Littérature scientifique sur le sujet « Application file »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Application file ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Application file"

1

Liu, Hui, Hanxing Xue et Hui Lu. « A Sensitive File Abnormal Access Detection Method Based on Application Classification ». Security and Communication Networks 2021 (13 mars 2021) : 1–7. http://dx.doi.org/10.1155/2021/6684456.

Texte intégral
Résumé :
As the access control mode of notepad files cannot meet the requirements of risk control for sensitive file hierarchical access, this paper proposes an application classification-based detection method for abnormal access to sensitive files. The application classification and file classification, access control policy mapping, and basic and preset policy detection are designed. Combining the operating system’s identification control of different applications at runtime, we monitor the abnormal access of sensitive files by hierarchical applications. The cross-access experiment of different levels of application to different sensitive files verified the effectiveness and security of hierarchical access control strategy and sensitive file abnormal access detection and reduced the risk of disclosure of sensitive files.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Patil, Vedika, Sakshi Jain et Yogita Shah. « Secure Cryptography by Using Hash Application ». Journal of Cyber Security in Computer System 1, no 1 (11 mai 2022) : 18–24. http://dx.doi.org/10.46610/jcscs.2022.v01i01.002.

Texte intégral
Résumé :
This project is basically design for ensuring security to all kinds of data format file such as pdf, text, images, audio, videos etc. This is carried out using various keys and hashing algorithm. This project basically helps the end user to protect his/her personal files from the unauthorized user and can also restrict its access to the limited people. This complete process is carried out in two methods that are encryption and decryption. Encryption process required varchar key while encryption the data file which convert the original file in to incomprehensible format. Further in decryption process, again by providing the same key file can be converted in to its original format. This helps the user to protect personal file on a public systems like schools, colleges, cyber cafes, hospitals, banks etc. The cryptography is acquired through various algorithms and keys. We are using a XOR key function and Hash function for encrypting and decrypting the data. In this certain key given by user will be XOR with the actual byte code of file for encryption and vice versa for decryption. This ensures to restrict the personal files on a public system.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Hidayat, Rahmat, Marza Ihsan Marzuki, Yuliarman Saragih, Ibrahim Ibrahim, Edmund Ucok Armin, Safrian Andromeda, Imam Budi Santoso et Suroyo Suroyo. « THE COMPARATIVE STUDY ANALYSIS LOGICAL FILES RECOVERY AND LOW LEVEL FILES RECOVERY USING DIGITAL FORENSIC METHODS ». TEKNOKOM 5, no 2 (10 novembre 2022) : 143–48. http://dx.doi.org/10.31943/teknokom.v5i2.84.

Texte intégral
Résumé :
The development of application and network technology is currently so rapid. This technology is widely used as a solution to overcome data inspection problems in the field of Digital Forensics. The importance of Digital Forensics as evidence, especially on computers and mobile devices, is increasing, along with the rapid use of these mobile devices in daily communication. Data and files on computers and smartphones can be deleted intentionally or unintentionally. To recover the data, it is necessary to have Files Recovery. Furthermore, Logical Files Recovery can be made through password encryption, obtained through hack/attack password applications such as Password or even hacked with the "RecoveryMyFile" application. In addition, a search with a file that has a password description can be done. One of the file recovery applications that can be used is the Agent ransack search application, which is more powerful and convenient than Windows Search, which is more complicated if you need to search faster, indexing needs to be done, and restarts. By using Files Recovery analysis, the development of file or data deletion crimes can be overcome with increasingly rapid and advanced information technology, in this case through applications that can be used for file recovery and to restore deleted files.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Moon, Yangchan, et Mingyu Lim. « An Enhanced File Transfer Mechanism Using an Additional Blocking Communication Channel and Thread for IoT Environments ». Sensors 19, no 6 (13 mars 2019) : 1271. http://dx.doi.org/10.3390/s19061271.

Texte intégral
Résumé :
In this paper, we propose an enhanced file transfer mechanism for a communication framework (CM) for Internet of Things (IoT) applications. Our previous file transfer method uses a basic non-blocking communication channel and thread for the CM (non-blocking method), but this method has a cost of adding additional bytes to each original file block. Therefore, it is not suitable for the transfer of large-sized files. Other existing file transfer methods use a separate channel to transfer large-sized files. However, the creation of a separate channel increases the total transmission delay as the transfer frequency increases. The proposed method uses a dedicated blocking communication channel in a separate thread (blocking method). The blocking method uses a separate channel and thread which are dedicated to transferring file blocks. As it creates the separate channel in advance before the file transfer task, the proposed method does not have an additional channel creation cost at the moment of the file transfer. Through file transfer experiments, the blocking method showed a shorter file transfer time than the non-blocking method, and the transmission delay was increased as the file size grew. By supporting both non-blocking and blocking methods, an application can flexibly select the desirable method according to its requirement. If the application requires the transfer of small-sized files infrequently, it can use the non-blocking method. If the application needs to transfer small-sized or large-sized files frequently, a good alternative is to use the blocking method.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Aqilah Mohd Nahar, Nur Farah, Nurul Hidayah Ab Rahman et Kamarudin Malik Mohammad. « E-Raser : File Shredder Application With Content Replacement by Using Random Words Function ». JOIV : International Journal on Informatics Visualization 2, no 4-2 (10 septembre 2018) : 313. http://dx.doi.org/10.30630/joiv.2.4-2.175.

Texte intégral
Résumé :
Data shredding indicates a process of irreversible file destruction while file shredder is the program designed to render computer-based files unreadable by implementing overwriting method to destroy data in the content of a file. The addressable problem with existence of file recovery tools is it may lead to data leakage, exploitation or dissemination from an unauthorized person. Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. A file shredder application named E-Raser was developed to shred Microsoft Word documents with (.doc) or (.docx) format. The implemented algorithm replaced the original content of the files with uninformative words provided by the application. After rewriting phase is complete, shredding process take place to make the file unrecoverable. Object Oriented Software Development was used as the methodology to develop this application. As a result, E-Raser achieved the objectives to add, remove, rewrite, display and shred files. Also, E-Raser is significantly facilitates users to securely dispose their file, protect the confidentiality and privacy of the file’s content.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Lee, Hoo-Ki, Sung-Hwa Han et Daesung Lee. « Kernel-Based Container File Access Control Architecture to Protect Important Application Information ». Electronics 12, no 1 (23 décembre 2022) : 52. http://dx.doi.org/10.3390/electronics12010052.

Texte intégral
Résumé :
Container platforms ease the deployment of applications and respond to failures. The advantages of container platforms have promoted their use in information services. However, the use of container platforms is accompanied by associated security risks. For instance, malware uploaded by users can leak important information, and malicious operators can cause unauthorized modifications to important files to create service errors. These security threats degrade the quality of information services and reduce their reliability. To overcome these issues, important container files should be protected by file-access control functions. However, legacy file-access control techniques, such as umask and SecureOS, do not support container platforms. To address this problem, we propose a novel kernel-based architecture in this study to control access to container files. The proposed container file-access control architecture comprises three components. The functionality and performance of the proposed architecture were assessed by implementing it on a Linux platform. Our analysis confirmed that the proposed architecture adequately controls users’ access to container files and performs on par with legacy file-access control techniques.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Kolte, Prof Roshan R. « FTS : File Tracking System for Railway Board ». International Journal for Research in Applied Science and Engineering Technology 9, no 12 (31 décembre 2021) : 2278–80. http://dx.doi.org/10.22214/ijraset.2021.39741.

Texte intégral
Résumé :
Abstract: The aim of this paper proposes a project based implementation File Tracking System (FTS) used in private and mostly in government sector. This project is built on Railway System using three tier architecture. This application is used to prevent corruption. There are a large number of departments in the Railway Department where file transfer is done from one department to another. The number of files moving within the specific time duration, file allocated to any employee and whether the file has been forwarded or not. Sometimes if someone has to do corruption then they does not send that file forward, seeing all this problem we have developed File Tracking System (FTS), which track the movements of the file within the organization. This application will keep track the movement of files from one desk to another inside the department.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Rahim, Robbi, Solly Aryza, Pristisal Wibowo, Adek Khadijatul Z Harahap, Abdul Rahman Suleman, Edi Epron Sihombing, Yuswin Harputra et al. « Prototype File Transfer Protocol Application for LAN and Wi-Fi Communication ». International Journal of Engineering & ; Technology 7, no 2.13 (15 avril 2018) : 345. http://dx.doi.org/10.14419/ijet.v7i2.13.16917.

Texte intégral
Résumé :
FTP (File Transfer Protocol) is one of the earliest Internet protocols developed. An FTP server can be accessed by using a URI (Universal Resource Identifier), using FTP file exchange between client and server is easier to do because the communication is done directly without going through an intermediary, for communication using FTP need to be designed an application that allows communication between the client and server directly without using the browser, for it is designed an FTP application using programming language in this case is Borland Delphi programming language, the ease of sending files between computers based on IP is a value added from the FTP application that is designed because most existing FTP applications can only send files between the server and the client in the internet network means that online must not be local area network or wide area network.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Maulana, Moh, Andri Permana Wicaksono et Atma Deharja. « Pembuatan Aplikasi Peminjaman Berkas Rekam Medik Berbasis Web di RSUP Klaten ». J-REMI : Jurnal Rekam Medik dan Informasi Kesehatan 2, no 1 (30 décembre 2020) : 149–54. http://dx.doi.org/10.25047/j-remi.v2i1.2153.

Texte intégral
Résumé :
Medical records according to Permenkes No. 269 of 2008 is a file containing notes and documents about patient identity. The problem that often arises in Klaten General Hospital is the length of the file search process due to the absence of applications that control the entry and exit of files, when officers borrow and return only to write in the control book. Supporting all the problems and objectives needed by the data, so the data collection methods used are observation and interviews. Analysis of the data obtained from the interview and observation process is to draw conclusions and identify the most urgent problems. The goal to solve this problem is to make an application that controls the borrowing and return of the RM file so that the officer knows quickly where the file will be sought. The application is made using the waterfall method in the workflow process and uses several programming languages such as PHP, HTML and CSS. The results of the application have been tested by several users using blackbok testing, but still do not know how effective and efficient when the application is tested in actual service.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Paramita, Cinantya, et Usman Sudibyo. « Kriptografi Audio MP3 Menggunakan RSA dan Transposisi Kolom ». Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no 3 (19 juin 2021) : 483–88. http://dx.doi.org/10.29207/resti.v5i3.2996.

Texte intégral
Résumé :
Mp3 is one form of audio file extension that is widely used today. With a variety of uses in a variety of mp3 systems become one of the audio extensions that are commonly found in technology systems of the Internet of Things era. However, with the many uses of the .mp3 file extension, there is a new problem, namely the security of the data itself. From these problems, the author aims to examine the security of the mp3 file by designing cryptographic science-based applications. The cryptographic algorithm used in the application is a combination of the asymmetric RSA 2048 algorithm and symmetric columnic transpositions. RSA 2048 algorithm was chosen because it has a key length in accordance with NIST standards in securing data. By combining the two algorithms, the application system will have the ability to manage mp3 files and encrypt mp3 files with the results of data that cannot be played like mp3 files in general. This application system will be developed by prototype method which is the best method in developing a system with trial and error in algorithm development.
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "Application file"

1

Kukkadapu, Sowmya. « Android application for file storage and retrieval over secured and distributed file servers ». Kansas State University, 2012. http://hdl.handle.net/2097/13959.

Texte intégral
Résumé :
Master of Science
Department of Computing and Information Sciences
Daniel A. Andresen
Recently, the world has been trending toward the use of Smartphone. Today, almost each and every individual is using Smartphone for various purposes benefited by the availability of large number of applications. The memory on the SD (Secure Digital) memory card is going to be a constraint for the usage of the Smartphone for the user. Memory is used for storing large amounts of data, which include various files and important document. Besides having many applications to fill the free space, we hardly have an application that manages the free memory according to the user’s choice. In order to manage the free space on the SD card, we need an application to be developed. All the important files stored on the Android device cannot be retrieved if we lose the Android device. Targeting the problem of handling the memory issues, we developed an application that can be used to provide the security to the important documents and also store unnecessary files on the distributed file servers and retrieve them back on request.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Ledung, Gabriel, et Johan Andersson. « Darknet file sharing : application of a private peer-to-peer distributed file system concept ». Thesis, Uppsala universitet, Informationssystem, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-129908.

Texte intégral
Résumé :
Peer-to-peer network applications has been a tremendous success among end users and has therefore received much attention in academia and industry, as have illegal public file sharing in media. However, private peer-to-peer file sharing between family, friends and co-workers have attracted little interest from the research community. Existing approaches also limit the users by not allowing for native interaction with userspace applications. In this paper we ex- -plore how private file sharing can be made safe, fast and scalable without constraining the users in this aspect. We demonstrate the concept of a private file sharing application utilizing a decentralized peer-to-peer network overlay by creating a prototype with extreme program- ming as methodology. To maximize the freedom of users the network is accessed through a virtual file-system interface. The prototype proves this to be a valid approach and we hope readers can use this paper as a platform for further developments in this area.
Fildelningsapplikationer som använder peer-to-peer teknik har varit en enorm framgång blandslutanvändare och har därmed erhållit mycket uppmärksamhet från akademi och indus- tri, liksom olaglig fildelning fått inom media. Däremot har inte privat fildelning mellan vän- ner, arbetskamrater och kollegor tilldelats samma uppmärksamhet från forskningssamfundet. Nuvarande tillämpningar begränsar användaren genom att inte tillåta naturlig interaktion med användarapplikationer. I denna uppsats utforskar vi hur privat fildelning kan göras snabb, skalbar och säker utan att begränsa användaren ur den aspekten. Vi demonstrerar ett koncept- för privat fildelning som nyttjar decentraliserad peer-to-peer arkitektur m.h.a en prototyp som tagits fram med extreme programming som metodologi. För att maximera användarnas frihet nyttjas ett virtuellt filsystem som gränssnitt. Prototypen visar att vår tillämpning fungerar i praktiken och vi hoppas att läsaren kan använda vårt arbete som en plattform för fortsatt utveckling inom detta område.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Stanković, Saša. « Monitor and manage system and application configuration files at kernel level in GNU/Linux ». Thesis, Högskolan Väst, Avdelningen för data-, elektro- och lantmäteriteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-8381.

Texte intégral
Résumé :
The aim of this study is to investigate if there is a way a computer can accurately and automatically react on altered configuration file(s) with a minimum of resource utilization and by what means the developer(s) of an application can perform a check of the altered configuration file for their application. In a typical GNU/Linux installation the configuration files are literally counted by the thousands, monitoring these files is a task that for the most part exceeds any system administrator's abilities. Each file has its own syntax that needs to be known by the administrator. Either one of these two tasks could give any system administrator nightmares concerning the difficulty level especially when both tasks are combined. The system administrator could attempt to automate the monitoring tasks together with the syntax checking. There are some tools in the repositories of each distribution for monitoring files but none that lets one monitor and take (predefined or user defined) actions based on what the file monitor reports, the type of file and its contents. A complete tool is not presented in this study, merely a proof of concept that monitoring and taking actions especially with version 2.6.13 (or newer) kernel of GNU/Linux with plugins are quite possible with relatively small computer resource. During this study some questions arose that are worth taking into consideration when a complete monitoring tool is to be developed, amongst others they are: add a trusted user, add both textual and graphical user interface, monitor more than one file path. This study was performed on GNU/Linux CentOS 6 distribution, all programming was done in BASH with an effort to minimize used/installed programs.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Twitchell, Douglas P. « Automated Analysis Techniques for Online Conversations with Application in Deception Detection ». Diss., Tucson, Arizona : University of Arizona, 2005. http://etd.library.arizona.edu/etd/GetFileServlet?file=file:///data1/pdf/etd/azu%5Fetd%5F1111%5F1%5Fm.pdf&type=application/pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Castro, Jose M. « Design and Application of Anti-Symmetric Grating for Optical Communication Systems ». Diss., Tucson, Arizona : University of Arizona, 2006. http://etd.library.arizona.edu/etd/GetFileServlet?file=file:///data1/pdf/etd/azu%5Fetd%5F1662%5F1%5Fm.pdf&type=application/pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Winstanley, Daniel John. « Application of hydrogeochemistry to delineate flow in fractured granite near Oracle, Arizona ». Thesis, The University of Arizona, 1985. http://etd.library.arizona.edu/etd/GetFileServlet?file=file:///data1/pdf/etd/azu_e9791_1985_41_sip1_w.pdf&type=application/pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Radell, Mary Jo. « Three-dimensional groundwater flow model use and application Bishop Basin, Owens Valley, California / ». Thesis, The University of Arizona, 1989. http://etd.library.arizona.edu/etd/GetFileServlet?file=file:///data1/pdf/etd/azu_e9791_1989_192_sip1_w.pdf&type=application/pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Muriithi, Beatrice Wanjiku. « Structural and Electrical Characterization of Discotic Liquid Crystalline Phthalocyanine for Application in Organic Devices ». Thesis, Tucson, Arizona : University of Arizona, 2005. http://etd.library.arizona.edu/etd/GetFileServlet?file=file:///data1/pdf/etd/azu%5Fetd%5F1350%5F1%5Fm.pdf&type=application/pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Grow, David Earl. « Effects of substrate on dendrochronologic streamflow reconstruction : Paria River, Utah with fractal application to dendrochronology ». Diss., The University of Arizona, 2002. http://etd.library.arizona.edu/etd/GetFileServlet?file=file:///data1/pdf/etd/azu_e9791_2002_312_sip1_w.pdf&type=application/pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

King, Chad Eric. « Application of the Hillslope Erosion Model to predict annual sediment yield in Southwest New Mexico ». Thesis, The University of Arizona, 2002. http://etd.library.arizona.edu/etd/GetFileServlet?file=file:///data1/pdf/etd/azu_etd_hy0003_m_sip1_w.pdf&type=application/pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Application file"

1

Kahn, Charles. Janus job application file. Sous la direction de Tong Robert, Jew Wing et Kahn Charles. 4e éd. Belmont, Calif : Fearon/Janus/Quercus, 1987.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Application software. 2e éd. Englewood Cliffs, N.J : Prentice Hall, 1990.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

P, Curtin Dennis. Application software. 2e éd. Englewood Cliffs, N.J : Prentice Hall, 1990.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

P, Curtin Dennis. Application software. 5e éd. Englewood Cliffs, N.J : Prentice Hall, 1991.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Application software. 2e éd. Englewood Cliffs, N.J : Prentice Hall, 1990.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Pat, McKay, dir. Business application software. Oxford, England : Publishers International, 1992.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

P, Curtin Dennis. Application software : Version B. 3e éd. Englewood Cliffs, N.J : Regents/Prentice Hall, 1993.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Parrette, William A. UNIX for application developers. New York : McGraw-Hill, 1991.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Dunne, Paul. Linux application development tools. Boston, Mass : Irwin/McGraw-Hill, 1999.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Uckan, Yuksel. Test item file for Application programming and file processing in COBOL : Concepts, techniques, and applications. Lexington, Mass : D.C. Heath, 1992.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Application file"

1

Wesley, Scott. « File Browse Validation ». Dans Pro jQuery in Oracle Application Express, 181–91. Berkeley, CA : Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0961-5_19.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Ethier, Kay. « Exploring the FrameMaker Application File ». Dans XML and FrameMaker, 235–52. Berkeley, CA : Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0719-1_11.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Xiao, Limin, Qiaoling Zhong, Zhisheng Huo, Ang Li, Li Ruan, Kelong Liu, Yuanyuan Zang et Zheqi Lu. « File Creation Optimization for Metadata-Intensive Application in File Systems ». Dans Algorithms and Architectures for Parallel Processing, 353–63. Cham : Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27161-3_31.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Weik, Martin H. « file application, transfer, access, and management ». Dans Computer Science and Communications Dictionary, 604. Boston, MA : Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_7115.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Wu, Qingxiu, et Jun Ou. « Application Analysis on Network File System ». Dans Lecture Notes in Electrical Engineering, 1279–85. Dordrecht : Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-2169-2_150.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Barbará, Daniel, Rajni Goel et Sushil Jajodia. « Protecting File Systems Against Corruption Using Checksums ». Dans Data and Application Security, 113–24. Boston, MA : Springer US, 2002. http://dx.doi.org/10.1007/0-306-47008-x_10.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Krichen, Mariem, Johanne Cohen et Dominique Barth. « File Transfer Application For Sharing Femto Access ». Dans Computer and Information Sciences II, 191–98. London : Springer London, 2011. http://dx.doi.org/10.1007/978-1-4471-2155-8_24.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Donlin, Adam, Patrick Lysaght, Brandon Blodget et Gerd Troeger. « A Virtual File System for Dynamically Reconfigurable FPGAs ». Dans Field Programmable Logic and Application, 1127–29. Berlin, Heidelberg : Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30117-2_145.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Biswas, Ankur, Riya Sil et Abhishek Roy. « A Study on Application of Interplanetary File System ». Dans Communication and Intelligent Systems, 1017–25. Singapore : Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1089-9_79.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Barker, Jacquie. « Rounding Out Your Application, Part 1 : Adding File Persistence ». Dans Beginning Java Objects, 427–69. Berkeley, CA : Apress, 2000. http://dx.doi.org/10.1007/978-1-4302-1115-0_16.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Application file"

1

Amin, Hala, Mohamed Khaled Chahine et Gianluca Mazzini. « P2P application for file sharing ». Dans 2012 19th International Conference on Telecommunications (ICT). IEEE, 2012. http://dx.doi.org/10.1109/ictel.2012.6221249.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Gaikwad, Y. J., Nikhil Potnis, Saurabh Jadhav et Yash Ahire. « File Sharing Application with OTP Service ». Dans 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2018. http://dx.doi.org/10.1109/iceca.2018.8474858.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Zhang, Jian, et Huanmei Wu. « Page File-Oriented Web Application Design ». Dans 2016 8th International Conference on Information Technology in Medicine and Education (ITME). IEEE, 2016. http://dx.doi.org/10.1109/itme.2016.0151.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Ma, Pengfei, Yanshen Yin, Chao Lan, Yong Zhang et Chunxiao Xing. « A Distributed File System for Frequency Reading of Various File Sizes ». Dans 2013 10th Web Information System and Application Conference (WISA). IEEE, 2013. http://dx.doi.org/10.1109/wisa.2013.70.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Radescu, Radu. « INTERACTIVE E-LEARNING APPLICATION FOR STUDYING AND EVALUATING THE PERFORMANCES OF REMOTE FILE SYNCHRONIZATION ALGORITHMS ». Dans eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-113.

Texte intégral
Résumé :
The present paper presents an e-learning application that studies the different ways of performing file compression and the performances obtained in synchronizing them in remote communications. Based on compression, one can estimate the differences between two files and calculate the minimum difference that must be transmitted over a network to synchronize different instances of the same file. The described application implements a client-server communication with network applications, in which a file is transmitted from server to client, the file being encoded to server and decoded to client. Using Delta compression techniques reduces bandwidth when transferring network files as well as their storage space. Delta compression allows for significant file size reduction, which helps increasing the download speed on a computer network. With the help of Delta compression, only the difference between two successive versions of the same file is performed during the upgrade process. The Rsync algorithm performs a unique approach for Delta compression, allowing the client to request changes to a file from the server without the need for the server to keep older versions of that file. Instead, the server dynamically calculates changes in an interactive protocol, which works in two steps. Using the Rsync algorithm to change Delta compressed content, both the client and the management server are released reference versions, thus simplifying the maintenance of the proxy cache. The client keeps a copy of its latest response, and the server uses only the latest version. The main approach for remote file synchronization is the one based on string fingerprints, implemented by the Rsync algorithm, even if it is sub-optimal. Rsync is, at the same time, a software and network protocol for synchronizing files and directories from one location to another, minimizing data transfer by using Delta compression when optimal. An important feature of the Rsync algorithm, which is not found in most similar programs or protocols, is that there is only one transmission for each direction. Rsync can copy or display the contents of directories and copy files, using compression and recurrence optionally. The receiver divides the copy of the file into fixed, non-overlapping blocks, and calculates two checksums for each block: MD5 hash and a smaller checksum, then sends these checksums to the server. From the experimental results obtained in the paper, it is clearly observed that in order to obtain an optimal transfer time on a network it is advisable to use similar files, having the same source file. If the files used are too different, then full file transfer is more useful, because the Delta compression calculation time and file transfer time will be greater than the full file transfer time. This application is interactive, requiring the client to synchronize manually the file, as there may be situations where the user does not need synchronization. Thus, transferring any changes to any file results in a fully synchronized network, which contains the same shared files, with the updated versions. For remote file synchronization techniques, the obtained experimental results indicate the existence of a significant distance in the compression performance between the tools currently available and the theoretical limits. The application presented in the paper accomplishes a client-server communication based on message exchange, in which, after the connection is made, the algorithms described in the paper are applied. The application calculates the Delta file (the difference) between two selected files that may belong to both the client and the server, or only to one of the parties. The Delta file is sufficient to perform the reconstruction of the destination file with only the source file and the Delta file. The Rsync algorithm performs file synchronization between the two communication partners, assuming that any file change has occurred on both sides, in order to keep an updated list of changes permanently. The utility of the Rsync algorithm is very high for any communications network where the bandwidth costs must be kept to a minimum, and file transfer time is an important factor that is intended to be minimized.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Uran, Suzana, et Karel Jezernik. « MATLAB Web Server and M-file Application ». Dans 2006 12th International Power Electronics and Motion Control Conference. IEEE, 2006. http://dx.doi.org/10.1109/epepemc.2006.283169.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Uran, S., et K. Jezernik. « MATLAB Web Server and M-file Application ». Dans 2006 12th International Power Electronics and Motion Control Conference. IEEE, 2006. http://dx.doi.org/10.1109/epepemc.2006.4778715.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Kokten, Koray, I. Serkan Kirkgul et M. Oguz Sunay. « P2P file sharing application with ALTO server ». Dans 2012 20th Signal Processing and Communications Applications Conference (SIU). IEEE, 2012. http://dx.doi.org/10.1109/siu.2012.6204829.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Haiying Sun et Mingyong Pang. « Analysis and application of MD2 file format ». Dans 2009 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC 2009). IEEE, 2009. http://dx.doi.org/10.1109/icnidc.2009.5360935.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Malgaonkar, Saurabh, Sakshi Surve et Tejas Hirave. « Distributed files sharing management : A file sharing application using distributed computing concepts ». Dans 2012 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). IEEE, 2012. http://dx.doi.org/10.1109/iccic.2012.6510207.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Application file"

1

Lasche, George P. Capabilities, methodologies, and use of the cambio file-translation application. Office of Scientific and Technical Information (OSTI), mars 2007. http://dx.doi.org/10.2172/902212.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Patel, Yusef. File to Factory : A case study of automated prefabrication house-building methods for small-to-medium enterprises. Unitec ePress, décembre 2017. http://dx.doi.org/10.34074/ocds.0823.

Texte intégral
Résumé :
The Eco-Digital Fabrication (EDFAB) research project aimed to investigate how automated prefabrication technologies and off-the-shelf construction products can be employed to disrupt building industry norms. The aim of this research – conducted at the University of Auckland and Unitec Institute of Technology from 2014 onward – was to provide small-to-medium enterprises in the construction industry with a pathway to upskill and increase construction productivity through the use of these processes. The availability of automated machines and easy-to-use fabrication software is increasing dramatically and this can be paired with readily available construction products to produce novel mass-customised housing solutions. The application of basic automated technologies – such as CNC (Computer Numerical Control) routers – allowed researchers to create ‘recipes’ that can be adopted and adapted relatively easily. By no means did the research favour digital manufacture or assembly processes over traditional analogue construction techniques – the goal was to provide logical, productive and accessible blended solutions for greater affordability and flexibility in design. For example, the designed experiments were required to be built from readily available products, and used simple readymade screw fixings rather than digitally produced custom fixings or joining mechanisms. The research project aimed to generate discussion and provide recommendations on how the construction industry might support the adoption of automated prefabrication technology in small-to-medium enterprise (SME).
Styles APA, Harvard, Vancouver, ISO, etc.
3

Kharchenko, Yuliya V., Olena M. Babenko et Arnold E. Kiv. Using Blippar to create augmented reality in chemistry education. CEUR Workshop Proceedings, juillet 2021. http://dx.doi.org/10.31812/123456789/4630.

Texte intégral
Résumé :
This paper presents an analysis of the possibilities and advantages of augmented reality technologies and their implementation in training of future Chemistry and Biology teachers. The study revealed that the use of augmented reality technologies in education creates a number of advantages, such as: visualization of educational material; interesting and attractive learning process; increasing student motivation to study and others. Several augmented reality applications were analyzed. The Blippar app has been determined to have great benefits: it’s free; the interface is simple and user-friendly; the possibility of using different file types; the possibility of combining a large amount of information and logically structuring it; loading different types of information: video, images, 3D models, links to sites, etc. Thus, convenient interactive projects were developed using the Blippar application, which were called study guide with AR elements, and implemented in teaching chemical disciplines such as Laboratory Chemical Practice and Organic Chemistry. Using such study guide with AR elements during classes in a real chemical laboratory is safe and does not require expensive glassware. The student interviews revealed that the use of the Blippar application facilitated new material understanding, saved time needed to learn material, and was an effective addition to real-life learning.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Shah, Ayesha, Jan Olek et Rebecca S. McDaniel. Real Life Experience with Major Pavement Types. Purdue University, 2022. http://dx.doi.org/10.5703/1288284317371.

Texte intégral
Résumé :
Pavement performance is a complex issue which depends on many contributing factors. Examining the performance of real-life pavements across the state determines what the actual service lives are for the pavements. For the purposes of this study, only selected LTPP projects were examined, along with a database containing all the historic repair projects completed in Indiana. Pertinent information present in the Indiana Historic Contracts Database was extracted concerning the types of pavement repair and treatments options commonly employed within the state, the time between repairs, etc. These data were used to determine descriptive statistical parameters and was summarized in graph form. Similarly, data about selected LTPP GPS and SPS sites were downloaded from the online website, LTPP InfoPave and a comparative study between companion sites was performed. These data included study site and pavement-related information, such as construction dates, pavement structure details, maintenance and repair history, and pavement distress surveys. These data were used to draw conclusions about the impact of treatment applications, climatic and geologic factors, traffic volume, and pavement structures on pavement performance. Gaps in knowledge about pavement failure modes, distress data, and effectiveness of treatment applications mentioned in the contracts database file hampered efforts to form a complete picture of the effectiveness of treatment options and their timely (or untimely) application. Similarly, details about pavement mixture design and differentiating factors between companion sites prevented researchers from narrowing down the causes leading to the observed pavement distress.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Hawk, John, Jr Carr et Virgil J. Evaluation of Fike (Trademark) Corporation's Explosion Suppression System for Ultra-High Speed Fire Suppression Applications. Fort Belvoir, VA : Defense Technical Information Center, décembre 2007. http://dx.doi.org/10.21236/ada480121.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Dey, Monideep K. Evaluation of fire models for nuclear fire plant applications :. Gaithersburg, MD : National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.ir.6872.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Dean, David M. Flexible Ultra Moisture Barrier Film for Thin-Film Photovoltaic Applications. Office of Scientific and Technical Information (OSTI), octobre 2012. http://dx.doi.org/10.2172/1057661.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Grosshandler, William L., Anthony Hamins, Kevin McGrattan et Cary Presser. Transient application, recirculating pool fire, agent effectiveness screen :. Gaithersburg, MD : National Institute of Standards and Technology, 2001. http://dx.doi.org/10.6028/nist.ir.6733.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Rongsen, L. The Application of Plastic Film Technology in China. Kathmandu, Nepal : International Centre for Integrated Mountain Development (ICIMOD), 1994. http://dx.doi.org/10.53055/icimod.179.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Warde, Cardinal. Thin-Film Optics for Signal Processing Applications. Fort Belvoir, VA : Defense Technical Information Center, janvier 1989. http://dx.doi.org/10.21236/ada205141.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie