To see the other types of publications on this topic, follow the link: Turbo C (Computer file).

Journal articles on the topic 'Turbo C (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Turbo C (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Challab, DJ. "Turbo C++." Information and Software Technology 34, no. 9 (September 1992): 617–18. http://dx.doi.org/10.1016/0950-5849(92)90140-k.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ohyama, Nagaaki. "IS & C system and file protection mechanism." Computer Methods and Programs in Biomedicine 43, no. 1-2 (May 1994): 37–42. http://dx.doi.org/10.1016/0169-2607(94)90183-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

BAFTIU, Naim, and Samedin KRABAJ. "Creating Prototype Virus - Destroying Files and Texts on Any Computer." PRIZREN SOCIAL SCIENCE JOURNAL 3, no. 1 (April 26, 2019): 62. http://dx.doi.org/10.32936/pssj.v3i1.78.

Full text
Abstract:
When we study how viruses work and prevent them, we've developed a very simple application where we can see a prototype of a virus and virus function, as well as neutralizing a file if we want to break it down its structure at the level of the bits Purpose-Understand how a virus works by programming it in a high programming language. In our case, the C # programming language with the Visual Studio program that uses the .Net Framework. With the Windows Form Application module, the same application we are creating can also use it to neutralize a sentence if we know it is infected by interfering with the file we set up itself and by disrupting the system his Binary. Key words: Component, Virus, File, C# Programming, Visual Studio.
APA, Harvard, Vancouver, ISO, and other styles
4

Ferreira Lima, João Vicente, Issam Raïs, Laurent Lefèvre, and Thierry Gautier. "Performance and energy analysis of OpenMP runtime systems with dense linear algebra algorithms." International Journal of High Performance Computing Applications 33, no. 3 (August 9, 2018): 431–43. http://dx.doi.org/10.1177/1094342018792079.

Full text
Abstract:
In this article, we analyze performance and energy consumption of five OpenMP runtime systems over a non-uniform memory access (NUMA) platform. We also selected three CPU-level optimizations or techniques to evaluate their impact on the runtime systems: processors features Turbo Boost and C-States, and CPU Dynamic Voltage and Frequency Scaling through Linux CPUFreq governors. We present an experimental study to characterize OpenMP runtime systems on the three main kernels in dense linear algebra algorithms (Cholesky, LU, and QR) in terms of performance and energy consumption. Our experimental results suggest that OpenMP runtime systems can be considered as a new energy leverage, and Turbo Boost, as well as C-States, impacted significantly performance and energy. CPUFreq governors had more impact with Turbo Boost disabled, since both optimizations reduced performance due to CPU thermal limits. An LU factorization with concurrent-write extension from libKOMP achieved up to 63% of performance gain and 29% of energy decrease over original PLASMA algorithm using GNU C compiler (GCC) libGOMP runtime.
APA, Harvard, Vancouver, ISO, and other styles
5

Petkov, V., and N. Bakaltchev. "FIT, a computer program for decomposition of powder diffraction patterns and profile analysis of pair correlation functions." Journal of Applied Crystallography 23, no. 2 (April 1, 1990): 138–40. http://dx.doi.org/10.1107/s002188988901410x.

Full text
Abstract:
FIT is an interactive computer program for fitting analytical models to powder diffraction patterns and to pair correlation functions. FIT has been written in Turbo C and runs on IBM XT/AT or compatible personal computers.
APA, Harvard, Vancouver, ISO, and other styles
6

Ciric, Miroslav, and Svetozar Rancic. "Parsing in different languages." Facta universitatis - series: Electronics and Energetics 18, no. 2 (2005): 299–307. http://dx.doi.org/10.2298/fuee0502299c.

Full text
Abstract:
A compiler is a translator that accepts as input formatted source file or files, and produces as output a file that may be run directly on a computer. Given the same ANSI C++ compliant input file, two different ANSI C++ compliant compilers running on the same operating system produce two different executable programs that should execute in exactly the same way. To some degree, this is achieved by the standardization of the C++ language, but it is also possible because computer programming languages like C++ can be compiled using reliable technologies with long traditions and understood characteristics. LALR(k), as practical version of LR, is such reliable technology for parsing. Traditional LALR(1) tool YACC has proved his value during years of successful applications. Nowadays there are a few commercial and noncommercial alternatives that are very interesting and promising. This paper will examine some of the them with ability of parsing in different programming languages.
APA, Harvard, Vancouver, ISO, and other styles
7

Yang, Xiaolong, Jianchao Zheng, Zesong Fei, and Bin Li. "Optimal File Dissemination and Beamforming for Cache-Enabled C-RANs." IEEE Access 6 (2018): 6390–99. http://dx.doi.org/10.1109/access.2017.2775198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tripathy, S. "Review: Windows NT File System Internals: A Developer's Guide." Computer Bulletin 40, no. 5 (September 1, 1998): 31. http://dx.doi.org/10.1093/combul/40.5.31-c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Seitz, Kerry A., Theresa Foley, Serban D. Porumbescu, and John D. Owens. "Supporting Unified Shader Specialization by Co-opting C++ Features." Proceedings of the ACM on Computer Graphics and Interactive Techniques 5, no. 3 (July 25, 2022): 1–17. http://dx.doi.org/10.1145/3543866.

Full text
Abstract:
Modern unified programming models (such as CUDA and SYCL) that combine host (CPU) code and GPU code into the same programming language, same file, and same lexical scope lack adequate support for GPU code specialization, which is a key optimization in real-time graphics. Furthermore, current methods used to implement specialization do not translate to a unified environment. In this paper, we create a unified shader programming environment in C++ that provides first-class support for specialization by co-opting C++'s attribute and virtual function features and reimplementing them with alternate semantics to express the services required. By co-opting existing features, we enable programmers to use familiar C++ programming techniques to write host and GPU code together, while still achieving efficient generated C++ and HLSL code via our source-to-source translator.
APA, Harvard, Vancouver, ISO, and other styles
10

Eladawi, A. E., E. S. Gadelmawla, I. M. Elewa, and A. A. Abdel-Shafy. "An application of computer vision for programming computer numerical control machines." Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture 217, no. 9 (September 1, 2003): 1315–24. http://dx.doi.org/10.1243/095440503322420241.

Full text
Abstract:
Generation of the part programs, or tool paths, for products to be manufactured by computer numerical control (CNC) machines is very important. Many methods have been used to produce part programs, ranging from manual calculations to computer aided design/ manufacturing (CAD/CAM) systems. This work introduces a new technique for generating the part programs of existing products using the latest technology of computer vision. The proposed vision system is applicable for two-dimensional vertical milling CNC machines and is calibrated to produce both metric and imperial dimensions. Two steps are used to generate the part program. In the first step, the vision system is used to capture an image for the product to be manufactured. In the second step, the image is processed and analysed by software specially written for this purpose. The software CNCVision is fully written (in lab) using Microsoft Visual C++ 6.0. It is ready to run on any Windows environment. The CNCVision software processes the captured images and applies computer vision techniques to extract the product dimensions, then generates a suitable part program. All required information for the part program is calculated automatically, such as G-codes, X and Y coordinates of start-points and end-points, radii of arcs and circles and direction of arcs (clockwise or counterclockwise). The generated part program can be displayed on screen, saved to a file or sent to MS Word or MS Excel. In addition, the engineering drawing of the product can be displayed on screen or sent to AutoCAD as a drawing file.
APA, Harvard, Vancouver, ISO, and other styles
11

Roth, Yoann, Jean-Baptiste Doré, Laurent Ros, and Vincent Berg. "Coplanar Turbo-FSK: A Flexible and Power Efficient Modulation for the Internet-of-Things." Wireless Communications and Mobile Computing 2018 (August 28, 2018): 1–17. http://dx.doi.org/10.1155/2018/3072890.

Full text
Abstract:
As the Internet-of-Things (IoT) has expanded, multiple solutions have attempted to address the issues of the Low Power Wide Area (LPWA) networks physical layer. In a previous work, we proposed the Turbo-FSK, a constant envelope modulation with orthogonal alphabet that allows the receiver to operate at very low levels of power (high sensitivity performance) and very low levels of energy per bit Eb. The scheme was demonstrated to approach Shannon’s limit as close as 0.29 dB. However, the scheme lacks flexibility in terms of spectral efficiency (always lower than 10−1 bits/s/Hz), especially compared to the recently standardized Narrow-Band IoT (NB-IoT) solution. In this work, we propose an evolution of the initial scheme, so-called Coplanar Turbo-FSK (C-TFSK). In order to increase the spectral efficiency of the system, two new features are introduced: a modulation combining linear and orthogonal properties where only subsets of the alphabet are orthogonal and a puncturing mechanism. Several aspects of the scheme are then studied under asymptotic hypothesis, such as the influence of the linear component of the alphabet and the effects of puncturing. The high flexibility in terms of spectral efficiency, the short distance to Shannon’s limit, and the constant envelope property make the C-TFSK a serious contender for the physical layer of the IoT.
APA, Harvard, Vancouver, ISO, and other styles
12

NATHAN, N. MEENATCHI, CHANABASANAGOUDA S. PATIL, and J. P. IMMANUEL JAYAPRAKASH. "PC based new software developed to create an input pilot balloon data file to an alternative to Hand Held Data Logger (HHDL) for using PC based SAMEER Pibal computation software." MAUSAM 67, no. 2 (December 8, 2021): 499–504. http://dx.doi.org/10.54302/mausam.v67i2.1359.

Full text
Abstract:
Pilot balloon observatories of India Meteorological Department (IMD) are using Hand Held Data Logger (HHDL), manufactured by SAMEER, to compute upper air data since 2007. The HHDL, which is a sleek and microcontroller based battery operated unit, accepts all information through the numeric keypad pertaining to the PB ascent for raw file generation and pilot balloon data processing. The raw file can be transferred to computer system as an input file to PC based Pibal computation software. This software generates Pibal messages similar to HHDL in addition to National Data Centre (NDC) data format and monthly climate. In case of any failure of hardware, both HHDL & PC based Pibal computation software cannot be used. Therefore to overcome this problem, a PC based Pibal data keying software has been developed using visual C sharp. The new software, what is developed, creates an input file similar to HHDL; it was tested with PC based Pibal computation software which works successfully as an alternate in case of failure of HHDL & it’s hardware accessories
APA, Harvard, Vancouver, ISO, and other styles
13

Xie, Chuan, and Hong Wang. "The Design for Computer Monitoring System Based on Ethernet." Applied Mechanics and Materials 152-154 (January 2012): 1904–9. http://dx.doi.org/10.4028/www.scientific.net/amm.152-154.1904.

Full text
Abstract:
Ethernet computer monitor and control system is a new strategy subjecting to the problems existing in the Ethernet. The computer monitor and control system designed in this paper adopts C/S mode. It’s composed of client monitor software and server software. The five modules of the client monitor software are used to record the statistic analysis of the network usage state, the modification of the file information, the information of the running process, the information of the E-mail, and the use efficiency of CPU. The server software is in charge of collecting all kinds of information of client so that it is easy for the user to monitor and manage the host.
APA, Harvard, Vancouver, ISO, and other styles
14

Falco, C., N. Scarpato, G. Nappi, and S. Formisano. "Project of Computer-aided Management of Therapeutical Apheresis." International Journal of Artificial Organs 16, no. 5_suppl (May 1993): 185–86. http://dx.doi.org/10.1177/039139889301605s41.

Full text
Abstract:
The great increase in hemapheresis units activity that occurred during the last years caused the need for a computer-aided management (1, 2). We present a project for a data base system able to manage therapeutical apheresis (3). The program consists of five sections. a) Patient's file card: it allows to record anamnesis, examination and blood test results easily and under computer's guidance. b) Choice of therapeutic protocol: Therapeutic protocol is fixed in this section (device to be used, apheretic method, plasma volume to be processed, blood tests before and after apheresis). c) Procedures: It provides procedure's data entry and guides the operator during the treatment on the ground of therapeutical protocol. d) Data processing: It allows statistics on data placed in the data base. e) Registers: It includes both a general register and the possibility of search by disease, device and method.
APA, Harvard, Vancouver, ISO, and other styles
15

Kwak, Minkyung, and Youngho Cho. "A Novel Video Steganography-Based Botnet Communication Model in Telegram SNS Messenger." Symmetry 13, no. 1 (January 6, 2021): 84. http://dx.doi.org/10.3390/sym13010084.

Full text
Abstract:
In botnets, a bot master regularly sends command and control messages (C & C messages) to bots for various purposes, such as ordering its commands to bots and collecting critical data from bots. Although such C & C messages can be encrypted by cryptographic methods to hide them, existing botnet detection mechanisms could detect the existence of botnets by capturing suspicious network traffics between the bot master (or the C & C server) and numerous bots. Recently, steganography-based botnets (stego-botnets) have emerged to make C & C communication traffics look normal to botnet detection systems. In stego-botnets, every C & C message is embedded in a multimedia file, such as an image file by using steganography techniques and shared in Social Network Service (SNS) websites (such as Facebook) or online messengers (such as WeChat or KakaoTalk). Consequently, traditional botnet detection systems without steganography detection methods cannot detect them. Meanwhile, according to our survey, we observed that existing studies on the steganography botnet are limited to use only image steganography techniques, although the video steganography method has some obvious advantages over the image steganography method. By this motivation, in this paper, we study a video steganography-based botnet in Social Network Service (SNS) platforms. We first propose a video steganography botnet model based on SNS messengers. In addition, we design a new payload approach-based video steganography method (DECM: Divide-Embed-Component Method) that can embed much more secret data than existing tools by using two open tools VirtualDub and Stegano. We show that our proposed model can be implemented in the Telegram SNS messenger and conduct extensive experiments by comparing our proposed model with DECM with an existing image steganography-based botnet in terms of C & C communication efficiency and undetectability.
APA, Harvard, Vancouver, ISO, and other styles
16

Altomare, Angela, Corrado Cuocci, Carmelo Giacovazzo, Anna Moliterni, and Rosanna Rizzi. "QUALX: a computer program for qualitative analysis using powder diffraction data." Journal of Applied Crystallography 41, no. 4 (July 16, 2008): 815–17. http://dx.doi.org/10.1107/s0021889808016956.

Full text
Abstract:
QUALXis a new computer program for phase identification using powder diffraction data. It uses the Powder Diffraction File database, where a search for the phase best matching the experimental powder diffraction pattern is carried out. The program is characterized by a high level of automation: the traditional steps aimed at interpreting the experimental pattern before the search (background estimation, peak search, peak intensity evaluation) are executed automatically. The search may be carried outviaconstraints on compound name and/or chemical elements. In addition, several graphical options requested interactively enable the user to perform zero point correction evaluation,Kα2stripping and smoothing. The program, written in Fortran95 and C++, runs on PCs under the Windows XP operating system. It is supported by a very effective graphical interface.
APA, Harvard, Vancouver, ISO, and other styles
17

Oktaviani, Anisa, and Melwin Syafrizal. "GandCrab Ransomware Analysis on Windows Using Static Method." Buletin Ilmiah Sarjana Teknik Elektro 3, no. 2 (November 27, 2021): 163–75. http://dx.doi.org/10.12928/biste.v3i2.4884.

Full text
Abstract:
Malware-infected operating systems may experience system damage, files or loss of important data. Ransomware is a type of malware that works by attacking the internet network and then encrypting the victim's computer. So that the victim can access his computer again, the victim is asked to redeem (ransom) with some money in the form of Bitcoin. One of them is GandCrab. Gandcrab is a very powerful ransomware and only the creators of Gandcrab know the description of the encrypted files.Static analysis is done by importing malware samples into Virustotal, Dependency walker, PEStudio, Exeinfo PE, and PEexplorer tools to get the strings function, which will then be analyzed to find out how the GandCrab Ransomware works.This study analyzes the gandcrab ransomware malware using a static method. In the Virustotal tool, it was found that the malware sample file was detected as malware with a ratio of 60 out of 70 antimalware. Furthermore, it was found that GandCrab is in PE (portable executable) format, compiled using Microsoft Visual C++ and GndCrab accesses some DLL (dynamic link-library) functions. Sistem operasi yang terinfeksi malware dapat mengalami kerusakan sistem, file atau kehilangan data-data penting. Ransomware merupakan salah satu jenis malware yang bekerja dengan cara menyerang jaringan internet kemudian mengenkripsi komputer korban. Agar korban dapat mengakses komputernya lagi, korban diminta unutk menebus (ransom) dengan sejumlah uang dalam bentuk Bitcoin. Salah satunya yaitu GandCrab. Gandcrab merupakan ransomware yang sangat kuat dan hanya pembuat gandcrab yang mengetahui deskripsi dari file yang terenkripsi. Analisis statis dilakukan dengan mengimpor sample malware kedalam tools Virustotal, Dependency walker, PEStudio, Exeinfo PE, dan PEexplorer untuk mendapatkan fungsi strings yang kemudian strings tersebut akan dianalisa untuk mengetahui cara kerja dari GandCrab Ransomware. Penelitian ini melakukan analisis terhadap malware gandcrab ransomware dengan menggunakan metode statis. Pada tool Virustotal, didapatkan bahwa file sample malware terdeteksi sebagai malware dengan rasio 60 dari 70 antimalware. Selanjutnya ditemukan bahwa GandCrab berformat PE (portable executable), dikompilasi menggunakan Microsoft Visual C++ dan GandCrab mengakses beberapa fungsi DLL (dynamic link-library).
APA, Harvard, Vancouver, ISO, and other styles
18

Soutullo, S., E. Giancola, M. J. Jiménez, J. A. Ferrer, and M. N. Sánchez. "How Climate Trends Impact on the Thermal Performance of a Typical Residential Building in Madrid." Energies 13, no. 1 (January 3, 2020): 237. http://dx.doi.org/10.3390/en13010237.

Full text
Abstract:
Based on the European energy directives, the building sector has to provide comfortable levels for occupants with minimum energy consumption as well as to reduce greenhouse gas emissions. This paper aims to compare the impact of climate change on the energy performance of residential buildings in order to derive potential design strategies. Different climate file inputs of Madrid have been used to quantify comparatively the thermal needs of two reference residential buildings located in this city. One of them represents buildings older than 40 years built according to the applicable Spanish regulations prior to 1979. The other refers to buildings erected in the last decade under more energy-restrictive constructive regulations. Three different climate databases of Madrid have been used to assess the impact of the evolution of the climate in recent years on the thermal demands of these two reference buildings. Two of them are typical meteorological years (TMY) derived from weather data measured before 2000. On the contrary, the third one is an experimental file representing the average values of the meteorological variables registered in Madrid during the last decade. Annual and monthly comparisons are done between the three climate databases assessing the climate changes. Compared to the TMYs databases, the experimental one records an average air temperature of 1.8 °C higher and an average value of relative humidity that is 9% lower.
APA, Harvard, Vancouver, ISO, and other styles
19

Katiyar, Dr Ravindra Nath, and Sadhna Yadav. "Design A Mini Operating System Using Open Source System." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (August 31, 2022): 1424–34. http://dx.doi.org/10.22214/ijraset.2022.46432.

Full text
Abstract:
Abstract: COSMOS (C# Open Source Managed Operating System) Paper provides a framework and tool-chain to develop an OS purely in managed code (C# and VB .NET). Cosmos supports integration with Visual Studio, and therefore is much easier to use. However, the framework is not rich, and therefore, there is still a lot of work to be done on OS developer side (E.g., it does not support mouse, file system etc.) In this paper, a microkernel based OS is developed using COSMOS framework for x86 based computer systems. This paper demonstrates device driver (PS/2) pointing device and GUI System. Since Cosmos does not provide support file system, mouse, keyboard, we have designed appropriate drivers for screen, mouse and keyboard. We have developed Event handlers and drivers for each device.In this part, we have developed drivers for Hard Disk and RAM to detect them in order to achieve partial fulfilment. From the development of general purpose computers, software industry has also evolved. However, there is not much improvement in OS development, as compared with other fields of software world: while other fields are enjoying power of garbage collection, OS developers are still doing their job in classic languages like C, C++ and assembly. Although there has been some research work regarding this, none of them was successful. This project is an attempt to develop a mini OS in pure managed code, particularly C# and .NET Framework 4.0.
APA, Harvard, Vancouver, ISO, and other styles
20

Shim, Jaewoo, Kyeonghwan Lim, Seong-je Cho, Sangchul Han, and Minkyu Park. "Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework." Security and Communication Networks 2018 (June 20, 2018): 1–12. http://dx.doi.org/10.1155/2018/6280768.

Full text
Abstract:
Unity is the most popular cross-platform development framework to develop games for multiple platforms such as Android, iOS, and Windows Mobile. While Unity developers can easily develop mobile apps for multiple platforms, adversaries can also easily build malicious apps based on the “write once, run anywhere” (WORA) feature. Even though malicious apps were discovered among Android apps written with Unity framework (Unity apps), little research has been done on analysing the malicious apps. We propose static and dynamic reverse engineering techniques for malicious Unity apps. We first inspect the executable file format of a Unity app and present an effective static analysis technique of the Unity app. Then, we also propose a systematic technique to analyse dynamically the Unity app. Using the proposed techniques, the malware analyst can statically and dynamically analyse Java code, native code in C or C ++, and the Mono runtime layer where the C# code is running.
APA, Harvard, Vancouver, ISO, and other styles
21

Yang, Xiao Han, Di Suo, and Fuan Wen. "The General Embedded Kernel Simulation System Model." Advanced Materials Research 459 (January 2012): 58–62. http://dx.doi.org/10.4028/www.scientific.net/amr.459.58.

Full text
Abstract:
According to in-depth study of embedded system architecture and working principles, this paper proposes an embedded kernel simulation system model – Device Operation Interface (DOI) model based in the computer simulation theory. Furthermore, an embedded 8051 simulated kernel is designed and developed based on this model. The 8051 simulation system achieves loading, compiling and linking the C language source file, simulates the process of 8051 command execution and displays the results through interfaces. The DOI model contributes to the reuse in different experimental simulation platforms
APA, Harvard, Vancouver, ISO, and other styles
22

Ankali, Sanjay B., and Latha Parthiban. "Detection and Classification of Cross-language Code Clone Types by Filtering the Nodes of ANTLR-generated Parse Tree." International Journal of Intelligent Systems and Applications 13, no. 3 (June 8, 2021): 43–65. http://dx.doi.org/10.5815/ijisa.2021.03.05.

Full text
Abstract:
A complete and accurate cross-language clone detection tool can support software forking process that reuses the more reliable algorithms of legacy systems from one language code base to other. Cross-language clone detection also helps in building code recommendation system. This paper proposes a new technique to detect and classify cross-language clones of C and C++ programs by filtering the nodes of ANTLR-generated parse tree using a common grammar file, CPP14.g4. Parsing the input files using CPP14.g4 provides all the lexical and semantic information of input source code. Selective filtering of nodes performs serialization of two parse trees. Vector representation using term frequency inverse document frequency (TF-IDF) of the resultant tree is given as an input to cosine similarity to classify the clone types. Filtered parse tree of C and C++ increases the precision from 51% to 61%, and matching based on renaming the input/output expressions provides average precision of 91.97% and 95.37% for small scale and large scale repositories respectively. The proposed cross-language clone detection exhibits the highest precision of 95.37% in finding all types of clones (1, 2, 3 and 4) for 16,032 semantically similar clone pairs of C and CPP codes.
APA, Harvard, Vancouver, ISO, and other styles
23

Simonov, A., T. Weber, and W. Steurer. "Yell: a computer program for diffuse scattering analysisviathree-dimensional delta pair distribution function refinement." Journal of Applied Crystallography 47, no. 3 (May 29, 2014): 1146–52. http://dx.doi.org/10.1107/s1600576714008668.

Full text
Abstract:
Yell, a program for routine refinement of disorder models against single-crystal diffuse scattering data, is presented. The analysis is based on the three-dimensional delta pair distribution function (3D-ΔPDF) method, which provides direct access to interatomic correlations in real crystal structures. Substitutional, displacive and size-effect disorder models are covered. The input file format supports flexible usage of arithmetic expressions for constraining dependent parameter values. The program is designed to be run on desktop computers. By using an efficient fast-Fourier-transform-based diffuse scattering calculation algorithm, full least-square refinements of medium complexity disorder models may be performed within minutes or hours, even if the experimental diffuse scattering is represented by large and fine-sampled reciprocal space volumes. The program is written in C++ and the source code is distributed under the GPL licence. Binary distributions are currently available for Mac and Windows operating systems.
APA, Harvard, Vancouver, ISO, and other styles
24

Lee, Soohyun, Clara R. Bakker, Carl Vitzthum, Burak H. Alver, and Peter J. Park. "Pairs and Pairix: a file format and a tool for efficient storage and retrieval for Hi-C read pairs." Bioinformatics 38, no. 6 (January 3, 2022): 1729–31. http://dx.doi.org/10.1093/bioinformatics/btab870.

Full text
Abstract:
Abstract Summary As the amount of 3D chromosomal interaction data continues to increase, storing and accessing such data efficiently becomes paramount. We introduce Pairs, a block-compressed text file format for storing paired genomic coordinates from Hi-C data, and Pairix, an open-source C application to index and query Pairs files. Pairix (also available in Python and R) extends the functionalities of Tabix to paired coordinates data. We have also developed PairsQC, a collapsible HTML quality control report generator for Pairs files. Availability and implementation The format specification and source code are available at https://github.com/4dn-dcic/pairix, https://github.com/4dn-dcic/Rpairix and https://github.com/4dn-dcic/pairsqc.
APA, Harvard, Vancouver, ISO, and other styles
25

Lan, Divon, Ray Tobler, Yassine Souilmi, and Bastien Llamas. "Genozip: a universal extensible genomic data compressor." Bioinformatics 37, no. 16 (February 15, 2021): 2225–30. http://dx.doi.org/10.1093/bioinformatics/btab102.

Full text
Abstract:
Abstract We present Genozip, a universal and fully featured compression software for genomic data. Genozip is designed to be a general-purpose software and a development framework for genomic compression by providing five core capabilities—universality (support for all common genomic file formats), high compression ratios, speed, feature-richness and extensibility. Genozip delivers high-performance compression for widelyused genomic data formats in genomics research, namely FASTQ, SAM/BAM/CRAM, VCF, GVF, FASTA, PHYLIP and 23andMe formats. Our test results show that Genozip is fast and achieves greatly improved compression ratios, even when the files are already compressed. Further, Genozip is architected with a separation of the Genozip Framework from file-format-specific Segmenters and data-type-specific Codecs. With this, we intend for Genozip to be a general-purpose compression platform where researchers can implement compression for additional file formats, as well as new codecs for data types or fields within files, in the future. We anticipate that this will ultimately increase the visibility and adoption of these algorithms by the user community, thereby accelerating further innovation in this space. Availability and implementation Genozip is written in C. The code is open-source and available on http://www.genozip.com. The package is free for non-commercial use. It is distributed through the Conda package manager, github, and as a Docker container on DockerHub. Genozip is tested on Linux, Mac and Windows. Supplementary information Supplementary data are available at Bioinformatics online.
APA, Harvard, Vancouver, ISO, and other styles
26

Harrison, Reginald Langford, Stefan Bilbao, James Perry, and Trevor Wishart. "An Environment for Physical Modeling of Articulated Brass Instruments." Computer Music Journal 39, no. 4 (December 2015): 80–95. http://dx.doi.org/10.1162/comj_a_00332.

Full text
Abstract:
This article presents a synthesis environment for physical modeling of valved brass instrument sounds. Synthesis is performed using finite-difference time-domain methods that allow for flexible simulation of time-varying systems. Users have control over the instrument configuration as well as player parameters, such as mouth pressure, lip dynamics, and valve depressions, which can be varied over the duration of a gesture. This article introduces the model used in the environment, the development of code from prototyping in MATLAB and optimization in C, and the incorporation of the executable file in the Sound Loom interface of the Composers Desktop Project. Planned additions to the environment are then discussed. The environment binaries are available to download online along with example sounds and input files.
APA, Harvard, Vancouver, ISO, and other styles
27

Lai, Ziliang, Yansong Cui, Tonggang Zhao, and Qiang Wu. "Design of Three-Dimensional Virtual Simulation Experiment Platform for Integrated Circuit Course." Electronics 11, no. 9 (April 29, 2022): 1437. http://dx.doi.org/10.3390/electronics11091437.

Full text
Abstract:
The integrated circuit (IC) is a subject for which researchers need practical experience, but its experiment cost is high, the risk involved is high, and it is not easy to carry out experiments on a large scale. This paper designs a three-dimensional integrated circuit virtual experiment platform based on Unity3d. The platform uses the Unity3d and 3ds Max tools to build a three-dimensional model of instruments, equipment, electronic components, and ultra cleanroom laboratory scenes in an integrated circuit experiment. In addition, it uses C# script to develop the functions and three-dimensional simulation of general virtual instruments and equipment and deploys the experimental website using the frame of the jspxcms open source website. The experimental platform arranges the three-dimensional web file WebGL file in the cloud. Students can use video and text materials to acquire basic IC knowledge at any time and conduct IC virtual experiments safely, efficiently, and without constraints. At present, the platform has been tested and used in teaching and has received high praise and recognition from students.
APA, Harvard, Vancouver, ISO, and other styles
28

Ponomarev, I. V., and D. I. Strokin. "Steganographic Methods for Embedding and Detecting Hidden Messages Using GIF Images as Container Files." Izvestiya of Altai State University, no. 1(123) (March 18, 2022): 112–15. http://dx.doi.org/10.14258/izvasu(2022)1-18.

Full text
Abstract:
Over the past few decades, the development of new methods of storing, transferring, analyzing, and reproducing data has become increasingly important, considering the widespread development of information technologies and multimedia means. These methods also include means of ensuring the reliability, security, safety, and confidentiality of information when it is transmitted through various communication channels. Today, the fulfillment of the necessary data confidentiality requirements is developing in the direction of cryptography and steganography. The article discusses a method of ensuring data confidentiality by means of Digital Steganography, using GIF images as container files. The features of this method are considered, the main steps of the algorithm are described, and the resulting file is analyzed. The second part of the article studies a method that estimates the probability of hiding information in the blocks of a container file. This method utilizes Pearson’s goodness-of-fit test. A number of test tests of the algorithm have been carried out to check the efficiency of this method. As a result, a computer program has been created using the Microsoft Visual Studio 2019 Community programming environment and the C# programming language (.NET Framework).
APA, Harvard, Vancouver, ISO, and other styles
29

Anisya, Anisya. "Grafik Penentuan Komposisi Campuran Agregat Material Pengaspalan Jalan Memanfaatkan Metode Digital Differential Analyzer (DDA)." J-SAKTI (Jurnal Sains Komputer dan Informatika) 2, no. 2 (September 25, 2018): 221. http://dx.doi.org/10.30645/j-sakti.v2i2.85.

Full text
Abstract:
The more advanced technology can make it easier for someone to do their work. Included in it in terms of making graphics that can be done using computer assistance. Where computers can represent human work functions. This study aims to create an application graph for the determination of the composition of the aggregate mixture and provide the results of the calculation of the percentage of each aggregate and provide recommendations whether the composition of the aggregate mixture is feasible or not to be used. The results of this study are a graphical application for determining the value of the composition of the aggregate mixture. This application has been tested using DOSBox and TURBO C ++. Based on the results of these trials it can be concluded that the application of graphs to determine the value of aggregate mixture composition can be used as a tool for making graphs of aggregate mixtures and determining the value of aggregate composition and providing recommendations in the form of recommendations.
APA, Harvard, Vancouver, ISO, and other styles
30

McCarthy, Gregory J. "Laboratory Note. A LOTUS 1-2-3 Spreadsheet to Aid in Data Reduction for Publication of X-Ray Powder Diffraction Data." Powder Diffraction 3, no. 1 (March 1988): 39–40. http://dx.doi.org/10.1017/s0885715600013105.

Full text
Abstract:
My students and I have developed a LOTUS 1-2-3 spreadsheet to aid in data reduction tasks associated with preparing powder diffraction data for publication in the Powder Diffraction File (PDF) (1987) and this journal. Portions of a sample spreadsheet and the formulae in each of the computational cells are given in the Table 1. The concept of this spreadsheet should apply to any of the available computer spreadsheet programs, although the specific codes for the mathematical functions may differ.The user enters data only into columns C, D and F-H. All other entries will be calculated from the input data. Observed 2θ angles are entered into column D. The corresponding d-spacing is calculated in column A. The Miller indices of these peaks are entered into column C. Prior to use of the spreadsheet, the observed 2θ angles and hkl's had been used to refine unit cell parameters using the Appleman and Evans (1973) least squares unit cell parameter refinement computer program implemented for the IBM PC by Garvey (1986).
APA, Harvard, Vancouver, ISO, and other styles
31

R. Kolhe, Prakash, and Pradip P. Kolhe. "ICT Tool : Development of Calculator." Oriental journal of computer science and technology 9, no. 1 (April 5, 2016): 30–35. http://dx.doi.org/10.13005/ojcst/901.06.

Full text
Abstract:
Henry David said “Men Have Become the Tools of Their Tools.” In this era all the developing technology begin from calculation influenced by the computer programming ICT-tool. Today energy is main problem, by utilizing sun light energy(solar energy) problem can be minimize. Sun drying is still the most common method used to preserve agricultural products in most tropical and subtropical countries. However, being unprotected from rain, wind-borne dirt and dust, infestation by insects, rodents and other animal, products may be seriously degraded to the extent that sometimes become inedible and the resulted loss of food quality in the dried products may have adverse economic effects on domestics and international markets. The conditions in tropical countries make the use of solar energy for drying food practically attractive and environmentally sound. Dryers have been developed and used to dry agricultural products in order to improve shelf life. Solar drying facilities are economical for small holders, especially under favourable meteorological conditions. This paper discuss to design to calculate design of solar dryer. In this different parameters are determined i.e Moisture removed, Water activity, Equilibrium Relative humidity, Total Heat Needed, Enthalpy, Average Drying rate, Drying time, Collector area, Length of air vent, Velocity required. The calculator was developed using C language Version 3.0 Turbo c++ copyright (c)1990, 1992 by Borland International was developed.
APA, Harvard, Vancouver, ISO, and other styles
32

Cui, Shujie, Xiangfu Song, Muhammad Rizwan Asghar, Steven D. Galbraith, and Giovanni Russello. "Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage." ACM Transactions on Privacy and Security 24, no. 3 (August 31, 2021): 1–35. http://dx.doi.org/10.1145/3446920.

Full text
Abstract:
Searchable Encryption (SE) is a technique that allows Cloud Service Providers to search over encrypted datasets without learning the content of queries and records. In recent years, many SE schemes have been proposed to protect outsourced data. However, most of them leak sensitive information, from which attackers could still infer the content of queries and records by mounting leakage-based inference attacks, such as the count attack and file-injection attack . In this work, first we define the leakage in searchable encrypted databases and analyse how the leakage is leveraged in existing leakage-based attacks. Second, we propose a <underline>P</underline>rivacy-preserving <underline>M</underline>ulti-<underline>c</underline>loud based dynamic symmetric SE scheme for relational <underline>D</underline>ata<underline>b</underline>ase ( P-McDb ). P-McDb has minimal leakage, which not only ensures confidentiality of queries and records but also protects the search, intersection, and size patterns. Moreover, P-McDb ensures both forward and backward privacy of the database. Thus, P-McDb could resist existing leakage-based attacks, e.g., active file/record-injection attacks. We give security definition and analysis to show how P-McDb hides the aforementioned patterns. Finally, we implemented a prototype of P-McDb and tested it using the TPC-H benchmark dataset. Our evaluation results show that users can get the required records in 2.16 s when searching over 4.1 million records.
APA, Harvard, Vancouver, ISO, and other styles
33

Pockrandt, Christopher, Martin Steinegger, and Steven L. Salzberg. "PhyloCSF++: a fast and user-friendly implementation of PhyloCSF with annotation tools." Bioinformatics 38, no. 5 (November 4, 2021): 1440–42. http://dx.doi.org/10.1093/bioinformatics/btab756.

Full text
Abstract:
Abstract Summary PhyloCSF++ is an efficient and parallelized C++ implementation of the popular PhyloCSF method to distinguish protein-coding and non-coding regions in a genome based on multiple sequence alignments (MSAs). It can score alignments or produce browser tracks for entire genomes in the wig file format. Additionally, PhyloCSF++ annotates coding sequences in GFF/GTF files using precomputed tracks or computes and scores MSAs on the fly with MMseqs2. Availability and implementation PhyloCSF++ is released under the AGPLv3 license. Binaries and source code are available at https://github.com/cpockrandt/PhyloCSFpp. The software can be installed through bioconda. A variety of tracks can be accessed through ftp://ftp.ccb.jhu.edu/pub/software/phylocsfpp/.
APA, Harvard, Vancouver, ISO, and other styles
34

Tangwe, Stephen, Michael Simon, Edson L. Meyer, Sampson Mwampheli, and Golden Makaka. "Performance optimization of an air source heat pump water heater using mathematical modelling." Journal of Energy in Southern Africa 26, no. 1 (March 23, 2015): 96–105. http://dx.doi.org/10.17159/2413-3051/2015/v26i1a2225.

Full text
Abstract:
In South Africa, there is an ongoing constraint on the electricity supply at the national grid to meet the demand. Eskom is implementing various measures such as the Integrated Demand Management and the promotion and encouragement of the use of energy efficient devices like an Air Source Heat pump (ASHP) water heater to replace the high electrical energy consuming conventional geysers for sanitary hot water production. The ASHP water heater market is fast gaining maturity. A critical mathematical model can lead to performance optimization of the systems that will further result in the conservation of energy and significant reduction in global warming potential. The ASHP water heater comprises of an ASHP unit and a hot water storage tank. In this study, a data acquisition system (DAS) was designed and built which monitored the energy used by the geyser and the whole building, the temperature at the evaporator, condenser, tank outlet hot water, tank inlet cold water, the ambient temperature and relative humidity in the vicinity of the ASHP evaporator. It is also worthy to mention that the DAS also included to a flow meter and two additional temperature sensors that measured the volume of water heated and inlet and outlet water temperature of the ASHP. This work focused on using the mathematical equation for the Coefficient of Performance (COP) of an ideal Carnot’s heat pump (CHP) water heater to develop basic computation in M-file of MATLAB software in order to model the system based on two reservoir temperatures: evaporator temperatures (Tevp) of 0°C to 40°C (approximated to ambient temperature, Ta) and condenser temperatures (TCon) set at 50°C, 55°C and 60°C (approximated to the hot water set temperature of 50°C, 55°C and 60°C) respectively. Finally, an analytical comparison of a CHP water heater to the practical ASHP water heater was conducted on a hot water set point temperature of 55°C. From the modelling results, it can be deduced that at 0°C Tevp, the COP was 5.96 and 2.63 for CHP and ASHP water heater respectively, at a hot water set temperature of 55°C. Above 20°C Tevp, the rate of change of COP increased exponentially for the ideal CHP system, but was constant at 0.01/°C for the practically modelled ASHP water heater.
APA, Harvard, Vancouver, ISO, and other styles
35

Barenghi, Livia, Alberto Barenghi, Carlo Cadeo, and Alberto Di Blasio. "Innovation by Computer-Aided Design/Computer-Aided Manufacturing Technology: A Look at Infection Prevention in Dental Settings." BioMed Research International 2019 (August 6, 2019): 1–15. http://dx.doi.org/10.1155/2019/6092018.

Full text
Abstract:
Recent data indicates limited awareness and compliance on infection prevention procedures by dental offices and by dental laboratories. Guidelines for infection prevention in dentistry have been published by Centres for Disease Control and Prevention since 2003; the section “IX-Special consideration” includes a subsection concerning the prevention in dental laboratories, but it has not been modernised in later versions to fit the needs of traditional and computer-aided technology. Traditional techniques required disinfecting items (impression, chewing waxes, and appliances) with well-suited products, which are also chosen for limiting impression changes or appliance deterioration. Effective procedures are available with difficulties. Some of these contain irritant or non-eco-friendly disinfectants. The transport of impression, to dental laboratories, is often delayed with limited precautions for limiting cross-infection. Gypsum casts are frequently contaminated mainly by bacteria and their antibiotic-resistant strains and even stored for long periods during dental implant supported restoration and orthodontic therapy, becoming a hidden source of infection. Nowadays, computer-aided design/computer-aided manufacturing technology seems to be an interesting way to promote both business and safety, being more comfortable for patients and more accurate than traditional technology. A further advantage is easier infection prevention since, for the most part, mainly digital impression and casts are not a source of cross-infection and the transport of contaminated items is reduced and limited to try-in stages. Nevertheless, a peculiar feature is that a digital electronic file is of course unalterable, but may be ruined by a computer virus. Additionally, the reconditioning of scanner tips is determinant for the optical characteristics and long term use of the scanner, but information for its reconditioning from producers is often limited. This study focuses on some critical points including (a) insufficient guidelines, (b) choice of proper procedure for scanner reconditioning, and (c) data protection in relation to patient privacy.
APA, Harvard, Vancouver, ISO, and other styles
36

Hopper, Douglas A., Troy T. Meinke, and Virginia S. Store. "786 PB 436 COMPARING ROSE RESPONSES TO VARIOUS ENVIRONMENTS USING THE ROSESIM COMPUTER GROWTH MODEL." HortScience 29, no. 5 (May 1994): 545e—545. http://dx.doi.org/10.21273/hortsci.29.5.545e.

Full text
Abstract:
The computer simulation model ROSESIM is based on `Royalty' rose (Rosa hybrida L.) growth response to 15 unique treatment combinations of photosynthetic photon flux (PPF), day temperature (DT), and night temperature (NT) under constant growth chamber conditions. Environmental factors are assumed constant over an entire day, but set points may vary over the duration of the crop. Anticipated values for factors may be read from an ASCII file, allowing a variety of strategies to be modeled and compared. A Valentine's Day crop senario compared 2 management strategies for crop development time and flower quality: [1] constant 24/17.1 DT/NT for the entire crop, or [2] 15 days warm 30/20C DT/NT to promote bud break, 10 days 20/15C DT/NT to promote stem caliper and leaf size, 10 days 25/18C DT/NT to promote bud development, and remaining time to flower 20/15C DT/NT to enhance flower size and color. PPF was increased gradually over crop time as would occur naturally for Dec. to Feb. Strategy [2] had longer stems (63 vs. 50 cm), similar stem and leaf dry weights, but less flower bud dry weight (1.0 vs. 1.6 g), while flowering 2 days earlier (41 vs. 43 days after pinch). c:\pm4\ash94h.pm 4
APA, Harvard, Vancouver, ISO, and other styles
37

Tasaki, Satoko, Naoki Komori, and Soshu Kirihara. "Fabrication of Oxide Ceramics Dendrites for Porous Electrodes by Using Stereolithography." Additional Conferences (Device Packaging, HiTEC, HiTEN, and CICMT) 2012, CICMT (September 1, 2012): 000152–57. http://dx.doi.org/10.4071/cicmt-2012-tp34.

Full text
Abstract:
Porous oxide ceramics such as zinc oxide are applied for dye sensitized solar cell. This device requires consideration of high surface area, mechanical strengths and porous networks. Thus, we focused on the dendrite structures constructed from micrometer order rods with coordination numbers of 4, 8, and 12. There perfectly controlled structures were fabricated by stereolithography. Variations of the aspect ratios (lattice length to diameter ratios) were adjusted to control the porosity in the range 50–80 vol. % by using computer graphic software. The dendrite models sliced into a series of cross sectional patterns with uniform thickness by using a stereolithographic file format convertor. These numerical data were transferred into the micro processing equipment. High viscosity slurry material was prepared by mixing oxide ceramic powder and photosensitive acrylic resin. This slurry was spread on a flat stage and smoothed. An ultraviolet laser beam was exposed over the deposited layer to create cross-sectional planes. Through layer-by-layer processes, solid components were fabricated. These precursors were dewaxed at 600°C for 2 h at a heating rate of 1.0°C/min and sintered at 1400°C for 2 h at a heating rate of 5.0°C/min in air. The oxide ceramics microstructure was observed using a scanning electron microscope.
APA, Harvard, Vancouver, ISO, and other styles
38

Dharmawardhana, Mahanama, Asanga Ratnaweera, and Gheorghe Oancea. "STEP-NC Compliant Intelligent CNC Milling Machine with an Open Architecture Controller." Applied Sciences 11, no. 13 (July 5, 2021): 6223. http://dx.doi.org/10.3390/app11136223.

Full text
Abstract:
A STEP-NC or ISO 14649 compliant machine controller is developed, using Open Architecture Control technology for a three-axis Computer Numerical Control milling machine in this research. The controller is developed on a Raspberry Pi single-board computer, using C++ language. This new development is proposed as a low-cost alternative to ISO6983 standard, ensuring continuous integration in the CAD/CAM/CNC chain in machining; thus, it broadens the spectrum of problems handled by conventional CNC systems. The new machine controller is intelligent enough to extract geometrical and manufacturing parameters, cutting tool data, and material data from the STEP-NC file. Accordingly, tool paths for machining can be generated in the controller itself. The shop floor level modification of parameters and the possibility of regeneration of new toolpaths is an added advantage of this new controller. The modified or improved version of the STEP-NC file can be sent back to the CAD/CAM system to close the CAD/CAM/CNC chain. Machine condition monitoring can be achieved by connecting sensors through an available slave I/O board. In the present development, the current drawn by each servo motor is fed back to the controller for cutting condition monitoring. A laboratory scale three-axis CNC milling machine is developed to test the performance of the newly developed controller. The accuracy of positioning, perpendicularity of axes and linearity of this machine are experimentally verified through standard tests. The STEP-NC compliance of the controller is tested and verified, using a STEP-NC program derived based on a sample program given in ISO 14649 standard.
APA, Harvard, Vancouver, ISO, and other styles
39

Grauke, L. J. "The Scientific Name of the Pecan." HortScience 20, no. 4 (August 1985): 629–30. http://dx.doi.org/10.21273/hortsci.20.4.629.

Full text
Abstract:
Abstract At the meeting of the Crop Advisory Committee for Pecans and Hickories held on 24 Sept. 1984 in Albany, Ga., a question was raised concerning the legitimate scientific name of the pecan tree. Two names are currently in use: Carya illinoensis (Wang.) K. Koch (3, 6, 7, 10, 12, 19) and Carya illinoinensis (Wang.) K. Koch (1, 2, 11, 18, 21). Current usage is heavily in favor of the former epithet. When the 2 names were used as key words in the BIOSIS Previews computer search file for articles written between 1977 and the present, 199 were retrieved under C. illinoensis, whereas only 1 was found under C. illinoinensis. Since Hortus Third uses the latter epithet, articles on pecan submitted for publication in horticultural journals are occassionally returned to their authors for revision. The purpose of this paper is to trace the history of the nomenclature of the pecan as it relates to this dispute and in the process, demonstrate that the strict rules of scientific nomenclature and common sense can both be satisfied by the use of the epithet Carya illinoensis.
APA, Harvard, Vancouver, ISO, and other styles
40

Muadzani, Alim, Oky Dwi Nurhayati, and Ike Pertiwi Windasari. "Penyisipan Media Teks dan Citra Menggunakan Teknik Steganografi pada Media Pembawa Citra Digital." Jurnal Teknologi dan Sistem Komputer 4, no. 3 (August 14, 2016): 470. http://dx.doi.org/10.14710/jtsiskom.4.3.2016.470-478.

Full text
Abstract:
Information has now become an important comodity in human life, with the rapid development of communications technology has enable people to communicate and exchange information more easily. Internet is very popular and used by billions users worldwide, the information passing through the internet is very large, and some certain people trying to get this information for profit. The information need to be secured to prevent the others to get the information that send through the internet, steganography can be used to hide the information before sending it and the receiver can recover the hidden data. Digital steganography using computer can use a variety of digital file, digital image file is one of them. With the infomation being hidden inside the image-carrier, the others will not aware about the hidden information. Application created using C# programming leanguage and the steganoraphy method using Least Significant Bit Insertion (LSBI). Microsoft Visual Studio used as Integrated Development Environtment (IDE) to code and design the user interface. Software develpment model using Extreme Programming, and the testing using black box method. Application designed to hide text or image inside an image-carrier and the hidden text or image can be recovered. The result of this research are an application that can hide text or image into image-carrier, and the hidden text or image can be recovered. Based on the testing application can run as expected and fulfill all the requirements.
APA, Harvard, Vancouver, ISO, and other styles
41

SHAHZAD, FAISAL, MARKUS WITTMANN, MORITZ KREUTZER, THOMAS ZEISER, GEORG HAGER, and GERHARD WELLEIN. "A SURVEY OF CHECKPOINT/RESTART TECHNIQUES ON DISTRIBUTED MEMORY SYSTEMS." Parallel Processing Letters 23, no. 04 (December 2013): 1340011. http://dx.doi.org/10.1142/s0129626413400112.

Full text
Abstract:
The road to exascale computing poses many challenges for the High Performance Computing (HPC) community. Each step on the exascale path is mainly the result of a higher level of parallelism of the basic building blocks (i.e., CPUs, memory units, networking components, etc.). The reliability of each of these basic components does not increase at the same rate as the rate of hardware parallelism. This results in a reduction of the mean time to failure (MTTF) of the whole system. A fault tolerance environment is thus indispensable to run large applications on such clusters. Checkpoint/Restart (C/R) is the classic and most popular method to minimize failure damage. Its ease of implementation makes it useful, but typically it introduces significant overhead to the application. Several efforts have been made to reduce the C/R overhead. In this paper we compare various C/R techniques for their overheads by implementing them on two different categories of applications. These approaches are based on parallel-file-system (PFS)-level checkpoints (synchronous/asynchronous) and node-level checkpoints. We utilize the Scalable Checkpoint/Restart (SCR) library for the comparison of node-level checkpoints. For asynchronous PFS-level checkpoints, we use the Damaris library, the SCR asynchronous feature, and application-based checkpointing via dedicated threads. Our baseline for overhead comparison is the naïve application-based synchronous PFS-level checkpointing method. A 3D lattice-Boltzmann (LBM) flow solver and a Lanczos eigenvalue solver are used as prototypical applications in which all the techniques considered here may be applied.
APA, Harvard, Vancouver, ISO, and other styles
42

Hovenga, Van, and Oluwatosin Oluwadare. "CBCR: A Curriculum Based Strategy For Chromosome Reconstruction." International Journal of Molecular Sciences 22, no. 8 (April 16, 2021): 4140. http://dx.doi.org/10.3390/ijms22084140.

Full text
Abstract:
In this paper, we introduce a novel algorithm that aims to estimate chromosomes’ structure from their Hi-C contact data, called Curriculum Based Chromosome Reconstruction (CBCR). Specifically, our method performs this three dimensional reconstruction using cis-chromosomal interactions from Hi-C data. CBCR takes intra-chromosomal Hi-C interaction frequencies as an input and outputs a set of xyz coordinates that estimate the chromosome’s three dimensional structure in the form of a .pdb file. The algorithm relies on progressively training a distance-restraint-based algorithm with a strategy we refer to as curriculum learning. Curriculum learning divides the Hi-C data into classes based on contact frequency and progressively re-trains the distance-restraint algorithm based on the assumed importance of each curriculum in predicting the underlying chromosome structure. The distance-restraint algorithm relies on a modification of a Gaussian maximum likelihood function that scales probabilities based on the importance of features. We evaluate the performance of CBCR on both simulated and actual Hi-C data and perform validation on FISH, HiChIP, and ChIA-PET data as well. We also compare the performance of CBCR to several current methods. Our analysis shows that the use of curricula affects the rate of convergence of the optimization while decreasing the computational cost of our distance-restraint algorithm. Also, CBCR is more robust to increases in data resolution and therefore yields superior reconstruction accuracy of higher resolution data than all other methods in our comparison.
APA, Harvard, Vancouver, ISO, and other styles
43

Ibrahim, Atef, Usman Tariq, Tariq Ahamed Ahanger, Bilal Tariq, and Fayez Gebali. "Retaliation against Ransomware in Cloud-Enabled PureOS System." Mathematics 11, no. 1 (January 3, 2023): 249. http://dx.doi.org/10.3390/math11010249.

Full text
Abstract:
Ransomware is malicious software that encrypts data before demanding payment to unlock them. The majority of ransomware variants use nearly identical command and control (C&C) servers but with minor upgrades. There are numerous variations of ransomware, each of which can encrypt either the entire computer system or specific files. Malicious software needs to infiltrate a system before it can do any real damage. Manually inspecting all potentially malicious file types is a time-consuming and resource-intensive requirement of conventional security software. Using established metrics, this research delves into the complex issues of identifying and preventing ransomware. On the basis of real-world malware samples, we created a parameterized categorization strategy for functional classes and suggestive features. We also furnished a set of criteria that highlights the most commonly featured criteria and investigated both behavior and insights. We used a distinct operating system and specific cloud platform to facilitate remote access and collaboration on files throughout the entire operational experimental infrastructure. With the help of our proposed ransomware detection mechanism, we were able to effectively recognize and prevent both state-of-art and modified ransomware anomalies. Aggregated log revealed a consistent but satisfactory detection rate at 89%. To the best of our knowledge, no research exists that has investigated the ransomware detection and impact of ransomware for PureOS, which offers a unique platform for PC, mobile phones, and resource intensive IoT (Internet of Things) devices.
APA, Harvard, Vancouver, ISO, and other styles
44

Khakim Assidiqi Nur Hudaya, Budi Sunarko, and Anan Nugroho. "Kinerja Algoritme Pengelompokan Fuzzy C-Means pada Segmentasi Citra Leukosit." Jurnal Nasional Teknik Elektro dan Teknologi Informasi 11, no. 1 (February 23, 2022): 41–46. http://dx.doi.org/10.22146/jnteti.v11i1.2493.

Full text
Abstract:
Segmentasi citra merupakan salah satu tahap paling penting dalam computer-aided diagnosis yang berpotensi mempercepat proses diagnosis leukemia. Leukemia merupakan salah satu penyakit mematikan yang masuk ke dalam kategori kanker darah. Umumnya, pendeteksian leukemia limfoblastik akut (LLA) dilakukan secara manual di rumah sakit dengan cara menghitung secara manual sel leukosit yang terdapat pada citra apusan darah tepi hasil pewarnaan dengan metode immunohistochemical (IHC). Sayangnya, proses diagnosis manual memakan waktu 3−24 jam hingga hasil dapat diketahui dan cenderung tidak akurat karena tingkat kelelahan operator. Hasil yang tidak akurat dapat mengakibatkan kesalahan diagnosis yang berakibat fatal pada pasien. Sebuah metode segmentasi citra yang diusulkan oleh Vogado mampu mencapai akurasi 98,5% untuk menyegmentasi dataset ALL-IDB2. Namun, metode ini menggunakan algoritme pengelompokan k-means yang tidak optimal dalam menangani masukan citra yang memiliki intensitas derau yang tinggi. Dalam makalah ini, fuzzy c-means diterapkan guna mengetahui perubahan kinerja pada metode segmentasi tersebut. Dataset yang digunakan adalah ALL-IDB2 yang berjumlah 260 citra dengan ukuran masing-masing citra adalah 257×257 piksel dalam format tagged image file (TIF). Tahap awal metode ini adalah membagi citra dataset leukemia akut ALL-IDB2 menjadi skema warna cyan, magenta, yellow, key (CMYK) dan L*a*b yang kemudian mensubstraksi komponen M, yaitu dikurangkan dengan komponen *b. Hasil pengurangan tersebut kemudian dipisahkan dengan algoritme fuzzy c-means (FCM), yang kemudian menghasilkan keluaran citra yang hanya mengandung bagian nukleus dan latar belakang. Keluaran metode ini kemudian dievaluasi dan diukur menggunakan metrik accuracy, specificity, sensitivity, kappa index, dice-coefficient, dan time complexity. Hasil analisis menunjukkan bahwa pengubahan algoritme pengelompokan pada metode segmentasi citra tersebut tidak memberikan perubahan hasil yang signifikan, dengan rincian peningkatan terjadi pada metrik specificity dan precision rata-rata 0,1-0,4%, waktu eksekusi bertambah lama rata-rata 23,10%, dan penurunan terjadi pada metrik accuracy, yaitu turun menjadi 95,4238% dan nilai dice-coefficient 79,3682%. Maka, dapat disimpulkan bahwa penerapan algoritme FCM pada metode segmentasi yang diusulkan tidak memberikan peningkatan kinerja yang optimal.
APA, Harvard, Vancouver, ISO, and other styles
45

Jianbo Zhang, Qun Yin, Duan Peng-Fei, and Meisu Yin. "Student Attendance Analysis and Statistics Platform based on Capture Recognition Technology." Electrotehnica, Electronica, Automatica 70, no. 1 (March 15, 2022): 85–94. http://dx.doi.org/10.46904/eea.22.70.1.1108009.

Full text
Abstract:
With the development of face recognition technology and HD camera, it is possible to use face recognition to realize the classroom attendance statistics. The traditional way of classroom attendance statics needs teachers to roll call according to the list of students, but face recognition can not only save the time of class, but also lighten the burden of statistics attendance of school. This paper realizes the face recognition system of attendance analysis and statistics platform, and it needs cameras and a main computer. In software, under the development environment of VS2017, it relies on OPENCV, arcsoft face recognition SDK and My -SQL database realizes a real-time video stream face recognition system with C++ programming. The system captures the student face by the camera installed in the classroom, then using SDK extracts the face feature and compares with the feature in the database. When the compare value is over the set value, the system will output the corresponding students' information and completion time to the TXT file.
APA, Harvard, Vancouver, ISO, and other styles
46

Yuan, Guo Qiang, Cheng Rui Zhang, Yuan Cai Zhang, and Ri Liang Liu. "Information Extraction Method for a STEP-Compliant NC Program." Advanced Materials Research 139-141 (October 2010): 1169–73. http://dx.doi.org/10.4028/www.scientific.net/amr.139-141.1169.

Full text
Abstract:
STEP-NC provides a way for intelligent NC manufacturing and seamless connection of the computer systems in design and manufacturing industries. It also makes it a must for a new breed of CNC machines to interface directly with the new part programs in STEP format (ISO 10303-21). In this paper, the data model and structure of part programs based on STEP-NC (STEP AP 238) are overviewed. Available tools are discussed and a method of extracting the manufacturing information from STEP-NC physical files is presented, and corresponding software module are developed in ST-DeveloperTM environment. With the aid of the STIXTM and ROSETM C++ library, the general information, feature information, technological information are extracted from the STEP-NC file and organized in a tree structure according to the hierarchy of the data model, which is essential to further usage of the manufacturing data, such as process planning, tool-path generating etc.
APA, Harvard, Vancouver, ISO, and other styles
47

Gu, Yan, and Qi Wang. "Application of Laser Raman Spectroscopy of Ferroelectric Nanomaterial BaTiO3 in the Design of Color Spotlight Products on Stage." Advances in Materials Science and Engineering 2022 (July 31, 2022): 1–12. http://dx.doi.org/10.1155/2022/6064883.

Full text
Abstract:
With the improvement of people’s material requirements, the demand for lighting materials is higher and higher. This study mainly discusses the application of the laser Raman spectroscopy of ferroelectric nanomaterial BaTiO3 in the design of color spotlight products on the stage. Firstly, the effects of different electrospinning parameters on BaTiO3 nanofibers were studied. Then, the samples were spun under the best spinning parameters and annealed at 600°C, 650°C, 700°C, and 750°C, and then the phase structure, morphology, and piezoelectric properties of the samples at four different annealing temperatures were characterized. In this study, the laser Raman signal converges to the incident slit of the monochromator through the lens. After grating splitting, the signal is obtained through CCD. Finally, the spectral curve is recorded by the computer-controlled data acquisition software winspec/32 and saved as an .spe file. The spectral data to be processed need to be smoothed. The luminescence intensity of BaTiO3 with flower structure is weak, which is mainly caused by the different crystal forms of the matrix. By analyzing the content of each element, it is found that BA/Ti = 1/2, and it can be inferred that the proportion of BaTiO3 and TiO2 is about 6%. The XRD spectra of the samples obtained at different temperatures (−25, 0, 30, 50, and 70°C) corresponded to the standard card BaTiO3 one-to-one, and no impurity peaks were found, indicating that the obtained samples are pure phases. This research will promote the application of nanomaterials in color spotlight products.
APA, Harvard, Vancouver, ISO, and other styles
48

Widyastuti, Indriyani, and Yayan Hendrian. "Pemanfaatan VLAN Untuk Meningkatkan Kinerja Jaringan Komputer BKPP Kabupaten Bogor." Computer Science (CO-SCIENCE) 2, no. 1 (January 28, 2022): 10–18. http://dx.doi.org/10.31294/coscience.v2i1.894.

Full text
Abstract:
Computer networks have an important role in a government agency, especially BKPP. In their daily life, these institutions carry out activities of exchanging documents and data, printing files on the same printer and using hardware or software that is connected to the network together. Government agencies play a very important role in serving the community, therefore a good, secure, stable and fast network is needed in processing small and large data. The Bogor Regency Personnel, Education and Training Agency uses one computer that acts as a multifunctional server for the database server, DHCP server, and web server at the same time. From the results of the analysis, it was found that the topology used is an extended star with IP class C. Using a firewall that is applied to the router, as well as the default Windows antivirus that is already installed on every PC and laptop. Meanwhile, access point security uses WPA2-PSK. The problem faced is that it is easy for people from other divisions who are not interested in seeing and accessing files in other divisions that are confidential. Thus, a VLAN is needed to manage access rights between computer network users in order to maintain data and file authenticatio
APA, Harvard, Vancouver, ISO, and other styles
49

Vhatkar, Kapil Netaji, and Girish P. Bhole. "Improved rider optimization for optimal container resource allocation in cloud with security assurance." International Journal of Pervasive Computing and Communications 16, no. 3 (June 29, 2020): 235–58. http://dx.doi.org/10.1108/ijpcc-12-2019-0094.

Full text
Abstract:
Purpose The containerization application is one among the technologies that enable microservices architectures, which is observed to be the model for operating system (OS) virtualization. Containers are the virtual instances of the OS that are structured as the isolation for the OS atmosphere and its file system, which are executed on the single kernel and a single host. Hence, every microservice application is evolved in a container without launching the total virtual machine. The system overhead is minimized in this way as the environment is maintained in a secured manner. The exploitation of a microservice is as easy to start the execution of a new container. As a result, microservices could scale up by simply generating new containers until the required scalability level is attained. This paper aims to optimize the container allocation. Design/methodology/approach This paper introduces a new customized rider optimization algorithm (C-ROA) for optimizing the container allocation. The proposed model also considers the impact of system performance along with its security. Moreover, a new rescaled objective function is defined in this work that considers threshold distance, balanced cluster use, system failure, total network distance and security as well. At last, the performance of proposed work is compared over other state-of-the-art models with respect to convergence and cost analysis. Findings For experiment 1, the implemented model at 50th iteration has achieved minimal value, which is 29.24%, 24.48% and 21.11% better from velocity updated grey wolf optimisation (VU-GWO), whale random update assisted LA (WR-LA) and rider optimization algorithm (ROA), respectively. Similarly, on considering Experiment 2, the proposed model at 100th iteration attained superior performance than conventional models such as VU-GWO, WR-LA and ROA by 3.21%, 7.18% and 10.19%, respectively. The developed model for Experiment 3 at 100th iteration is 2.23%, 5.76% and 6.56% superior to VU-GWO, WR-LA and ROA. Originality/value This paper presents the latest fictional optimization algorithm named ROA for optimizing the container allocation. To the best of the authors’ knowledge, this is the first study that uses the C-ROA for optimization.
APA, Harvard, Vancouver, ISO, and other styles
50

Altomare, Angela, Nicola Corriero, Corrado Cuocci, Aurelia Falcicchio, Anna Moliterni, and Rosanna Rizzi. "QUALX2.0: a qualitative phase analysis software using the freely available database POW_COD." Journal of Applied Crystallography 48, no. 2 (February 21, 2015): 598–603. http://dx.doi.org/10.1107/s1600576715002319.

Full text
Abstract:
QUALX2.0is the new version ofQUALX, a computer program for qualitative phase analysis by powder diffraction data. The previous version ofQUALXwas able to carry out phase identification by querying the PDF-2 commercial database. The main novelty ofQUALX2.0is the possibility of querying also a freely available database, POW_COD. POW_COD has been built up by starting from the structure information contained in the Crystallography Open Database (COD). The latter is a growing collection of diffraction data, freely downloadable from the web, corresponding to inorganic, metal–organic, organic and mineral structures.QUALX2.0retains the main capabilities of the previous version: (a) automatically estimating and subtracting the background; (b) locating the experimental diffraction peaks; (c) searching the database for single-phase pattern(s) best matching to the experimental powder diffraction data; (d) taking into account suitable restraints in the search; (e) performing a semi-quantitative analysis; (f) enabling the change of default choices and strategiesviaa user-friendly graphic interface. The advances ofQUALX2.0with respect toQUALXinclude (i) a wider variety of types of importable ASCII file containing the experimental diffraction pattern and (ii) new search–match options. The program, written in Fortran and C++, runs on PCs under the Windows operating system. The POW_COD database is exported in SQLite3 format.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography