To see the other types of publications on this topic, follow the link: Turbo C (Computer file).

Journal articles on the topic 'Turbo C (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Turbo C (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Challab, DJ. "Turbo C++." Information and Software Technology 34, no. 9 (1992): 617–18. http://dx.doi.org/10.1016/0950-5849(92)90140-k.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ohyama, Nagaaki. "IS & C system and file protection mechanism." Computer Methods and Programs in Biomedicine 43, no. 1-2 (1994): 37–42. http://dx.doi.org/10.1016/0169-2607(94)90183-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

BAFTIU, Naim, and Samedin KRABAJ. "Creating Prototype Virus - Destroying Files and Texts on Any Computer." PRIZREN SOCIAL SCIENCE JOURNAL 3, no. 1 (2019): 62. http://dx.doi.org/10.32936/pssj.v3i1.78.

Full text
Abstract:
When we study how viruses work and prevent them, we've developed a very simple application where we can see a prototype of a virus and virus function, as well as neutralizing a file if we want to break it down its structure at the level of the bits Purpose-Understand how a virus works by programming it in a high programming language. In our case, the C # programming language with the Visual Studio program that uses the .Net Framework. With the Windows Form Application module, the same application we are creating can also use it to neutralize a sentence if we know it is infected by interfering
APA, Harvard, Vancouver, ISO, and other styles
4

Ferreira Lima, João Vicente, Issam Raïs, Laurent Lefèvre, and Thierry Gautier. "Performance and energy analysis of OpenMP runtime systems with dense linear algebra algorithms." International Journal of High Performance Computing Applications 33, no. 3 (2018): 431–43. http://dx.doi.org/10.1177/1094342018792079.

Full text
Abstract:
In this article, we analyze performance and energy consumption of five OpenMP runtime systems over a non-uniform memory access (NUMA) platform. We also selected three CPU-level optimizations or techniques to evaluate their impact on the runtime systems: processors features Turbo Boost and C-States, and CPU Dynamic Voltage and Frequency Scaling through Linux CPUFreq governors. We present an experimental study to characterize OpenMP runtime systems on the three main kernels in dense linear algebra algorithms (Cholesky, LU, and QR) in terms of performance and energy consumption. Our experimental
APA, Harvard, Vancouver, ISO, and other styles
5

Petkov, V., and N. Bakaltchev. "FIT, a computer program for decomposition of powder diffraction patterns and profile analysis of pair correlation functions." Journal of Applied Crystallography 23, no. 2 (1990): 138–40. http://dx.doi.org/10.1107/s002188988901410x.

Full text
Abstract:
FIT is an interactive computer program for fitting analytical models to powder diffraction patterns and to pair correlation functions. FIT has been written in Turbo C and runs on IBM XT/AT or compatible personal computers.
APA, Harvard, Vancouver, ISO, and other styles
6

Ciric, Miroslav, and Svetozar Rancic. "Parsing in different languages." Facta universitatis - series: Electronics and Energetics 18, no. 2 (2005): 299–307. http://dx.doi.org/10.2298/fuee0502299c.

Full text
Abstract:
A compiler is a translator that accepts as input formatted source file or files, and produces as output a file that may be run directly on a computer. Given the same ANSI C++ compliant input file, two different ANSI C++ compliant compilers running on the same operating system produce two different executable programs that should execute in exactly the same way. To some degree, this is achieved by the standardization of the C++ language, but it is also possible because computer programming languages like C++ can be compiled using reliable technologies with long traditions and understood charact
APA, Harvard, Vancouver, ISO, and other styles
7

Yang, Xiaolong, Jianchao Zheng, Zesong Fei, and Bin Li. "Optimal File Dissemination and Beamforming for Cache-Enabled C-RANs." IEEE Access 6 (2018): 6390–99. http://dx.doi.org/10.1109/access.2017.2775198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tripathy, S. "Review: Windows NT File System Internals: A Developer's Guide." Computer Bulletin 40, no. 5 (1998): 31. http://dx.doi.org/10.1093/combul/40.5.31-c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Seitz, Kerry A., Theresa Foley, Serban D. Porumbescu, and John D. Owens. "Supporting Unified Shader Specialization by Co-opting C++ Features." Proceedings of the ACM on Computer Graphics and Interactive Techniques 5, no. 3 (2022): 1–17. http://dx.doi.org/10.1145/3543866.

Full text
Abstract:
Modern unified programming models (such as CUDA and SYCL) that combine host (CPU) code and GPU code into the same programming language, same file, and same lexical scope lack adequate support for GPU code specialization, which is a key optimization in real-time graphics. Furthermore, current methods used to implement specialization do not translate to a unified environment. In this paper, we create a unified shader programming environment in C++ that provides first-class support for specialization by co-opting C++'s attribute and virtual function features and reimplementing them with alternate
APA, Harvard, Vancouver, ISO, and other styles
10

Eladawi, A. E., E. S. Gadelmawla, I. M. Elewa, and A. A. Abdel-Shafy. "An application of computer vision for programming computer numerical control machines." Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture 217, no. 9 (2003): 1315–24. http://dx.doi.org/10.1243/095440503322420241.

Full text
Abstract:
Generation of the part programs, or tool paths, for products to be manufactured by computer numerical control (CNC) machines is very important. Many methods have been used to produce part programs, ranging from manual calculations to computer aided design/ manufacturing (CAD/CAM) systems. This work introduces a new technique for generating the part programs of existing products using the latest technology of computer vision. The proposed vision system is applicable for two-dimensional vertical milling CNC machines and is calibrated to produce both metric and imperial dimensions. Two steps are
APA, Harvard, Vancouver, ISO, and other styles
11

Roth, Yoann, Jean-Baptiste Doré, Laurent Ros, and Vincent Berg. "Coplanar Turbo-FSK: A Flexible and Power Efficient Modulation for the Internet-of-Things." Wireless Communications and Mobile Computing 2018 (August 28, 2018): 1–17. http://dx.doi.org/10.1155/2018/3072890.

Full text
Abstract:
As the Internet-of-Things (IoT) has expanded, multiple solutions have attempted to address the issues of the Low Power Wide Area (LPWA) networks physical layer. In a previous work, we proposed the Turbo-FSK, a constant envelope modulation with orthogonal alphabet that allows the receiver to operate at very low levels of power (high sensitivity performance) and very low levels of energy per bit Eb. The scheme was demonstrated to approach Shannon’s limit as close as 0.29 dB. However, the scheme lacks flexibility in terms of spectral efficiency (always lower than 10−1 bits/s/Hz), especially compa
APA, Harvard, Vancouver, ISO, and other styles
12

NATHAN, N. MEENATCHI, CHANABASANAGOUDA S. PATIL, and J. P. IMMANUEL JAYAPRAKASH. "PC based new software developed to create an input pilot balloon data file to an alternative to Hand Held Data Logger (HHDL) for using PC based SAMEER Pibal computation software." MAUSAM 67, no. 2 (2021): 499–504. http://dx.doi.org/10.54302/mausam.v67i2.1359.

Full text
Abstract:
Pilot balloon observatories of India Meteorological Department (IMD) are using Hand Held Data Logger (HHDL), manufactured by SAMEER, to compute upper air data since 2007. The HHDL, which is a sleek and microcontroller based battery operated unit, accepts all information through the numeric keypad pertaining to the PB ascent for raw file generation and pilot balloon data processing. The raw file can be transferred to computer system as an input file to PC based Pibal computation software. This software generates Pibal messages similar to HHDL in addition to National Data Centre (NDC) data forma
APA, Harvard, Vancouver, ISO, and other styles
13

Xie, Chuan, and Hong Wang. "The Design for Computer Monitoring System Based on Ethernet." Applied Mechanics and Materials 152-154 (January 2012): 1904–9. http://dx.doi.org/10.4028/www.scientific.net/amm.152-154.1904.

Full text
Abstract:
Ethernet computer monitor and control system is a new strategy subjecting to the problems existing in the Ethernet. The computer monitor and control system designed in this paper adopts C/S mode. It’s composed of client monitor software and server software. The five modules of the client monitor software are used to record the statistic analysis of the network usage state, the modification of the file information, the information of the running process, the information of the E-mail, and the use efficiency of CPU. The server software is in charge of collecting all kinds of information of clien
APA, Harvard, Vancouver, ISO, and other styles
14

Falco, C., N. Scarpato, G. Nappi, and S. Formisano. "Project of Computer-aided Management of Therapeutical Apheresis." International Journal of Artificial Organs 16, no. 5_suppl (1993): 185–86. http://dx.doi.org/10.1177/039139889301605s41.

Full text
Abstract:
The great increase in hemapheresis units activity that occurred during the last years caused the need for a computer-aided management (1, 2). We present a project for a data base system able to manage therapeutical apheresis (3). The program consists of five sections. a) Patient's file card: it allows to record anamnesis, examination and blood test results easily and under computer's guidance. b) Choice of therapeutic protocol: Therapeutic protocol is fixed in this section (device to be used, apheretic method, plasma volume to be processed, blood tests before and after apheresis). c) Procedure
APA, Harvard, Vancouver, ISO, and other styles
15

Kwak, Minkyung, and Youngho Cho. "A Novel Video Steganography-Based Botnet Communication Model in Telegram SNS Messenger." Symmetry 13, no. 1 (2021): 84. http://dx.doi.org/10.3390/sym13010084.

Full text
Abstract:
In botnets, a bot master regularly sends command and control messages (C & C messages) to bots for various purposes, such as ordering its commands to bots and collecting critical data from bots. Although such C & C messages can be encrypted by cryptographic methods to hide them, existing botnet detection mechanisms could detect the existence of botnets by capturing suspicious network traffics between the bot master (or the C & C server) and numerous bots. Recently, steganography-based botnets (stego-botnets) have emerged to make C & C communication traffics look normal to botne
APA, Harvard, Vancouver, ISO, and other styles
16

Altomare, Angela, Corrado Cuocci, Carmelo Giacovazzo, Anna Moliterni, and Rosanna Rizzi. "QUALX: a computer program for qualitative analysis using powder diffraction data." Journal of Applied Crystallography 41, no. 4 (2008): 815–17. http://dx.doi.org/10.1107/s0021889808016956.

Full text
Abstract:
QUALXis a new computer program for phase identification using powder diffraction data. It uses the Powder Diffraction File database, where a search for the phase best matching the experimental powder diffraction pattern is carried out. The program is characterized by a high level of automation: the traditional steps aimed at interpreting the experimental pattern before the search (background estimation, peak search, peak intensity evaluation) are executed automatically. The search may be carried outviaconstraints on compound name and/or chemical elements. In addition, several graphical options
APA, Harvard, Vancouver, ISO, and other styles
17

Oktaviani, Anisa, and Melwin Syafrizal. "GandCrab Ransomware Analysis on Windows Using Static Method." Buletin Ilmiah Sarjana Teknik Elektro 3, no. 2 (2021): 163–75. http://dx.doi.org/10.12928/biste.v3i2.4884.

Full text
Abstract:
Malware-infected operating systems may experience system damage, files or loss of important data. Ransomware is a type of malware that works by attacking the internet network and then encrypting the victim's computer. So that the victim can access his computer again, the victim is asked to redeem (ransom) with some money in the form of Bitcoin. One of them is GandCrab. Gandcrab is a very powerful ransomware and only the creators of Gandcrab know the description of the encrypted files.Static analysis is done by importing malware samples into Virustotal, Dependency walker, PEStudio, Exeinfo PE,
APA, Harvard, Vancouver, ISO, and other styles
18

Soutullo, S., E. Giancola, M. J. Jiménez, J. A. Ferrer, and M. N. Sánchez. "How Climate Trends Impact on the Thermal Performance of a Typical Residential Building in Madrid." Energies 13, no. 1 (2020): 237. http://dx.doi.org/10.3390/en13010237.

Full text
Abstract:
Based on the European energy directives, the building sector has to provide comfortable levels for occupants with minimum energy consumption as well as to reduce greenhouse gas emissions. This paper aims to compare the impact of climate change on the energy performance of residential buildings in order to derive potential design strategies. Different climate file inputs of Madrid have been used to quantify comparatively the thermal needs of two reference residential buildings located in this city. One of them represents buildings older than 40 years built according to the applicable Spanish re
APA, Harvard, Vancouver, ISO, and other styles
19

Katiyar, Dr Ravindra Nath, and Sadhna Yadav. "Design A Mini Operating System Using Open Source System." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (2022): 1424–34. http://dx.doi.org/10.22214/ijraset.2022.46432.

Full text
Abstract:
Abstract: COSMOS (C# Open Source Managed Operating System) Paper provides a framework and tool-chain to develop an OS purely in managed code (C# and VB .NET). Cosmos supports integration with Visual Studio, and therefore is much easier to use. However, the framework is not rich, and therefore, there is still a lot of work to be done on OS developer side (E.g., it does not support mouse, file system etc.) In this paper, a microkernel based OS is developed using COSMOS framework for x86 based computer systems. This paper demonstrates device driver (PS/2) pointing device and GUI System. Since Cos
APA, Harvard, Vancouver, ISO, and other styles
20

Shim, Jaewoo, Kyeonghwan Lim, Seong-je Cho, Sangchul Han, and Minkyu Park. "Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework." Security and Communication Networks 2018 (June 20, 2018): 1–12. http://dx.doi.org/10.1155/2018/6280768.

Full text
Abstract:
Unity is the most popular cross-platform development framework to develop games for multiple platforms such as Android, iOS, and Windows Mobile. While Unity developers can easily develop mobile apps for multiple platforms, adversaries can also easily build malicious apps based on the “write once, run anywhere” (WORA) feature. Even though malicious apps were discovered among Android apps written with Unity framework (Unity apps), little research has been done on analysing the malicious apps. We propose static and dynamic reverse engineering techniques for malicious Unity apps. We first inspect
APA, Harvard, Vancouver, ISO, and other styles
21

Yang, Xiao Han, Di Suo, and Fuan Wen. "The General Embedded Kernel Simulation System Model." Advanced Materials Research 459 (January 2012): 58–62. http://dx.doi.org/10.4028/www.scientific.net/amr.459.58.

Full text
Abstract:
According to in-depth study of embedded system architecture and working principles, this paper proposes an embedded kernel simulation system model – Device Operation Interface (DOI) model based in the computer simulation theory. Furthermore, an embedded 8051 simulated kernel is designed and developed based on this model. The 8051 simulation system achieves loading, compiling and linking the C language source file, simulates the process of 8051 command execution and displays the results through interfaces. The DOI model contributes to the reuse in different experimental simulation platforms
APA, Harvard, Vancouver, ISO, and other styles
22

Ankali, Sanjay B., and Latha Parthiban. "Detection and Classification of Cross-language Code Clone Types by Filtering the Nodes of ANTLR-generated Parse Tree." International Journal of Intelligent Systems and Applications 13, no. 3 (2021): 43–65. http://dx.doi.org/10.5815/ijisa.2021.03.05.

Full text
Abstract:
A complete and accurate cross-language clone detection tool can support software forking process that reuses the more reliable algorithms of legacy systems from one language code base to other. Cross-language clone detection also helps in building code recommendation system. This paper proposes a new technique to detect and classify cross-language clones of C and C++ programs by filtering the nodes of ANTLR-generated parse tree using a common grammar file, CPP14.g4. Parsing the input files using CPP14.g4 provides all the lexical and semantic information of input source code. Selective filterin
APA, Harvard, Vancouver, ISO, and other styles
23

Simonov, A., T. Weber, and W. Steurer. "Yell: a computer program for diffuse scattering analysisviathree-dimensional delta pair distribution function refinement." Journal of Applied Crystallography 47, no. 3 (2014): 1146–52. http://dx.doi.org/10.1107/s1600576714008668.

Full text
Abstract:
Yell, a program for routine refinement of disorder models against single-crystal diffuse scattering data, is presented. The analysis is based on the three-dimensional delta pair distribution function (3D-ΔPDF) method, which provides direct access to interatomic correlations in real crystal structures. Substitutional, displacive and size-effect disorder models are covered. The input file format supports flexible usage of arithmetic expressions for constraining dependent parameter values. The program is designed to be run on desktop computers. By using an efficient fast-Fourier-transform-based d
APA, Harvard, Vancouver, ISO, and other styles
24

Lee, Soohyun, Clara R. Bakker, Carl Vitzthum, Burak H. Alver, and Peter J. Park. "Pairs and Pairix: a file format and a tool for efficient storage and retrieval for Hi-C read pairs." Bioinformatics 38, no. 6 (2022): 1729–31. http://dx.doi.org/10.1093/bioinformatics/btab870.

Full text
Abstract:
Abstract Summary As the amount of 3D chromosomal interaction data continues to increase, storing and accessing such data efficiently becomes paramount. We introduce Pairs, a block-compressed text file format for storing paired genomic coordinates from Hi-C data, and Pairix, an open-source C application to index and query Pairs files. Pairix (also available in Python and R) extends the functionalities of Tabix to paired coordinates data. We have also developed PairsQC, a collapsible HTML quality control report generator for Pairs files. Availability and implementation The format specification a
APA, Harvard, Vancouver, ISO, and other styles
25

Lan, Divon, Ray Tobler, Yassine Souilmi, and Bastien Llamas. "Genozip: a universal extensible genomic data compressor." Bioinformatics 37, no. 16 (2021): 2225–30. http://dx.doi.org/10.1093/bioinformatics/btab102.

Full text
Abstract:
Abstract We present Genozip, a universal and fully featured compression software for genomic data. Genozip is designed to be a general-purpose software and a development framework for genomic compression by providing five core capabilities—universality (support for all common genomic file formats), high compression ratios, speed, feature-richness and extensibility. Genozip delivers high-performance compression for widelyused genomic data formats in genomics research, namely FASTQ, SAM/BAM/CRAM, VCF, GVF, FASTA, PHYLIP and 23andMe formats. Our test results show that Genozip is fast and achieves
APA, Harvard, Vancouver, ISO, and other styles
26

Harrison, Reginald Langford, Stefan Bilbao, James Perry, and Trevor Wishart. "An Environment for Physical Modeling of Articulated Brass Instruments." Computer Music Journal 39, no. 4 (2015): 80–95. http://dx.doi.org/10.1162/comj_a_00332.

Full text
Abstract:
This article presents a synthesis environment for physical modeling of valved brass instrument sounds. Synthesis is performed using finite-difference time-domain methods that allow for flexible simulation of time-varying systems. Users have control over the instrument configuration as well as player parameters, such as mouth pressure, lip dynamics, and valve depressions, which can be varied over the duration of a gesture. This article introduces the model used in the environment, the development of code from prototyping in MATLAB and optimization in C, and the incorporation of the executable f
APA, Harvard, Vancouver, ISO, and other styles
27

Lai, Ziliang, Yansong Cui, Tonggang Zhao, and Qiang Wu. "Design of Three-Dimensional Virtual Simulation Experiment Platform for Integrated Circuit Course." Electronics 11, no. 9 (2022): 1437. http://dx.doi.org/10.3390/electronics11091437.

Full text
Abstract:
The integrated circuit (IC) is a subject for which researchers need practical experience, but its experiment cost is high, the risk involved is high, and it is not easy to carry out experiments on a large scale. This paper designs a three-dimensional integrated circuit virtual experiment platform based on Unity3d. The platform uses the Unity3d and 3ds Max tools to build a three-dimensional model of instruments, equipment, electronic components, and ultra cleanroom laboratory scenes in an integrated circuit experiment. In addition, it uses C# script to develop the functions and three-dimensiona
APA, Harvard, Vancouver, ISO, and other styles
28

Ponomarev, I. V., and D. I. Strokin. "Steganographic Methods for Embedding and Detecting Hidden Messages Using GIF Images as Container Files." Izvestiya of Altai State University, no. 1(123) (March 18, 2022): 112–15. http://dx.doi.org/10.14258/izvasu(2022)1-18.

Full text
Abstract:
Over the past few decades, the development of new methods of storing, transferring, analyzing, and reproducing data has become increasingly important, considering the widespread development of information technologies and multimedia means. These methods also include means of ensuring the reliability, security, safety, and confidentiality of information when it is transmitted through various communication channels. Today, the fulfillment of the necessary data confidentiality requirements is developing in the direction of cryptography and steganography.
 The article discusses a method of en
APA, Harvard, Vancouver, ISO, and other styles
29

Anisya, Anisya. "Grafik Penentuan Komposisi Campuran Agregat Material Pengaspalan Jalan Memanfaatkan Metode Digital Differential Analyzer (DDA)." J-SAKTI (Jurnal Sains Komputer dan Informatika) 2, no. 2 (2018): 221. http://dx.doi.org/10.30645/j-sakti.v2i2.85.

Full text
Abstract:
The more advanced technology can make it easier for someone to do their work. Included in it in terms of making graphics that can be done using computer assistance. Where computers can represent human work functions. This study aims to create an application graph for the determination of the composition of the aggregate mixture and provide the results of the calculation of the percentage of each aggregate and provide recommendations whether the composition of the aggregate mixture is feasible or not to be used. The results of this study are a graphical application for determining the value of
APA, Harvard, Vancouver, ISO, and other styles
30

McCarthy, Gregory J. "Laboratory Note. A LOTUS 1-2-3 Spreadsheet to Aid in Data Reduction for Publication of X-Ray Powder Diffraction Data." Powder Diffraction 3, no. 1 (1988): 39–40. http://dx.doi.org/10.1017/s0885715600013105.

Full text
Abstract:
My students and I have developed a LOTUS 1-2-3 spreadsheet to aid in data reduction tasks associated with preparing powder diffraction data for publication in the Powder Diffraction File (PDF) (1987) and this journal. Portions of a sample spreadsheet and the formulae in each of the computational cells are given in the Table 1. The concept of this spreadsheet should apply to any of the available computer spreadsheet programs, although the specific codes for the mathematical functions may differ.The user enters data only into columns C, D and F-H. All other entries will be calculated from the in
APA, Harvard, Vancouver, ISO, and other styles
31

R. Kolhe, Prakash, and Pradip P. Kolhe. "ICT Tool : Development of Calculator." Oriental journal of computer science and technology 9, no. 1 (2016): 30–35. http://dx.doi.org/10.13005/ojcst/901.06.

Full text
Abstract:
Henry David said “Men Have Become the Tools of Their Tools.” In this era all the developing technology begin from calculation influenced by the computer programming ICT-tool. Today energy is main problem, by utilizing sun light energy(solar energy) problem can be minimize. Sun drying is still the most common method used to preserve agricultural products in most tropical and subtropical countries. However, being unprotected from rain, wind-borne dirt and dust, infestation by insects, rodents and other animal, products may be seriously degraded to the extent that sometimes become inedible and th
APA, Harvard, Vancouver, ISO, and other styles
32

Cui, Shujie, Xiangfu Song, Muhammad Rizwan Asghar, Steven D. Galbraith, and Giovanni Russello. "Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage." ACM Transactions on Privacy and Security 24, no. 3 (2021): 1–35. http://dx.doi.org/10.1145/3446920.

Full text
Abstract:
Searchable Encryption (SE) is a technique that allows Cloud Service Providers to search over encrypted datasets without learning the content of queries and records. In recent years, many SE schemes have been proposed to protect outsourced data. However, most of them leak sensitive information, from which attackers could still infer the content of queries and records by mounting leakage-based inference attacks, such as the count attack and file-injection attack . In this work, first we define the leakage in searchable encrypted databases and analyse how the leakage is leveraged in existing leak
APA, Harvard, Vancouver, ISO, and other styles
33

Pockrandt, Christopher, Martin Steinegger, and Steven L. Salzberg. "PhyloCSF++: a fast and user-friendly implementation of PhyloCSF with annotation tools." Bioinformatics 38, no. 5 (2021): 1440–42. http://dx.doi.org/10.1093/bioinformatics/btab756.

Full text
Abstract:
Abstract Summary PhyloCSF++ is an efficient and parallelized C++ implementation of the popular PhyloCSF method to distinguish protein-coding and non-coding regions in a genome based on multiple sequence alignments (MSAs). It can score alignments or produce browser tracks for entire genomes in the wig file format. Additionally, PhyloCSF++ annotates coding sequences in GFF/GTF files using precomputed tracks or computes and scores MSAs on the fly with MMseqs2. Availability and implementation PhyloCSF++ is released under the AGPLv3 license. Binaries and source code are available at https://github.
APA, Harvard, Vancouver, ISO, and other styles
34

Tangwe, Stephen, Michael Simon, Edson L. Meyer, Sampson Mwampheli, and Golden Makaka. "Performance optimization of an air source heat pump water heater using mathematical modelling." Journal of Energy in Southern Africa 26, no. 1 (2015): 96–105. http://dx.doi.org/10.17159/2413-3051/2015/v26i1a2225.

Full text
Abstract:
In South Africa, there is an ongoing constraint on the electricity supply at the national grid to meet the demand. Eskom is implementing various measures such as the Integrated Demand Management and the promotion and encouragement of the use of energy efficient devices like an Air Source Heat pump (ASHP) water heater to replace the high electrical energy consuming conventional geysers for sanitary hot water production. The ASHP water heater market is fast gaining maturity. A critical mathematical model can lead to performance optimization of the systems that will further result in the conserva
APA, Harvard, Vancouver, ISO, and other styles
35

Barenghi, Livia, Alberto Barenghi, Carlo Cadeo, and Alberto Di Blasio. "Innovation by Computer-Aided Design/Computer-Aided Manufacturing Technology: A Look at Infection Prevention in Dental Settings." BioMed Research International 2019 (August 6, 2019): 1–15. http://dx.doi.org/10.1155/2019/6092018.

Full text
Abstract:
Recent data indicates limited awareness and compliance on infection prevention procedures by dental offices and by dental laboratories. Guidelines for infection prevention in dentistry have been published by Centres for Disease Control and Prevention since 2003; the section “IX-Special consideration” includes a subsection concerning the prevention in dental laboratories, but it has not been modernised in later versions to fit the needs of traditional and computer-aided technology. Traditional techniques required disinfecting items (impression, chewing waxes, and appliances) with well-suited pr
APA, Harvard, Vancouver, ISO, and other styles
36

Hopper, Douglas A., Troy T. Meinke, and Virginia S. Store. "786 PB 436 COMPARING ROSE RESPONSES TO VARIOUS ENVIRONMENTS USING THE ROSESIM COMPUTER GROWTH MODEL." HortScience 29, no. 5 (1994): 545e—545. http://dx.doi.org/10.21273/hortsci.29.5.545e.

Full text
Abstract:
The computer simulation model ROSESIM is based on `Royalty' rose (Rosa hybrida L.) growth response to 15 unique treatment combinations of photosynthetic photon flux (PPF), day temperature (DT), and night temperature (NT) under constant growth chamber conditions. Environmental factors are assumed constant over an entire day, but set points may vary over the duration of the crop. Anticipated values for factors may be read from an ASCII file, allowing a variety of strategies to be modeled and compared. A Valentine's Day crop senario compared 2 management strategies for crop development time and f
APA, Harvard, Vancouver, ISO, and other styles
37

Tasaki, Satoko, Naoki Komori, and Soshu Kirihara. "Fabrication of Oxide Ceramics Dendrites for Porous Electrodes by Using Stereolithography." Additional Conferences (Device Packaging, HiTEC, HiTEN, and CICMT) 2012, CICMT (2012): 000152–57. http://dx.doi.org/10.4071/cicmt-2012-tp34.

Full text
Abstract:
Porous oxide ceramics such as zinc oxide are applied for dye sensitized solar cell. This device requires consideration of high surface area, mechanical strengths and porous networks. Thus, we focused on the dendrite structures constructed from micrometer order rods with coordination numbers of 4, 8, and 12. There perfectly controlled structures were fabricated by stereolithography. Variations of the aspect ratios (lattice length to diameter ratios) were adjusted to control the porosity in the range 50–80 vol. % by using computer graphic software. The dendrite models sliced into a series of cro
APA, Harvard, Vancouver, ISO, and other styles
38

Dharmawardhana, Mahanama, Asanga Ratnaweera, and Gheorghe Oancea. "STEP-NC Compliant Intelligent CNC Milling Machine with an Open Architecture Controller." Applied Sciences 11, no. 13 (2021): 6223. http://dx.doi.org/10.3390/app11136223.

Full text
Abstract:
A STEP-NC or ISO 14649 compliant machine controller is developed, using Open Architecture Control technology for a three-axis Computer Numerical Control milling machine in this research. The controller is developed on a Raspberry Pi single-board computer, using C++ language. This new development is proposed as a low-cost alternative to ISO6983 standard, ensuring continuous integration in the CAD/CAM/CNC chain in machining; thus, it broadens the spectrum of problems handled by conventional CNC systems. The new machine controller is intelligent enough to extract geometrical and manufacturing par
APA, Harvard, Vancouver, ISO, and other styles
39

Grauke, L. J. "The Scientific Name of the Pecan." HortScience 20, no. 4 (1985): 629–30. http://dx.doi.org/10.21273/hortsci.20.4.629.

Full text
Abstract:
Abstract At the meeting of the Crop Advisory Committee for Pecans and Hickories held on 24 Sept. 1984 in Albany, Ga., a question was raised concerning the legitimate scientific name of the pecan tree. Two names are currently in use: Carya illinoensis (Wang.) K. Koch (3, 6, 7, 10, 12, 19) and Carya illinoinensis (Wang.) K. Koch (1, 2, 11, 18, 21). Current usage is heavily in favor of the former epithet. When the 2 names were used as key words in the BIOSIS Previews computer search file for articles written between 1977 and the present, 199 were retrieved under C. illinoensis, whereas only 1 was
APA, Harvard, Vancouver, ISO, and other styles
40

Muadzani, Alim, Oky Dwi Nurhayati, and Ike Pertiwi Windasari. "Penyisipan Media Teks dan Citra Menggunakan Teknik Steganografi pada Media Pembawa Citra Digital." Jurnal Teknologi dan Sistem Komputer 4, no. 3 (2016): 470. http://dx.doi.org/10.14710/jtsiskom.4.3.2016.470-478.

Full text
Abstract:
Information has now become an important comodity in human life, with the rapid development of communications technology has enable people to communicate and exchange information more easily. Internet is very popular and used by billions users worldwide, the information passing through the internet is very large, and some certain people trying to get this information for profit. The information need to be secured to prevent the others to get the information that send through the internet, steganography can be used to hide the information before sending it and the receiver can recover the hidden
APA, Harvard, Vancouver, ISO, and other styles
41

SHAHZAD, FAISAL, MARKUS WITTMANN, MORITZ KREUTZER, THOMAS ZEISER, GEORG HAGER, and GERHARD WELLEIN. "A SURVEY OF CHECKPOINT/RESTART TECHNIQUES ON DISTRIBUTED MEMORY SYSTEMS." Parallel Processing Letters 23, no. 04 (2013): 1340011. http://dx.doi.org/10.1142/s0129626413400112.

Full text
Abstract:
The road to exascale computing poses many challenges for the High Performance Computing (HPC) community. Each step on the exascale path is mainly the result of a higher level of parallelism of the basic building blocks (i.e., CPUs, memory units, networking components, etc.). The reliability of each of these basic components does not increase at the same rate as the rate of hardware parallelism. This results in a reduction of the mean time to failure (MTTF) of the whole system. A fault tolerance environment is thus indispensable to run large applications on such clusters. Checkpoint/Restart (C/
APA, Harvard, Vancouver, ISO, and other styles
42

Hovenga, Van, and Oluwatosin Oluwadare. "CBCR: A Curriculum Based Strategy For Chromosome Reconstruction." International Journal of Molecular Sciences 22, no. 8 (2021): 4140. http://dx.doi.org/10.3390/ijms22084140.

Full text
Abstract:
In this paper, we introduce a novel algorithm that aims to estimate chromosomes’ structure from their Hi-C contact data, called Curriculum Based Chromosome Reconstruction (CBCR). Specifically, our method performs this three dimensional reconstruction using cis-chromosomal interactions from Hi-C data. CBCR takes intra-chromosomal Hi-C interaction frequencies as an input and outputs a set of xyz coordinates that estimate the chromosome’s three dimensional structure in the form of a .pdb file. The algorithm relies on progressively training a distance-restraint-based algorithm with a strategy we r
APA, Harvard, Vancouver, ISO, and other styles
43

Ibrahim, Atef, Usman Tariq, Tariq Ahamed Ahanger, Bilal Tariq, and Fayez Gebali. "Retaliation against Ransomware in Cloud-Enabled PureOS System." Mathematics 11, no. 1 (2023): 249. http://dx.doi.org/10.3390/math11010249.

Full text
Abstract:
Ransomware is malicious software that encrypts data before demanding payment to unlock them. The majority of ransomware variants use nearly identical command and control (C&C) servers but with minor upgrades. There are numerous variations of ransomware, each of which can encrypt either the entire computer system or specific files. Malicious software needs to infiltrate a system before it can do any real damage. Manually inspecting all potentially malicious file types is a time-consuming and resource-intensive requirement of conventional security software. Using established metrics, this re
APA, Harvard, Vancouver, ISO, and other styles
44

Khakim Assidiqi Nur Hudaya, Budi Sunarko, and Anan Nugroho. "Kinerja Algoritme Pengelompokan Fuzzy C-Means pada Segmentasi Citra Leukosit." Jurnal Nasional Teknik Elektro dan Teknologi Informasi 11, no. 1 (2022): 41–46. http://dx.doi.org/10.22146/jnteti.v11i1.2493.

Full text
Abstract:
Segmentasi citra merupakan salah satu tahap paling penting dalam computer-aided diagnosis yang berpotensi mempercepat proses diagnosis leukemia. Leukemia merupakan salah satu penyakit mematikan yang masuk ke dalam kategori kanker darah. Umumnya, pendeteksian leukemia limfoblastik akut (LLA) dilakukan secara manual di rumah sakit dengan cara menghitung secara manual sel leukosit yang terdapat pada citra apusan darah tepi hasil pewarnaan dengan metode immunohistochemical (IHC). Sayangnya, proses diagnosis manual memakan waktu 3−24 jam hingga hasil dapat diketahui dan cenderung tidak akurat karen
APA, Harvard, Vancouver, ISO, and other styles
45

Jianbo Zhang, Qun Yin, Duan Peng-Fei, and Meisu Yin. "Student Attendance Analysis and Statistics Platform based on Capture Recognition Technology." Electrotehnica, Electronica, Automatica 70, no. 1 (2022): 85–94. http://dx.doi.org/10.46904/eea.22.70.1.1108009.

Full text
Abstract:
With the development of face recognition technology and HD camera, it is possible to use face recognition to realize the classroom attendance statistics. The traditional way of classroom attendance statics needs teachers to roll call according to the list of students, but face recognition can not only save the time of class, but also lighten the burden of statistics attendance of school. This paper realizes the face recognition system of attendance analysis and statistics platform, and it needs cameras and a main computer. In software, under the development environment of VS2017, it relies on
APA, Harvard, Vancouver, ISO, and other styles
46

Yuan, Guo Qiang, Cheng Rui Zhang, Yuan Cai Zhang, and Ri Liang Liu. "Information Extraction Method for a STEP-Compliant NC Program." Advanced Materials Research 139-141 (October 2010): 1169–73. http://dx.doi.org/10.4028/www.scientific.net/amr.139-141.1169.

Full text
Abstract:
STEP-NC provides a way for intelligent NC manufacturing and seamless connection of the computer systems in design and manufacturing industries. It also makes it a must for a new breed of CNC machines to interface directly with the new part programs in STEP format (ISO 10303-21). In this paper, the data model and structure of part programs based on STEP-NC (STEP AP 238) are overviewed. Available tools are discussed and a method of extracting the manufacturing information from STEP-NC physical files is presented, and corresponding software module are developed in ST-DeveloperTM environment. With
APA, Harvard, Vancouver, ISO, and other styles
47

Gu, Yan, and Qi Wang. "Application of Laser Raman Spectroscopy of Ferroelectric Nanomaterial BaTiO3 in the Design of Color Spotlight Products on Stage." Advances in Materials Science and Engineering 2022 (July 31, 2022): 1–12. http://dx.doi.org/10.1155/2022/6064883.

Full text
Abstract:
With the improvement of people’s material requirements, the demand for lighting materials is higher and higher. This study mainly discusses the application of the laser Raman spectroscopy of ferroelectric nanomaterial BaTiO3 in the design of color spotlight products on the stage. Firstly, the effects of different electrospinning parameters on BaTiO3 nanofibers were studied. Then, the samples were spun under the best spinning parameters and annealed at 600°C, 650°C, 700°C, and 750°C, and then the phase structure, morphology, and piezoelectric properties of the samples at four different annealin
APA, Harvard, Vancouver, ISO, and other styles
48

Widyastuti, Indriyani, and Yayan Hendrian. "Pemanfaatan VLAN Untuk Meningkatkan Kinerja Jaringan Komputer BKPP Kabupaten Bogor." Computer Science (CO-SCIENCE) 2, no. 1 (2022): 10–18. http://dx.doi.org/10.31294/coscience.v2i1.894.

Full text
Abstract:
Computer networks have an important role in a government agency, especially BKPP. In their daily life, these institutions carry out activities of exchanging documents and data, printing files on the same printer and using hardware or software that is connected to the network together. Government agencies play a very important role in serving the community, therefore a good, secure, stable and fast network is needed in processing small and large data. The Bogor Regency Personnel, Education and Training Agency uses one computer that acts as a multifunctional server for the database server, DHCP
APA, Harvard, Vancouver, ISO, and other styles
49

Vhatkar, Kapil Netaji, and Girish P. Bhole. "Improved rider optimization for optimal container resource allocation in cloud with security assurance." International Journal of Pervasive Computing and Communications 16, no. 3 (2020): 235–58. http://dx.doi.org/10.1108/ijpcc-12-2019-0094.

Full text
Abstract:
Purpose The containerization application is one among the technologies that enable microservices architectures, which is observed to be the model for operating system (OS) virtualization. Containers are the virtual instances of the OS that are structured as the isolation for the OS atmosphere and its file system, which are executed on the single kernel and a single host. Hence, every microservice application is evolved in a container without launching the total virtual machine. The system overhead is minimized in this way as the environment is maintained in a secured manner. The exploitation o
APA, Harvard, Vancouver, ISO, and other styles
50

Altomare, Angela, Nicola Corriero, Corrado Cuocci, Aurelia Falcicchio, Anna Moliterni, and Rosanna Rizzi. "QUALX2.0: a qualitative phase analysis software using the freely available database POW_COD." Journal of Applied Crystallography 48, no. 2 (2015): 598–603. http://dx.doi.org/10.1107/s1600576715002319.

Full text
Abstract:
QUALX2.0is the new version ofQUALX, a computer program for qualitative phase analysis by powder diffraction data. The previous version ofQUALXwas able to carry out phase identification by querying the PDF-2 commercial database. The main novelty ofQUALX2.0is the possibility of querying also a freely available database, POW_COD. POW_COD has been built up by starting from the structure information contained in the Crystallography Open Database (COD). The latter is a growing collection of diffraction data, freely downloadable from the web, corresponding to inorganic, metal–organic, organic and min
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!