquired using a micro computed tomography (μCT) imaging device. A set of grayscale images is produced, with each image representing a particular slice of the particle. The desired segmentation operation should identify particles and label regions of a given image based on similarity, as perceived by human observers. In this paper, two techniques are proposed for segmenting different phases of material in these images. The first technique uses Contrast Stretching and Histogram Matching and is based solely on the gray scale value of the pixels in the image slices. In the second proposed technique, Circular Gabor Filters (CGF) are used to segment the regions with porous textures in the cross section of the particle. We have also proposed a technique for designing the CGF such that when applied to the gray scale images, the filter passes the porous regions of components accurately, while blocking non-porous regions. By combining these techniques, we have developed a program that is able to segment different types and regions of impurities in the cross sections of a fly ash particle and create 3D models of these particles, presenting the locations and sizes of different phases of material.
APA, Harvard, Vancouver, ISO, and other styles
5

Williams, Christopher B., Timothy W. Simpson, and Michael Hripko. "Advancing the Additive Manufacturing Workforce: Summary and Recommendations From a NSF Workshop." In ASME 2015 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/detc2015-47274.

Full text
Abstract:
Accompanying the increasing advances and interest in Additive Manufacturing (AM) technologies is an increasing demand for a workforce that is knowledgeable about the technologies and how to employ them to solve engineering problems. As a step towards addressing this knowledge gap, a workshop was held at the National Science Foundation (NSF) to discuss the educational needs of, and opportunities for, developing an AM workforce. With the goal of developing novel educational partnerships to better prepare and enhance the AM workforce, the workshop participants — 66 representatives from academia, industry, and government — sought to answer questions such as “What should we teach to the AM workforce and why?”, “To whom and how should we teach AM?”, and “How should we partner for AM education and training?” Key educational themes that emerged include: (1) AM processes and process/material relationships, (2) engineering fundamentals with an emphasis on materials science and manufacturing, (3) professional skills for problem solving and critical thinking, (4) design practices and tools that leverage the design freedom enabled by AM, and (5) cross-functional teaming and ideation techniques to nurture creativity. The paper summarizes the speaker presentations and outcomes from the workshop, along with several new educational partnerships identified by small working groups. Based on the presentations and partnerships, we recommend the following to advance the AM workforce. First, ensure that all AM curricula provide students with an understanding of (i) AM and traditional manufacturing processes to enable them to effectively select the appropriate process for product realization; (ii) the relationships between AM processes and material properties; and (iii) “Design for AM”, including computational tools for AM design as well as frameworks for process selection, costing, and solution generation that take advantage of AM capabilities. Second, establish a national network for AM education that, by leveraging existing “distributed” educational models and NSF’s ATE Programs, provides open source resources as well as packaged activities, courses, and curricula for all educational levels (K-Gray). Third, promote K-12 educational programs in STEAM (STEM plus the arts) and across all formal and informal learning environments in order to leverage the unique capabilities of AM in engaging students in hands-on, tactile, and visual learning activities. Fourth, provide support for collaborative and community-oriented maker spaces that promote awareness of AM among the public and provide AM training programs for incumbent workers and students seeking alternative pathways to gain AM knowledge and experience. Recommendations for scaling and coordinating these activities across local, regional, and national levels are also discussed to create synergies among the proposed activities and existing efforts.
APA, Harvard, Vancouver, ISO, and other styles
6

Laurens, Andre´. "Micro (Cost) Technologies for Spacecraft Control and Command: An Example, Balloon-Borne Stabilised Gondolas." In CANEUS 2006: MNT for Aerospace Applications. ASMEDC, 2006. http://dx.doi.org/10.1115/caneus2006-11014.

Full text
Abstract:
Balloons are long-time known space vehicles for science missions and technology in-flight experiments, with instruments that need out-of-atmosphere or in-situ measurements, thus being complementary to the satellite. They carry micro (few hundred grams) to mega (few tons) payloads, but all of them require micro cost, short development, multiple flights. Among the big ones, CNES stabilised gondolas are versatile space platforms used to fly science instruments mainly coming for aeronomy and astrophysics communities, and requiring stabilisation and pointing capabilities, analogous to satellite attitude control subsystems. For them, cost and development constraints cannot be met without highly flexible architectures and off-the-shelf components. In order to increase gondola flexibility to new missions (or adaptability to mission evolutions), new hardware and software solution have been studied for control & command, including stabilisation and pointing functions. Promoted technologies are those of industrial computers, ground networks, free software and, over all, Ada language, for they are open, standard, powerful, low-cost and long-lasting solutions. After a brief description of domain-oriented characteristics of the stabilised gondola control & command, this paper introduces the various technologies and main design principles proposed to meet system-level goals. Then focus is put on on-board architectures: full Ada95 real-time distributed applications on an Ethernet-IP LAN of industrial PCs running Linux, and describes the prototyping work and preliminary development done to ensure feasibility. The paper then discusses the applicability of such solutions to global, ground-to-board, distributed control & command applications, through an IP-based telemetry & telecommand link, such as the one under development in CNES for balloon systems. As a conclusion, this paper shows how adoption of these technologies for other space programs such as satellite platforms and payloads may change design, development costs, duration and organisation, as well as it may open new ways in ground-to-board communication and spacecraft operation.
APA, Harvard, Vancouver, ISO, and other styles
7

Schwetz, Paulete Fridman, Pietra Fritsch Araujo, Yasmin Monti Winter, and Laura Marengo Bentancur. "Capacitando profissionais e discentes na modelagem BIM." In IV ENCONTRO NACIONAL SOBRE O ENSINO DE BIM. ANTAC, 2022. http://dx.doi.org/10.46421/enebim.v4i00.1890.

Full text
Abstract:
O emprego da Tecnologia da Informação, associado ao desenvolvimento de ferramentas computacionais gráficas, proporcionou grande avanço e significou uma transformação para a indústria de AEC, tendo como base o Computer Aided Design (CAD) na representação de projetos. Entretanto, uma quebra de paradigma vem acontecendo na concepção e representação desses projetos. Building Information Modeling (BIM) representa uma nova geração de ferramentas que proporcionam uma modelagem orientada ao objeto e gerenciam a informação da construção no ciclo de vida do projeto (BAZJANAC, 2006). Atualmente, o BIM conta com 10 dimensões, a saber: (i) protocolos, onde são criadas as leis gerais de implementação, (ii) colaboração, onde acontece a introdução de trabalhos colaborativos e o desenvolvimento de novas soluções integradas de gerenciamento, (iii) modelagem, que consiste na modelagem tridimensional e informações digitais para visualizar e realizar alterações de projeto em tempo real, (iv) cronograma, onde pode ser feito um planejamento da evolução do empreendimento ao longo do tempo, a partir dos dados coletados no projeto, (v) custos, com foco nas questões financeiras do projeto, analisando orçamentos, (vi) sustentabilidade, que avalia a sustentabilidade e o uso de equipamentos que utilizam energias renováveis, com preocupação na redução dos impactos ambientais, na redução do consumo de recursos e em promover um canteiro de obras sustentável; (vii) ciclo de vida, que visa o gerenciamento de determinados pontos a longo prazo, o que é importante para garantir a eficiência e durabilidade das edificações.; (viii) segurança, que compreende as ações para a segurança ocupacional e a prevenção de acidentes durante a execução dos projetos; (ix) lean construction, direcionado para as ações que visam reduzir os desperdícios e excessos; e (x) construção industrializada, que é uma forma para industrializar a construção civil, de maneira sequenciada, interligando setores e gerando produtividade (WILDENER,2020) . O BIM é um processo baseado em modelos paramétricos, que promove a integração de profissionais e sistemas com interoperabilidade de dados (GRAY et al, 2013). Esta abordagem requer, de seus usuários, habilidade de domínio específico para que os objetos modelados mostrem o comportamento inteligente, impondo, ainda, uma prática que transcende as questões operacionais do trabalho. Torna-se importante, portanto, capacitar os profissionais da área, bem como os discentes oriundos dos cursos de graduação das universidades, na utilização destas ferramentas. Por outro lado, verifica-se que a evolução dos recursos tecnológicos demanda uma mudança na sociedade, que trouxe um impacto direto na forma de ensino e aprendizagem. Segundo Behar (2013), uma das consequências destas mudanças é o surgimento de uma sociedade interconectada, onde a transação da informação é realizada de uma forma rápida e fácil. Dentro desta concepção, a educação e os modelos de ensino atuais colocam a necessidade de valorizar as interações e maior protagonismo do estudante. A utilização da Educação a Distância (EaD) surge como uma excelente alternativa, pois expande novas possibilidades de aprendizado por meio de metodologias ativas, comunidades de aprendizagem, redes de convivência para o desenvolvimento de competências e habilidades e uma formação mais reflexiva e autônoma. O objetivo deste trabalho é o desenvolvimento de um curso à distância para o ensino da ferramenta computacional para a representação de projetos de engenharia e arquitetura denominada REVIT. Essa ferramenta foi desenvolvida pela empresa Autodesk Inc. dentro do conceito BIM, permitindo a modelagem orientada ao objeto da edificação. Existem diversos programas computacionais para a modelagem dentro do conceito BIM. Esta pesquisa escolheu o software REVIT, por permitir o desenvolvimento de projetos tanto de arquitetura como de engenharias, oferecer uma biblioteca ampla de utilização e disponibilizar uma versão gratuita a todo o estudante vinculado a uma instituição de ensino. Desta forma, procurou-se oportunizar um espaço de ensino e aprendizagem, onde as tecnologias digitais, associadas a um modelo pedagógico eficiente, sejam articuladas para uma formação profissional condizente com o que é esperado da educação superior e do mercado de trabalho nos dias de hoje. O modelo pedagógico foi desenvolvido com base no referencial teórico consultado (MORAN, J.M,2020; NONAKA, I., 2019; BEHAR et al 2007; AL-QDAH, 2017) com quatro diferentes propostas de aprendizado: (i) textos explicativos com ilustrações, através de arquivos gerados em formato pdf, com o intuito de facilitar seu acesso; (ii) atividades práticas, orientadas passo-a-passo, a serem desenvolvidas utilizando a ferramenta computacional REVIT (disponível gratuitamente em versão estudantil); (iii) soluções de atividades, apresentadas em formato de vídeo, gerado a partir de capturas de tela do REVIT; e (iv) atividade desafio, onde o aluno deve desenvolver um projeto proposto, utilizando o conteúdo trabalhado no tópico estudado. Durante o processo de aprendizagem, o discente responde a dois questionários auto avaliativos com o objetivo de verificar a construção de seu conhecimento. O modelo propõe, ainda, um terceiro questionário com caráter avaliativo, que libera o avanço no curso através de um recurso de restrição. A partir da criação do modelo, foi desenvolvido um curso EaD, com identidade visual própria, visando uma interface clara, de fácil entendimento, com base nos conceitos de design educacional. Foram concebidos materiais instrucionais, bem como a criação de interações e procedimentos de avaliação. Esse curso foi confeccionado no ambiente virtual de aprendizagem (AVA) MOODLE UFRGS COLABORAÇÃO e pode ser visualizado no link https://www.youtube.com/watch?v=QBqAVeQ06RA. O curso está passando pela fase final de implementação e análise de dados, a partir da formação de vários grupos de alunos de graduação de engenharia e arquitetura, com diferentes perfis, cujo pressuposto é o não conhecimento prévio da ferramenta computacional. A partir da validação do modelo pedagógico para o ensino do REVIT através do curso EaD, pretende-se disponibilizá-lo, através de um curso de extensão, para a capacitação de alunos de graduação e profissionais da indústria da Arquitetura, Engenharia e Construção (AEC) no Brasil.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography