Academic literature on the topic 'Smarty (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Smarty (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Smarty (Computer file)"

1

Alrobieh, Ziad Saif, and Ali Mohammed Abdullah Ali Raqpan. "File Carving Survey on Techniques, Tools and Areas of Use." Transactions on Networks and Communications 8, no. 1 (February 28, 2020): 16–26. http://dx.doi.org/10.14738/tnc.81.7636.

Full text
Abstract:
In digital and computer forensics, file carving is a very hot research topic. That is the main reason why the research is needed to be focused on improving file carving techniques, so that digital investigation can obtain important data and evidence from damaged or corrupted storage media. In the digital forensic investigation, analyzing the unallocated space of storage media is necessary to extract the deleted or pre-written files when the file system metadata is missing or corrupted. Data carving can be defined as a method to recover the file from unallocated space based on different factors such as file type, information of the file (Header/Footer), or the contents of the file. Research in this area focuses on technological improvements in terms of tools and techniques over the past years. The studies examine different techniques of data carving, especially multimedia files (eg. images and videos). The work file carving is classified into three categories classic carving techniques, intelligent carving techniques and smart carving techniques. Moreover, there are seven popular multimedia carving tools that are mostly used and experimentally evaluated are presented. We conclude that proposing new advanced method for carving multimedia files still open and new direction for future research. This is because the fragmentations and compression are very commons used and useful for these kind of files.
APA, Harvard, Vancouver, ISO, and other styles
2

Harabuga, Yu S. "FEATURES OF COMPUTER TECHNICAL RESEARCH OF THE INFORMATION IN THE MEMORY OF SIM, USIM AND R-UIM-CARDS." Theory and Practice of Forensic Science and Criminalistics 17 (November 29, 2017): 318–24. http://dx.doi.org/10.32353/khrife.2017.40.

Full text
Abstract:
The paper considers the features of expert research of elementary files contents of SIM, USIM and R-UIM-cards, the information on which is absent in the current edition of technique 10.9.10 «Technique of computer technical research of information in the memory of SIM-cards». Effective standards which regulate the structure of files in SIM, USIM and R-UIM-cards, are specified. For today there are three types of identification modules of cellular communication customers: SIM-cards for networks of standard GSM, R-UIM-cards for networks ofstandard CDMA and USIM-cards for networks ofstandards UMTS and LTE. The hierarchical structure of a SIM-card corresponds to the hierarchical structure of a smart card of standard ISO/IEC 7816-4 and consists from three types of files: the main file (MF), the intended file (DF) and an elementary file (EF). For addressing or identification of each concrete file the identifier of a file is used which consists of two bytes. The first byte ofthe identifier definesfile type. The attention is paid to the elementary file EFspn in which the name of a cellular communication operator is stored. The theoretical and practical information concerning research of the content of the intended file DFpHONEBCOK is presented in which the telephone book of an USIM-card is stored. It’s specified that elementary file EFSMS is stored in the memory of a R-UIM-card in other intended file in comparison with SIM and USIM-cards. The research algorithm of contents EFSMS file in memory of a R-UIM-card is offered. The attention that in identification number of a R-UIM-card some Ukrainian CDMA-operators specify a mobile code of the country 255 instead of the international telephone code of Ukraine 380, is paid. Keeping in mind the presented information will help to avoid expert errors during computer technical research of the information in the memory of SIM, USIM and R-UIM-cards.
APA, Harvard, Vancouver, ISO, and other styles
3

N. Sangeeta and Seung Yeob Nam. "Blockchain and Interplanetary File System (IPFS)-Based Data Storage System for Vehicular Networks with Keyword Search Capability." Electronics 12, no. 7 (March 24, 2023): 1545. http://dx.doi.org/10.3390/electronics12071545.

Full text
Abstract:
Closed-circuit television (CCTV) cameras and black boxes are indispensable for road safety and accident management. Visible highway surveillance cameras can promote safe driving habits while discouraging moving violations. According to CCTV laws, footage captured by roadside cameras must be securely stored, and authorized persons can access it. Footages collected by CCTV and Blackbox are usually saved to the camera’s microSD card, the cloud, or hard drives locally but there are concerns about security and data integrity. These issues may be addressed by blockchain technology. The cost of storing data on the blockchain, on the other hand, is prohibitively expensive. We can have decentralized and cost-effective storage with the interplanetary file system (IPFS) project. It is a file-sharing protocol that stores and distributes data in a distributed file system. We propose a decentralized IPFS and blockchain-based application for distributed file storage. It is possible to upload various types of files into our decentralized application (DApp), and hashes of the uploaded files are permanently saved on the Ethereum blockchain with the help of smart contracts. Because it cannot be removed, it is immutable. By clicking on the file description, we can also view the file. DApp also includes a keyword search feature to assist us in quickly locating sensitive information. We used Ethers.js’ smart contract event listener and contract.queryFilter to filter and read data from the blockchain. The smart contract events are then written to a text file for our DApp’s keyword search functionality. Our experiment demonstrates that our DApp is resilient to system failure while preserving the transparency and integrity of data due to the immutability of blockchain.
APA, Harvard, Vancouver, ISO, and other styles
4

Carthen, Chase D., Araam Zaremehrjardi, Vinh Le, Carlos Cardillo, Scotty Strachan, Alireza Tavakkoli, Frederick C. Harris Jr., and Sergiu M. Dascalu. "A Novel Spatial Data Pipeline for Orchestrating Apache NiFi/MiNiFi." International Journal of Software Innovation 12, no. 1 (November 1, 2023): 1–14. http://dx.doi.org/10.4018/ijsi.333164.

Full text
Abstract:
In many smart city projects, a common choice to capture spatial information is the inclusion of lidar data, but this decision will often invoke severe growing pains within the existing infrastructure. In this article, the authors introduce a data pipeline that orchestrates Apache NiFi (NiFi), Apache MiNiFi (MiNiFi), and several other tools as an automated solution to relay and archive lidar data captured by deployed edge devices. The lidar sensors utilized within this workflow are Velodyne Ultra Puck sensors that produce 6-7 GB packet capture (PCAP) files per hour. By both compressing the file after capturing it and compressing the file in real-time; it was discovered that GZIP and XZ both saved considerable file size being from 2-5 GB, 5 minutes in transmission time, and considerable CPU time. To evaluate the capabilities of the system design, the features of this data pipeline were compared against existing third-party services, Globus and RSync.
APA, Harvard, Vancouver, ISO, and other styles
5

Telagam, Nagarjuna, Nehru Kandasamy, Menakadevi Nanjundan, and Arulanandth TS. "Smart Sensor Network based Industrial Parameters Monitoring in IOT Environment using Virtual Instrumentation Server." International Journal of Online Engineering (iJOE) 13, no. 11 (November 22, 2017): 111. http://dx.doi.org/10.3991/ijoe.v13i11.7630.

Full text
Abstract:
A remote monitoring and control are one of the most important criteria for maximizing the production in any industry. With the development of modern industry the requirement for industrial monitoring system is getting higher. This project explains the real time scenario of monitoring temperature and humidity in industries. National Instruments my RIO is used and results are observed on Lab VIEW and VI Server. The server VI program and client VI program is developed in block diagram for the two sensor data. This proposed system develops a sensor interface device essential for sensor data acquisition of industrial Wireless Sensor Networks (WSN) in Internet of Things (IOT) environment. By detecting the values of sensors like temperature, humidity present in the industrial area. The results are displayed on the web page. The data can be accessed with admin name and password. After logging into the web page the index of files is displayed. After restarting the mine RIO kit and initiate the deploying process the nations will display log.csv file. By double clicking the file the excel sheet will appear on the computer. This VI server is tested for its working, using a data acquisition web application using a standard web browser. The critical situation can be avoided and preventive measures are successfully implemented.
APA, Harvard, Vancouver, ISO, and other styles
6

Alukwe, Chrispus. "Enhancing Cybersecurity: Smart Intrusion Detection in File Server SYSTEMS." Journal of Science, Innovation and Creativity 2, no. 1 (August 17, 2023): 1–6. http://dx.doi.org/10.58721/jsic.v2i1.287.

Full text
Abstract:
System security is a major challenge worldwide, which has led to the increasing implementation of security surveillance systems in the public and private sectors. Likewise, it is inevitable to secure server-based systems that store vast amounts of sensitive data that is accessed from time to time. Intrusion Detection Systems (IDS) use metrics to detect anomalous activity on computers and computer networks. Modern detection algorithms try to reach detection metrics by acting as an antivirus. This is not enough, the need to explore more controlled, porous, and more secure systems is inevitable, hence this research. Therefore, this study’s main objective is to develop smart intrusion detection systems for file servers and client machines that can be used within any networked environment. A qualitative research methodology was employed in the study. The sources of information included four databases: SpringerOpen, EBSCO, Google Scholar, and Direct Science. The key findings of the study are that cyber-attacks and threats are increasing, and new strategies are needed to handle them because the current intrusion detection systems experience challenges and are unable to detect malware. Intrusion detection systems are the next-generation protection, which offers the visibility to identify advanced threats within legitimate content, even authorized applications and trusted sources. Organizations are recommended to implement smart IDSs in front of file server systems and behind the firewall to ensure all malware is filtered.
APA, Harvard, Vancouver, ISO, and other styles
7

Srivastava, Nayan. "A.I.- Smart Assistant." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 25, 2021): 2384–87. http://dx.doi.org/10.22214/ijraset.2021.35553.

Full text
Abstract:
Artificial Intelligent is widely used when it comes to everyday life. Computer science explains AI research as a study of brilliant agents. Every In almost any direction one turns to today, some computer-based information processing technology intervention, whether by a person knowingly or not. Artificial Intelligence has already changed our way of life. A device that we can see in its nature and take action increases its chances of success goals. Input to the recommendations algorithm can be a file for user database and items, and careless removal will be recommendations. User to install in the system by voice or text. This paper presents a new approach to it. All over the world, many people use the assistant. This paper introduces visual applications an assistant that helps to give humanity a chance at various domains. This paper also describes the annoyance of using visual assistant technology.
APA, Harvard, Vancouver, ISO, and other styles
8

Qiao, Yanchen, Weizhe Zhang, Xiaojiang Du, and Mohsen Guizani. "Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security." ACM Transactions on Internet Technology 22, no. 1 (February 28, 2022): 1–22. http://dx.doi.org/10.1145/3436751.

Full text
Abstract:
With the construction of smart cities, the number of Internet of Things (IoT) devices is growing rapidly, leading to an explosive growth of malware designed for IoT devices. These malware pose a serious threat to the security of IoT devices. The traditional malware classification methods mainly rely on feature engineering. To improve accuracy, a large number of different types of features will be extracted from malware files in these methods. That brings a high complexity to the classification. To solve these issues, a malware classification method based on Word2Vec and Multilayer Perception (MLP) is proposed in this article. First, for one malware sample, Word2Vec is used to calculate a word vector for all bytes of the binary file and all instructions in the assembly file. Second, we combine these vectors into a 256x256x2-dimensional matrix. Finally, we designed a deep learning network structure based on MLP to train the model. Then the model is used to classify the testing samples. The experimental results prove that the method has a high accuracy of 99.54%.
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Zhenwei, Axin Wu, Yifei Li, Qixuan Xing, and Shengling Geng. "Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing." Security and Communication Networks 2021 (January 20, 2021): 1–11. http://dx.doi.org/10.1155/2021/6619689.

Full text
Abstract:
The emergence of the cloud storage has brought great convenience to people’s life. Many individuals and enterprises have delivered a large amount of data to the third-party server for storage. Thus, the privacy protection of data retrieved by the user needs to be guaranteed. Searchable encryption technology for the cloud environment is adopted to ensure that the user information is secure with retrieving data. However, most schemes only support single-keyword search and do not support file updates, which limit the flexibility of the scheme. To eliminate these problems, we propose a blockchain-enabled public key encryption scheme with multi-keyword search (BPKEMS), and our scheme supports file updates. In addition, smart contract is used to ensure the fairness of transactions between data owner and user without introducing a third party. At the data storage stage, our scheme realizes the verifiability by numbering the files, which ensures that the ciphertext received by the user is complete. In terms of security and performance, our scheme is secure against inside keyword guessing attacks (KGAs) and has better computation overhead than other related schemes.
APA, Harvard, Vancouver, ISO, and other styles
10

Jawdhari, Hayder A., and Alharith A. Abdullah. "A New Environment of Blockchain based Multi Encryption Data Transferring." Webology 18, no. 2 (December 30, 2021): 1379–91. http://dx.doi.org/10.14704/web/v18i2/web18396.

Full text
Abstract:
Blockchain is one of the technologies provided by the global distribution of computing power. Simply put, the blockchain is the digital ledger in which transactions are recorded. It all started with a desire to see a new form of security system for transferring confidential files. It aims to achieve many goals like decreasing the process time for transferring files to the other party, and reducing the overall expenses as the files are only transferred across the blockchain network with no need for the files to be uploaded and downloaded to the drive. More effective applications have the ability to share files via the technology of Blockchain. The great challenge is to build a private blockchain environment to send files and distribute them securely between parties, such as military institutions and others. In this paper, a private blockchain is built to overcome the side of the security through a secured file-sharing network. This private Blockchain can be utilized at various institutions. A high scale of security is obtained through using an important algorithm that takes into consideration a critical part of the field of cryptography to robustly encrypt the files. The latter ensures that no individual except for the receiver has the ability to access the files. As well, a sufficient speed was obtained when transferring the files, as compared to Ethereum with FTP. Finally, smart contracts have been designed to suit the transfer of files between nodes.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Smarty (Computer file)"

1

Chen, Zhuo. "Smart Sequence Similarity Search (S⁴) system." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2458.

Full text
Abstract:
Sequence similarity searching is commonly used to help clarify the biochemical and physiological features of newly discovered genes or proteins. An efficient similarity search relies on the choice of tools and their associated subprograms and numerous parameter settings. To assist researchers in selecting optimal programs and parameter settings for efficient sequence similarity searches, the web-based expert system, Smart Sequence Similarity Search (S4) was developed.
APA, Harvard, Vancouver, ISO, and other styles
2

Abdul, Rahim Muhammad Afzam Shah Bin. "An investigation of computer vision syndrome with smart devices." Thesis, University of Plymouth, 2018. http://hdl.handle.net/10026.1/12813.

Full text
Abstract:
The overarching theme of the thesis was to investigate the association between smart device use and computer vision syndrome. The initial study designed and developed the Open Field Tear film Analyser (OFTA) enabling a continuous, real-time assessment of the tear film and blink characteristics during smart device use. The monocular OFTA prototype was validated and showed good intra- and inter-observer repeatability relative to the Oculus Keratograph 5M and Bausch and Lomb one position keratometer. Subsequently, tear osmolarity following engagement with reading and gaming tasks on smart device and paper platforms was investigated. Discrete measures of osmolarity pre- and post-engagement with the tasks were obtained with the TearLab osmometer; osmolarity values differed between platforms when participants were engaged in a gaming task but no such difference was observed with the reading task. In addition, the influence of repeated measurements on tear osmolarity was also explored. To simulate the habitual binocular viewing conditions normally associated with smart device use, the binocular OFTA was developed. The device was used to assess the tear film and blink characteristics whilst engaging with reading and gaming tasks on smart device and paper platforms. The results revealed differences in blink characteristics and non-invasive tear break up time between the different platforms and tasks assessed. In addition, the thesis also reports on an investigation examining the real-time accommodative response to various targets displayed on smart devices using an open-field autorefractor with a Badal lens system adaptation. The results showed that accommodative latency, accommodative lag, mean velocity of accommodation, speed of disaccommodation and mean velocity of disaccommodation varied across the different platforms. Through the use of validated subjective questionnaires and smartphone apps, the relationship between duration of smartphone use and symptoms of dry eye were examined. The findings of this study demonstrated that longer duration of smartphone and personal computer use were associated with higher risk of dry eyes as indicated by subjective questionnaire outcomes.
APA, Harvard, Vancouver, ISO, and other styles
3

Andersson, Oscar. "Securing Electronic Health Records : A Blockchain Solution." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-107330.

Full text
Abstract:
Blockchain is an interesting technology, with different projects developing every day since it first gained its light back in 2008. More and more research finds blockchain useful in several different sectors. One of the sectors being healthcare, specifically for electronic health records (EHR). EHR contains highly sensitive data which is critical to protect and, just in the year 2019, 41,232,527 records were deemed stolen. Blockchain can provide several benefits when it comes to EHR, such as increased security, availability, and privacy, however, it needs to be done correctly. Due to blockchain being a rather novel technology, there is room for improvement when it comes to integrating blockchain with EHR. In this thesis a framework for EHR in the healthcare sector is proposed, using Ethereum based smart contracts together with decentralized off-chain storage using InterPlanetary File System (IPFS) and strong symmetric encryption. The framework secures the records and provides a scalable solution. Furthermore, a discussion and evaluation regarding several security aspects that the framework excels on as well as what the framework could improve on.
APA, Harvard, Vancouver, ISO, and other styles
4

Chahbi, Ismehene. "Exploitation des antennes multiples pour l'optimisation dans les réseaux sans fil." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2011. http://www.theses.fr/2011TELE0008.

Full text
Abstract:
Les récentes avancées dans le domaine du traitement d'antennes et dans la microélectronique ont fait naître la technologie des antennes intelligentes connue sous le nom de "smart antennas". Considérée comme rupture technologique pour les réseaux sans fil, les systèmes d'antennes intelligentes pourraient répondre aux exigences de plus en plus fortes des applications et services en termes de débit, de capacité et de connectivité. Aujourd'hui, les smart antennas sont exploitées pour développer plusieurs technologies incluant les systèmes de commutation de faisceaux, les antennes adaptatives et les systèmes MIMO (Multiple Input Multiple Output). L'utilisation des antennes MIMO a été reconnue comme une technologie-clé, capable d'accroître considérablement la capacité des réseaux sans fil en exploitant différemment et mieux le spectre radio. Elle fait partie des récents et futurs standards tels que le 3GPP-LTE et le IEEE-802.11n. Dans cette thèse, nous nous sommes intéressés à l'exploitation des techniques multi-antennes dans le contexte des réseaux mobiles. Nous nous sommes focalisés principalement sur deux axes de recherche : la formation de faisceaux et le multiplexage spatial. Dans une première étude, nous avons proposé un schéma de formation de faisceaux, basé sur la technique LCMV (Linearly Constrained Minimum Variance) et permettant de former des faisceaux plus adaptés en cas de mobilité. Dans cette solution, l'incertitude sur la localisation des nœuds est compensée par des faisceaux de largeurs adaptées. De plus, dans le cas où les paramètres (vitesse et direction) de mouvement des nœuds sont connus, nous avons proposé d'exploiter des techniques simples d'extrapolation afin de limiter les calculs complexes des méthodes de poursuite continue (tracking), très consommatrices en ressources. Dans une seconde étude, nous avons proposé une solution d'ordonnancement basée sur la technique du multiplexage spatial qui est une caractéristique fondamentale des systèmes MIMO. L'algorithme proposé (SCLS : Stream-Controlled Multiple Access) exploite les informations inter-couches (cross-layer) : environnement radio de la couche PHY et charge de trafic de la couche LIEN. Il permet de choisir l'ensemble des liens à activer simultanément et détermine sur chacun de ces liens, le nombre d'antennes à utiliser pour transmettre des flux parallèles. SCLS permet ainsi de minimiser le temps nécessaire pour satisfaire les demandes de trafic et de maximiser le débit global utilisé à chaque instant. Dans la troisième étude, nous avons considéré la problématique d'estimation des directions d'arrivée et de départ. Nous avons proposé un algorithme (E-Capon) d'estimation conjointe de ces directions ainsi que du retard de propagation des trajets multiples dans un canal MIMO. Nous nous sommes basés sur la méthode de Capon qui permet de réduire la complexité de traitement pour offrir une estimation rapide et robuste des informations relatives à la localisation des nœuds. Notre objectif est de concevoir une technique mieux adaptée aux changements dynamiques de topologie que l'on peut observer dans les réseaux sans fil
Recent advances in antennas processing and microelectronics have helped for the emergence of smart antennas and their use in public telecommunication systems. This technology allows sophisticated signal processing and provides significant performance benefits such as increased spectral efficiencies, reduced power consumption, interference cancellation, increased communication reliability and better connectivity. Smart antennas represent a broad variety of antenna technologies that significantly differ in terms of performance and transceiver complexity. The different antennas technologies include switched-beam antennas, adaptive array antennas and multiple-input multiple-output (MIMO) systems. The latter is already being implemented in latest generation equipments and standards like 3GPP-LTE and IEEE 802.11n. The focus of this thesis is to explore the various capabilities of smart antennas and to propose new mechanisms and systems for their use. In particular, we were interested in exploiting two multi-antenna systems' capabilities: spatial multiplexing and beamforming. In the first part of this thesis, we propose a new dynamic beamforming technique for mobile ad hoc networks, based on the LCMV beamformer. Mobiles nodes derive the weight vectors to form dynamic beams more adapted to their mobility parameters. The proposed scheme allows to form dynamic beams with less complexity but more adapted to possible uncertainty on mobile node locations.. Performance evaluations show that the proposed approach enhances system capacity and connectivity while reducing localization overhead and beam forming complexity. In the second part of this thesis, we design and evaluate a joint stream control and link TDMA-based scheduling algorithm (SCLS) for MIMO wireless mesh networks. SCLS is a cross layer resource allocation scheme that selects links to be activated simultaneously and determines the optimal number of streams to be used on each of them. This selection is based on streams' channel gains, traffic demands and interference levels. The proposed algorithm optimizes both the frame length and network capacity and throughput. In the third part, a joint Angle of Arrival (AOA), Angle of Departure (AOD) and Delay of Arrival algorithm, based on the Capon Beamformer, is proposed. These physical parameters of the received signals are needed to develop advanced antenna systems and other applications such as localization in indoor environments.The proposed algorithm reduces both complexity and computation time compared to subspace-based existing methods. The proposed approach works even if the number of multipaths exceeds the number of antenna elements
APA, Harvard, Vancouver, ISO, and other styles
5

Chahbi, Ismehene. "Exploitation des antennes multiples pour l'optimisation dans les réseaux sans fil." Phd thesis, Institut National des Télécommunications, 2011. http://tel.archives-ouvertes.fr/tel-00995412.

Full text
Abstract:
Les récentes avancées dans le domaine du traitement d'antennes et dans la microélectronique ont fait naître la technologie des antennes intelligentes connue sous le nom de "smart antennas". Considérée comme rupture technologique pour les réseaux sans fil, les systèmes d'antennes intelligentes pourraient répondre aux exigences de plus en plus fortes des applications et services en termes de débit, de capacité et de connectivité. Aujourd'hui, les smart antennas sont exploitées pour développer plusieurs technologies incluant les systèmes de commutation de faisceaux, les antennes adaptatives et les systèmes MIMO (Multiple Input Multiple Output). L'utilisation des antennes MIMO a été reconnue comme une technologie-clé, capable d'accroître considérablement la capacité des réseaux sans fil en exploitant différemment et mieux le spectre radio. Elle fait partie des récents et futurs standards tels que le 3GPP-LTE et le IEEE-802.11n. Dans cette thèse, nous nous sommes intéressés à l'exploitation des techniques multi-antennes dans le contexte des réseaux mobiles. Nous nous sommes focalisés principalement sur deux axes de recherche : la formation de faisceaux et le multiplexage spatial. Dans une première étude, nous avons proposé un schéma de formation de faisceaux, basé sur la technique LCMV (Linearly Constrained Minimum Variance) et permettant de former des faisceaux plus adaptés en cas de mobilité. Dans cette solution, l'incertitude sur la localisation des nœuds est compensée par des faisceaux de largeurs adaptées. De plus, dans le cas où les paramètres (vitesse et direction) de mouvement des nœuds sont connus, nous avons proposé d'exploiter des techniques simples d'extrapolation afin de limiter les calculs complexes des méthodes de poursuite continue (tracking), très consommatrices en ressources. Dans une seconde étude, nous avons proposé une solution d'ordonnancement basée sur la technique du multiplexage spatial qui est une caractéristique fondamentale des systèmes MIMO. L'algorithme proposé (SCLS : Stream-Controlled Multiple Access) exploite les informations inter-couches (cross-layer) : environnement radio de la couche PHY et charge de trafic de la couche LIEN. Il permet de choisir l'ensemble des liens à activer simultanément et détermine sur chacun de ces liens, le nombre d'antennes à utiliser pour transmettre des flux parallèles. SCLS permet ainsi de minimiser le temps nécessaire pour satisfaire les demandes de trafic et de maximiser le débit global utilisé à chaque instant. Dans la troisième étude, nous avons considéré la problématique d'estimation des directions d'arrivée et de départ. Nous avons proposé un algorithme (E-Capon) d'estimation conjointe de ces directions ainsi que du retard de propagation des trajets multiples dans un canal MIMO. Nous nous sommes basés sur la méthode de Capon qui permet de réduire la complexité de traitement pour offrir une estimation rapide et robuste des informations relatives à la localisation des nœuds. Notre objectif est de concevoir une technique mieux adaptée aux changements dynamiques de topologie que l'on peut observer dans les réseaux sans fil.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Smarty (Computer file)"

1

Smith, Roderick W. Linux Administrator Street Smarts. New York: John Wiley & Sons, Ltd., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Using Smart. Indianapolis, Ind: Que Corp., 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nelson, Stephen L. Smart guide to Windows 98. New York: B & N Books, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Faster smarter Microsoft Windows XP: Take charge of Windows Xp - faster, smarter, better! Redmond, Wash: Microsoft Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Crawford, Sharon. Faster smarter Microsoft Windows 98. Redmond, Wash: Microsoft Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Karuppan, Muthu. Learning Smart: A complete guide to Smart integrated software. Homewood, IL: Irwin, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Knezek, Gerald A. The Smart primer. Dubuque, IA: Wm.C. Brown Publishers, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Knezek, Gerald A. The Smart primer. Dubuque, Iowa: W.C. Brown, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Smart simplified. Blue Ridge Summit, PA: Windcrest, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schwartz, Andrew N. Smart--tips, tricks, and traps. Indianapolis, Ind: Que Corp., 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Smarty (Computer file)"

1

Karpov, Vladimir E. "A Systematic Approach to Present “Files and File Systems” in Theoretical Courses of Computer Science." In Smart Modelling for Engineering Systems, 249–59. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4619-2_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tanaka, Tadatsugu, Hiroshi Mori, Kenji Okajima, and Askar Zh Zhussupbekov. "Computed and observed deformations of fill-type dams by strong earthquake." In Smart Geotechnics for Smart Societies, 1182–90. London: CRC Press, 2023. http://dx.doi.org/10.1201/9781003299127-169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Markantonakis, Constantinos. "Secure Log File Download Mechanisms for Smart Cards." In Lecture Notes in Computer Science, 285–304. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10721064_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ma, Yibing, Xuetao Feng, Jile Jiao, Zhongdong Peng, Shenger Qian, Hui Xue, and Hua Li. "Smart Fire Alarm System with Person Detection and Thermal Camera." In Lecture Notes in Computer Science, 353–66. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50436-6_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pokhrel, Peshal, and Hamdy Soliman. "Advancing Early Forest Fire Detection Utilizing Smart Wireless Sensor Networks." In Lecture Notes in Computer Science, 63–73. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03062-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kirstein, Fabian, Dario Bacher, Vincent Bohlen, and Sonja Schimmler. "Ronda: Real-Time Data Provision, Processing and Publication for Open Data." In Lecture Notes in Computer Science, 165–77. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84789-0_12.

Full text
Abstract:
AbstractThe provision and dissemination of Open Data is a flourishing concept, which is highly recognized and established in the government and public administrations domains. Typically, the actual data is served as static file downloads, such as CSV or PDF, and the established software solutions for Open Data are mostly designed to manage this kind of data. However, the rising popularity of the Internet of things and smart devices in the public and private domain leads to an increase of available real-time data, like public transportation schedules, weather forecasts, or power grid data. Such timely and extensive data cannot be used to its full potential when published in a static, file-based fashion. Therefore, we designed and developed Ronda - an open source platform for gathering, processing and publishing real-time Open Data based on industry-proven and established big data and data processing tools. Our solution easily enables Open Data publishers to provide real-time interfaces for heterogeneous data sources, fostering more sophisticated and advanced Open Data use cases. We have evaluated our work through a practical application in a production environment.
APA, Harvard, Vancouver, ISO, and other styles
7

Shen, Yiming, Kunhua Li, Lin Mao, Wenkai Li, and Xiaoqi Li. "IntelliCon: Confidence-Based Approach for Fine-Grained Vulnerability Analysis in Smart Contracts." In Communications in Computer and Information Science, 45–59. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-8101-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Moon, KwangTae, YunHwan Lee, Dongwan Kim, and Jongbae Kim. "Smart Home-Based Home Modification Program for Persons with Disabilities: A Pilot Study." In Lecture Notes in Computer Science, 266–71. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09593-1_22.

Full text
Abstract:
AbstractSmart Home Technology (SHT) as assistive technology (AT) is becoming an important active research field in the field of rehabilitation. For this purpose, Home Modification (HM) is one of the most common ways to improve the quality of life of the Persons with physical disabilities (PwPD). In this context, we propose a new Smart Home-based Home Modification Program (SHbHM) to improve the quality of life for PwPD. Our method simply uses Bluetooth or extends to Wi-Fi and Zigbee networks. A pilot study was conducted with five PwPD at home to investigate the effectiveness of the program. The reported results show a high quality of life, and the occupational performance and satisfaction are greatly improved, indicating that it is an efficient alternative.
APA, Harvard, Vancouver, ISO, and other styles
9

Pahuja, Abhishek, Sandeep Kumar, Vipul Agarwal, Manoj Singh Parihar, and V. Dinesh Kumar. "Turnstile Diamond Dipole Nanoantenna Based Smart City Compatible Thin Film Solar Cell." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 216–22. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-48891-7_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sun, Jinlu, Hongqiang Fang, Jiansheng Wu, Ting Sun, and Xingchuan Liu. "Application of Bayesian Belief Networks for Smart City Fire Risk Assessment Using History Statistics and Sensor Data." In Communications in Computer and Information Science, 3–11. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2810-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Smarty (Computer file)"

1

Kuraki, Kensuke, Keizo Kato, Shohei Nakagata, and Ryuta Tanaka. "File transfer system by a hidden ID signaling using camera in smart devices: Easy file sharing between computers and smart devices." In 2016 IEEE 12th International Colloquium on Signal Processing & Its Applications (CSPA). IEEE, 2016. http://dx.doi.org/10.1109/cspa.2016.7515818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chang, Carl K., Hen-I. Yang, Igors Svecs, and Johnny Wong. "REACH platform — Remote access to smart home facility based computer science laboratory." In 2010 IEEE Frontiers in Education Conference (FIE). IEEE, 2010. http://dx.doi.org/10.1109/fie.2010.5673145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Neumann, Guilherme Borba, Vitor Pinheiro de Almeida, and Markus Endler. "Smart Forests: fire detection service." In 2018 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2018. http://dx.doi.org/10.1109/iscc.2018.8538719.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sang, Zhiqian, and Xun Xu. "Development of a Smart Computer Numerical Control System." In ASME 2013 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/imece2013-65984.

Full text
Abstract:
Traditional Computer Numerical Control (CNC) machines use ISO6983 (G/M code) for part programming. G/M code has a number of drawbacks and one of them is lack of interoperability. The Standard for the Exchange of Product for NC (STEP-NC) as a potential replacement for G/M code aims to provide a unified and interoperable data model for CNC. In a modern CNC machine tool, more and more motors, actuators and sensors are implemented and connected to the NC system, which leads to large quantity of data being transmitted. The real-time Ethernet field-bus is faster and more deterministic and can fulfill the requirement of data transmission in the high-speed and high-precision machining scenarios. It can provide more determinism on communication, openness, interoperability and reliability than a traditional field-bus. With a traditional CNC system using G/M code, when the machining is interrupted by incidents, restarting the machining process is time-consuming and highly experience-dependent. The proposed CNC controller can generate just-in-time tool paths for feature-based machining from a STEP-NC file. When machining stoppage occurs, the system can recover from stoppage incidents with minimum human intervention. This is done by generating new tool paths for the remaining machining process with or without the availability of the original cutting tool. The system uses a real-time Ethernet field-bus as the connection between the controller and the motors.
APA, Harvard, Vancouver, ISO, and other styles
5

Hossain, Md Fahad, Rezoana Talukder, Arafat Rahman, Amir Khan, Istiaque Ahamed, and Abir Ahmed. "Designing a Smart Building Fire Disaster Management System for Smart Cities." In 2023 26th International Conference on Computer and Information Technology (ICCIT). IEEE, 2023. http://dx.doi.org/10.1109/iccit60459.2023.10441403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chirila, Ciprianbogdan. "PROGRAMMING GUIDE FOR THE SILVER CODE COMMUNITY." In eLSE 2018. Carol I National Defence University Publishing House, 2018. http://dx.doi.org/10.12753/2066-026x-18-255.

Full text
Abstract:
The digital society evolved in the last decade such that home devices like: telephones, TV sets, refrigerators, light switches, electricity sockets etc. became smart and connected to the internet communicating and taking decisions to assist us in our everyday life. Subway trains became autonomous, automobiles tend to go in the same direction all this progress is based on algorithms for control, image recognition, data mining, machine learning etc. having different levels of complexity. Young people that were born in the digital ecosystem are considered digital natives. They can use easily smart phones, tablets, computers for different everyday life tasks such as: selecting and reading the news, online paying utilities like water, electricity, gas; using ATMs for financial operations etc. On the other hand, elder people which do not have such digital skills do not adapt well to the changes of the society. In order to increase the quality of life for elder people they must be integrated in the continuously growing digital world of the present and of the future through digital education. For the education to have a deep impact we consider that it should go to the bases of the digital fundaments which is programming and specifically coding. Programming concepts for elders are delivered in five modules. The first module presents basic computer programming elements. The second module presents the most important digital thinking elements. The third module presents technical details about a few web technologies like HTML, CSS and JavaScript. The fourth module teaches how to put hands on JavaScript and to build two single page applications. Module five is a glossary of digital terms.
APA, Harvard, Vancouver, ISO, and other styles
7

Yılmaz, Abdurrahman, and Hakan Temeltaş. "Affine ICP for Fine Localization of Smart-AGVs in Smart Factories." In ASME 2019 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/detc2019-97418.

Full text
Abstract:
Abstract With the emergence of the concept of Industry 4.0, smart factories have started to be planned in which the production paradigm will change. Automated Guided Vehicles, abbreviated as AGV, that will perform load carrying and similar tasks in smart factories, Smart-AGVs, will try to reach their destinations on their own route instead of predetermined routes like in today’s factories. Moreover, since they will not reach their targets in a single way, they have to dock a target with their fine localization algorithms. In this paper, an affine Iterative Closest Point, abbreviated as ICP, based fine localization method is proposed, and applied on Smart-AGV docking problem in smart factories. ICP is a point set registration method but it is also used for localization applications due to its high precision. Affine ICP is an ICP variant which finds affine transformation between two point sets. In general, the objective function of ICP is constructed based on least square metric. In this study, we use affine ICP with correntropy metric. Correntropy is a similarity measure between two random variables, and affine ICP with correntropy tries to maximize the similarity between two point sets. Affine ICP has never been utilized in fine localization problem. We make an update on affine ICP by means of polar decomposition to reach transformation between two point sets in terms of rotation matrix and translation vector. The performance of the algorithm proposed is validated in simulation and the efficiency of it is demonstrated on MATLAB by comparing with the docking performance of the traditional ICP.
APA, Harvard, Vancouver, ISO, and other styles
8

Dziri, Halima, Mohamed Ali Cherni, Fethia Abidi, and Asma Zidi. "Fine-Tuning ResNet-152V2 for COVID-19 Recognition in Chest Computed Tomography Images." In 2022 IEEE Information Technologies & Smart Industrial Systems (ITSIS). IEEE, 2022. http://dx.doi.org/10.1109/itsis56166.2022.10118389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Baresi, Luciano, and Mersedeh Sadeghi. "Fine-grained Context-aware Access Control for Smart Devices." In 2018 8th International Conference on Computer Science and Information Technology (CSIT). IEEE, 2018. http://dx.doi.org/10.1109/csit.2018.8486202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhou, Jianlong, Yutian Zheng, and Qian Yang. "Smart Community Construction System Architecture Based on Five-viewing Demands." In 2021 7th International Conference on Computer and Communications (ICCC). IEEE, 2021. http://dx.doi.org/10.1109/iccc54389.2021.9674409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography