Academic literature on the topic 'SIGNATURE FILES'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SIGNATURE FILES.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SIGNATURE FILES"

1

Faloutsos, Chris. "Signature files." ACM SIGMOD Record 14, no. 4 (May 1985): 63–82. http://dx.doi.org/10.1145/971699.318903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Yangjun. "Signature files and signature trees." Information Processing Letters 82, no. 4 (May 2002): 213–21. http://dx.doi.org/10.1016/s0020-0190(01)00266-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Tong, Wenbin Chen, Yi Tang, and Hongyang Yan. "A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT." Security and Communication Networks 2018 (June 14, 2018): 1–6. http://dx.doi.org/10.1155/2018/9641273.

Full text
Abstract:
As a method for increasing throughput and improving reliability of routing, network coding has been widely used in decentralized IoT systems. When files are shared in the system, network coding signature techniques can help authenticate whether a modified packet in files is injected or not. However, in an IoT system, there are often multiple source devices each of which has its own authentication key, where existing single-source network coding signature schemes cannot work. In this paper, we study the problem of designing secure network coding signatures in the network with multiple sources and propose the multisource homomorphic network coding signature. We also give construction and prove its security.
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Z., and C. Faloutsos. "Frame-sliced signature files." IEEE Transactions on Knowledge and Data Engineering 4, no. 3 (June 1992): 281–89. http://dx.doi.org/10.1109/69.142018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Zheng. "Concurrent frame signature files." Distributed and Parallel Databases 1, no. 3 (July 1993): 231–49. http://dx.doi.org/10.1007/bf01263332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Moshood Abiola, Alogba, and Mohd Fadzli Marhusin. "Signature-Based Malware Detection Using Sequences of N-grams." International Journal of Engineering & Technology 7, no. 4.15 (October 7, 2018): 120. http://dx.doi.org/10.14419/ijet.v7i4.15.21432.

Full text
Abstract:
The focus of our study is on one set of malware family known as Brontok worms. These worms have long been a huge burden to most Windows-based user platforms. A prototype of the antivirus was able to scan files and accurately detect any traces of the Brontok malware signatures in the scanned files. In this study, we developed a detection model by extracting the signatures of the Brontok worms and used an n-gram technique to break down the signatures. This process makes the task to remove redundancies between the signatures of the different types of Brontok malware easier. Hence, it was used in this study to accurately differentiate between the signatures of both malicious and normal files. During the experiment, we have successfully detected the presence of Brontok worms while correctly identifying the benign ones. The techniques employed in the experiment provided some insight on creating a good signature-based detector, which could be used to create a more credible solution that eliminates any threats of old malware that may resurface in the future.
APA, Harvard, Vancouver, ISO, and other styles
7

Zobel, Justin, Alistair Moffat, and Kotagiri Ramamohanarao. "Inverted files versus signature files for text indexing." ACM Transactions on Database Systems 23, no. 4 (December 1998): 453–90. http://dx.doi.org/10.1145/296854.277632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zezula, P., F. Rabitti, and P. Tiberio. "Dynamic partitioning of signature files." ACM Transactions on Information Systems 9, no. 4 (October 1991): 336–67. http://dx.doi.org/10.1145/119311.119313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Grandi, Fabio. "On the signature weight in “multiple” m signature files." ACM SIGIR Forum 29, no. 1 (March 21, 1995): 20–25. http://dx.doi.org/10.1145/207556.207560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bastian, Alvian. "Improving Antivirus Signature For Detection Ransomware Attacks With Machine Learning." Smart Comp :Jurnalnya Orang Pintar Komputer 10, no. 1 (January 20, 2021): 30–34. http://dx.doi.org/10.30591/smartcomp.v10i1.2190.

Full text
Abstract:
Cybercrime activities are difficult separate from the development of malware. In Internet Security Threat Report, crime by exploiting malware becomes the ultimate crime. One of the highest spreading malwares is ransomware. Ransomware infections has increased year by year since 2013 and there are 1,271 detections for one day in 2017. Meanwhile, in 2018 there was a shift in attacks where 81 percent of attacks targeted enterprise so that ransomware infections increased by 12 percent. For solve this problem, this research proposed antivirus signature based on DLL Files and API Calls of ransomware files. Detection files based on antivirus signature has high theoretical value and practical significance. The experiment showed detection ransomware files based on DLL Files and functional API Calls with machine learning have a good result than detection files based on MD5 and hexdump. For testing and detection ransomware files, this research is using machine learning algorithms such as KNN, SVM, Decision Trees, and Random Forest. Experiment result showed the successful detection ransomware files, improved detection object and method research for antivirus signature.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "SIGNATURE FILES"

1

ABEYSINGHE, RUVINI PRADEEPA. "SIGNATURE FILES FOR DOCUMENT MANAGEMENT." University of Cincinnati / OhioLINK, 2001. http://rave.ohiolink.edu/etdc/view?acc_num=ucin990539054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ren, Liming. "Document ranking on weight-partitioned signature files /." The Ohio State University, 1998. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487950658546617.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Leng, Chun-Wu. "Design and performance evaluation of signature files for text retrieval systems /." The Ohio State University, 1990. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487685204967976.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chappell, Timothy A. "Scalable document hashing and retrieval." Thesis, Queensland University of Technology, 2015. https://eprints.qut.edu.au/90044/1/Timothy_Chappell_Thesis.pdf.

Full text
Abstract:
This thesis studies document signatures, which are small representations of documents and other objects that can be stored compactly and compared for similarity. This research finds that document signatures can be effectively and efficiently used to both search and understand relationships between documents in large collections, scalable enough to search a billion documents in a fraction of a second. Deliverables arising from the research include an investigation of the representational capacity of document signatures, the publication of an open-source signature search platform and an approach for scaling signature retrieval to operate efficiently on collections containing hundreds of millions of documents.
APA, Harvard, Vancouver, ISO, and other styles
5

Goldman, Aaron David. "CCFS cryptographically curated file system." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54394.

Full text
Abstract:
The Internet was originally designed to be a next-generation phone system that could withstand a Soviet attack. Today, we ask the Internet to perform tasks that no longer resemble phone calls in the face of threats that no longer resemble Soviet bombardment. However, we have come to rely on names that can be subverted at every level of the stack or simply be allowed to rot by their original creators. It is possible for us to build networks of content that serve the content distribution needs of today while withstanding the hostile environment that all modern systems face. This dissertation presents the Cryptographically Curated File System (CCFS), which offers five properties that we feel a modern content distribution system should provide. The first property is Strong Links, which maintains that only the owner of a link can change the content to which it points. The second property, Permissionless Distribution, allows anyone to become a curator without dependence on a naming or numbering authority. Third, Independent Validation arises from the fact that the object seeking affirmation need not choose the source of trust. Connectivity, the fourth property, allows any curator to delegate and curate the right to alter links. Each curator can delegate the control of a link and that designee can do the same, leaving a chain of trust from the original curator to the one who assigned the content. Lastly, with the property of Collective Confidence, trust does not need to come from a single source, but can instead be an aggregate affirmation. Since CCFS embodies all five of these properties, it can serve as the foundational technology for a more robust Web. CCFS can serve as the base of a web that performs the tasks of today’s Web, but also may outperform it. In the third chapter, we present a number of scenarios that demonstrate the capacity and potential of CCFS. The system can be used as a publication platform that has been re-optimized within the constraints of the modern Internet, but not the constraints of decades past. The curated links can still be organized into a hierarchical namespace (e.g., a Domain Naming System (DNS)) and de jure verifications (e.g., a Certificate Authority (CA) system), but also support social, professional, and reputational graphs. This data can be distributed, versioned, and archived more efficiently. Although communication systems were not designed for such a content-centric system, the combination of broadcasts and point-to-point communications are perfectly suited for scaling the distribution, while allowing communities to share the burdens of hosting and maintenance. CCFS even supports the privacy of friend-to-friend networks without sacrificing the ability to interoperate with the wider world. Finally, CCFS does all of this without damaging the ability to operate search engines or alert systems, providing a discovery mechanism, which is vital to a usable, useful web. To demonstrate the viability of this model, we built a research prototype. The results of these tests demonstrate that while the CCFS prototype is not ready to be used as a drop-in replacement for all file system use cases, the system is feasible. CCFS is fast enough to be usable and can be used to publish, version, archive, and search data. Even in this crude form, CCFS already demonstrates advantages over previous state-of-the-art systems. When the Internet was designed, there were relatively fewer computers that were far weaker than the computers we have now. They were largely connected to each other over reliable connections. When the Internet was first created, computing was expensive and propagation delay was negligible. Since then, the propagation delay has not improved on a Moore’s Law Curve. Now, latency has come to dominate all other costs of retrieving content; specifically, the propagation time has come to dominate the latency. In order to improve the latency, we are paying more for storage, processing, and bandwidth. The only way to improve propagation delay is to move the content closer to the destination. In order to have the content close to the demand, we store multiple copies and search multiple locations, thus trading off storage, bandwidth, and processing for lower propagation delay. The computing world should re-evaluate these trade-offs because the situation has changed. We need an Internet that is designed for the technologies used today, rather than the tools of the 20th century. CCFS, which regards the trade-off for lower propagation delay, will be better suited for 21st-century technologies. Although CCFS is not preferable in all situations, it can still offer tremendous value. Better robustness, performance, and democracy make CCFS a contribution to the field. Robustness comes from the cryptographic assurances provided by the five properties of CCFS. Performance comes from the locality of content. Democracy arises from the lack of a centralized authority that may grant the right of Free Speech only to those who espouse rhetoric compatible with their ideals. Combined, this model for a cryptographically secure, content-centric system provides a novel contribution to the state of communications technology and information security.
APA, Harvard, Vancouver, ISO, and other styles
6

Ligozio, Kevin. "Jini distributed key exchange and file transfer service with digital signatures /." Online version of thesis, 2004. https://ritdml.rit.edu/dspace/handle/1850/2812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Monacelli, Brian. "SPECTRAL SIGNATURE MODIFICATION BY APPLICATION OF INFRARED FREQUENCY-SELECTIVE SURFACES." Doctoral diss., University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3534.

Full text
Abstract:
It is desirable to modify the spectral signature of a surface, particularly in the infrared (IR) region of the electromagnetic spectrum. To alter the surface signature in the IR, two methods are investigated: thin film application and antenna array application. The former approach is a common and straightforward incorporation of optically-thin film coatings on the surface designated for signature modification. The latter technique requires the complex design of a periodic array of passive microantenna elements to cover the surface in order to modify its signature. This technology is known as frequency selective surface (FSS) technology and is established in the millimeter-wave spectral regime, but is a challenging technology to scale for IR application. Incorporation of thin films and FSS antenna elements on a surface permits the signature of a surface to be changed in a deterministic manner. In the seminal application of this work, both technologies are integrated to comprise a circuit-analog absorbing IR FSS. The design and modeling of surface treatments are accomplished using commercially-available electromagnetic simulation software. Fabrication of microstructured antenna arrays is accomplished via microlithographic technology, particularly using an industrial direct-write electron-beam lithography system. Comprehensive measurement methods are utilized to study the patterned surfaces, including infrared spectral radiometry and Fourier-transform infrared spectrometry. These systems allow for direct and complementary spectral signature measurements--the radiometer measures the absorption or emission of the surface, and the spectrometer measures its transmission and reflection. For the circuit-analog absorbing square-loop IR FSS, the spectral modulation in emission is measured to be greater than 85% at resonance. Other desirable modifications of surface signature are also explored; these include the ability to filter radiation based on its polarization orientation and the ability to dynamically tune the surface signature. An array of spiral FSS elements allows for circular polarization conditioning. Three techniques for tuning the IR FSS signature via voltage application are explored, including the incorporation of a pn junction substrate, a piezoelectric substrate and a liquid crystal superstrate. These studies will ignite future explorations of IR FSS technology, enabling various unique applications.
Ph.D.
Other
Optics and Photonics
Optics
APA, Harvard, Vancouver, ISO, and other styles
8

Caviglia, Karen. "Signature file access methodologies for text retrieval : a literature review with additional test cases /." Online version of thesis, 1987. http://hdl.handle.net/1850/10144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

da, Silva Jose Carlos P. B. T. "The role of surface films in ERS SAR signatures of internal waves on the Iberian shelf." Thesis, University of Southampton, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.242189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tang, W., and A. F. Arellano. "Investigating dominant characteristics of fires across the Amazon during 2005-2014 through satellite data synthesis of combustion signatures." AMER GEOPHYSICAL UNION, 2017. http://hdl.handle.net/10150/623090.

Full text
Abstract:
Estimates of fire emissions remain uncertain due to limited constraints on the variations in fire characteristics. Here we demonstrate the utility of space-based observations of smoke constituents in addressing this limitation. We introduce a satellite-derived smoke index (SI) as an indicator of the dominant phase of large-scale fires. This index is calculated as the ratio of the geometric mean of observed fractional enhancements (due to fire) in carbon monoxide and aerosol optical depth to that of nitrogen dioxide. We assess the usefulness of this index on fires in the Amazon. We analyze the seasonal, regional, and interannual joint distribution of SI and fire radiative power (FRP) in relation to fire hotspots, land cover, Drought Severity Index, and deforestation rate estimates. We also compare this index with an analogous quantity derived from field data or emission inventories. Our results show that SI changes from low (more flaming) to high (more smoldering) during the course of a fire season, which is consistent with the changes in observed maximum FRPs from high to low. We also find that flaming combustion is more dominant in areas where deforestation fires dominate, while smoldering combustion has a larger influence during drought years when understory fires are more likely enhanced. Lastly, we find that the spatiotemporal variation in SI is inconsistent with current emission inventories. Although we recognize some limitations of this approach, our results point to the utility of SI as a proxy for overall combustion efficiency in the parameterization of fire emission models.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "SIGNATURE FILES"

1

Faloutsos, Christos. Signature files: an access method for textual messages. Toronto: University of Toronto, Dept. of Computer Science, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Films of Nabyendu: Signature of humanism. Kolkata: Pradip Biswas, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rivera, Christine. Signature. New York: Wiley, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rivera, Christine. Signature: Command reference. New York: Wiley, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Campbell, Arthur R. G. XyWrite 4 macros. New York: Windcrest/McGraw-Hill, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Ann G. Laboratory determination of signature criteria for locating and monitoring abandoned mine fires. Washington, D.C: U.S. Dept. of the Interior, Bureau of Mines, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Faloutsos, Christos. Signature files: an access method for textual messages. 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Signature Series: Microsoft Word 2013 - Text with Data Files CD. Kendall Hunt Publishing Company, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Design and performance evaluation of signature files for text retrieval systems. Ann Arbor, Mich: University Microfilms International, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Files From The Colby Agency: The Bodyguard's Baby\Protective Custody (Select Signature Miniseries). Harlequin, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "SIGNATURE FILES"

1

Nascimento, Mario A. "Signature Files." In Encyclopedia of Database Systems, 2642–46. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_1138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nascimento, Mario A. "Signature Files." In Encyclopedia of Database Systems, 1–5. New York, NY: Springer New York, 2017. http://dx.doi.org/10.1007/978-1-4899-7993-3_1138-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nascimento, Mario A. "Signature Files." In Encyclopedia of Database Systems, 3491–95. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_1138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sung, Sam Y. "Performance analysis of superimposing-coded signature files." In Foundations of Data Organization and Algorithms, 115–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/3-540-57301-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

André-Jönsson, Henrik, and Dushan Z. Badal. "Using signature files for querying time-series data." In Principles of Data Mining and Knowledge Discovery, 211–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63223-9_120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ciaccia, Paolo. "Optimal multi-block read schedules for partitioned signature files." In Advances in Database Technology — EDBT '96, 241–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/bfb0014156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Furuse, Kazutaka, Kazushige Asada, and Atsushi Iizawa. "Implementation and performance evaluation of compressed bit-sliced signature files." In Lecture Notes in Computer Science, 164–77. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60584-3_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kitagawa, Hiroyuki, Yoshiaki Fukushima, Yoshiharu Ishikawa, and Nobuo Ohbo. "Estimation of false drops in set-valued object retrieval with signature files." In Foundations of Data Organization and Algorithms, 146–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/3-540-57301-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Yangjun, and Karl Aberer. "Combining Pat-Trees and Signature Files for Query Evaluation in Document Databases." In Lecture Notes in Computer Science, 473–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48309-8_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Panagopoulos, George, and Christos Faloutsos. "Bit-sliced signature files for very large text databases on a parallel machine architecture." In Advances in Database Technology — EDBT '94, 379–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-57818-8_65.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SIGNATURE FILES"

1

Faloutsos, Chris. "Signature files." In the 1985 ACM SIGMOD international conference. New York, New York, USA: ACM Press, 1985. http://dx.doi.org/10.1145/318898.318903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Koçberber, Seyit, and Fazli Can. "Compressed multi-framed signature files." In the 1999 ACM symposium. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/298151.298253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Grandi, Fabio, Paolo Tiberio, and Pavel Zezula. "Frame-sliced partitioned parallel signature files." In the 15th annual international ACM SIGIR conference. New York, New York, USA: ACM Press, 1992. http://dx.doi.org/10.1145/133160.133211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ishikawa, Yoshiharu, Hiroyuki Kitagawa, and Nobuo Ohbo. "Evaluation of signature files as set access facilities in OODBs." In the 1993 ACM SIGMOD international conference. New York, New York, USA: ACM Press, 1993. http://dx.doi.org/10.1145/170035.170076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sacks-Davis, R., P. Wallis, and R. Wilkinson. "Using syntactic analysis in a document retrieval system that uses signature files." In the 13th annual international ACM SIGIR conference. New York, New York, USA: ACM Press, 1990. http://dx.doi.org/10.1145/96749.98219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Awodele, Oludele, Sunday Idowu, Omotola Anjorin, and Vincent Joshua. "A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS)." In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3370.

Full text
Abstract:
Ignoring security threats can have serious consequences; therefore host machines in network must continually be monitored for intrusions since they are the final endpoint of any network. As a result, this paper presents an Intelligent Intrusion Detection and Prevention System (IIDPS), which monitors a single host system from three different layers; files analyzer, system resource and connection layers. The approach introduced, a multi - layered approach, in which each layer harnesses both aspects of existing approach, signature and anomaly approaches, to achieve a better detection and prevention capabilities. The design of IIDPS consist of three basic components; the Executive which is an agent that runs in the background, iBaseline which is a database that stores the signatures of intrusions and the iManager which is a user Interface that serves as an intermediary between the IIDPS and the user. This work serves as a foundation upon which interested researchers can further build on to achieve better detection and prevention capabilities.
APA, Harvard, Vancouver, ISO, and other styles
7

Sharif, Amer, Dewi S. Ginting, and Arya D. Dias. "Securing the Integrity of PDF Files using RSA Digital Signature and SHA-3 Hash Function." In 2021 International Conference on Data Science, Artificial Intelligence, and Business Analytics (DATABIA). IEEE, 2021. http://dx.doi.org/10.1109/databia53375.2021.9650121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Khan, Ashraf, and Dariusz Ceglarek. "Distributed Sensor Optimization for Fault Diagnosis in Multi-Fixture Assembly Systems." In ASME 1998 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 1998. http://dx.doi.org/10.1115/imece1998-1042.

Full text
Abstract:
Abstract Sensing for the system-wide diagnosis of dimensional faults in multi-fixture sheet metal assembly presents significant issues of complexity due to the number of levels of assembly and the number of possible faults at each level. The traditional allocation of sensing at a single measurement station is no longer sufficient to guarantee adequate fault diagnostic information for the increased parts and levels of a complex assembly system architecture. This creates a need for an efficient distribution of limited sensing resources to multiple measurement locations in assembly. The proposed methodology achieves adequate diagnostic performance by configuring sensing to provide an optimally distinctive signature for each fault in assembly. A multi-level, two-step, hierarchical optimization procedure using problem decomposition, based on assembly structure data derived directly from CAD files, is used to obtain such a novel, distributed sensor configuration. Diagnosability performance is quantified in the form of a defined index, which serves the dual purpose of guiding the optimization and establishing the diagnostic worth of any candidate sensor distribution. Examples, using a multi-fixture layout, are presented to illustrate the methodology.
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Yangjun, and Yibin Chen. "Signature file hierarchies and signature graphs." In the 2004 ACM symposium. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/967900.968050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Patil, Aum, Amey Wadekar, Tanishq Gupta, Rohit Vijan, and Faruk Kazi. "Explainable LSTM Model for Anomaly Detection in HDFS Log File using Layerwise Relevance Propagation." In 2019 IEEE Bombay Section Signature Conference (IBSSC). IEEE, 2019. http://dx.doi.org/10.1109/ibssc47189.2019.8973044.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "SIGNATURE FILES"

1

Kidder, J. A., M. B. McClenaghan, M I Leybourne, M. W. McCurdy, P. Pelchat, D. Layton-Matthews, C. E. Beckett-Brown, and A. Voinot. Geochemical data for stream and groundwaters around the Casino Cu-Au-Mo porphyry deposit, Yukon (NTS 115 J/10 and 115 J/15). Natural Resources Canada/CMSS/Information Management, 2022. http://dx.doi.org/10.4095/328862.

Full text
Abstract:
This open file reports geochemical data for stream and groundwater samples collected around the Casino porphyry Cu-Au-Mo deposit, one of the largest and highest-grade deposits of its kind in Canada. The calc-alkaline porphyry is hosted in a Late Cretaceous quartz monzonite and associated breccias in the unglaciated region of west central Yukon. Water chemistry around the deposit was investigated because: (i) the deposit has not yet been disturbed by mining; (ii) the deposit was known to have metal-rich waters in local streams; and (iii) the deposit has atypically preserved ore zones. Stream water samples were collected at 22 sites and groundwater samples were collected from eight sites. Surface and groundwaters around the Casino deposit are anomalous with respect to Cd (up to 5.4 µg/L), Co (up to 64 µg/L), Cu (up to 1657 µg/L), Mo (up to 25 µg/L), As (up to 17 µg/L), Re (up to 0.7 µg/L), and Zn (up to 354 µg/L) concentrations. The stable isotopes of O and H of the groundwaters are essentially identical to the surface waters and plot close to the local and global meteoric water lines, indicating that the waters represent modern recharge, consistent with the generally low salinities of all the waters (total dissolved solids range from 98 to 1320 mg/L). Sulfur and Sr isotopes are consistent with proximal waters interacting with the Casino rocks and mineralization; a sulfide-rich bedrock sample from the deposit has delta-34S = -1.2 permille and proximal groundwaters are only slightly heavier (-0.3 to 3.1 permille). These geochemical and isotopic results indicate that surface water geochemistry is a suitable medium for mineral exploration for porphyry-style mineralization in the Yukon, and similar unglaciated regions in Canada. The atypical geochemical signature (Mo, Se, Re, As, Cu) of these types of deposits are typically reflected in the water chemistry and S isotopes provide a more local vectoring tool.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography