Aeromagnetic surveying Wisconsin 1996; digital data files

2001 ◽  
Author(s):  
Stephen L. Snyder
Keyword(s):  
2018 ◽  
Vol 7 (2.4) ◽  
pp. 46 ◽  
Author(s):  
Shubhanshi Singhal ◽  
Akanksha Kaushik ◽  
Pooja Sharma

Due to drastic growth of digital data, data deduplication has become a standard component of modern backup systems. It reduces data redundancy, saves storage space, and simplifies the management of data chunks. This process is performed in three steps: chunking, fingerprinting, and indexing of fingerprints. In chunking, data files are divided into the chunks and the chunk boundary is decided by the value of the divisor. For each chunk, a unique identifying value is computed using a hash signature (i.e. MD-5, SHA-1, SHA-256), known as fingerprint. At last, these fingerprints are stored in the index to detect redundant chunks means chunks having the same fingerprint values. In chunking, the chunk size is an important factor that should be optimal for better performance of deduplication system. Genetic algorithm (GA) is gaining much popularity and can be applied to find the best value of the divisor. Secondly, indexing also enhances the performance of the system by reducing the search time. Binary search tree (BST) based indexing has the time complexity of  which is minimum among the searching algorithm. A new model is proposed by associating GA to find the value of the divisor. It is the first attempt when GA is applied in the field of data deduplication. The second improvement in the proposed system is that BST index tree is applied to index the fingerprints. The performance of the proposed system is evaluated on VMDK, Linux, and Quanto datasets and a good improvement is achieved in deduplication ratio.


Author(s):  
Jon R. Lindsay

This chapter investigates the Combined Air Operations Center (CAOC), the analogue to the Fighter Command Ops Room in the modern U.S. Air Force. The air force formally designates the CAOC as a weapon system, even as it is basically just a large office space with hundreds of computer workstations, conference rooms, and display screens. The CAOC is an informational weapon system that coordinates all of the other weapon systems that actually conduct air defense, strategic attack, close air support, air mobility and logistics, and intelligence, surveillance, and reconnaissance (ISR). One might be tempted to describe the CAOC as “a center of calculation,” but modern digital technology tends to decenter information practice. Representations of all the relevant entities and events in a modern air campaign reside in digital data files rather than a central plotting table. The relevant information is fragmented across collection platforms, classified networks, and software systems that are managed by different services and agencies. Thus, in each of the four major U.S. air campaigns from 1991 to 2003, CAOC personnel struggled with information friction. They rarely used the mission planning systems that were produced by defense contractors as planned, and they improvised to address emerging warfighting requirements.


Author(s):  
R Vanitha ◽  
K Ramkumar ◽  
G Rajtilak ◽  
V Rajasekar

ABSTRACT A 37-year-old female patient reported to the hospital with a nasal defect due to carcinoma. She was previously restored with nasal prostheses, but was not satisfied with its cosmetic appeal. A computerized tomographic (CT) scan of the defect area was made and converted into 3- dimensional (3D) digital data using dedicated medical imaging software. From the 3D image, measurements of the defect were calculated and compared with various nasal fossa measurements available in the digital database. A 3D nose model which had measurements that closely matched the defect area was extracted and superimposed on the defect area and margins adjusted. The data files were then sent for rapid prototyping (RP). A RP model was fabricated which was duplicated in wax and processed. The final result was a nasal prosthesis that conformed well to the patients’ face and was also esthetically acceptable. The main advantage of computer-aided designing (CAD)-RP is that it allows trying various nasal forms on the patients face within few hours. This saves chair time, eliminates the impression step and provides patient and dentist an option of variety. How to cite this article Vanitha R, Ramkumar K, Rajtilak G, Rajasekar V. Designing a Nasal Prosthesis using CAD-RP Technology. Int J Prosthodont Restor Dent 2012;2(3):108-112.


1999 ◽  
Author(s):  
D.L. Daniels ◽  
S.W. Nicholson ◽  
W.F. Cannon

2021 ◽  
Author(s):  
Mohamed Abdelwahed

<p>Conventionally, the way of storing and exchange numerical data depends mainly on binary data files in compressible form. In this era of the Big Data and machine learning systems and with the accumulation of data with different forms and types, it is important to find an alternative way for handling the data. The binary data are software dependent which does not exhibit its content and type without accessing the data by the proper software. In addition, it does not have any encryption ability. To solve this issue, we propose a new concept to handle the digital data in a descriptive, encrypted, compressed form, and able to be previewed. The idea is to pack the binary bits into a bitmap image with specific coding scheme. This approach employs the Steim scheme as a primary compression tool with a 128-bit encryption method then packs the encrypted codes into a WebP image file. The WebP image is featured by being an independent, web friendly, and highly compressed file. In order to make the file describing its contents, we reserved some pixels as coded descriptive pixels. By this way, the now packed data exhibits its contents and type during image preview.</p><p>It is proven that the Data-In-Image format, regardless of being encrypted, occupies the least amount of storage space among other image formats that can be easily handled, stored, and shared through clouds and devices safely with a lower cost. For seismic data,  the size of the WebP image comprises ~20% of the corresponding binary size with a bit-rate of ~5.6 b/s which is smaller than that of the Steim form, 27% and 8.9 b/s, respectively. Regarding the compression speed, it is found that the code compresses data with a rate of ~11,118 samples/s or ~ 44 Kbytes/s in average.</p><p>In addition, the data image is able to be digitally scanned and with some modifications can be remotely accessed like the quick response code, the thing that is not possible in the binary form. Moreover, the descriptive pixels in the image allow the implementations of smart tools to archive and classify data by machine learning and recognition algorithms.</p>


Sign in / Sign up

Export Citation Format

Share Document