To see the other types of publications on this topic, follow the link: Memory card.

Journal articles on the topic 'Memory card'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Memory card.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

KURAMOCHI, Wataru, and Seiichi NISHIKAWA. "Optical Memory CardIC Card." Journal of the Surface Finishing Society of Japan 42, no. 6 (1991): 614–18. http://dx.doi.org/10.4139/sfj.42.614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Balogh, tefan. "Memory Acquisition by Using Network Card." Journal of Cyber Security and Mobility 3, no. 1 (2014): 65–76. http://dx.doi.org/10.13052/jcsm2245-1439.314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yagi, Shogo, and Tadayuki Imai. "Multi-Layered Wave-Guide Holographic Memory Card." Review of Laser Engineering 28, Supplement (2000): 183–84. http://dx.doi.org/10.2184/lsj.28.supplement_183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

English, Erin. "New PCMCIA card offers security and memory." Computer Fraud & Security Bulletin 1995, no. 3 (March 1995): 5–6. http://dx.doi.org/10.1016/0142-0496(95)80128-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Porwal, Shardha, and Himanshu Mittal. "AN EFFICIENT MEMORY MANAGEMENT TECHNIQUE FOR SMART CARD OPERATING SYSTEM." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 5, no. 2 (July 27, 2013): 124–29. http://dx.doi.org/10.24297/ijct.v5i2.3532.

Full text
Abstract:
This research paper examines memory managementissues associated with Smart card EEPROM and proposes a newtechnique for memory management for smart card files. Theentire work concentrates to suggest a new methodology onmemory allocation and de-allocation using pointers, which givesbetter memory utilization.
APA, Harvard, Vancouver, ISO, and other styles
6

Kamble, Suchita, and N. N. Mhala. "Controller for Network Interface Card on FPGA." International Journal of Reconfigurable and Embedded Systems (IJRES) 1, no. 2 (July 1, 2012): 55. http://dx.doi.org/10.11591/ijres.v1.i2.pp55-58.

Full text
Abstract:
The continuing advances in the performance of network servers make it essential for network interface cards (NICs) to provide more sophisticated services and data processing. Modern network interfaces provide fixed functionality and are optimized for sending and receiving large packets. Network interface cards allow the operating system to send and receive packets through the main memory to the network. The operating system stores and retrieves data from the main memory and communicates with the NIC over the local interconnect, usually a peripheral component interconnect bus (PCI). Most NICs have a PCI hardware interface to the host server, use a device driver to communicate with the operating system and use local receive and transmit storage buffers. NICs typically have a direct memory access (DMA) engine to transfer data between host memory and the network interface memory. In addition, NICs include a medium access control (MAC) unit to implement the link level protocol for the underlying network such as Ethernet, and use a signal processing hardware to implement the physical (PHY) layer defined in the network. To execute and synchronize the above operations NICs also contents controller whose architecture is customized for network data transfer. In this paper we present the architecture of application specific controller that can be used in NICs.
APA, Harvard, Vancouver, ISO, and other styles
7

Lin, Chuan-Sheng, and Lan-Rong Dung. "A NAND Flash Memory Controller for SD/MMC Flash Memory Card." IEEE Transactions on Magnetics 43, no. 2 (February 2007): 933–35. http://dx.doi.org/10.1109/tmag.2006.888520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Buhari, Bello Alhaji, Afolayan Ayodele Obiniyi, Sahalu B. Junaidu, and Armand F. Donfack Kana. "Trends in Remote User Authentication Based on Smart Card and External Memory." International Journal of Security and Privacy in Pervasive Computing 14, no. 1 (January 1, 2022): 1–10. http://dx.doi.org/10.4018/ijsppc.307148.

Full text
Abstract:
This research performs a literature survey of remote user authentication researches based on smart card and external memory. The main security confidence of smart card based schemes is temper-resistance property. Other reasons are small physical size, portability, convenience of non-volatile memory, and security provided by a single chip computer embedded in a plastic card. The most efficient schemes are those that used hash function or ECC. The high cost of the cards and readers and their deployment remains a burden to issuers or users. This is what motivates the use of external memory instead of smart card. But the problem of non-temper resistance property associated with external memory limited researches in that direction. There are also, absence of other activities that are essential in user authentication such as forgot/reset password and re-registration in case the external memory or smart card is stolen or lost in all the reviewed researches.
APA, Harvard, Vancouver, ISO, and other styles
9

Hu, Xian Chuan. "Zero-Copy Implementation in the Linux Operating System." Advanced Materials Research 765-767 (September 2013): 968–71. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.968.

Full text
Abstract:
In this paper, we integrate the DMA data transmission technology and memory mapping technology to implement zero-copy in the Linux operating system. Zero-copy allocates memory address space to network card. In this case, the network card directly transmits the received data to the memory space allocated in advance when the network card transmits the data to the Linux kernel by using DMA. After that, zero-copy maps the allocated memory space to the process space of the user application. And then, the user application can access this allocated memory space directly and reduce the memory copies between the kernel and user space.
APA, Harvard, Vancouver, ISO, and other styles
10

Izawa, F., S. Yamaguchi, M. Nakagawa, A. Yamauchi, M. Sasaki, M. Umeda, Y. Uetani, and Y. Tagami. "Digital still video camera using semiconductor memory card." IEEE Transactions on Consumer Electronics 36, no. 1 (1990): 1–9. http://dx.doi.org/10.1109/30.46603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kimura, Humihiro, and Tosiharu Ieki. "Logical Memory-structure of Multi-purpose IC Card." IEEJ Transactions on Electronics, Information and Systems 107, no. 1 (1987): 67–71. http://dx.doi.org/10.1541/ieejeiss1987.107.1_67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Mesbah, Abdelhak, Jean-Louis Lanet, and Mohamed Mezghiche. "Reverse engineering a Java Card memory management algorithm." Computers & Security 66 (May 2017): 97–114. http://dx.doi.org/10.1016/j.cose.2017.01.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

BENHAMMADI, FARID, and KADDA BEGHDAD BEY. "EMBEDDED FINGERPRINT MATCHING ON SMART CARD." International Journal of Pattern Recognition and Artificial Intelligence 27, no. 02 (March 2013): 1350006. http://dx.doi.org/10.1142/s0218001413500067.

Full text
Abstract:
This paper describes an embedded minutia-based matching algorithm using the reference point neighborhoods minutiae. The proposed matching algorithm is implemented in restricted environments such as smart card devices requiring careful monitoring of both memory and processing time usage. The proposed algorithm uses a circular tessellation to encode fingerprint features in neighborhood minutia localization binary codes. The objective of the present study is the development of a new matching approach which reduces both computing time and required space memory for fingerprint matching on Java Card. The main advantage of our approach is avoiding the implicit alignment of fingerprint images during the matching process while improving the fingerprint verification accuracy. Tests carried out on the public fingerprint databases DB1-a and DB2-a of FVC2002 have shown the effectiveness of our approach.
APA, Harvard, Vancouver, ISO, and other styles
14

Li, Wen Qiang, Dai Ping Li, and Yong Hua Mao. "The Mechanism of Memory Allocation and Recovery in JCVM." Advanced Materials Research 756-759 (September 2013): 1625–29. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1625.

Full text
Abstract:
There may be exist multiple applications in the Java Smart Card, JCVM need to allocate memory space for each object during its running. As the restriction of the physical size of the Java Smart Card itself, the capability of the memory is usually small. It is very necessity to how to use efficiently the limitation resource. In order to solve this problem, In this paper, we will analyze the strategy of memory allocation. Considering the uses of the Java Smart Card, we will be analyzing several memory recovery algorithm, then determine the garbage, and design a kind of method of JCVM garbage collection, which can guarantee meet users tolerable time when trading.
APA, Harvard, Vancouver, ISO, and other styles
15

Luo, Jianjun, Lingyan Fan, Zhenchao Chen, and Zhenhua Li. "A solid state drive architecture with memory card modules." IEEE Transactions on Consumer Electronics 62, no. 1 (February 2016): 17–22. http://dx.doi.org/10.1109/tce.2016.7448558.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Gold, J., C. Carpenter, C. Randolph, T. Goldberg, and D. Weinberger. "Auditory working memory and the Wisconsin card sorting test." Schizophrenia Research 15, no. 1-2 (April 1995): 117–18. http://dx.doi.org/10.1016/0920-9964(95)95361-c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Jwad, Zahraa Ali, Sarkout N. Abdulaah, and Oday A. L. A. Ridha. "SECURED SMART CARD SIMULATION." Journal of Engineering 18, no. 04 (July 21, 2023): 459–71. http://dx.doi.org/10.31026/j.eng.2012.04.07.

Full text
Abstract:
Different methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard version ZC4.5 is used. From obtained results, we noticed that AES-method is faster than RSA and takes less memory size, but RSA is more securethan AES, since it uses two different keys instead of one as in AES.
APA, Harvard, Vancouver, ISO, and other styles
18

Patel, Ahmed, Kenan Kalajdzic, Laleh Golafshan, and Mona Taghavi. "Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card." International Journal of Information Security and Privacy 5, no. 3 (July 2011): 1–18. http://dx.doi.org/10.4018/ijisp.2011070101.

Full text
Abstract:
Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely limited in processing power and memory space. This paper describes a design and implementation of a software library providing smart card application developers with a reliable authentication mechanism based on well-known zero-knowledge authentication schemes. Java Card is used as the target smart card platform implementation based on the evaluation of the Fiat-Shamir (F-S) and Guillou-Quisquater (G-Q) protocols under various performance criteria are presented to show the effectiveness of the implementation and that G-Q is a more efficient protocol.
APA, Harvard, Vancouver, ISO, and other styles
19

Zhang, Guang Zhi, Da Jun Yue, Feng Li Ding, and Yan Qun Xie. "Research on the Wireless Multi-Point Temperature Acquisition and SD Card Memory System." Advanced Materials Research 295-297 (July 2011): 2624–27. http://dx.doi.org/10.4028/www.scientific.net/amr.295-297.2624.

Full text
Abstract:
Combining the low power loss technology with SD card, this system is designed, which is convenient for us to obtain the temperature data of the environment and in which the temperature acquisition module and the data receive memory module are included. The temperature acquisition module is responsible for transmitting the acquired valid temperature value into the data receive memory module by wireless, while the data receive memory module mainly stored the received effective data into SD card after being processed. With the wireless temperature acquisition system, it is convenient for us to acquire and record the multi-point temperature values from the environment.
APA, Harvard, Vancouver, ISO, and other styles
20

Rahozin, D. V. "Performance analysis of massively parallel programs for graphics processing units." PROBLEMS IN PROGRAMMING, no. 3-4 (December 2022): 51–58. http://dx.doi.org/10.15407/pp2022.03-04.051.

Full text
Abstract:
Any modern Graphics Processing Unit (graphics card) is a good platform to run massively parallel programs. Still, we lack tools to observe and measure performance characteristics of GPU-based software. We state that due to complex memory hierarchy and thou- sands of execution threads the all performance issues are about efficient use of graphics card memory hierarchy. We propose to use GPGPUSim simulator, previously used mostly for graphics card architecture validation, for performance validation for CUDA-based program. We provide examples which show how to use the simulation for performance analysis of massively parallel programs.
APA, Harvard, Vancouver, ISO, and other styles
21

Guibert, H., and A. Gamache. "Optical memory card applicability for implementing a portable medical record." Medical Informatics 18, no. 3 (January 1993): 271–78. http://dx.doi.org/10.3109/14639239309025315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

de Vries, Henk J., Joost P. M. de Ruijter, and Najim Argam. "Dominant design or multiple designs: the flash memory card case." Technology Analysis & Strategic Management 23, no. 3 (February 18, 2011): 249–62. http://dx.doi.org/10.1080/09537325.2011.550393.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Mathur, V. K., J. H. Barkyoumb, E. G. Yukihara, and H. Y. Göksu. "Radiation sensitivity of memory chip module of an ID card." Radiation Measurements 42, no. 1 (January 2007): 43–48. http://dx.doi.org/10.1016/j.radmeas.2006.06.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Guo, Feng Ying. "The Hardware Design and Implement of an Image Information Collection System." Advanced Materials Research 804 (September 2013): 211–15. http://dx.doi.org/10.4028/www.scientific.net/amr.804.211.

Full text
Abstract:
It introduces the hardware design and implement of the image information collection system which is one part of Fluorescent magnetic particle nondestructive detection system of Cannonball. The image information collection system includes Open collecting card model Initialize collection card modelApply for EMS memory modelCollecting image modelWrite bitmap information head model Show pictures modeClose collection card model. Through collecting image information to the EMS memory and then processing the image information, the magnetic images on the cannonball are showed clearly on computer, and cracks on the cannonball can easily to be judged. The software of the image information collection system is developed by Visual C++.
APA, Harvard, Vancouver, ISO, and other styles
25

Végh, Ladislav, and Ondrej Takáč. "Simulations of Solving a Single-Player Memory Card Game with Several Implementations of a Human-Like Thinking Computer Algorithm." International Journal of Advanced Natural Sciences and Engineering Researches 7, no. 6 (July 25, 2023): 229–38. http://dx.doi.org/10.59287/ijanser.1158.

Full text
Abstract:
The memory card game is a game that probably everyone played in childhood. The game consists of npairs of playing cards, whereas each card of a pair is identical. At the beginning of the game, the deck of cards is shuffled and laid face down. In every move of the game, the player flips over two cards. If the cards match, the pair of cards is removed from the game; otherwise, the cards are flipped back over. The game ends when all pairs of cards have been found. The game could be played by one, two, or more players. First, this paper shows an optimal algorithm for solving a single-player memory card game. In the algorithm, we defined four steps where the user needed to remember the earlier shown pairs of cards, which cards were already shown, and the locations of the revealed cards. We marked the memories related to these steps as M1, M2, M3, and M4. Next, we made some simulations as we changed the M1, M2, M3, and M4 memories from no user memory (where the player does not remember the cards or pairs of cards at all) to a perfect user memory (where the player remembers every earlier shown card or pair of cards). With every memory setting, we simulated 1000 gameplays. We recorded how manycards or pairs of cards the player would need to remember and how many moves were required to finish the game. Finally, we evaluated the recorded data, illustrated the results on graphs, and drew some conclusions.
APA, Harvard, Vancouver, ISO, and other styles
26

Harabuga, Yu S. "FEATURES OF COMPUTER TECHNICAL RESEARCH OF THE INFORMATION IN THE MEMORY OF SIM, USIM AND R-UIM-CARDS." Theory and Practice of Forensic Science and Criminalistics 17 (November 29, 2017): 318–24. http://dx.doi.org/10.32353/khrife.2017.40.

Full text
Abstract:
The paper considers the features of expert research of elementary files contents of SIM, USIM and R-UIM-cards, the information on which is absent in the current edition of technique 10.9.10 «Technique of computer technical research of information in the memory of SIM-cards». Effective standards which regulate the structure of files in SIM, USIM and R-UIM-cards, are specified. For today there are three types of identification modules of cellular communication customers: SIM-cards for networks of standard GSM, R-UIM-cards for networks ofstandard CDMA and USIM-cards for networks ofstandards UMTS and LTE. The hierarchical structure of a SIM-card corresponds to the hierarchical structure of a smart card of standard ISO/IEC 7816-4 and consists from three types of files: the main file (MF), the intended file (DF) and an elementary file (EF). For addressing or identification of each concrete file the identifier of a file is used which consists of two bytes. The first byte ofthe identifier definesfile type. The attention is paid to the elementary file EFspn in which the name of a cellular communication operator is stored. The theoretical and practical information concerning research of the content of the intended file DFpHONEBCOK is presented in which the telephone book of an USIM-card is stored. It’s specified that elementary file EFSMS is stored in the memory of a R-UIM-card in other intended file in comparison with SIM and USIM-cards. The research algorithm of contents EFSMS file in memory of a R-UIM-card is offered. The attention that in identification number of a R-UIM-card some Ukrainian CDMA-operators specify a mobile code of the country 255 instead of the international telephone code of Ukraine 380, is paid. Keeping in mind the presented information will help to avoid expert errors during computer technical research of the information in the memory of SIM, USIM and R-UIM-cards.
APA, Harvard, Vancouver, ISO, and other styles
27

Yu, Yunhua, Haitao Shi, and Lifei Mi. "Research on Feature Extraction of Indicator Card Data for Sucker-Rod Pump Working Condition Diagnosis." Journal of Control Science and Engineering 2013 (2013): 1–6. http://dx.doi.org/10.1155/2013/605749.

Full text
Abstract:
Three feature extraction methods of sucker-rod pump indicator card data have been studied, simulated, and compared in this paper, which are based on Fourier Descriptors (FD), Geometric Moment Vector (GMV), and Gray Level Matrix Statistics (GLMX), respectively. Numerical experiments show that the Fourier Descriptors algorithm requires less running time and less memory space with possible loss of information due to nonoptimal numbers of Fourier Descriptors, the Geometric Moment Vector algorithm is more time-consuming and requires more memory space, while the Gray Level Matrix Statistics algorithm provides low-dimension feature vectors with more time consumption and more memory space. Furthermore, the characteristic of rotational invariance, both in the Fourier Descriptors algorithm and the Geometric Moment Vector algorithm, may result in improper pattern recognition of indicator card data when used for sucker-rod pump working condition diagnosis.
APA, Harvard, Vancouver, ISO, and other styles
28

Trianto, Edwin Meinardi, Calvin Alexander Hartono, and Titasari Rahmawati. "Perancangan Dan Pembuatan Aplikasi Permainan Memory card Online Bertema Kemerdekaan Indonesia." Journal of Animation and Games Studies 6, no. 1 (April 30, 2020): 11–26. http://dx.doi.org/10.24821/jags.v6i1.3623.

Full text
Abstract:
Perkembangan teknologi pada smartphone menyebabkan segala informasi dan media entertainment terbaru dapat diakses dengan mudah. Akan tetapi, informasi yang diprioritaskan oleh teknologi tersebut hanyalah informasi yang terkenal dan baru saja. Hal ini mengakibatkan informasi sejarah menjadi tidak mudah untuk sampai kepada para generasi muda. Oleh karena itu, dalam Tugas Akhir ini akan dirancang aplikasi permainan berjudul “Memory card Kemerdekaan” yang bertujuan untuk memberikan pembelajaran sejarah perang kemerdekaan melalui permainan. Pembuatan aplikasi ini didasari dari hasil kuesioner yang didapatkan dari berbagai narasumber. Menurut para narasumber, menggunakan media digital dalam proses pembelajaran dapat menambah daya tarik dan perhatian generasi muda. Aplikasi akan dikembangkan menggunakan Unity dengan bahasa pemrograman C++. Metode perancangan yang digunakan adalah throw-away prototyping. Jenis permainan yang akan dibuat adalah memory card game. Permainan memiliki fitur untuk melihat seluruh referensi sejarah yang terdapat di dalam permainan. Selain itu, pemain juga dapat bermain dengan pemain lain menggunakan koneksi internet. Berdasarkan hasil pengujian black box testing, seluruh fitur yang terdapat dalam aplikasi berjalan dengan baik. Pengujian juga dilakukan dengan lebih dari satu perangkat untuk menguji fitur yang menggunakan koneksi internet seperti multiplayer dan chat.
APA, Harvard, Vancouver, ISO, and other styles
29

Aikawa, Yoshihiro, Kenji Iwakura, Minoru Hioki, Takeshi Yanagawa, Yukio Ohsawa, and Hisayuki Muranishi. "202. IC Memory Card Information system for databases of Radiation Therapy." Japanese Journal of Radiological Technology 46, no. 8 (1990): 1176. http://dx.doi.org/10.6009/jjrt.kj00003322327.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

de Hoog, Thomas, Aukje Kastelijn, Rob Hendriks, René Verberne, and Christopher Busch. "Optical Read-Only-Memory Card System Based on the Talbot Effect." Japanese Journal of Applied Physics 44, no. 5B (May 24, 2005): 3645–48. http://dx.doi.org/10.1143/jjap.44.3645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Stratta, Paolo, Enrico Daneluzzo, Pierluigi Prosperini, Massimiliano Bustini, Paolo Mattei, and Alessandro Rossi. "Is wisconsin card sorting test performance related to ‘working memory’ capacity?" Schizophrenia Research 27, no. 1 (October 1997): 11–19. http://dx.doi.org/10.1016/s0920-9964(97)00090-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Luthra, Reena, Saryu Arora, and Suresh Meshram. "Denture Marking for Forensic Identification Using Memory Card: An Innovative Technique." Journal of Indian Prosthodontic Society 12, no. 4 (June 29, 2012): 231–35. http://dx.doi.org/10.1007/s13191-012-0138-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Gold, James M. "Auditory Working Memory and Wisconsin Card Sorting Test Performance in Schizophrenia." Archives of General Psychiatry 54, no. 2 (February 1, 1997): 159. http://dx.doi.org/10.1001/archpsyc.1997.01830140071013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Namazu, Takahiro, Y. Okamura, Y. Tashiro, and Shozo Inoue. "Ti-Ni Shape Memory Alloy Film Cantilever Actuator for Micro-Probing." Materials Science Forum 539-543 (March 2007): 3213–18. http://dx.doi.org/10.4028/www.scientific.net/msf.539-543.3213.

Full text
Abstract:
This paper describes novel MEMS probe card device, which is composed of silicon (Si) cantilever beams actuated by titanium-nickel (Ti-Ni) shape memory alloy (SMA) films. Since Ti-Ni SMA film can yield a higher work output per unit volume, Ti-Ni film-actuated Si cantilever beam is expected to be a MEMS probe card device providing large contact force between probe and electrode pad. The developed cantilever beam produces a contact force by not only cantilever bending in contact but also the shape memory effect (SME) of Ti-Ni film arising from Joule’s heating. The SME of Ti-Ni film containing Ti of 50.5 atomic (at.) % to 53.2 at. % can generate an additional contact force of 200 μN on average under applying an electric power of 500 mW to the film. Ti-Ni film-actuated Si cantilever beam would be a key element for successful MEMS probe card with larger contact force and smaller size.
APA, Harvard, Vancouver, ISO, and other styles
35

YANG, XIAOFENG, and WANMENG XIE. "Correlation between DTI effect and white matter structural integrity, working memory in leukoaraiosis patients." Romanian Biotechnological Letters 26, no. 3 (April 11, 2021): 2714–21. http://dx.doi.org/10.25083/rbl/26.3/2714-2721.

Full text
Abstract:
Our objective was to study the correlation between Diffusion tensor MR imaging (DTI) effect and white matter structural integrity, working memory in leukoaraiosis patients. 100 leukoaraiosis patients referring to the First Affiliated Hospital of Beijing Medical University from December 2018 to December 2019, were selected as study subjects and divided into four groups according to disease severity: lesion-free group, mild lesion group, moderate lesion group, and severe lesion group. All patients underwent magnetic resonance diffusion tensor imaging to collect DWI images and analyze Fractional anisotropy (FA), mean diffusivity (MD), ReHo values of white matter area under different grading. The patients’ working memory was tested via auditory verb learning test and Stroop color word test, so that correlation between white matter structural integrity and working memory can be analyzed. Results: There are statistically significant differences in FA values of the right posterior thalamic radiation, the right sagittal layer and the right superior longitudinal fasciculus, MD values of the right sagittal layer, the right cingulum bundle, the left cingulum bundle, the right inferior fasciculus fronto-occipitalis and the left inferior fasciculus frontooccipitalis, as well as instant recall, delayed recall, delayed recognition, card A (dot), card B (character), card C (color word) and SIE value (P<0.01). Correlation is shown between white matter structural integrity and working memory, gender, age, grading, disease course, recurrence interval, white matter area, and testing methods. There was a correlation between DTI effect and white matter structural integrity, working memory in leukoaraiosis patients, and leukoaraiosis patients have memory impairment.
APA, Harvard, Vancouver, ISO, and other styles
36

Irmawati, I., and Andy Cubalit. "Business terms enrichment by using own flash card." International Journal of Humanities and Innovation (IJHI) 1, no. 1 (March 30, 2018): 47–53. http://dx.doi.org/10.33750/ijhi.v1i1.7.

Full text
Abstract:
Vocabulary is the foundation of the language. It is used to communicate for both oral and written communication. Business terms are used to communicate in the business world activities. It may relate to economic, accounting, banking, tourism, hotel, and others business field. This paper focused on the use of flash cards in enriching the students’ business terms mastery based on the writers’ experience. There are some activities may occur in the classroom by using flashcards. It is classified as memory activity, drilling activity, identification, and Total Physical Response (TPR) activity. They are an abundant approach to present, practice and recycle vocabulary.
APA, Harvard, Vancouver, ISO, and other styles
37

Knoben, Peter, and Nikolaos Alachiotis. "Improving Performance of Hardware Accelerators by Optimizing Data Movement: A Bioinformatics Case Study." Electronics 12, no. 3 (January 24, 2023): 586. http://dx.doi.org/10.3390/electronics12030586.

Full text
Abstract:
Modern hardware accelerator cards create an accessible platform for developers to reduce execution times for computationally expensive algorithms. The most widely used systems, however, have dedicated memory spaces, resulting in the processor having to transfer data to the accelerator-card memory space before the computation can be executed. Currently, the performance increase from using an accelerator card for data-intensive algorithms is limited by the data movement. To this end, this work aims to reduce the effect of data movement and improve overall performance by systematically caching data on the accelerator card. We designed a software-controlled split cache where data are cached on the accelerator and assessed its efficacy using a data-intensive Bioinformatics application that infers the evolutionary history of a set of organisms by constructing phylogenetic trees. Our results revealed that software-controlled data caching on a datacenter-grade FPGA accelerator card reduced the overhead of data movement by 90%. This resulted in a reduction of the total execution time between 32% and 40% for the entire application when phylogenetic trees of various sizes were constructed.
APA, Harvard, Vancouver, ISO, and other styles
38

Dange, Prajwal, Sourav Jagtap, Pankaj Padole, and Prof S. S. Saraswat. "Smart Health Card Using Neural Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 3225–31. http://dx.doi.org/10.22214/ijraset.2022.43054.

Full text
Abstract:
Abstract: The Infection Prediction Framework is built on predictive displaying. The framework examines the client's side effects as well as their present and clinical history. System also determines the severity of infection and recommends treatment based on severity of the condition. It recommends a healthy diet and appropriate physical activity for the client. Expecting infection at a later stage becomes a considerable task. The Convolutional neural Network (CNN) model is used to anticipate such anomalies, as it can precisely identify information related to infection expectation from unstructured clinical health records. However, assuming that CNN uses a completely coupled network structure, it consumes a lot of memory. In addition, an increase in the number of layers might lead to an increase in the model's intricacy examination. The prediction of infection at an early stage becomes a critical task. This prediction can help people understand their potential stage of disease and take action accordingly as soon as possible. Prediction cannot be 100% correct as it is a probability statistic and cannot be always right. However, it can possibly be helpful in very serious situations and can lives. Keywords: Infection Prediction, Health Card, CNN (Convolutional Neural Networks), Smart disease prediction
APA, Harvard, Vancouver, ISO, and other styles
39

Kristanto, Laurensius Ricky, Jasson Prestiliano, and T. Arie Setiawan Prasida. "PERANCANGAN CARD GAME MENGENAL PLASTIK UNTUK ANAK USIA 9 – 12 TAHUN DENGAN MEKANIK MEMORY." ANDHARUPA: Jurnal Desain Komunikasi Visual & Multimedia 5, no. 02 (September 12, 2019): 291–306. http://dx.doi.org/10.33633/andharupa.v5i2.2363.

Full text
Abstract:
AbstrakIndonesia merupakan salah satu penyumbang sampah plastik terbesar di dunia. Sampah plastik adalah sampah anorganik yang sulit terurai dan mencemari lingkungan. Plastik diklarifikasikan menjadi tujuh jenis tingkatan dan memiliki karakternya masing-masing. Peringatan akan bahaya sampah plastik yang ada, dianggap hanya bisa dipahami oleh orang dewasa saja. Supaya anak-anak dapat lebih mengenal plastik, dipilihlah media permainan sebagai media pembelajaran yang dapat lebih menarik untuk anak-anak. Penelitian ini bertujuan untuk mengenalkan jenis-jenis plastik yang ada kepada anak-anak sejak dini, supaya plastik dapat lebih dikenal oleh anak-anak. Metode yang digunakan adalah metode penelitian campuran yang memadukan pendekatan kualitatif dan kuantitatif dengan strategi linier. Metode perancangan permainan melalui tahapan konsep, uji coba, tahapan desain, prototyping, uji coba, dan produksi permainan. Hasil akhir dari penelitian ini adalah permainan kartu dengan mekanisme permainan yang mengandalkan daya ingat. Mekanisme tersebut digunakan untuk membentuk kebiasaan baik sejak dini dan merangsang daya ingat anak yang sedang berkembang. Penelitian ini mampu membuat anak-anak untuk lebih mengenal jenis-jenis plastik yang ada beserta sifatnya, dan menjadi media pembelajaran yang menyenangkan bagi anak-anak. Kata Kunci: plastik, permainan kartu, edukasi, memori AbstractIndonesia is one of the largest plastic waste contributors in the world. Plastic waste is inorganic waste that is difficult to decompose and pollute the environment. Plastics are clarified into 7 types of levels and have their characters. Warnings of the dangers of plastic waste are considered only to be understood by adults. For children to get to know plastics, the game is chosen as a learning medium that can be more interesting for children. This research aims to introduce the types of plastic available to children from an early age, so that plastic can be better known by children. The method used is a mixed method that combines qualitative and quantitative approaches with a linear strategy. The method of designing a game through the concept phase, playtesting, design phase, prototyping, playtesting, and game production. The final result of this research is a card game with a mechanism that relies on memory. The mechanism is used to form good habits from an early age and stimulate the memory of children. This research can make children more familiar with the types of plastic that exist and their characters, and become an exciting learning media for children. Keywords: plastic, card game, education, memory
APA, Harvard, Vancouver, ISO, and other styles
40

Yang, Fang, He Ping Hang, Jin Hui Shen, and Ming Gang Shao. "Design and Realization of Portable ECG Monitor with Dual CPU." Advanced Materials Research 340 (September 2011): 451–55. http://dx.doi.org/10.4028/www.scientific.net/amr.340.451.

Full text
Abstract:
In order to meet data acquisition mobility and convenient requirements of the portable ECG monitor, the data acquisition system of ECG with dual CPU is designed in this paper. The system, in which C8051F005 is master CPU, meanwhile ATmega168 is slave CPU, consists of analogical circuit for detecting of ECG, amplifier-filter circuit, A/D converter and SD memory card communication interface mainly. Experimental data shows that the system has such advantages such as good repeatability, high accuracy, quick response and excellent anti-interference. It can effectively detect and obtain electrical activity of the heart and cope with continuous large memory with SD memory card in embedded system. Strong background noises are eliminated effectively by multi-level amplifier and filter; Un-anamorphic ECG can be acquired and recorded synchronously in memory cards. Moreover, this paper also proposes a preprocessing algorithm for noise reduction so that it can reject the interference by respiration and surface EMG signal.
APA, Harvard, Vancouver, ISO, and other styles
41

Saptono, Marcell Petrus, and Romdani Paris Fuad. "PROTOTYPE RANCANGAN PRINTER 3D DENGAN SMART LCD BERBASIS ARDUINO MEGA 2560 MENGGUNAKAN TEKNOLOGI FUSED FILAMENT FABRICATION." Electro Luceat 6, no. 1 (July 1, 2020): 20–27. http://dx.doi.org/10.32531/jelekn.v6i1.191.

Full text
Abstract:
Dalam Pembangunan system industry 4.0 salah satu yang menopang pembangunan adalah teknologi 3D Printing. Tujuan dari Penelitian ini adalah merancang mesin Printer 3D dengan Microkontroller Arduino MEGA 2560, RAMPS 1.4 Shield, Motor stepper NEMA 17, DVR8825 motor driver, Filament PLA, E3D v6 HotEnd, Memory Card, Smart LCD. Konstruksi rangka rancang bangun alat Printing 3D dengan melakukan perakitan rangka mesin printing 3D, Motor Stepper Mesin 3D, Limit Endstop XYZ, dudukan exstruder, dudukan bed, perakitan HotEnd untuk heater pemanas. Proses pencetakan dapat terhubung dengan PC atau menggunakan dukungan memory card, dan instruksi pengoperasian ditampilkan dalam monitor LCD. Penelitian ini menghasilkan printer 3D berbasis Arduino dengan teknologi FFF (Fused Filament Fabrication) yang akan memudahkan pengguna dalam mengoperasikan printer 3D dengan layar LCD dan Pencetakan tidak harus selalu terbuhung dengan PC karena menggunakan memory card yang dapat menyimpan file dan menghasilkan pencetakan yang lebih baik. Penelitian ini menggunakan metode penelitian model Linier Sequential Model (LSM). Model ini sering disebut dengan “Classic Life Cycle” atau model waterfall. Metode ini terdiri 5 tahapan yang berulang yaitu tahap analisis studi literatur, tahap desain/perancangan sistem, tahap perakitan hardware, tahap pengkodean, dan tahap pengujian (Pressman, R.S, 2012).
APA, Harvard, Vancouver, ISO, and other styles
42

Powley, Edward, Peter Cowling, and Daniel Whitehouse. "Memory Bounded Monte Carlo Tree Search." Proceedings of the AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment 13, no. 1 (June 25, 2021): 94–100. http://dx.doi.org/10.1609/aiide.v13i1.12932.

Full text
Abstract:
Monte Carlo Tree Search (MCTS) is an effective decision making algorithm that often works well without domain knowledge, finding an increasing application in commercial mobile and video games. A promising application of MCTS is creating AI opponents for board and card games, where Information Set MCTS (ISMCTS) can provide a challenging opponent and reduces the cost of creating game-specific AI opponents. Most research to date has aimed at improving the quality of decision making by (IS)MCTS, with respect to time usage. Memory usage is also an important constraint in commercial applications, particularly on mobile platforms or when there are many AI agents. This paper presents the first systematic study of memory bounding techniques for (IS)MCTS. (IS)MCTS is well known to be an anytime algorithm. We also introduce an anyspace version of (IS)MCTS which can make effective use of any pre-specified amount of memory. This algorithm has been implemented in a commercial version of the card game Spades downloaded more than 6 million times. We find that for games of imperfect information high quality decisions can be made with rather small memory footprints, making (IS)MCTS an even more attractive algorithm for commercial game implementations.
APA, Harvard, Vancouver, ISO, and other styles
43

Wu, Jing, and Joseph Jaja. "Achieving Native GPU Performance for Out-of-Card Large Dense Matrix Multiplication." Parallel Processing Letters 26, no. 02 (June 2016): 1650007. http://dx.doi.org/10.1142/s0129626416500079.

Full text
Abstract:
In this paper, we illustrate the possibility of developing strategies to carry out matrix computations on heterogeneous platforms which achieve native GPU performance on very large data sizes up to the capacity of the CPU memory. More specifically, we present a dense matrix multiplication strategy on a heterogeneous platform, specifically tailored for the case when the input is too large to fit on the device memory, which achieves near peak GPU performance. Our strategy involves the development of CUDA stream based software pipelines that effectively overlap PCIe data transfers with kernel executions. As a result, we are able to achieve over 1 and 2 TFLOPS performance on a single node using 1 and 2 GPUs respectively.
APA, Harvard, Vancouver, ISO, and other styles
44

El farissi, Ilhame, Mostafa AZIZI, Jean-Louis Lanet, and Mimoun Moussaoui. "Evaluation of Detection System of Fault Attacks based on Neural Network into a Java Virtual Machine." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 3 (August 5, 2013): 1482–88. http://dx.doi.org/10.24297/ijct.v10i3.3278.

Full text
Abstract:
The Java Card technology provides a secure environment for developing smart card application based on Java while also respecting some constraints such as the limited memory and processing card. In addition to the security and cryptography APIs offered by the Java Card technology, the smart card is protected against some threats. But, the fault attacks based on the variation of the physical parameters are able to disrupt its operation. In order to enhance the smart card security, we thought to add an intelligent component able to distinguish between the smooth functioning and the attack. This component is a Neural Network that we developed in C language and integrated in open source Virtual Machine (Avian) in order to simulate the attack effect and the network behavior. In this context, the detection rate of the attacks is 96% with no false positive.
APA, Harvard, Vancouver, ISO, and other styles
45

Predebon, John. "Memory Size Estimates of Playing Cards: The Effect of Manipulative Familiarity." Perceptual and Motor Skills 73, no. 3 (December 1991): 739–41. http://dx.doi.org/10.2466/pms.1991.73.3.739.

Full text
Abstract:
200 subjects estimated from memory the actual size of a playing card, rated their manipulative familiarity with cards, and estimated the elapsed-time period since they last handled cards. Size estimates were significantly greater than the card's actual size by about 14%; however, neither manipulative familiarity nor the elapsed-time period was significantly associated with estimates of size or with absolute errors of the size estimates. These findings are consistent with the claim that the reported variability in estimates of the distance of familiar objects, such as a playing card, viewed under otherwise reduced-cue conditions is unlikely to reflect extra-experimental individual differences in manipulative experience with cards.
APA, Harvard, Vancouver, ISO, and other styles
46

Xu, Kun Liang, and Hao Lv. "A New Design of the Controller IC Card Settlement Tanker." Advanced Materials Research 1049-1050 (October 2014): 1000–1003. http://dx.doi.org/10.4028/www.scientific.net/amr.1049-1050.1000.

Full text
Abstract:
This paper realized the design of the controller is controlled byan IC card refueling and settlement, just the controller can be installed on an existing tanker achieve control, while refuelingrecords and some configuration information can be stored in the local memory .For the transformation of gas station, don’t need to replace the expensive refueling machine, only need to add an IC card controller based on the existing filling machine, thereby greatly reducing the cost of upgrading the gas station, but also laying the foundation of the next step of information upgrade for gas station.
APA, Harvard, Vancouver, ISO, and other styles
47

Cortes, Miguel Aguilar, Martha Lilia Domínguez Patiño, Antonio Rodríguez Martínez, Rene Guardián Tapia, and Rosa María Melgoza Alemán. "Spectroscopic Characterization Technical High Resolution of Gold from a Memory Card RAM." Advanced Materials Research 818 (September 2013): 37–41. http://dx.doi.org/10.4028/www.scientific.net/amr.818.37.

Full text
Abstract:
Traditionally, materials characterization instrumentation has focused mainly on particles. However, for a better fundamental understanding and various potential applications, it requires an increase in the ability of instrumentation to observe.Characterization and manipulation requires not only extreme sensitivity and accuracy, but also atomic level resolution. In this regard, it is noteworthy the importance of the central role that the various modes of microscopy play in materials characterization and measurement.Also, are particularly relevant physical properties and short-range forces, but do not play a prominent role in the characterization at the macroscopic level, represent a significant impact on the nanometer scale.The sample is studied, are the connections of the RAM, from an IBM 450.The sample characterization was performed at the scanning electron microscope of the Research center in Engineering and Applied Sciences (CIICAp) of the Autonomous University of the State of Morelos (UAEM), is observed in the presence concentrate gold, nickel and carbon.In the scanning electron microscope has the research center, we have observed the presence of gold particles included in the RAM, the particles represent 90.20% by weight, there are also carbon particles containing nickel and 1.94 and 7.86 wt% respectively.
APA, Harvard, Vancouver, ISO, and other styles
48

Tachihara, H., T. Uozumi, H. Akaki, O. Saka, and T. Kitamura. "Use of a Flash Memory Card for Long-Term Geomagnetic Data Recording." Journal of geomagnetism and geoelectricity 48, no. 11 (1996): 1327–31. http://dx.doi.org/10.5636/jgg.48.1327.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Moon, Ji-Hoon, and Jae-Chul Oh. "Design of the Virtual SD Memory Card System on the Embedded Linux." Journal of the Korea institute of electronic communication sciences 9, no. 1 (January 31, 2014): 77–82. http://dx.doi.org/10.13067/jkiecs.2014.9.1.77.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

P, Suresh, Bharathi V Kalmath, and Prakasha G. "Recovering the Deleted data from the Memory Card for different file systems." International Journal of Computer Trends and Technology 42, no. 3 (December 25, 2016): 124–32. http://dx.doi.org/10.14445/22312803/ijctt-v42p121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography