Segui questo link per vedere altri tipi di pubblicazioni sul tema: Eventus (Computer file).

Articoli di riviste sul tema "Eventus (Computer file)"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Eventus (Computer file)".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

Syafar, Faisal, Halimah Husain, Sutarsih Suhaeb, Putri Ida, and Supriadi. "Blowfish Advanced CS Untuk Solusi Keamanan Sistem Komputer Sekolah." Vokatek : Jurnal Pengabdian Masyarakat 1, no. 3 (2023): 353–61. http://dx.doi.org/10.61255/vokatekjpm.v1i3.271.

Testo completo
Abstract (sommario):
Data security and privacy are very important issues for businesses, colleges, the government, and even individuals. The TKJ Laboratory is where PKM events take place. Students are free to use the computers there as they please, as long as they don't break the security system on each one. The types of files that can be protected in this case are text-based document files, picture files, audio and video files that are stored digitally, and question files. In the Community Partnership Program, which had 15 participants, there were outcomes and goals. The program produced a guidebook on how to use
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Jawad, Alkenani, and Ahmed Nassari Khulood. "Enhance work for java based network analyzer tool used to analyze network simulator files." Enhance work for java based network analyzer tool used to analyze network simulator files 29, no. 2 (2023): 954–62. https://doi.org/10.11591/ijeecs.v29.i2.pp954-962.

Testo completo
Abstract (sommario):
The network performance measurement is important in computer networks, and performance measurement may not be effective for installation in peripheral devices resulting in the replacement of those devices and thus increasing cost. In light of this, it is better to have a simulation of the network to see its performance rather than the actual design. NS-2 is one of the most popular and widely used open-source network simulators in many organizations, which generates trace files during the simulation experience. The trace file contains all network events that can be used to calculate performance
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Xu, Haochen, Guanhua Fang, Yunxiao Chen, Jingchen Liu, and Zhiliang Ying. "Latent Class Analysis of Recurrent Events in Problem-Solving Items." Applied Psychological Measurement 42, no. 6 (2018): 478–98. http://dx.doi.org/10.1177/0146621617748325.

Testo completo
Abstract (sommario):
Computer-based assessment of complex problem-solving abilities is becoming more and more popular. In such an assessment, the entire problem-solving process of an examinee is recorded, providing detailed information about the individual, such as behavioral patterns, speed, and learning trajectory. The problem-solving processes are recorded in a computer log file which is a time-stamped documentation of events related to task completion. As opposed to cross-sectional response data from traditional tests, process data in log files are massive and irregularly structured, calling for effective expl
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Alkenani, Jawad, and Khulood Ahmed Nassar. "Enhance work for java based network analyzer tool used to analyze network simulator files." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 2 (2023): 954. http://dx.doi.org/10.11591/ijeecs.v29.i2.pp954-962.

Testo completo
Abstract (sommario):
<span lang="EN-US">The network performance measurement is important in computer networks, and performance measurement may not be effective for installation in peripheral devices resulting in the replacement of those devices and thus increasing cost. In light of this, it is better to have a simulation of the network to see its performance rather than the actual design. NS-2 is one of the most popular and widely used open-source network simulators in many organizations, which generates trace files during the simulation experience. The trace file contains all network events that can be used
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Groh, Micah, Norman Buchanan, Derek Doyle, James B. Kowalkowski, Marc Paterno, and Saba Sehrish. "PandAna: A Python Analysis Framework for Scalable High Performance Computing in High Energy Physics." EPJ Web of Conferences 251 (2021): 03033. http://dx.doi.org/10.1051/epjconf/202125103033.

Testo completo
Abstract (sommario):
Modern experiments in high energy physics analyze millions of events recorded in particle detectors to select the events of interest and make measurements of physics parameters. These data can often be stored as tabular data in files with detector information and reconstructed quantities. Most current techniques for event selection in these files lack the scalability needed for high performance computing environments. We describe our work to develop a high energy physics analysis framework suitable for high performance computing. This new framework utilizes modern tools for reading files and i
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Marr, Charles. "210 CUSTOM-PRINTED ELECTRONIC FACT SHEETS AT HORTICULTURAL EVENTS." HortScience 29, no. 5 (1994): 459d—459. http://dx.doi.org/10.21273/hortsci.29.5.459d.

Testo completo
Abstract (sommario):
A series of 62 fact sheets on a variety of topics related to vegetable gardening were constructed in WordPerfect and, using a series of macros and styles, were modified to a standard format and printed to a file for storage. Sheets were organized into a heirarchal menu so they could be copied to the printer upon request using only DOS commands. A portable laptop computer and a Hewlett Packard Portable DeskJet printer was used to print files at such remote locations as nurseries/garden centers, shopping malls, fairs, and public events where Master Gardener volunteers set up and operated the equ
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Bántay, László, Gyula Dörgö, Ferenc Tandari, and János Abonyi. "Simultaneous Process Mining of Process Events and Operator Actions for Alarm Management." Complexity 2022 (September 19, 2022): 1–13. http://dx.doi.org/10.1155/2022/8670154.

Testo completo
Abstract (sommario):
Alarm management is an important task to ensure the safety of industrial process technologies. A well-designed alarm system can reduce the workload of operators parallel with the support of the production, which is in line with the approach of Industry 5.0. Using Process Mining tools to explore the operator-related event scenarios requires a goal-oriented log file format that contains the start and the end of the alarms along with the triggered operator actions. The key contribution of the work is that a method is presented that transforms the historical event data of control systems into goal
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Marjai, Péter, Péter Lehotay-Kéry, and Attila Kiss. "The Use of Template Miners and Encryption in Log Message Compression." Computers 10, no. 7 (2021): 83. http://dx.doi.org/10.3390/computers10070083.

Testo completo
Abstract (sommario):
Presently, almost every computer software produces many log messages based on events and activities during the usage of the software. These files contain valuable runtime information that can be used in a variety of applications such as anomaly detection, error prediction, template mining, and so on. Usually, the generated log messages are raw, which means they have an unstructured format. This indicates that these messages have to be parsed before data mining models can be applied. After parsing, template miners can be applied on the data to retrieve the events occurring in the log file. Thes
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Starenkyi, Ivan, and Oleksandra Donchenko. "DETECTION OF TRACES OF THE USE OF SOFTWARE SUCH AS «STEALER» IN THE MEMORY OF THE STORAGE DEVICE." Criminalistics and Forensics, no. 68 (July 3, 2023): 469–77. http://dx.doi.org/10.33994/kndise.2023.68.46.

Testo completo
Abstract (sommario):
The purpose of this work is to use an experimentally way to determine the characteristic features of the use of the software «Mars Stealer», which is positioned as a software product of the «Stealer» type, which is contained in the memory among the available and deleted data of the information storage device. The following conclusions can be drawn on the basis of the conducted experiment: Autopsy» software is a good tool for trying to reproduce and trace the events and processes that took place on the storage device; By studying the events and processes in the memory of the information storage
Gli stili APA, Harvard, Vancouver, ISO e altri
10

N. Sangeeta and Seung Yeob Nam. "Blockchain and Interplanetary File System (IPFS)-Based Data Storage System for Vehicular Networks with Keyword Search Capability." Electronics 12, no. 7 (2023): 1545. http://dx.doi.org/10.3390/electronics12071545.

Testo completo
Abstract (sommario):
Closed-circuit television (CCTV) cameras and black boxes are indispensable for road safety and accident management. Visible highway surveillance cameras can promote safe driving habits while discouraging moving violations. According to CCTV laws, footage captured by roadside cameras must be securely stored, and authorized persons can access it. Footages collected by CCTV and Blackbox are usually saved to the camera’s microSD card, the cloud, or hard drives locally but there are concerns about security and data integrity. These issues may be addressed by blockchain technology. The cost of stori
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Mohamed, Mohamed, and James C. L. Chow. "Acomprehensive computer database for medical physics on-call program." Journal of Radiotherapy in Practice 19, no. 1 (2019): 10–14. http://dx.doi.org/10.1017/s1460396919000244.

Testo completo
Abstract (sommario):
AbstractPurpose: A comprehensive and robust computer database was built to record and analyse the medical physics on-call data in emergency radiotherapy. The probability distributions of the on-call events varying with day and week were studied.Materials and methods: Variables of medical physics on-call events such as date and time of the event, number of event per day/week/month, treatment site of the event and identity of the on-call physicist were input to a programmed Excel file. The Excel file was linked to the MATLAB platform for data transfer and analysis. The total number of on-call ev
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Eljack, Sarah, Mahdi Jemmali, Mohsen Denden, et al. "A secure solution based on load-balancing algorithms between regions in the cloud environment." PeerJ Computer Science 9 (December 1, 2023): e1513. http://dx.doi.org/10.7717/peerj-cs.1513.

Testo completo
Abstract (sommario):
The problem treated in this article is the storage of sensitive data in the cloud environment and how to choose regions and zones to minimize the number of transfer file events. Handling sensitive data in the global internet network many times can increase risks and minimize security levels. Our work consists of scheduling several files on the different regions based on the security and load balancing parameters in the cloud. Each file is characterized by its size. If data is misplaced from the start it will require a transfer from one region to another and sometimes from one area to another.
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Ryasov, Aleksandr. "THE POSSIBILITY OF OBTAINING AND USING CRIMINALLY SIGNIFICANT INFORMATION FROM FILE METADATA IN THE DETECTION AND INVESTIGATION OF CRIMES." VESTNIK ADVANCED TRAINING INSTITUTE OF THE MIA OF RUSSIA, no. 2 (August 12, 2024): 110–16. http://dx.doi.org/10.29039/2312-7937-2024-2-110-116.

Testo completo
Abstract (sommario):
Modern technologies and the digitalization of society have led to the fact that most of the information in the world is stored and transmitted electronically. This circumstance opens up new opportunities for law enforcement agencies in the detection and investigation of crimes. In today's world, where technology plays a key role in society, digital footprints are becoming an important element in crime investigation. Everyone has already got used to the fact that the main object of computer expertise in the field of computer information is the contents of files. However, such an important area
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Smith, Glenn Gordon, and Barry Grant. "From Players to Programmers: A Computer Game Design Class for Middle-School Children." Journal of Educational Technology Systems 28, no. 3 (2000): 263–75. http://dx.doi.org/10.2190/rvx6-61b0-8m2q-dul3.

Testo completo
Abstract (sommario):
The prospect of making computer games has often be used to “hook” students into learning programming or cognitive skills. There is, however, little research on using computer game design classes to teach computer skills. This article provides an answer to the question: Can a computer game design course employing the new generation of game authoring tools set middle school students on the path of learning a broad and sophisticated range of computer skills? The answer, based on the senior author's experiences teaching such a course eight times is, Yes. Students learned: an authoring system speci
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Syed, Salma, Nadimpalli Usha Deepa Sundari, Satish Babu Dogiparti, et al. "An intelligent approach to design big data on e-commerce in cloud computing environment." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 3 (2025): 3439. https://doi.org/10.11591/ijece.v15i3.pp3439-3448.

Testo completo
Abstract (sommario):
Web resources extract useful knowledge by the process of web mining. Web server maintains the log files for analyzing them from behavior of customer and improves business as the challenging task for E-commerce companies. The processing and computing of big data was increased day by day by the demand of computer system’s ability. The emphasis on data was increased gradually by the rapid development of information technology. Various businesses are exploring effective data analysis methods, and this system proposes an intelligent approach to designing big data for e-commerce in a cloud computing
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Kim, Ye, A. Alimbekova, А. Gavrilova, and А. Kan. "DEVELOPMENT OF A COMPUTER-BASED EDUCATIONAL PROGRAM ON THE SUBJECT "FUNDAMENTALS OF COMPUTER MODELING"." Automation of technological and business processes 16, no. 2 (2024): 47–54. http://dx.doi.org/10.15673/atbp.v16i2.2851.

Testo completo
Abstract (sommario):
In the conditions of technological progress and rapid development of information technologies, it is very challenging to prepare specialists in the field of information and communication technologies who would fully possess the knowledge and skills to work with the diverse range of instrumental and software tools and equipment used in the field. This is due to the continuous improvement and updating of programming languages, frameworks, software environments, shells, and hardware. One of the ways to address this issue is through computer-based educational programs, allowing the individualizati
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Hidayat, Arif, Sudarmaji ., Dharmawan ., et al. "Comparative Analysis Of Applications OSforensics, GetDataBack, Genius and Diskdigger On Digital Data Recovery in the Computer Device." International Journal of Engineering & Technology 7, no. 4.7 (2018): 445. http://dx.doi.org/10.14419/ijet.v7i4.7.27356.

Testo completo
Abstract (sommario):
In the use of computer devices that are done in recent use for data processing in the form of text, images or video that can be done easily and quickly. But in reality, there are events where the work, in the form of computer files, can be lost so that the required files are missing from the storage media in the computer. In this research will be discussed and presented a comparative analysis of four software for recovery of data that has been deleted. The applications used are OSforensics, GetDataBack, Disk Genius and Diskdigger. The capabilities of such applications in the recovery of delete
Gli stili APA, Harvard, Vancouver, ISO e altri
18

Peditto, Matteo, Riccardo Nucera, Erasmo Rubino, et al. "Improving Oral Surgery: A Workflow Proposal to Create Custom 3D Templates for Surgical Procedures." Open Dentistry Journal 14, no. 1 (2020): 35–44. http://dx.doi.org/10.2174/1874210602014010035.

Testo completo
Abstract (sommario):
Background: Computer-guided technologies are adopted in various fields of surgery to limit invasiveness and obtain patient benefits in terms of surgery duration and post-operative course. Surgical templates realized through CAD/CAM technologies are widely diffused in implant dentistry. The aim of this work is to propose, beyond implantology, the feasibility of application of 3D printed surgical templates in oral surgery procedures requiring osteotomies (like maxillary cyst enucleation and tooth disimpaction) in order to obtain accurate surgeries, avoid anatomical damage of surrounding structur
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Alnajjar, Ibrahim Ali, and Massudi Mahmuddin. "The Enhanced Forensic Examination and Analysis for Mobile Cloud Platform by Applying Data Mining Methods." Webology 18, SI01 (2021): 47–74. http://dx.doi.org/10.14704/web/v18si01/web18006.

Testo completo
Abstract (sommario):
Investigating the mobile cloud environment is a challenging task due to the characteristics of voluminous data, dispersion of data, virtualization, and diverse data. Recent research works focus on applying the latest forensic methodologies to the mobile cloud investigation. This paper proposes an enhanced forensic examination and analysis model for the mobile cloud environment that incorporates timeline analysis, hash filtering, data carving, and data transformation sub-phases to improve the performance of the cloud evidence identification and overall forensic decision-making. It analyzes the
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Morillo Reina, J. D., and T. J. Mateo Sanguino. "Decentralized and Secure Blockchain Solution for Tamper-Proof Logging Events." Future Internet 17, no. 3 (2025): 108. https://doi.org/10.3390/fi17030108.

Testo completo
Abstract (sommario):
Log files are essential assets for IT engineers engaged in the security of server and computer systems. They provide crucial information for identifying malicious events, conducting cybersecurity incident analyses, performing audits, system maintenance, and ensuring compliance with security regulations. Nevertheless, there is still the possibility of deliberate data manipulation by own personnel, especially with regard to system access and configuration changes, where error tracking or debugging traces are vital. To address tampering of log files, this work proposes a solution to ensure data i
Gli stili APA, Harvard, Vancouver, ISO e altri
21

He, Hai-yan, Chih-Yang Lin, and Hollis T. Cline. "In Vivo Time-Lapse Imaging and Analysis of Dendritic Structural Plasticity in Xenopus laevis Tadpoles." Cold Spring Harbor Protocols 2022, no. 1 (2021): pdb.prot106781. http://dx.doi.org/10.1101/pdb.prot106781.

Testo completo
Abstract (sommario):
In vivo time-lapse imaging of complete dendritic arbor structures in tectal neurons of Xenopus laevis tadpoles has served as a powerful in vivo model to study activity-dependent structural plasticity in the central nervous system during early development. In addition to quantitative analysis of gross arbor structure, dynamic analysis of the four-dimensional data offers particularly valuable insights into the structural changes occurring in subcellular domains over experience/development-driven structural plasticity events. Such analysis allows not only quantifiable characterization of branch a
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Haislip, Jacob Z., Khondkar E. Karim, Karen Jingrong Lin, and Robert E. Pinsker. "The Influences of CEO IT Expertise and Board-Level Technology Committees on Form 8-K Disclosure Timeliness." Journal of Information Systems 34, no. 2 (2019): 167–85. http://dx.doi.org/10.2308/isys-52530.

Testo completo
Abstract (sommario):
ABSTRACT Recent research documents the improvement of Form 8-K disclosure timeliness in the post-Sarbanes-Oxley Act (SOX) era. However, it remains unclear why disclosure timeliness overall has improved, but disclosure timeliness for certain events has not improved. We examine firms' information technology (IT) management and IT governance in order to investigate their potential positive impacts on 8-K reporting timeliness. We find that, on average, IT-expert Chief Executive Officers (CEOs) and firms with board-level technology committees file Form 8-Ks in a timelier manner. Specifically, firms
Gli stili APA, Harvard, Vancouver, ISO e altri
23

Lei, Yan, Linxiang He, and Houqiang Huang. "Enhancement of Nursing Effect in Emergency General Surgery Based on Computer Aid." Journal of Healthcare Engineering 2022 (March 10, 2022): 1–10. http://dx.doi.org/10.1155/2022/6745993.

Testo completo
Abstract (sommario):
In order to improve the nursing effect of emergency general surgery, this paper combines computer algorithms to carry out the intelligent management of general surgery nursing, and realizes the standardization of nursing information, the electronic nursing file, the precision of nursing workload, and the intelligentization of nursing quality control by means of informatization. This truly and objectively reflects the nursing operation and treatment situation, prevents the occurrence of some adverse events, and effectively reduces the workload of nursing care. Moreover, this paper uses a standa
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Gouveia, José Rafael Ferreira de, and Cristina Rodrigues Nascimento. "Uso e Cobertura do Solo após Eventos de Queimadas no Município de Floresta em Pernambuco." Revista Brasileira de Geografia Física 15, no. 6 (2022): 3121–35. http://dx.doi.org/10.26848/rbgf.v15.6.p3121-3135.

Testo completo
Abstract (sommario):
Fires are recurrent in Brazil to clean up and increase territories. Temporal analyzes on the subject show that the municipality of Floresta in Pernambuco stands out in the number of cases in the month of November 2019. This article aims to collect and quantify the incidence of hotspots and burned areas in the aforementioned region and month, in addition to of land use and cover conditions based on remote sensing techniques. Information from the Pernambuco Water and Climate Agency (APAC) was used for climatology. The databases of the Burning Database were used to collect and quantify hotspots.
Gli stili APA, Harvard, Vancouver, ISO e altri
25

Kobayashi, Kent D., and H. C. Bittenbender. "155 Farmer's Bookshelf: Evolution of an Information System for Crops in Hawaii." HortScience 34, no. 3 (1999): 468E—469. http://dx.doi.org/10.21273/hortsci.34.3.468e.

Testo completo
Abstract (sommario):
In 1988, the Farmer's Bookshelf started out as a computerized information system of crops grown in Hawaii. The first version was created on an Apple Macintosh computer using a hypermedia program called HyperCard. Because HyperCard came with each Macintosh computer, only the crop files needed to be sent to clientele. As the demand for an IBM-compatible version of the Farmer's Bookshelf increased, the Windows version was created using a hypermedia program called Plus. In addition to the crop files, the runtime version of Plus was also distributed to clientele. Later, other files were added to th
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Mueggler, Elias, Henri Rebecq, Guillermo Gallego, Tobi Delbruck, and Davide Scaramuzza. "The event-camera dataset and simulator: Event-based data for pose estimation, visual odometry, and SLAM." International Journal of Robotics Research 36, no. 2 (2017): 142–49. http://dx.doi.org/10.1177/0278364917691115.

Testo completo
Abstract (sommario):
New vision sensors, such as the dynamic and active-pixel vision sensor (DAVIS), incorporate a conventional global-shutter camera and an event-based sensor in the same pixel array. These sensors have great potential for high-speed robotics and computer vision because they allow us to combine the benefits of conventional cameras with those of event-based sensors: low latency, high temporal resolution, and very high dynamic range. However, new algorithms are required to exploit the sensor characteristics and cope with its unconventional output, which consists of a stream of asynchronous brightnes
Gli stili APA, Harvard, Vancouver, ISO e altri
27

Sezonov, V. S. "The concept of a document in jurisprudence." Law and Safety 82, no. 3 (2021): 200–208. http://dx.doi.org/10.32631/pb.2021.3.23.

Testo completo
Abstract (sommario):
At the present stage of development of legal document science and forensic document research techniques there is a need to expand the concept of the document using the achievements of various fields of knowledge. A document is a multifaceted, generalized concept for all important sources of information. Today, there is no consensus on the classification of legal documents. In our opinion, a document in jurisprudence has the following properties: it is a carrier and source of necessary information, it is in the documents that information is recorded for the first time; has a legal meaning, econ
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Poquerusse, M., and P. S. McIntosh. "Type III Radio Burst Productivity of Solar Flares." International Astronomical Union Colloquium 104, no. 2 (1989): 177–80. http://dx.doi.org/10.1017/s0252921100154107.

Testo completo
Abstract (sommario):
We study the statistical relationship between optical flares and type III radio bursts, using modern and extensive computer files. Results emerge along two main lines, concerning the physical mechanism of ejection of energetic particles, and the magnetic field geometry respectively.First, we find that type III probability of occurrence increases strongly with the brightness of a flare and its proximity to a sunspot, and with accompanying prominence activity. This suggests that Bornmann's class I and III events correspond to distinct physical phenomena, particle acceleration and magnetic expans
Gli stili APA, Harvard, Vancouver, ISO e altri
29

Patil, Anand N., and Sujata V. Mallapur. "Novel machine learning based authentication technique in VANET system for secure data transmission." Journal of Autonomous Intelligence 6, no. 2 (2023): 828. http://dx.doi.org/10.32629/jai.v6i2.828.

Testo completo
Abstract (sommario):
<p>Adaptive transport technologies based on vehicular ad hoc networks (VANET) has proven considerable potential in light of the developing expansion of driver assistance and automobile telecommunication systems. However, confidentiality and safety are the vital challenges in vehicular ad hoc networks which could be seriously impaired by malicious attackers. While protecting vehicle privacy from threats, it is imperative to stop internal vehicles from putting out bogus messages. Considering these issues, a novel machine learning based message authentication combined with blockchain and in
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Sugier, Jarosław. "Scripting Scenarios of Pedestrian Behavior in a Computer Simulator of Security Monitoring System: A Practitioner’s Perspective." Transport and Telecommunication Journal 24, no. 4 (2023): 349–60. http://dx.doi.org/10.2478/ttj-2023-0027.

Testo completo
Abstract (sommario):
Abstract The subject of this paper is the AvatarTraffic simulator – a computer system capable of modelling in real time environments such as subway stations or airport halls populated with tens or hundreds of moving figures, which, in addition to pedestrian traffic typical for this type of objects, can perform predefined sequences of events and actions formulated as a simulation scenario. Thanks to the integration with a real monitoring system, the simulator, in addition to providing data streams (including video) generated by the virtual scene, is also able to dynamically respond to actions t
Gli stili APA, Harvard, Vancouver, ISO e altri
31

Colligan, Thomas, Kayla Irish, Douglas J. Emlen, and Travis J. Wheeler. "DISCO: A deep learning ensemble for uncertainty-aware segmentation of acoustic signals." PLOS ONE 18, no. 7 (2023): e0288172. http://dx.doi.org/10.1371/journal.pone.0288172.

Testo completo
Abstract (sommario):
Recordings of animal sounds enable a wide range of observational inquiries into animal communication, behavior, and diversity. Automated labeling of sound events in such recordings can improve both throughput and reproducibility of analysis. Here, we describe our software package for labeling elements in recordings of animal sounds, and demonstrate its utility on recordings of beetle courtships and whale songs. The software, DISCO, computes sensible confidence estimates and produces labels with high precision and accuracy. In addition to the core labeling software, it provides a simple tool fo
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Marjai, Péter, Péter Lehotay-Kéry, and Attila Kiss. "A Novel Dictionary-Based Method to Compress Log Files with Different Message Frequency Distributions." Applied Sciences 12, no. 4 (2022): 2044. http://dx.doi.org/10.3390/app12042044.

Testo completo
Abstract (sommario):
In the present day, virtually every application software generates large amounts of log entries during its work. The log files that are made from these entries are a collection of information about what happened while the program was running. This report can be used for multiple purposes such as performance monitoring, maintaining security, or improving business decision making. Log entries are usually generated in a disorganized manner. Using template miners, the different ‘event types’ can be distinguished (each log entry is an event), and the set of all entries is split into disjointed subs
Gli stili APA, Harvard, Vancouver, ISO e altri
33

Machard, Anaïs, Christian Inard, Jean-Marie Alessandrini, Charles Pelé, and Jacques Ribéron. "A Methodology for Assembling Future Weather Files Including Heatwaves for Building Thermal Simulations from the European Coordinated Regional Downscaling Experiment (EURO-CORDEX) Climate Data." Energies 13, no. 13 (2020): 3424. http://dx.doi.org/10.3390/en13133424.

Testo completo
Abstract (sommario):
With increasing mean and extreme temperatures due to climate change, it becomes necessary to use—not only future typical conditions—but future heatwaves in building thermal simulations as well. Future typical weather files are widespread, but few researchers have put together methodologies to reproduce future extreme conditions. Furthermore, climate uncertainties need to be considered and it is often difficult due to the lack of data accessibility. In this article, we propose a methodology to re-assemble future weather files—ready-to-use for building simulations—using data from the European Co
Gli stili APA, Harvard, Vancouver, ISO e altri
34

Kern, Fabian, Jeremy Amand, Ilya Senatorov, et al. "miRSwitch: detecting microRNA arm shift and switch events." Nucleic Acids Research 48, W1 (2020): W268—W274. http://dx.doi.org/10.1093/nar/gkaa323.

Testo completo
Abstract (sommario):
Abstract Arm selection, the preferential expression of a 3′ or 5′ mature microRNA (miRNA), is a highly dynamic and tissue-specific process. Time-dependent expression shifts or switches between the arms are also relevant for human diseases. We present miRSwitch, a web server to facilitate the analysis and interpretation of arm selection events. Our species-independent tool evaluates pre-processed small non-coding RNA sequencing (sncRNA-seq) data, i.e. expression matrices or output files from miRNA quantification tools (miRDeep2, miRMaster, sRNAbench). miRSwitch highlights potential changes in t
Gli stili APA, Harvard, Vancouver, ISO e altri
35

Et.al, Ms Hepisuthar. "Comparative Analysis Study on SSD, HDD, and SSHD." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (2021): 3635–41. http://dx.doi.org/10.17762/turcomat.v12i3.1644.

Testo completo
Abstract (sommario):
In the Current Century, permeant storage devices and methods of storing data changed from traditional HDD to SDD. In this document, we discuss the merge of HDD and SSD. The Abbreviation of SSHD is called the solid-state hybrid disk. A mixture of both secondary devices to enhance the performance of the system. Inside the SSD, data movement events occur without any user input. Recent research has suggested that SSD has only the Replacement of secondary storage. HDD is also good in life span with longer life. It’s more reliable for long time data contained in this. HDD storage has typical magneti
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Szpyrka, Marcin, Edyta Brzychczy, Aneta Napieraj, Jacek Korski, and Grzegorz J. Nalepa. "Conformance Checking of a Longwall Shearer Operation Based on Low-Level Events." Energies 13, no. 24 (2020): 6630. http://dx.doi.org/10.3390/en13246630.

Testo completo
Abstract (sommario):
Conformance checking is a process mining technique that compares a process model with an event log of the same process to check whether the current execution stored in the log conforms to the model and vice versa. This paper deals with the conformance checking of a longwall shearer process. The approach uses place-transition Petri nets with inhibitor arcs for modeling purposes. We use event log files collected from a few coal mines located in Poland by Famur S.A., one of the global suppliers of coal mining machines. One of the main advantages of the approach is the possibility for both offline
Gli stili APA, Harvard, Vancouver, ISO e altri
37

Krämer, Stefan D., Johannes Wöhrle, Christin Rath, and Günter Roth. "Anabel: An Online Tool for the Real-Time Kinetic Analysis of Binding Events." Bioinformatics and Biology Insights 13 (January 2019): 117793221882138. http://dx.doi.org/10.1177/1177932218821383.

Testo completo
Abstract (sommario):
Anabel ( Analysis of binding events + l) is an open source online software tool ( www.skscience.org/anabel ) for the convenient analysis of molecular binding interactions. Currently, exported datasets from Biacore (surface plasmon resonance [SPR]), FortéBio (biolayer interference [BLI]), and Biametrics (single color reflectometry [SCORE]) can be uploaded and evaluated in Anabel using 2 different evaluation methods. Moreover, a universal data template format is provided to upload any other binding dataset to Anabel. This enables an easier comparison of different analysis methods for all users.
Gli stili APA, Harvard, Vancouver, ISO e altri
38

Ali, Moch Dzikri Azhari, Asep Id Hadiana, and Melina Melina. "Securing Network Log Data Using Advance Encryption Standard Algorithm And Twofish With Common Event Format." International Journal of Quantitative Research and Modeling 5, no. 3 (2024): 341–53. https://doi.org/10.46336/ijqrm.v5i3.757.

Testo completo
Abstract (sommario):
The rapid advancement of information technology demands enhanced security for data exchange in the digital world. Network security threats can arise from various sources, necessitating techniques to protect information transmitted between interconnected networks. Securing network logs is a critical step in strengthening overall network security. Network logs are records of activities within a computer network, including unauthorized access attempts, user activities, and other key events. This research focuses on developing a network log security system by comparing the performance of the Advan
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Yang, Jing. "Media Evolution, “Double-edged Sword” Technology and Active Spectatorship: investigating “Desktop Film” from media ecology perspective." Lumina 14, no. 1 (2020): 125–38. http://dx.doi.org/10.34019/1981-4070.2020.v14.30260.

Testo completo
Abstract (sommario):
Desktop film or computer screen film is a film subgenre with all events and actions taking place on a screen of a computer and using the protagonist’s first-person perspective, exemplified by The Den (2013), Open Windows(2014), Unfriended (2014), Unfriended: Dark Web (2018), Profile (2018) and Searching(2018). This paper mainly focuses on the desktop films with the theoretical framework of “Media Ecology”, aiming to investigate how the desktop film evolves and interacts with new media, digital technology, while influencing communication and spectatorship. Firstly, this paper discusses the evol
Gli stili APA, Harvard, Vancouver, ISO e altri
40

Manihda, O. V., and V. A. Hnera. "PREFERENCES OF USING GEOINFORMATION SYSTEMS FOR FIXATION ON ARCHAEOLOGICAL OBJECTS." Archaeology and Early History of Ukraine 30, no. 1 (2019): 218–30. http://dx.doi.org/10.37445/adiu.2019.01.17.

Testo completo
Abstract (sommario):
The paper proposes examples of archaeological objects fixing using Geoinformation system (GIS) as an effective computer-supported system used for a digital visualization and analysis of geographic features and events happening on them. The main preference of using these methods is disclosed due to elaborations of specialists worked in Architectural-archaeological expedition of Archaeology Institute of NASU for several years. There is an experience gained in field and urban space.
 According to this thesis main preferences that is noticed by authors are: 1) an accuracy of fixing in a diffi
Gli stili APA, Harvard, Vancouver, ISO e altri
41

Prime, Sunantha. "Forecasting the changes in daily stock prices in Shanghai Stock Exchange using Neural Network and Ordinary Least Squares Regression." Investment Management and Financial Innovations 17, no. 3 (2020): 292–307. http://dx.doi.org/10.21511/imfi.17(3).2020.22.

Testo completo
Abstract (sommario):
The research focuses on finding a superior forecasting technique to predict stock movement and behavior in the Shanghai Stock Exchange. The author’s interest is in stock market activities during high volatility, specifically 13 years from 2002 to 2015. This volatile period, fueled by events such as the dot-com bubble, SARS outbreak, political leadership transitions, and the global financial crisis, is of interest. The study aims to analyze changes in stock prices during an unstable period. The author used advanced computer sciences, Machine Learning through information processing and training,
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Kumar, Vijay, and Talwinder Kaur. "Cloud Functions and Serverless Computing." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 3426–27. http://dx.doi.org/10.22214/ijraset.2022.43163.

Testo completo
Abstract (sommario):
Abstract: Cloud Function in the simplest words is a Function-as-a-Service (FaaS). FaaS is actually a family of the serverless computing category. “Serverless” means that the user can focus on its application logic without dealing with infrastructure at all. Painless development, deployment, and maintenance of a web API is still not a turn-key solution, although modern web application frameworkshave improved dramatically in the last few years. Serverless is without any doubt a game-changer. The event-driven approach combined with a scalable and robust cloud ecosystem offered by the maintop clou
Gli stili APA, Harvard, Vancouver, ISO e altri
43

Kumar, Vijay. "Cloud Functions Using Server less Computing." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (2021): 418–19. http://dx.doi.org/10.22214/ijraset.2021.37986.

Testo completo
Abstract (sommario):
Abstract: Cloud Function in the simplest words is a Function-as-a-Service (FaaS). FaaS is actually a family of the serverless computing category. “Serverless” means that the user can focus on its application logic without dealing with infrastructure at all. Painless development, deployment, and maintenance of a web API is still not a turn-key solution, although modern web application frameworks have improved dramatically in the last few years. Serverless is without any doubt a game-changer. The event-driven approach combined with a scalable and robust cloud ecosystem offered by the main top cl
Gli stili APA, Harvard, Vancouver, ISO e altri
44

Chun, Hein, and Sangwoo Kim. "BAMixChecker: an automated checkup tool for matched sample pairs in NGS cohort." Bioinformatics 35, no. 22 (2019): 4806–8. http://dx.doi.org/10.1093/bioinformatics/btz479.

Testo completo
Abstract (sommario):
Abstract Summary Mislabeling in the process of next generation sequencing is a frequent problem that can cause an entire genomic analysis to fail, and a regular cohort-level checkup is needed to ensure that it has not occurred. We developed a new, automated tool (BAMixChecker) that accurately detects sample mismatches from a given BAM file cohort with minimal user intervention. BAMixChecker uses a flexible, data-specific set of single-nucleotide polymorphisms and detects orphan (unpaired) and swapped (mispaired) samples based on genotype-concordance score and entropy-based file name analysis.
Gli stili APA, Harvard, Vancouver, ISO e altri
45

Baftiu, Naim, and Raif Bytyqi. "APPLICATION OF BLASTWARE SOFTWARE FOR MEASURING MICROCOLIMIC CONDITIONS." Teacher of the future 31, no. 4 (2019): 1093–98. http://dx.doi.org/10.35120/kij31041093b.

Testo completo
Abstract (sommario):
Safety and health at work as per legislation is conceived as an integral part of the organization of work and work process and on this basis is provided every worker and every useful work, regardless of the type and complexity of the work, which is in accordance with the constitutional principle regarding the right of every worker for protection at work. Instantel Blastware software, the Windows software companion to your Instantel vibration monitor offers powerful, easy-to-use features, for event management, compliance reporting and advanced data analysis. Blastware software is designed to pe
Gli stili APA, Harvard, Vancouver, ISO e altri
46

Ghozia, Ahmed, Gamal Attiya, Emad Adly, and Nawal El-Fishawy. "Intelligence Is beyond Learning: A Context-Aware Artificial Intelligent System for Video Understanding." Computational Intelligence and Neuroscience 2020 (December 23, 2020): 1–15. http://dx.doi.org/10.1155/2020/8813089.

Testo completo
Abstract (sommario):
Understanding video files is a challenging task. While the current video understanding techniques rely on deep learning, the obtained results suffer from a lack of real trustful meaning. Deep learning recognizes patterns from big data, leading to deep feature abstraction, not deep understanding. Deep learning tries to understand multimedia production by analyzing its content. We cannot understand the semantics of a multimedia file by analyzing its content only. Events occurring in a scene earn their meanings from the context containing them. A screaming kid could be scared of a threat or surpr
Gli stili APA, Harvard, Vancouver, ISO e altri
47

Gómez-Déniz, Emilio, and Enrique Calderín-Ojeda. "A Priori Ratemaking Selection Using Multivariate Regression Models Allowing Different Coverages in Auto Insurance." Risks 9, no. 7 (2021): 137. http://dx.doi.org/10.3390/risks9070137.

Testo completo
Abstract (sommario):
A comprehensive auto insurance policy usually provides the broadest protection for the most common events for which the policyholder would file a claim. On the other hand, some insurers offer extended third-party car insurance to adapt to the personal needs of every policyholder. The extra coverage includes cover against fire, natural hazards, theft, windscreen repair, and legal expenses, among some other coverages that apply to specific events that may cause damage to the insured’s vehicle. In this paper, a multivariate distribution, based on a conditional specification, is proposed to accoun
Gli stili APA, Harvard, Vancouver, ISO e altri
48

Philp, Cassie, Barbara Geller, and Fiona Alexander. "Psychiatric Induction Programme in Fife." BJPsych Open 8, S1 (2022): S170. http://dx.doi.org/10.1192/bjo.2022.475.

Testo completo
Abstract (sommario):
AimsTo improve the Psychiatry induction for DiTs in Fife.MethodsThe purpose of induction is to provide Doctors in Training (DiT) with a smooth, supported transition between roles. Delivered well, it will promote confidence and also provide a thorough grounding in the key requirements of the role and clarity regarding sources of help.A recent report, commissioned by the GMC, identified the key areas which should be covered in induction. The findings demonstrated a clear link between inadequate inductions to the impact on doctors’ well-being and patient safety issues.A questionnaire was issued t
Gli stili APA, Harvard, Vancouver, ISO e altri
49

Yang, Ting, Guanghua Zhang, Yin Li, Yiyu Yang, He Wang, and Yuqing Zhang. "Detecting Privacy Leakage of Smart Home Devices through Traffic Analysis." Security and Communication Networks 2022 (July 15, 2022): 1–10. http://dx.doi.org/10.1155/2022/5655314.

Testo completo
Abstract (sommario):
Under the management of the Internet of Things platform, smart home devices can be operated remotely by users and greatly facilitate people’s life. Currently, smart home devices have been widely accepted by consumers, and the number of smart home devices is rising rapidly. The increase of smart home devices introduces various security hazards to users. Smart home devices are vulnerable to side-channel attacks based on network traffic. The event of smart home devices can be identified by network surveillants. Given this situation, we designed a set of standardized workflows for traffic capturin
Gli stili APA, Harvard, Vancouver, ISO e altri
50

Davis, Allan Peter, Thomas C. Wiegers, Cynthia J. Grondin, et al. "Leveraging the Comparative Toxicogenomics Database to Fill in Knowledge Gaps for Environmental Health: A Test Case for Air Pollution-induced Cardiovascular Disease." Toxicological Sciences 177, no. 2 (2020): 392–404. http://dx.doi.org/10.1093/toxsci/kfaa113.

Testo completo
Abstract (sommario):
Abstract Environmental health studies relate how exposures (eg, chemicals) affect human health and disease; however, in most cases, the molecular and biological mechanisms connecting an exposure with a disease remain unknown. To help fill in these knowledge gaps, we sought to leverage content from the public Comparative Toxicogenomics Database (CTD) to identify potential intermediary steps. In a proof-of-concept study, we systematically compute the genes, molecular mechanisms, and biological events for the environmental health association linking air pollution toxicants with 2 cardiovascular d
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!