Academic literature on the topic 'DBase Mac (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'DBase Mac (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "DBase Mac (Computer file)"

1

Hewan-Lowe, K. O. "Improving the user interface design for electron microscopy (EM) databases." Proceedings, annual meeting, Electron Microscopy Society of America 49 (August 1991): 536–37. http://dx.doi.org/10.1017/s0424820100086994.

Full text
Abstract:
The user interface is a critical portion of any application program. Many EM databases reside in dBASE ™, relational database management systems (RDBMS). The user interface for dBASE ™ RDBMS consists of menu choices and templates for the display of database fields. User interaction with menus and templates is by sequential keyboard input. Though the dBASE ™ RDBMS provides excellent support for database functions there is little support for the design of a functional user interface. Menus of screen choices, templates for field display and the requirement for keyboard input tend to overwhelm all but the most experienced computer user. Since most users prefer screen displays which include familiar objects, any improvement in the user interface for EM databases should seek to simulate these objects in the user interface. Because HyperPAD ™ allows the simulation of familiar objects during screen design, it is an excellent tool for constructing an improved user interface for EM databases in dBASE ™ file format.
APA, Harvard, Vancouver, ISO, and other styles
2

Huang, Jun. "Analysis for HFS+ on Windows Platform and its Application in Computer Forensics." Applied Mechanics and Materials 380-384 (August 2013): 2297–301. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2297.

Full text
Abstract:
HFS+ is the main file system of Mac OS. With the popularity of Apple computer, more and more security specialists pay attention to the computer forensics in Mac OS. As computer forensics technology on Windows Platforms is quite mature and can pass the limit of authority, when get the HFS+ disk or mirror from Apple computer, we can achieve data manipulation for further computer forensics through analyzing the file system on Windows platform. This paper proposed an efficient method to analyze HFS+ file system on Windows to build directory structure and get the unallocated space. This work is the important beginning of computer forensics in Mac OS.
APA, Harvard, Vancouver, ISO, and other styles
3

Michczyński, Adam, Andrzej Krzanowski, Mieczysław F. Pazdur, and Mariusz S. Ziołkowski. "A Computer-Based Database for Radiocarbon Dates of Central Andean Archaeology." Radiocarbon 37, no. 2 (1995): 337–43. http://dx.doi.org/10.1017/s0033822200030812.

Full text
Abstract:
We established a database of 14C dates from archaeological sites of the Central Andes region of Peru, Ecuador and Bolivia on an IBM PC-compatible microcomputer running on an MS-DOS operating system using software package dBASE IV, version 1.1. Relevant data are stored in three DBF-type database files. The file ANDY.DBF contains information on dates and samples; REFERENC.DBF contains references to relevant publications and CALAND.DBF contains calibrated dates. The total number of records of the ANDY database slightly exceeds 2650.
APA, Harvard, Vancouver, ISO, and other styles
4

Su, Long Jiang, Shun Xiang Wu, and Da Cao. "Windows-Based Analysis for HFS+ File System." Advanced Materials Research 179-180 (January 2011): 538–43. http://dx.doi.org/10.4028/www.scientific.net/amr.179-180.538.

Full text
Abstract:
HFS+ file system is a file system of the Mac OS. In order to achieve data manipulation of the file system based on the Windows OS for further computer forensics, not only do we introduce the principle and structure of HFS+ file system, but also propose a efficient method to analyze the file system. Research contains the exploration of the file system and program implementation to analyze the file system.
APA, Harvard, Vancouver, ISO, and other styles
5

Turedi, Zeki, and Liangxiu Han. "Automatic forensic log file analysis for Mac OS X systems." International Journal of Electronic Security and Digital Forensics 5, no. 2 (2013): 124. http://dx.doi.org/10.1504/ijesdf.2013.055050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Jeonghyeok, Sangwook Han, Seungwon Choi, and Jungwook Choi. "Power-Efficient Deep Neural Network Accelerator Minimizing Global Buffer Access without Data Transfer between Neighboring Multiplier—Accumulator Units." Electronics 11, no. 13 (2022): 1996. http://dx.doi.org/10.3390/electronics11131996.

Full text
Abstract:
This paper presents a novel method for minimizing the power consumption of weight data movements required by a convolutional operation performed on a two-dimensional multiplier–accumulator (MAC) array of a deep neural-network accelerator. The proposed technique employs a local register file (LRF) at each MAC unit in a manner such that once weight pixels are read from the global buffer into the LRF, they are reused from the LRF as many times as desired instead of being repeatedly fetched from the global buffer in each convolutional operation. One of the most evident merits of the proposed method is that the procedure is completely free from the burden of data transfer between neighboring MAC units. It was found from our simulations that the proposed method provides a power saving of approximately 83.33% and 97.62% compared with the power savings recorded by the conventional methods, respectively, when the dimensions of the input data matrix and weight matrix are 128 × 128 and 5 × 5, respectively. The power savings increase as the dimensions of the input data matrix or weight matrix increase.
APA, Harvard, Vancouver, ISO, and other styles
7

Simonov, A., T. Weber, and W. Steurer. "Yell: a computer program for diffuse scattering analysisviathree-dimensional delta pair distribution function refinement." Journal of Applied Crystallography 47, no. 3 (2014): 1146–52. http://dx.doi.org/10.1107/s1600576714008668.

Full text
Abstract:
Yell, a program for routine refinement of disorder models against single-crystal diffuse scattering data, is presented. The analysis is based on the three-dimensional delta pair distribution function (3D-ΔPDF) method, which provides direct access to interatomic correlations in real crystal structures. Substitutional, displacive and size-effect disorder models are covered. The input file format supports flexible usage of arithmetic expressions for constraining dependent parameter values. The program is designed to be run on desktop computers. By using an efficient fast-Fourier-transform-based diffuse scattering calculation algorithm, full least-square refinements of medium complexity disorder models may be performed within minutes or hours, even if the experimental diffuse scattering is represented by large and fine-sampled reciprocal space volumes. The program is written in C++ and the source code is distributed under the GPL licence. Binary distributions are currently available for Mac and Windows operating systems.
APA, Harvard, Vancouver, ISO, and other styles
8

Lan, Divon, Ray Tobler, Yassine Souilmi, and Bastien Llamas. "Genozip: a universal extensible genomic data compressor." Bioinformatics 37, no. 16 (2021): 2225–30. http://dx.doi.org/10.1093/bioinformatics/btab102.

Full text
Abstract:
Abstract We present Genozip, a universal and fully featured compression software for genomic data. Genozip is designed to be a general-purpose software and a development framework for genomic compression by providing five core capabilities—universality (support for all common genomic file formats), high compression ratios, speed, feature-richness and extensibility. Genozip delivers high-performance compression for widelyused genomic data formats in genomics research, namely FASTQ, SAM/BAM/CRAM, VCF, GVF, FASTA, PHYLIP and 23andMe formats. Our test results show that Genozip is fast and achieves greatly improved compression ratios, even when the files are already compressed. Further, Genozip is architected with a separation of the Genozip Framework from file-format-specific Segmenters and data-type-specific Codecs. With this, we intend for Genozip to be a general-purpose compression platform where researchers can implement compression for additional file formats, as well as new codecs for data types or fields within files, in the future. We anticipate that this will ultimately increase the visibility and adoption of these algorithms by the user community, thereby accelerating further innovation in this space. Availability and implementation Genozip is written in C. The code is open-source and available on http://www.genozip.com. The package is free for non-commercial use. It is distributed through the Conda package manager, github, and as a Docker container on DockerHub. Genozip is tested on Linux, Mac and Windows. Supplementary information Supplementary data are available at Bioinformatics online.
APA, Harvard, Vancouver, ISO, and other styles
9

Schlimmer, J. C., and L. A. Hermens. "Software Agents: Completing Patterns and Constructing User Interfaces." Journal of Artificial Intelligence Research 1 (November 1, 1993): 61–89. http://dx.doi.org/10.1613/jair.25.

Full text
Abstract:
To support the goal of allowing users to record and retrieve information, this paper describes an interactive note-taking system for pen-based computers with two distinctive features. First, it actively predicts what the user is going to write. Second, it automatically constructs a custom, button-box user interface on request. The system is an example of a learning-apprentice software- agent. A machine learning component characterizes the syntax and semantics of the user's information. A performance system uses this learned information to generate completion strings and construct a user interface. Description of Online Appendix: People like to record information. Doing this on paper is initially efficient, but lacks flexibility. Recording information on a computer is less efficient but more powerful. In our new note taking softwre, the user records information directly on a computer. Behind the interface, an agent acts for the user. To help, it provides defaults and constructs a custom user interface. The demonstration is a QuickTime movie of the note taking agent in action. The file is a binhexed self-extracting archive. Macintosh utilities for binhex are available from mac.archive.umich.edu. QuickTime is available from ftp.apple.com in the dts/mac/sys.soft/quicktime.
APA, Harvard, Vancouver, ISO, and other styles
10

Anastasiadi, M., E. Bragin, P. Biojoux, et al. "CRAMER: a lightweight, highly customizable web-based genome browser supporting multiple visualization instances." Bioinformatics 36, no. 11 (2020): 3556–57. http://dx.doi.org/10.1093/bioinformatics/btaa146.

Full text
Abstract:
Abstract Summary In recent years, the ability to generate genomic data has increased dramatically along with the demand for easily personalized and customizable genome browsers for effective visualization of diverse types of data. Despite the large number of web-based genome browsers available nowadays, none of the existing tools provides means for creating multiple visualization instances without manual set up on the deployment server side. The Cranfield Genome Browser (CRAMER) is an open-source, lightweight and highly customizable web application for interactive visualization of genomic data. Once deployed, CRAMER supports seamless creation of multiple visualization instances in parallel while allowing users to control and customize multiple tracks. The application is deployed on a Node.js server and is supported by a MongoDB database which stored all customizations made by the users allowing quick navigation between instances. Currently, the browser supports visualizing a large number of file formats for genome annotation, variant calling, reads coverage and gene expression. Additionally, the browser supports direct Javascript coding for personalized tracks, providing a whole new level of customization both functionally and visually. Tracks can be added via direct file upload or processed in real-time via links to files stored remotely on an FTP repository. Furthermore, additional tracks can be added by users via simple drag and drop to an existing visualization instance. Availability and implementation CRAMER is implemented in JavaScript and is publicly available on GitHub on https://github.com/FadyMohareb/cramer. The application is released under an MIT licence and can be deployed on any server running Linux or Mac OS. Contact f.mohareb@cranfield.ac.uk Supplementary information Supplementary data are available at Bioinformatics online.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "DBase Mac (Computer file)"

1

Clark, Miriam Shaheed. "Automation of the Modular Pattern System basic skirt pattern drafting methodology using Turbo Pascal and dBaseII." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Griffin, George H. "Computerized Flow Process Charting System and Applications." Master's thesis, University of Central Florida, 1987. http://digital.library.ucf.edu/cdm/ref/collection/RTD/id/72384.

Full text
Abstract:
University of Central Florida College of Engineering Thesis<br>A computerized flow process charting application program of dBase III+ has been developed to aid in resource requirements planning and operations analysis. Traditional flow process charting has used as the following data elements: assembly number, assembly sequence number, distance travelled, time required for the activity and an activity symbol. The computerized system adds several variables to these in order to customize the application at Martin Marietta Electronic Systems. These additional variables include work center identification, machine number identification, lot sizes, set up and run times and manufacturing specifications. Additionally, the circle or operations symbol has been expanded to differentiate between manual, process and test activities. Resources requirements planning and analysis is accomplished by a series of reports where a user defines search requirements and enters three independent equation variables for the calculations. The three variables are realization factor or safety factor, resource availability in hours per month and monthly production demand. The resource requirements can be used in methods engineering, make-buy decisions and resource planning. Sensitivity analyses can be easily accomplished by changing the input variables and/or data.<br>M.S.<br>Masters<br>Engineering<br>Engineering<br>92 p.<br>v, 92 leaves, bound : ill. ; 28 cm.
APA, Harvard, Vancouver, ISO, and other styles
3

Ware, Scott. "HFS Plus File System Exposition and Forensics." Master's thesis, University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5559.

Full text
Abstract:
The Macintosh Hierarchical File System Plus, HFS+, or as it is commonly referred to as the Mac Operating System, OS, Extended, was introduced in 1998 with Mac OS X 8.1. HFS+ is an update to HFS, Mac OS Standard format that offers more efficient use of disk space, implements international friendly file names, future support for named forks, and facilitates booting on non-Mac OS operating systems through different partition schemes. The HFS+ file system is efficient, yet, complex. It makes use of B-trees to implement key data structures for maintaining meta-data about folders, files, and data. The implementation of what happens within HFS+ at volume format, or when folders, files, and data are created, moved, or deleted is largely a mystery to those who are not programmers. The vast majority of information on this subject is relegated to documentation in books, papers, and online content that direct the reader to C code, libraries, and include files. If one can't interpret the complex C or Perl code implementations the opportunity to understand the workflow within HFS+ is less than adequate to develop a basic understanding of the internals and how they work. The basic concepts learned from this research will facilitate a better understanding of the HFS+ file system and journal as changes resulting from the adding and deleting files or folders are applied in a controlled, easy to follow, process. The primary tool used to examine the file system changes is a proprietary command line interface, CLI, tool called fileXray. This tool is actually a custom implementation of the HFS+ file system that has the ability to examine file system, meta-data, and data level information that isn't available in other tools. We will also use Apple's command line interface tool, Terminal, the WinHex graphical user interface, GUI, editor, The Sleuth Kit command line tools and DiffFork 1.1.9 help to document and illustrate the file system changes. The processes used to document the pristine and changed versions of the file system, with each experiment, are very similar such that the output files are identical with the exception of the actual change. Keeping the processes the same enables baseline comparisons using a diff tool like DiffFork. Side by side and line by line comparisons of the allocation, extents overflow, catalog, and attributes files will help identify where the changes occurred. The target device in this experiment is a two-gigabyte Universal Serial Bus, USB, thumb drive formatted with Global Unit Identifier, GUID, and Partition Table. Where practical, HFS+ special files and data structures will be manually parsed; documented, and illustrated.<br>ID: 031001395; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Title from PDF title page (viewed May 28, 2013).; Thesis (M.S.)--University of Central Florida, 2012.; Includes bibliographical references (p. 131-132).<br>M.S.<br>Masters<br>Computer Science<br>Engineering and Computer Science<br>Digital Forensics
APA, Harvard, Vancouver, ISO, and other styles
4

Nefzi, Bilel. "Mécanismes auto-adaptatifs pour la gestion de la Qualité de Service dans les réseaux de capteurs sans fil." Phd thesis, Institut National Polytechnique de Lorraine - INPL, 2011. http://tel.archives-ouvertes.fr/tel-00645504.

Full text
Abstract:
La plupart des réseaux de capteurs sans fill d'aujourd'hui fonctionne sur le protocole CSMA/CA. Fournir la qualité de service (QdS) dans un tel réseau est un problème difficile compte tenu de la dynamique du réseau et des contraintes en termes de ressources (énergie et mémoire). Dans cette thèse, sans changer le socle commun du CSMA/CA, nous avons proposé des mécanismes auto-adaptatifs qui permettent de gérer la QdS "best-effort" pour des applications nécessitant de la différenciation de services. Trois mécanismes sont proposés : CoSenS pour "Collecting then Sending burst Scheme", P-CoSenS qui a joute la gestion de priorités à CoSenS, et S-CoSenS qui a joute la dimension énergie à CoSenS. La dynamique du réseau est prise en compte grâce à l'auto-adaptation de périodes de collecte et de transmission en rafale. Il est à souligner que le mécanisme CoSenS permet non seulement d'améliorer les performances de CSMA/CA mais aussi de surmonter la difficulté d'ordonnancer les trafics entrant dans un nœud (routeur) car chaque paquet entrant est immédiatement retransmis vers la sortie. En effet, grâce à la pério de de collecte, les paquets entrants sont mis en file d'attente, rendant ainsi possible d'ordonnancer différemment les paquets selon leur priorité (P-CoSenS). Enfin, le compromis énergie/performance est pris en compte dans S-CoSenS. Selon l'état de l'environnement surveillé, le réseau peut se trouver dans une période où circule un trafic non urgent et souvent faible pendant laquelle il est judicieux de minimiser la consommation d'énergie et une pério de de trafic important pendant laquelle le réseau doit transporter des données urgentes pour suivre une situation alarmante de plus près. Comme CoSenS, S-CoSenS permet de s'auto-adapter dynamiquement en fonction de ces situations. L'ensemble de nos propositions est validé par simulations et CoSenS est implémenté sur une plateforme de réseau de capteurs.
APA, Harvard, Vancouver, ISO, and other styles
5

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "DBase Mac (Computer file)"

1

Springer, Paul. Using dBase Mac. Que Corp., 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

dBASE Mac in business. Ashton-Tate, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Heid, Jim. dBASE Mac in business. Ashton-Tate, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Don, Huntington, ed. The complete guide to dBASE Mac. Scott, Foresman, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jones, Edward. dBase Mac programmer's reference guide. Hayden Books, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Loggins, Richard. dBASE Mac: Advanced techniques and applications. Bantam Books, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

DeMaria, Rusel. Working with dBase Mac: Pushing productivity to the limit. Brady, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

DeMaria, Rusel. Working with dBase Mac: Pushing productivity to the limit. Brady, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

McLaren, Bruce J. Working with dBase IV and dBase III plus. HarperCollins, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Insinga, Jean S. dBASE IV SmartStart. Que College, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "DBase Mac (Computer file)"

1

Manzo, V. J. "Building Stand-alone Applications." In Max/MSP/Jitter for Music. Oxford University Press, 2011. http://dx.doi.org/10.1093/oso/9780199777679.003.0016.

Full text
Abstract:
In this chapter, we will analyze a “Chord Namer” application that allows a user to enter a chord name and see the notes on a MIDI keyboard. Unlike the other patches we’ve worked on thus far, we will “build” this patch as a stand-alone program that can be used on any computer even if it does not have Max installed. Stand-alone programs are a great way of distributing your work to people for educational or commercial purposes. Open the file chord_namer.maxpat from the Chapter 11 Examples folder. This patch allows users to type in the name of a chord (C, for example) and see the chord displayed on a large kslider. Users can then play the chord on their MIDI keyboard while looking at the visual example. The letter name of each note appears on each chord tone when it is highlighted. For taller chords, a user may enable more chord tones to be added than simply just a root, third, and fifth. For example, a user wanting to play a Cdom7#9 chord could simply enable 7ths and 9ths to be displayed by checking the appropriate toggles, typing Cdom7#9 into the space provided, and pressing the return or enter key. 1. Type C into the text box at the top left and press the return or enter key 2. Play a C chord on your MIDI keyboard This patch could be useful for helping people perform a piece for which they have only a lead sheet with chord names. Let’s take a look inside the patch. The patch is currently in Presentation mode. Unlock the patch and put it into Patching mode. The patch is rather large in size so you may need to zoom out on the patch (⌘for Mac or ctrl for Windows ). Now that the patch is open, you may be surprised to see that there is only a small number of objects inside. Take note of the 3 bpatchers in the patch that generate chords, handle MIDI output, and, to the right, above the kslider, handle MIDI input.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "DBase Mac (Computer file)"

1

Chen, Haiyan, Licheng Tian, Zhigang Zhou, and Jiaojiao Yang. "Research and Application on Drawing Method of Optimizing for the Intelligent Process System Flow Chart of the Nuclear Power." In 2022 29th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/icone29-92101.

Full text
Abstract:
Abstract The intelligent process system flow chart of the nuclear power is based on the symbol library. Each component and its attributes on the system flow chart are stored in a digital form for reference to subsequent projects. The content of this paper is the automatic generation of Definitive Data Assembly and the automatic association of the drawing interface of the intelligent process system flow chart by using Diagrams. It is an optimization of the intelligent process system flow chart for the application of Diagrams by using information technology and computer language. The Definitive Data Assembly automatic generation function realizes generating Definitive Data Assembly statistical table at a fixed position of the drawing surface, and improves the neat specification of the drawing information; The single drawing Definitive Data Assembly statistical table is automatically generated, and the batch drawing Definitive Data Assembly statistical table can be automatically generated, one-click operation, which greatly improves the work efficiency; at the same time, solves the problem of disordered management of Definitive Data Assembly. Optimized the application of Diagrams to draw the interface merging function of the intelligent process system flow chart, which greatly reduced the number of files in the project file XXXMAC-&amp;gt;Schematic path, reduced the selection obstacles and improved the correct rate; Developed interface-connected menus, one-click operation, saving time for drafters, automatically deleting MAC files, reducing the workload of project administrators, and releasing project storage space, improving work efficiency. The research results of this paper are applied to draw the process system flow chart of many specialities such as nuclear island system, radioactive waste management, hydraulic technology, HVAC, chemical water, conventional island machinery, etc.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography