Academic literature on the topic 'Lotus 1-2-3 (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Lotus 1-2-3 (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Lotus 1-2-3 (Computer file)"

1

McCarthy, Gregory J. "Laboratory Note. A LOTUS 1-2-3 Spreadsheet to Aid in Data Reduction for Publication of X-Ray Powder Diffraction Data." Powder Diffraction 3, no. 1 (1988): 39–40. http://dx.doi.org/10.1017/s0885715600013105.

Full text
Abstract:
My students and I have developed a LOTUS 1-2-3 spreadsheet to aid in data reduction tasks associated with preparing powder diffraction data for publication in the Powder Diffraction File (PDF) (1987) and this journal. Portions of a sample spreadsheet and the formulae in each of the computational cells are given in the Table 1. The concept of this spreadsheet should apply to any of the available computer spreadsheet programs, although the specific codes for the mathematical functions may differ.The user enters data only into columns C, D and F-H. All other entries will be calculated from the input data. Observed 2θ angles are entered into column D. The corresponding d-spacing is calculated in column A. The Miller indices of these peaks are entered into column C. Prior to use of the spreadsheet, the observed 2θ angles and hkl's had been used to refine unit cell parameters using the Appleman and Evans (1973) least squares unit cell parameter refinement computer program implemented for the IBM PC by Garvey (1986).
APA, Harvard, Vancouver, ISO, and other styles
2

Wilt, Suzanne Lorenzo, and Jeffrey L. Silvershein. "Applications of a Laptop Microcomputer During Cardiopulmonary Bypass." Journal of ExtraCorporeal Technology 20 (1988): 32–36. http://dx.doi.org/10.1051/ject/198820s032.

Full text
Abstract:
A “user friendly” microcomputer-generated data management system designed for on-site documentation and immediate analysis of patient parameters during cardiopulmonary bypass is presented. The program is a macro-driven template for use with Lotus 1-2-3 (ver. 2.0) on IBM PC-XT or compatible such as the Zenith Z-183 Laptop computer used in this report. Automatic calculation of data requiring minimal input includes kilos, centimeters, body surface area, blood flow, fluid balance, heparin, protamine and mannitol dose and systemic vascular resistance. Also included is autocomputation of documented minimum, maximum and average pressure, blood flow, oxygen flow/percent, temperature, activated clotting time and SVR. Basic file functions are easily performed as saving, retrieving, deleting and report generation. Database management capabilities include sorting by contents of fields, searching for specific records and graphing of selected parameters. The use of a computer-generated perfusion record has become a valuable tool in the tracking and evaluation of important patient parameters during cardiopulmonary bypass.
APA, Harvard, Vancouver, ISO, and other styles
3

Highland, Esther H. "Lotus removes 1-2-3 protection." Computers & Security 7, no. 4 (1988): 432. http://dx.doi.org/10.1016/0167-4048(88)90644-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sachs, Jonathan. "Recollections: Developing Lotus 1-2-3." IEEE Annals of the History of Computing 29, no. 3 (2007): 41–48. http://dx.doi.org/10.1109/mahc.2007.4338441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sundqvist, Christer, Artur Mayerhofer, and Sherie Hodges. "A radioimmunoassay program for Lotus 1–2–3." Computers in Biology and Medicine 19, no. 2 (1989): 145–50. http://dx.doi.org/10.1016/0010-4825(89)90007-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pellerin, Luc. "A protein assay program for Lotus 1-2-3." Computers in Biology and Medicine 20, no. 5 (1990): 373–78. http://dx.doi.org/10.1016/0010-4825(90)90017-j.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sundqvist, Christer, and Kristian Enkvist. "The use of LOTUS 1-2-3 in statistics." Computers in Biology and Medicine 17, no. 6 (1987): 395–99. http://dx.doi.org/10.1016/0010-4825(87)90057-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Warrick, Robert, and C. Frank Williams. "A Computerized Street Tree Inventory System for Small Cities Using Lotus 1-2-3." Arboriculture & Urban Forestry 19, no. 3 (1993): 139–42. http://dx.doi.org/10.48044/jauf.1993.023.

Full text
Abstract:
A simple, user-friendly, computerized street tree inventory system using Lotus 1 -2-3 as a data base is described. The sorting ability of Lotus allows for the generation of numerous kinds of lists. When Lotus-generated lists are used together with bound copies of block maps showing individual trees, this system of street tree inventories is very simple to use for parks personnel who may be computer illiterate and/or lack formal horticultural training.
APA, Harvard, Vancouver, ISO, and other styles
9

Ponken, Tanachai, Kanoknan Yaowanit, Kanyaphat Weluwanarak, Apisit Keacharoen, and Wichaid Ponhan. "Fabrication of activated carbon electrode synthesized from sacred lotus leaf natural materials for supercapacitors." Journal of Materials Science and Applied Energy 11, no. 3 (2022): 247369. http://dx.doi.org/10.55674/jmsae.v11i3.247369.

Full text
Abstract:
Supercapacitor has been the interesting issue in electric energy storage system. Supercapacitors carbon electrode was synthesized from a sacred lotus leaf. The none activated carbon sacred lotus leaf powder (CSLL) and the carbon sacred lotus leaf were mixed with potassium hydroxide (KOH) in the ratio of 1 : 1, 1 : 2, and 1 : 3 which were called CSLL, CSLL-1 : 1, CSLL-1 : 2 and CSLL-1 : 3, respectively. The structural, morphological properties and element component were analyzed with x-ray diffraction (XRD) technique, the field emission scanning electron microscope (FESEM) and energy dispersive x-ray spectroscopy (EDX), respectively. Electrical properties were measured by cyclic voltammetry (CV) and charge–discharge techniques. JCPDS 01-072-2091 data file confirmed the carbon-like (110) plan at 2 theta of 29.43° CSLL-1 : 1 and CSLL-1 : 2 showed high crystalline sizes. Morphology of CSLL-1 : 1 and CSLL-1 : 2 samples exhibited corrosion of surface clearly nevertheless carbon cluster adhered continuously on surface affect to higher the surface area. Carbon element of CSLL, CSLL-1 : 1 and CSLL-1 : 2 samples were obtained as high as of 74.50, 79.30 and 76 % by atomic, respectively which it was suitable characteristic of activated carbon electrode. The highest specific capacitance of CSLL-1 : 2 electrodes displayed approximately 40.85 F g-1 at the scan rate of 20 mVs-1. Moreover, the charge–discharge time of CSLL-1 : 1 and CSLL-1 : 2 electrodes showed the long discharge time more than the discharge time of CSLL-1 : 3 and CSLL electrodes. The performances of electrode demonstrated with charge-discharge of 1,500 and 1,000 cycles found that the CSLL-1 : 1 and CSLL-1 : 2 electrodes exhibited high stability. The suitable conditions ranges depicted between from the CSLL-1 : 1 to CSLL-1 : 2 ratios; furthermore, a sacred lotus leaf can fabricate the carbon electrode for supercapacitor.
APA, Harvard, Vancouver, ISO, and other styles
10

Martin-Vega, L., and H. Carlo. "A lotus 1-2-3 based cash flow forecasting system." Computers & Industrial Engineering 11, no. 1-4 (1986): 321–24. http://dx.doi.org/10.1016/0360-8352(86)90103-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Lotus 1-2-3 (Computer file)"

1

Haiduk, H. Paul. Lotus 1-2-3. Glencoe, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sinclair, Ian Robertson. Using Lotus 1-2-3 macros. Newtech, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Held, Gilbert. Lotus 1-2-3 models. Weber Systems, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bolocan, David. Lotus 1-2-3 simplified. 2nd ed. TAB Books, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bolocan, David. Lotus 1-2-3 simplified. 2nd ed. TAB Books, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Werner, D. Michael. Using Lotus 1-2-3. Scott, Foresman, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Colantonio, Ernest S. Using Lotus 1-2-3. D.C. Heath, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shelton, Nelda. Using Lotus 1-2-3. Houghton Mifflin Co., 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Facilitators, Electronic Learning, ed. The Lotus 1-2-3 book. Harcourt Brace Jovanovich, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mills, D. C. Master Lotus 1-2-3, release 3. Addison-Wesley Pub. Co., 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Lotus 1-2-3 (Computer file)"

1

Weik, Martin H. "Lotus 1-2-3." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_10717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Meyer-Peyton, Lore. "Elements of a Successful Distributed Learning Program." In Distance Learning Technologies. IGI Global, 2000. http://dx.doi.org/10.4018/978-1-878289-80-3.ch007.

Full text
Abstract:
Global connectivity has opened up a new dimension in education, namely, the concept of delivering education via technology to students who may never see their classmates or their instructor face to face. The typical school with its traditional classrooms does not exist in this new scenario, and many of the professionals responsible for developing distributed learning courses are new to the task. This chapter will guide the reader through the process of planning and implementing a distributed learning program. The model for this chapter is the distributed learning program provided by the Department of Defense Education Activity to schools serving the family members of U.S. military personnel at home and abroad. The DoDEA Electronic School (DES) offers sixteen courses to over six hundred students at 56 high schools in fourteen countries, spanning twelve time zones. The program has been in existence for over twelve years, evolving from a two-teacher program to a worldwide school headed by an administrative staff and employing 23 instructors and four technical support staff members. Courses currently available through the DES include seven advanced placement courses (Calculus AB and BC, Physics B, German, United States History, and Computer Science A and AB); five computer programming courses (Pascal I and II, Q-BASIC, Visual BASIC, and C++); economics; health; humanities; and science research seminar. In addition to offering student courses, the DES is in the process of adding an extensive staff development component. With teachers and staff based worldwide, the system can save a significant amount of travel money by providing staff development opportunities that are accessible at the local site. The DoDEA Electronic School grew up with technology. During those first years, students used an acoustic coupler and a telephone to call a central computer in the United States, where they accessed a text based conferencing program to communicate with their classmates and instructors. Today’s DES instructors develop their courses in Lotus Notes, and students can use either the Lotus Notes client or a Web browser. Domino servers at each school send and receive information via the Internet, resulting in efficient transfer of data. In today’s environment, rich with technology but short on hours in the day, there is no time afforded for the luxury of “evolving.” Professionals tasked with developing distributed learning programs for their organizations are given a staff, a budget and a mandate— and certainly a challenge. The goal of this chapter is to help those professionals meet the challenge by examining the key elements of a successful distributed learning program.
APA, Harvard, Vancouver, ISO, and other styles
3

Medlin, B. Dawn, Joseph A. Cazier, and Dinesh S. Dave. "Password Security Issues on an E-Commerce Site." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch210.

Full text
Abstract:
With the exponential growth of the Internet and e-commerce, the need for secure transactions has become a necessity for both consumer and business. Even though there have been advances in security technology, one aspect remains constant: passwords still play a central role in system security. The difficulty with passwords is that all too often they are the easiest security mechanism to defeat. Kevin Mitnick, notably the most recognized computer hacker, made the following statement concerning humans and their passwords: …the human side of computer security is easily exploited and constantly overlooked. Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted, because none of these measures addresses the weakest link in the security chain. (Poulsen, 2000) Without secure passwords, e-commerce sites invite online criminals to attempt fraudulent schemes that mimic the goods and services that legitimate e-commerce merchants offer. With increasing numbers of users on an increasing array of e-commerce sites, often requiring the use of passwords, users often choose to reuse the same simplistic password, and do so on multiple sites (Campbell, Calvert, & Boswell, 2003). For most computerized systems, passwords are the first line of defense against hackers or intruders (Horowitz, 2001). There have been numerous published articles that have created guidelines on how to create better or safer passwords with the following recommendations: 1. passwords should be memorized and not written down; 2. passwords should be an eight- or nine-character word or phrase, and end users should randomly add 3. passwords should contain a mixture of letters (both upper- and lowercase), numbers, and punctuation characters; and 4. passwords should never be words that can be commonly found in a dictionary. But if an individual adheres to security experts’ suggestions about password authentication, it usually involves a trade-off. If a password is easy to create and remember, it is most likely that it is easy for others to guess or a hacker to crack. Eventually, any password can be cracked. Password crackers use a variety of methods and tools that can include guessing, dictionary lists, or brute force attacks. Dictionary lists are created by using an automated program that includes a text file of words that are common in a dictionary. The program repeatedly attempts to log on to the target system, using a different word from the text file on each attempt. A brute force attack is a variation of the dictionary attacks, but it is designed to determine passwords that may not be included in the text file. In a brute force attack, the attacker uses an automated program that generates hashes or encrypted values for all possible passwords and compares them to the values in the password file (Conklin, White, Cothren, Williams, & Davis, 2004). Unfortunately, many of the deficiencies of password authentication systems arise from the limitations of human cognitive ability (Pond, Podd, Bunnell, & Henderson, 2000). The requirements to remember long and complicated passwords are contrary to a well-known property of human memory. First, the capacity of human memory in its capacity to remember a sequence of items is temporally limited, with a short-term capacity of around seven items plus or minus two (Kanaley, 2001). Second, when humans remember a sequence of items, those items cannot be drawn from an arbitrary and unfamiliar range, but must be familiar “chunks” such as words or familiar symbols. Third, the human memory thrives on redundancy. In fact, studies have shown that individuals’ short-term memory will retain a password for approximately 30 seconds, thereby requiring individuals to attempt to memorize their passwords immediately (Atkinson & Shiffrin, 1968).
APA, Harvard, Vancouver, ISO, and other styles
4

Manzo, V. J. "Audio Playback and Pitch Tracking." In Max/MSP/Jitter for Music. Oxford University Press, 2011. http://dx.doi.org/10.1093/oso/9780199777679.003.0018.

Full text
Abstract:
In this chapter, we will look at some of the ways that you can play back and record sound files. As you know, Max lets you design the way you control the variables in your patch. We will apply these design concepts to the ways we control the playback of recorded sound. We will also look at some ways to track the pitch of analog audio and convert it into MIDI numbers. By the end of this chapter, you will have written a program that allows you to play back sound files using a computer keyboard as a control interface as well as a program that tracks the pitch you’re singing from a microphone and automatically harmonizes in real time. We will create a simple patch that plays back some prerecorded files I have prepared. Please locate the8 “.aif ” audio files located in the Chapter 13 Examples folder. 1. Copy these 8 audio files to a new folder somewhere on your computer 2. In Max, create a new patch 3. Click File>Save As and save the patch as playing_sounds.maxpat in the same folder where you put these 8 audio files. There should be 9 files total in the folder (8 audio and 1 Max patch) 4. Close the patch playing_sounds.maxpat 5. Re-open playing_sounds.maxpat (the audio files will now be in the search path of the Max patch) We can play back the prerecorded audio files we just copied using an object called sfplay~. The sfplay~ object takes an argument to specify how many channels of audio you would like the object to handle. For instance, if you are loading a stereo (two channel) file, you can specify the argument 2. Loading a sound file is easy: simply send the sfplay~ object the message open. Playing back the sound is just as easy: send it a 1 or a 0 from a toggle. Let’s build a patch that plays back these files.
APA, Harvard, Vancouver, ISO, and other styles
5

Vogt, Brandon J. "Colorado 14ers, Pixel by Pixel." In Geographic Information Systems. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2038-4.ch072.

Full text
Abstract:
This document describes a capstone learning exercise designed for undergraduates enrolled in an introductory geospatial tools course. The overarching theme of the exercise, Colorado 14ers, Pixel by Pixel, is mountain geography. While immersed in a digital mountainous landscape, students explore topics of geomorphology and geomorphometry and discover how it is possible for a summit that rises well above 14,000 feet not to qualify as a true Colorado ’14er’. To address these topics, students examine freely-available digital elevation models (DEMs) using common geospatial analysis tools. The exercise was developed with five purposes in mind: (1) students should be introduced gently to geospatial software; (2) students should enter upper-level geography courses armed with basic computer skills and a diverse geospatial toolkit; (3) students should internalize the fact that invariably digital geographic explorations are influenced by scale; (4) students of geography should be able to identify natural and anthropogenic impacts to a landscape, and; (5) to help students conceptualize what geographers do, learning exercises should include local and interesting case studies. As an exercise intended to synthesize geographic concepts covered throughout a course, the learning objectives range from grasping broad theoretical concepts related to scale and measurement to learning specific computer skills related to directory structures and file naming conventions. Deliverables of the exercise include posting four maps and answers to nine questions to a website. The outcome of the exercise is a confident, geospatial tool-savvy student who is eager to further investigate the field of geography.
APA, Harvard, Vancouver, ISO, and other styles
6

Manzo, V. J. "Control Interfaces." In Max/MSP/Jitter for Music. Oxford University Press, 2011. http://dx.doi.org/10.1093/oso/9780199777679.003.0012.

Full text
Abstract:
In this chapter, we will examine some premade patches demonstrating a few techniques for designing diatonic musical instruments. We will review some of the basic ins and outs of MIDI, learn some ways to program more efficiently, and discuss a number of control options for your patches. As we examine some working patches and encounter many new objects, please read carefully and, in your mind, follow the flow of data from one object to the next as the process is described in the text. Remember that it will be beneficial to look at the Help file for any objects you may have forgotten about or do not fully understand as you encounter them in this chapter. In the last chapter, you installed the EAMIR SDK (Soft ware Development Kit) which, in addition to putting the Modal Object Library into the Max search path, put a bunch of patches I’ve created into the path as well. In fact, if you select Extras from the top menu, you will see an item marked EAMIR among the other extras. 1. Click on Extras>EAMIR from the top menu to view the main menu of the EAMIR SDK 2. In the umenu labeled Examples, click the first item 1.EAMIR _MIDI_Basics.maxpat If you did a manual install of the EAMIR SDK, you will need to locate the EAMIR_SDK folder on your computer and open the file EAMIR.maxpat. A patch will open containing two rectangular boxes. Unlock the patch to see that these two rectangular boxes have inlets and outlets just like the objects we’ve been working with, except that they, in themselves, contain other objects. These two boxes are called bpatchers. A bpatcher is an object that allows an existing Max patch to be loaded into a viewable window; that window is the bpatcher object itself. 3. Open the Inspector for the upper bpatcher Note that the line Patcher File within the Inspector displays the filename of the Max patch currently loaded in the bpatcher: EAMIR_MIDI_in.maxpat. This is just a Max patch that is being displayed in the bpatcher.
APA, Harvard, Vancouver, ISO, and other styles
7

Katsh, M. Ethan. "Electronic Information Places." In Law in a Digital World. Oxford University PressNew York, NY, 1995. http://dx.doi.org/10.1093/oso/9780195080179.003.0003.

Full text
Abstract:
Abstract If the dull substance of my flesh were thought, Injurious distance should not stop my way; For then, despite of space, I would be brought, From limits far remote, where thou dost stay. No matter then although my foot did stand Upon the farthest earth removed from thee; For nimble thought can jump both sea and land, As soon as think the place where he would be. --William Shakespeare In 1987, scientist Peter Denning wrote: Computer networks that nurture networks of people are the culmination of a process of evolution that can be said to have five stages: (1) file transfer; (2) remote connections, (3) distributed computation, (4) real-time collaboration, and (5) coherent function. At the first stage, a network is able to transfer files of information among computers, but without guaranteeing delivery time; this stage is sufficient to support electronic mail, bulletin boards, news services and jointly authored papers. At the second stage, the network enables a user to connect to remote resources, such as instruments, computers, or databases, and employ them in real time as if they were local. At the third stage, the network is able to support distributed computations that include computing processes and resources at widely separated nodes; an example is a user interface process on a work station, connected to a numerical process on a supercomputer, connected in turn to a graphics display system. At the fourth stage, the network directly supports collaboration by permitting real-time conferences of users at different workstations, who can communicate as .
APA, Harvard, Vancouver, ISO, and other styles
8

Manzo, V. J. "Informal Music Learning Instruments." In Max/MSP/Jitter for Music. Oxford University Press, 2011. http://dx.doi.org/10.1093/oso/9780199777679.003.0024.

Full text
Abstract:
In 2010, I was involved in a research project called the Interactive Music Technology Curriculum Project (Manzo & Dammers, 2010), or IMTCP; its goal was to teach music composition and performance to students who have no musical training by using soft ware instruments that allow them to play chord functions. In this chapter, we will examine the patches developed for this project. As you will see, even though each patch facilitates a different musical activity, the patches themselves use similar chunks of code neatly organized in bpatchers. These patches allow students to play chords, at first, with the number keys (1–8) from a computer keyboard as they learn about diatonic scale degrees and chord functions. Students in this project were asked to go online and get the YouTube links to their 10 favorite songs. The faculty for this project took those songs and reduced each part of the form (verse, chorus, bridge, etc.) to a set of numerical chord functions within a key. For example, the verse would be referred to as a The project was influenced by the Manhattanville Music Curriculum Project (MMCP; Thomas, 1970) and Lucy Green’s research on Informal Music Learning (Green, 2008). “1 5 6 4” in C Major while the chorus was a “2 4 1 5.” Students would then use a patch to play back the chord functions using the ASCII keyboard. 1. Open the file E001.maxpat from within the folder E001 located in the Chapter 19 Examples folder 2. Press the number keys on your computer keyboard (1–8) to play back the C Major scale. Use the space bar to end the sustain 3. Click the toggles 3 and 5 to add a third and a fifth to the output. Notice that the name of the triad is now displayed on the right We’ve looked at patches similar to this in the EAMIR SDK. Let’s take a look at some of the more interesting and novel features of this patch.
APA, Harvard, Vancouver, ISO, and other styles
9

Manzo, V. J. "Building Stand-alone Applications." In Max/MSP/Jitter for Music. Oxford University Press, 2011. http://dx.doi.org/10.1093/oso/9780199777679.003.0016.

Full text
Abstract:
In this chapter, we will analyze a “Chord Namer” application that allows a user to enter a chord name and see the notes on a MIDI keyboard. Unlike the other patches we’ve worked on thus far, we will “build” this patch as a stand-alone program that can be used on any computer even if it does not have Max installed. Stand-alone programs are a great way of distributing your work to people for educational or commercial purposes. Open the file chord_namer.maxpat from the Chapter 11 Examples folder. This patch allows users to type in the name of a chord (C, for example) and see the chord displayed on a large kslider. Users can then play the chord on their MIDI keyboard while looking at the visual example. The letter name of each note appears on each chord tone when it is highlighted. For taller chords, a user may enable more chord tones to be added than simply just a root, third, and fifth. For example, a user wanting to play a Cdom7#9 chord could simply enable 7ths and 9ths to be displayed by checking the appropriate toggles, typing Cdom7#9 into the space provided, and pressing the return or enter key. 1. Type C into the text box at the top left and press the return or enter key 2. Play a C chord on your MIDI keyboard This patch could be useful for helping people perform a piece for which they have only a lead sheet with chord names. Let’s take a look inside the patch. The patch is currently in Presentation mode. Unlock the patch and put it into Patching mode. The patch is rather large in size so you may need to zoom out on the patch (⌘for Mac or ctrl for Windows ). Now that the patch is open, you may be surprised to see that there is only a small number of objects inside. Take note of the 3 bpatchers in the patch that generate chords, handle MIDI output, and, to the right, above the kslider, handle MIDI input.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Lotus 1-2-3 (Computer file)"

1

Stephenson, Dave. "Using Spreadsheets to Recalculate Airspaces for Diffraction-Limited Assemblies." In International Optical Design Conference. Optica Publishing Group, 1994. http://dx.doi.org/10.1364/iodc.1994.mid.202.

Full text
Abstract:
The use of spreadsheet programs (Lotus [1], Excel [2], etc.) as an optical design and production fabrication tool is reviewed. The common problem of melt and thickness recalculation prior to assembly is demonstrated using two approaches: (1) the spreadsheet preprocesses and writes a file for batch processing by a commercial optical design program, and (2) the spreadsheet uses matrix algebra and a partial derivative matrix to compute the respacing without any additional ray tracing.
APA, Harvard, Vancouver, ISO, and other styles
2

Sasaki, Keiji, Masanori Koshioka, Hiroaki Misawa, Noboru Kitamura, and Hiroshi Masuhara. "Laser scanning micromanipulation of fine particles." In OSA Annual Meeting. Optica Publishing Group, 1991. http://dx.doi.org/10.1364/oam.1991.wl1.

Full text
Abstract:
A laser trapping technique is a powerful tool for manipulating single or plural particle(s). Bums et al. recently demonstrated that lattice structures of latex particles could be created on interference patterns of several laser beams.1 Also, we showed that particles were aligned in concentric circles or a line image of a single trapping beam, and demonstrated size-selective trapping of particles.2 The spatial patterning by these methods is, however, essentially based on the interference, so that there are severe limitations in forming arbitrary patterns. In this paper, we propose a laser scanning micromanipulation technique to produce any spatial patterns of fine particles. The principal key to the technique is repetitive scanning of a focused laser beam by computer-controlled galvano mirrors. If the repetition rate is faster than the time-scale of the Brownian motion, plural particles are trapped along a locus of the scanning spot. In addition to the pattern formation, the trapped particles can be moved continuously along the formed patterns, and the flow velocity is controlled by scanning speed and laser power.
APA, Harvard, Vancouver, ISO, and other styles
3

Hanawa, Kirk. "Thermodynamic Performance Analyses of Mixed Gas-Steam Cycle (1): Performance Prediction Method." In ASME 1998 International Gas Turbine and Aeroengine Congress and Exhibition. American Society of Mechanical Engineers, 1998. http://dx.doi.org/10.1115/98-gt-117.

Full text
Abstract:
There are various papers relevant to the improvement ideas of gas turbine cycles, which in general discuss only optimum one-point cycle analysis.*1,*2,*6 It is, accordingly, unclear whether such improvement concepts can be applied into existing gas turbines or not. It might be difficult to incorporate such ideas, in the case of yielding significant changes for operation modes. And it may be essential to assess improvement ideas, from view points of applicability to existing gas turbine models.*3 This paper introduces the performance analysis method of simplified small perturbation procedure, showing thermodynamic behaviors based upon the component characteristics, and resultant influences due to settled operation parameters, like ambient temperature & pressure, turbine inlet temperature, etc. The established method might be used as a rule of thumb for the performance prediction when introducing water and/or steam injection into GTs, where operational parameters’ changes are defined under multi-linear differential equations. This is easy to compile in the computer as Lotus 1-2-3 or Exel to evaluate whether every parameter is within the limit or not, offering very helpful performance evaluation tool for the conceptual design stage.
APA, Harvard, Vancouver, ISO, and other styles
4

Sinha, Dipendra K., and Michael T. McDonald. "Automated Design of Optimum Belt Drives." In ASME 1991 Design Technical Conferences. American Society of Mechanical Engineers, 1991. http://dx.doi.org/10.1115/detc1991-0082.

Full text
Abstract:
Abstract The paper describes a belt design package which works from within a commercial Computer Aided Design and Drafting package (AutoCAD) environment and utilizes FORTRAN programs for design and selection of lowest weight components for the drive system. The components used in the process are available as stock items in U.S.A. The relevant information on these products is stored in commercial database management systems such as EXCEL and LOTUS 1-2-3. Output from the package consists of scaled drawing and tabular specifications.
APA, Harvard, Vancouver, ISO, and other styles
5

Fu, Chun Kit, and Yu Sun. "Airbnb Research: An Analysis in Nexus BetweenVisual Description and Product Rating." In 13th International Conference on Computer Science, Engineering and Applications (CCSEA 2023). Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130520.

Full text
Abstract:
Hosts are often desperate to find ways to rent their house, However, most of them do not have possess theknowledge of knowing what type of image cover would grasp the attention of their customer. Gilded by these needs, I have designed an application that uses machine learning to find the relationship between the images andtheirrating [1]. I first used JSON to convert the HTML file resource to a format where we can use in python for webscraping [2]. This paper designs an application tool to find all the object or characters inside images by webscraping and changes it into a model for machine learning [3]. Applied our application to predict the ratingandconducted a qualitative evaluation of the approach. In order to prove our result, I imported an image fromAirbnband found its rating. It turns out that the predicted rating is extremely close to the real rating, Proving The system’susability.
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Yirina, and Yu Sun. "An Intelligent and Data-Based Skate Analyzer to Assist in Analyzing Movements of Skate on Ice." In 13th International Conference on Computer Science, Engineering and Applications (CCSEA 2023). Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130516.

Full text
Abstract:
Ever since the start of Figure Skating, there has been an emphasis on skating technique, especially in the step sequences of a skater’s choreography [1]. But Figure Skaters often are not able to detect the motion, edge, or placement of their blade on the ice without watching themselves skate. The solution to this problem would be to have a skate analyzer. A skate analyzer would record the movements of a skate on ice and one would be able to playback the recorded data and view their skate motion precisely [2]. Three main components that my project links together are the QTPY-ESP 32 microcontroller, the sensor that combines the accelerometer, gyroscope, and magnetometer, and the SD card reader. The QTPY-ESP32 is a microcontroller that acts as a main computer controlling the whole board. The QTPY is then connected to a sensor board through an I2c protocol. Then, through an SPI protocol, the QTPY is connected to an SD card reader. After the skater is finished recording, they can insert the SD card in a computer, upload the data into the app, and play it back. There is also a slider on the top of the screen that the skater can slide back and forth to view the skate at specific times in the file. This would be a great technology to use for skaters as they can playback their movements on ice and improve their technique [3].
APA, Harvard, Vancouver, ISO, and other styles
7

Kirk, J. A., D. K. Anand, M. Anjanappa, and W. K. Rickert. "The Use of IGES in Rapid and Automated Design Prototyping." In ASME 1988 Design Technology Conferences. American Society of Mechanical Engineers, 1988. http://dx.doi.org/10.1115/detc1988-0004.

Full text
Abstract:
Abstract The Initial Graphic Exchange Specification (IGES) for design data and the EIA standard M and G Codes for Numerically Controlled machines (N/C) is used to develop an automated interface between existing computer aided design systems and N/C manufacturing systems. The Flexible Manufacturing Protocol, developed at the University of Maryland, outlines such an interface to control automated manufacturing cells used for prototyping quick design changes. This paper demonstrates one application of the protocol, developing an automated IGES to CNC interface to control a 3 axis CNC machining center given the geometric representation of the part in IGES format. Wireframe representations of 2-1/2 dimensional parts, composed of linear elements, are the primary tools used for design representation. The automated production of the sample part, presented in this paper, demonstrates that rapid prototyping is possible using an IGES design data file as input to the protocol.
APA, Harvard, Vancouver, ISO, and other styles
8

Xue, Liang, Li Zheng, and Tomasz Wierzbicki. "Interactive Failure in High Velocity Impact of Two Box Beams." In ASME 2003 International Mechanical Engineering Congress and Exposition. ASMEDC, 2003. http://dx.doi.org/10.1115/imece2003-55112.

Full text
Abstract:
The research reported in the present paper has been motivated mainly by the need of reconstructing the airplane impact damage of the WTC Towers. The initial phase of this catastrophic event was dominated by fracture, leading to breakup and fragmentation of the airplane and severance of a large number of external columns. However, the role of fracture has been de-emphasized in the recent attempt to reconstruct the 9/11 attack [1–3]. The objective of this paper is to raise the phenomenon of ductile fracture to the level of a main factor controlling the initial phase of the September 11th event. Our philosophy is similar to that employed by Lawver et al [4], but we are treating ductile fracture in a much more comprehensive way including the topics of material testing, calibration, validation and finite element implementation. A particular scenario considered is the impact of a corresponding section of the wing of the Boeing 767 into one external box column of a Twin Tower. Real dimensions are taken for the WTC column and the wing section is represented as a thin-walled box beam. Both members undergo extensive plastic deformation and fracture. In developing computer models, special attention was paid to the choice of the element type (shell vs. solid), contact algorithm, element removal (erosion) option, and above all the fracture criterion. Most calculations were done using LS-DYNA for several combinations of the equivalent strain to fracture of the aluminum alloy wing and the steel columns. In addition five ABAQUS runs were made with a newly developed criterion for ductile fracture with a cut-off value for negative triaxialities. Impact velocities considered ranged from 120 to 480 m/sec where 240 m/sec was the actual impact speed of the Boeing 767. It was found that the damage process is localized in the immediate velocity of the impact area. The fracture process initiates at the impacting flanges in the Mode III out-of-plane shear, continues down the webs as a combined shear/tension (tearing) and finally ends up as a tensile fracture of the rear flanges. While the airplane wing box was almost always completely cut, the WTC column was often partially penetrated for a wide range of the equivalent strain to fracture. It was also found that introducing a modified fracture locus changes the sequence of failure pattern as well as the mode of fracture.
APA, Harvard, Vancouver, ISO, and other styles
9

Joo, Sung-Hwan. "Assessment of Three Dimensional CAD Models Using CAD Application Programming Interface." In ASME 2018 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/imece2018-87776.

Full text
Abstract:
It has been always a challenge to grade and assess the students’ CAD (Computer-Aided Design) three-dimensional models in the class. The high number of the files and complexity of models make the task time-consuming and tedious many times. For example, even opening and closing each CAD file takes a lot of time. When hundreds of CAD models need to open and verified, it takes more than one hour to finish the task. The work has been done to simplify this task and make it easy using Commercial CAD software’s API (Application Programming Interface), which can be used to automate and customize the CAD software. The API contains hundreds of functions that you can call from Visual Basic for Applications (VBA), VB.NET, Visual C#, Visual C++ 6.0, and Visual C++/CLI. These functions provide direct access to CAD functionality such as opening a file, check the important physical properties of three-dimensional models. Custom API program has been programmed for the task. The custom program executes the internal commends in CAD software and retrieve the data you need from each CAD file automatically. The program opens the multiple CAD files in the folder and check each file’s physical properties and save the information in MS Excel for the review. The program checks the volume (w.r.t the given coordinates) in two standard units (English and S.I. Units), the creator of model (to prevent the plagiarism) and degrees of sketch. In this paper, the following topics will be discussed and presented. 1) The problem with manual grading and assessment, 2) History and background of API functionality in commercial CAD software, 3) Examples of simple source code for API usage, 4) Running example of the API program for the given task, 5) Comparison between manual assessment and automatic assessment using API in terms of spent time. 6) Future improvement with API program. Actual demonstration of the program will be given during the presentation.
APA, Harvard, Vancouver, ISO, and other styles
10

Joo, Sunghwan. "Improvement of API Program to Evaluate Three-Dimensional CAD Models." In ASME 2022 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/imece2022-96096.

Full text
Abstract:
Abstract Many commercial Computer-Aided Design software have been introduced in high schools and undergraduate engineering colleges in the past decades. Basic CAD skills have become the essential engineering skill which all students need to have. Because many colleges offer basic CAD courses as early as freshman course sequences, the size of the class is quite large. That means many assignments for instructors and a lot of time to grade assignments. When instructors grade assignments, they need to open CAD files, check the accuracy of models, and close CAD files again. If they grade multiple assignments or sometime even 100s of assignments required, time to spend to grade those assignments will be tremendous. So, the CAD software API (Application Program Interface) based software was developed by author. The first version of the program was developed in 2018 and presented in the IMECE conference. The program was designed for SolidWorks using Visual Basic for Applications and provides several useful functions. The program opens multiple CAD files and check the critical values including dimensions and closes those automatically. The results are saved in Excel file to review later. The first version of the program was accepted positively by the fellow colleagues. However, there was always room for improvement. Since then, the program has been completely revamped. 1) More functions have been added to the program including the screen capture of open 3d models, 2) The program has been optimized as an independent executable program which run separately from the CAD software, 3) The program now supports multiple CAD software, 4) The program checks the watermark in the files to prevent plagiarism. In this paper, the following topics will be discussed and presented. 1) The problem with manual grading and assessment, 2) History and background of API functionality in commercial CAD software, 3) Previous development of API based evaluation software, 4) Example of the developed API program, 5) Comparison between previous program and new program. 6) Future improvement plan of API program. An actual demonstration of the program will be given during the presentation.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Lotus 1-2-3 (Computer file)"

1

Fridman, Eyal, Jianming Yu, and Rivka Elbaum. Combining diversity within Sorghum bicolor for genomic and fine mapping of intra-allelic interactions underlying heterosis. United States Department of Agriculture, 2012. http://dx.doi.org/10.32747/2012.7597925.bard.

Full text
Abstract:
Heterosis, the enigmatic phenomenon in which whole genome heterozygous hybrids demonstrate superior fitness compared to their homozygous parents, is the main cornerstone of modern crop plant breeding. One explanation for this non-additive inheritance of hybrids is interaction of alleles within the same locus. This proposal aims at screening, identifying and investigating heterosis trait loci (HTL) for different yield traits by implementing a novel integrated mapping approach in Sorghum bicolor as a model for other crop plants. Originally, the general goal of this research was to perform a genetic dissection of heterosis in a diallel built from a set of Sorghum bicolor inbred lines. This was conducted by implementing a novel computational algorithm which aims at associating between specific heterozygosity found among hybrids with heterotic variation for different agronomic traits. The initial goals of the research are: (i) Perform genotype by sequencing (GBS) of the founder lines (ii) To evaluate the heterotic variation found in the diallel by performing field trails and measurements in the field (iii) To perform QTL analysis for identifying heterotic trait loci (HTL) (iv) to validate candidate HTL by testing the quantitative mode of inheritance in F2 populations, and (v) To identify candidate HTL in NAM founder lines and fine map these loci by test-cross selected RIL derived from these founders. The genetic mapping was initially achieved with app. 100 SSR markers, and later the founder lines were genotyped by sequencing. In addition to the original proposed research we have added two additional populations that were utilized to further develop the HTL mapping approach; (1) A diallel of budding yeast (Saccharomyces cerevisiae) that was tested for heterosis of doubling time, and (2) a recombinant inbred line population of Sorghum bicolor that allowed testing in the field and in more depth the contribution of heterosis to plant height, as well as to achieve novel simulation for predicting dominant and additive effects in tightly linked loci on pseudooverdominance. There are several conclusions relevant to crop plants in general and to sorghum breeding and biology in particular: (i) heterosis for reproductive (1), vegetative (2) and metabolic phenotypes is predominantly achieved via dominance complementation. (ii) most loci that seems to be inherited as overdominant are in fact achieving superior phenotype of the heterozygous due to linkage in repulsion, namely by pseudooverdominant mechanism. Our computer simulations show that such repulsion linkage could influence QTL detection and estimation of effect in segregating populations. (iii) A new height QTL (qHT7.1) was identified near the genomic region harboring the known auxin transporter Dw3 in sorghum, and its genetic dissection in RIL population demonstrated that it affects both the upper and lower parts of the plant, whereas Dw3 affects only the part below the flag leaf. (iv) HTL mapping for grain nitrogen content in sorghum grains has identified several candidate genes that regulate this trait, including several putative nitrate transporters and a transcription factor belonging to the no-apical meristem (NAC)-like large gene family. This activity was combined with another BARD-funded project in which several de-novo mutants in this gene were identified for functional analysis.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography