Academic literature on the topic 'Eventus (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Eventus (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Eventus (Computer file)"

1

Syafar, Faisal, Halimah Husain, Sutarsih Suhaeb, Putri Ida, and Supriadi. "Blowfish Advanced CS Untuk Solusi Keamanan Sistem Komputer Sekolah." Vokatek : Jurnal Pengabdian Masyarakat 1, no. 3 (2023): 353–61. http://dx.doi.org/10.61255/vokatekjpm.v1i3.271.

Full text
Abstract:
Data security and privacy are very important issues for businesses, colleges, the government, and even individuals. The TKJ Laboratory is where PKM events take place. Students are free to use the computers there as they please, as long as they don't break the security system on each one. The types of files that can be protected in this case are text-based document files, picture files, audio and video files that are stored digitally, and question files. In the Community Partnership Program, which had 15 participants, there were outcomes and goals. The program produced a guidebook on how to use
APA, Harvard, Vancouver, ISO, and other styles
2

Jawad, Alkenani, and Ahmed Nassari Khulood. "Enhance work for java based network analyzer tool used to analyze network simulator files." Enhance work for java based network analyzer tool used to analyze network simulator files 29, no. 2 (2023): 954–62. https://doi.org/10.11591/ijeecs.v29.i2.pp954-962.

Full text
Abstract:
The network performance measurement is important in computer networks, and performance measurement may not be effective for installation in peripheral devices resulting in the replacement of those devices and thus increasing cost. In light of this, it is better to have a simulation of the network to see its performance rather than the actual design. NS-2 is one of the most popular and widely used open-source network simulators in many organizations, which generates trace files during the simulation experience. The trace file contains all network events that can be used to calculate performance
APA, Harvard, Vancouver, ISO, and other styles
3

Xu, Haochen, Guanhua Fang, Yunxiao Chen, Jingchen Liu, and Zhiliang Ying. "Latent Class Analysis of Recurrent Events in Problem-Solving Items." Applied Psychological Measurement 42, no. 6 (2018): 478–98. http://dx.doi.org/10.1177/0146621617748325.

Full text
Abstract:
Computer-based assessment of complex problem-solving abilities is becoming more and more popular. In such an assessment, the entire problem-solving process of an examinee is recorded, providing detailed information about the individual, such as behavioral patterns, speed, and learning trajectory. The problem-solving processes are recorded in a computer log file which is a time-stamped documentation of events related to task completion. As opposed to cross-sectional response data from traditional tests, process data in log files are massive and irregularly structured, calling for effective expl
APA, Harvard, Vancouver, ISO, and other styles
4

Alkenani, Jawad, and Khulood Ahmed Nassar. "Enhance work for java based network analyzer tool used to analyze network simulator files." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 2 (2023): 954. http://dx.doi.org/10.11591/ijeecs.v29.i2.pp954-962.

Full text
Abstract:
<span lang="EN-US">The network performance measurement is important in computer networks, and performance measurement may not be effective for installation in peripheral devices resulting in the replacement of those devices and thus increasing cost. In light of this, it is better to have a simulation of the network to see its performance rather than the actual design. NS-2 is one of the most popular and widely used open-source network simulators in many organizations, which generates trace files during the simulation experience. The trace file contains all network events that can be used
APA, Harvard, Vancouver, ISO, and other styles
5

Groh, Micah, Norman Buchanan, Derek Doyle, James B. Kowalkowski, Marc Paterno, and Saba Sehrish. "PandAna: A Python Analysis Framework for Scalable High Performance Computing in High Energy Physics." EPJ Web of Conferences 251 (2021): 03033. http://dx.doi.org/10.1051/epjconf/202125103033.

Full text
Abstract:
Modern experiments in high energy physics analyze millions of events recorded in particle detectors to select the events of interest and make measurements of physics parameters. These data can often be stored as tabular data in files with detector information and reconstructed quantities. Most current techniques for event selection in these files lack the scalability needed for high performance computing environments. We describe our work to develop a high energy physics analysis framework suitable for high performance computing. This new framework utilizes modern tools for reading files and i
APA, Harvard, Vancouver, ISO, and other styles
6

Marr, Charles. "210 CUSTOM-PRINTED ELECTRONIC FACT SHEETS AT HORTICULTURAL EVENTS." HortScience 29, no. 5 (1994): 459d—459. http://dx.doi.org/10.21273/hortsci.29.5.459d.

Full text
Abstract:
A series of 62 fact sheets on a variety of topics related to vegetable gardening were constructed in WordPerfect and, using a series of macros and styles, were modified to a standard format and printed to a file for storage. Sheets were organized into a heirarchal menu so they could be copied to the printer upon request using only DOS commands. A portable laptop computer and a Hewlett Packard Portable DeskJet printer was used to print files at such remote locations as nurseries/garden centers, shopping malls, fairs, and public events where Master Gardener volunteers set up and operated the equ
APA, Harvard, Vancouver, ISO, and other styles
7

Bántay, László, Gyula Dörgö, Ferenc Tandari, and János Abonyi. "Simultaneous Process Mining of Process Events and Operator Actions for Alarm Management." Complexity 2022 (September 19, 2022): 1–13. http://dx.doi.org/10.1155/2022/8670154.

Full text
Abstract:
Alarm management is an important task to ensure the safety of industrial process technologies. A well-designed alarm system can reduce the workload of operators parallel with the support of the production, which is in line with the approach of Industry 5.0. Using Process Mining tools to explore the operator-related event scenarios requires a goal-oriented log file format that contains the start and the end of the alarms along with the triggered operator actions. The key contribution of the work is that a method is presented that transforms the historical event data of control systems into goal
APA, Harvard, Vancouver, ISO, and other styles
8

Marjai, Péter, Péter Lehotay-Kéry, and Attila Kiss. "The Use of Template Miners and Encryption in Log Message Compression." Computers 10, no. 7 (2021): 83. http://dx.doi.org/10.3390/computers10070083.

Full text
Abstract:
Presently, almost every computer software produces many log messages based on events and activities during the usage of the software. These files contain valuable runtime information that can be used in a variety of applications such as anomaly detection, error prediction, template mining, and so on. Usually, the generated log messages are raw, which means they have an unstructured format. This indicates that these messages have to be parsed before data mining models can be applied. After parsing, template miners can be applied on the data to retrieve the events occurring in the log file. Thes
APA, Harvard, Vancouver, ISO, and other styles
9

Starenkyi, Ivan, and Oleksandra Donchenko. "DETECTION OF TRACES OF THE USE OF SOFTWARE SUCH AS «STEALER» IN THE MEMORY OF THE STORAGE DEVICE." Criminalistics and Forensics, no. 68 (July 3, 2023): 469–77. http://dx.doi.org/10.33994/kndise.2023.68.46.

Full text
Abstract:
The purpose of this work is to use an experimentally way to determine the characteristic features of the use of the software «Mars Stealer», which is positioned as a software product of the «Stealer» type, which is contained in the memory among the available and deleted data of the information storage device. The following conclusions can be drawn on the basis of the conducted experiment: Autopsy» software is a good tool for trying to reproduce and trace the events and processes that took place on the storage device; By studying the events and processes in the memory of the information storage
APA, Harvard, Vancouver, ISO, and other styles
10

N. Sangeeta and Seung Yeob Nam. "Blockchain and Interplanetary File System (IPFS)-Based Data Storage System for Vehicular Networks with Keyword Search Capability." Electronics 12, no. 7 (2023): 1545. http://dx.doi.org/10.3390/electronics12071545.

Full text
Abstract:
Closed-circuit television (CCTV) cameras and black boxes are indispensable for road safety and accident management. Visible highway surveillance cameras can promote safe driving habits while discouraging moving violations. According to CCTV laws, footage captured by roadside cameras must be securely stored, and authorized persons can access it. Footages collected by CCTV and Blackbox are usually saved to the camera’s microSD card, the cloud, or hard drives locally but there are concerns about security and data integrity. These issues may be addressed by blockchain technology. The cost of stori
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Eventus (Computer file)"

1

Nguyen, Henrik. "Evaluating fine-grained events foran Event Sourcing proof-of-concept." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254657.

Full text
Abstract:
Data conversion for evolving events in an Event Sourcing System is a complex issue and needs to be maintainable. There are suggested ways handling data conversion today which combine different methods into a framework. However, there is a lack of exploration of different and alternative methods to handle the complicated matter.This thesis explores data conversion with fine-grained events. The purpose is to explore methods and broaden knowledge for handling data conversion while using attribute driven events called fine-grained events. The goal was to build a proof-of-concept that preserves the
APA, Harvard, Vancouver, ISO, and other styles
2

Ye, Brian. "An Evaluation on Using Coarse-grained Events in an Event Sourcing Context and its Effects Compared to Fine-grained Events." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208302.

Full text
Abstract:
Introducing event sourcing to a system that is based on a model following Create, Read, Update and Delete (CRUD) operations can be a challenging task and requires an extensive rework of the current system. By introducing coarse-grained events it is possible to persist the structure of the data in a CRUD model and still gain the benefits of event sourcing, avoiding an extensive rework of the system. This thesis investigates how large amounts of data can be handled with coarse-grained events and still gain the benefits of event sourcing, by comparing with the conventional way of using fine-grain
APA, Harvard, Vancouver, ISO, and other styles
3

Chan, Susan Chui-Sheung. "Design and implementation of an event monitor for the unix operating system." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26187.

Full text
Abstract:
Tuning a computer system effectively requires prior studies on the performance of the system. There are different types of tools available to measure a system: hardware, firmware and software. This thesis presents the design and implementation of an event monitor, which is one type of software tools. The event monitor was developed on a SUN1 workstation running UNIX 4.2bsd version 1.4. Six types of events were selected to be measured, namely transactions, logins/logouts, pageins, pageouts, disk I/Os and forks/exits. The operating system was modified to include probes to trap these events. For
APA, Harvard, Vancouver, ISO, and other styles
4

Pang, Kenneth K. (Kenneth Kwok Kit) 1976. "Fine-grained event-based access control." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47532.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science; and, Thesis (B.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.<br>Includes bibliographical references (leaf 46).<br>by Kenneth K. Pang.<br>B.S.<br>M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
5

Libardi, Junior José Carlos 1983. "Comparação de simulações por eventos discretos para modelos de fila." [s.n.], 2015. http://repositorio.unicamp.br/jspui/handle/REPOSIP/267737.

Full text
Abstract:
Orientadores: Varese Salvador Timoteo, Edson Luiz Ursini<br>Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Tecnologia<br>Made available in DSpace on 2018-08-27T17:38:56Z (GMT). No. of bitstreams: 1 LibardiJunior_JoseCarlos_M.pdf: 4110678 bytes, checksum: eee73fe122555a9710247faeceb6f135 (MD5) Previous issue date: 2015<br>Resumo: A constante evolução do poder computacional aliada ao baixo custo de aquisição, faz com que os computadores sejam indispensáveis para construção de modelos de simulação. Atualmente, a simulação por computador é usada nas mais diversificadas
APA, Harvard, Vancouver, ISO, and other styles
6

Damchoom, Kriangsak. "An incremental refinement approach to a development of a flash-based file system in Event-B." Thesis, University of Southampton, 2010. https://eprints.soton.ac.uk/165595/.

Full text
Abstract:
Nowadays, many formal methods are used in the area of software development accompanied by a number of advanced theories and tools. However, more experiments are still required in order to provide significant evidence that will convince and encourage users to use, and gain more benefits from, those theories and tools. Event-B is a formalism used for specifying and reasoning about systems. Rodin is an open and extensible tool for Event-B specification, refinement and proof. The flash file system is a complex system. Such systems are a challenge to specify and verify at this moment in time. This
APA, Harvard, Vancouver, ISO, and other styles
7

Gideon, John. "The Integration of LlamaOS for Fine-Grained Parallel Simulation." University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1377872370.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Maynard, Zachary C. "Designing Compressed Narrative using a Reactive Frame: The Influence of Spatial Relationships and Camera Composition on the Temporal Structure of Story Events." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1345491195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dias, Maria Camila de Avelino Geraldo. "Prediction of uncertainty events using human-computer interaction." Master's thesis, 2018. http://hdl.handle.net/10362/58209.

Full text
Abstract:
The practice of medicine is characterized by complex situations that evoke uncertainty. Uncertainty has implications for the quality and costs of health care, thus emphasizing the importance of identifying its the main causes. Uncertainty can be manifested through human behaviour. Accordingly, in this dissertation, a machine learning model that detects events of uncertainty based on mouse cursor movements was created. To do so, 79 participants answered an online survey while the mouse data was being tracked. This data was used to extract meaningful features that allowed model testing an
APA, Harvard, Vancouver, ISO, and other styles
10

Ackermann, Jacobus Gideon. "Evaluating reasoning heuristics for a hybrid theorem proving platform." Diss., 2018. http://hdl.handle.net/10500/25869.

Full text
Abstract:
Text in English with abstracts in English, Afrikaans and isiZulu<br>The formalisation of first-order logic and axiomatic set theory in the first half of the 20th century—along with the advent of the digital computer—paved the way for the development of automated theorem proving. In the 1950s, the automation of proof developed from proving elementary geometric problems and finding direct proofs for problems in Principia Mathematica by means of simple, human-oriented rules of inference. A major advance in the field of automated theorem proving occurred in 1965, with the formulation of the resolu
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Eventus (Computer file)"

1

Cowan, Arnold R. Eventus version 7: Software for event studies and CRSP data retrieval : user's guide. Cowan Research LC, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Francis, Tony. Mac OS 8 revealed. Addison-Wesley, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Warnke, Martin, and Anne Dippel. Interferences and Events: On Epistemic Shifts in Physics Through Computer Simulations. Saint Philip Street Press, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Warnke, Martin, and Anne Dippel. Interferences and Events: On Epistemic Shifts in Physics Through Computer Simulations. Saint Philip Street Press, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dippel, Anne. Interferences and Events: On Epistemic Shifts in Physics through Computer Simulations. meson press, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

The way of Delphi: Reusing objects, components, properties, and events. Prentice Hall PTR, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Solymar, Laszlo. Getting the Message. 2nd ed. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198863007.001.0001.

Full text
Abstract:
Laszlo Solymar’s book is quite unique in the sense that it is the only one that covers all the major developments in the history of telecommunications for the past 4,000 years, like fire signals, the mechanical telegraph, the electrical telegraph, telephony, optical fibres, fax, satellites, mobile phones, the Internet, the digital revolution, the role of computers, and also some long-forgotten technologies like news broadcasting by a devoted telephone network. It tells the technical aspects of the story but also how it affects people and society; e.g.it discusses the effect of the electric tel
APA, Harvard, Vancouver, ISO, and other styles
8

T. Unix System V Release 3.2 Network Programmer's Guide. Prentice Hall, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Unix System V/386 Release 3.2 Network Programmer's Guide, Issue 47. Prentice Hall, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Eventus (Computer file)"

1

Hong, James, Haotian Zhang, Michaël Gharbi, Matthew Fisher, and Kayvon Fatahalian. "Spotting Temporally Precise, Fine-Grained Events in Video." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-19833-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zheng, Lizhou, Peiquan Jin, Jie Zhao, and Lihua Yue. "A Fine-Grained Approach for Extracting Events on Microblogs." In Lecture Notes in Computer Science. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-10073-9_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Khan, Saad, and Simon Parkinson. "Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study." In Computer Communications and Networks. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92624-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fathalla, Said, and Christoph Lange. "EVENTS: A Dataset on the History of Top-Prestigious Events in Five Computer Science Communities." In Semantics, Analytics, Visualization. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01379-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mahboubi, Arash, Hang Thanh Bui, Hamed Aboutorab, Khanh Luong, Seyit Camtepe, and Keyvan Ansari. "A Lightweight Detection of Sequential Patterns in File System Events During Ransomware Attacks." In Lecture Notes in Computer Science. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-96-0576-7_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dal Lago, Ugo, Giulio Guerrieri, and Willem Heijltjes. "Decomposing Probabilistic Lambda-Calculi." In Lecture Notes in Computer Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45231-5_8.

Full text
Abstract:
AbstractA notion of probabilistic lambda-calculus usually comes with a prescribed reduction strategy, typically call-by-name or call-by-value, as the calculus is non-confluent and these strategies yield different results. This is a break with one of the main advantages of lambda-calculus: confluence, which means results are independent from the choice of strategy. We present a probabilistic lambda-calculus where the probabilistic operator is decomposed into two syntactic constructs: a generator, which represents a probabilistic event; and a consumer, which acts on the term depending on a given
APA, Harvard, Vancouver, ISO, and other styles
7

Zheng, Ziwei, Lijun He, Le Yang, and Fan Li. "Fine-Grained Dynamic Network for Generic Event Boundary Detection." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-72775-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Denisov, Vadim, Dirk Fahland, and Wil M. P. van der Aalst. "Unbiased, Fine-Grained Description of Processes Performance from Event Data." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98648-7_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hei, Yiming, Qian Li, Caibo Zhou, et al. "A Dual-Classifier Model for General Fine-Grained Event Detection Task." In Communications in Computer and Information Science. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0713-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Junxiu, Kehan Long, Shasha Li, Jintao Tang, and Ting Wang. "FineCSDA: Boosting Document-Level Event Argument Extraction with Fine-Grained Data Augmentation." In Lecture Notes in Computer Science. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-9434-8_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Eventus (Computer file)"

1

Zhou, Xiaolei, Yulong Liang, Ruifeng Guo, and Huajun Sun. "Question-Enhanced for Semantic Representation in Fine-Tuning Pre-Trained Encoding Models for Chinese Event Argument Extraction." In 2024 10th International Conference on Computer and Communications (ICCC). IEEE, 2024. https://doi.org/10.1109/iccc62609.2024.10942285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Diakhame, Mouhamadou Lamine, Chérif Diallo, and Mohamed Mejri. "MCM-Llama: A Fine-Tuned Large Language Model for Real-Time Threat Detection through Security Event Correlation." In 2024 International Conference on Electrical, Computer and Energy Technologies (ICECET). IEEE, 2024. http://dx.doi.org/10.1109/icecet61485.2024.10698464.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Koops Londello, Alberthus, and Benjamin Grando Moreira. "Conversor de formatos de arquivos de ferramentas de modelagem de Sistemas a Eventos Discretos." In Computer on the Beach. Universidade do Vale do Itajaí, 2020. http://dx.doi.org/10.14210/cotb.v11n1.p095-096.

Full text
Abstract:
The project of Discrete Event Systems (DES) with the SupervisoryControl Theory uses a group of operations whose algorithms areimplemented in tools to support the development of DES. Severaltools were developed, each one with self-resources, self-file formatand minimal integration between these different tools. This paperpresents a tool proposal to convert different files of some tools forthe development of DES, using a standard intermediated formatdefined to the proposal.
APA, Harvard, Vancouver, ISO, and other styles
4

Arastu, Asif H., and Eugene Tom. "Water Hammer Analysis/Prevention/Mitigation in Fire Protection Systems at Power Plants." In ASME/JSME 2003 4th Joint Fluids Summer Engineering Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/fedsm2003-45679.

Full text
Abstract:
Fire Protection water systems are typically piping networks where water is pumped from a low elevation reservoir at atmospheric pressure to higher elevations in the buildings served by the system. Because of this nature of their design, they are prone to water hammers due to water column separation &amp; rejoining. A loss of pressure can lead to void formation at high elevations whose collapse can result in severe water hammer. A damaging water hammer event that occurred at a nuclear power plant (Arastu, et al, 1999) causing a catastrophic valve failure pointed to the need to prevent and mitig
APA, Harvard, Vancouver, ISO, and other styles
5

Vittori, Felipe, Luis Rojas-Solo´rzano, Armando J. Blanco, and Rafael Urbina. "Numerical Study of Smoke Propagation in a Simulated Fire in a Wagon Within a Subway Tunnel." In ASME 2008 Fluids Engineering Division Summer Meeting collocated with the Heat Transfer, Energy Sustainability, and 3rd Energy Nanotechnology Conferences. ASMEDC, 2008. http://dx.doi.org/10.1115/fedsm2008-55281.

Full text
Abstract:
This work deals with the numerical (CFD) analysis of the smoke propagation during fires within closed environments. It is evaluated the capacity of the emergency ventilation system in controlling the smoke propagation and minimizing the deadly impact of an eventual fire in a wagon within the Metro de Caracas subway tunnel on the passengers safety. For the study, it was chosen the tunnel section between Teatros and Nuevo Circo subway stations, which consists of two parallel independent twin tunnels, connected through a transverse passage. The tunnels are provided by a longitudinal ventilation s
APA, Harvard, Vancouver, ISO, and other styles
6

Dong, Milton, and Eugene Tom. "Structural Dynamic Transient Analysis of Fire Protection System at a Nuclear Power Plant." In 2018 26th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/icone26-82627.

Full text
Abstract:
NRC Information Notice 98-31[1] describes a water hammer event that occurred at Columbia Generating Station. In this event, actuation of a Fire Protection System (FPS) led to voiding in a tall dead-ended riser with subsequent water hammer in the riser when the main fire pumps were activated. Due to the severity of the event, NRC requires that FPS with similar configurations at other nuclear power plants be analyzed for similar events. This paper describes an evaluation of two selected riser piping systems performed to quantify the susceptibility of the potential water hammer events in the FPS
APA, Harvard, Vancouver, ISO, and other styles
7

Loureiro, Mauricio. "The First Brazilian Symposium on Computer Music presents Brazilian computer music potentials - Caxambu, MG, 1994." In Simpósio Brasileiro de Computação Musical. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbcm.2019.10463.

Full text
Abstract:
The main objective of this talk is to report on the First Brazilian Symposium on Computer Music, which occurred in August 1994, at the city of Caxambu, Minas Gerais, promoted by the UFMG. The meeting occurred one year after the creation of NUCOM, a group of young academics dedicated to this emerging research field in Brazil gathered as a discussion list. This quite exciting and fancy event at Hotel Gloria in Caxambu was able to imposingly launch the group to the national, as well as to the international academic community. First, due to the excellency of the event’s output and its daring progr
APA, Harvard, Vancouver, ISO, and other styles
8

Garnier, J., N. Neufeld, and S. S. Cherukuwada. "Non-POSIX file system for LHCb online event handling." In 2010 17th Real-Time Conference - IEEE-NPSS Technical Committee on Computer Applications in Nuclear and Plasma Sciences (RT 2010). IEEE, 2010. http://dx.doi.org/10.1109/rtc.2010.5750457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Jinyong, Anudeep Mallarapu, Shriram Santhanagopalan, and Yi Ding. "FIRE PROPAGATION IN CYLINDRICAL LI-ION BATTERIES UNDER ULTRA-HIGH STRAIN-RATE DEFORMATION." In 2024 NDIA Michigan Chapter Ground Vehicle Systems Engineering and Technology Symposium. National Defense Industrial Association, 2024. http://dx.doi.org/10.4271/2024-01-3960.

Full text
Abstract:
&lt;title&gt;ABSTRACT&lt;/title&gt; &lt;p&gt;Abuse response of lithium-ion batteries has been extensively studied over several decades. Most studies on the onset and propagation of battery fires following mechanical deformation are focused on understanding the onset of thermal events following quasi-static loading. Using an array of cylindrical lithium-ion cells as example, we report results from ultra-high strain-rate deformation mechanical events (&amp;gt; 100 /s) that result in electrochemical short-circuits followed by thermal events. We present a methodology that takes stock of gas compos
APA, Harvard, Vancouver, ISO, and other styles
10

G., Brenda, Franklin Jino R. E., and Sherin Paul P. "An Efficient Technique for Fire Detection Using Deep Learning Algorithm." In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/uaae7050/ngcesi23p88.

Full text
Abstract:
Fire detection using computer vision techniques and image processing mainly considered for rescuing operation. Indeed, good accuracy of computer vision techniques can outperform traditional models of fire detection. Computer vision techniques are being replaced by deep learning models such as Convolutional Neural Networks (CNN). Existing System has only been assessed on balanced datasets, which can lead to the unsatisfied results and mislead real-world performance as fire is a rare and abnormal real-life event. Also, the result of traditional CNN shows that its performance is very low, when ev
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Eventus (Computer file)"

1

Rainville, E., James Thomson, Melissa Moulton, and Morteza Derakhti. DUNEX MicroSWIFT Drifters. Engineer Research and Development Center (U.S.), 2023. http://dx.doi.org/10.21079/11681/46644.

Full text
Abstract:
The University of Washington Applied Physics Lab team collected these data using microSWIFT wave buoys at the USACE Field Research Facility as part of the USCRP funded project DUNEX (During Nearshore Events Experiment). The files contain both directly measured and computed quantities from the drifting wave buoys. The collection and processing of these data is explained in the github repository at https://github.com/SASlabgroup/DUNEXMainExp along with examples of how these data can be used. The link to the actual data files is https://chldata.erdc.dren.mil/thredds/catalog/frf/projects/Dunex/UW_
APA, Harvard, Vancouver, ISO, and other styles
2

Floyd, Jason, and Daniel Madrzykowski. Analysis of a Near Miss in a Garden Apartment Fire – Georgia 2022. UL's Fire Safety Research Institute, 2022. http://dx.doi.org/10.54206/102376/rsfd6862.

Full text
Abstract:
On February 9, 2022, Cobb County Fire and Emergency Services responded to a fire in a ground floor unit in a garden apartment building. At arrival, the fire was a post-flashover fire in a bedroom. Initial fire control was attempted by an interior fire attack team which was unable to quickly locate the fire. Exterior suppression through the bedroom window was started prior to discovery of the fire by the interior team. Shortly after fire discovery by the internal team, a mayday was called. Four firefighters from the interior fire attack team received first and second degree burns. This report a
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!