934 resultados para Compressed Objects


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents the process of load balancing in simulation system Triad.Net, the architecture of load balancing subsystem. The main features of static and dynamic load balancing are discussed and new approach, controlled dynamic load balancing, needed for regular mapping of simulation model on the network of computers is proposed. The paper considers linguistic constructions of Triad language for different load balancing algorithms description.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper deals with the security problems of DRM protected e-learning content. After a short review of the main DRM systems and methods used in e-learning, an examination is made of participators in DRM schemes (e-learning object author, content creator, content publisher, license creator and end user). Then a conceptual model of security related processes of DRM implementation is proposed which is improved afterwards to reflect some particularities in DRM protection of e-learning objects. A methodical way is used to describe the security related motives, responsibilities and goals of the main participators involved in the DRM system. Taken together with the process model, these security properties are used to establish a list of requirements to fulfill and a possibility for formal verification of real DRM systems compliance with these requirements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper is proposed a model for researching the capability to influence, by selected methods’ groups of compression, to the co-efficient of information security of selected objects’ groups, exposed to selected attacks’ groups. With the help of methods for multi-criteria evaluation are chosen the methods’ groups with the lowest risk with respect to the information security. Recommendations for future investigations are proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper a methodology for evaluation of information security of objects under attacks, processed by methods of compression, is represented. Two basic parameters for evaluation of information security of objects – TIME and SIZE – are chosen and the characteristics, which reflect on their evaluation, are analyzed and estimated. A co-efficient of information security of object is proposed as a mean of the coefficients of the parameter TIME and SIZE. From the simulation experiments which were carried out methods with the highest co-efficient of information security had been determined. Assessments and conclusions for future investigations are proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

ODTs have emerged as a novel oral dosage form with a potential to deliver a wide range of drug candidates to paediatric and geriatric patients. Compression of excipients offers a costeffective and translatable methodology for the manufacture of ODTs. Though, technical challenges prevail such as difficulty to achieve suitable tablet mechanical strength while ensuring rapid disintegration in the mouth, poor compressibility of preferred ODT diluent Dmannitol, and limited use for modified drug-release. The work investigates excipients’ functionality in ODTs and proposes new methodologies for enhancing material characteristics via process and particle engineering. It also aims to expand ODT applications for modified drug-release. Preformulation and formulation studies employed a plethora of techniques/tests including AFM, SEM, DSC, XRD, TGA, HSM, FTIR, hardness, disintegration time, friability, stress/strain and Heckel analysis. Tableting of D-mannitol and cellulosic excipients utilised various compression forces, material concentrations and grades. Engineered D-mannitol particles were made by spray drying mannitol with pore former NH4HCO3. Coated microparticles of model API omeprazole were prepared using water-based film forming polymers. The results of nanoscopic investigations elucidated the compression profiles of ODT excipients. Strong densification of MCC (Py is 625 MPa) occurs due to conglomeration of physicomechanical factors whereas D-mannitol fragments under pressure leading to poor compacts. Addition of cellulosic excipients (L-HPC and HPMC) and granular mannitol to powder mannitol was required to mechanically strengthen the dosage form (hardness >60 N, friability <1%) and to maintain rapid disintegration (<30 sec). Similarly, functionality was integrated into D-mannitol by fabrication of porous, yet, resilient particles which resulted in upto 150% increase in the hardness of compacts. The formulated particles provided resistance to fracture under pressure due to inherent elasticity while promoted tablet disintegration (50-77% reduction in disintegration time) due to porous nature. Additionally, coated microparticles provided an ODT-appropriate modified-release coating strategy by preventing drug (omeprazole) release.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report examines important issues pertaining to the different ways of affecting the information security of file objects under information attacks through methods of compression. Accordingly, the report analyzes the three-way relationships which may exist among a selected set of attacks, methods and objects. Thus, a methodology is proposed for evaluation of information security, and a coefficient of information security is created. With respects to this coefficient, using different criteria and methods for evaluation and selection of alternatives, the lowest-risk methods of compression are selected.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report an extension of the procedure devised by Weinstein and Shanks (Memory & Cognition 36:1415-1428, 2008) to study false recognition and priming of pictures. Participants viewed scenes with multiple embedded objects (seen items), then studied the names of these objects and the names of other objects (read items). Finally, participants completed a combined direct (recognition) and indirect (identification) memory test that included seen items, read items, and new items. In the direct test, participants recognized pictures of seen and read items more often than new pictures. In the indirect test, participants' speed at identifying those same pictures was improved for pictures that they had actually studied, and also for falsely recognized pictures whose names they had read. These data provide new evidence that a false-memory induction procedure can elicit memory-like representations that are difficult to distinguish from "true" memories of studied pictures. © 2012 Psychonomic Society, Inc.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The problem of a finding of ranging of the objects nearest to the cyclic relation set by the expert between objects is considered. Formalization of the problem arising at it is resulted. The algorithm based on a method of the consecutive analysis of variants and the analysis of conditions of acyclicity is offered.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ways of representation of relations between pair's objects are described at a complete choice. Methods of revealing and kinds of relations between objects are considered. The table of conformity between various forms of representation of relations is resulted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ontological approach to structuring knowledge and the description of data domain of knowledge is considered. It is described tool ontology-controlled complex for research and developments of sensor systems. Some approaches to solution most frequently meeting tasks are considered for creation of the recognition procedures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The problem of a finding of ranging of the objects nearest to the cyclic relation set by the expert between objects is considered. Formalization of the problem arising at it is resulted. The algorithm based on a method of the consecutive analysis of variants and the analysis of conditions of acyclicity is offered.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The principal methods of compression and different types of non-encrypted objects are described. An analysis is made of the results obtained from examinations of the speed of compression for objects when using passwords with different length. The size of the new file obtained after compression is also analyzed. Some evaluations are made with regard to the methods and the objects used in the examinations. In conclusion some deductions are drawn as well as recommendations for future work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The questions of designing multicriteria control systems on the basis of logic models of composite dynamic objects are considered.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A spatial object consists of data assigned to points in a space. Spatial objects, such as memory states and three dimensional graphical scenes, are diverse and ubiquitous in computing. We develop a general theory of spatial objects by modelling abstract data types of spatial objects as topological algebras of functions. One useful algebra is that of continuous functions, with operations derived from operations on space and data, and equipped with the compact-open topology. Terms are used as abstract syntax for defining spatial objects and conditional equational specifications are used for reasoning. We pose a completeness problem: Given a selection of operations on spatial objects, do the terms approximate all the spatial objects to arbitrary accuracy? We give some general methods for solving the problem and consider their application to spatial objects with real number attributes. © 2011 British Computer Society.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper treats the task for cluster analysis of a given assembly of objects on the basis of the information contained in the description table of these objects. Various methods of cluster analysis are briefly considered. Heuristic method and rules for classification of the given assembly of objects are presented for the cases when their division into classes and the number of classes is not known. The algorithm is checked by a test example and two program products (PP) – learning systems and software for company management. Analysis of the results is presented.