972 resultados para file it easy


Relevância:

40.00% 40.00%

Publicador:

Resumo:

SD card (Secure Digital Memory Card) is widely used in portable storage medium. Currently, latest researches on SD card, are mainly SD card controller based on FPGA (Field Programmable Gate Array). Most of them are relying on API interface (Application Programming Interface), AHB bus (Advanced High performance Bus), etc. They are dedicated to the realization of ultra high speed communication between SD card and upper systems. Studies about SD card controller, really play a vital role in the field of high speed cameras and other sub-areas of expertise. This design of FPGA-based file systems and SD2.0 IP (Intellectual Property core) does not only exhibit a nice transmission rate, but also achieve the systematic management of files, while retaining a strong portability and practicality. The file system design and implementation on a SD card covers the main three IP innovation points. First, the combination and integration of file system and SD card controller, makes the overall system highly integrated and practical. The popular SD2.0 protocol is implemented for communication channels. Pure digital logic design based on VHDL (Very-High-Speed Integrated Circuit Hardware Description Language), integrates the SD card controller in hardware layer and the FAT32 file system for the entire system. Secondly, the document management system mechanism makes document processing more convenient and easy. Especially for small files in batch processing, it can ease the pressure of upper system to frequently access and process them, thereby enhancing the overall efficiency of systems. Finally, digital design ensures the superior performance. For transmission security, CRC (Cyclic Redundancy Check) algorithm is for data transmission protection. Design of each module is platform-independent of macro cells, and keeps a better portability. Custom integrated instructions and interfaces may facilitate easily to use. Finally, the actual test went through multi-platform method, Xilinx and Altera FPGA developing platforms. The timing simulation and debugging of each module was covered. Finally, Test results show that the designed FPGA-based file system IP on SD card can support SD card, TF card and Micro SD with 2.0 protocols, and the successful implementation of systematic management for stored files, and supports SD bus mode. Data read and write rates in Kingston class10 card is approximately 24.27MB/s and 16.94MB/s.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Dreaming of Amelia (2009) recounts a small group of HSC students’ final year of high school. Told from multiple perspectives, the novel focuses on shifting senses of self, maturity, and agency as the protagonists move from adolescence to adulthood. The central conflict of the novel results from two ‘bad kids from the bad crowd at bad Brookfield High’ (blurb) transferring to wealthy private school, Ashbury; Amelia and Riley are scholarship students who do not fit with Ashbury’s profile of 'normal student' as it is understood by the school’s students or staff, and their presence in the school community forces many people to reassess their understanding of individual value (or, at least, that’s what the novel claims happens). In the shifting of perceptions, allegiances, and relationships, each of the main characters achieves a stronger sense of their identity, and Dreaming of Amelia is thus firmly located within the tradition of Young Adult (YA) literature, with all its stereotypes of adolescence.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Described as 'The Lucky Country' over forty-years ago, Australia continues to play on and onward with a fervent belief in luck, her people often described, usually by themselvess, as 'graced' or as living in 'God's Own'. With our comfortable lifestyle and isolated location, white sands and soft mangoes, it is easy to see why we embraced the term so eagerly. Where else could you win the lottery twice? While these national stereotypes are an essential part of the romance that drives and defines us, the idea that luck is the central motif of Australian culture has become a cliche, and a dangerous, almost disastrous one at that. In On Luck, Anne Summers observes, "You hear it everywhere: in all sorts of conversations, in Qantas ads, from the mouths of travellers returning from overseas trips full of complaints about the climate, the crowds, the uncivility of other places".

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper argues that any future copyright policy should be proportional and flexible and be developed from a clear and evidence-based approach. An approach is required that carefully balances the incentives and rewards provided to economic rights holders against fundamental rights of privacy, self-expression, due process and the user rights embodied in copyright law to protect access, learning, critique, and reuse. This paper also suggests that while adequate enforcement measures are certainly part of a solution to a well functioning lawful, enforcement alone can never solve the root cause of unlawful file-sharing, since it utterly fails to address supply-side market barriers. Focus on enforcement measures alone continues to leave out a legitimate but un-served market demand, susceptible to unlawful alternatives. A competitive and consumer friendly digital content market and an appropriate legal framework to enable easy lawful access to digital content are essential preconditions for the creation of a culture of lawful, rather than unlawful, consumption.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The first fiber Bragg grating (FBG) accelerometer using direct transverse forces is demonstrated by fixing the FBG by its two ends and placing a transversely moving inertial object at its middle. It is very sensitive because a lightly stretched FBG is more sensitive to transverse forces than axial forces. Its resonant frequency and static sensitivity are analyzed by the classic spring-mass theory, assuming the axial force changes little. The experiments show that the theory can be modified for cases where the assumption does not hold. The resonant frequency can be modified by a linear relationship experimentally achieved, and the static sensitivity by an alternative method proposed. The principles of the over-range protection and low cross axial sensitivity are achieved by limiting the movement of the FBG and were validated experimentally. The sensitivities 1.333 and 0.634 nm/g were experimentally achieved by 5.29 and 2.83 gram inertial objects at 10 Hz from 0.1 to 0.4 g (g = 9.8 m/s 2), respectively, and their resonant frequencies were around 25 Hz. Their theoretical static sensitivities and resonant frequencies found by the modifications are 1.188 nm/g and 26.81 Hz for the 5.29 gram one and 0.784 nm/g and 29.04 Hz for the 2.83 gram one, respectively.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Wet Tropics region has a unique water asset and is also considered a priority region for the improvement of water quality entering the Great Barrier Reef due to a combination of high rainfall, intensive agricultural use, urban areas and the proximity of valuable reef assets to the coast. Agricultural activities are one of many identified threats to water quality and water flows in the Wet Tropics in terms of sediment and pollutant-related water quality decline. Information describing the current state of agricultural management practices across the region is patchy at best. Based on the best available information on agricultural management practices in the Wet Tropics in 2008, it is clear that opportunities exist to improve nutrient, sediment and pesticide management practice to reduce the impact on the water asset and the Great Barrier Reef. Based on current understandings of practices and the relationship between practices and reef water quality, the greatest opportunities for improved water quality are as follows: · nutrients – correct rate and the placement of fertilisers; · pesticides – improve weed control planning, herbicide rates and calibration practice; and · soil and sediment – implement new farming system practices. The 2008-09 Reef Rescue program sought to accelerate the rate of adoption of improved management practices and through Terrain invested $6.8M in the 2008-09 year for: · landholder water quality improvement incentive payments; · cross regional catchment repair of wetlands and riparian lands in areas of high sediment or nutrient loss; and · partnerships in the region to lever resources and support for on-ground practice change. The program delivered $3,021,999 in onground incentives to landholders in the Wet Tropics to improve farm practices from D or C level to B or A level. The landholder Water Quality Incentives Grants program received 300 individual applications for funding and funded 143 individual landholders to implement practice change across 36,098 ha of farm land. It is estimated that the Reef Rescue program facilitated practice change across 21% of the cane industry, and 20% of the banana industry. The program levered an additional $2,441,166 in landholder cash contributions and a further $907,653 in non-cash in-kind contributions bringing the total project value of the landholder grants program in the Wet Tropics to $6,370,819. Most funded projects targeted multiple water quality objectives with a focus on nutrient and sediment reduction. Of the 143 projects funded, 115 projects addressed nutrient management either as the primary focus or in combination with strategies that targeted other water quality objectives. Overall, 82 projects addressed two or more water quality targets. Forty-five percent of incentive funds were allocated to new farming system practices (direct drill legumes, zonal tillage equipment, permanent beds, min till planting equipment, GPS units, laser levelling), followed by 24% allocated to subsurface fertiliser applicators (subsurface application of fertiliser using a stool splitter or beside the stool, at the correct Six Easy Steps rate). As a result, Terrain estimates that the incentive grants achieved considerable reductions in nitrogen, phosphorus, sediment and pesticide loads. The program supported nutrient management training of 167 growers managing farms covering over 20% of the area harvested in 2008, and 18 industry advisors and resellers. This resulted in 115 growers (155 farms) developing nutrient management plans. The program also supported Integrated Weed Management training of 80 growers managing farms covering 8% of the area harvested in 2008, and 6 industry advisors and resellers. This report, which draws on the best available Reef Rescue Management Monitoring, Evaluation, Reporting, and Improvement (MERI) information to evaluate program performance and impact on water quality outcomes, is the first in a series of annual reports that will assess and evaluate the impact of the Reef Rescue program on agricultural practices and water quality outcomes. The assessment is predominantly focused on the cane industry because of data availability. In the next stage, efforts will expand to: · improve practice data for the banana and grazing industry; · gain a better understanding of the water quality trends and the factors influencing them in the Wet Tropics; in particular work will focus on linking the results of the Paddock to Reef monitoring program and practice change data to assess program impact; · enhance estimations of the impact of practice change on pollutant loads from agricultural land use; · gain a better understanding of the extent of ancillary practice (change not directly funded) resulting from Reef Rescue training/ education/communication programs; and · provide a better understanding of the economic cost of practice change across the Wet Tropics region. From an ecological perspective, water quality trends and the factors that may be contributing to change, require further investigation. There is a critical need to work towards an enhanced understanding of the link between catchment land management practice change and reef water quality, so that reduced nutrient, sediment, and pesticide discharge to the Great Barrier Reef can be quantified. This will also assist with future prioritisation of grants money to agricultural industries, catchments and sub catchments. From a social perspective, the program has delivered significant water quality benefits from landholder education and training. It is believed that these activities are giving landholders the information and tools to implement further lasting change in their production systems and in doing so, creating a change in attitude that is supportive and inclusive of Natural Resource Management (NRM). The program in the Wet Tropics has also considerably strengthened institutional partnerships for NRM, particularly between NRM and industry and extension organisations. As a result of the Reef Rescue program, all institutions are actively working together to collectively improve water quality. The Reef Rescue program is improving water quality entering the Great Barrier Reef Lagoon by catalysing substantial activity in the Wet Tropics region to improve land management practices and reduce the water quality impact of agricultural landscapes. The solid institutional partnerships between the regional body, industry, catchment and government organisations have been fundamental to the successful delivery of the landholder grant and catchment rehabilitation programs. Landholders have generally had a positive perception and reaction to the program, its intent, and the practical, focused nature of grant-based support. Demand in the program was extremely high in 2008-09 and is expected to increase in 2009-2010.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Current smartphones have a storage capacity of several gigabytes. More and more information is stored on mobile devices. To meet the challenge of information organization, we turn to desktop search. Users often possess multiple devices, and synchronize (subsets of) information between them. This makes file synchronization more important. This thesis presents Dessy, a desktop search and synchronization framework for mobile devices. Dessy uses desktop search techniques, such as indexing, query and index term stemming, and search relevance ranking. Dessy finds files by their content, metadata, and context information. For example, PDF files may be found by their author, subject, title, or text. EXIF data of JPEG files may be used in finding them. User–defined tags can be added to files to organize and retrieve them later. Retrieved files are ranked according to their relevance to the search query. The Dessy prototype uses the BM25 ranking function, used widely in information retrieval. Dessy provides an interface for locating files for both users and applications. Dessy is closely integrated with the Syxaw file synchronizer, which provides efficient file and metadata synchronization, optimizing network usage. Dessy supports synchronization of search results, individual files, and directory trees. It allows finding and synchronizing files that reside on remote computers, or the Internet. Dessy is designed to solve the problem of efficient mobile desktop search and synchronization, also supporting remote and Internet search. Remote searches may be carried out offline using a downloaded index, or while connected to the remote machine on a weak network. To secure user data, transmissions between the Dessy client and server are encrypted using symmetric encryption. Symmetric encryption keys are exchanged with RSA key exchange. Dessy emphasizes extensibility. Also the cryptography can be extended. Users may tag their files with context tags and control custom file metadata. Adding new indexed file types, metadata fields, ranking methods, and index types is easy. Finding files is done with virtual directories, which are views into the user’s files, browseable by regular file managers. On mobile devices, the Dessy GUI provides easy access to the search and synchronization system. This thesis includes results of Dessy synchronization and search experiments, including power usage measurements. Finally, Dessy has been designed with mobility and device constraints in mind. It requires only MIDP 2.0 Mobile Java with FileConnection support, and Java 1.5 on desktop machines.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We use atomistic molecular dynamics (MD) simulations to study the diffusion of water molecules confined inside narrow (6,6) carbon nanorings. The water molecules form two oppositely polarized chains. It is shown that the effective interaction between these two chains is repulsive in nature. The computed mean-squared displacement (MSD) clearly shows a scaling with time similar to t(1/2), which is consistent with single-file diffusion (SFD). The time up to which the water molecules undergo SFD is shown to be the lifetime of the water molecules inside these chains. Simulations of "uncharged" water molecules inside the nanoring show the formation of several water chains and yield SFD. These observations conclusively prove that the diffusion is Fickian when there is a single chain of water and SFD is observed only when two or more chains are present.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We have developed CowLog, which is open-source software for recording behaviors from digital video and is easy to use and modify. CowLog tracks the time code from digital video files. The program is suitable for coding any digital video, but the authors have used it in animal research. The program has two main windows: a coding window, which is a graphical user interface used for choosing video files and defining output files that also has buttons for scoring behaviors, and a video window, which displays the video used for coding. The windows can be used in separate displays. The user types the key codes for the predefined behavioral categories, and CowLog transcribes their timing from the video time code to a data file. CowLog comes with an additional feature, an R package called Animal, for elementary analyses of the data files. With the analysis package, the user can calculate the frequencies, bout durations, and total durations of the coded behaviors and produce summary plots from the data.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We have developed CowLog, which is open-source software for recording behaviors from digital video and is easy to use and modify. CowLog tracks the time code from digital video files. The program is suitable for coding any digital video, but the authors have used it in animal research. The program has two main windows: a coding window, which is a graphical user interface used for choosing video files and defining output files that also has buttons for scoring behaviors, and a video window, which displays the video used for coding. The windows can be used in separate displays. The user types the key codes for the predefined behavioral categories, and CowLog transcribes their timing from the video time code to a data file. CowLog comes with an additional feature, an R package called Animal, for elementary analyses of the data files. With the analysis package, the user can calculate the frequencies, bout durations, and total durations of the coded behaviors and produce summary plots from the data.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level helps in designing efficient storage systems. Second, it helps create benchmarks that mimic realistic application behavior closely. Third, it enables autonomic systems as the information obtained can be used to adapt the system in a closed loop.All these use cases require the ability to extract the application-level semantics of I/O operations. Methods such as modifying application code to associate I/O operations with semantic tags are intrusive. It is well known that network file system traces are an important source of information that can be obtained non-intrusively and analyzed either online or offline. These traces are a sequence of primitive file system operations and their parameters. Simple counting, statistical analysis or deterministic search techniques are inadequate for discovering application-level semantics in the general case, because of the inherent variation and noise in realistic traces.In this paper, we describe a trace analysis methodology based on Profile Hidden Markov Models. We show that the methodology has powerful discriminatory capabilities that enable it to recognize applications based on the patterns in the traces, and to mark out regions in a long trace that encapsulate sets of primitive operations that represent higher-level application actions. It is robust enough that it can work around discrepancies between training and target traces such as in length and interleaving with other operations. We demonstrate the feasibility of recognizing patterns based on a small sampling of the trace, enabling faster trace analysis. Preliminary experiments show that the method is capable of learning accurate profile models on live traces in an online setting. We present a detailed evaluation of this methodology in a UNIX environment using NFS traces of selected commonly used applications such as compilations as well as on industrial strength benchmarks such as TPC-C and Postmark, and discuss its capabilities and limitations in the context of the use cases mentioned above.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Frequent accesses to the register file make it one of the major sources of energy consumption in ILP architectures. The large number of functional units connected to a large unified register file in VLIW architectures make power dissipation in the register file even worse because of the need for a large number of ports. High power dissipation in a relatively smaller area occupied by a register file leads to a high power density in the register file and makes it one of the prime hot-spots. This makes it highly susceptible to the possibility of a catastrophic heatstroke. This in turn impacts the performance and cost because of the need for periodic cool down and sophisticated packaging and cooling techniques respectively. Clustered VLIW architectures partition the register file among clusters of functional units and reduce the number of ports required thereby reducing the power dissipation. However, we observe that the aggregate accesses to register files in clustered VLIW architectures (and associated energy consumption) become very high compared to the centralized VLIW architectures and this can be attributed to a large number of explicit inter-cluster communications. Snooping based clustered VLIW architectures provide very limited but very fast way of inter-cluster communication by allowing some of the functional units to directly read some of the operands from the register file of some of the other clusters. In this paper, we propose instruction scheduling algorithms that exploit the limited snooping capability to reduce the register file energy consumption on an average by 12% and 18% and improve the overall performance by 5% and 11% for a 2-clustered and a 4-clustered machine respectively, over an earlier state-of-the-art clustered scheduling algorithm when evaluated in the context of snooping based clustered VLIW architectures.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An online computing server, Online_DPI (where DPI denotes the diffraction precision index), has been created to calculate the `Cruickshank DPI' value for a given three-dimensional protein or macromolecular structure. It also estimates the atomic coordinate error for all the atoms available in the structure. It is an easy-to-use web server that enables users to visualize the computed values dynamically on the client machine. Users can provide the Protein Data Bank (PDB) identification code or upload the three-dimensional atomic coordinates from the client machine. The computed DPI value for the structure and the atomic coordinate errors for all the atoms are included in the revised PDB file. Further, users can graphically view the atomic coordinate error along with `temperature factors' (i.e. atomic displacement parameters). In addition, the computing engine is interfaced with an up-to-date local copy of the Protein Data Bank. New entries are updated every week, and thus users can access all the structures available in the Protein Data Bank. The computing engine is freely accessible online at http://cluster.physics.iisc.ernet.in/dpi/.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The instrument described in this report is an updated version of the high precision, automated Winkler titration system described by Friederich et al.(1984). The original instrument was based on the work of Bryan et al. (1976) who developed a colorimetric endpoint detector and on the work of Williams and Jenkinson (1982) who produced an automated system that used this detector. The goals of our updated version of the device described by Friederich et al. (1984) were as follows: 1) Move control of the system to the MS-DOS environment because HP-85 computers are no longer in production and because more user-friendly programs could be written using the IBM XT or AT computers that control the new device. 2) Use more "off the shelf" components and reduce the parts count in the new system so that it could be easily constructed and maintained. This report describes how to construct and use the new automated Winkler titration device. It also includes information on the chemistry of the Winkler titration, and detailed instructions on how to prepare reagents, collect samples, standardize and perform the titrations (Appendix I: Codispoti, L.A. 1991 On the determination of dissolved oxygen in sea water, 15pp.). A disk containing the program needed to operate the new device is also included. (pdf contains 33 pages)