Academic literature on the topic 'NotePad (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'NotePad (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "NotePad (Computer file)"

1

Liu, Hui, Hanxing Xue, and Hui Lu. "A Sensitive File Abnormal Access Detection Method Based on Application Classification." Security and Communication Networks 2021 (March 13, 2021): 1–7. http://dx.doi.org/10.1155/2021/6684456.

Full text
Abstract:
As the access control mode of notepad files cannot meet the requirements of risk control for sensitive file hierarchical access, this paper proposes an application classification-based detection method for abnormal access to sensitive files. The application classification and file classification, access control policy mapping, and basic and preset policy detection are designed. Combining the operating system’s identification control of different applications at runtime, we monitor the abnormal access of sensitive files by hierarchical applications. The cross-access experiment of different levels of application to different sensitive files verified the effectiveness and security of hierarchical access control strategy and sensitive file abnormal access detection and reduced the risk of disclosure of sensitive files.
APA, Harvard, Vancouver, ISO, and other styles
2

Chapman, Stephen K. "The Development of Remote Teaching Aids." Microscopy and Microanalysis 7, S2 (2001): 802–3. http://dx.doi.org/10.1017/s1431927600030087.

Full text
Abstract:
For many years the means of communicating electron microscopy techniques had been through either the spoken or the written word. with the advent of the computer and in particular the notebook computer more exotic methods of information presentation were made available. Now with the compact disk or the DVD, with their ability to store very large quantities of data, even more new avenues have been opened up for trainers.There are a number of programs by small organisations, like QM Slide Show and EZ Slide, that enable the trainer to take the simple approach to presentation preparation. Using a Windows Notepad interface or similar the trainer gathers bitmap files in a simple sequence, referencing the file source to activate each part of the presentation. This type of presentation is extremely flexible, so much so that the trainer, with a large selection of bitmap files and a good filing system, may develop a completely new or modified presentation in just a few minutes.
APA, Harvard, Vancouver, ISO, and other styles
3

Polotai, O., O. Belej, and N. Maltseva. "PHYSICAL CONTENT OF COMPUTER STEGANOGRAPHY." Bulletin of Lviv State University of Life Safety 23 (June 30, 2021): 27–32. http://dx.doi.org/10.32447/20784643.23.2021.04.

Full text
Abstract:
Introduction. The development of computer technology has given a new impetus to the use of computer steganography. However, it is important to understand the physical content of this type of steganography.Purpose. The work aims to describe the practical use and physical content of the phenomenon of computer steganography, the results of the study on the hiding of files in the stegocontainer.Results. Describes the main ns currently computer steganography methods are actively used to solve the following tasks: Protection of confidential information from unauthorized access, overcoming monitoring and management of net-work resources, software camouflage, copyright protection, which is manifested in the use of digital watermarks, is one of the most promising areas of computer steganography. Among the methods of hiding information in images, the most common is the category of algorithms using the lower bits of the image data. They are considered in this paper. These algorithms are based on the fact that in some file formats, the lower bits of the values, although present in the file, but do not affect a person's perception of sound or image. The steganographic software S-Tools was chosen for the study. We created two test monotonous images with the size of 50 × 50 pixels in 24-bit bmp format to analyze the peculiarities of the placement of stego-data in container files. We chose black and white images for the study. A text file was hidden in each of the images, after which the reverse action was performed - extracting the file. As a result of hiding, two stego files were obtained. The paper compared the binary content of the original images and files containing private data. For comparison, the binary content of the black square image and the contents of the stegocontainer with a latent text file are given. Note that the contents of the container and the stego file are only partially listed, but the addresses of the memory cells have selected accordingly. The right column shows the contents of the memory cells in hexadecimal format. The bytes that display the colour of the square are set to "00" because the original image contains only black. We noted that the contents of the cells responsible for the image changed after hiding additional data (this reflected by cells with values of "01"). The paper also describes the procedure for hiding a group of different types of files. During the study, we found that the image file (1920 × 1080 pixels) with a volume of 6,220,854 bytes can hide 777,584 bytes of information.Conclusion. When using steganography, the program uses some algorithms that hide confidential data among the contents of the container: bits of the hidden file replace the bits of the original file at random positions. Thus, the size of the source file and the container file (containing the attached information) is the same, even if you hide a different number of files or different amounts of data.
APA, Harvard, Vancouver, ISO, and other styles
4

Purnamasari, Intan, and Oman Komarudin. "Optimalisasi Manajemen Penerimaan & Penyimpanan Dokumen Fax Menggunakan Algoritma Greedy." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 6 (2019): 625. http://dx.doi.org/10.25126/jtiik.201966976.

Full text
Abstract:
<p class="SUBAB1">Mesin <em>fax</em> pada dasarnya mutlak diperlukan bagi sebuah instansi maupun organisasi tertentu. Namun kesulitan yang dihadapi oleh beberapa perusahaan kecil maupun menengah adalah tidak dapat mengalokasikan dana bagi pembelian mesin <em>fax</em>, perawatan, dan perlengkapan komputer sebagai media penunjang. Bagi perusahaan yang telah memiliki mesin <em>fax</em> pun, manajemen dokumen yang diterima melalui<em> fax</em> menjadi kesulitan tersendiri, dari mulai perawatan mesin <em>fax</em>, pemeriksaan ketersediaan kertas dan <em>cartridge</em> tinta, pemeriksaan dokumen yang diterima, serta penyimpanan arsip <em>fax</em> yang diterima. Metodologi penelitian yang akan digunakan pada penelitian ini adalah metode rakayasa perangkat lunak atau <em>Software Development Life Cyle</em> (SDLC) dengan model pemrograman cepat atau <em>Extreme Programming</em>. Desain pemodelan aplikasi menggunakan UML (<em>Unified Modelling Language</em>) yang diimplementasikan menggunakan bahasa pemrograman PHP sebagai algoritma program dan bahasa pemrograman HTML untuk desain tampilan aplikasi dengan <em>tools</em> aplikasi Notepad++. Hasil implementasi dari aplikasi ini adalah yang semula awalnya penerimaan dokumen <em>fax</em> dengan menggunakan mesin <em>fax</em> harus tercetak dan membutuhkan media kertas sebanyak 100% mengingat mesin <em>fax</em> hanya dapat menampilkan pesan dan dapat dibaca setelah tercetak namun setelah menggunakan apliksi <em>digifax</em> ternyata dapat menghemat penggunaan kertas sebanyak 24,6% sehingga penggunaan kertas menurun menjadi 78,6%. Hal ini karena dengan aplikasi <em>digifax</em> dokumen atau <em>file fax</em> yang diterima dapat disimpan dan dapat dicetak (<em>print</em>) maupun diatur sesuai kebutuhan pengguna.</p><p class="SUBAB1"> </p><p class="SUBAB1"><em><strong>Abstract</strong></em></p><p class="Normal7"><em>Fax machine basically is absolutely necessary for a particular institution or organization. However, the difficulties faced by some small and medium enterprises are not able to allocate funds for the purchase of a fax machine, maintenance, and computer equipment as supporting media. For companies that already have a fax machine too, management documents received via fax into its own difficulties, ranging from fax machine maintenance, checking the availability of paper and ink cartridges, examination of documents received, and the received fax archival storage. The research methodology that will be used in research is a method of software engineering or Software Development Life Cyle (SDLC) with fast programming model or Extreme Programming. Design application modeling using UML (Unified Modeling Language) which is implemented using the PHP programming language as the program algorithm and HTML programming language for interface design tool applications with Notepad + + applications.</em><em> </em><em>The results of</em><em> the implementation of this application is that the original fax document acceptance initially using fax machines need to be printed and paper media as much as 100% given the fax machine can only display a message and can be read as printed digifax but after using the same practice was able to save the use of paper as much as 24, 6%, so the use of paper decreased to 78.6%. This is because the application digifax documents or files received faxes can be stored and can be printed (print) and arranged according to user needs.</em><em></em></p><p class="SUBAB1"><em><strong><br /></strong></em></p><p class="SUBAB1"><strong><br /></strong></p>
APA, Harvard, Vancouver, ISO, and other styles
5

Saberi, Eshagh Ali, Narges Farhad Mollashahi, and Forugh Farahi. "Canal transportation caused by one single-file and two multiple-file rotary systems: A comparative study using cone-beam computed tomography." Giornale Italiano di Endodonzia 32, no. 2 (2019): 57–62. http://dx.doi.org/10.4081/j.gien.2018.3.

Full text
Abstract:
Aim: This ex-vivo study aimed to compare canal transportation in mesio-buccal canal of mandibular first molars prepared with Mtwo and Revo-S multi-file and Neoniti single-file nickel[18TD$DIF]—titanium (Ni—Ti) rotary systems using cone-beam computed tomography (CBCT). Methodology: CBCTscans were obtained from 60 extracted mandibular first molars and the teeth were randomly divided into three groups. Mesio-buccal canal of mesial root was prepared with Revo-S, Neoniti or Mtwo rotary systems according to the instructions of the manufacturers. Postoperative CBCT scans were also obtained. A single operator performed canal preparations while another operator blinded to the group allocation of teeth did the measurements. Data were analyzed using SPSS 20. The mean and standard deviation (SD) of the amount of canal transportation were calculated and compared between the groups using the Friedman test ([19TD$DIF]P 0.05). Results: No significant difference was noted in canal transportation among the groups in the middle and apical third ([20TD$DIF]P > 0.05). The rotary single-file instrument caused significantly greater canal transportation in the coronal third. Conclusion: No significant difference exists among different rotary systems in the amount of canal transportation caused in the middle and apical third of the mesio-buccal canal in mandibular first molars. Although all rotary files caused some degrees of canal transportation, the rotary single-file instrument caused significantly greater canal transportation than the multiple-file sequences in the coronal third.
APA, Harvard, Vancouver, ISO, and other styles
6

Deckers, Hellen Pinto Ferreira, Francisco Carlos Gomes, Larissa Pereira Barbosa Siva, Marília Gabriela Brandão Gonçalves, and Marcelo Bastos Cordeiro. "DEVELOPMENT OF SOFTWARE TO DETERMINE PRESSURES IN MULTICELULARSILOS WITH CONCENTRIC AND ECCENTRIC DISCHARGE." Theoretical and Applied Engineering 4, no. 2 (2020): 19–31. http://dx.doi.org/10.31422/taae.v4i2.24.

Full text
Abstract:
A computer program for determining the pressures, horizontal and friction, in prismatic slender silos, with square section, eccentric hopper and mass flow, international codes taken as basis were: AS 3774 (1996), DIN 1055-6 (2005) and BS EN 1991-4 (2006) and the theories proposed by Safarian (1969) and Walker (1966). The development application was made possible by the development of a computational algorithm in programming “Borland Delphi”. The program was carried out for five silos projects with truncated pyramid form hopper considering the following eccentricities: 25%, 30%, 35% and 43%, as well as a concentric model for comparison. The computer program allowed SILOEXCENTRIC easily and quickly be applied to slender prismatic geometry of silos with concentric and eccentric hoppers. The results demonstrated the efficiency of the computer program for the proposed objectives So SILOEXCENTRIC results in pressures that are stored in files in “Notepad” format that may be accessed are generated. Besides files, various data are presented in graphical form, facilitating the assessment of horizontal pressures and friction, which proved adequate to international standards, considering the limit states.
APA, Harvard, Vancouver, ISO, and other styles
7

Mohamed, Mohamed, and James C. L. Chow. "Acomprehensive computer database for medical physics on-call program." Journal of Radiotherapy in Practice 19, no. 1 (2019): 10–14. http://dx.doi.org/10.1017/s1460396919000244.

Full text
Abstract:
AbstractPurpose: A comprehensive and robust computer database was built to record and analyse the medical physics on-call data in emergency radiotherapy. The probability distributions of the on-call events varying with day and week were studied.Materials and methods: Variables of medical physics on-call events such as date and time of the event, number of event per day/week/month, treatment site of the event and identity of the on-call physicist were input to a programmed Excel file. The Excel file was linked to the MATLAB platform for data transfer and analysis. The total number of on-call events per day in a week and per month in a year were calculated based on the physics on-call data in 2010–18. In addition, probability distributions of on-call events varying with days in a week (Monday–Sunday) and months (January–December) in a year were determined.Results: For the total number of medical physics on-call events per week in 2010–18, it was found that the number was similar from Sundays to Thursdays but increased significantly on Fridays before the weekend. The total number of events in a year showed that the physics on-call events increased gradually from January up to March, then decreased in April and slowly increased until another peak in September. The number of events decreased in October from September, and increased again to reach another peak in December. It should be noted that March, September and December are months close to Easter, Labour Day and Christmas, when radiation staff usually take long holidays.Conclusions: A database to record and analyse the medical physics on-call data was created. Different variables such as the number of events per week and per year could be plotted. This roster could consider the statistical results to prepare a schedule with better balance of workload compared with scheduling it randomly. Moreover, the emergency radiotherapy team could use the analysed results to enhance their budget/resource allocation and strategic planning.
APA, Harvard, Vancouver, ISO, and other styles
8

Yezhova, Olga V., Kalina L. Pashkevich, and Denys V. Gryn. "DEVELOPMENT OF TECHNOLOGY EDUCATION STUDENTS’ ICT COMPETENCE WHILE TEACHING COMPUTER-AIDED FASHION DESIGN." Information Technologies and Learning Tools 73, no. 5 (2019): 15–27. http://dx.doi.org/10.33407/itlt.v73i5.2547.

Full text
Abstract:
The present paper deals with the problem of CAD (computer-aided design) competence formation of would-be teachers of technology and vocational school teachers. It is noted that for fashion industry to develop, it is necessary that its professionals should have both the knowledge of basic communication technologies and foundations of using CAD. ICT competence is necessary for trainee teachers of technology and vocational education specialists both for their educational activity and for successful creation of outfit models using computer techniques. The aim of the research lies in grounding the list of software equipment to be used by trainee teachers of technology and vocational school teachers to provide effective learning of CAD in professional sphere. The introduction to professional-oriented software is realized in higher education institutions of Ukraine during the course of “Basics of computer aided design”, after a preparatory course “Information Technologies” Information technologies are used in fashion industry for creating new models, equipment management, and for maintaining the life cycle of outfits. Hereby presented is a systemized list of computer software tools for professional purposes to be used in automated workstation of the designer: software tools for correct and safe system component management; software for file creation and information sharing; CAD-subsystems. The content of the course “Basics of computer aided design” have been described. Practical approbation has proved effectiveness of the developed syllabus along with the methodological support of the course “Basics of computer-aided design”. The results of the investigation are important for grounding the content of study for trainee teachers of technology and specialists of vocational education, as well as for professionals in fashion industry.
APA, Harvard, Vancouver, ISO, and other styles
9

Borysova, L., P. Bilenchuk, M. Malii, and V. Vynohradova. "EXAMINATION AS A MEANS OF ESTABLISHING THE FACTS AND CIRCUMSTANCES OF COMMISSION OF TRANSNATIONAL COMPUTER CRIMES." Criminalistics and Forensics, no. 65 (May 18, 2020): 230–39. http://dx.doi.org/10.33994/kndise.2020.65.22.

Full text
Abstract:
The article is noted that investigators are not able to track all technological changes in the field of information technology and to study the traces of this type of crime, special attention is paid to the use of examination of computer systems and computer media (order of the Ministry of Justice of Ukraine dated 08.10.98, No. 53/5). During the examination, it is advisable to solve the following problems: – identification, that is the diagnosis of system processes and system behavior; system identification; multivariate analysis and reconstruction of the circumstances of the event place (by methods of mathematical analysis and computer simulation); diagnostics of the functional purpose of individual elements of a computer system, an intelligent hacking system; identification of the author of the computer text (they seem more important for the investigation and the court); – non-identification, that is determination of the structure and functions of telecommunication networks and e-mail facilities; reconstruction and prediction of system behavior; determination of the reliability and resilience of computer systems; classifying information as software; classifying specific programs as harmful; definition of semantics and grammar of controversial texts; diagnostics and classification of printers, faxes, copy machines according to the text that was made from them. It is advisable in the expert’s conclusion to display the facts of fixing information traces about the actions of malicious programs and search for seized files, parts of files that were specially removed at the beginning of the review or accidentally during the review; results of verification of system, protection, and application logs using documents that govern the rules for archiving logs; audit results (operators, privileges, objects). To the conclusion, it is necessary to attach reports that were generated by the corresponding software, copies on machine media that were obtained during physical fixation. In the case of using a computer document as evidence, there is a need to specify: the means of collecting and processing information; type of system used; control tools that are built into the system for guaranteed detection and correction of errors, determining the level of professional training of individuals in the field of programming and working with computer equipment.
APA, Harvard, Vancouver, ISO, and other styles
10

Anitha, G., V. Vijayakumari, and S. Thangavelu. "A Comprehensive Study and Analysis of LEACH and HEED Routing Protocols for Wireless Sensor Networks – With Suggestion for Improvements." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 3 (2018): 778. http://dx.doi.org/10.11591/ijeecs.v9.i3.pp778-783.

Full text
Abstract:
<p>The main interesting aspect of the digital era is the widely spread ease of communication from one end of the world to the other end of the world. There is a revolution in communication, digitalization, globalization, video calling, wireless data transfer and this is possible due to networking. Initially computer networks is the data sharing where data such as documents, file, reports, presentation files, videos, images etc can be shared within a local network or remotely connected networks. Traditional data networking is to empower end-to-end information transfer. The data in such networks are carried across point-to-point links and the intermediate nodes just forward the packets, where the payload of the packets is not modified. Traditional LANs need wires, which may be difficult to set up in some situations.</p><p>It is very much understandable and clearly visible that wired communication is being completely overtaken by wireless technologies in the recent past. Wireless LANs, by its very nature, empowers with increased mobility and flexibility. Wi-Fi devices get connected to the internet through WLAN and access points. 2.4 GHz and 5 GHz ISM bands are used by Wi-Fi. Also, it is to be understood that, a wireless adhoc network is distributed in its nature. It is also to be noted that, the adhoc nature makes these network to rely on any of the pre-existing infrastructure. The data forwarding shall happen from the nodes very much dynamically based on the connectivity and the routing algorithm used. </p>
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography