Academic literature on the topic 'Dagesh 2 (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Dagesh 2 (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Dagesh 2 (Computer file)"

1

Edy, Supriyadi, Ilyas Iriandi, Suromenggolo Ronggo Tatang, and Suprianto Andi. "Computer forensics is one of the sciences used to track digital." International Journal of Innovative Science and Research Technology 8, no. 1 (2023): 1926–32. https://doi.org/10.5281/zenodo.7628623.

Full text
Abstract:
Computer forensics is one of the sciences used to track digital evidence on hardware or software. Flashdisk is widely used because it is easy to carry and can store various kinds of files with large storage capacity. To be able to analyze, recover, and view hidden files, software such as AccessData FTK Imager 3.4, Autopsy 4.0, and additional software, 7-Zip 17.0, is required to compress and extract files. In this study, scenario testing and experiments were carried out on a flash disk in which there was an excel file that had been compressed using 7-Zip and disguised in a foto.jpg file using f
APA, Harvard, Vancouver, ISO, and other styles
2

Narjis Mezaal Shati and Ali Jassim Mohamed Ali. "Hiding Any Data File Format into Wave Cover." journal of the college of basic education 16, no. 69 (2019): 1–10. http://dx.doi.org/10.35950/cbej.v16i69.4739.

Full text
Abstract:
In the current study a steganography approach utilized to hide various data file format in wave files cover. Lest significant bit insertion (LSB) used to embedding a regular computer files (such as graphic, execution file (exe), sound, text, hyper text markup language (HTML) …etc) in a wave file with 2-bits hiding rates. The test results achieved good performance to hide any data file in wave file.
APA, Harvard, Vancouver, ISO, and other styles
3

Hesselink, Wim H., and Muhammad Ikram Lali. "Formalizing a hierarchical file system." Formal Aspects of Computing 24, no. 1 (2010): 27–44. http://dx.doi.org/10.1007/s00165-010-0171-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Darwis, Mochammad. "Penambahan Fitur Tampilan LCD dan Micro SD Card Reader pada mesin Laser Engraver and Cutter di Laboratorium Pengemudian Listrik." Jurnal Pengelolaan Laboratorium Pendidikan 2, no. 1 (2020): 8–18. http://dx.doi.org/10.14710/jplp.2.1.8-18.

Full text
Abstract:
Laser engraver and cutter machine that have been made in previous research, can only be controlled by a computer. The addition of LCD display and Card Reader will make it work alone without using a computer (offline). Card reader is used to read gcode files from 2-dimensional design that have been made on a computer. LCD display is used to display a menu or a list of existing settings, the percentage of loading data from a gcode file and displays the 2-dimensional design of the gcode file. To move the menu on the LCD display an encoder switch is used. This additional feature was created using
APA, Harvard, Vancouver, ISO, and other styles
5

Klyuchnikov, S. A., and E. V. Kalashnikov. "Converting a pixel structure into sound imaginations. Part 2." Bulletin of State University of Education. Series: Physics and Mathematics, no. 1 (January 30, 2024): 33–47. https://doi.org/10.18384/2949-5067-2024-1-33-47.

Full text
Abstract:
Aim. To identify the connection between visual and sound perception.Methodology. Using Object-Oriented Programming (OOP) of the Python language, we are looking for a way to convert a visual (pixel) display into an audio display. A number of modern and functional libraries are used. Modern methods of “packing” all software components into a single file are used for convenient program deployment on an electronic computing device (computer) with any modern operating system (OS). Results. A software product based on a modern OOP programming language and functional libraries has been created that a
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Qingyu, Longsheng Wu, Li Li, Xuhan Ma, and Xu An Wang. "Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart." International Journal of Information Technology and Web Engineering 10, no. 3 (2015): 17–32. http://dx.doi.org/10.4018/ijitwe.2015070102.

Full text
Abstract:
Data security in the register file significantly decreases as a result of technology scaling. Based on pipeline restart, the method of improving the data security and reliability in register files is presented in this paper. As the data and its replica simultaneously exist as a redundant copy of each other in half-custom register files, when an uncorrectable error is detected in the data during the access of the register file, its replica will be checked for subsequent processor operation by the restart of pipeline. In addition, the correctable error in data or its replica can also be scrubbed
APA, Harvard, Vancouver, ISO, and other styles
7

Carthen, Chase D., Araam Zaremehrjardi, Vinh Le, et al. "A Novel Spatial Data Pipeline for Orchestrating Apache NiFi/MiNiFi." International Journal of Software Innovation 12, no. 1 (2023): 1–14. http://dx.doi.org/10.4018/ijsi.333164.

Full text
Abstract:
In many smart city projects, a common choice to capture spatial information is the inclusion of lidar data, but this decision will often invoke severe growing pains within the existing infrastructure. In this article, the authors introduce a data pipeline that orchestrates Apache NiFi (NiFi), Apache MiNiFi (MiNiFi), and several other tools as an automated solution to relay and archive lidar data captured by deployed edge devices. The lidar sensors utilized within this workflow are Velodyne Ultra Puck sensors that produce 6-7 GB packet capture (PCAP) files per hour. By both compressing the file
APA, Harvard, Vancouver, ISO, and other styles
8

NAKANO, SHIN-ICHI, and TAKAO NISHIZEKI. "SCHEDULING FILE TRANSFERS UNDER PORT AND CHANNEL CONSTRAINTS." International Journal of Foundations of Computer Science 04, no. 02 (1993): 101–15. http://dx.doi.org/10.1142/s0129054193000079.

Full text
Abstract:
The file transfer scheduling problem was introduced and studied by Coffman, Garey, Johnson and LaPaugh. The problem is to schedule transfers of a large collection of files between various nodes of a network under port constraint so as to minimize the overall finishing time. This paper extends their model to include communication channel constraint in addition to port constraint. We formulate the problem with both port and channel constraints as a new type of edge-coloring of multigraphs, called an fg-edge-coloring, and give an efficient approximation algorithm with absolute worst-case ratio 3/
APA, Harvard, Vancouver, ISO, and other styles
9

Huizinga, D. M., and K. Heflinger. "DOC-a file system cache to support mobile computers." Distributed Systems Engineering 2, no. 3 (1995): 152–60. http://dx.doi.org/10.1088/0967-1846/2/3/003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alekseev, V. M. "METHOD OF CONSTRUCTING SECURITY MODELS OF COMPUTER SYSTEMS." World of Transport and Transportation 14, no. 6 (2016): 14–23. http://dx.doi.org/10.30932/1992-3252-2016-14-6-2.

Full text
Abstract:
[For the English abstract and full text of the article please see the attached PDF-File (English version follows Russian version)].ABSTRACT The article considers issues related to the construction of monitoring systems that provide detection of threats in the information environment. In particular, the recognition method for implementing models of analyzers in the zone of a given space of trusted and possible untrusted information traffic routes. Keywords: information security, isolated software environment, hidden channels, monitoring of subjects.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Dagesh 2 (Computer file)"

1

Tuna, Buket. "A web based IT support tracking system." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2542.

Full text
Abstract:
This project proposes an automated system that allows a registered user to post questions to a web-based database of technical experts. This enables the user to have a quicker response time to their questions. The users questions and answers are posted to the website.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Dagesh 2 (Computer file)"

1

maḥshevim, Kiṿun. דגש 2: Meʻabed ha-tamlilim ha-Yiśreʼeli ha-ṭov ba-ʻolam bi-sevivat Ḥalonot : madrikh la-mishtamesh. Kiṿun maḥshevim, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Inc, Logical Operations, ed. WordPerfect 5.0 for OS/2: Level 2 : student manual. Logical Operations, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Charles, Calvert. Delphi 2 unleashed. 2nd ed. Sams Pub., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

McKelvy, Michael. Delphi 2 tutor. Que, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gold, Rebecca. HyperCard 2 Quickstart. Que, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yee, Bernard. MechWarrior 2: Strategies & secrets. Sybex, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Colantonio, Ernest S. Using DOS with OS/2. D.C. Heath, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Anderton, Craig. Sonar 2. Wizoo Publishing, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Simpson, Toby. Creatures 2: Official strategies & secrets. Sybex, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Michael, Day. Troubleshooting LAN manager 2. M & T, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Dagesh 2 (Computer file)"

1

Penfold, David. "File and Directory Structures." In ECDL Module 2: Using the Computer and Managing Files. Springer London, 2000. http://dx.doi.org/10.1007/978-1-4471-0491-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jiang, Hongjian, Anthony W. Lin, Oliver Markgraf, Philipp Rümmer, and Daniel Stan. "$$\textsf{HornStr}$$: Invariant Synthesis for Regular Model Checking as Constrained Horn Clauses." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-98668-0_10.

Full text
Abstract:
Abstract We present $$\textsf{HornStr}$$ HornStr , the first solver for invariant synthesis for Regular Model Checking (RMC) with the specification provided in the SMT-LIB 2.6 theory of strings. It is well-known that invariant synthesis for RMC subsumes various important verification problems, including safety verification for parameterized systems. To achieve a simple and standardized file format, we treat the invariant synthesis problem as a problem of solving Constrained Horn Clauses (CHCs) over strings. Two strategies for synthesizing invariants in terms of regular constraints are supporte
APA, Harvard, Vancouver, ISO, and other styles
3

Maynard, J. "File Descriptions—2." In Computer Programming. Elsevier, 1985. https://doi.org/10.1016/b978-0-434-98607-1.50027-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"File Processing." In Advances in Systems Analysis, Software Engineering, and High Performance Computing. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-6687-2.ch011.

Full text
Abstract:
During software deployment, different kinds of file will be used depending on the specific case. The book will show the series of four file types: Text File, Serialize File, XML File, JSon File so that readers have more options in file processing. Why does program have to store data? As computer architecture is mentioned, a program wants to work, every resource must be loaded into memory, namely the RAM (Random Access Memory). The principle of RAM is the clipboard, when the software is turned off the data in the memory will no longer there. Assuming customers are entering 100 products, and the
APA, Harvard, Vancouver, ISO, and other styles
5

UNDERWOOD, JEAN, JANET SPAVOLD, and GEOFFREY UNDERWOOD. "NOVICE USE OF A RELATIONAL DATABASE: A CASE STUDY OF A LOCAL HISTORY DATA FILE." In Computer Assisted Learning. Elsevier, 1990. http://dx.doi.org/10.1016/b978-0-08-040249-9.50036-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Saurabh, Atul, and Swapnil M. Parikh. "Evolution of Distributed File System and Hadoop: A Mathematical Appraisal." In Recent Advances in Mathematical Research and Computer Science Vol. 2. Book Publisher International (a part of SCIENCEDOMAIN International), 2021. http://dx.doi.org/10.9734/bpi/ramrcs/v2/5273f.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Desain, Peter, and Henkjan Honing. "Session 2: New Computer Applications in Musicology." In Musicology And Sister Disciplines Past,Present,Future. Oxford University PressOxford, 2000. http://dx.doi.org/10.1093/oso/9780198167341.003.0131.

Full text
Abstract:
Abstract Musical performance data often require a lot of pre-processing, matching performances and scores, adding musical structure, filtering, and tabulation before further analyses can be made or performance expression can be manipulated. For the generation of musical stimuli (for example, of manipulated or artificially generated performances), some kind of flexible support is very useful. POCO is a workbench for analysing, modifying, and generating expression in music. It is aimed to be used in a research context. It is based on a consistent and flexible representation of musical objects an
APA, Harvard, Vancouver, ISO, and other styles
8

Bougoulias, Konstantinos, Ioannis Kouris, Marios Prasinos, Kostas Giokas, and Dimitris Koutsouris. "Ob/Gyn EMR Software." In Healthcare Policy and Reform. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-6915-2.ch039.

Full text
Abstract:
In this chapter, the collection and the analysis for the development of an Ob/Gyn EMR software for small Obstetrics and Gynecology organizations is analyzed. The necessary gynecological information was gathered via research concerning the needs of the practice and was organized and categorized according to its importance to the clinicians. The user interface of the developed software provides access to obstetrics, gynecological, surgical, sterilization and PAP test data, along with video and image file storage capabilities. An integrated appointment scheduling module, as well as an expected la
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Bahadili, Hussein, and Haitham Y. Adarbah. "Modeling of TCP Reno with Packet-Loss and Long Delay Cycles." In Simulation in Computer Network Design and Modeling. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0191-8.ch012.

Full text
Abstract:
The Transport Control Protocol (TCP) is the dominant transport layer protocol in the Internet Protocol (IP) suite, as it carries a significant amount of the Internet traffic, such as Web browsing, file transfer, e-mail, and remote access. Therefore, huge efforts have been devoted by researchers to develop suitable models that can help with evaluating its performance in various network environments. Some of these models are based on analytical or simulation approaches. This chapter presents a description, derivation, implementation, and comparison of two well-known analytical models, namely, th
APA, Harvard, Vancouver, ISO, and other styles
10

Pujeri, Uma Ramachandra, Sharmishta Suhas Desai, and Amit Savyanavar. "Encryption Techniques for Modern World." In Theoretical and Applied Mathematics in International Business. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-8458-2.ch013.

Full text
Abstract:
Encryption is the process of converting confidential private data into unreadable form and securing information in the file from unauthorized access using various encryption algorithms. We live in the information age where the exchange of private information has become the integral part of our day-to-day activities. Billions of e-mails and business data are sent throughout the world through internet daily. The success of the information age is to keep private secure data from unauthorized access and key to access the private and secure data for authorized users. Encryption in this information
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Dagesh 2 (Computer file)"

1

Ohzeki, Kazuo, Yuan Yu Wei, Eizaburo Iwata, and Ulrich Speidel. "Basic consideration of MPEG-2 coded file entropy and lossless re-encoding." In 2010 International Multiconference on Computer Science and Information Technology (IMCSIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/imcsit.2010.5679744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hu, Kevin, Yu Sun, and Yujia Zhang. "A Fully Automated Music Equalizer based on Music Genre Detection using Deep Learning and Neural Network." In 13th International Conference on Computer Science, Engineering and Applications (CCSEA 2023). Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130517.

Full text
Abstract:
Recent years have witnessed the dramatic popularity of online music streaming and the use of headphones likeAirPods, which millions of people use daily [1]. Melodic EQ was inspired by these users to create the best audiolistening experience for listeners with various preferences [2]. Melodic EQ is a project that creates customEQs tothe user's custom music tastes and filters the audio to fit their favorite settings. To achieve this goal, the processstarts with a song file taken from an existing file, for example, Spotify downloads or mp3s. This file is then uploadedto the app. The software sort
APA, Harvard, Vancouver, ISO, and other styles
3

Shao, Chenyue, and Garret Washburn. "Enhancing File Organization in the Modern Computing Era: An AI-Driven Approach with the File Sorter Application." In 12th International Conference of Security, Privacy and Trust Management. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.141108.

Full text
Abstract:
In the modern computing age, where it seems that almost everyone has a computer, the organization of individuals file structures has become increasingly more and more unorganized [1]. In an effort to solve this problem, the File Sorter application proposed in this paper enables a user to easily sort their files with the help of an AI model designed to sort files accurately and efficiently. The File Sorter application utilizes AI to predict where a file should go given a dataset [2]. To test this application, we employed experiments to design how time efficient the File Sorter was as well as ho
APA, Harvard, Vancouver, ISO, and other styles
4

Fu, Chun Kit, and Yu Sun. "Airbnb Research: An Analysis in Nexus BetweenVisual Description and Product Rating." In 13th International Conference on Computer Science, Engineering and Applications (CCSEA 2023). Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130520.

Full text
Abstract:
Hosts are often desperate to find ways to rent their house, However, most of them do not have possess theknowledge of knowing what type of image cover would grasp the attention of their customer. Gilded by these needs, I have designed an application that uses machine learning to find the relationship between the images andtheirrating [1]. I first used JSON to convert the HTML file resource to a format where we can use in python for webscraping [2]. This paper designs an application tool to find all the object or characters inside images by webscraping and changes it into a model for machine le
APA, Harvard, Vancouver, ISO, and other styles
5

Yasukawa, K., D. Iguchi, S. Yamaguchi, et al. "10ms direct seeking of 90mm magneto-optical disk with flying optical head." In Optical Data Storage. Optica Publishing Group, 1991. http://dx.doi.org/10.1364/ods.1991.tuc3.

Full text
Abstract:
We have developed a flying optical head to attain high speed accessing which is the important issue in applying optical disks for computer file memories1)2). This time, we studied direct seeking technology with the flying optical head and successfully applied the technology for 90mm magneto-optical disks.
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Yirina, and Yu Sun. "An Intelligent and Data-Based Skate Analyzer to Assist in Analyzing Movements of Skate on Ice." In 13th International Conference on Computer Science, Engineering and Applications (CCSEA 2023). Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130516.

Full text
Abstract:
Ever since the start of Figure Skating, there has been an emphasis on skating technique, especially in the step sequences of a skater’s choreography [1]. But Figure Skaters often are not able to detect the motion, edge, or placement of their blade on the ice without watching themselves skate. The solution to this problem would be to have a skate analyzer. A skate analyzer would record the movements of a skate on ice and one would be able to playback the recorded data and view their skate motion precisely [2]. Three main components that my project links together are the QTPY-ESP 32 microcontrol
APA, Harvard, Vancouver, ISO, and other styles
7

Wilson, Christopher G., Robert Dean, George T. Flowers, and John Y. Hung. "A Technique for Embedding SPICE in a Simulink Environment for MEMS Simulations." In ASME 2010 International Mechanical Engineering Congress and Exposition. ASMEDC, 2010. http://dx.doi.org/10.1115/imece2010-38394.

Full text
Abstract:
Computer simulations are powerful tools in the designer’s toolbox, giving an estimate of what the device will actually do once realized. Two such tools, Simulink and SPICE are commonly used to design, simulate, and verify models in the mechanical and electronic domains, respectively. Challenges can arise, however, when attempting to simulate behaviors of hybrid systems that possies both electronic and mechancial subsystems. For example, in microelectromechanical systems (MEMS) designs, variable capacitors are frequent methods for sensing and actuating. While straightforward to model in Simulin
APA, Harvard, Vancouver, ISO, and other styles
8

Karinathi, R., V. Jagannathan, V. Montan, et al. "Modeling Enterprise Information and Enabling Access Using Information Sharing Server." In ASME 1993 International Computers in Engineering Conference and Exposition. American Society of Mechanical Engineers, 1993. http://dx.doi.org/10.1115/edm1993-0116.

Full text
Abstract:
Abstract The engineering data of a large enterprise is typically distributed over a wide area and archived in a variety of databases and file systems. Access to such information is crucial to a team member, particularly in a concurrent engineering setting. However, this is not easy, because (1) a model of the relevant information is not available, and (2) there is no simple way to access the information without being knowledgeable about various computer data formats, file systems, and networks. However, in a concurrent engineering environment, there is every need to be aware of the perspective
APA, Harvard, Vancouver, ISO, and other styles
9

Kirk, J. A., D. K. Anand, M. Anjanappa, and W. K. Rickert. "The Use of IGES in Rapid and Automated Design Prototyping." In ASME 1988 Design Technology Conferences. American Society of Mechanical Engineers, 1988. http://dx.doi.org/10.1115/detc1988-0004.

Full text
Abstract:
Abstract The Initial Graphic Exchange Specification (IGES) for design data and the EIA standard M and G Codes for Numerically Controlled machines (N/C) is used to develop an automated interface between existing computer aided design systems and N/C manufacturing systems. The Flexible Manufacturing Protocol, developed at the University of Maryland, outlines such an interface to control automated manufacturing cells used for prototyping quick design changes. This paper demonstrates one application of the protocol, developing an automated IGES to CNC interface to control a 3 axis CNC machining ce
APA, Harvard, Vancouver, ISO, and other styles
10

Joo, Sung-Hwan. "Assessment of Three Dimensional CAD Models Using CAD Application Programming Interface." In ASME 2018 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/imece2018-87776.

Full text
Abstract:
It has been always a challenge to grade and assess the students’ CAD (Computer-Aided Design) three-dimensional models in the class. The high number of the files and complexity of models make the task time-consuming and tedious many times. For example, even opening and closing each CAD file takes a lot of time. When hundreds of CAD models need to open and verified, it takes more than one hour to finish the task. The work has been done to simplify this task and make it easy using Commercial CAD software’s API (Application Programming Interface), which can be used to automate and customize the CA
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!