965 resultados para File-to-File


Relevância:

50.00% 50.00%

Publicador:

Resumo:

This report examines important issues pertaining to the different ways of affecting the information security of file objects under information attacks through methods of compression. Accordingly, the report analyzes the three-way relationships which may exist among a selected set of attacks, methods and objects. Thus, a methodology is proposed for evaluation of information security, and a coefficient of information security is created. With respects to this coefficient, using different criteria and methods for evaluation and selection of alternatives, the lowest-risk methods of compression are selected.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

AMS Subj. Classification: 68U05, 68P30

Relevância:

50.00% 50.00%

Publicador:

Resumo:

ACM Computing Classification System (1998): I.2.8, G.1.6.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

In his study - File Control: The Heart Of Business Computer Management - William G. O'Brien, Assistant Professor, The School of Hospitality Management at Florida International University, initially informs you: “Even though computers are an everyday part of the hospitality industry, many managers lack the knowledge and experience to control and protect the files in these systems. The author offers guidelines which can minimize or prevent damage to the business as a whole.” Our author initially opens this study with some anecdotal instances illustrating the failure of hospitality managers to exercise due caution with regard to computer supported information systems inside their restaurants and hotels. “Of the three components that make up any business computer system (data files, programs, and hard-ware), it is files that are most important, perhaps irreplaceable, to the business,” O’Brien informs you. O’Brien breaks down the noun, files, into two distinct categories. They are, the files of extrinsic value, and its counterpart the files of intrinsic value. An example of extrinsic value files would be a restaurant’s wine inventory. “As sales are made and new shipments are received, the computer updates the file,” says O’Brien. “This information might come directly from a point-of-sale terminal or might be entered manually by an employee,” he further explains. On the intrinsic side of the equation, O’Brien wants you to know that the information itself is the valuable part of this type of file. Its value is over and above the file’s informational purpose as a pragmatic business tool, as it is in inventory control. “The information is money in the legal sense For instance, figures moved about in banking system computers do not represent dollars; they are dollars,” O’Brien explains. “If the record of a dollar amount is erased from all computer files, then that money ceases to exist,” he warns. This type of information can also be bought and sold, such as it is in customer lists to advertisers. Files must be protected O’Brien stresses. “File security requires a systematic approach,” he discloses. O’Brien goes on to explain important elements to consider when evaluating file information. File back-up is also an important factor to think about, along with file storage/safety concerns. “Sooner or later, every property will have its fire, flood, careless mistake, or disgruntled employee,” O’Brien closes. “…good file control can minimize or prevent damage to the business as a whole.”

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Mud accumulates on continental shelves under a variety of environmental conditions and results in a diverse formation of mud depocenters (MDCs). Their three-dimensional architectures have been in the focus of several recent studies. Due to some terminological confusion concerning MDCs, the present study sets out to define eight individual MDC types in terms of surface sediment distribution and internal geometry. Under conditions of substantial sediment supply, prodeltas (distal zones off river deltas; triangular sheets), subaqueous deltas (disconnected from deltas by strong normal-to-shore currents; wedge-like clinoforms), and mud patches (scattered distribution) and mud blankets (widespread covers) are formed. Forced by hydrodynamic conditions, mud belts in the strict sense (detached from source; elongated bodies), and shallow-water contourite drifts (detached from source; growing normal to prevailing current direction; triangular clinoforms) develop. Controlled by local morphology, mud entrapments (in depressions, behind morphological steps) and mud wedges (triangular clinoforms growing in flow direction) are deposited. Shelf mud deposition took place (1) during early outer-shelf drowning (~14 ka), (2) after inner-shelf inundation to maximum flooding (9.5-6.5 ka), and (3) in sub-recent times (<2 ka). Subsequent expansion may be (1) concentric, in cases where the depocenter formed near the fluvial source, (2) uni-directional, extending along advective current transport paths, and (3) progradational, forming clinoforms that grow either parallel or normal to the bottom current direction. Classical mud belts may be initiated around defined nuclei, the remote sites of which are determined by seafloor morphology rather than the location of the source. From a stratigraphic perspective, mud depocenters coincide with sea-level highstand-related, shelf-wide condensed sections. They often show a conformable succession from transgressive to highstand systems tract stages.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

SD card (Secure Digital Memory Card) is widely used in portable storage medium. Currently, latest researches on SD card, are mainly SD card controller based on FPGA (Field Programmable Gate Array). Most of them are relying on API interface (Application Programming Interface), AHB bus (Advanced High performance Bus), etc. They are dedicated to the realization of ultra high speed communication between SD card and upper systems. Studies about SD card controller, really play a vital role in the field of high speed cameras and other sub-areas of expertise. This design of FPGA-based file systems and SD2.0 IP (Intellectual Property core) does not only exhibit a nice transmission rate, but also achieve the systematic management of files, while retaining a strong portability and practicality. The file system design and implementation on a SD card covers the main three IP innovation points. First, the combination and integration of file system and SD card controller, makes the overall system highly integrated and practical. The popular SD2.0 protocol is implemented for communication channels. Pure digital logic design based on VHDL (Very-High-Speed Integrated Circuit Hardware Description Language), integrates the SD card controller in hardware layer and the FAT32 file system for the entire system. Secondly, the document management system mechanism makes document processing more convenient and easy. Especially for small files in batch processing, it can ease the pressure of upper system to frequently access and process them, thereby enhancing the overall efficiency of systems. Finally, digital design ensures the superior performance. For transmission security, CRC (Cyclic Redundancy Check) algorithm is for data transmission protection. Design of each module is platform-independent of macro cells, and keeps a better portability. Custom integrated instructions and interfaces may facilitate easily to use. Finally, the actual test went through multi-platform method, Xilinx and Altera FPGA developing platforms. The timing simulation and debugging of each module was covered. Finally, Test results show that the designed FPGA-based file system IP on SD card can support SD card, TF card and Micro SD with 2.0 protocols, and the successful implementation of systematic management for stored files, and supports SD bus mode. Data read and write rates in Kingston class10 card is approximately 24.27MB/s and 16.94MB/s.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Every Argo data file submitted by a DAC for distribution on the GDAC has its format and data consistency checked by the Argo FileChecker. Two types of checks are applied: 1. Format checks. Ensures the file formats match the Argo standards precisely. 2. Data consistency checks. Additional data consistency checks are performed on a file after it passes the format checks. These checks do not duplicate any of the quality control checks performed elsewhere. These checks can be thought of as “sanity checks” to ensure that the data are consistent with each other. The data consistency checks enforce data standards and ensure that certain data values are reasonable and/or consistent with other information in the files. Examples of the “data standard” checks are the “mandatory parameters” defined for meta-data files and the technical parameter names in technical data files. Files with format or consistency errors are rejected by the GDAC and are not distributed. Less serious problems will generate warnings and the file will still be distributed on the GDAC. Reference Tables and Data Standards: Many of the consistency checks involve comparing the data to the published reference tables and data standards. These tables are documented in the User’s Manual. (The FileChecker implements “text versions” of these tables.)

Relevância:

50.00% 50.00%

Publicador:

Resumo:

There is an increasing concern to reduce the cost and overheads during the development of reliable systems. Selective protection of most critical parts of the systems represents a viable solution to obtain a high level of reliability at a fraction of the cost. In particular to design a selective fault mitigation strategy for processor-based systems, it is mandatory to identify and prioritize the most vulnerable registers in the register file as best candidates to be protected (hardened). This paper presents an application-based metric to estimate the criticality of each register from the microprocessor register file in microprocessor-based systems. The proposed metric relies on the combination of three different criteria based on common features of executed applications. The applicability and accuracy of our proposal have been evaluated in a set of applications running in different microprocessors. Results show a significant improvement in accuracy compared to previous approaches and regardless of the underlying architecture.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

On the 15th of April, 1897, a 19 year-old European resident of Baghdad, named Alexander Richard Svoboda, set out on a long journey to Europe by caravan, boat and train. From a large and influential family of merchants, artists, and explorers settled in Ottoman Iraq since the end of the 18th century, Alexander traveled in the company of his parents and a departing British diplomat accompanied by his retinue. They followed a circuitous route through the Middle East to Cairo and thence to Europe on a three and a half month journey which Alexander described day-by-day in a journal written in the Iraqi Arabic of his time.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

On the 15th of April, 1897, a 19 year-old European resident of Baghdad, named Alexander Richard Svoboda, set out on a long journey to Europe by caravan, boat and train. From a large and influential family of merchants, artists, and explorers settled in Ottoman Iraq since the end of the 18th century, Alexander traveled in the company of his parents and a departing British diplomat accompanied by his retinue. They followed a circuitous route through the Middle East to Cairo and thence to Europe on a three and a half month journey which Alexander described day-by-day in a journal written in the Iraqi Arabic of his time.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This report describes recent updates to the custom-built data-acquisition hardware operated by the Center for Hypersonics. In 2006, an ISA-to-USB bridging card was developed as part of Luke Hillyard's final-year thesis. This card allows the hardware to be connected to any recent personal computers via a (USB or RS232) serial port and it provides a number of simple text-based commands for control of the hardware. A graphical user interface program was also updated to help the experimenter manage the data acquisition functions. Sampled data is stored in text files that have been compressed with the gzip for mat. To simplify the later archiving or transport of the data, all files specific to a shot are stored in a single directory. This includes a text file for the run description, the signal configuration file and the individual sampled-data files, one for each signal that was recorded.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This study of breast cancer survival is based on analysis of five-year relative survival of 38 362 cases of invasive breast cancer in New South Wales (NSW) women, incident between 1972 and 1991, with follow-up to 1992, using data from the population-based NSW Central Cancer Registry. Survival was ascertained by matching the registry file of breast cancers against NSW death certificates from 1972 to 1992, mainly by automated probabilistic linkage. Absolute survival of cases was compared with expected survival of age- and period-matched NSW women. Proportional hazard regression analysis was used for examination of the effects on excess mortality of age, period of diagnosis and degree of spread at diagnosis. Relative survival at five years increased from 70 per cent in 1972-1976 to 77 per cent in 1987-1991. Survival improved during the 1970s and in the late 1980s. Regression analysis suggested that part of the improved survival in the late 1980s was due to lesser degree of spread at diagnosis, whereas the improved survival during the 1970s may have been due to treatment. Survival was better for those aged 40-49 years (RR = 0.86) and worse for those aged greater than or equal to 70 years (RR = 1.22) compared with the referent group (60-69 years). Excess mortality was much less for those with invasive localised disease than those with regional spread (RR = 3.1) or metastatic cancer (RR = 15.5) at diagnosis. For the most recent period (1987-1991), relative five-year survival was 90, 70 and 18 per cent, respectively, for the three degree-of-spread categories.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Introduction: The aim of this study was to assess cyclic fatigue resistance in rotary nickel-titanium instruments submitted to nitrogen ion implantation by using a custom-made cyclic fatigue testing apparatus. Methods: Thirty K3 files, size #25, taper 0.04, were divided into 3 experimental groups as follows: group A, 12 files exposed to nitrogen ion implantation at a dose of 2.5 x 10(17) ions/cm(2), accelerating voltage of 200 kV, currents of 1 mu A/cm(2), 130 degrees C temperature, and vacuum conditions of 10 x 10(-6) torr for 6 hours; group B, 12 nonimplanted files; and group C, 6 files submitted to thermal annealing for 6 hours at 130 degrees C. One extra file was used for process control. All files were submitted to a cyclic fatigue test that was performed with an apparatus that allowed the instruments to rotate freely, simulating rotary instrumentation of a curved canal (40-degree, 5-mm radius curve). An electric motor handpiece was used with a contra-angle of 16:1 at an operating speed of 300 rpm and a torque of 2 N-cm. Time to failure was recorded with a stopwatch in seconds and subsequently converted to number of cycles to fracture. Data were analyzed with the Student t test (P < .05). Results: Ion-implanted instruments reached significantly higher cycle numbers before fracture (mean, 510 cycles) when compared with annealed (mean, 428 cycles) and nonimplanted files (mean, 381 cycles). Conclusions: Our results showed that nitrogen ion implantation improves cyclic fatigue resistance in rotary nickel-titanium instruments. Industrial implementation. of this surface modification technique would produce rotary nickel-titanium instruments with a longer working life. (J Endod 2010;36:1183-1186)