Academic literature on the topic 'RESID (Computer program)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'RESID (Computer program).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "RESID (Computer program)"

1

Wasserman, L., and E. Bowell. "Astrometry with the Lowell PDS." Symposium - International Astronomical Union 109 (1986): 231–36. http://dx.doi.org/10.1017/s0074180900076622.

Full text
Abstract:
The Lowell Observatory PDS is currently used in several projects which necessitate astrometric reduction of photographic plates. To meet this need, we have developed a series of computer programs for astrometric data reduction which enable the user to obtain maximum flexibility from the PDS while at the same time retaining ease of use. In its simplest form our astrometric “package” consists of four separate programs. The first two constitute the “data taking” part of the process and reside on a DEC PDP 11/34, the computer which controls the PDS. The second two programs handle “data reduction” and reside on Lowell's general purpose computer, a DEC PDP 11/55.
APA, Harvard, Vancouver, ISO, and other styles
2

Grbich, Carol. "Computing Packages for Qualitative Data Management: What is Their Real Impact?" Australian Journal of Primary Health 4, no. 4 (1998): 98. http://dx.doi.org/10.1071/py98065.

Full text
Abstract:
Computer packages targeted at qualitative data are readily available and the methodology sections of research articles indicate that they are being utilised by some health researchers. The purpose of this article is to draw together concerns which have been expressed by researchers and critics and to place these within the perspective of 'framing' (MacLachlan & Reid, 1994). Here, the focus becomes the frame that these computer programs impose on qualitative data. Inevitably, all data sets are disturbed by the techniques of collection and the conceptual and theoretical frames imposed, but computer framing not only distorts physically but also imposes an often minimally acknowledged frame constructed by the metaphors and implicit ideology of the program. This frame is in opposition to most of the recent changes in qualitative data interpretation, which have emphasised context, thick description and exposure of the minimally disturbed voices of participants.
APA, Harvard, Vancouver, ISO, and other styles
3

NIgam, Gaurav Kumar. "SOFTWARE AUDIT SYSTEM." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 3 (November 30, 2012): 406–12. http://dx.doi.org/10.24297/ijct.v3i3a.2946.

Full text
Abstract:
To remotely monitor your computer over the internet, you have to install this software on the remote computer (called as server) as well as on your own computer (called as client). When connected , Software Audit System software gives you the full mouse and keyboard control over your computer and you can see the whole screen of the remote PC on your own desktop. As we know that computer networks within companies and organizations become more extensive and more complex, there is a considerable growth in the number of software programs that are installed and used on the computer systems. In order to increase the reliability and efficiency of computer Systems, it is mandatory that we clearly understand and control all the computer programs that are being used. The problem may also arise when people installing unauthorized or copied computer programs on their Desktop PC's. It is necessary that we provide auditing tools that can facilitate audit data either locally or reside on to a central network manager and it gives the information related to the installed and used computer programs
APA, Harvard, Vancouver, ISO, and other styles
4

Rathore, Kanishka Singh. "Gesture Controlled Music Player." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 15, 2021): 1185–89. http://dx.doi.org/10.22214/ijraset.2021.35167.

Full text
Abstract:
A music player is a computer program for playing audio files or songs encoded in MP3 format. This application will reside in the user's computer, such as iTunes, Windows Media Player and RealPlayer that are used to organize a music collection and play audio files. Our player provides an easy-to-use graphical user interface with symbols provided on the buttons to enable varied types of users to use the player efficiently. Along with the basic functionalities of a music player like playing, pausing, stopping and playing next or previous song, we have provided some interesting features which make our player intelligent. Hence, we have rightly named it ‘Brain Waves Music Player’. It has the ability to judge our sentiments and play the suitable songs accordingly. Also, the player can be controlled using gestures.
APA, Harvard, Vancouver, ISO, and other styles
5

Puttick, Gillian, Brian Drayton, and Joan Karp. "Digital Curriculum in the Classroom: Authority, Control, and Teacher Role." International Journal of Emerging Technologies in Learning (iJET) 10, no. 6 (December 16, 2015): 11. http://dx.doi.org/10.3991/ijet.v10i6.4825.

Full text
Abstract:
With greater online access and greater use of computers and tablets, educational materials are increasingly available digitally, and are soon predicted to become the standard for science classrooms. However, researchers have found that institutionalized structures and cultural factors in schools affect teacher uptake and integration of technology. Findings are sparse that detail the complexities of how teachers actually incorporate technology in their teaching as they negotiate the introduction of a new and potentially disruptive innovation. With respect to a digital curriculum in particular, teachers can be unclear about their role vis-a-vis the curriculum, as the "computer" potentially becomes an alternative source of authority in the classroom, and this can mean that the teacher is no longer in control. This paper reports on the implementation of two units of an innovative environmental science program, Biocomplexity and the Habitable Planet, as a digital curriculum. We discuss some of the lessons learned about the mix of challenges, anticipated and unanticipated, that confronted four high school teachers as they implemented the curriculum in their classrooms. We suggest that developers and users of digital curricula pay particular attention to how they envision where the authority for teaching and learning in the classroom should reside.
APA, Harvard, Vancouver, ISO, and other styles
6

Leavesley, P. J., and C. E. Knight. "An Analytical Model of Strength Loss in Filament Wound Spherical Vessels." Journal of Pressure Vessel Technology 109, no. 3 (August 1, 1987): 352–56. http://dx.doi.org/10.1115/1.3264877.

Full text
Abstract:
The potential strength degradation of a filament wound sphere was predicted using an incremental finite element model of the composite during fabrication. The sphere was modeled taking into account the winding pattern and the resulting internal layer boundaries. The thickness profile of the sphere’s layers were computed using a pattern simulation program. The total thickness profile and layer thickness profiles were used by the mesh generating program to ensure that the elements generated matched layer boundaries. The elements were isoparametric quadrilaterals which were collapsed to triangular elements for transitions. The main feature of the finite element program was the incremental construction and loading of the model to simulate the winding process. Strength degradation definitely occurs when the average fiber strain in any layer is negative. The negative strain means that all the winding tension has been lost from the layer, and the imposition of compressive strain causes fibers in uncured resin to wrinkle or buckle. Then when the resin cures the buckled region of fibers are degraded in strength. An analysis of a Kevlar/epoxy sphere demonstrated that strength degradation could occur. The innermost layers showed significant tension loss and compressive strain during fabrication which would produce strength degradation. The model sphere was a typical thick wall construction using normal processing conditions.
APA, Harvard, Vancouver, ISO, and other styles
7

Petrini, Morena, Silvia Di Lodovico, Giovanna Iezzi, Alessandro Cipollina, Adriano Piattelli, Luigina Cellini, and Simonetta D’Ercole. "Effects of Complex Electromagnetic Fields on Candida albicans Adhesion and Proliferation on Polyacrylic Resin." Applied Sciences 11, no. 15 (July 23, 2021): 6786. http://dx.doi.org/10.3390/app11156786.

Full text
Abstract:
(1) Background: The objectives of this study were to evaluate the effect of several sessions of the antibacterial protocol of complex electromagnetic fields (CMFs) on planktonic Candida albicans and fungal ability, after treatment with CMFs, to adhere and proliferate on acrylic resin materials. (2) Methods: Planktonic overnight cultures of Candida albicans were subjected to different entities of CMFs treatments. Four test groups were compared: “p1”: treated only with the first program of the antibacterial protocol; “p1–p5” subjected to the first five programs; “1 antibacterial” received one complete session of the protocol and “2 antibacterial” received two complete sessions. After the treatments, the number of colony forming units (CFUs) were recorded. Then, C. albicans broth cultures were cultivated on polyacrylic resin discs and evaluated for CFUs and subjected to scanning electron microscope (SEM) analysis. (3) Results: Microbiological analysis showed that CMFs promoted a significant reduction of C. albicans CFUs when the protocol “p1–p5” was applied. No statistically significant differences between test groups were observed if the time of exposure to CMFs was increased. SEM observations and CFUs showed that CMFs treatments have the ability to reduce C. albicans adherence and proliferation on discs. (4) Conclusions: The CMFs showed an antifungal effect as well as a decrease in C. albicans adhesion on polyacrylic resin.
APA, Harvard, Vancouver, ISO, and other styles
8

Krchňák, Viktor, Josef Vágner, and Ivan Hirsch. "Simultaneous synthesis of sequence-unrelated peptides derived from proteins of human papillomaviruses." Collection of Czechoslovak Chemical Communications 53, no. 11 (1988): 2645–53. http://dx.doi.org/10.1135/cccc19882645.

Full text
Abstract:
Amino acid sequences derived from the early (E) and late (L) coding regions of human papillomaviruses (HPV) type 6, 11, and 16 were analysed by means of a computer program for prediction of B-cell determinants. Eight peptides ranging from 9 to 17 amino acids and containing potential B-cell determinants were selected for synthesis. The peptides were synthesized by using a configuration for solid-phase synthesis that enables the simultaneous synthesis of several peptides in flow reactors at low pressure on standard poly(styrene-1% divinylbenzene)resin. Crude peptides were obtained in good yield and purity. They were then further purified by high-performance liquid chromatography for use as solid antigens in site-directed serology.
APA, Harvard, Vancouver, ISO, and other styles
9

Izaola, Zunbeltz, and Gotzon Madariaga. "DiXP: a Python-based GUI for controlling a powder diffractometerviathe Internet." Journal of Applied Crystallography 41, no. 2 (March 8, 2008): 481–82. http://dx.doi.org/10.1107/s0021889808000861.

Full text
Abstract:
DiXPis a multi-platform data collection program decoupled from low-level basic hardware management and based on the idea of client/server remote control. The main function ofDiXPis the sequential coordination of those basic operations, allowing different strategies for the collection, archiving and graphical representation of measured data.DiXPand the control software reside, in general, on different computers and communicate with one anotherviathe Internet using TCP sockets. The disconnection between low-level handling and the measurement process makesDiXPof general use for controlling a two-circle diffractometer, and this approach can be easily extended to more complex goniometers.
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Seong-Min, Keunbada Son, Duk-Yeon Kim, and Kyu-Bok Lee. "Digital Evaluation of the Accuracy of Computer-Guided Dental Implant Placement: An In Vitro Study." Applied Sciences 9, no. 16 (August 16, 2019): 3373. http://dx.doi.org/10.3390/app9163373.

Full text
Abstract:
Compared to traditional implant surgical guides, computer-assisted implant surgical guides can be considered for positioning implants in the final prosthesis. These computer-assisted implant surgical guides can be easily fabricated with personal 3D printers after being designed with implant planning CAD software. Although the accuracy of computer-assisted implant surgical guides fabricated using personal 3D printers is an important factor in their clinical use, there is still a lack of research examining their accuracy. Therefore, this study evaluated the accuracy of computer-assisted implant surgical guides, which were designed using two implant planning CAD software programs (Deltanine and R2gate software) and fabricated with personal 3D printers using a non-radiographic method. Amongst the patients who visited Kyungpook National University Dental Hospital, one patient scheduled to undergo surgery of the left mandibular second premolar was randomly selected. Twenty partially edentulous resin study models were produced using a 3D printer. Using the Deltanine and R2gate implant planning CAD software, 10 implant surgical guides per software were designed and produced using a personal 3D printer. The implants (SIII SA (Ø 4.0, L = 10 mm), Osstem, Busan, Korea) were placed by one skilled investigator using the computer-assisted implant surgical guides. To confirm the position of the actual implant fixture, the study models with the implant fixtures were scanned with a connected scan body to extract the STL files, and then overlapped with the scanned file by connecting the scan body-implant fixture complex. As a result, the mean apical deviation of the Deltanine and R2gate software was 0.603 ± 0.19 mm and 0.609 ± 0.18 mm, while the mean angular deviation was 1.97 ± 0.84° and 1.92 ± 0.52°, respectively. There was no significant difference between the two software programs (p > 0.05). Thus, the accuracy of the personal 3D printing implant surgical guides is in the average range allowed by the dental clinician.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "RESID (Computer program)"

1

Hightower, Richard, and Joseph D. Gradecki. Mastering Resin. Wiley, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gradecki, Joseph D., and Richard Hightower. Mastering Resin. Wiley & Sons, Incorporated, John, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "RESID (Computer program)"

1

Maglogiannis, Ilias, and Kostas Karpouzis. "Combining Synchronous and Asynchronous Distance Learning for Adult Training inMilitary Environments." In Cases on Global E-Learning Practices, 22–34. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-340-1.ch003.

Full text
Abstract:
A major issue problem in military training is the territorial dispersion of military personnel in a wide geographical area. Typically in every military training course, officers are gathered in training camps and attend the lessons. The specific model obliges officers to leave their position, their units to lose their ser-vices and is extremely costly, as the learners have to move and reside near the training camp during their training. The application of distance learning techniques seems in a position to solve such problems. The School of Research and Informatics of University of the Aegean (UoA), for Officers of the Greek Army in cooperation with the academic community in Greece studied the possibility of training military per-sonnel via a computer assisted distance-learning system and then implemented a pilot programme in Op-erational Business Management. The present chapter describes the results of this study, the experience acquired during the implementation and an overall assessment of the pilot program.
APA, Harvard, Vancouver, ISO, and other styles
2

Hamidi, H., and K. Mohammadi. "Modeling Fault Tolerant and Secure Mobile Agent Execution in Distributed Systems." In Mobile Computing, 2739–51. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-054-7.ch207.

Full text
Abstract:
A mobile agent is a software program which migrates from a site to another site to perform tasks assigned by a user. For the mobile agent system to support agents in various application areas, the issues regarding reliable agent execution, as well as compatibility between two different agent systems or secure agent migration, have been considered. Some of the proposed schemes are either replicating the agents (Hamidi & Mohammadi, 2005) or check-pointing the agents (Park, Byun, Kim, & Yeom, 2002; Pleisch & Schiper, 2001;) For a single agent environment without considering inter-agent communication, the performance of the replication scheme and the check-pointing scheme is compared in Park et al. (2002) and Silva, Batista, and Silva (2000). In the area of mobile agents, only few works can be found relating to fault tolerance. Most of them refer to special agent systems or cover only some special aspects relating to mobile agents, such as the communication subsystem. Nevertheless, most people working with mobile agents consider fault tolerance to be an important issue (Izatt, Chan, & Brecht, 1999; Shiraishi, Enokido, & Takzawa, 2003). Mobile agents are becoming a major trend for designing distributed systems and applications in the last few years and foreseeable future. It can bring benefits such as reduced network load and overcoming of network latency (Chan, Won, & Lyu, 1993). Nevertheless, security is one of the limiting factors of the development of these systems. The main unsolved security problem lies in the possible existence of malicious hosts that can manipulate the execution and data of agents (Defago, Schiper, & Sergent, 1998). Most distributed applications we see today are deploying the client/server paradigm. There are certain problems with the client/server paradigm, such as the requirement of a high network bandwidth, and continuous user-computer interactivity. In view of the deficiencies of the client/server paradigm, the mobile code paradigm has been developed as an alternative approach for distributed application design. In the client/server paradigm, programs cannot move across different machines and must run on the machines they reside on. The mobile code paradigm, on the other hand, allows programs to be transferred among and executed on different computers. By allowing code to move between hosts, programs can interact on the same computer instead of over the network. Therefore, communication cost can be reduced. Besides, mobile agent (Fischer, Lynch, & Paterson, 1983) programs can be designed to work on behalf of users autonomously. This autonomy allows users to delegate their tasks to the mobile agents, and not to stay continuously in front of the computer terminal. The promises of the mobile code paradigm bring about active research in its realization. Most researchers, however, agree that security concerns are a hurdle (Greenberg, Byington, & Harper, 1998). In this article, we investigate these concerns. First, we review some of the foundation materials of the mobile code paradigm. We elaborate Ghezzi and Vigna’s classification of mobile code paradigms (Ghezzi & Vigna, 1997), which is a collection of the remote evaluation, code on demand, and mobile agent approaches. In the next section, we address the current status of mobile code security. The following section presents the model for fault-tolerant mobile agent. In the next section, security issues of the mobile agent are discussed, and we discuss security modeling and evaluation for the mobile agent in the section after. In the following section, simulation results and influence of the size of agent are discussed. We then conclude the article.
APA, Harvard, Vancouver, ISO, and other styles
3

Merabti, Madjid, Paul Fergus, and Omar Abuelma’atti. "Networked Appliances and Home Networking." In Ubiquitous and Pervasive Computing, 171–80. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-960-1.ch015.

Full text
Abstract:
The Internet has revolutionised the way we access and disseminate information and changed the way we communicate with each other. More and more homes are Internet-enabled as people from all walks of life embrace this technology because of the benefits it brings. However, to date Internet usage has predominately focused on personal computing. This said, an interesting technological shift is taking place, whereby any device, irrespective of its capabilities or conventional usage, will form part of the Internet. These devices will reside at the edge of the Internet, thus enabling devices to exploit the power of Internet communications to interoperate devices and utilise the functions they provide. Researchers believe that this transition mirrors the evolutionary process undertaken within personal computing and wide-area communications, whereby it is difficult to imagine using a computer without Internet access. Given the success of this transition, home networking platforms aim to achieve the same level of acceptance. Already, our homes are populated by numerous electronic computing devices that form part of some network, be they TVs, PCs, set top boxes, or mobile phones, as illustrated in Figure 1. The difficulty is getting different devices, built to different specifications, to work together without changing their original characteristics or protocols. This will result in more complex systems, which will be a by-product of device heterogeneity and the dynamic nature associated with networks that resist any form of control. Putting complexity aside, there is, however, a need to promote this integration because these developments are too expensive and limiting for innovative applications. The downside is that the proliferation of home appliances and the complex functions they provide make it difficult for a specialist, let alone an ordinary home user, to configure and use them. Therefore, complexity needs to be abstracted using flexible solutions that allow for better exploitation of devices and the functions they provide. This new interconnected world will enable devices to automatically integrate and interoperate themselves within the network. It will provide access to a plethora of online services, such as digital radio, programme guides, on-demand TV, online gaming, as well as ad hoc services capable of enhancing or extending the functional capabilities devices support beyond what they where initially designed to do. that is clear is that we are at a crossroads whereby the ability to effectively manage next generation homes and the interconnected devices they contain will be highly dependent on how we utilise the Internet, Internet technologies, and the IT sector. This is a vision shared by many research communities.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "RESID (Computer program)"

1

Kolavennu, Soumitri, Wendy Foslien, Anoop Mathur, and Sanjay Parthasarathy. "Design for Control and Optimization of Flow Front Progression in Liquid Molding Processes." In ASME 2001 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/detc2001/dfm-21175.

Full text
Abstract:
Abstract The processing of composite materials has advanced from being a fine art to a well-studied science. The Advanced Materials Intelligent Processing Center (AMIPC) program demonstrates the use of process models, advanced technologies and data-centric algorithms to improve the quality and consistency of composites processing. As part of the AMIPC program, the Intelligent Process Control group at Honeywell developed a design environment for on-line control and disturbance rejection in Resin Transfer Molding process. In this paper we present a “design for control” methodology that proved to be a well suited for intelligent control of RTM processes. The major point addressed in this research is “Control issues need to be analyzed DURING process design”.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography