To see the other types of publications on this topic, follow the link: Dagesh 2 (Computer file).

Journal articles on the topic 'Dagesh 2 (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Dagesh 2 (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Edy, Supriyadi, Ilyas Iriandi, Suromenggolo Ronggo Tatang, and Suprianto Andi. "Computer forensics is one of the sciences used to track digital." International Journal of Innovative Science and Research Technology 8, no. 1 (2023): 1926–32. https://doi.org/10.5281/zenodo.7628623.

Full text
Abstract:
Computer forensics is one of the sciences used to track digital evidence on hardware or software. Flashdisk is widely used because it is easy to carry and can store various kinds of files with large storage capacity. To be able to analyze, recover, and view hidden files, software such as AccessData FTK Imager 3.4, Autopsy 4.0, and additional software, 7-Zip 17.0, is required to compress and extract files. In this study, scenario testing and experiments were carried out on a flash disk in which there was an excel file that had been compressed using 7-Zip and disguised in a foto.jpg file using f
APA, Harvard, Vancouver, ISO, and other styles
2

Narjis Mezaal Shati and Ali Jassim Mohamed Ali. "Hiding Any Data File Format into Wave Cover." journal of the college of basic education 16, no. 69 (2019): 1–10. http://dx.doi.org/10.35950/cbej.v16i69.4739.

Full text
Abstract:
In the current study a steganography approach utilized to hide various data file format in wave files cover. Lest significant bit insertion (LSB) used to embedding a regular computer files (such as graphic, execution file (exe), sound, text, hyper text markup language (HTML) …etc) in a wave file with 2-bits hiding rates. The test results achieved good performance to hide any data file in wave file.
APA, Harvard, Vancouver, ISO, and other styles
3

Hesselink, Wim H., and Muhammad Ikram Lali. "Formalizing a hierarchical file system." Formal Aspects of Computing 24, no. 1 (2010): 27–44. http://dx.doi.org/10.1007/s00165-010-0171-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Darwis, Mochammad. "Penambahan Fitur Tampilan LCD dan Micro SD Card Reader pada mesin Laser Engraver and Cutter di Laboratorium Pengemudian Listrik." Jurnal Pengelolaan Laboratorium Pendidikan 2, no. 1 (2020): 8–18. http://dx.doi.org/10.14710/jplp.2.1.8-18.

Full text
Abstract:
Laser engraver and cutter machine that have been made in previous research, can only be controlled by a computer. The addition of LCD display and Card Reader will make it work alone without using a computer (offline). Card reader is used to read gcode files from 2-dimensional design that have been made on a computer. LCD display is used to display a menu or a list of existing settings, the percentage of loading data from a gcode file and displays the 2-dimensional design of the gcode file. To move the menu on the LCD display an encoder switch is used. This additional feature was created using
APA, Harvard, Vancouver, ISO, and other styles
5

Klyuchnikov, S. A., and E. V. Kalashnikov. "Converting a pixel structure into sound imaginations. Part 2." Bulletin of State University of Education. Series: Physics and Mathematics, no. 1 (January 30, 2024): 33–47. https://doi.org/10.18384/2949-5067-2024-1-33-47.

Full text
Abstract:
Aim. To identify the connection between visual and sound perception.Methodology. Using Object-Oriented Programming (OOP) of the Python language, we are looking for a way to convert a visual (pixel) display into an audio display. A number of modern and functional libraries are used. Modern methods of “packing” all software components into a single file are used for convenient program deployment on an electronic computing device (computer) with any modern operating system (OS). Results. A software product based on a modern OOP programming language and functional libraries has been created that a
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Qingyu, Longsheng Wu, Li Li, Xuhan Ma, and Xu An Wang. "Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart." International Journal of Information Technology and Web Engineering 10, no. 3 (2015): 17–32. http://dx.doi.org/10.4018/ijitwe.2015070102.

Full text
Abstract:
Data security in the register file significantly decreases as a result of technology scaling. Based on pipeline restart, the method of improving the data security and reliability in register files is presented in this paper. As the data and its replica simultaneously exist as a redundant copy of each other in half-custom register files, when an uncorrectable error is detected in the data during the access of the register file, its replica will be checked for subsequent processor operation by the restart of pipeline. In addition, the correctable error in data or its replica can also be scrubbed
APA, Harvard, Vancouver, ISO, and other styles
7

Carthen, Chase D., Araam Zaremehrjardi, Vinh Le, et al. "A Novel Spatial Data Pipeline for Orchestrating Apache NiFi/MiNiFi." International Journal of Software Innovation 12, no. 1 (2023): 1–14. http://dx.doi.org/10.4018/ijsi.333164.

Full text
Abstract:
In many smart city projects, a common choice to capture spatial information is the inclusion of lidar data, but this decision will often invoke severe growing pains within the existing infrastructure. In this article, the authors introduce a data pipeline that orchestrates Apache NiFi (NiFi), Apache MiNiFi (MiNiFi), and several other tools as an automated solution to relay and archive lidar data captured by deployed edge devices. The lidar sensors utilized within this workflow are Velodyne Ultra Puck sensors that produce 6-7 GB packet capture (PCAP) files per hour. By both compressing the file
APA, Harvard, Vancouver, ISO, and other styles
8

NAKANO, SHIN-ICHI, and TAKAO NISHIZEKI. "SCHEDULING FILE TRANSFERS UNDER PORT AND CHANNEL CONSTRAINTS." International Journal of Foundations of Computer Science 04, no. 02 (1993): 101–15. http://dx.doi.org/10.1142/s0129054193000079.

Full text
Abstract:
The file transfer scheduling problem was introduced and studied by Coffman, Garey, Johnson and LaPaugh. The problem is to schedule transfers of a large collection of files between various nodes of a network under port constraint so as to minimize the overall finishing time. This paper extends their model to include communication channel constraint in addition to port constraint. We formulate the problem with both port and channel constraints as a new type of edge-coloring of multigraphs, called an fg-edge-coloring, and give an efficient approximation algorithm with absolute worst-case ratio 3/
APA, Harvard, Vancouver, ISO, and other styles
9

Huizinga, D. M., and K. Heflinger. "DOC-a file system cache to support mobile computers." Distributed Systems Engineering 2, no. 3 (1995): 152–60. http://dx.doi.org/10.1088/0967-1846/2/3/003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alekseev, V. M. "METHOD OF CONSTRUCTING SECURITY MODELS OF COMPUTER SYSTEMS." World of Transport and Transportation 14, no. 6 (2016): 14–23. http://dx.doi.org/10.30932/1992-3252-2016-14-6-2.

Full text
Abstract:
[For the English abstract and full text of the article please see the attached PDF-File (English version follows Russian version)].ABSTRACT The article considers issues related to the construction of monitoring systems that provide detection of threats in the information environment. In particular, the recognition method for implementing models of analyzers in the zone of a given space of trusted and possible untrusted information traffic routes. Keywords: information security, isolated software environment, hidden channels, monitoring of subjects.
APA, Harvard, Vancouver, ISO, and other styles
11

Pullan, S. E. "Recommended standard for seismic (/radar) data files in the personal computer environment." GEOPHYSICS 55, no. 9 (1990): 1260–71. http://dx.doi.org/10.1190/1.1442942.

Full text
Abstract:
This paper is the result of the work of a subcommittee of SEG’s Engineering and Groundwater Geophysics Committee. It recommends a data file format for raw or processed shallow seismic or digital radar data in the small computer environment. It is recommended that this format be known as the SEG-2 format.
APA, Harvard, Vancouver, ISO, and other styles
12

JAGANATHAN, V., R. KARINTHI, G. ALMASI, and M. SOBOLEWSKI. "MODEL BASED INFORMATION ACCESS." International Journal of Cooperative Information Systems 03, no. 02 (1994): 107–27. http://dx.doi.org/10.1142/s0218215794000089.

Full text
Abstract:
The engineering data of a large enterprise is typically distributed over a wide area and archived in a variety of databases and file systems. Access to such information is crucial to a team member, particularly in a concurrent engineering setting. However, this is not easy, because (1) a model of the relevant information is not available, and (2) there is no simple way to access the information without being knowledgeable about various computer data formats, file systems, and networks. We have developed a system called the Information Sharing System (ISS) to enable access to diverse and distri
APA, Harvard, Vancouver, ISO, and other styles
13

Yang, Hua, Gang Cui, Hong-Wei Liu, and Xiao-Zong Yang. "Compacting register file via 2-level renaming and bit-partitioning." Microprocessors and Microsystems 31, no. 3 (2007): 178–87. http://dx.doi.org/10.1016/j.micpro.2006.08.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Wunarso, Novita Belinda, Andrias Rusli, Michelle Angelica, and Arabella Margaret Salim. "Implementasi Distributed File Server pada Apache Web Server." Jurnal ULTIMA InfoSys 4, no. 2 (2013): 84–88. http://dx.doi.org/10.31937/si.v4i2.245.

Full text
Abstract:
In this research, a Distributed File Server (DFS) is developed to manage the need of a large storage space in the server, especially when the multimedia files are saved permanently in the web server. In the development, Apache Web Server is used with 1 computer as the main server, 2 computers as file servers, and 1 computer as the client who sends request. The result from the implementation of the DFS is the usage of main server’s storage space can be reduced by 99,77% from the full usage condition, causing an optimization in the web server. Another parameter is also being tested by the implem
APA, Harvard, Vancouver, ISO, and other styles
15

Kim, TaeGuen, Yeo Reum Lee, BooJoong Kang, and Eul Gyu Im. "Binary executable file similarity calculation using function matching." Journal of Supercomputing 75, no. 2 (2016): 607–22. http://dx.doi.org/10.1007/s11227-016-1941-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Qin, Tiancheng, and S. Rasoul Etesami. "Optimal Online Algorithms for File-Bundle Caching and Generalization to Distributed Caching." ACM Transactions on Modeling and Performance Evaluation of Computing Systems 6, no. 1 (2021): 1–23. http://dx.doi.org/10.1145/3445028.

Full text
Abstract:
We consider a generalization of the standard cache problem called file-bundle caching, where different queries (tasks), each containing l ≥ 1 files, sequentially arrive. An online algorithm that does not know the sequence of queries ahead of time must adaptively decide on what files to keep in the cache to incur the minimum number of cache misses. Here a cache miss refers to the case where at least one file in a query is missing among the cache files. In the special case where l = 1, this problem reduces to the standard cache problem. We first analyze the performance of the classic least recen
APA, Harvard, Vancouver, ISO, and other styles
17

Dugan, JB. "Analysis of hybrid voting algorithm for replicated file systems." Information and Software Technology 33, no. 4 (1991): 273–80. http://dx.doi.org/10.1016/0950-5849(91)90152-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Peters, Andreas-Joachim, Michal Kamil Simon, and Elvin Alin Sindrilaru. "Erasure Coding for production in the EOS Open Storage system." EPJ Web of Conferences 245 (2020): 04008. http://dx.doi.org/10.1051/epjconf/202024504008.

Full text
Abstract:
The storage group of CERN IT operates more than 20 individual EOS[1] storage services with a raw data storage volume of more than 340 PB. Storage space is a major cost factor in HEP computing and the planned future LHC Run 3 and 4 increase storage space demands by at least an order of magnitude. A cost effective storage model providing durability is Erasure Coding (EC) [2]. The decommissioning of CERN’s remote computer center (Wigner/Budapest) allows a reconsideration of the currently configured dual-replica strategy where EOS provides one replica in each computer center. EOS allows one to con
APA, Harvard, Vancouver, ISO, and other styles
19

Mr., Samir Ashok Mohite. "Peer To Peer File Transfer with Torrent." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 2821–23. https://doi.org/10.31142/ijtsrd15746.

Full text
Abstract:
Peer to peer data transfer received a lot of attention in recent years. A peer to peer network allows users to communicate or send data over a network without any server. A peer is any computer client or user. So that it called Peer to peer P2P networking as there is no server, all data transfer process is going between those peers only. Peer to peer file sharing means distribution of files over a network without participation of any server, in which the files are located on individual's machine and distributed with other members of the network. These type of networking softwares like Bit
APA, Harvard, Vancouver, ISO, and other styles
20

Hiswara, Indra, Khusnul Khoiriyah, and Dody Febriyanto. "PERANCANGAN JARINGAN LAN SMK AL-KHAIRIYAH 2 DENGAN MENGGUNAKAN METODE OSPF." JEIS : Jurnal Elektro dan Informatika Swadharma 3, no. 1 (2023): 58–66. http://dx.doi.org/10.56486/jeis.vol3no1.302.

Full text
Abstract:
The internet network is needed to carry out daily activities. A computer network is a network system where all computers share data and resources. The problem that often occurs in computer networks at SMK Al Khairiyah 2 is the dominance of user limitations by staff activities such as downloading or uploading large files. As well as the difficulty of knowing the number of computer network users who use wireless technology. This causes frequent problems with the computer network at this school, such as data sent being slow and doesn't even reach its destination, communication often experiences t
APA, Harvard, Vancouver, ISO, and other styles
21

Holland, Stephen, and Richard J. David. "An outcome-coded birth file from machine readable vital records." Computers in Biology and Medicine 15, no. 1 (1985): 25–39. http://dx.doi.org/10.1016/0010-4825(85)90081-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Jawad, Alkenani, and Ahmed Nassari Khulood. "Enhance work for java based network analyzer tool used to analyze network simulator files." Enhance work for java based network analyzer tool used to analyze network simulator files 29, no. 2 (2023): 954–62. https://doi.org/10.11591/ijeecs.v29.i2.pp954-962.

Full text
Abstract:
The network performance measurement is important in computer networks, and performance measurement may not be effective for installation in peripheral devices resulting in the replacement of those devices and thus increasing cost. In light of this, it is better to have a simulation of the network to see its performance rather than the actual design. NS-2 is one of the most popular and widely used open-source network simulators in many organizations, which generates trace files during the simulation experience. The trace file contains all network events that can be used to calculate performance
APA, Harvard, Vancouver, ISO, and other styles
23

French, J. C., T. W. Pratt, and M. Das. "Performance Measurement of the Concurrent File System of the Intel iPSC/2 Hypercube." Journal of Parallel and Distributed Computing 17, no. 1-2 (1993): 115–21. http://dx.doi.org/10.1006/jpdc.1993.1009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Nishi, Yohei, Masahiro Sasabe, and Shoji Kasahara. "Optimality analysis of locality-aware tit-for-tat-based P2P file distribution." Peer-to-Peer Networking and Applications 13, no. 5 (2020): 1688–703. http://dx.doi.org/10.1007/s12083-020-00925-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Yosefin and Muhammad Gifran. "Digital-Based Basic Accounting Training for Accounting Students at SMK N 1 Pangkalpinang (Series: 2)." Asian Journal of Community Services 2, no. 4 (2023): 375–82. http://dx.doi.org/10.55927/ajcs.v2i4.3893.

Full text
Abstract:
Basic digital-based accounting skills, especially operating accounting computer applications, is a challenge for students majoring in accounting at SMK N 1 Pangkalpinang, given the ever-evolving application technology. The training we carry out can support students to improve their skills. Series training: 2 uses an accurate educational series application. This training consists of understanding and operating order financing with an accounting computer, analyzing return merchandise authorization (RMA), analyzing memorize transactions and recuring, operating file menus on an accounting computer
APA, Harvard, Vancouver, ISO, and other styles
26

Padmavati, S. Tubachi. "Different File Formats used in Digital Preservation." International Journal of Trend in Scientific Research and Development 2, no. 5 (2018): 1044–54. https://doi.org/10.31142/ijtsrd15834.

Full text
Abstract:
Digitization is the process where information contained in analogues items like images, text, audio and video are captured and converted into a digital format. In this format information is organized into discrete units of data called bit s that can be separately addressed as byte which is a multiple bit group called byte s Every type of information is represented in digital form. Digital information can be saved on any medium that is able to represent the binary digits bits 0 and 1. The meaningful sequence of bits with no intervening spaces, punctuation or formatting is called as bit stream.
APA, Harvard, Vancouver, ISO, and other styles
27

Robinson, Shahbabaei, and Kim. "Deformation Effect on Water Transport through Nanotubes." Energies 12, no. 23 (2019): 4424. http://dx.doi.org/10.3390/en12234424.

Full text
Abstract:
In this study, we used non-equilibrium molecular dynamics to study the transport of water through deformed (6,6) Carbon Nanotubes (CNTs) and Boron Nitride Nanotubes (BNNTs). The results were then compared with that of the perfect nanotubes. The main aim of this study was to get a better insight into the deformation effect on water transport through nanotubes rather than directly comparing the CNTs and BNNTs. As the diameters of both types of nanotubes differ from each other for the same chiral value, they are not directly comparable. We carried out our study on deformations such as screw disto
APA, Harvard, Vancouver, ISO, and other styles
28

Idris, Fayez, Zaher Abu, Rashad Rasras, and Emary El. "Building an advanced invariant real-time human tracking system." Computer Science and Information Systems 4, no. 1 (2007): 57–75. http://dx.doi.org/10.2298/csis0701057i.

Full text
Abstract:
Real-time human tracking is very important in surveillance and robot applications. We note that the performance of any human tracking system depends on its accuracy and its ability to deal with various human sizes in a fast way. In this paper, we combined the presented works in [1, 2] to come with new human tracking algorithm that is robust to background and lighting changes and does not require special hardware components. In addition this system can handle various scales of human images. The proposed system uses sum of absolute difference (SAD) with thresholding as has been described in [2]
APA, Harvard, Vancouver, ISO, and other styles
29

Prof., Avinash Sharma, and Pathak Anchal. "Energy Efficient For Cloud Based GPU Using DVFS With Snoopy Protocol." International Journal of Trend in Scientific Research and Development 2, no. 6 (2019): 133–38. https://doi.org/10.31142/ijtsrd18412.

Full text
Abstract:
GPU design trends show that the register file size will continue to increase to enable even more thread level parallelism. As a result register file consumes a large fraction of the total GPU chip power. It explores register file data compression for GPUs to improve power efficiency. Compression reduces the width of the register file read and writes operations, which in turn reduces dynamic power. This work is motivated by the observation that the register values of threads within the same warp are similar, namely the arithmetic differences between two successive thread registers is small. Com
APA, Harvard, Vancouver, ISO, and other styles
30

Norros, Ilkka, Hannu Reittu, and Timo Eirola. "On the stability of two-chunk file-sharing systems." Queueing Systems 67, no. 3 (2011): 183–206. http://dx.doi.org/10.1007/s11134-011-9209-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Alkenani, Jawad, and Khulood Ahmed Nassar. "Enhance work for java based network analyzer tool used to analyze network simulator files." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 2 (2023): 954. http://dx.doi.org/10.11591/ijeecs.v29.i2.pp954-962.

Full text
Abstract:
<span lang="EN-US">The network performance measurement is important in computer networks, and performance measurement may not be effective for installation in peripheral devices resulting in the replacement of those devices and thus increasing cost. In light of this, it is better to have a simulation of the network to see its performance rather than the actual design. NS-2 is one of the most popular and widely used open-source network simulators in many organizations, which generates trace files during the simulation experience. The trace file contains all network events that can be used
APA, Harvard, Vancouver, ISO, and other styles
32

Zahariea, Dănuţ. "Computer Aided Design of Centrifugal Fan Impeller Using CATIA Software." Applied Mechanics and Materials 809-810 (November 2015): 853–58. http://dx.doi.org/10.4028/www.scientific.net/amm.809-810.853.

Full text
Abstract:
In this paper, the 3D model of the centrifugal fan impeller will be obtained using CAD software (CATIA). The blade will be obtained with 4 design methods: constant blade width and variable blade angle; hyperbolic blade width and variable blade angle; hyperbolic blade width and constant blade angle; linear blade width and variable blade angle. A comparative analysis of the weight of the blade, as well as of the weight of the rotor composed by cascade of blades, front and rear shrouds will be presented. Two materials have been used for all the elements of the centrifugal fan impeller: steel and
APA, Harvard, Vancouver, ISO, and other styles
33

Venckauskas, Algimantas, Vacius Jusas, Kęstutis Paulikas, and Jevgenijus Toldinas. "Methodology to investigate BitTorrent sync protocol." Computer Science and Information Systems 14, no. 1 (2017): 197–218. http://dx.doi.org/10.2298/csis160212032v.

Full text
Abstract:
The BitTorrent Sync client application is the most progressive development in the BitTorrent family. Nevertheless, it can be used for the activities that draw the attention of the forensics invetigators. The BitTorrent Sync client application employs quite largely the encryption for sending data packages. The initiation of the activity is carried out in the plain text only. Therefore, we proposed the methodology that enables to capture the initiation step and to inform the forensics investigator, which then takes the reactive actions. The experiment was carried in two modes: 1) simulating of t
APA, Harvard, Vancouver, ISO, and other styles
34

Archana., P., and S. Prasanna. "An Efficient File Hierarchy based E System with Clinical Document Architecture in Cloud Computing." International Journal of Trend in Scientific Research and Development 2, no. 1 (2018): 1637–42. https://doi.org/10.31142/ijtsrd10785.

Full text
Abstract:
E Healthcare system monitors the health condition and gives medical treatment through our web application. They collect the real time personal information PHI and patient's physical problem and transmitted it to the healthcare provider. To securely share the PHR information in cloud computing, a patient divides his PHR information M into two parts personal information m1 that may contain the patient's name, social security number, telephone number, home address, etc. The medical record m2 which does not contain sensitive personal information, such as medical test results, treatment pro
APA, Harvard, Vancouver, ISO, and other styles
35

BUFFENBARGER, JIM. "A Software Tool for Maintaining File and Macro Build Dependencies." Journal of Software Maintenance: Research and Practice 8, no. 6 (1996): 421–31. http://dx.doi.org/10.1002/(sici)1096-908x(199611)8:6<421::aid-smr140>3.0.co;2-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Wilkinson, Luke E., and Sam R. Gledhill. "An Integrated Approach to a Teaching File Linked to PACS." Journal of Digital Imaging 20, no. 4 (2006): 402–10. http://dx.doi.org/10.1007/s10278-006-1045-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Payá-Vayá, Guillermo, Javier Martín-Langerwerf, and Peter Pirsch. "A Multi-Shared Register File Structure for VLIW Processors." Journal of Signal Processing Systems 58, no. 2 (2009): 215–31. http://dx.doi.org/10.1007/s11265-009-0355-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Fuentes-Porto, Alba, Carlos García-Ávila, and Efraín Marrero-Salas. "Casa del Samarín, una estación de grabados rupestres en deterioro. Documentación, análisis y diagnóstico en Los Llanos de Ifara, Granadilla, Tenerife." Virtual Archaeology Review 12, no. 24 (2021): 99. http://dx.doi.org/10.4995/var.2021.13810.

Full text
Abstract:
&lt;p class="VARAbstract"&gt;&lt;strong&gt;Extended Abstract:&lt;/strong&gt;&lt;/p&gt;&lt;p class="VARAbstract"&gt;In the archaeology of the Canary Islands (Spain), there are many studies based on the usage of new technologies to contribute to the identification and description of rock art engravings through high-resolution digital models (&lt;a href="file:///L:/PC%20Port%C3%A1til%20Poli/Mis%20documentos/VAR/En%20Curso/Revisi%C3%B3n/13810/13810-60985-2-CE_jll.docx#Mart%C3%ADn_2005"&gt;Martín, 2005&lt;/a&gt;; &lt;a href="file:///L:/PC%20Port%C3%A1til%20Poli/Mis%20documentos/VAR/En%20Curso/Revis
APA, Harvard, Vancouver, ISO, and other styles
39

V., Sai Lahari, Swathi R., and Chithra D. "Circuited Mouse with File Transfer Facility using Embedded and Network Technology." Journal of Advancement in Software Engineering and Testing 3, no. 1 (2020): 1–9. https://doi.org/10.5281/zenodo.3733248.

Full text
Abstract:
The purpose of our project is to enable storage and file transfer for the users, making it possible with the use of single USB connected mouse with the help of an integrated chip. This Integrated Chip(IC) is (GL850G) that acts as a splitter. This splitter splits the USB connector to connect the receiver and a storage medium, so that the users can make use of this mouse as storage device also. So the user can transfer the files or data to another unknown computer via this mouse with an inbuilt storage facility instead of using an additional storage device. File transfers are made easier between
APA, Harvard, Vancouver, ISO, and other styles
40

Putri, Noviana, Cicilia Dyah S. Indrawati, and Anton Subarno. "PENERAPAN APLIKASI PEMBERKASAN ARSIP DINAMIS DAN STATIS DI KANTOR PELAYANAN PAJAK PRATAMA KARANGANYAR." JIKAP (Jurnal Informasi dan Komunikasi Administrasi Perkantoran) 6, no. 2 (2022): 88. http://dx.doi.org/10.20961/jikap.v6i2.56631.

Full text
Abstract:
&lt;p&gt;&lt;em&gt;This study aims to determine the implementation of dynamic and static filing applications in the Service Section at Pratama Tax Office Karanganyar. This research was conducted at Pratama Tax Office Karanganyar. The sampling of this research is using purposive sampling and snowball sampling technique. Data collection techniques with observation, interviews, and documentation. The validity of the data was obtained by triangulation of sources and methods. The data analysis technique uses interactive model data analysis. The results obtained: (1) the application of dynamic and s
APA, Harvard, Vancouver, ISO, and other styles
41

Leong, K. F., C. K. Chua, and Y. M. Ng. "A study of stereolithography file errors and repair. Part 2. Special cases." International Journal of Advanced Manufacturing Technology 12, no. 6 (1996): 415–22. http://dx.doi.org/10.1007/bf01186930.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Jayaweera, Y.D., Johar Md Gapar Md, and S.N. Perera. "Automatic Indexing Framework for Context Aware Personal Document Management System." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 03 (2014): 673–79. https://doi.org/10.5281/zenodo.14715556.

Full text
Abstract:
Today managing files in a personal computer has the same magnitude as managing the World Wide Web due to the dynamic nature of the file system [1]. Even searching for files over a file system is time consuming because finding a file on hard disk is a long-running task. Every file on the disk has to be read with dangling pointers to files which no longer exist because they have been changed, moved or deleted. This makes the user frustrated. Personal document management is the activity of managing a collection of digital documents by the owner of the documents. This consists of creation, organiz
APA, Harvard, Vancouver, ISO, and other styles
43

Lee, Kyungwoon, Jeongsu Kim, Ik-Hyeon Kwon, Hyunchan Park, and Cheol-Ho Hong. "Impact of Secure Container Runtimes on File I/O Performance in Edge Computing." Applied Sciences 13, no. 24 (2023): 13329. http://dx.doi.org/10.3390/app132413329.

Full text
Abstract:
Containers enable high performance and easy deployment due to their lightweight architecture, thus facilitating resource utilization in edge computing nodes. Secure container runtimes have attracted significant attention because of the necessity for overcoming the security vulnerabilities of containers. As the runtimes adopt an additional layer such as virtual machines and user-space kernels to enforce isolation, the container performance can be degraded. Even though previous studies presented experimental results on performance evaluations of secure container runtimes, they lack a detailed an
APA, Harvard, Vancouver, ISO, and other styles
44

Liu, Yingkai, and Emil Prodan. "A computer code for topological quantum spin systems over triangulated surfaces." International Journal of Modern Physics C 31, no. 07 (2020): 2050091. http://dx.doi.org/10.1142/s0129183120500916.

Full text
Abstract:
We derive explicit closed-form matrix representations of Hamiltonians drawn from tensored algebras, such as quantum spin Hamiltonians. These formulas enable us to soft-code generic Hamiltonian systems and to systematize the input data for uniformly structured as well as for un-structured Hamiltonians. The result is an optimal computer code that can be used as a black box that takes in certain input files and returns spectral information about the Hamiltonian. The code is tested on Kitaev’s toric model deployed on triangulated surfaces of genus 0 and 1. The efficiency of our code enables these
APA, Harvard, Vancouver, ISO, and other styles
45

Falco, C., N. Scarpato, G. Nappi, and S. Formisano. "Project of Computer-aided Management of Therapeutical Apheresis." International Journal of Artificial Organs 16, no. 5_suppl (1993): 185–86. http://dx.doi.org/10.1177/039139889301605s41.

Full text
Abstract:
The great increase in hemapheresis units activity that occurred during the last years caused the need for a computer-aided management (1, 2). We present a project for a data base system able to manage therapeutical apheresis (3). The program consists of five sections. a) Patient's file card: it allows to record anamnesis, examination and blood test results easily and under computer's guidance. b) Choice of therapeutic protocol: Therapeutic protocol is fixed in this section (device to be used, apheretic method, plasma volume to be processed, blood tests before and after apheresis). c) Procedure
APA, Harvard, Vancouver, ISO, and other styles
46

Belarbi, Mohammed Amin, Saïd Mahmoudi, Ghalem Belalem, Sidi Ahmed Mahmoudi, and Aurélie Cools. "A New Comparative Study of Dimensionality Reduction Methods in Large-Scale Image Retrieval." Big Data and Cognitive Computing 6, no. 2 (2022): 54. http://dx.doi.org/10.3390/bdcc6020054.

Full text
Abstract:
Indexing images by content is one of the most used computer vision methods, where various techniques are used to extract visual characteristics from images. The deluge of data surrounding us, due the high use of social and diverse media acquisition systems, has created a major challenge for classical multimedia processing systems. This problem is referred to as the ‘curse of dimensionality’. In the literature, several methods have been used to decrease the high dimension of features, including principal component analysis (PCA) and locality sensitive hashing (LSH). Some methods, such as VA-Fil
APA, Harvard, Vancouver, ISO, and other styles
47

Laslami, Kaoutar, Sara Dhoum, Amine El Harchi, and Iman Benkiran. "Relationship between the Apical Preparation Diameter and the Apical Seal: An In Vitro Study." International Journal of Dentistry 2018 (2018): 1–5. http://dx.doi.org/10.1155/2018/2327854.

Full text
Abstract:
Objectives. The aim of the study is to define the relationship between the apical preparation diameter and the apical sealing ability to highlight the importance of the preservation of the diameter and the original position of the apical foramen. Materials and Methods. 50 extracted maxillary incisors were randomly allocated into three groups of 15 teeth each (n = 15) according to the apical preparation size: Group 1: finishing file F1 corresponding to size 20 reached the working length (ProTaper Universal system Dentsply®); Group 2: prepared up to size 30 corresponding to finishing file F30; G
APA, Harvard, Vancouver, ISO, and other styles
48

Mayer, Robert V. "RESULTS OF ASSESSING COMPLEXITY OF FORMULAS IN SCHOOL PHYSICS COURSE." Bulletin of Pedagogical Experience, no. 64 (2025): 49–57. https://doi.org/10.62957/2949-3269-2025-64-2-49-57.

Full text
Abstract:
The article is devoted to the problem of assessing the complexity of the main formulas of the school physics course. A content analysis of standard school textbooks was conducted, all formulas related to the sections were written out: mechanics, molecular physics and thermodynamics, electrodynamics, optics, physics of the microworld, special theory of relativity. In each section, topics and corresponding methods for solving problems were highlighted. To assess the semantic complexity, the formulas were encoded with a verbal code and presented in the text file Formuli.txt. The complexity of con
APA, Harvard, Vancouver, ISO, and other styles
49

Zablah, Jose Isaac, Antonio Garcia Loureiro, Salvador Diaz, et al. "Use of neural networks for triage of SARS-CoV-2." Bionatura 7, no. 3 (2022): 1–7. http://dx.doi.org/10.21931/rb/2022.07.03.34.

Full text
Abstract:
Emergency services worldwide have been exceeded in their capacities due to the SARS-CoV-2 pandemic, a generalized situation in countries with robust health systems and aggravated in lagging countries. As a result, focused computer solutions have been developed for self-diagnosis, triage, and follow-up of suspected and confirmed patients of SARS-CoV-2. But as it is a new disease, the symptoms evolve in a short time and the diagnostic protocols must be updated. The applications that integrate algorithms in their code to help sanitary processes need to be modified, recompiled, and published integ
APA, Harvard, Vancouver, ISO, and other styles
50

Madi, Mohammed K., Yuhanis Yusof, and Suhaidi Hassan. "Replica Placement Strategy for Data Grid Environment." International Journal of Grid and High Performance Computing 5, no. 1 (2013): 70–81. http://dx.doi.org/10.4018/jghpc.2013010105.

Full text
Abstract:
Data Grid is an infrastructure that manages huge amount of data files, and provides intensive computational resources across geographically distributed collaboration. To increase resource availability and to ease resource sharing in such environment, there is a need for replication services. Data replication is one of the methods used to improve the performance of data access in distributed systems by replicating multiple copies of data files in the distributed sites. Replica placement mechanism is the process of identifying where to place copies of replicated data files in a Grid system. Exis
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!