Search results for "Byte"

showing 10 items of 25 documents

Next-generation sequencing: big data meets high performance computing

2017

The progress of next-generation sequencing has a major impact on medical and genomic research. This high-throughput technology can now produce billions of short DNA or RNA fragments in excess of a few terabytes of data in a single run. This leads to massive datasets used by a wide range of applications including personalized cancer treatment and precision medicine. In addition to the hugely increased throughput, the cost of using high-throughput technologies has been dramatically decreasing. A low sequencing cost of around US$1000 per genome has now rendered large population-scale projects feasible. However, to make effective use of the produced data, the design of big data algorithms and t…

0301 basic medicineComputer scienceDistributed computingGenomic researchBig dataTerabyteComputing MethodologiesDNA sequencing03 medical and health sciences0302 clinical medicineDatabases GeneticDrug DiscoveryHumansThroughput (business)PharmacologyGenomebusiness.industryHigh-Throughput Nucleotide SequencingGenomicsSequence Analysis DNAPrecision medicineSupercomputerData scienceCancer treatment030104 developmental biology030220 oncology & carcinogenesisbusinessAlgorithmsDrug Discovery Today
researchProduct

Robotized semiautomatic motorcycle transmission development. Electronic and software design

2017

In this paper, we propose an electrical design (implemented on a PCB board) and an accompanying software design for controlling the automatic gear change. The designs complement the mechanical solutions developed in Part 1. The paper also analyses the issues encountered during the intermediate steps of the development of the electronic module, which is expected to be small and adaptable enough to be installed on a motorcycle without changing its ergonomics. The control software runs on the Arduino Nano board and is built as a state machine with one idle state, five active states that cover different stages of the gear change and one error state for preventing malfunctions in case of an unex…

Finite-state machinebusiness.industryEvent (computing)ByteAutomotive engineeringPrinted circuit boardTransmission (telecommunications)lcsh:TA1-2040Embedded systemArduinoSoftware designState (computer science)lcsh:Engineering (General). Civil engineering (General)businessMATEC Web of Conferences
researchProduct

Self-validating bundles for flexible data access control

2016

Modern cloud-based services offer free or low-cost content sharing with significant advantages for the users but also new issues in privacy and security. To protect sensitive contents (i.e., copyrighted, top secret, and personal data) from the unauthorized access, sophisticated access management systems or/and decryption schemes have been proposed, generally based on trusted applications at client side. These applications work also as access controllers, verifying specific permissions and restrictions accessing user’s resources. We propose secure bundles (S-bundles), which encapsulate a behavioral model (provided as bytecode) to define versatile stand-alone access controllers and encoding/d…

021110 strategic defence & security studiesbundle information-centric security access policy bytecodeComputer sciencebusiness.industrySettore ING-INF/03 - Telecomunicazioni0211 other engineering and technologies020207 software engineeringAccess controlCloud computing02 engineering and technologyClient-sideComputer securitycomputer.software_genreMetadataData access0202 electrical engineering electronic engineering information engineeringData Protection Act 1998businesscomputerAccess structure
researchProduct

MAC-Engine

2011

In this demo, we prove that the flexibility supported by off-the-shelf IEEE 802.11 hardware can be significantly extended if we move the control of the MAC programming interface from the driver to the firmware, i.e. from the host CPU to the card CPU. To this purpose, we introduce the concept of MAC--Engine, that is an executor of Programmable Finite State Machines (PFSM) implemented at the firmware level: we show how the card itself can support different protocol logics thanks to PFSM bytecode representations that can be dynamically injected inside the card memory at run-time without incurring in down time issues or network disconnect events. We provide different PFSM examples in order to t…

DowntimeFinite-state machineComputer scienceFirmwarebusiness.industryInterface (computing)computer.software_genreExecutorBytecodeEmbedded systemOperating systembusinessProtocol (object-oriented programming)computerHost (network)Computer hardwareProceedings of the 6th ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
researchProduct

Managing IFC for civil engineering projects

2003

The "Industrial Foundation Classes" (IFC) are an ISO norm to define all components of a building in a civil engineering project. IFC files are textual files whose size can reach 100 megabytes. Several IFC files can coexist on the same civil engineering project. Due to their size, their handling and sharing is a complex task. In this paper, we present an approach to automatically identify business objects in the IFC files and simplify their visualization and manipulation on the Internet. We construct an IFC Viewer which transforms the IFC file into a XML IFC tree manipulated through the 3D visualization of the building. The IFC Viewer composed a web-based platform called ACTIVe3D BUILD SERVE…

Computer sciencebusiness.industrycomputer.internet_protocolBusiness objectcomputer.software_genreCivil engineeringVisualizationMegabyteWorld Wide WebVirtual machineThe InternetbusinesscomputerXMLProceedings of the twelfth international conference on Information and knowledge management
researchProduct

Om översättning av turistbroschyrer och om turismens språk

2003

kääntäminenmainontakäännösvaihtoturismreklamspråkmatkailuöversättningöversättningsbytefackspråk
researchProduct

Glosa do uchwały Wojewódzkiego Sądu Administracyjnego w Poznaniu z dnia 3 lipca 2020 r., sygn. akt III SA/Po 261/20. Dofinansowanie na zabytek nieruc…

2021

Teza uchwały Wojewódzkiego Sądu Administracyjnego w Poznaniu jest jak najbardziej słuszna. Na tle problematyki zawartej opracowaniu pojawił się problem związany z finansowaniem zabytku nieruchomego znajdującego się w innej gminie, będącego własnością jednostki samorządu terytorialnego innej niż ta, w której zabytek się znajduje. W takim przypadku gmina, mimo że zabytek nie znajduje się na jej terenie, musi sfinansować prace remontowo- -konserwatorskie zabytku w ramach opieki właścicielskiej. Dodatkowo ma prawo do otrzymania dotacji na podstawie art. 81 ustawy o ochronie zabytków i opiece nad zabytkami z gminy, która ma ten zabytek w swojej ewidencji. Należy zatem podkreślić, że finansowanie…

dotacjaimmovable monumentdofinansowanienieruchomy zabytekzabytekmonumentgrantfinancingSantander Art and Culture Law Review
researchProduct

Support vector machine integrated with game-theoretic approach and genetic algorithm for the detection and classification of malware

2013

Abstract. —In the modern world, a rapid growth of mali- cious software production has become one of the most signifi- cant threats to the network security. Unfortunately, wides pread signature-based anti-malware strategies can not help to de tect malware unseen previously nor deal with code obfuscation te ch- niques employed by malware designers. In our study, the prob lem of malware detection and classification is solved by applyin g a data-mining-based approach that relies on supervised mach ine- learning. Executable files are presented in the form of byte a nd opcode sequences and n-gram models are employed to extract essential features from these sequences. Feature vectors o btained are…

ta113Network securitybusiness.industryComputer scienceFeature vectorFeature extractionuhatBytecomputer.file_formatMachine learningcomputer.software_genrehaittaohjelmatSupport vector machineObfuscation (software)ComputingMethodologies_PATTERNRECOGNITIONnetworknetwork securityMalwareData miningArtificial intelligenceExecutabletietoturvabusinesscomputer2013 IEEE Globecom Workshops (GC Wkshps)
researchProduct

Några frivilliga översättningsbyten i Anna-Leena Härkönens "Häräntappoase" och dess svenska översättning "Tjurdödarvapnet"

1999

översättningsvetenskapöversättningsbytenfrivilliga översättningsbyten
researchProduct

The NA48 event-building PC farm

2003

The NA48 experiment at the CERN SPS aims to measure the parameter $\Re(\epsilon'/ \epsilon)$ of direct CP violation in the neutral kaon system with an accuracy of $2 \times 10^{-4}$. Based on the requirements of: \\\\ * high event rates (up to 10 kHz) with negligible dead time;\\ * support for a variety of detectors with very wide variation in the number of readout channels;\\ * data rates of up to 150 MByte/s sustained over the beam burst;\\ * level-3 filtering and remote data logging in the CERN computer center; \\\\ the collaboration has designed and built a modular pipelined data flow system with 40 MHz sampling rate. The architecture combines custom-designed components with commerciall…

Nuclear and High Energy PhysicsCost effectivenessComputer sciencebusiness.industryPentiumNA48 experimentDead timeTerabyteData flow diagramData acquisitionNuclear Energy and EngineeringData loggerDetectors and Experimental TechniquesElectrical and Electronic EngineeringbusinessComputer hardwareIEEE Transactions on Nuclear Science
researchProduct