To see the other types of publications on this topic, follow the link: Microsoft DirectX (Computer file).

Journal articles on the topic 'Microsoft DirectX (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Microsoft DirectX (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sali, Yulia Mau, Marcella Mauko, Yakoba Hinglir, et al. "PENGABDIAN MASYARAKAT: PELATIHAN PENGGUNAAN MICROSOFT EXCEL PADA SISWA/I SD GMIT BELEMANA." BESIRU : Jurnal Pengabdian Masyarakat 2, no. 1 (2025): 86–92. https://doi.org/10.62335/kk1k8j98.

Full text
Abstract:
Computer technology is a crucial aspect of daily life; however, many individuals, including students of SD GMIT Belemana, struggle to operate computers effectively. To address this issue, we conducted a Microsoft Excel training program aimed at enhancing students' abilities to adapt to technology. The training involved both theoretical explanations and hands-on practice. The activities included inputting data into columns, organizing tables neatly, and learning how to save their completed files. This training is expected to improve students' skills in utilizing technology, particularly Microso
APA, Harvard, Vancouver, ISO, and other styles
2

Et al., Pramaha Prakasit Thitipasitthikorn. "Bowon Power: An Integrated of Community Development Mechanism in Nakhon Pathom Province." Psychology and Education Journal 58, no. 1 (2021): 1718–26. http://dx.doi.org/10.17762/pae.v58i1.973.

Full text
Abstract:
This research has the objective to study citizenship awareness in community development and urbanization of Nakhon Pathom province. Using the integrated research methodology, namely quantitative research The quantitative data were collected from 375 samples. The data were analyzed by using percentage, mean, standard deviation. And qualitative research 24 in-depth interviews with key informants/person and 12 specific group conversations/person, analyzing data in context and describing.
 The research found that The community development and urbanization of communities in Nakhon Pathom Provi
APA, Harvard, Vancouver, ISO, and other styles
3

Eftekhar, Behzad, Mohammad Ghodsi, Ebrahim Ketabchi, and Saman Rasaee. "Surgical Simulation Software for Insertion of Pedicle Screws." Neurosurgery 50, no. 1 (2002): 222–24. http://dx.doi.org/10.1097/00006123-200201000-00038.

Full text
Abstract:
ABSTRACT OBJECTIVE As the first step toward finding noninvasive alternatives to the traditional methods of surgical training, we have developed a small, stand-alone computer program that simulates insertion of pedicle screws in different spinal vertebrae (T10–L5). METHODS We used Delphi 5.0 and DirectX 7.0 extension for Microsoft Windows. This is a stand-alone and portable program. RESULTS The program can run on most personal computers. It provides the trainee with visual feedback during practice of the technique. At present, it uses predefined three-dimensional images of the vertebrae, but we
APA, Harvard, Vancouver, ISO, and other styles
4

Glen Ferguson, David. "Redefining File Slack in Microsoft® NTFS." Journal of Digital Forensic Practice 2, no. 3 (2008): 140–56. http://dx.doi.org/10.1080/15567280802587965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schuster, Andreas. "Introducing the Microsoft Vista event log file format." Digital Investigation 4 (September 2007): 65–72. http://dx.doi.org/10.1016/j.diin.2007.06.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Taryanto, Ardi, and Lilis Nur Handayani. "PENGEMBANGAN SISTEM INFORMASI RETENSI REKAM MEDIS DI RUMAH SAKIT DUSTIRA CIMAHI." Jurnal E-Komtek (Elektro-Komputer-Teknik) 3, no. 2 (2019): 62–70. http://dx.doi.org/10.37339/e-komtek.v3i2.131.

Full text
Abstract:
This study aimed to develop a medical record retention information system with a case study at Dustira Cimahi Hospital. The data collection techniques used were by observations and completed by literature study which had related with the problems. Software development methods was made using waterfull. From the research conducted, it was found several problems associated with the retention information system which has running, such as: the implementation of retention was done directly with sorting out medical record file without the computer, the absence of a retention schedule medical record f
APA, Harvard, Vancouver, ISO, and other styles
7

Tukino, Tukino. "Pelatihan Microsoft Office 2010 pada Kelompok Kerja Kepala TK (K3TK) dan Gugus Paud Naga di Kota Batam sebagai Aplikasi dari Pembelajaran Komputer pada Anak Usia Dini." J-ABDIPAMAS (Jurnal Pengabdian Kepada Masyarakat) 2, no. 2 (2018): 65. http://dx.doi.org/10.30734/j-abdipamas.v2i2.245.

Full text
Abstract:
ABSTRACTThe material provided in this guidance is divided into 3 groups, there are Microsoft Word, Microsoft PowerPoint and Microsoft Paint. Activities are carried out based on the division level of the ability/skill of each teacher. Teachers who have been adept grouped separately from the teacher who still lay on the computer so that the coaching is intensive. Teachers who still lay be guided and accompanied by the instructor ranging from the procedure turn on the computer, opening files, saving files, using the mouse, typing basic, introduction computer parts up on the procedure to turn off
APA, Harvard, Vancouver, ISO, and other styles
8

Hutajulu, Ika Putri. "APLIKASI PENGELOLAAN KEUANGAN PADA PERGURUAN ADVENT SIMBOLON." Majalah Ilmiah METHODA 9, no. 2 (2019): 103–11. http://dx.doi.org/10.46880/methoda.vol9no2.pp103-111.

Full text
Abstract:
The Simbolon Adventist College is one of the private status schools in the area of ​​Samosir, Palipi District. This school has used computer equipment in carrying out its work activities, such as Microsoft Office Excel. However, the use of computer devices only utilizes small activities such as calculating cash income and expenditure and making reports. Administration of data processing that is processed by the finance department is still manual, namely in the form of files. The administrative data processing in question, such as recording the cash in the school as well as the cash out used by
APA, Harvard, Vancouver, ISO, and other styles
9

Siregar, Gunayanti Kemalasari, and Suyud Widodo. "PERANCANGAN APLIKASI PENGAJUAN PENERIMA BANTUAN KESEJATERAAN SOSIAL BERBASIS WEB PADA DINAS SOSIAL KOTA METRO." Jurnal Ilmiah Sistem Informasi (JISI) 2, no. 1 (2023): 37–47. http://dx.doi.org/10.24127/jisi.v2i1.4208.

Full text
Abstract:
The Social Service is a government institution that is given the mandate to regulate community welfare in accordance with Law no. 11 of 2009 concerning Social Welfare. The field of filing beneficiaries is one of the problems handled by the Social Service. Types of community assistance include Staple Food, Family Hope Program (PKH), Direct Cash Assistance (BLT) with certain conditions. With the number of beneficiaries currently totaling 9,205 Family Cards, processing of data on receiving assistance still utilizes data processing using Microsoft Excel. Where data processing using Microsoft Excel
APA, Harvard, Vancouver, ISO, and other styles
10

Sukarata, Putu Gde, I. Gede Suputra Widharma, I. Made Purbhawa, and I. Gede Wahyu Antara Kurniawan. "OPTIMALISASI COMPUTER MEMORY USAGE MENGGUNAKAN METODE APLIKASI MICROSOFT BINDER." JURNAL INTEGRASI 11, no. 2 (2019): 74–80. http://dx.doi.org/10.30871/ji.v11i2.1650.

Full text
Abstract:
Perkembangan teknologi komputer sekarang ini sangat jauh berkembang dari tahun-tahun sebelumnya. Perkembangan ini terjadi di semua bidang kehidupan. Seperti dunia kedokteran, industri, pertanian dan yang lainnya. Teknologi juga sangat membantu berbagai pekerjaan manusia menjadi lebih mudah, cepat dan efisien. Teknologi komputer ini berupa perangkat keras dan perangkat lunak. Perangkat lunak yang digunakan dapat berupa sistem dan aplikasi. Untuk menjalankan sistem dan aplikasi ini memerlukan perangkat keras berupa ruang-ruang sebagai tempat menyimpan yang disebut dengan memory. Memory memiliki
APA, Harvard, Vancouver, ISO, and other styles
11

Aqilah Mohd Nahar, Nur Farah, Nurul Hidayah Ab Rahman, and Kamarudin Malik Mohammad. "E-Raser: File Shredder Application With Content Replacement by Using Random Words Function." JOIV : International Journal on Informatics Visualization 2, no. 4-2 (2018): 313. http://dx.doi.org/10.30630/joiv.2.4-2.175.

Full text
Abstract:
Data shredding indicates a process of irreversible file destruction while file shredder is the program designed to render computer-based files unreadable by implementing overwriting method to destroy data in the content of a file. The addressable problem with existence of file recovery tools is it may lead to data leakage, exploitation or dissemination from an unauthorized person. Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. A file shredder application named E-Raser was developed to shred Mic
APA, Harvard, Vancouver, ISO, and other styles
12

Hopper, Douglas A., Troy T. Meinke, and Virginia S. Story. "DEVELOPING A SIMPLE GRAPHICAL USER INTERFACE FOR USE WITH THE ROSESIM COMPUTER GROWTH MODEL." HortScience 28, no. 5 (1993): 574a—574. http://dx.doi.org/10.21273/hortsci.28.5.574a.

Full text
Abstract:
ROSESIM is a computer simulation model based on `Royalty' rose (Rosa hybrida L.) growth response to 15 unique treatment combinations of photosynthetic photon flux (PPF), day temperature (DT), and night temperature (NT) under constant growth chamber conditions. ROSESIM may use average PPF and temperature values over the whole development time, or daily integrated values from actual greenhouse conditions may be read from a file in ASCII format. Using SAS, predictions from ROSESIM have been plotted with the actual recorded plant growth data to illustrate the accuracy of the model.ROSESIM reads da
APA, Harvard, Vancouver, ISO, and other styles
13

Adelina. "Rancang Bangun Aplikasi Duplicate Docx Scanner Menerapkan Metode SHA-256." Journal of Informatics Management and Information Technology 2, no. 2 (2022): 48–53. http://dx.doi.org/10.47065/jimat.v2i2.150.

Full text
Abstract:
Hard drives are one of the core components of a computer in various types and sizes. Large hard disks can become full, even though they don't feel like storing large files. The possibility of saving the same file in the directory is very difficult and will take a long time. The Duplicate Docx Scanner application is able to solve this problem. The Duplicate Docx Scanner application is able to find out the same file is located in a different directory by determining the directory on the hard disk and other storage media. This application can calculate the hash value so that it can find the same
APA, Harvard, Vancouver, ISO, and other styles
14

Nurjanah, Nisa. "Implementasi Algoritma Multi Group Huffman Untuk Kompresi File Video." Bulletin of Data Science 2, no. 3 (2023): 99–106. https://doi.org/10.47065/bulletinds.v2i3.4501.

Full text
Abstract:
Technology is developing very rapidly along with the needs of society in obtaining information quickly. Information and communication technology has become an important part in processing data. Activities that were once manual, can now be processed using a computer so that it can save time and the resulting level of accuracy is much higher. One example of using a computer is processing video file data, this video file has a size large enough to require large storage media, for that data compression is very important because it reduces data storage requirements, speeding up data transmission. S
APA, Harvard, Vancouver, ISO, and other styles
15

Ismuhadi, Liza Ulfa, and Khairun Septiyanda. "Pelatihan Komputer Untuk Meningkatkan Keterampilan Dalam Penggunaan Miscrosoft Word Bagi Pemuda Cot Muda Itam." PASAI : Jurnal Pengabdian kepada Masyarakat 1, no. 2 (2022): 86–91. http://dx.doi.org/10.58477/pasai.v1i2.57.

Full text
Abstract:
Abstract Computer Training to Improve Skills in Using Microsoft Word was held in Cot Muda Itam Village, Peureulak District, East Aceh District. Participants who took part were 15 people who were village youths. The method in writing this article uses a qualitative approach with a qualitative descriptive model in the form of descriptive or describing research phenomena or facts as they are related to Microsoft Word training work programs. The Microsoft Word training in this work program has the following stages: 1) the first step is to prepare a laptop and introduce the village of Cot Muda Itam
APA, Harvard, Vancouver, ISO, and other styles
16

Wójtowicz, Bartłomiej, and Norbert Wójcik. "The evolution of Microsoft Windows operating systems after 2001." Journal of Computer Sciences Institute 32 (September 30, 2024): 186–93. http://dx.doi.org/10.35784/jcsi.6244.

Full text
Abstract:
The purpose of this article is to present the most important changes that occurred with the release of successive versions of Windows after 2001 and to compare Windows XP, Windows 7, Windows 10, Windows 11 in terms of performance, resource consumption, speed of file operations and usability of the graphical user interface. For this purpose, research scenarios were prepared to enable for reliable testing, two computer workstations were prepared to install the operating systems under study, and research experiments were conducted. The results of the research were presented graphically and analyz
APA, Harvard, Vancouver, ISO, and other styles
17

Hanner, K., and R. Hörmanseder. "Managing Windows NT®file system permissions— A security tool to master the complexity of Microsoft Windows NT®file system permissions." Journal of Network and Computer Applications 22, no. 2 (1999): 119–31. http://dx.doi.org/10.1006/jnca.1999.0086.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Eladawi, A. E., E. S. Gadelmawla, I. M. Elewa, and A. A. Abdel-Shafy. "An application of computer vision for programming computer numerical control machines." Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture 217, no. 9 (2003): 1315–24. http://dx.doi.org/10.1243/095440503322420241.

Full text
Abstract:
Generation of the part programs, or tool paths, for products to be manufactured by computer numerical control (CNC) machines is very important. Many methods have been used to produce part programs, ranging from manual calculations to computer aided design/ manufacturing (CAD/CAM) systems. This work introduces a new technique for generating the part programs of existing products using the latest technology of computer vision. The proposed vision system is applicable for two-dimensional vertical milling CNC machines and is calibrated to produce both metric and imperial dimensions. Two steps are
APA, Harvard, Vancouver, ISO, and other styles
19

Oktaviani, Anisa, and Melwin Syafrizal. "GandCrab Ransomware Analysis on Windows Using Static Method." Buletin Ilmiah Sarjana Teknik Elektro 3, no. 2 (2021): 163–75. http://dx.doi.org/10.12928/biste.v3i2.4884.

Full text
Abstract:
Malware-infected operating systems may experience system damage, files or loss of important data. Ransomware is a type of malware that works by attacking the internet network and then encrypting the victim's computer. So that the victim can access his computer again, the victim is asked to redeem (ransom) with some money in the form of Bitcoin. One of them is GandCrab. Gandcrab is a very powerful ransomware and only the creators of Gandcrab know the description of the encrypted files.Static analysis is done by importing malware samples into Virustotal, Dependency walker, PEStudio, Exeinfo PE,
APA, Harvard, Vancouver, ISO, and other styles
20

Anwar, M. M., A. A. Khan, I. R. Chughtai, K. S. Chaudri, M. H. Inayat, and T. Hayat. "DEVELOPMENT AND VALIDATION OF GUI BASED INPUT FILE GENERATION CODE FOR RELAP." Nucleus 46, no. 3 (2020): 183–86. https://doi.org/10.71330/nucleus.46.03.944.

Full text
Abstract:
Reactor Excursion and Leak Analysis Program (RELAP) is a widely acceptable computer code for thermal hydraulics modeling of Nuclear Power Plants. It calculates thermal- hydraulic transients in water-cooled nuclear reactors by solving approximations to the one-dimensional, two-phase equations of hydraulics in an arbitrarily connected system of nodes. However, the preparation of input file and subsequent analysis of results in this code is a tedious task. The development of a Graphical User Interface (GUI) for preparation of the input file for RELAP-5 is done with the validation of GUI generated
APA, Harvard, Vancouver, ISO, and other styles
21

Adhima, Fauzan, and Fathiah Fathiah. "TRAFFIC COUNTING STUDI KASUS DI JALAN TEUKU NYAK ARIEF." JOURNAL OF INFORMATICS AND COMPUTER SCIENCE 4, no. 2 (2019): 75. http://dx.doi.org/10.33143/jics.vol5.iss1.510.

Full text
Abstract:
Banda Aceh merupakan salah satu kota wisata yang sebagian besar penduduknya bertumpu pada mode transportasi untuk keperluan sehari-hari dari mulai sepeda, sepeda motor, mobil dan angkutan umum. Pertumbuhan populasi penduduk kota Banda aceh meningkat dari tahun ke tahun menyebabkan ketidak seimbangan antara jumlah transportasi yang ada di jalan raya dengan kapasitas ruas jalan yang tersedia. Hal ini menyebabkan berbagai masalah lalu lintas Sehingga diperlukan kegiatan Monitoring arus lalu lintas pada jalan tertentu untuk mengetahui kelancaran arus lalu lintas. maka dari itu munculah ide untuk m
APA, Harvard, Vancouver, ISO, and other styles
22

Yuni Intan Hutagalung, Naomi. "Penerapan Algoritma Taboo Codes Pada Kompresi File Text." Journal of Computing and Informatics Research 1, no. 2 (2022): 43–49. http://dx.doi.org/10.47065/comforch.v1i2.234.

Full text
Abstract:
The needs of modern humans and the demands of technological developments today force every individual to work a lot on computers and use all digital data, requiring everyone to use a text file manager application such as Microsoft Office to process a conventional text into a digital text file. This is because files in digital electronic form are preferred over conventional forms, due to certain factors such as data security problems, ease of processing, distribution and modification of data. The tendency of humans at this time to collect data in the form of text files and documents on a comput
APA, Harvard, Vancouver, ISO, and other styles
23

Gailey, Glenn, and Joel G. Ortega-Ortiz. "A note on a computer-based system for theodolite tracking of cetaceans." J. Cetacean Res. Manage. 4, no. 2 (2023): 213–18. http://dx.doi.org/10.47536/jcrm.v4i2.858.

Full text
Abstract:
Theodolites represent a non-invasive shore-based tool for obtaining data on cetacean movement patterns, habitat use and behavioural disturbance. Despite the common use of theodolites as research tools, relatively few computer-based systems exist to assist researchers with collection of theodolite derived data and the analysis of such information. A recently developed computer program named ‘Pythagoras’, provides an efficient and user-friendly tool for collecting, managing and subsequent analysis of data obtained with theodolites. Pythagoras provides location of user-defined fix types (e.g. wha
APA, Harvard, Vancouver, ISO, and other styles
24

Yan, Jinpei, Yong Qi, and Qifan Rao. "Detecting Malware with an Ensemble Method Based on Deep Neural Network." Security and Communication Networks 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/7247095.

Full text
Abstract:
Malware detection plays a crucial role in computer security. Recent researches mainly use machine learning based methods heavily relying on domain knowledge for manually extracting malicious features. In this paper, we propose MalNet, a novel malware detection method that learns features automatically from the raw data. Concretely, we first generate a grayscale image from malware file, meanwhile extracting its opcode sequences with the decompilation tool IDA. Then MalNet uses CNN and LSTM networks to learn from grayscale image and opcode sequence, respectively, and takes a stacking ensemble fo
APA, Harvard, Vancouver, ISO, and other styles
25

Emilda, Emilda, Mariska Putri Pratiwi, Fernika Tiara Wulandari, and Rini Anjani. "PELATIHAN KOMPUTER DASAR DAN PEMANFAATAN INTERNET BAGI SISWA UNTUK MENDUKUNG PEMBELAJARAN DARING." SELAPARANG: Jurnal Pengabdian Masyarakat Berkemajuan 6, no. 2 (2022): 554. http://dx.doi.org/10.31764/jpmb.v6i2.7938.

Full text
Abstract:
ABSTRAKPandemi Covid – 19 berdampak pada berbagai aspek, salah satunya dunia pendidikan. Pemberlakuan kebijakan physical distancing menjadi dasar pelaksanaan belajar dari rumah yang sudah berjalan sejak bulan maret tahun 2020. Permasalahan yang dihadapi bagi siswa tingkat Sekolah Dasar dalam melakukan kegiatan pembelajaran secara daring adalah mengerjakan tugas menggunakan microsoft word. Mengingat kebanyakan siswa dan siswi tingkat Sekolah Dasar belum diperkenalkan mengenai keterampilan komputer dasar, hal ini menjadi kendala bagi siswa dalam metode pembelajaran daring. Peserta dalam pelatiha
APA, Harvard, Vancouver, ISO, and other styles
26

Melyanti*, Rika, and Muhammad Giatman. "Online Determination of Credit Score (PAK) Application Functional Teachers." International Journal of Management and Humanities 5, no. 7 (2021): 89–93. http://dx.doi.org/10.35940/ijmh.f1238.035721.

Full text
Abstract:
Determination of Teacher Credit Numbers (PAK) is proposed by the teacher, which are evaluated and evaluated by the Assessment Team. Calculation of credit numbers in PAK still uses manual methods using Microsoft Excel for inputting and Microsoft results as reports, errors in input such as typos and risk of accidental deletion of data still occur frequently. The DUPAK report that will be input into the PAK system is also still waiting for the Assessment Team to send the file to the Pelalawan Regency Education Office so that it takes more time to complete the functional teacher promotion report.
APA, Harvard, Vancouver, ISO, and other styles
27

Larbi, Peter Ako. "Advancing Microsoft Excel’s Potential for Teaching Digital Image Processing and Analysis." Applied Engineering in Agriculture 34, no. 2 (2018): 263–76. http://dx.doi.org/10.13031/aea.12221.

Full text
Abstract:
Abstract. Microsoft Excel is not considered a typical software for digital image processing and analysis. However, based on its large data handling and graphing capabilities, as well as its widespread usage, it presents a good opportunity for use as a tool for teaching image data processing or use in demonstrations requiring little training. It also lends itself well as a potentially useful research tool that can benefit a wide range of users including those with little or no computer programming knowledge. This article demonstrates a new method which can be adopted for teaching concepts of im
APA, Harvard, Vancouver, ISO, and other styles
28

Haghish, E. F. "Markdoc: Literate Programming in Stata." Stata Journal: Promoting communications on statistics and Stata 16, no. 4 (2016): 964–88. http://dx.doi.org/10.1177/1536867x1601600409.

Full text
Abstract:
Rigorous documentation of the analysis plan, procedure, and computer codes enhances the comprehensibility and transparency of data analysis. Documentation is particularly critical when the codes and data are meant to be publicly shared and examined by the scientific community to evaluate the analysis or adapt the results. The popular approach for documenting computer codes is known as literate programming, which requires preparing a trilingual script file that includes a programming language for running the data analysis, a human language for documentation, and a markup language for typesettin
APA, Harvard, Vancouver, ISO, and other styles
29

Ponomarev, I. V., and D. I. Strokin. "Steganographic Methods for Embedding and Detecting Hidden Messages Using GIF Images as Container Files." Izvestiya of Altai State University, no. 1(123) (March 18, 2022): 112–15. http://dx.doi.org/10.14258/izvasu(2022)1-18.

Full text
Abstract:
Over the past few decades, the development of new methods of storing, transferring, analyzing, and reproducing data has become increasingly important, considering the widespread development of information technologies and multimedia means. These methods also include means of ensuring the reliability, security, safety, and confidentiality of information when it is transmitted through various communication channels. Today, the fulfillment of the necessary data confidentiality requirements is developing in the direction of cryptography and steganography.
 The article discusses a method of en
APA, Harvard, Vancouver, ISO, and other styles
30

Riana, Riana, Andi Cristian, and Yuntari Purbasari. "Rancang Bangun Aplikasi Inventaris Barang Berbasis Android Pada PT. Nuansa Indah Mane." Jurnal Pengembangan Sistem Informasi dan Informatika 4, no. 4 (2023): 37–45. http://dx.doi.org/10.47747/jpsii.v4i4.1401.

Full text
Abstract:
Almost all large companies have switched from manual systems to computer-based systems; computer-based systems are beneficial and facilitate company performance using application assistance. This application will be used to reduce the user number of users. Among them are recording incoming, returning, and outgoing goods. Therefore, the application for a company is beneficial and can improve agency performance. The Inventory Information System used by Nuansa Indah Mane Limited Liability Company still uses a manual system, namely Microsoft Excel, so searching for inventory data is slow. Therefor
APA, Harvard, Vancouver, ISO, and other styles
31

Penelly, Ridho, Sayati Mandia, and Yastori Yastori. "Pengolahan Data Statistik Rumah Sakit Bhayangkara Padang Menggunakan Microsoft Excel Periode 1 Januari – 31 Maret." Iris Journal of Health Information Management 2, no. 2 (2022): 56. http://dx.doi.org/10.61723/ijhima.v2i2.99.

Full text
Abstract:
Medical record is a file that contains notes and documents about the patient's identity, examination, actions, and other services that have been provided to patients. The purpose of this paper is to determine the processing of statistical data at Bhayangkara Padang Hospital using Microsoft Excel for the period January 1 – March 31, 2015 with 385 inpatients and 62 beds. Then, the data was processed using a computer using the Microsoft Excel application program. Statistical processing was analyzed and presented in the form of tables and graphs by Barber Johnson. Based on the RL4a report, the mos
APA, Harvard, Vancouver, ISO, and other styles
32

Xiong, Qi, Xinman Zhang, Wen-Feng Wang, and Yuhong Gu. "A Parallel Algorithm Framework for Feature Extraction of EEG Signals on MPI." Computational and Mathematical Methods in Medicine 2020 (May 27, 2020): 1–10. http://dx.doi.org/10.1155/2020/9812019.

Full text
Abstract:
In this paper, we present a parallel framework based on MPI for a large dataset to extract power spectrum features of EEG signals so as to improve the speed of brain signal processing. At present, the Welch method has been wildly used to estimate the power spectrum. However, the traditional Welch method takes a lot of time especially for the large dataset. In view of this, we added the MPI into the traditional Welch method and developed it into a reusable master-slave parallel framework. As long as the EEG data of any format are converted into the text file of a specified format, the power spe
APA, Harvard, Vancouver, ISO, and other styles
33

Yan, Hai Zhong. "Development Technology of Excel Data Server Application with DELPHI ADO + RemObjectcs Combined (Part 1: The Server Side)." Applied Mechanics and Materials 727-728 (January 2015): 959–64. http://dx.doi.org/10.4028/www.scientific.net/amm.727-728.959.

Full text
Abstract:
Microsoft office Excel is an important part of the Microsoft Office suite of software that can be processed, statistical analysis of various data, with its quick style and rich functionality has been generally welcomed, but with the database networking and sharing trends deepening, Excel application bottlenecks in stand-alone mode began to appear, and the network is the computer information technology in today's inevitable end, I imagine combining ADO technology developed by Delphi Excel data server in order to break this limitation, changes in non-network applications Excel mode.Excel Data Se
APA, Harvard, Vancouver, ISO, and other styles
34

Han, Yongman, Jongcheon Choi, Seong-Je Cho, et al. "A new detection scheme of software copyright infringement using software birthmark on windows systems." Computer Science and Information Systems 11, no. 3 (2014): 1055–69. http://dx.doi.org/10.2298/csis130918064h.

Full text
Abstract:
As software is getting more valuable, unauthorized users or malicious programmers illegally copies and distributes copyrighted software over online service provider (OSP) and P2P networks. To detect, block, and remove pirated software (illegal programs) on OSP and P2P networks, this paper proposes a new filtering approach using software birthmark, which is unique characteristics of program and can be used to identify each program. Software birthmark typically includes constant values, library information, sequence of function calls, and call graphs, etc. We target Microsoft Windows application
APA, Harvard, Vancouver, ISO, and other styles
35

Wahyutama, Aria Bisma, and Mintae Hwang. "Auto-Scoring Feature Based on Sentence Transformer Similarity Check with Korean Sentences Spoken by Foreigners." Applied Sciences 13, no. 1 (2022): 373. http://dx.doi.org/10.3390/app13010373.

Full text
Abstract:
This paper contains the development of a training service for foreigners to help them increase their ability to speak Korean. The service developed in this paper is implemented in the form of a mobile application that shows specific Korean sentences to the user for them to record themselves speaking the sentence. The objective is to generate the score automatically based on how similar the recorded voice with the actual sentence using Speech-To-Text (STT) engines and Sentence Transformers. The application is developed by selecting the four most commonly known STT engines with similar features,
APA, Harvard, Vancouver, ISO, and other styles
36

Rana, Humza. "Classification of Malicious Intrusion through ANN-CNN Sequential Classifier." International Journal of Information Systems and Computer Technologies 3, no. 2 (2024): 27–35. http://dx.doi.org/10.58325/ijisct.003.02.0088.

Full text
Abstract:
Malicious intrusion is an activity that disturbs the normal working of computer systems like stealing the important data, destroy the data, slow functioning in file system. In recent years the malicious intrusion becomes worst because it get more advance day by day and difficult to classify the intrusion. It is now important to prevent the future threats from the malicious intrusion. This paper aims to propose an neural network model named as ANN-CNN sequential classifier for classify the malicious intrusion. The proposed model is highly tuned by its parameter to take best performance from com
APA, Harvard, Vancouver, ISO, and other styles
37

Jeni Afrillah, Yuntari Purbasari, and Khana Wijaya. "Aplikasi Administrasi Pembangunan Infrastruktur Desa Berbasis Web Pada Desa Tanjung Dalam." JURNAL PENELITIAN SISTEM INFORMASI (JPSI) 1, no. 4 (2023): 70–80. http://dx.doi.org/10.54066/jpsi.v1i4.917.

Full text
Abstract:
Tanjung Dalam Village is one of the villages under the auspices of the Rambang sub-district, Muara Enim district. In this agency, the activities carried out include recording village infrastructure development activities using computerized recording using computer programs, namely in file data collection carried out using Microsoft Excel as a form of village head archive reports. However, sometimes data collection is only done using books as material for recording data so that data collection is inefficient and can cause errors in recording. The research method uses a qualitative descriptive m
APA, Harvard, Vancouver, ISO, and other styles
38

Lambert, Sherwood Lane. "Auto Accessories, Inc.: An Educational Case on Online Transaction Processing (OLTP) and Controls as Compared to Batch Processing and Controls." Journal of Emerging Technologies in Accounting 14, no. 2 (2017): 59–81. http://dx.doi.org/10.2308/jeta-51844.

Full text
Abstract:
ABSTRACT The intent of this educational case is to increase students' understanding of online transaction processing (OLTP) and controls as compared to batch processing and controls. Learning concepts about batch processing is important because many entities continue to use batch processing for critical applications such as payroll, credit card processing, and Big Data. Students learn the advantages and disadvantages of batch processing and OLTP. The case provides a Microsoft Access database that includes a working batch program (module) and an online screen (form). Students use the form to up
APA, Harvard, Vancouver, ISO, and other styles
39

Masni, Harbeng, and Zuhri Saputra Hutabarat. "Pengembangan Multimedia Pembelajaran Berbasis Lash Animation With Swish Max Siswa Kelas XI SMA Negeri 8 Kota Jambi." Jurnal Ilmiah Dikdaya 9, no. 2 (2019): 257. http://dx.doi.org/10.33087/dikdaya.v9i2.147.

Full text
Abstract:
There are several factors that influence learning, including teacher factors, student factors, facilities, tools and media, and the environment. Educators should pay attention to factors that influence learning. The task of the teacher in the learning process, in addition to conveying information, also diagnoses learning difficulties students select teaching materials, supervise learning activities, stimulate student learning activities, provide learning guidance using media, strategies, and methods. Teachers and students are required to master the science and information technology of communi
APA, Harvard, Vancouver, ISO, and other styles
40

Muadzani, Alim, Oky Dwi Nurhayati, and Ike Pertiwi Windasari. "Penyisipan Media Teks dan Citra Menggunakan Teknik Steganografi pada Media Pembawa Citra Digital." Jurnal Teknologi dan Sistem Komputer 4, no. 3 (2016): 470. http://dx.doi.org/10.14710/jtsiskom.4.3.2016.470-478.

Full text
Abstract:
Information has now become an important comodity in human life, with the rapid development of communications technology has enable people to communicate and exchange information more easily. Internet is very popular and used by billions users worldwide, the information passing through the internet is very large, and some certain people trying to get this information for profit. The information need to be secured to prevent the others to get the information that send through the internet, steganography can be used to hide the information before sending it and the receiver can recover the hidden
APA, Harvard, Vancouver, ISO, and other styles
41

Sedgewick, J. "From Digital Imaging to the Publisher: Navigating the Digital Journey." Microscopy and Microanalysis 7, S2 (2001): 844–45. http://dx.doi.org/10.1017/s1431927600030294.

Full text
Abstract:
With the increased frequency of digital presentation of research on laptops at meetings, on the web and to journals, the need arises for a unified set of computer programs. The best of all worlds would be to create text, graphs, images and HTML in one program only, but the reality is that several need to be used without much duplication of effort. The ideal situation is one in which the computer applications are open-ended, so that one application saves in a format that is readable by another application across Macintosh® and PC platforms. At the same time, the applications should be straightf
APA, Harvard, Vancouver, ISO, and other styles
42

Nakada, Takahiro, Masahide Koyachi, Keisuke Sugahara, et al. "A Case of Application of Computer-Aided Design and Manufacturing Technology and Extended Reality Surgical Assistance to Marginal Mandibulectomy." Journal of Clinical Medicine 14, no. 1 (2024): 8. https://doi.org/10.3390/jcm14010008.

Full text
Abstract:
Background/Objectives: Mandibular gingival squamous cell carcinoma (SCC) is the second most common oral cancer after tongue cancer. As these carcinomas often invade the mandible early, accurately defining the resection extent is important. This report highlights the use of preoperative virtual surgery data, computer-aided design and manufacturing (CAD/CAM) technology, surgical guidance, and extended reality (XR) support in achieving highly accurate marginal mandibulectomy without recurrence or metastasis. Methods: CT imaging data obtained a month before surgery were imported into Materialize M
APA, Harvard, Vancouver, ISO, and other styles
43

Kamdar, Biren B., Pooja A. Shah, Sruthi Sakamuri, Bharat S. Kamdar, and Jiwon Oh. "A NOVEL SEARCH BUILDER TO EXPEDITE SEARCH STRATEGIES FOR SYSTEMATIC REVIEWS." International Journal of Technology Assessment in Health Care 31, no. 1-2 (2015): 51–53. http://dx.doi.org/10.1017/s0266462315000136.

Full text
Abstract:
Objectives: Developing a search strategy for use in a systematic review is a time-consuming process requiring construction of detailed search strings using complicated syntax, followed by iterative fine-tuning and trial-and-error testing of these strings in online biomedical search engines.Methods: Building upon limitations of existing online-only search builders, a user-friendly computer-based tool was created to expedite search strategy development as part of production of a systematic review.Results: Search Builder 1.0 is a Microsoft Excel®-based tool that automatically assembles search str
APA, Harvard, Vancouver, ISO, and other styles
44

Naeem, Muhammad Rehan, Rashid Amin, Sultan S. Alshamrani, and Abdullah Alshehri. "Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition." Computational Intelligence and Neuroscience 2022 (April 21, 2022): 1–12. http://dx.doi.org/10.1155/2022/6294058.

Full text
Abstract:
The most often reported danger to computer security is malware. Antivirus company AV-Test Institute reports that more than 5 million malware samples are created each day. A malware classification method is frequently required to prioritize these occurrences because security teams cannot address all of that malware at once. Malware’s variety, volume, and sophistication are all growing at an alarming rate. Hackers and attackers routinely design systems that can automatically rearrange and encrypt their code to escape discovery. Traditional machine learning approaches, in which classifiers learn
APA, Harvard, Vancouver, ISO, and other styles
45

Barbour, Leonard J. "EwaldSphere: an interactive approach to teaching the Ewald sphere construction." Journal of Applied Crystallography 51, no. 6 (2018): 1734–38. http://dx.doi.org/10.1107/s1600576718012876.

Full text
Abstract:
EwaldSphere is a Microsoft Windows computer program that superimposes the Ewald sphere construction onto a small-molecule single-crystal X-ray diffractometer. The main objective of the software is to facilitate teaching of the Ewald sphere construction by depicting our classical description of the X-ray diffraction process as a three-dimensional model that can be explored interactively. Several features of the program are also useful for introducing students to the operation of a diffractometer. EwaldSphere creates a virtual reciprocal lattice based on user-defined unit-cell parameters. The Ew
APA, Harvard, Vancouver, ISO, and other styles
46

Halim, Abdul, and Hadi Kurniawanto. "IMPLEMENTASI SAMBA PADA LOCAL AREA NETWORK MENGGUNAKAN LINUX MANDRAKE 9.1." Jurnal Ilmiah Sistem Informasi 3, no. 1 (2023): 21–39. http://dx.doi.org/10.46306/sm.v3i1.34.

Full text
Abstract:
Linux as a free, open (Open Source), and stable Operating System, has very high Internet and networking capabilities. This can be proven by the number of companies engaged in Internet services and e-commerce using Linux as the main Operating System on its Server, such as eToys.com, freshmeat.net, Mweb.co.id, Satunet Group, and others. All Linux software can be freely owned under the GNU General Public License. Based on the license, anyone can have a program in both source code (readable by humans) and binary (machine language), so that the program can be learned, changed, distributed, or furth
APA, Harvard, Vancouver, ISO, and other styles
47

Abdul, Haliq, Hamsa Akmal, and Sakaria. "ANALISIS PEMANFAATAN, FAKTOR PENDUKUNG DAN PENGHAMBAT, SERTA UPAYA OPTIMALISASI APLIKASI ZOTERO DALAM PENULISAN KARYA ILMIAH." Edukasi: Jurnal Pendidikan 19, no. 1 (2021): 16–30. https://doi.org/10.31571/edukasi.v19i1.2325.

Full text
Abstract:
<strong>Abstrak</strong> Penelitian bertujuan untuk menganalisis pemanfaatan, faktor penghambat dan pendukung, serta upaya optimalisasi aplikasi Zotero dalam mengelola referensi karya tulis ilmiah. Penelitian menggunakan pendekatan kualitatif dan dilakukan pada mahasiswa Program Studi Pendidikan Bahasa dan Sastra, Universitas Negeri Makassar dengan jumlah 40 orang. Pengumpulan data menggunakan teknik observasi, angket, dan wawancara. Analisis data mengadopsi model analisis interaktif yang terdiri atas empat alur kegiatan, yaitu pengumpulan, reduksi, penyajian data, dan penarikan kesimpulan. Ha
APA, Harvard, Vancouver, ISO, and other styles
48

Zhang, Xiaoliang, Kehe Wu, Zuge Chen, and Chenyi Zhang. "MalCaps: A Capsule Network Based Model for the Malware Classification." Processes 9, no. 6 (2021): 929. http://dx.doi.org/10.3390/pr9060929.

Full text
Abstract:
The research on malware detection enabled by deep learning has become a hot issue in the field of network security. The existing malware detection methods based on deep learning suffer from some issues, such as weak ability of deep feature extraction, relatively complex model, and insufficient ability of model generalization. Traditional deep learning architectures, such as convolutional neural networks (CNNs) variants, do not consider the spatial hierarchies between features, and lose some information on the precise position of a feature within the feature region, which is crucial for a malwa
APA, Harvard, Vancouver, ISO, and other styles
49

Lisetskaya, I. S., and A. Yu Kovalishin. "IMPLEMENTATION OF DISTANCE TRAINING IN QUARANTINE AT THE DEPARTMENT OF PAEDIATRIC DENTISTRY OF IVANO FRANKIVSK NATIONAL MEDICAL UNIVERSITY." Актуальні проблеми сучасної медицини: Вісник Української медичної стоматологічної академії 20, no. 3 (2020): 241–44. http://dx.doi.org/10.31718/2077-1096.20.3.241.

Full text
Abstract:
Mankind has encountered a previously unknown disease, COVID-19, which has changed and caused a major disruption in nearly all spheres of human life. The COVID pandemic has had a tremendous impact on education, and medical education in particular. In quarantine conditions, distance learning was the only possible option to continue the professional medical training. The educators and education authorities faced a number of issues to be solved immediately including the organization of the course content and delivery for online synchronous and asynchronous format, the improvement of computer opera
APA, Harvard, Vancouver, ISO, and other styles
50

Al-Masadeh, Mohammad Bahjat, Mohad Sanusi Azmi, and Sharifah Sakinah Syed Ahmad. "Tiny datablock in saving Hadoop distributed file system wasted memory." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1757. http://dx.doi.org/10.11591/ijece.v13i2.pp1757-1772.

Full text
Abstract:
&lt;p&gt;Hadoop distributed file system (HDFS) is the file system whereby Hadoop is use it to store all the upcoming data inside it. Since it been declared, HDFS is consuming a huge memory amount in order to serve a normal dataset. Nonetheless, the current file saving mechanism in HDFS save only one file in one datablock. Thus, a file with just 5 Mb in size will take up the whole datablock capacity causing the rest of the memory unavailable for other upcoming files, and this is considered a huge waste of memory in serving a normal size dataset. This paper proposed a method called tiny databloc
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!