Статті в журналах з теми "Dagesh 2 (Computer file)"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Dagesh 2 (Computer file).

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Dagesh 2 (Computer file)".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Hesselink, Wim H., and Muhammad Ikram Lali. "Formalizing a hierarchical file system." Formal Aspects of Computing 24, no. 1 (December 17, 2010): 27–44. http://dx.doi.org/10.1007/s00165-010-0171-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Narjis Mezaal Shati and Ali Jassim Mohamed Ali. "Hiding Any Data File Format into Wave Cover." journal of the college of basic education 16, no. 69 (October 31, 2019): 1–10. http://dx.doi.org/10.35950/cbej.v16i69.4739.

Повний текст джерела
Анотація:
In the current study a steganography approach utilized to hide various data file format in wave files cover. Lest significant bit insertion (LSB) used to embedding a regular computer files (such as graphic, execution file (exe), sound, text, hyper text markup language (HTML) …etc) in a wave file with 2-bits hiding rates. The test results achieved good performance to hide any data file in wave file.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Darwis, Mochammad. "Penambahan Fitur Tampilan LCD dan Micro SD Card Reader pada mesin Laser Engraver and Cutter di Laboratorium Pengemudian Listrik." Jurnal Pengelolaan Laboratorium Pendidikan 2, no. 1 (January 20, 2020): 8–18. http://dx.doi.org/10.14710/jplp.2.1.8-18.

Повний текст джерела
Анотація:
Laser engraver and cutter machine that have been made in previous research, can only be controlled by a computer. The addition of LCD display and Card Reader will make it work alone without using a computer (offline). Card reader is used to read gcode files from 2-dimensional design that have been made on a computer. LCD display is used to display a menu or a list of existing settings, the percentage of loading data from a gcode file and displays the 2-dimensional design of the gcode file. To move the menu on the LCD display an encoder switch is used. This additional feature was created using a microcontroller STM32F1 type as a core control system which performs serial communication with a laser machine. 32 bit ARM microcontroller is used because a lot of tasks has to perform. It must be able to read data from the SD card, display the image form from the gcode file and send it to the laser machine. Compared 3 types of gcode file of different file sizes and the speed of loading the data. The laser machine can perform its function by using the controls of the additional feature modules that have been made.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Chen, Qingyu, Longsheng Wu, Li Li, Xuhan Ma, and Xu An Wang. "Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart." International Journal of Information Technology and Web Engineering 10, no. 3 (July 2015): 17–32. http://dx.doi.org/10.4018/ijitwe.2015070102.

Повний текст джерела
Анотація:
Data security in the register file significantly decreases as a result of technology scaling. Based on pipeline restart, the method of improving the data security and reliability in register files is presented in this paper. As the data and its replica simultaneously exist as a redundant copy of each other in half-custom register files, when an uncorrectable error is detected in the data during the access of the register file, its replica will be checked for subsequent processor operation by the restart of pipeline. In addition, the correctable error in data or its replica can also be scrubbed by rollback and restart of pipeline. Finally, the proposed method is evaluated and the results show that the hardware overhead increases by only 2%, whereas the reliability of data in register file increases by more than 2.5 times. This method can significantly improve the data security in the register file without distinct overhead increasing.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Huizinga, D. M., and K. Heflinger. "DOC-a file system cache to support mobile computers." Distributed Systems Engineering 2, no. 3 (September 1995): 152–60. http://dx.doi.org/10.1088/0967-1846/2/3/003.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

NAKANO, SHIN-ICHI, and TAKAO NISHIZEKI. "SCHEDULING FILE TRANSFERS UNDER PORT AND CHANNEL CONSTRAINTS." International Journal of Foundations of Computer Science 04, no. 02 (June 1993): 101–15. http://dx.doi.org/10.1142/s0129054193000079.

Повний текст джерела
Анотація:
The file transfer scheduling problem was introduced and studied by Coffman, Garey, Johnson and LaPaugh. The problem is to schedule transfers of a large collection of files between various nodes of a network under port constraint so as to minimize the overall finishing time. This paper extends their model to include communication channel constraint in addition to port constraint. We formulate the problem with both port and channel constraints as a new type of edge-coloring of multigraphs, called an fg-edge-coloring, and give an efficient approximation algorithm with absolute worst-case ratio 3/2.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Carthen, Chase D., Araam Zaremehrjardi, Vinh Le, Carlos Cardillo, Scotty Strachan, Alireza Tavakkoli, Frederick C. Harris Jr., and Sergiu M. Dascalu. "A Novel Spatial Data Pipeline for Orchestrating Apache NiFi/MiNiFi." International Journal of Software Innovation 12, no. 1 (November 1, 2023): 1–14. http://dx.doi.org/10.4018/ijsi.333164.

Повний текст джерела
Анотація:
In many smart city projects, a common choice to capture spatial information is the inclusion of lidar data, but this decision will often invoke severe growing pains within the existing infrastructure. In this article, the authors introduce a data pipeline that orchestrates Apache NiFi (NiFi), Apache MiNiFi (MiNiFi), and several other tools as an automated solution to relay and archive lidar data captured by deployed edge devices. The lidar sensors utilized within this workflow are Velodyne Ultra Puck sensors that produce 6-7 GB packet capture (PCAP) files per hour. By both compressing the file after capturing it and compressing the file in real-time; it was discovered that GZIP and XZ both saved considerable file size being from 2-5 GB, 5 minutes in transmission time, and considerable CPU time. To evaluate the capabilities of the system design, the features of this data pipeline were compared against existing third-party services, Globus and RSync.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Yang, Hua, Gang Cui, Hong-Wei Liu, and Xiao-Zong Yang. "Compacting register file via 2-level renaming and bit-partitioning." Microprocessors and Microsystems 31, no. 3 (May 2007): 178–87. http://dx.doi.org/10.1016/j.micpro.2006.08.004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Kim, TaeGuen, Yeo Reum Lee, BooJoong Kang, and Eul Gyu Im. "Binary executable file similarity calculation using function matching." Journal of Supercomputing 75, no. 2 (December 9, 2016): 607–22. http://dx.doi.org/10.1007/s11227-016-1941-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Alekseev, V. M. "METHOD OF CONSTRUCTING SECURITY MODELS OF COMPUTER SYSTEMS." World of Transport and Transportation 14, no. 6 (December 28, 2016): 14–23. http://dx.doi.org/10.30932/1992-3252-2016-14-6-2.

Повний текст джерела
Анотація:
[For the English abstract and full text of the article please see the attached PDF-File (English version follows Russian version)].ABSTRACT The article considers issues related to the construction of monitoring systems that provide detection of threats in the information environment. In particular, the recognition method for implementing models of analyzers in the zone of a given space of trusted and possible untrusted information traffic routes. Keywords: information security, isolated software environment, hidden channels, monitoring of subjects.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Dugan, JB. "Analysis of hybrid voting algorithm for replicated file systems." Information and Software Technology 33, no. 4 (May 1991): 273–80. http://dx.doi.org/10.1016/0950-5849(91)90152-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Pullan, S. E. "Recommended standard for seismic (/radar) data files in the personal computer environment." GEOPHYSICS 55, no. 9 (September 1990): 1260–71. http://dx.doi.org/10.1190/1.1442942.

Повний текст джерела
Анотація:
This paper is the result of the work of a subcommittee of SEG’s Engineering and Groundwater Geophysics Committee. It recommends a data file format for raw or processed shallow seismic or digital radar data in the small computer environment. It is recommended that this format be known as the SEG-2 format.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

JAGANATHAN, V., R. KARINTHI, G. ALMASI, and M. SOBOLEWSKI. "MODEL BASED INFORMATION ACCESS." International Journal of Cooperative Information Systems 03, no. 02 (June 1994): 107–27. http://dx.doi.org/10.1142/s0218215794000089.

Повний текст джерела
Анотація:
The engineering data of a large enterprise is typically distributed over a wide area and archived in a variety of databases and file systems. Access to such information is crucial to a team member, particularly in a concurrent engineering setting. However, this is not easy, because (1) a model of the relevant information is not available, and (2) there is no simple way to access the information without being knowledgeable about various computer data formats, file systems, and networks. We have developed a system called the Information Sharing System (ISS) to enable access to diverse and distributed information within a corporation. Such data could be stored in different repositories such as databases and file systems including those that contain multiple media. Our paper describes the methodology of the ISS, the details of the implementation and extensions planned for the future.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Qin, Tiancheng, and S. Rasoul Etesami. "Optimal Online Algorithms for File-Bundle Caching and Generalization to Distributed Caching." ACM Transactions on Modeling and Performance Evaluation of Computing Systems 6, no. 1 (June 2021): 1–23. http://dx.doi.org/10.1145/3445028.

Повний текст джерела
Анотація:
We consider a generalization of the standard cache problem called file-bundle caching, where different queries (tasks), each containing l ≥ 1 files, sequentially arrive. An online algorithm that does not know the sequence of queries ahead of time must adaptively decide on what files to keep in the cache to incur the minimum number of cache misses. Here a cache miss refers to the case where at least one file in a query is missing among the cache files. In the special case where l = 1, this problem reduces to the standard cache problem. We first analyze the performance of the classic least recently used (LRU) algorithm in this setting and show that LRU is a near-optimal online deterministic algorithm for file-bundle caching with regard to competitive ratio. We then extend our results to a generalized ( h,k )-paging problem in this file-bundle setting, where the performance of the online algorithm with a cache size k is compared to an optimal offline benchmark of a smaller cache size h < k . In this latter case, we provide a randomized O ( l ln k / k-h )-competitive algorithm for our generalized ( h, k )-paging problem, which can be viewed as an extension of the classic marking algorithm . We complete this result by providing a matching lower bound for the competitive ratio, indicating that the performance of this modified marking algorithm is within a factor of 2 of any randomized online algorithm. Finally, we look at the distributed version of the file-bundle caching problem where there are m ≥ 1 identical caches in the system. In this case, we show that for m = l + 1 caches, there is a deterministic distributed caching algorithm that is ( l 2 + l )-competitive and a randomized distributed caching algorithm that is O ( l ln ( 2l + 1)-competitive when l ≥ 2. We also provide a general framework to devise other efficient algorithms for the distributed file-bundle caching problem and evaluate the performance of our results through simulations.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Holland, Stephen, and Richard J. David. "An outcome-coded birth file from machine readable vital records." Computers in Biology and Medicine 15, no. 1 (January 1985): 25–39. http://dx.doi.org/10.1016/0010-4825(85)90081-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Wunarso, Novita Belinda, Andrias Rusli, Michelle Angelica, and Arabella Margaret Salim. "Implementasi Distributed File Server pada Apache Web Server." Jurnal ULTIMA InfoSys 4, no. 2 (December 1, 2013): 84–88. http://dx.doi.org/10.31937/si.v4i2.245.

Повний текст джерела
Анотація:
In this research, a Distributed File Server (DFS) is developed to manage the need of a large storage space in the server, especially when the multimedia files are saved permanently in the web server. In the development, Apache Web Server is used with 1 computer as the main server, 2 computers as file servers, and 1 computer as the client who sends request. The result from the implementation of the DFS is the usage of main server’s storage space can be reduced by 99,77% from the full usage condition, causing an optimization in the web server. Another parameter is also being tested by the implementation of the DFS, which is the index.html page’s average access time. When only one server is being used, the average access time is 2,327 second. Whereas, when three servers are being used, the average access time is 5,577 second. Index Terms - Apache, distributed file server, web server optimization, average access time
Стилі APA, Harvard, Vancouver, ISO та ін.
17

French, J. C., T. W. Pratt, and M. Das. "Performance Measurement of the Concurrent File System of the Intel iPSC/2 Hypercube." Journal of Parallel and Distributed Computing 17, no. 1-2 (January 1993): 115–21. http://dx.doi.org/10.1006/jpdc.1993.1009.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Nishi, Yohei, Masahiro Sasabe, and Shoji Kasahara. "Optimality analysis of locality-aware tit-for-tat-based P2P file distribution." Peer-to-Peer Networking and Applications 13, no. 5 (June 11, 2020): 1688–703. http://dx.doi.org/10.1007/s12083-020-00925-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Norros, Ilkka, Hannu Reittu, and Timo Eirola. "On the stability of two-chunk file-sharing systems." Queueing Systems 67, no. 3 (January 26, 2011): 183–206. http://dx.doi.org/10.1007/s11134-011-9209-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Peters, Andreas-Joachim, Michal Kamil Simon, and Elvin Alin Sindrilaru. "Erasure Coding for production in the EOS Open Storage system." EPJ Web of Conferences 245 (2020): 04008. http://dx.doi.org/10.1051/epjconf/202024504008.

Повний текст джерела
Анотація:
The storage group of CERN IT operates more than 20 individual EOS[1] storage services with a raw data storage volume of more than 340 PB. Storage space is a major cost factor in HEP computing and the planned future LHC Run 3 and 4 increase storage space demands by at least an order of magnitude. A cost effective storage model providing durability is Erasure Coding (EC) [2]. The decommissioning of CERN’s remote computer center (Wigner/Budapest) allows a reconsideration of the currently configured dual-replica strategy where EOS provides one replica in each computer center. EOS allows one to configure EC on a per file bases and exposes four different redundancy levels with single, dual, triple and fourfold parity to select different quality of service and variable costs. This paper will highlight tests which have been performed to migrate files on a production instance from dual-replica to various EC profiles. It will discuss performance and operational impact, and highlight various policy scenarios to select the best file layout with respect to IO patterns, file age and file size. We will conclude with the current status and future optimizations, an evaluation of cost savings and discuss an erasure encoded EOS setup as a possible tape storage replacement.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Hiswara, Indra, Khusnul Khoiriyah, and Dody Febriyanto. "PERANCANGAN JARINGAN LAN SMK AL-KHAIRIYAH 2 DENGAN MENGGUNAKAN METODE OSPF." JEIS : Jurnal Elektro dan Informatika Swadharma 3, no. 1 (January 31, 2023): 58–66. http://dx.doi.org/10.56486/jeis.vol3no1.302.

Повний текст джерела
Анотація:
The internet network is needed to carry out daily activities. A computer network is a network system where all computers share data and resources. The problem that often occurs in computer networks at SMK Al Khairiyah 2 is the dominance of user limitations by staff activities such as downloading or uploading large files. As well as the difficulty of knowing the number of computer network users who use wireless technology. This causes frequent problems with the computer network at this school, such as data sent being slow and doesn't even reach its destination, communication often experiences time-outs and security problems, so a network design is needed that can overcome the problems that occur. The problem is how to develop a good and adequate computer network, using the OSPF (Open Shortest Path First) method. The purpose of this study is to design a LAN network at SMK Al-Khairiyah 2 with the OSPF method.Penggunaan jaringan internet dibutuhkan dalam melakukan sesuatu aktifitas. Jaringan komputer merupakan suatu sistem jaringan, dimana seluruh komputer saling berbagi data dan resources satu sama lain. Masalah yang sering terjadi pada jaringan komputer di SMK Al Khairiyah 2 yaitu adanya dominasi limitasi user oleh aktivitas Staff seperti download atau upload file-file berukuran besar. Serta sulitnya mengetahui jumlah pengguna jaringan komputer yang menggunakan teknologi nirkabel. Menyebabkan seringnya terjadi masalah pada jaringan komputer di sekolah ini seperti: data yang dikirim lambat bahkan tidak sampai ke tujuan, komunikasi sering mengalami time-out dan masalah keamanan sehingga dibutuhkan suatu rancangan jaringan yang dapat mengatasi permasalahan yang terjadi. Permasalahannya bagaimana mengembangkan jaringan komputer yang baik dan memadai, dengan menggunakan metode OSPF (Open Shortest Path First). Tujuan penelitian ini yaitu merancang Jaringan LAN pada SMK Al-Khairiyah 2 dengan Metode OSPF.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Robinson, Shahbabaei, and Kim. "Deformation Effect on Water Transport through Nanotubes." Energies 12, no. 23 (November 21, 2019): 4424. http://dx.doi.org/10.3390/en12234424.

Повний текст джерела
Анотація:
In this study, we used non-equilibrium molecular dynamics to study the transport of water through deformed (6,6) Carbon Nanotubes (CNTs) and Boron Nitride Nanotubes (BNNTs). The results were then compared with that of the perfect nanotubes. The main aim of this study was to get a better insight into the deformation effect on water transport through nanotubes rather than directly comparing the CNTs and BNNTs. As the diameters of both types of nanotubes differ from each other for the same chiral value, they are not directly comparable. We carried out our study on deformations such as screw distortion, XY-distortion, and Z-distortion. XY-distortion of value 2 shows a change from single-file water transport to near-Fickian diffusion. The XY-distortions of higher value shows a notable negative effect on water transport when their distortion values get larger. These suggest that the degree of deformation plays a crucial role in water transport through deformed nanotubes. The Z-distortion of 2 showed discontinuous single-file chain formation inside the nanotubes. Similar phenomena are observed in both nanotubes, irrespective of their type, while the magnitudes of their effects vary.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Idris, Fayez, Zaher Abu, Rashad Rasras, and Emary El. "Building an advanced invariant real-time human tracking system." Computer Science and Information Systems 4, no. 1 (2007): 57–75. http://dx.doi.org/10.2298/csis0701057i.

Повний текст джерела
Анотація:
Real-time human tracking is very important in surveillance and robot applications. We note that the performance of any human tracking system depends on its accuracy and its ability to deal with various human sizes in a fast way. In this paper, we combined the presented works in [1, 2] to come with new human tracking algorithm that is robust to background and lighting changes and does not require special hardware components. In addition this system can handle various scales of human images. The proposed system uses sum of absolute difference (SAD) with thresholding as has been described in [2] and compares the output with the predefined person pattern using the technique which has been described in [1]. Using the combination between [1,2] approaches will enhance the performance and speed of the tracking system since pattern matching has been performed according to just one pattern. After matching stage, a specific file is created for each tracked person, this file includes image sequences for that person. The proposed system handles shadows removal, lighting changes, and background changes with infinite pattern scales using standard personal computer.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

BUFFENBARGER, JIM. "A Software Tool for Maintaining File and Macro Build Dependencies." Journal of Software Maintenance: Research and Practice 8, no. 6 (November 1996): 421–31. http://dx.doi.org/10.1002/(sici)1096-908x(199611)8:6<421::aid-smr140>3.0.co;2-z.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Wilkinson, Luke E., and Sam R. Gledhill. "An Integrated Approach to a Teaching File Linked to PACS." Journal of Digital Imaging 20, no. 4 (December 27, 2006): 402–10. http://dx.doi.org/10.1007/s10278-006-1045-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Venckauskas, Algimantas, Vacius Jusas, Kęstutis Paulikas, and Jevgenijus Toldinas. "Methodology to investigate BitTorrent sync protocol." Computer Science and Information Systems 14, no. 1 (2017): 197–218. http://dx.doi.org/10.2298/csis160212032v.

Повний текст джерела
Анотація:
The BitTorrent Sync client application is the most progressive development in the BitTorrent family. Nevertheless, it can be used for the activities that draw the attention of the forensics invetigators. The BitTorrent Sync client application employs quite largely the encryption for sending data packages. The initiation of the activity is carried out in the plain text only. Therefore, we proposed the methodology that enables to capture the initiation step and to inform the forensics investigator, which then takes the reactive actions. The experiment was carried in two modes: 1) simulating of the use of the BitTorrent Sync application; 2) monitoring of real traffic on the Internet. During the monitoring, it is possible to calculate the public lookup SHA1 hash of the shared file. The comparison of the calculated hash with the list of publicly available hashes allows determination whether sharing of the file is legal or illegal. The presented methodology can be applied to any BitTorrent protocol.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Payá-Vayá, Guillermo, Javier Martín-Langerwerf, and Peter Pirsch. "A Multi-Shared Register File Structure for VLIW Processors." Journal of Signal Processing Systems 58, no. 2 (March 20, 2009): 215–31. http://dx.doi.org/10.1007/s11265-009-0355-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Zahariea, Dănuţ. "Computer Aided Design of Centrifugal Fan Impeller Using CATIA Software." Applied Mechanics and Materials 809-810 (November 2015): 853–58. http://dx.doi.org/10.4028/www.scientific.net/amm.809-810.853.

Повний текст джерела
Анотація:
In this paper, the 3D model of the centrifugal fan impeller will be obtained using CAD software (CATIA). The blade will be obtained with 4 design methods: constant blade width and variable blade angle; hyperbolic blade width and variable blade angle; hyperbolic blade width and constant blade angle; linear blade width and variable blade angle. A comparative analysis of the weight of the blade, as well as of the weight of the rotor composed by cascade of blades, front and rear shrouds will be presented. Two materials have been used for all the elements of the centrifugal fan impeller: steel and aluminium. For computational purposes the MATLAB programming language will be used. The centrifugal fan blade will be designed as untwisted geometry with =2 reference curves (one on the rear shroud and the other one on the front shroud) with different numbers of reference points ={5, 10, 20, 30, 40, 50}. After running the MATLAB script file, the coordinates of reference points of the blade will be obtained for all 4 blade design methods. The transfer of the reference points coordinates from MATLAB workspace to CATIA has been performed using the automatic surface generation method, via an EXCEL macro file. This is the recommended method especially for a big number of reference points.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Alkenani, Jawad, and Khulood Ahmed Nassar. "Enhance work for java based network analyzer tool used to analyze network simulator files." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 2 (February 1, 2023): 954. http://dx.doi.org/10.11591/ijeecs.v29.i2.pp954-962.

Повний текст джерела
Анотація:
<span lang="EN-US">The network performance measurement is important in computer networks, and performance measurement may not be effective for installation in peripheral devices resulting in the replacement of those devices and thus increasing cost. In light of this, it is better to have a simulation of the network to see its performance rather than the actual design. NS-2 is one of the most popular and widely used open-source network simulators in many organizations, which generates trace files during the simulation experience. The trace file contains all network events that can be used to calculate performance. Thus, NS-2 does not offer any visualization options for analyzing simulation results (trace files), which is the fundamental problem of trace file parsing difficulty. This paper provides a graphical user interface tool that enables researchers to quickly and efficiently analyze and visualize NS-2 trace files. This tool is a development of the JDNA tool, as it could not analyze more than one trace file at a time. In addition, this work can be a useful guide for network researchers or other programmers to analyze their networks and understand how to calculate network performance metrics.</span>
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Yosefin and Muhammad Gifran. "Digital-Based Basic Accounting Training for Accounting Students at SMK N 1 Pangkalpinang (Series: 2)." Asian Journal of Community Services 2, no. 4 (April 30, 2023): 375–82. http://dx.doi.org/10.55927/ajcs.v2i4.3893.

Повний текст джерела
Анотація:
Basic digital-based accounting skills, especially operating accounting computer applications, is a challenge for students majoring in accounting at SMK N 1 Pangkalpinang, given the ever-evolving application technology. The training we carry out can support students to improve their skills. Series training: 2 uses an accurate educational series application. This training consists of understanding and operating order financing with an accounting computer, analyzing return merchandise authorization (RMA), analyzing memorize transactions and recuring, operating file menus on an accounting computer, and operating reports with an accounting computer. Digital-based basic accounting training for students majoring in accounting at SMK N 1 Pangkalpinang (series: 2) has been successfully implemented, as seen from the ability of the trainees to operate accounting computer applications (accurate) and are able to make financial reports with accounting computers.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Leong, K. F., C. K. Chua, and Y. M. Ng. "A study of stereolithography file errors and repair. Part 2. Special cases." International Journal of Advanced Manufacturing Technology 12, no. 6 (November 1996): 415–22. http://dx.doi.org/10.1007/bf01186930.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Fuentes-Porto, Alba, Carlos García-Ávila, and Efraín Marrero-Salas. "Casa del Samarín, una estación de grabados rupestres en deterioro. Documentación, análisis y diagnóstico en Los Llanos de Ifara, Granadilla, Tenerife." Virtual Archaeology Review 12, no. 24 (January 19, 2021): 99. http://dx.doi.org/10.4995/var.2021.13810.

Повний текст джерела
Анотація:
<p class="VARAbstract"><strong>Extended Abstract:</strong></p><p class="VARAbstract">In the archaeology of the Canary Islands (Spain), there are many studies based on the usage of new technologies to contribute to the identification and description of rock art engravings through high-resolution digital models (<a href="file:///L:/PC%20Port%C3%A1til%20Poli/Mis%20documentos/VAR/En%20Curso/Revisi%C3%B3n/13810/13810-60985-2-CE_jll.docx#Mart%C3%ADn_2005">Martín, 2005</a>; <a href="file:///L:/PC%20Port%C3%A1til%20Poli/Mis%20documentos/VAR/En%20Curso/Revisi%C3%B3n/13810/13810-60985-2-CE_jll.docx#Mart%C3%ADn_2007">Martín, Velasco, González &amp; Ramírez, 2007;</a> <a href="file:///L:/PC%20Port%C3%A1til%20Poli/Mis%20documentos/VAR/En%20Curso/Revisi%C3%B3n/13810/13810-60985-2-CE_jll.docx#Senen_2016">Senén &amp; Cuenca, 2016</a>; <a href="file:///L:/PC%20Port%C3%A1til%20Poli/Mis%20documentos/VAR/En%20Curso/Revisi%C3%B3n/13810/13810-60985-2-CE_jll.docx#Navarro_2019">Navarro &amp; Cancel, 2019</a>). This paper is supported by these documentation techniques and digital analysis in order to deepen into the characterization of the damaged rock art station Casa del Samarín (House of Samarín), or Tagoro del Rey, in Los Llanos de Ifara, south of the island of Tenerife (Figs. 1). Twenty-one panels conserved in situ were documented (Fig. 6). Geometric-linear, geometric with an oval and rectangular trend and figurative ones can be distinguished. The blocks <a title="" href="file:///L:/PC%20Port%C3%A1til%20Poli/Mis%20documentos/VAR/En%20Curso/Revisi%C3%B3n/13810/13810-60985-2-CE_jll.docx#_ftn1">[1]</a> that compose the engravings station belong to a rocky basalt outcrop, to which other free-standing blocks are attached, forming a circle. The shape that describes this set of blocks is defined as a "cabin" or circular-shaped structure.</p><p class="VARAbstract">This set of engravings, made on a basalt rocky outcrop with a planar factory, show a tendency to suffer from exfoliation and are affected by internal stresses. The intrinsic characteristics of this stone support, together with their exposure to anthropic actions and strong insolation, condition its fragility, with the risk of losing part of the representations that it houses. Given the threat posed by its gradual deterioration, we seek to ensure its digital preservation through precision three-dimensional (3D) records, the engravings inventory, the record of their conservation state and the understanding of the degradation processes that are affecting the outcrop. What has been explained will be addressed quarterly, to observe the evolution of any material changes every three months.</p><p class="VARAbstract">The registration work consisted of taking four photogrammetric surveys in eight months; the surveys were georeferenced by means of a centimetric Global Navigation Satellite System (GNSS) and a total station. Structure from Motion (SfM) technology enabled the researchers to generate high-precision 3D models in an affordable way, not only in terms of cost but also ease of use. Digital copies with Geographic Information System GIS technology were extracted from them, being exportable in shapefile format (Fig. 7).</p><p class="VARAbstract">As regards the documentation of existing pathologies, assuming standardized lexicon and classification criteria (<a href="file:///L:/PC%20Port%C3%A1til%20Poli/Mis%20documentos/VAR/En%20Curso/Revisi%C3%B3n/13810/13810-60985-2-CE_jll.docx#IPCE_2013">IPCE, 2013</a>), together with a rigorous information systematization, was key for achieving agile handling of the data collected and for facilitating monitoring tasks (Fig. 8). Damage maps were created for collecting the location and scope of the alterations. The complex volumetry of the outcrop and the varied orientation of the panels marked the need to resort to 3D editing so that all their faces could be properly registered (Fig. 10). This project was performed with a 3D design program, Blender®. </p><p class="VARAbstract">Thanks to an imaging analysis process, internal textures of 3D models also provided relevant graphic support for the pictographic content and the conservation state (Figs. 11 &amp; 14). DStretch® (<a href="file:///L:/PC%20Port%C3%A1til%20Poli/Mis%20documentos/VAR/En%20Curso/Revisi%C3%B3n/13810/13810-60985-2-CE_jll.docx#Harman_2008">Harman, 2008</a>), a plugin implemented in the scientific image processing software ImageJTM, was used for this purpose. To conclude, researchers relied on CloudCompare (<a href="file:///L:/PC%20Port%C3%A1til%20Poli/Mis%20documentos/VAR/En%20Curso/Revisi%C3%B3n/13810/13810-60985-2-CE_jll.docx#Girardeau_2015">Girardeau-Montaut, 2015</a>), an advanced 3D data processing software, to tackle a morphometric analysis that allowed us to detect the appearance of formal changes along with the recorded sequences (Figs. 12 &amp; 15). In this process, the distances between two records, taken after six months, were computed with the Cloud to Mesh (C2M) tool, based on the Chamfer distance algorithm (<a href="file:///L:/PC%20Port%C3%A1til%20Poli/Mis%20documentos/VAR/En%20Curso/Revisi%C3%B3n/13810/13810-60985-2-CE_jll.docx#Ruiz_2016">Ruiz et al., 2016: 120</a>).</p><p>Registration file cards and damage maps clearly highlighted the main conditions: material losses (shown in orange) and breaks (in green) have affected the outcrop in a generalized way. Furthermore, sedimentary deposits (blue) are concentrated in interstices; while lichen colonies (idem) do so in the least sun-exposed areas. The use of DStretch® highlighted modern excoriations of anthropogenic origin and contributed to distinguishing recent material losses from the older ones, already affected by an incipient patina. Finally, thanks to morphological analysis, a new detachment (Fig. 15b) and a generalized displacement of exempt elements (Figs. 12 &amp; 15) were detected. These displacements indicate outstanding manipulation, which could lead to decontextualizations or new fragmentations.</p><p>Regarding the archaeological interpretation, macroscopic observation of exempt blocks located in the vicinity of the station and the zenith representation of the immediate environment from photogrammetry, have shown that they are forming a set of attached structures (Fig. 13). The site redefinition and the diagnosis of its very weakened defensive system show the need to intensify the archaeological study of this area, so emblematic for the archaeology of the south of Tenerife, in addition to establishing preventive conservation measures that can contribute to its stabilization.</p><p class="VARAbstract"> </p><div><hr align="left" size="1" width="33%" /><div><p><a title="" href="file:///L:/PC%20Port%C3%A1til%20Poli/Mis%20documentos/VAR/En%20Curso/Revisi%C3%B3n/13810/13810-60985-2-CE_jll.docx#_ftnref1">[1]</a> Geological unit of size greater than 300 mm, term standardized by the USCS (Unified Soil Classification System).</p></div></div>
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Lee, Kyungwoon, Jeongsu Kim, Ik-Hyeon Kwon, Hyunchan Park, and Cheol-Ho Hong. "Impact of Secure Container Runtimes on File I/O Performance in Edge Computing." Applied Sciences 13, no. 24 (December 18, 2023): 13329. http://dx.doi.org/10.3390/app132413329.

Повний текст джерела
Анотація:
Containers enable high performance and easy deployment due to their lightweight architecture, thus facilitating resource utilization in edge computing nodes. Secure container runtimes have attracted significant attention because of the necessity for overcoming the security vulnerabilities of containers. As the runtimes adopt an additional layer such as virtual machines and user-space kernels to enforce isolation, the container performance can be degraded. Even though previous studies presented experimental results on performance evaluations of secure container runtimes, they lack a detailed analysis of the root causes that affect the performance of the runtimes. This paper explores the architecture of three secure container runtimes in detail: Kata containers, gVisor, and Firecracker. We focus on file I/O, which is one of the key aspects of container performance. In addition, we present the results of the user- and kernel-level profiling and reveal the major factors that impact the file I/O performance of the runtimes. As a result, we observe three key findings: (1) Firecracker shows the highest file I/O performance as it allows for utilizing the page cache inside VMs, and (2) Kata containers offer the lowest file I/O performance by consuming the largest amount of CPU resources. Also, we observe that gVisor scales well as the block size increases because the file I/O requests are mainly handled by the host OS similar to native applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Putri, Noviana, Cicilia Dyah S. Indrawati, and Anton Subarno. "PENERAPAN APLIKASI PEMBERKASAN ARSIP DINAMIS DAN STATIS DI KANTOR PELAYANAN PAJAK PRATAMA KARANGANYAR." JIKAP (Jurnal Informasi dan Komunikasi Administrasi Perkantoran) 6, no. 2 (May 31, 2022): 88. http://dx.doi.org/10.20961/jikap.v6i2.56631.

Повний текст джерела
Анотація:
<p><em>This study aims to determine the implementation of dynamic and static filing applications in the Service Section at Pratama Tax Office Karanganyar. This research was conducted at Pratama Tax Office Karanganyar. The sampling of this research is using purposive sampling and snowball sampling technique. Data collection techniques with observation, interviews, and documentation. The validity of the data was obtained by triangulation of sources and methods. The data analysis technique uses interactive model data analysis. The results obtained: (1) the application of dynamic and static filing applications facilitates file storage to be neatly organized in one system, facilitates file retrieval, and makes it easier for officers to monitor files, (2) obstacles in implementing dynamic and static filing applications are unstable computer servers and application menus need to be added, and (3) the efforts to overcome obstacles in implementing dynamic and static filing applications are coordinating with system administration for server repairs and submitting proposals for adding file application menus.</em></p>
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Kim, Jun-Sung, Kyu-Young Whang, Hyuk-Yoon Kwon, and Il-Yeol Song. "PARADISE: Big data analytics using the DBMS tightly integrated with the distributed file system." World Wide Web 19, no. 3 (December 11, 2014): 299–322. http://dx.doi.org/10.1007/s11280-014-0312-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Liu, Yingkai, and Emil Prodan. "A computer code for topological quantum spin systems over triangulated surfaces." International Journal of Modern Physics C 31, no. 07 (June 26, 2020): 2050091. http://dx.doi.org/10.1142/s0129183120500916.

Повний текст джерела
Анотація:
We derive explicit closed-form matrix representations of Hamiltonians drawn from tensored algebras, such as quantum spin Hamiltonians. These formulas enable us to soft-code generic Hamiltonian systems and to systematize the input data for uniformly structured as well as for un-structured Hamiltonians. The result is an optimal computer code that can be used as a black box that takes in certain input files and returns spectral information about the Hamiltonian. The code is tested on Kitaev’s toric model deployed on triangulated surfaces of genus 0 and 1. The efficiency of our code enables these simulations to be performed on an ordinary laptop. The input file corresponding to the minimal triangulation of genus 2 is also supplied.
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Belarbi, Mohammed Amin, Saïd Mahmoudi, Ghalem Belalem, Sidi Ahmed Mahmoudi, and Aurélie Cools. "A New Comparative Study of Dimensionality Reduction Methods in Large-Scale Image Retrieval." Big Data and Cognitive Computing 6, no. 2 (May 13, 2022): 54. http://dx.doi.org/10.3390/bdcc6020054.

Повний текст джерела
Анотація:
Indexing images by content is one of the most used computer vision methods, where various techniques are used to extract visual characteristics from images. The deluge of data surrounding us, due the high use of social and diverse media acquisition systems, has created a major challenge for classical multimedia processing systems. This problem is referred to as the ‘curse of dimensionality’. In the literature, several methods have been used to decrease the high dimension of features, including principal component analysis (PCA) and locality sensitive hashing (LSH). Some methods, such as VA-File or binary tree, can be used to accelerate the search phase. In this paper, we propose an efficient approach that exploits three particular methods, those being PCA and LSH for dimensionality reduction, and the VA-File method to accelerate the search phase. This combined approach is fast and can be used for high dimensionality features. Indeed, our method consists of three phases: (1) image indexing within SIFT and SURF algorithms, (2) compressing the data using LSH and PCA, and (3) finally launching the image retrieval process, which is accelerated by using a VA-File approach.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Falco, C., N. Scarpato, G. Nappi, and S. Formisano. "Project of Computer-aided Management of Therapeutical Apheresis." International Journal of Artificial Organs 16, no. 5_suppl (May 1993): 185–86. http://dx.doi.org/10.1177/039139889301605s41.

Повний текст джерела
Анотація:
The great increase in hemapheresis units activity that occurred during the last years caused the need for a computer-aided management (1, 2). We present a project for a data base system able to manage therapeutical apheresis (3). The program consists of five sections. a) Patient's file card: it allows to record anamnesis, examination and blood test results easily and under computer's guidance. b) Choice of therapeutic protocol: Therapeutic protocol is fixed in this section (device to be used, apheretic method, plasma volume to be processed, blood tests before and after apheresis). c) Procedures: It provides procedure's data entry and guides the operator during the treatment on the ground of therapeutical protocol. d) Data processing: It allows statistics on data placed in the data base. e) Registers: It includes both a general register and the possibility of search by disease, device and method.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Madi, Mohammed K., Yuhanis Yusof, and Suhaidi Hassan. "Replica Placement Strategy for Data Grid Environment." International Journal of Grid and High Performance Computing 5, no. 1 (January 2013): 70–81. http://dx.doi.org/10.4018/jghpc.2013010105.

Повний текст джерела
Анотація:
Data Grid is an infrastructure that manages huge amount of data files, and provides intensive computational resources across geographically distributed collaboration. To increase resource availability and to ease resource sharing in such environment, there is a need for replication services. Data replication is one of the methods used to improve the performance of data access in distributed systems by replicating multiple copies of data files in the distributed sites. Replica placement mechanism is the process of identifying where to place copies of replicated data files in a Grid system. Existing work identifies the suitable sites based on number of requests and read cost of the required file. Such approaches consume large bandwidth and increases the computational time. The authors propose a replica placement strategy (RPS) that finds the best locations to store replicas based on four criteria, namely, 1) Read Cost, 2) File Transfer Time, 3) Sites’ Workload, and 4) Replication Sites. OptorSim is used to evaluate the performance of this replica placement strategy. The simulation results show that RPS requires less execution time and consumes less network usage compared to existing approaches of Simple Optimizer and LFU (Least Frequently Used).
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Laslami, Kaoutar, Sara Dhoum, Amine El Harchi, and Iman Benkiran. "Relationship between the Apical Preparation Diameter and the Apical Seal: An In Vitro Study." International Journal of Dentistry 2018 (2018): 1–5. http://dx.doi.org/10.1155/2018/2327854.

Повний текст джерела
Анотація:
Objectives. The aim of the study is to define the relationship between the apical preparation diameter and the apical sealing ability to highlight the importance of the preservation of the diameter and the original position of the apical foramen. Materials and Methods. 50 extracted maxillary incisors were randomly allocated into three groups of 15 teeth each (n = 15) according to the apical preparation size: Group 1: finishing file F1 corresponding to size 20 reached the working length (ProTaper Universal system Dentsply®); Group 2: prepared up to size 30 corresponding to finishing file F30; Group 3: prepared up to size 50 corresponding to finishing file F5. Five teeth were assigned to positive and negative control groups. After the filling of the root canals, the teeth were isolated and immersed in a dye solution, then cut longitudinally, photographed, and the dye penetration were calculated using a computer software. Results. Comparison of the three different apical preparation sizes showed no statistically significant differences regarding the apical microleakage. Conclusion. The most important value of the dye penetration was observed in the group with the largest apical diameter.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Zablah, Jose Isaac, Antonio Garcia Loureiro, Salvador Diaz, Yolly Molina, Ana Cardona, Jorge Urmeneta, Ethel Flores, Selvin Reyes Garcia, Carlos A. Agudelo, and Marco Tulio Medina. "Use of neural networks for triage of SARS-CoV-2." Bionatura 7, no. 3 (September 15, 2022): 1–7. http://dx.doi.org/10.21931/rb/2022.07.03.34.

Повний текст джерела
Анотація:
Emergency services worldwide have been exceeded in their capacities due to the SARS-CoV-2 pandemic, a generalized situation in countries with robust health systems and aggravated in lagging countries. As a result, focused computer solutions have been developed for self-diagnosis, triage, and follow-up of suspected and confirmed patients of SARS-CoV-2. But as it is a new disease, the symptoms evolve in a short time and the diagnostic protocols must be updated. The applications that integrate algorithms in their code to help sanitary processes need to be modified, recompiled, and published integrating these changes. This article presents a solution through the implementation of a neural network that only requires updating an external file without the need to modify whole applications. Keywords: SARS-CoV-2; Neural Network; Triage; Telemedicine; Cloud; Public Health
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Wood, Mary A., Austin Nguyen, Adam J. Struck, Kyle Ellrott, Abhinav Nellore, and Reid F. Thompson. "neoepiscope improves neoepitope prediction with multivariant phasing." Bioinformatics 36, no. 3 (August 19, 2019): 713–20. http://dx.doi.org/10.1093/bioinformatics/btz653.

Повний текст джерела
Анотація:
Abstract Motivation The vast majority of tools for neoepitope prediction from DNA sequencing of complementary tumor and normal patient samples do not consider germline context or the potential for the co-occurrence of two or more somatic variants on the same mRNA transcript. Without consideration of these phenomena, existing approaches are likely to produce both false-positive and false-negative results, resulting in an inaccurate and incomplete picture of the cancer neoepitope landscape. We developed neoepiscope chiefly to address this issue for single nucleotide variants (SNVs) and insertions/deletions (indels). Results Herein, we illustrate how germline and somatic variant phasing affects neoepitope prediction across multiple datasets. We estimate that up to ∼5% of neoepitopes arising from SNVs and indels may require variant phasing for their accurate assessment. neoepiscope is performant, flexible and supports several major histocompatibility complex binding affinity prediction tools. Availability and implementation neoepiscope is available on GitHub at https://github.com/pdxgx/neoepiscope under the MIT license. Scripts for reproducing results described in the text are available at https://github.com/pdxgx/neoepiscope-paper under the MIT license. Additional data from this study, including summaries of variant phasing incidence and benchmarking wallclock times, are available in Supplementary Files 1, 2 and 3. Supplementary File 1 contains Supplementary Table 1, Supplementary Figures 1 and 2, and descriptions of Supplementary Tables 2–8. Supplementary File 2 contains Supplementary Tables 2–6 and 8. Supplementary File 3 contains Supplementary Table 7. Raw sequencing data used for the analyses in this manuscript are available from the Sequence Read Archive under accessions PRJNA278450, PRJNA312948, PRJNA307199, PRJNA343789, PRJNA357321, PRJNA293912, PRJNA369259, PRJNA305077, PRJNA306070, PRJNA82745 and PRJNA324705; from the European Genome-phenome Archive under accessions EGAD00001004352 and EGAD00001002731; and by direct request to the authors. Supplementary information Supplementary data are available at Bioinformatics online.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Vakulenko, S. P., N. K. Volosova, and D. F. Pastukhov. "METHODS OF QR CODE TRANSMISSION IN COMPUTER STEGANOGRAPHY." World of Transport and Transportation 16, no. 5 (October 28, 2018): 14–25. http://dx.doi.org/10.30932/1992-3252-2018-16-5-2.

Повний текст джерела
Анотація:
For the English full text of the article please see the attached PDF-File (English version follows Russian version).ABSTRACT The article deals with the problems of using steganography methods for transmitting data. The authors justify their approach by arguing that the importance of cryptography in terms of transfer of hidden data i s obvious, however, being cryptographic, coded information maintains potential threat with the mere existence of an encrypted message, that is, an indication that it is necessary to apply cryptanalysis. With the help of steganography, mathematical methods are constructed that deprive the carrier of the potential threat of these prompts. The article proposes to transmit data encoded into a QR code, pre-masking it. In particular, for reliability of restoring the «original», it is proposed to solve the same problem by different methods through iteration using linear systems, the Radon transform, the boundary problem for the Poisson equation, and beyond this, methods based on probability theory. The advantages of this option include the possibility of using modern computer tools and software developed in the field of various types of tomography and in mathematical physics, while slightly modifying them. Keywords: cryptography, steganography, quick response code, information security, Radon transform, Poisson equation, iterative methods.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Setiawan, Budhy, Isa Triyanti Santoso, Achmad Walid, Ryan Prasetyo, Delila Cahya Permatasari, and Virna Umro Audiana. "Aplikasi solidwork untuk rancangan CAD 3D pada mesin 3D printer 2x2x2 meter." JURNAL ELTEK 19, no. 2 (October 29, 2021): 9. http://dx.doi.org/10.33795/eltek.v19i2.283.

Повний текст джерела
Анотація:
ABSTRAK Mesin 3D printing dapat membuat proses produksi menjadi singkat dan sederhana, keunggulan ini menjadikan banyak peneliti mulai menggembangkan mesin printing. Pengembangan mesin printing yang sudah dilakukan salah satunya adalah mesin 3D printer 2 x 2 x 2 meter. Keberhasilan mesin printing dapat dilihat dari hasil printing yang sesuai dengan desain yang diharapkan. Oleh karena itu, diperlukan aplikasi yang dapat membantu merancang desain objek 3D pada mesin printer 2x2x2 meter, salah satunya menggunakan aplikasi CAD (Computer Aided Design) “SolidWork”. Aplikasi “SolidWork” bersifat opensource yang dapat membantu mengetahui pengaruh desain 3 dimensi menggunakan software CAD terhadap jarak, sudut dan skala objek pada mesin printer 2x2x2 meter. Desain objek 3D “SolidWork” disimpan dalam dalam format file STL, kemudian diproses di dalam Simplify 3D, objek akan diiris secara software. Hasil irisan gambar 3D akan menghasilkan sebuah file G-Code. Output koordinat dari G-Code digunakan untuk menggerakan motor stepper. Hasil cetak objek 2D memiliki error ukuran bentuk segitiga 4,62%, bentuk straight slog 7,49%, bentuk oval 5,54%, error sudut sebesar 0% dan error skala objek 0%. Sedangkan untuk objek 3D memiliki error rata – rata sebesar 0,29%. Berdasarkan hasil pengujian aplikasi “SolidWork” dapat menujukkan kinerja mesin dan membantu dalam pembuatan desain 2D dan 3D pada mesin 3D printer 2x2x2 meter di Lab Elektro Prodi Elektronika Politeknik Negeri Malang. ABSTRACT 3D printing machines can make the production process short and simple, this advantage has made many researchers start to develop printing machines. One of the developments in printing machines that have been carried out is the 2 x 2 x 2 meter 3D Printer machine. The success of the printing machine can be seen from the printing results by the expected design. Therefore, an application is needed that can help design 3D object designs on a 2x2x2 meter printer machine, one of which is using the CAD (Computer-Aided Design) application "SolidWork". The application "SolidWork" is open source which can help determine the effect of 3-dimensional design using CAD software on the distance, angle, and scale of objects on a 2x2x2 meter printer machine. "SolidWorks" 3D object design is saved in STL file format, then processed in Simplify 3D, the object will be sliced ​​automatically. The sliced ​​3D image will produce a G-Code file. The coordinate output from the G-Code is used to drive the stepper motor. The printout of 2D objects has a triangular size error of 4.62%, a straight slog shape of 7.49%, an oval shape of 5.54%, an angle error of 0%, and a scale error of 0%. Meanwhile, 3D objects have an average error of 0.29%. Based on the results of testing the "SolidWork" application can show machine performance and assist in making 2D and 3D designs on a 2x2x2 meter 3D printer machine at the Electrical Lab of Electronics Study Program, State Polytechnic of Malang.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Kanazawa, Shoji. "2. A Roadmap that Illustrates the Complete Switch from VTR Tape Usage to File-based Workflow." Journal of The Institute of Image Information and Television Engineers 71, no. 7 (2017): 416–21. http://dx.doi.org/10.3169/itej.71.416.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Huo, Zhisheng, Limin Xiao, Qiaoling Zhong, Shupan Li, Ang Li, Li Ruan, Shouxin Wang, and Lihong Fu. "MBFS: a parallel metadata search method based on Bloomfilters using MapReduce for large-scale file systems." Journal of Supercomputing 72, no. 8 (June 20, 2015): 3006–32. http://dx.doi.org/10.1007/s11227-015-1464-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Farkas, Laszlo, Beda H. Bolzenius, and Georg Will. "Powder Diffraction Data and Unit Cell of Kutnohorite." Powder Diffraction 3, no. 3 (September 1988): 172–74. http://dx.doi.org/10.1017/s0885715600032930.

Повний текст джерела
Анотація:
AbstractX-ray powder diffraction data, unit cell parameters and chemical data published previously for kutnohorite, the manganese-rich double carbonate mineral, are critically evaluated and compared with new measurements on a specimen from Chvaletice, Czechoslovakia with a composition Ca (Mn0.64Mg0.23Fe0.13)(CO3)2. Data were collected with a computer controlled diffractometer and analysed with profile analysis techniques. The new powder diffraction data set yields much better data and unit cell parameters than the earlier ones given for kutnohorite on PDF 11-345 (Powder Diffraction File, 1987). A least-squares evaluation resulted in ao = 4.8518(3)Å and co = 16.217(2)Å.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Ebe, Tommy, Karen A. Sanderson, and Patricia S. Wilson. "The Chemical Abstracts Service generic chemical (Markush) structure storage and retrieval capability. 2. The MARPAT file." Journal of Chemical Information and Modeling 31, no. 1 (February 1, 1991): 31–36. http://dx.doi.org/10.1021/ci00001a004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Montero, Ana M., and Andrés Santos. "Equation of state of hard-disk fluids under single-file confinement." Journal of Chemical Physics 158, no. 15 (April 21, 2023): 154501. http://dx.doi.org/10.1063/5.0139116.

Повний текст джерела
Анотація:
The exact transfer-matrix solution for the longitudinal equilibrium properties of the single-file hard-disk fluid is used to study the limiting low- and high-pressure behaviors analytically as functions of the pore width. In the low-pressure regime, the exact third and fourth virial coefficients are obtained, which involve single and double integrals, respectively. Moreover, we show that the standard irreducible diagrams do not provide a complete account of the virial coefficients in confined geometries. The asymptotic equation of state in the high-pressure limit is seen to present a simple pole at the close-packing linear density, as in the hard-rod fluid, but, in contrast to the latter case, the residue is 2. Since, for an arbitrary pressure, the exact transfer-matrix treatment requires the numerical solution of an eigenvalue integral equation, we propose here two simple approximations to the equation of state, with different complexity levels, and carry out an extensive assessment of their validity and practical convenience vs the exact solution and available computer simulations.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Alexey, Bukalin,, and Zagrebaev Andrey. "NEW DATA COMPRESSION ALGORITHM FOR TECHNOLOGICAL INFORMATION OF THE INFORMATION-MEASURING SYSTEM "SKALA-MICRO"." Eurasian Journal of Mathematical and Computer Applications 9, no. 2 (June 2021): 4–11. http://dx.doi.org/10.32523/2306-6172-2021-9-2-4-11.

Повний текст джерела
Анотація:
This paper describes a computer program that implements an algorithm for com- pressing technological information with losses using archive data of the information-measuring system "Skala-micro" of the Kursk and Smolensk NPPs as an example. The presented al- gorithm allows to compress file archives at the data level with the possibility of their quick subsequent recovery within the limits of the acceptable error. The main goal of the algorithm is to significantly reduce the excess amount of memory when storing data for its subsequent more efficient use.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії