To see the other types of publications on this topic, follow the link: Personal ancestral file (Computer file).

Journal articles on the topic 'Personal ancestral file (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Personal ancestral file (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wolman, Yecheskel. "Computer Software Reviews. STN Personal File System." Journal of Chemical Information and Modeling 32, no. 5 (September 1, 1992): 572–73. http://dx.doi.org/10.1021/ci00009a604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Muharemagic, Edin A., Imadeldin O. Mahgoub, and Milan Milenkovic. "Analysis of file usage in personal computer environments." Distributed and Parallel Databases 3, no. 4 (October 1995): 315–24. http://dx.doi.org/10.1007/bf01299676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jermey, Jonathan. "Locating files on computer disks." Indexer: The International Journal of Indexing 22, no. 3 (April 1, 2001): 130–32. http://dx.doi.org/10.3828/indexer.2001.22.3.7.

Full text
Abstract:
Over the last 20 years file storage capacity on personal computer systems has grown from the equivalent of a desk drawer to that of a medium-sized public library, and the trend is continuing. File retrieval methods have been developed on an ad hoc basis which has generally failed to keep up with this growth, but there are some encouraging and interesting developments in this area.
APA, Harvard, Vancouver, ISO, and other styles
4

Dorofi, David, and Stephen Park. "Patient File Management with a Database Using a Personal Computer." Facial Plastic Surgery 15, no. 02 (1999): 127–31. http://dx.doi.org/10.1055/s-2008-1064309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lim, Mian-Guan, Sining Wu, Tomasz Simon, Md Rashid, and Na Helian. "Personal Storage Grid Architecture." International Journal of Grid and High Performance Computing 2, no. 3 (July 2010): 17–30. http://dx.doi.org/10.4018/jghpc.2010070102.

Full text
Abstract:
On-demand cloud applications like online email accounts and online virtual disk space are becoming widely available in various forms. In cloud applications, one can see the importance of underlying resources, such as disk space, that is available to the end-user but not easily accessible. In the authors’ study, a modern file system developed in linux is proposed, which enables consuming of cloud applications and making the underlying disk space resource available to the end-user. This system is developed as a web service to support cross operation system support. A free online mail account was used to demonstrate this solution, and an IMAP protocol to communicate with remote data spaces was used so that this method can mount onto any email system that supports IMAP. The authors’ definition of infinite storage as the user is able to mount file systems as a single logical drive.
APA, Harvard, Vancouver, ISO, and other styles
6

Park, Jung-Eun, and Young-Hoon Park. "Fog-based file sharing for secure and efficient file management in personal area network with heterogeneous wearable devices." Journal of Communications and Networks 20, no. 3 (June 2018): 279–90. http://dx.doi.org/10.1109/jcn.2018.000040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shin, M. J., G. W. Kim, T. J. Chun, W. H. Ahn, S. K. Balk, H. Y. Choi, and B. G. Kim. "The Image Database Management System of Teaching File Using Personal Computer." Journal of the Korean Radiological Society 32, no. 4 (1995): 677. http://dx.doi.org/10.3348/jkrs.1995.32.4.677.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

CHANG Yanshuo, HUA Qingyi, WU Hao, LI Juanni, and SUN Jiaze. "PFME: a Novel Explorer for Personal File Management on Mobile Devices." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, no. 5 (March 15, 2013): 562–70. http://dx.doi.org/10.4156/aiss.vol5.issue5.65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lee, Woojoong, Shine Kim, and Chanik Park. "PosCFS+: A Self-Managed File Service in Personal Area Network." ETRI Journal 29, no. 3 (June 8, 2007): 281–91. http://dx.doi.org/10.4218/etrij.07.0506.0018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pullan, S. E. "Recommended standard for seismic (/radar) data files in the personal computer environment." GEOPHYSICS 55, no. 9 (September 1990): 1260–71. http://dx.doi.org/10.1190/1.1442942.

Full text
Abstract:
This paper is the result of the work of a subcommittee of SEG’s Engineering and Groundwater Geophysics Committee. It recommends a data file format for raw or processed shallow seismic or digital radar data in the small computer environment. It is recommended that this format be known as the SEG-2 format.
APA, Harvard, Vancouver, ISO, and other styles
11

MIYAMOTO, Yutaka, Shoji IWASAEI, Hideaki DETO, and Hidenobu KOBAYASHI. "Japanese-German File for Personal Computer in Study of History of Civil Engineering." HISTORICAL STUDIES IN CIVIL ENGINEERING 12 (1992): 111–16. http://dx.doi.org/10.2208/journalhs1990.12.111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Pollack, S. N., Z. J. Haskal, and S. A. Foster. "Personal Computer-Based Integrated Interventional Radiology Case Log and Digital Teaching File Database." Journal of Vascular and Interventional Radiology 8, no. 1 (January 1997): 261. http://dx.doi.org/10.1016/s1051-0443(97)70120-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Schandl, Bernhard, and Bernhard Haslhofer. "Files are Siles." International Journal on Semantic Web and Information Systems 6, no. 3 (July 2010): 1–21. http://dx.doi.org/10.4018/jswis.2010070101.

Full text
Abstract:
With the increasing storage capacity of personal computing devices, the problems of information overload and information fragmentation are apparent on users’ desktops. For the Web, semantic technologies solve this problem by adding a machine-interpretable information layer on top of existing resources. It has been shown that the application of these technologies to desktop environments is helpful for end users. However, certain characteristics of the Semantic Web architecture that are commonly accepted in the Web context are not desirable for desktops. To overcome these limitations, the authors propose the sile model, which combines characteristics of the Semantic Web and file systems. This model is a conceptual foundation for the Semantic Desktop and serves as underlying infrastructure on which applications and further services can be built. The authors present one service, a virtual file system based on siles, which allows users to semantically annotate files and directories and keeps full compatibility to traditional hierarchical file systems. The authors also discuss how Semantic Web vocabularies can be applied for meaningful annotation of files and present a prototypical implementation of the model and analyze the performance of typical access operations, both on the file system and metadata level.
APA, Harvard, Vancouver, ISO, and other styles
14

Nakazaki, Keiko, and Nagamasa Sakabe. "Data processing system for audiometric file conversion between an office computer and a personal computer." Medical Informatics 12, no. 1 (January 1987): 73. http://dx.doi.org/10.3109/14639238709010060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

S. Li, L., Z. M. Fauzee, N. Zamin, N. Kamarudin, N. A.Sabri, and N. S.Nik Ab Aziz. "An Encrypted Log File Keylogger System for Parental Control." International Journal of Engineering & Technology 7, no. 2.28 (May 16, 2018): 193. http://dx.doi.org/10.14419/ijet.v7i2.28.12910.

Full text
Abstract:
Keystroke logging, often referred to as keylogger, keylogging or keyboard capturing, is the process of recording all the pressed keys on a keyboard autonomously so that the person who is using the keyboard is unaware that their actions on the computer are being monitored. In the world of cyber-crime, keylogger tool has been used mostly for malicious purposes such as stealing personal information and credit card details. However, for ethical purposes, keylogger can be useful in terms of monitoring user’s activities without being noticed. For instance, parents can use keylogger to monitor their child’s activity on the web. The log file is used to store the recorded keystrokes. However, current log files in keylogger are not encrypted, which can be easily hacked for malicious purposes. This paper proposes a new software based keylogger with log file encryption to increase the keylogging security towards Industrial Revolution 4.0.
APA, Harvard, Vancouver, ISO, and other styles
16

Park, Jung-Eun, and Young-Hoon Park. "Efficiency Enhanced Combinatorial-based File Sharing Scheme for Distributed Storage with Heterogeneous Personal Devices." International Journal of u- and e- Service, Science and Technology 10, no. 9 (September 30, 2017): 151–64. http://dx.doi.org/10.14257/ijunesst.2017.10.9.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

McDonald, Robert S., and Paul A. Wilks. "JCAMP-DX: A Standard Form for Exchange of Infrared Spectra in Computer Readable Form." Applied Spectroscopy 42, no. 1 (January 1988): 151–62. http://dx.doi.org/10.1366/0003702884428734.

Full text
Abstract:
JCAMP-DX is a standard file form for exchange of infrared spectra and related chemical and physical information between spectrometer data systems of different manufacture, main-frame time-sharing systems, general purpose lab computers, and personal computers. It is compatible with all media: telephone, magnetic and optical disk, magnetic tape, and even the printed page (via optical reader). All data are stored as labeled fields of variable length using printable ASCII characters. A JCAMP-DX spectrum is a text file which can be viewed, corrected, and annotated with a text editor. The present focus is on infrared spectra, but JCAMP-DX can easily accommodate Raman, UV, NMR, mass, and other types of spectra, x-ray powder patterns, chromatograms, thermograms, and other plots which require the capability of representing contours as well as peak position and intensity. JCAMP-DX also provides for combining adequate information about the sample and method of observation with its spectrum.
APA, Harvard, Vancouver, ISO, and other styles
18

Nisha, Nisha, and Naseeb Singh. "ADVANCED FILE BASED SECURITY MECHANISM IN CLOUD COMPUTING: A REVIEW." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 6 (April 24, 2015): 5834–39. http://dx.doi.org/10.24297/ijct.v14i6.1916.

Full text
Abstract:
Cloud computing is a broad solution that delivers IT as a service. Cloud computing uses the internet and the central remote servers to support different data and applications. It is an internet based technology. It permits the users to approach their personal files at any computer with internet access. The cloud computing flexibility is a function of the allocation of resources on authoritys request. It represents all the complexities of the network which may include everything from cables, routers, servers, data centers and all such other devices. Cloud based systems saves data off multiple organizations on shared hardware systems. In this paper the attempt to secure data from unauthorized access. The Method of data security is AES algorithm for providing data security by encrypting the given data based on the AES. It is based on a design principle known as a substitution-permutation network, and is fast in both Software and Hardware. The algorithms used in AES are so simple that they can be easily implemented using heap processors and a minimum amount of memory and this data then can only be decrypted by authorized person by using his private key.
APA, Harvard, Vancouver, ISO, and other styles
19

Lim, Byung Hwa, and Ho-Seok Lee. "Optimal Investment, Consumption and Leisure with an Option to File for Bankruptcy." Symmetry 12, no. 5 (May 18, 2020): 827. http://dx.doi.org/10.3390/sym12050827.

Full text
Abstract:
This paper investigates the optimal personal bankruptcy decision of a debtor who participates in the labor market. This paper is based on a mathematical finance model that assumes a Black-Scholes financial market and describes a decision problem as an expected discounted utility maximization problem. Our optimization problem can be cast into a mixed optimal stopping and control problem, and has a symmetry feature with a voluntary retirement decision problem in characterizing the stopping times. To obtain value function and optimal strategies, we use dynamic programming method and transform the relevant nonlinear Bellman equation into a linear equation. Numerical illustrations from our explicit expressions for the optimal strategies reveal how an opportunity to file for bankruptcy affects debtor’s consumption, leisure, and portfolio decisions.
APA, Harvard, Vancouver, ISO, and other styles
20

Idris, Fayez, Zaher Abu, Rashad Rasras, and Emary El. "Building an advanced invariant real-time human tracking system." Computer Science and Information Systems 4, no. 1 (2007): 57–75. http://dx.doi.org/10.2298/csis0701057i.

Full text
Abstract:
Real-time human tracking is very important in surveillance and robot applications. We note that the performance of any human tracking system depends on its accuracy and its ability to deal with various human sizes in a fast way. In this paper, we combined the presented works in [1, 2] to come with new human tracking algorithm that is robust to background and lighting changes and does not require special hardware components. In addition this system can handle various scales of human images. The proposed system uses sum of absolute difference (SAD) with thresholding as has been described in [2] and compares the output with the predefined person pattern using the technique which has been described in [1]. Using the combination between [1,2] approaches will enhance the performance and speed of the tracking system since pattern matching has been performed according to just one pattern. After matching stage, a specific file is created for each tracked person, this file includes image sequences for that person. The proposed system handles shadows removal, lighting changes, and background changes with infinite pattern scales using standard personal computer.
APA, Harvard, Vancouver, ISO, and other styles
21

D'Addabbo, P., L. Lenzi, F. Facchin, R. Casadei, S. Canaider, L. Vitale, F. Frabetti, P. Carinci, M. Zannotti, and P. Strippoli. "GeneRecords: a relational database for GenBank flat file parsing and data manipulation in personal computers." Bioinformatics 20, no. 16 (May 14, 2004): 2883–85. http://dx.doi.org/10.1093/bioinformatics/bth321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Condron, Melody. "Identifying Individual and Institutional Motivations in Personal Digital Archiving." Preservation, Digital Technology & Culture 48, no. 1 (March 26, 2019): 28–37. http://dx.doi.org/10.1515/pdtc-2018-0032.

Full text
Abstract:
AbstractPersonal digital archiving (PDA) is a relatively new field. As it has developed, two distinct personas have emerged: the individual person, seeking to capture and archive their own or someone else’s personal digital materials; and the institution—including museums, libraries, and archives—attempting to acquire and manage personal digital materials. In doing so, institutions also advocate for the preservation and management of personal digital archives and digital file management practices held in private hands. However, individuals and institutions make different choices in terms of curation and management, based on skills, knowledge, purpose, function and economics. Understanding these differences can aid institutional support for personal archives, as well as help to build collaborative frameworks to help personal and institutional differences be better understood. This paper identifies the similarities and differences in motivation and approach between individual and institutional practices and perspectives in PDA.
APA, Harvard, Vancouver, ISO, and other styles
23

Kamarudin, Nur Khairani, Nur Nazifa Md Hasani, Rafiza Ruslan, Rashidah Ramle, Nurul Hidayah Ahmad Zukri, and Iman Hazwam Abd Halim. "Performance Analysis of Malware Attack." Journal of Computing Research and Innovation 3, no. 4 (November 18, 2018): 19–24. http://dx.doi.org/10.24191/jcrinn.v3i4.72.

Full text
Abstract:
People in this new era of modernization nowadays take Internet as one of the vital thing for daily activities. Internet is not only for adults, it is also a needs for people of all ages. However, network vulnerabilities exist in all network that are connec ted to the Internet. The network mostly are exposed to the malicious software or mostly known as malware. In fact, this malware is growing rapidly and giving a bad impact to the human intervention. The number of attack are increasing rapidly and it comes i n various way just to exploit the victims. There are various type of malware attack. For instance, viruses, worms, spyware, rootkits, Trojan horse and botnet are considered as noteworthy threat for the computer network. Some people giving full confidence on the security of data transmission to the network. However, other can access the personal information without them realizing it. The objective of this paper is to detect malware attack using honeypot Dionaea. Malicious file launched was detected by the honeypot and the file was analyzed by using the sandbox tool, Virus Total. This paper found that honeypot Dionaea is helpful in detecting various types of malware attack.
APA, Harvard, Vancouver, ISO, and other styles
24

Jenkins, R., and M. Holomany. "“PC-PDF”: A Search/Display System Utilizing the CD-ROM and the Complete Powder Diffraction File." Powder Diffraction 2, no. 4 (December 1987): 215–19. http://dx.doi.org/10.1017/s0885715600012811.

Full text
Abstract:
AbstractThe Powder Diffraction File (PDF) is a collection of single phase X-ray powder patterns, maintained and distributed by the JCPDS-International Centre for Diffraction Data. Over the past 10 years there has been increasing use of the PDF in computer readable form, but the limited amount of disk space available on most commercial powder diffractometer systems has limited use to a small subset of the total PDF. The recent availability of low-cost Compact Disk Read Only Memory (CD-ROM) systems offers an attractive alternative to conventional disk media. This paper describes a low-cost Personal Computer/CD-ROM system, “PC-PDF”, having a total available storage of 550 Mbytes. While seek times are relatively slow – typically, 0.5 seconds are required to traverse the complete PDF – by use of optimum packing and access algorithms, search strategies based on PDF numbers, chemistry, strongest d-spacing, etc., operate at a speed causing no great inconvenience to the user.
APA, Harvard, Vancouver, ISO, and other styles
25

Georgieva-Trifonova, T., and S. Lazarova. "DEVELOPMENT OF A PERSONAL INFORMATION SYSTEM FOR MANAGING AUDIOVISUAL TRAINING AIDS: MOTIVATIONS, BENEFITS FOR THE TEACHER'S WORK." Trakia Journal of Sciences 17, no. 2 (2019): 107–14. http://dx.doi.org/10.15547/tjs.2019.02.003.

Full text
Abstract:
The contemporary teacher uses a rich collection of diverse computer-based teaching aids in their daily experience. One of the main problems in his work is maintaining this collection so that in case of need a desired file can be found quickly and reliably. In this paper, an approach to systematizing, organizing, storing and using the audiovisual aids with the personal information system myAudiovisualAids is proposed. The purpose of the implemented system is to support the user to organize his/her media learning resources created during the preparation of the lessons or his/her library of digital didactic aids. The motivations are justified and the benefits of developing and using the proposed system are addressed.
APA, Harvard, Vancouver, ISO, and other styles
26

Ransick, Mark H., and Chadwick D. Barklay. "Interfacing a Personal Computer to an Analog Scanning Electron Microscope for Storing Images on Optical Disks." Proceedings, annual meeting, Electron Microscopy Society of America 48, no. 2 (August 12, 1990): 84–85. http://dx.doi.org/10.1017/s0424820100134016.

Full text
Abstract:
Most manufacturers of scanning electron microscopes (SEM) now offer models that display an image digitally. This holds many advantages, including the ability to store the image on a disk and perform image analysis on the sample. Most SEMs in service, however, produce only an analog video output; they do not have the ability to digitize the image. Film is the only method of storing images.Consequentially, film is a significant portion of every microscopy laboratory’s budget. Completely eliminating the use of film from use is not practical. There will always be the need to examine a hard copy of the image; many programs require duplicate copies of each image generated; and it is sound practice to keep a copy of each image on file. By archiving digital images to an inexpensive media, the amount of film used or the time devoted to processing negatives can be greatly reduced.By using personal computers (PCs)s, with a digitizing board and analog to digital (A/D) board, it is possible to construct a relatively low cost digitizing system for any SEM.
APA, Harvard, Vancouver, ISO, and other styles
27

Tsoukos, Serafeim, Panagiotis Lazos, Pavlos Tzamalis, Alexandros Kateris, and Athanasios Velentzas. "How Effectively Can Students’ Personal Smartphones be Used as Tools in Physics Labs?" International Journal of Interactive Mobile Technologies (iJIM) 15, no. 14 (July 28, 2021): 55. http://dx.doi.org/10.3991/ijim.v15i14.22375.

Full text
Abstract:
This study seeks to answer the question of how effectively students can use their smartphones as tools for measuring and processing data when they perform physics experiments. The research was conducted in a local secondary school in Athens, Greece. The sample consisted of fifty-two 16-year-old students (10th grade). The students formed 26 pairs, and were asked to perform an experiment using their smartphones for measuring, processing and saving data, and then to email the data file to the researchers. During the implementation, students of each pair completed the steps on a worksheet. Two researchers monitored each pair individually and recorded scores and comments on evaluation sheets. The worksheets, the evaluation sheets, and the experimental data emailed by each pair constituted the data of the present study. The findings of the study show that the integration of students' smart mobile devices in the performance of physics experiments in the classroom or in the school lab is possible without posing particular problems. However, this integration presupposes the proper planning by the teacher and the dedication of appropriate time both for the preparation of the students for the activity, and for the installation of the necessary applications in the devices.
APA, Harvard, Vancouver, ISO, and other styles
28

Tambunan, Alexander Theo Philus, Adi Prijuna Lubis, and Syartika Anggraini. "Perancangan Sistem Keamanan File Transfer Protocol Dengan Secure Socket Layer Pada Server Centos 7." J-Com (Journal of Computer) 1, no. 2 (July 31, 2021): 95–102. http://dx.doi.org/10.33330/j-com.v2i1.1206.

Full text
Abstract:
Abstract: An advancement in communication technology currently has an influence on developments in data management in the joints of life, making the need for a media center something a must in digital archive storage. Data will not always be stored in personal computers, but it would be better if there was a centralized data container to be a solution in storage media, in order to prevent data loss or data backup. The term network (network) is used when there are at least two or more devices that are connected to one another. To carry out data exchange in this network, a protocol is used that specifies how data is exchanged, and one of the most widely used protocols is the File Transfer Protocol (FTP). FTP is generally useful as a means of exchanging files or data in a network. The FTP protocol is not secure enough, because when data transfer there is no security to protect it. Therefore the FTP protocol is necessary for additional security, by implementing the SSL security protocol or Secure Socket Layer Security protecting the FTP protocol during data transfer. SSL certificates are used for the purpose of handling the security of data packets transmitted over the network system. When SSL is activated, the server and client when the connection occurs will be encrypted so that the data cannot be seen by others. Keywords: FTP; Network; Server; SSL Abstrak: Suatu Kemajuan teknologi komunikasi saat ini memiliki pengaruh terhadap perkembangan didalam pengelolaan data didalam sendi kehidupan, membuat kebutuhan akan media center menjadi sesuatu yang harus dalam penyimpanan arsip digital. Data tidak selamanya akan tersimpan di dalam personal computer saja tetapi akan lebih baik jika ada wadah data terpusat menjadi solusi dalam media penyimpanan, agar menjaga dari kehilangan data atau cadangan data. Istilah jaringan (network) dipakai apabila terdapat minimal dua atau lebih perangkat yang terhubungkan satu dengan yang lainnya. Untuk melaksanakn pertukaran data didalam jaringan ini, digunakan protocol yang menspesifikasikan bagaimana data dipertukarkan, dan salah satu protocol yang banyak digunakan adalah File Transfer Protocol (FTP). FTP umumnya bermanfaat sebagai sarana pertukaran file atau data dalam suatu network. Protokol FTP tidaklah cukup aman, dikarenakan ketika transfer data tidak ada keamanan untuk melindunginya. Maka dari itu protokol FTP perlu untuk penambahan keamanan, dengan menerapkan protokol keamanan SSL atau Secure Socket Layer Security melindungi protokol FTP pada saat transfer data. Sertifikat SSL dimanfaatkan untuk keperluan menangani keamanan paket data yang ditransmisikan melalui sistem jaringan. Ketika SSL diakatifkan, maka server dan client ketika terjadi koneksi akan ter enkripsi sehingga data yang ada tidak dapat untuk dilihat oleh orang lain. Kata kunci: FTP;Network; Server; SSL
APA, Harvard, Vancouver, ISO, and other styles
29

Arman, Molavi. "Rancang Bangun Pengamanan FTP Server dengan Menggunakan Secure Sockets Layer." JURNAL INTEGRASI 9, no. 1 (April 28, 2017): 16. http://dx.doi.org/10.30871/ji.v9i1.272.

Full text
Abstract:
Teknologi informasi yang berkembang pesat didalam kehidupan manusia, membuat kebutuhan akan sistem penyimpanan data terpusat menjadi sesuatu yang penting dalam penyimpanan arsip digital. Data tidak hanya disimpan dalam sebuah personal computer desktop tetapi media penyimpanan data terpusat menjadi alternatif dalam media penyimpanan, guna menjaga dari kehilangan data atau backup data. Teknologi jaringan (network) komputer merupakan solusi yang dapat dimanfaatkan untuk memenuhi penyimpanan data. Jaringan komputer merupakan kumpulan beberapa komputer dan perangkat jaringan lain yang saling terhubung melalui media perantara. FTP (File Tranfer Protocol) umumnya berfungsi sebagai media tukar menukar file atau data dalam suatu network yang menggunakan koneksi TCP. Protokol FTP tidak cukup aman dikarenakan pada saat autentifikasi output karakter berupa plaintext dan disaat transfer data tidak ada enkripsi untuk melindungi. Protokol FTP butuh penambahan keamanan, dengan menggunakan protokol TLS (Transport Layer Security) dan Auth SSL untuk mengamankan protokol FTP pada saat autentikasi dan proses transfer data. Manajemen user dan kuota dalam penggunaan FTP dikombinasikan dengan database, untuk memudahkan memasukkan data kedalam database ditambahkan script PHP yang nantinya berbentuk interface web. Proses memasukkan user, kuota , password dan field lainnya kedalam database serta soal keamanan autentikasi login dan transfer data, maka dengan penjelasan diatas tema yang dipilih adalah pengamanan FTP server dengan menggunakan Secure Sockets Layer (SSL).
APA, Harvard, Vancouver, ISO, and other styles
30

Quantin, Catherine, François-André Allaert, Paul Avillach, Maniane Fassa, Benoît Riandey, Gilles Trouessin, and Olivier Cohen. "Building Application-Related Patient Identifiers: What Solution for a European Country?" International Journal of Telemedicine and Applications 2008 (2008): 1–5. http://dx.doi.org/10.1155/2008/678302.

Full text
Abstract:
We propose a method utilizing a derived social security number with the same reliability as the social security number. We show the anonymity techniques classically based on unidirectional hash functions (such as the secure hash algorithm (SHA-2) function that can guarantee the security, quality, and reliability of information if these techniques are applied to the Social Security Number). Hashing produces a strictly anonymous code that is always the same for a given individual, and thus enables patient data to be linked. Different solutions are developed and proposed in this article. Hashing the social security number will make it possible to link the information in the personal medical file to other national health information sources with the aim of completing or validating the personal medical record or conducting epidemiological and clinical research. This data linkage would meet the anonymous data requirements of the European directive on data protection.
APA, Harvard, Vancouver, ISO, and other styles
31

Madhavi, Dasari, and B. V. Ramana. "De-Identified Personal Health Care System Using Hadoop." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 6 (December 1, 2015): 1492. http://dx.doi.org/10.11591/ijece.v5i6.pp1492-1499.

Full text
Abstract:
Hadoop technology plays a vital role in improving the quality of healthcare by delivering right information to right people at right time and reduces its cost and time. Most properly health care functions like admission, discharge, and transfer patient data maintained in Computer based Patient Records (CPR), Personal Health Information (PHI), and Electronic Health Records (EHR). The use of medical Big Data is increasingly popular in health care services and clinical research. The biggest challenges in health care centers are the huge amount of data flows into the systems daily. Crunching this Big Data and de-identifying it in a traditional data mining tools had problems. Therefore to provide solution to the de-identifying personal health information, Map Reduce application uses jar files which contain a combination of MR code and PIG queries. This application also uses advanced mechanism of using UDF (User Data File) which is used to protect the health care dataset. De-identified personal health care system is using Map Reduce, Pig Queries which are needed to be executed on the health care dataset. The application input dataset that contains the information of patients and de-identifies their personal health care. De-identification using Hadoop is also suitable for social and demographic data.
APA, Harvard, Vancouver, ISO, and other styles
32

Musiani, Francesca. "Privacy as Invisibility: Pervasive Surveillance and the Privatization of Peer-to-Peer Systems." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 9, no. 2 (June 14, 2011): 126–40. http://dx.doi.org/10.31269/triplec.v9i2.248.

Full text
Abstract:
This article addresses the ongoing, increasing privatization of peer-to-peer (P2P) file sharing systems – the emergence of systems that users may only join by personal, friend-to-friend invitation. It argues that, within P2P systems, privacy is increasingly coinciding with “mere” invisibility vis-à-vis the rest of the Internet ecosystem because of a trend that has shaped the recent history of P2P technology: The alternation between forms of pervasive surveillance of such systems, and reactions by developers and users to such restrictive measures. Yet, it also suggests that the richness of today’s landscape of P2P technology development and use, mainly in the field of Internet-based services, opens up new dimensions to the conceptualization of privacy, and may give room to a more articulate definition of the concept as related to P2P technology; one that includes not only the need of protection from external attacks, and the temporary outcomes of the competition between surveillance and counter-surveillance measures, but also issues such as user empowerment through better control over personal information, reconfiguration of data management practices, and removal of intermediaries in sharing and communication activities.
APA, Harvard, Vancouver, ISO, and other styles
33

Musiani, Francesca. "Privacy as Invisibility: Pervasive Surveillance and the Privatization of Peer-to-Peer Systems." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 9, no. 2 (June 14, 2011): 126–40. http://dx.doi.org/10.31269/vol9iss2pp126-140.

Full text
Abstract:
This article addresses the ongoing, increasing privatization of peer-to-peer (P2P) file sharing systems – the emergence of systems that users may only join by personal, friend-to-friend invitation. It argues that, within P2P systems, privacy is increasingly coinciding with “mere” invisibility vis-à-vis the rest of the Internet ecosystem because of a trend that has shaped the recent history of P2P technology: The alternation between forms of pervasive surveillance of such systems, and reactions by developers and users to such restrictive measures. Yet, it also suggests that the richness of today’s landscape of P2P technology development and use, mainly in the field of Internet-based services, opens up new dimensions to the conceptualization of privacy, and may give room to a more articulate definition of the concept as related to P2P technology; one that includes not only the need of protection from external attacks, and the temporary outcomes of the competition between surveillance and counter-surveillance measures, but also issues such as user empowerment through better control over personal information, reconfiguration of data management practices, and removal of intermediaries in sharing and communication activities.
APA, Harvard, Vancouver, ISO, and other styles
34

Bardram, Jakob E., Steven Jeuris, and Steven Houben. "Activity-Based Computing: Computational Management of Activities Reflecting Human Intention." AI Magazine 36, no. 2 (June 21, 2015): 63–72. http://dx.doi.org/10.1609/aimag.v36i2.2585.

Full text
Abstract:
An important research topic in artificial intelligence is automatic sensing and inferencing of contextual information, which is used to build computer models of the user’s activity. One approach to build such activity-aware systems is the notion of activity-based computing (ABC). ABC is a computing paradigm that has been applied in personal information management applications as well as in ubiquitous, multidevice, and interactive surface computing. ABC has emerged as a response to the traditional application- and file-centered computing paradigm, which is oblivious to a notion of a user’s activity context spanning heterogeneous devices, multiple applications, services, and information sources. In this article, we present ABC as an approach to contextualize information, and present our research into designing activity-centric computing technologies.
APA, Harvard, Vancouver, ISO, and other styles
35

Miller, Dwight P., and Andrew C. Stone. "Proto Tymer: Human Performance Instrumentation for HyperCard® Prototyping." Proceedings of the Human Factors Society Annual Meeting 33, no. 5 (October 1989): 249–53. http://dx.doi.org/10.1177/154193128903300503.

Full text
Abstract:
As a result of the popularity of using HyperCard® to rapidly prototype equipment and computer interfaces on Macintoshè personal computers, the need ensued to evaluate prototype usability by collecting subjects' interactive performance data in real time. Sandia National Laboratories, in collaboration with Stone Design Software, has developed ProtoTymer2, a HyperCardè stack that can time and record users' interactive sessions with prototypes developed using HyperCardè. While operating in the background, ProtoTymer records the times, locations, and targets (objects clicked) of a subject's inputs during an interactive session. At the conclusion of the session, the resultant data file can be reviewed, summarized, printed, or transferred to a spreadsheet for statistical or graphical analysis. This paper describes ProtoTymer's design approach, features, limitations, and considerations for future versions.
APA, Harvard, Vancouver, ISO, and other styles
36

Masni, Harbeng, and Zuhri Saputra Hutabarat. "Pengembangan Multimedia Pembelajaran Berbasis Lash Animation With Swish Max Siswa Kelas XI SMA Negeri 8 Kota Jambi." Jurnal Ilmiah Dikdaya 9, no. 2 (September 28, 2019): 257. http://dx.doi.org/10.33087/dikdaya.v9i2.147.

Full text
Abstract:
There are several factors that influence learning, including teacher factors, student factors, facilities, tools and media, and the environment. Educators should pay attention to factors that influence learning. The task of the teacher in the learning process, in addition to conveying information, also diagnoses learning difficulties students select teaching materials, supervise learning activities, stimulate student learning activities, provide learning guidance using media, strategies, and methods. Teachers and students are required to master the science and information technology of communication continuously. Teachers need to keep abreast of the development of communication information and science so that they can deliver the latest learning material that is useful for the lives of students in the present and future. The thing that stands out in Swishmax is that the work can be exported into the SWF file format, which is the file format used by Macromedia Flash. Therefore, swishmax animations can be played on any personal computer that has a flash player installed. Swishmax animations can be inserted into web pages, or imported into macromedia flash documents or even in Microsoft Power Point documents. When compared to adobe flash, Swishmax is easier to learn and use for beginners, because the tools available are more user friendly. From the description above it can be concluded that Swishmax is not only multimedia software that is only capable of creating dynamic multimedia, but more than that, it is capable of displaying multimedia that is very interactive.
APA, Harvard, Vancouver, ISO, and other styles
37

HAYAMI, Ken-ichi. "Development of A File Conversion Program for Chemical Structure Data: MOLCONV. Traensplantation of the MOLCONV program from PC-9801 for IBM personal computer." Journal of Chemical Software 4, no. 3 (1998): 119–26. http://dx.doi.org/10.2477/jchemsoft.4.119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Kim, Seong-Min, Keunbada Son, Duk-Yeon Kim, and Kyu-Bok Lee. "Digital Evaluation of the Accuracy of Computer-Guided Dental Implant Placement: An In Vitro Study." Applied Sciences 9, no. 16 (August 16, 2019): 3373. http://dx.doi.org/10.3390/app9163373.

Full text
Abstract:
Compared to traditional implant surgical guides, computer-assisted implant surgical guides can be considered for positioning implants in the final prosthesis. These computer-assisted implant surgical guides can be easily fabricated with personal 3D printers after being designed with implant planning CAD software. Although the accuracy of computer-assisted implant surgical guides fabricated using personal 3D printers is an important factor in their clinical use, there is still a lack of research examining their accuracy. Therefore, this study evaluated the accuracy of computer-assisted implant surgical guides, which were designed using two implant planning CAD software programs (Deltanine and R2gate software) and fabricated with personal 3D printers using a non-radiographic method. Amongst the patients who visited Kyungpook National University Dental Hospital, one patient scheduled to undergo surgery of the left mandibular second premolar was randomly selected. Twenty partially edentulous resin study models were produced using a 3D printer. Using the Deltanine and R2gate implant planning CAD software, 10 implant surgical guides per software were designed and produced using a personal 3D printer. The implants (SIII SA (Ø 4.0, L = 10 mm), Osstem, Busan, Korea) were placed by one skilled investigator using the computer-assisted implant surgical guides. To confirm the position of the actual implant fixture, the study models with the implant fixtures were scanned with a connected scan body to extract the STL files, and then overlapped with the scanned file by connecting the scan body-implant fixture complex. As a result, the mean apical deviation of the Deltanine and R2gate software was 0.603 ± 0.19 mm and 0.609 ± 0.18 mm, while the mean angular deviation was 1.97 ± 0.84° and 1.92 ± 0.52°, respectively. There was no significant difference between the two software programs (p > 0.05). Thus, the accuracy of the personal 3D printing implant surgical guides is in the average range allowed by the dental clinician.
APA, Harvard, Vancouver, ISO, and other styles
39

Vásquez-Ramírez, Raquel, Maritza Bustos-Lopez, Giner Alor-Hernández, Cuauhtémoc Sanchez-Ramírez, and Jorge García-Alcaraz. "AthenaCloud: A cloud-based platform for multi-device educational software generation." Computer Science and Information Systems 13, no. 3 (2016): 957–81. http://dx.doi.org/10.2298/csis160807037v.

Full text
Abstract:
Nowadays, information technologies play an important role in education. In education, mobile and TV applications can be considered a support tool in the teaching - learning process, however, relevant and appropriate mobile and TV applications are not always available; teachers can only judge applications by reviews or anecdotes instead of testing them. These reasons lead to the needs and benefits for creating one?s own mobile application for teaching and learning. In this work, we present a cloud-based platform for multi-device educational software generation (smartphones, tablets, Web, Android-based TV boxes, and smart TV devices) called AthenaCloud. It is important to mention that an open cloud-based platform allows teachers to create their own multi-device software by using a personal computer with Internet access. The goal of this platform is to provide a software tool to help educators upload their electronic contents - or use existing contents in an open repository - and package them in the desired setup file for one of the supported devices and operating systems.
APA, Harvard, Vancouver, ISO, and other styles
40

Tobi, Markus Dwiyanto, and VINA N. VAN HARLING. "PENGENDALI LISTRIK AKSES PARALLEL PORT DENGAN PEMROGRAMAN BORLAND DELPHI 7.0." Electro Luceat 4, no. 2 (November 1, 2018): 26–34. http://dx.doi.org/10.32531/jelekn.v4i2.141.

Full text
Abstract:
Komputer atau disebut PC (personal Computer) sudah berada hampir di setiap rumah, gedung atau perkantoran. Kebanyakan komputer lebih sering digunakan untuk keperluan pengetikan, memutar film, mendengarkan musik dan untuk permainan atau game. Pada saat sebagian orang juga dapat menghabiskan waktu seharian di depan computer mereka. Hal ini dapat membuat orang malas untuk mengerjakan hal lain saat sibuk di depan komputer, miasalnya saja untuk menghidupkan lampu, pendingin ruangan (Air Conditioner), atau perangkat elektronik lainnya. Penelitian ini dirancang untuk mengendalikan peralatan listrik menggunakan akses parallel port dengan pemrograman Delphi 7.0. Peralatan listrik yang dikontrol adalah lampu pijar, untuk mengontrol lampu pada suatu rumah, gedung ataupun di industry-industri yang dihubungkan dan di control melalui komputer dengan memanfaatkan interface port parallel. dan untuk menghidupkan dan mematikan lampu pada suatu gedung atau tempat lainnya dapat dilakukan dengan menekan tombol-tombol yang telah dirancang pada modul program computer dan agar dapat mengakses port parallel dengan baik digunakan sebuah file library, yaitu “inpout32.dll”.
APA, Harvard, Vancouver, ISO, and other styles
41

Chen, Hongsong, and Zhongchuan Fu. "Hadoop-Based Healthcare Information System Design and Wireless Security Communication Implementation." Mobile Information Systems 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/852173.

Full text
Abstract:
Human health information from healthcare system can provide important diagnosis data and reference to doctors. However, continuous monitoring and security storage of human health data are challenging personal privacy and big data storage. To build secure and efficient healthcare application, Hadoop-based healthcare security communication system is proposed. In wireless biosensor network, authentication and key transfer should be lightweight. An ECC (Elliptic Curve Cryptography) based lightweight digital signature and key transmission method are proposed to provide wireless secure communication in healthcare information system. Sunspot wireless sensor nodes are used to build healthcare secure communication network; wireless nodes and base station are assigned different tasks to achieve secure communication goal in healthcare information system. Mysql database is used to store Sunspot security entity table and measure entity table. Hadoop is used to backup and audit the Sunspot security entity table. Sqoop tool is used to import/export data between Mysql database and HDFS (Hadoop distributed file system). Ganglia is used to monitor and measure the performance of Hadoop cluster. Simulation results show that the Hadoop-based healthcare architecture and wireless security communication method are highly effective to build a wireless healthcare information system.
APA, Harvard, Vancouver, ISO, and other styles
42

Troudet, Julien, Fred Legendre, and Régine Vignes-Lebbe. "Darwin Core Spatial Processor (DwCSP): a Fast Biodiversity Occurrences Curator." Biodiversity Information Science and Standards 2 (May 22, 2018): e26104. http://dx.doi.org/10.3897/biss.2.26104.

Full text
Abstract:
Primary biodiversity data, or occurrence data, are being produced at an increasing rate and are used in numerous studies (Hampton et al. 2013, La Salle et al. 2016). This data avalanche is a remarkable opportunity but it comes with hurdles. First, available software solutions are rare for very large datasets and those solutions often require significant computer skills (Gaiji et al. 2013), while most biologists are not formally trained in bioinformatics (List et al. 2017). Second, large datasets are heterogeneous because they come from different producers and they can contain erroneous data (Gaiji et al. 2013). Hence, they need to be curated. In this context, we developed a biodiversity occurrence curator designed to quickly handle large amounts of data through a simple interface: the Darwin Core Spatial Processor (DwCSP). DwCSP does not require the installation or use of third-party software and has a simple graphical user interface that requires no computer knowledge. DwCSP allows for the data enrichment of biodiversity occurrences and also ensures data quality through outlier detection. For example, the software can enrich a tabulated occurrence file (Darwin Core for instance) with spatial data from polygon files (e.g., Esri shapefile) or a Rasters file (geotiff). The speed of the enriching procedures is ensured through multithreading and optimized spatial access methods (R-Tree indexes). DwCSP can also detect and tag outliers based on their geographic coordinates or environmental variables. The first type of outlier detection uses a computed distance between the occurrence and its nearest neighbors, whereas the second type uses a Mahalanobis distance (Mahalanobis 1936). One hundred thousand occurrences can be processed by DwCSP in less than 20 minutes and another test on forty million occurrences was completed in a few days on a recent personal computer. DwCSP has an English interface including documentation and will be available as a stand-alone Java Archive (JAR) executable that works on all computers having a Java environment (version 1.8 and onward).
APA, Harvard, Vancouver, ISO, and other styles
43

Kamarudin, Nur Khairani, Nur Syafiqa Bismi, Nurul Hidayah Ahmad Zukri, Mohd Faris Mohd Fuzi, and Rashidah Ramle. "Network Security Performance Analysis of Mobile Voice Over Ip Application (mVoIP): Kakao Talk, WhatsApp, Telegram and Facebook Messenger." Journal of Computing Research and Innovation 5, no. 2 (October 12, 2020): 21–27. http://dx.doi.org/10.24191/jcrinn.v5i2.136.

Full text
Abstract:
VoIP application usage has increased from time to time and makes our daily life more convenient. VoIP application has features to make a phone call, send a text message and share the file through the apps for free. However, most of the users did not seem aware of VoIP security features such as authentication ability, password encryption ability, or voice or audio and text communication encryption ability. It is essential to ensure the VoIP used is secure from password decrypter and eavesdrops the user conversation. Thus, the first objective of this research was to study and investigate VoIP application consist of Kakao Talk, Telegram, Facebook Messenger and WhatsApp for both Android and web application. The second objective was to evaluate the four VoIP application identified based on authentication requirement, password encryption, voice or audio encryption communication, and text encryption communication. There were two mobile phones used. One acts as a client and a personal computer act as an attacker. Wireshark and packet capture were run in personal computer and mobile phone to monitoring and scanning the network traffic while both devices connected in the same WLAN. The experiment implements MITM, interception, and sniffing attacks. This research project has identified Facebook Messenger and WhatsApp web application do not provide secure password ability.
APA, Harvard, Vancouver, ISO, and other styles
44

Dai, Debao, Wenfang Zheng, and Tijun Fan. "Evaluation of personal cloud storage products in China." Industrial Management & Data Systems 117, no. 1 (February 6, 2017): 131–48. http://dx.doi.org/10.1108/imds-12-2015-0504.

Full text
Abstract:
Purpose The purpose of this paper is to compare and evaluate the personal cloud storage products (PCSPs) in China and find the gap among them for promoting their service level. There are five representative products including Baidu cloud, Tencent cloud, Qihoo 360-cloud, Kingsoft cloud and Huawei DBank. Design/methodology/approach This study, first, extracts corresponding indicators based on the extant literature to evaluate PCSPs, and then collects the data about each index by investigation and the performance test, finally proposes a model to rank PCSPs, which applies analytic hierarchy process (AHP) to determine the indexed weights and the technique for order preference by similarity to ideal solution-grey relational analysis calculate evaluation score of each PCSP. Findings Among them, Qihoo 360-cloud gets the highest evaluation score contributed by large space, file editing and fast transmission speed. The rest are Kingsoft cloud, Baidu cloud, Huawei DBank and Tencent cloud in order. These storage products are all want of the addition or improvement of the online editing service similar as Google Docs. Research limitations/implications AHP method is subjective, some of the data is incomplete, and some accidental error and systematic error exist in the actual testing process. Practical implications The findings can assist users in selecting more suitable products and offer cloud storage providers (CSPs) a general direction of improving their product performance. Social implications Contributing to improve the overall level of the cloud storage services in China. Originality/value The study perfects the evaluation index system of the PCSP and fills the research gap in studying PCSPs in China, and expands the application field of the multiple criteria decision-making problems. This evaluation process and results have implied that CSPs in China should provide good services of large capacity, cooperation and security with the good internet environment of economical, high and stable speed by institutions and internet access providers.
APA, Harvard, Vancouver, ISO, and other styles
45

Sukrawan, Yusep, Enda Permana, Mumu Komaro, and Agus Solehudin. "Design and Developement Multimedia Animation Corrosion and Coating Process." Innovation of Vocational Technology Education 14, no. 1 (April 27, 2018): 37. http://dx.doi.org/10.17509/invotec.v14i1.11046.

Full text
Abstract:
The purpose of this research is to create an animation-based learning media of corrosion processes in the subject of corrosion and coating. The media produced is a learning media program in the form of .swf file that can be directly installed and accessed on personal computer. This development research (R&D) was started with concept exploration to find out the necessary product model, followed by its development through many test steps (expert judgment, limited test, and application test) and correction procedure until the proper product was determined. The last step was an experimental process to validate the product. The research has result an animation-based interactive media which has good criteria according to the media expert judgment value of 78.3 %, students’ response of 83.0 % and subject matter expert judgment value of 89.0 %. Validity test show that the media has a significant effect to increase a number of students who reach minimum standard competency.
APA, Harvard, Vancouver, ISO, and other styles
46

Prastikawati, Entika Fani, and Asropah Asropah. "STUDENTS’ PERCEPTION TOWARD SPADA UPGRIS AS DIGITAL PLATFORM IN LEARNING PROCESS." Refleksi Edukatika : Jurnal Ilmiah Kependidikan 11, no. 1 (December 9, 2020): 49–58. http://dx.doi.org/10.24176/re.v11i1.4768.

Full text
Abstract:
This research is trying to figure out the students’ perceptions and difficulties arise in the application of SPADA (Sistem Pembelajaran Daring) UPGRIS. The method used in this research is descriptive qualitative research. There are 150 Indonesian students of the third semester in Universitas PGRI Semarang as the sample of the study. Those samples come from five different majors, namely English education department, Indonesian language education department, management department, engineering,department and law department of Universitas PGRI Semarang (UPGRIS). It is based on the fact that the third-semester students had joined SPADA UPGRIS platform as it was required by the lecturers. The finding shows that most students have positive feelings and perceptions of the application of SPADA UPGRIS. They consider SPADA UPGRIS as a new experience in learning which gains their capability in technology competence. On the other hand, some difficulties were faced by the students such as personal internet connection, less communication with friends, material file size provided, and inability in using a computer.
APA, Harvard, Vancouver, ISO, and other styles
47

Groh, Micah, Norman Buchanan, Derek Doyle, James B. Kowalkowski, Marc Paterno, and Saba Sehrish. "PandAna: A Python Analysis Framework for Scalable High Performance Computing in High Energy Physics." EPJ Web of Conferences 251 (2021): 03033. http://dx.doi.org/10.1051/epjconf/202125103033.

Full text
Abstract:
Modern experiments in high energy physics analyze millions of events recorded in particle detectors to select the events of interest and make measurements of physics parameters. These data can often be stored as tabular data in files with detector information and reconstructed quantities. Most current techniques for event selection in these files lack the scalability needed for high performance computing environments. We describe our work to develop a high energy physics analysis framework suitable for high performance computing. This new framework utilizes modern tools for reading files and implicit data parallelism. Framework users analyze tabular data using standard, easy-to-use data analysis techniques in Python while the framework handles the file manipulations and parallelism without the user needing advanced experience in parallel programming. In future versions, we hope to provide a framework that can be utilized on a personal computer or a high performance computing cluster with little change to the user code.
APA, Harvard, Vancouver, ISO, and other styles
48

Fu, Zhe. "Embedded Image and Video Coding Algorithm Based on Adaptive Filtering Equation." Advances in Mathematical Physics 2021 (September 8, 2021): 1–11. http://dx.doi.org/10.1155/2021/7953993.

Full text
Abstract:
Based on the improved adaptive filtering method, this paper conducts in-depth discussion and research on embedded graphics and video coding and chooses to improve the adaptive filtering algorithm from three aspects: starting point prediction, search template, and window partitioning. The algorithm is imported into the encoder for video capture and encoding. By capturing videos of different formats, resolutions, and times, the memory size of the video files collected before and after the algorithm optimization is compared, and the optimized algorithm occupies the memory space of the video file in the actual system. The conclusion of less and higher coding rates. The collected video information is stored on a personal computer equipped with a freeness, and external electronic devices only need to download and install the browser, and the collected video information can be accessed in the local area network through the protocol. The improved coding algorithm has higher coding efficiency and can reduce the storage space occupied by the video.
APA, Harvard, Vancouver, ISO, and other styles
49

Torheim, G., M. Lombardi, and P. A. Rinck. "An independent software system for the analysis of dynamic MR images." Acta Radiologica 38, no. 1 (January 1997): 165–72. http://dx.doi.org/10.1080/02841859709171262.

Full text
Abstract:
Purpose: A computer system for the manual, semi-automatic, and automatic analysis of dynamic MR images was to be developed on UNIX and personal computer platforms. The system was to offer an integrated and standardized way of performing both image processing and analysis that was independent of the MR unit used. Material and Methods: The system consists of modules that are easily adaptable to special needs. Data from MR units or other diagnostic imaging equipment in techniques such as CT, ultrasonography, or nuclear medicine can be processed through the ACR-NEMA/DICOM standard file formats. A full set of functions is available, among them cine-loop visual analysis, and generation of time-intensity curves., Parameters such as cross-correlation coefficients, area under the curve, peak/maximum intensity, wash-in and wash-out slopes, time to peak, and relative signal intensity/contrast enhancement can be calculated. Other parameters can be extracted by fitting functions like the gamma-variate function. Region-of-interest data and parametric values can easily be exported. Results and Conclusion: The system has been successfully tested in animal and patient examinations.
APA, Harvard, Vancouver, ISO, and other styles
50

Masso, Majid, and Iosif I. Vaisman. "AUTO-MUTE 2.0: A Portable Framework with Enhanced Capabilities for Predicting Protein Functional Consequences upon Mutation." Advances in Bioinformatics 2014 (August 17, 2014): 1–7. http://dx.doi.org/10.1155/2014/278385.

Full text
Abstract:
The AUTO-MUTE 2.0 stand-alone software package includes a collection of programs for predicting functional changes to proteins upon single residue substitutions, developed by combining structure-based features with trained statistical learning models. Three of the predictors evaluate changes to protein stability upon mutation, each complementing a distinct experimental approach. Two additional classifiers are available, one for predicting activity changes due to residue replacements and the other for determining the disease potential of mutations associated with nonsynonymous single nucleotide polymorphisms (nsSNPs) in human proteins. These five command-line driven tools, as well as all the supporting programs, complement those that run our AUTO-MUTE web-based server. Nevertheless, all the codes have been rewritten and substantially altered for the new portable software, and they incorporate several new features based on user feedback. Included among these upgrades is the ability to perform three highly requested tasks: to run “big data” batch jobs; to generate predictions using modified protein data bank (PDB) structures, and unpublished personal models prepared using standard PDB file formatting; and to utilize NMR structure files that contain multiple models.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography