Academic literature on the topic 'Family origins (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Family origins (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Family origins (Computer file)"

1

Venckauskas, Algimantas, Vacius Jusas, Kęstutis Paulikas, and Jevgenijus Toldinas. "Methodology to investigate BitTorrent sync protocol." Computer Science and Information Systems 14, no. 1 (2017): 197–218. http://dx.doi.org/10.2298/csis160212032v.

Full text
Abstract:
The BitTorrent Sync client application is the most progressive development in the BitTorrent family. Nevertheless, it can be used for the activities that draw the attention of the forensics invetigators. The BitTorrent Sync client application employs quite largely the encryption for sending data packages. The initiation of the activity is carried out in the plain text only. Therefore, we proposed the methodology that enables to capture the initiation step and to inform the forensics investigator, which then takes the reactive actions. The experiment was carried in two modes: 1) simulating of the use of the BitTorrent Sync application; 2) monitoring of real traffic on the Internet. During the monitoring, it is possible to calculate the public lookup SHA1 hash of the shared file. The comparison of the calculated hash with the list of publicly available hashes allows determination whether sharing of the file is legal or illegal. The presented methodology can be applied to any BitTorrent protocol.
APA, Harvard, Vancouver, ISO, and other styles
2

Zhu, Xuejin, Jie Huang, Bin Wang, and Chunyang Qi. "Malware homology determination using visualized images and feature fusion." PeerJ Computer Science 7 (April 15, 2021): e494. http://dx.doi.org/10.7717/peerj-cs.494.

Full text
Abstract:
The family homology determination of malware has become a research hotspot as the number of malware variants are on the rise. However, existing studies on malware visualization only determines homology based on the global structure features of executable, which leads creators of some malware variants with the same structure intentionally set to misclassify them as the same family. We sought to develop a homology determination method using the fusion of global structure features and local fine-grained features based on malware visualization. Specifically, the global structural information of the malware executable file was converted into a bytecode image, and the opcode semantic information of the code segment was extracted by the n-gram feature model to generate an opcode image. We also propose a dual-branch convolutional neural network, which features the opcode image and bytecode image as the final family classification basis. Our results demonstrate that the accuracy and F-measure of family homology classification based on the proposed scheme are 99.05% and 98.52% accurate, respectively, which is better than the results from a single image feature or other major schemes.
APA, Harvard, Vancouver, ISO, and other styles
3

Xiang, Fan, Shunshan Zhu, Zhigang Wang, Kevin Maher, Yi Liu, Yilin Zhu, Kaixi Chen, and Zhiqiang Liang. "Enhanced Family Tree: Evolving Research and Expression: Best Paper Award." Leonardo 53, no. 4 (July 2020): 367–73. http://dx.doi.org/10.1162/leon_a_01921.

Full text
Abstract:
Enhanced Family Tree reimagines the possibilities of family trees with an evolving series of exhibits. The authors’ works combine genealogical data, visualization, 3D technologies and interactivity to explore and display ancient genealogical relationships. Their new approach may reveal questionable relationships in genealogical records. Moreover, the authors’ use of an organic metaphor of a “tree” can be further extended to increase public understanding and engagement. The audience's questions arising from this project show increased curiosity and nuanced questioning about their own family origins and development.
APA, Harvard, Vancouver, ISO, and other styles
4

Rou, Shang H., John J. Hren, Philip D. Hren, Thomas M. Graettingcr, Michael S. Ameen, Orlando Aucicllo, and Angus I. Kingon. "Characterization of the inverted tetrahedral twin particles in the heteroepitaxial KNbO3 thin films." Proceedings, annual meeting, Electron Microscopy Society of America 48, no. 4 (August 1990): 466–67. http://dx.doi.org/10.1017/s0424820100175466.

Full text
Abstract:
Perovskite potassium niobate (KNbO3) possesses good electrooptic properties for modulated channel waveguide applications, Epitaxial KNbO3 thin films were deposited onto (100) MgO substrates using an ion beam sputtering technique equipped with a novel computer-controlled rotating target holder , Conventional transmission electron microscopy (TEM) and high resolution transmission electron microscopy (HRTEM) were employed to perform defect structure and microstructure analysis. Special TEM sample preparation procedures have been developed, which will be reported elsewhere, Tetrahedral twin particles (TTP's) were observed in the epitaxial KNbO3 thin films. Since, the orientation difference between the TTP's and the matrix may affect the polarization switching properties, it is essential to understand their origin and eliminate them if possible.A selected area diffraction pattern of a KNbO3 thin film taken along the substrate (012) (figure 1) reveals twin and double diffraction spots. The mirror planes are determined to be of the {211} family. Figure 2(a) shows the electron diffraction pattern taken along the substrate (100). Twin spots coincide with some of the matrix spots indicating that the twin also maintains an epitaxial relationship with the MgO substrate. The orientation relationship between the twins and the matrix is [221]twin//[100]matrix.
APA, Harvard, Vancouver, ISO, and other styles
5

Muñoz-Quijada, Maria, Luis Sanz, and Hipolito Guzman-Miranda. "SW-VHDL Co-Verification Environment Using Open Source Tools." Electronics 9, no. 12 (December 10, 2020): 2104. http://dx.doi.org/10.3390/electronics9122104.

Full text
Abstract:
The verification of complex digital designs often involves the use of expensive simulators. The present paper proposes an approach to verify a specific family of complex hardware/software systems, whose hardware part, running on an FPGA, communicates with a software counterpart executed on an external processor, such as a user/operator software running on an external PC. The hardware is described in VHDL and the software may be described in any computer language that can be interpreted or compiled into a (Linux) executable file. The presented approach uses open source tools, avoiding expensive license costs and usage restrictions.
APA, Harvard, Vancouver, ISO, and other styles
6

Roychoudhury, Kaushik, and Rashmi S. Hegde. "The Eyes Absent Proteins: Unusual HAD Family Tyrosine Phosphatases." International Journal of Molecular Sciences 22, no. 8 (April 10, 2021): 3925. http://dx.doi.org/10.3390/ijms22083925.

Full text
Abstract:
Here, we review the haloacid dehalogenase (HAD) class of protein phosphatases, with a particular emphasis on an unusual group of enzymes, the eyes absent (EYA) family. EYA proteins have the unique distinction of being structurally and mechanistically classified as HAD enzymes, yet, unlike other HAD phosphatases, they are protein tyrosine phosphatases (PTPs). Further, the EYA proteins are unique among the 107 classical PTPs in the human genome because they do not use a Cysteine residue as a nucleophile in the dephosphorylation reaction. We will provide an overview of HAD phosphatase structure-function, describe unique features of the EYA family and their tyrosine phosphatase activity, provide a brief summary of the known substrates and cellular functions of the EYA proteins, and speculate about the evolutionary origins of the EYA family of proteins.
APA, Harvard, Vancouver, ISO, and other styles
7

Catak, Ferhat Ozgur, Javed Ahmed, Kevser Sahinbas, and Zahid Hussain Khand. "Data augmentation based malware detection using convolutional neural networks." PeerJ Computer Science 7 (January 22, 2021): e346. http://dx.doi.org/10.7717/peerj-cs.346.

Full text
Abstract:
Due to advancements in malware competencies, cyber-attacks have been broadly observed in the digital world. Cyber-attacks can hit an organization hard by causing several damages such as data breach, financial loss, and reputation loss. Some of the most prominent examples of ransomware attacks in history are WannaCry and Petya, which impacted companies’ finances throughout the globe. Both WannaCry and Petya caused operational processes inoperable by targeting critical infrastructure. It is quite impossible for anti-virus applications using traditional signature-based methods to detect this type of malware because they have different characteristics on each contaminated computer. The most important feature of this type of malware is that they change their contents using their mutation engines to create another hash representation of the executable file as they propagate from one computer to another. To overcome this method that attackers use to camouflage malware, we have created three-channel image files of malicious software. Attackers make different variants of the same software because they modify the contents of the malware. In the solution to this problem, we created variants of the images by applying data augmentation methods. This article aims to provide an image augmentation enhanced deep convolutional neural network (CNN) models for detecting malware families in a metamorphic malware environment. The main contributions of the article consist of three components, including image generation from malware samples, image augmentation, and the last one is classifying the malware families by using a CNN model. In the first component, the collected malware samples are converted into binary file to 3-channel images using the windowing technique. The second component of the system create the augmented version of the images, and the last part builds a classification model. This study uses five different deep CNN model for malware family detection. The results obtained by the classifier demonstrate accuracy up to 98%, which is quite satisfactory.
APA, Harvard, Vancouver, ISO, and other styles
8

Kroher, Nadine, and José-Miguel Díaz-Báñez. "Audio-Based Melody Categorization: Exploring Signal Representations and Evaluation Strategies." Computer Music Journal 41, no. 4 (January 2018): 64–82. http://dx.doi.org/10.1162/comj_a_00440.

Full text
Abstract:
Melody categorization refers to the task of grouping a set of melodies into categories of similar items that originate from the same melodic contour. From a computational perspective, automatic melody categorization is of crucial importance for the automatic organization of databases, as well as for large-scale musicological studies—in particular, in the context of folk music and non-Western music traditions. We investigate methods starting from the raw audio file. For each recording contained in a collection, we extract a pitch sequence representing the main melodic line. We then estimate pairwise similarities and evaluate the discriminative power of the resulting similarity matrix with respect to ground-truth annotations. We propose novel evaluation methodologies, compare melody representations, and explore the potential of our approach in the context of two applications: interstyle and intrastyle categorization of flamenco music and tune-family recognition of folk-song recordings.
APA, Harvard, Vancouver, ISO, and other styles
9

Jasinski-Bergner, Simon, André Steven, and Barbara Seliger. "The Role of the RNA-Binding Protein Family MEX-3 in Tumorigenesis." International Journal of Molecular Sciences 21, no. 15 (July 23, 2020): 5209. http://dx.doi.org/10.3390/ijms21155209.

Full text
Abstract:
The muscle excess 3 (MEX-3) protein was first identified in Caenorhabditis elegans (C. elegans), and its respective homologues were also observed in vertebrates, including humans. It is a RNA-binding protein (RBP) with an additional ubiquitin E3 ligase function, which further acts as a post-transcriptional repressor through unknown mechanisms. In humans, MEX-3 proteins post-transcriptionally regulate a number of biological processes, including tumor immunological relevant ones. These have been shown to be involved in various diseases, including tumor diseases of distinct origins. This review provides information on the expression and function of the human MEX-3 family in healthy tissues, as well after malignant transformation. Indeed, the MEX-3 expression was shown to be deregulated in several cancers and to affect tumor biological functions, including apoptosis regulation, antigen processing, and presentation, thereby, contributing to the immune evasion of tumor cells. Furthermore, current research suggests MEX-3 proteins as putative markers for prognosis and as novel targets for the anti-cancer treatment.
APA, Harvard, Vancouver, ISO, and other styles
10

Yan, Jinpei, Yong Qi, and Qifan Rao. "Detecting Malware with an Ensemble Method Based on Deep Neural Network." Security and Communication Networks 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/7247095.

Full text
Abstract:
Malware detection plays a crucial role in computer security. Recent researches mainly use machine learning based methods heavily relying on domain knowledge for manually extracting malicious features. In this paper, we propose MalNet, a novel malware detection method that learns features automatically from the raw data. Concretely, we first generate a grayscale image from malware file, meanwhile extracting its opcode sequences with the decompilation tool IDA. Then MalNet uses CNN and LSTM networks to learn from grayscale image and opcode sequence, respectively, and takes a stacking ensemble for malware classification. We perform experiments on more than 40,000 samples including 20,650 benign files collected from online software providers and 21,736 malwares provided by Microsoft. The evaluation result shows that MalNet achieves 99.88% validation accuracy for malware detection. In addition, we also take malware family classification experiment on 9 malware families to compare MalNet with other related works, in which MalNet outperforms most of related works with 99.36% detection accuracy and achieves a considerable speed-up on detecting efficiency comparing with two state-of-the-art results on Microsoft malware dataset.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Family origins (Computer file)"

1

Keller, Jill E. "Relationship of family structure to television viewing and internet or computer use [electronic resource] /." Connect to resource online, 2006. http://ulib.iupui.edu/utility/download.php?file=AAT3220811.pdf&ipfilter=campus_cas.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Family origins (Computer file)"

1

Using the PFS family: FILE, WRITE, GRAPH, REPORT. Indianapolis: Que Corp., 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nichols, Elizabeth L. Genealogy in the computer age: Understanding family research. Salt Lake City, USA: Family History Educators, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brøderbund. Family tree maker: User's tutorial and reference manual. 6th ed. [Novato, Calif.]: Brøderbund, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brøderbund. Family tree maker: User's tutorial and reference manual. 5th ed. Novato, Calif: Brøderbund, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Clifford, Karen. Genealogy and computers for the complete beginner: The PAF Computer Program, automated data bases, family history centers, local sources. Baltimore, Md: Reprinted for Clearfield Company, Inc. by Genealogical Pub. Co., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Clifford, Karen. Genealogy & computers for the complete beginner: A step-by-step guide to the PAF computer program, automated data bases, family history centers, and local sources. Baltimore, Md: Genealogical Pub. Co., 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fraase, Michael. Rapid reference guide to System 7, the LaserWriter family, and HyperCard. Homewood, Ill: Business One Irwin, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Post it!: Sharing photos with family and friends. Ann Arbor, Mich: Cherry Lake Pub., 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ames, Stanley Richard. How to write and publish your family history using WordPerfect, (DOS versions 5.1 and 6.0). Interlaken, N.Y: Heart of the Lakes Pub., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

How to write and publish your family history using WordPerfect (IBM versions 4.1 and 4.2). Interlaken, N.Y: Heart of the Lakes Pub., 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Family origins (Computer file)"

1

McMeel, Dermott John James, and Robert Amor. "Knitting Patterns." In Research Anthology on Recent Trends, Tools, and Implications of Computer Programming, 2055–69. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3016-0.ch093.

Full text
Abstract:
Large software conglomerates like Trimble and Autodesk provide consumers with suites of software that perform many functions within the design and construction process. Communicating with software outside of the suite can be highly problematic as file types and communication protocols are proprietary and closed within that software family - the antithesis of interoperability). This is in stark contrast with emerging trends in consumer computing, where we find a rich ecosystem of devices and services facilitating a period of intense innovation. This paper documents original research that aims to implement communication beyond specific software suites and test, to what extent, wider software ecosystems revolving around open standards might be implemented within the design and construction domain. Our first test case—an agent-based dynamic simulation combining natural and built environmental components—is deployed to explore the city as a multitude of interrelated natural and built patterns. We analyze the role this simulation might play in managing the complexities of rebuilding a sustainable urban environment after the devastating earthquake in Christchurch, New Zealand. The second test case deploys an iPad application to communicate with a BIM model - exploring the development of a mobile application and methodology for openly communicating outside of the intended software family. Through these case studies we begin to identify ways to leverage emergent device and data ecosystems and representations for ‘knitting' devices and services together in innovative ways to advance design and construction processes.
APA, Harvard, Vancouver, ISO, and other styles
2

Xu, Xun. "Integration Based on STEP Standards." In Integrating Advanced Computer-Aided Design, Manufacturing, and Numerical Control, 246–65. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-59904-714-0.ch011.

Full text
Abstract:
The integration model (Model B) as discussed in the previous chapter makes use of exchangeable neutral data formats such as IGES (1980). Neutral data formats provide a middle tier to connect CAD and CAM systems. Thus, Model B can create a collaborative manufacturing environment and make the design data exchange possible for large projects at the international level. Yet, some problems still remain. IGES was designed to exchange geometrical information only, so additional design or manufacturing information (such as feature information) within a proprietary model is ignored. During data exchange, some information may become astray during data transfer; geometry stitching or model repair is often needed. Plus, IGES is not an international standard. As previously discussed, there are also problems common to both Models A and B (Figure 10.1). Different data formats (e.g. IGES and ISO 6983-1, 1982) are used in the designto- manufacturing chain. Data loss occurs in the transaction from design to manufacturing because only low-level, step-by-step sequential machining commands are passed onto the CNC controllers, leaving the complete product model behind. Of particular significance has been the endeavour made by the International Organization for Standardization to introduce the STEP Standard (i.e. ISO 10303-1 [1994]). Major aerospace and automotive companies have proven the value of STEP through production implementations resulting in savings of US $150 million per year (Gallaher, O’Connor & Phelps, 2002, PDES, Inc. 2006). Moreover, STEP has recently been extended to cater to manufacturing data modelling and execution with an aim to fill the information gap between CAD/CAPP/CAM and CNC. The standard is informally known as STEP-compliant Numerical Control, or otherwise STEP-NC for short. It was given an ISO name of “ISO 14649: Data model for Computerized Numerical Controllers (ISO 14649-1, 2003)”, which defines the STEP-NC Application Reference Model. With STEP being extended to model manufacturing information, a new paradigm of integrated CAD/CAPP/CAM/CNC is emerging. This is illustrated in Figure 11.1. The key to this paradigm is that no data conversion is required and the data throughout the design and manufacturing chain are preserved. This chapter focuses on the use of STEP standards to support data exchange between CAD systems as well as facilitate data flow between CAD, CAPP, CAM, and CNC systems. Also discussed are the specific integration issues between CAD and CAPP, CAPP and CAM, and CAM and CNC using STEP standards. STEP-NC data model is a relatively new member in the STEP family, but it completes the entire suite of STEP standards from design to NC machining. Both Physical File Implementation Method (ISO 10303-21, 1994) and XML Implementation Method (ISO/TS 10303-18, 2004) are presented as the two popular ways of implementing STEP and STEP-NC.
APA, Harvard, Vancouver, ISO, and other styles
3

"ners increased (about 50 in 1770 and 204 in 1830). Unlike most firms of that period, it was not a family business. The Turning Period (1791-1820) The accounting system used in the 18th century achieved two main tasks: it computed the wealth (inventory) and enrichment (receipts and payments) of the partners, and it kept the internal movements of goods and cash under control with a comprehen­ sive system of vouchers. However, there does not seem to be any reckoning of costs before 1820. The Company waited for over 150 years before calcu­ lating a cost amount for its products. If one wants to prove the importance of that turning point, the quotes below from two man­ agers are evidence. In 1793, i.e. during the French Revolution, the Company delivered to each associate an “Instruction to help the interested parties in the Manufacture of glass with the declaration form they had to fill in about their interest in that trade, according to the Compulsory Loan Act of the 24th of August." Such a docu­ ment4 had four aims, the most important of which was providing knowledge of the profit of the year 1793. According to the order-in-council, “the benefit was that which went beyond the interests of the funds invested.” The interest was easily known (5% of the net worth) thanks to the inventory. But as regards the evaluation of benefits, the calculation seemed quite impossible from the au­ thors’ instruction: Things do not go with glass as they do with cloth, for which the cost is known even before we put it on the frame. Glass, on the contrary, never preserves its original value. The flaws entail scraps, that is why the benefit of the glass production is a random result and it is impos­ sible to calculate it. In 1829, the Baron Roederer, a director of the Company of Saint-Quirin, expressed quite an opposite point of view when he described the problems raised by the possible merger of the two competing companies.5 It seems that in this case, everything could be reduced on both sides to the calculation of a square foot of glass." In Accounting in France (RLE Accounting), 253. Routledge, 2014. http://dx.doi.org/10.4324/9781315871042-21.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Family origins (Computer file)"

1

Chen, Chia-I., and Juinn-Dar Huang. "Architectural Synthesis Frameworks on Distributed Register-File Microarchitecture Family." In 2011 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2011. http://dx.doi.org/10.1109/isvlsi.2011.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Coatane´a, Eric, Fabrice Alizon, Franc¸ois Christophe, and Bernard Yannou. "Selecting Technology Alternatives for Product Families Through Technological Coverage and Functional Verification." In ASME 2008 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2008. http://dx.doi.org/10.1115/detc2008-49713.

Full text
Abstract:
In product platform development the technology selection issue has seldom been studied. This article tries to fill this gap by introducing an original Technology Selection Method (TSM) to help designers to manage technology selection within the design of a product family. This method is based on technological coverage and functional verification, including the behaviour of the future product family. Practically, the proposed approach uses a multi-objective analysis based on dimensional analysis theory to choose the best technology available. The developed approach has three major points of interest. First, dimensional analysis theory is considered as a specific type of multi-objective optimisation approach which aggregates attributes using a weighting method based on the laws of physics. This manner of viewing dimensional analysis theory provides a scientific coherence to the weighting process which is not obtainable with other multi-objective methods. Second, the principle of similarity included in dimensional analysis theory is extended and allows a range of technologies and range of functions to be compared in a unique design space. Third, the dimensional analysis provides a powerful simulating tool for studying different kinds of behaviours and interactions between attributes. Consequently, dynamic aspects can be analysed and robustness analyses can be performed. The interest of such a method is highlighted through a case study involving a family of small excavators. We suggest that the potential scope of the approach is broad and our aim is to demonstrate the entire scope of the approach in future research.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography