An Improved MCPTT System File Breakpoint Resuming Algorithm

Author(s):  
Qiuxia Zhang
Keyword(s):  
2021 ◽  
Vol 12 (1) ◽  
pp. 69-83
Author(s):  
Saygin Siddiq Ahmed ◽  
Ahmed R. J. Almusawi ◽  
Bülent Yilmaz ◽  
Nuran Dogru

Abstract. This study introduces a new control method for electromyography (EMG) in a prosthetic hand application with a practical design of the whole system. The hand is controlled by a motor (which regulates a significant part of the hand movement) and a microcontroller board, which is responsible for receiving and analyzing signals acquired by a Myoware muscle device. The Myoware device accepts muscle signals and sends them to the controller. The controller interprets the received signals based on the designed artificial neural network. In this design, the muscle signals are read and saved in a MATLAB system file. After neural network program processing by MATLAB, they are then applied online to the prosthetic hand. The obtained signal, i.e., electromyogram, is programmed to control the motion of the prosthetic hand with similar behavior to a real human hand. The designed system is tested on seven individuals at Gaziantep University. Due to the sufficient signal of the Mayo armband compared to Myoware sensors, Mayo armband muscle is applied in the proposed system. The discussed results have been shown to be satisfactory in the final proposed system. This system was a feasible, useful, and cost-effective solution for the handless or amputated individuals. They have used the system in their day-to-day activities that allowed them to move freely, easily, and comfortably.


2018 ◽  
Vol 8 (3) ◽  
pp. 129-133
Author(s):  
Goker Oge ◽  
Murat Topaloglu

Measures like setting a destination, evaluation of performances, planning of the labour force about business, personnel recruitment, charging of personnel, informations about personnel, analytical of labour force and reporting, etc., are considered as vital problems of the human resources management. In this study, these criteria in a variety of data were collected with a large repository Apache Hadoop Distributed File System file system owned. Data entry and analysis were used Apache Pig and Java programming languages. The aim of the study is to help ‘the owners of business’ evaluate the abundance of data and to get rid of the management complexity via an application which is the biggest problem of management system in human resources. Keywords: Big Data, management of human resources, Hadoop, Pig, map-reduce


This chapter summarizes the basic concepts related to the most targeted and widely used Windows operating system. The chapter explains Windows architecture and authentication process along with different Windows operating system tools including Windows management instrumentation command-line (WMIC), recycle bin, msinfo32, netsh (network shell), Windows services console, Windows registry, event viewer, NBTSTAT (NetBIOS over TCP/IP Status), system file checker, group policy editor, Windows firewall, Windows task manager, MSCONFIG utility, netstat (network statistics) utility, Attrib command, diskpart utility, etc. The chapter provides details of Windows powershell, an integrated scripting environment (ISE) for executing the commands at runtime as well as for developing and testing PowerShell scripts along with net commands and netsh commands. These tools are useful for diagnosing and testing the security level or condition of existing Windows installation. The Windows virtual machines created as part of experimental setup discussed as in first chapter of this book can be used to exercise the windows commands and utilities mentioned in this chapter.


2020 ◽  
Vol 2 (1) ◽  
pp. 1-10
Author(s):  
Nuril Anwar ◽  
Son Ali Akbar ◽  
Ahmad Azhari ◽  
Imam Suryanto

Pesatnya perkembangan aplikasi android, terutama aplikasi di bidang e-commerce dan transaksi jual beli online yang populer di Indonesia, memaksa pengguna untuk memberikan izin untuk menggunakan fitur dan layanan aplikasi selama pemasangan dan pasca pemasangan. Kurangnya pemahaman pengguna akan resiko dari izin akses yang diminta oleh aplikasi sebelum atau setelah melakukan instalasi menjadikan celah pada keamanan data pengguna untuk mengakses fitur pada perangkat smartphone seperti kamera, media penyimpanan, kontak, akun dan fitur lainnya. Logical Extraction Method menjadi metode yang digunakan untuk mendapatkan data aplikasi dengan mengakusisi seluruh data file sistem pada smartphone menggunakan bantuan tools MOBILedit Forensic, TWRP (Team Win Recovery Project), dan Aplikasi Migrate. Akusisi data dari masing-masing aplikasi akan diambil Android Package File (APK) yang digunakan untuk proses analisis secara statis dengan menggunakan Tools Forensic MobSF (Mobile Security Framework). Berdasarkan hasil analisis yang dilakukan pada tiga aplikasi teratas e-commerce terdapat 51 izin akses dan dari tiga aplikasi e-commerce terpopuler di Indonesia dengan tingkat keamanan paling berbahaya dengan 49 izin akses, 7 izin akses normal dan 1 izin akses tanda tangan. Aplikasi lazada terdapat 21 izin akses berbahaya yang tidak diketahui pengguna sedangkan aplikasi Tokopedia terdapat 4 izin akses berbahaya yang tidak diketahui pengguna dan aplikasi Blibli.com terdapat 1 izin akses berbahaya yang tidak diketahui pengguna. Berdasarkan temuan celah keamanan dapat disimpulkan bahwa aplikasi e-commerce yang digunakan oleh penggunanya memungkinkan pula disisipi sebuah malware atau virus sejenis yang berpeluang dalam penggambilan data pribadi penggunanya.  The rapid development of android applications, especially applications in the field of e-commerce and online buying and selling transactions that are popular in Indonesia, force users to give permission to use the features and services of the application during installation and post-installation. Lack of user understanding of the risk of access permissions requested by the application before or after installation creates a gap in the user's data security to access features on smartphone devices such as cameras, storage media, contacts, accounts, and other features. Logical Extraction Method is a method used to obtain application data by acquiring all system file data on smartphones using the help of MOBILedit Forensic tools, TWRP (Team Win Recovery Project), and Migrate Applications. Data acquisition from each application will be taken by Android Package File (APK) which is used for the static analysis process using Tools Forensic MobSF (Mobile Security Framework). Based on the results of an analysis conducted on the top three e-commerce applications there are 51 access permits and of the three most popular e-commerce applications in Indonesia with the most dangerous level of security with 49 access permits, 7 normal access permits, and 1 signature access permit. The Lazada application has 21 dangerous access permits that the user does not know while the Tokopedia application has 4 dangerous access permits that the user does not know and the Blibli.com application has 1 dangerous access permit that the user does not know about. Based on the findings of a security hole, it can be concluded that the e-commerce application used by its users also allows the insertion of a malware or virus that has the opportunity to capture the user's personal data.


2020 ◽  
Vol 5 (3) ◽  
pp. 77
Author(s):  
Welda Welda ◽  
Desak Made Dwi Utami Putra ◽  
Ayu Manik Dirgayusari

Notary Office / PPAT I Gusti Rai Daniel Ari Putra, SH., M.Kn. is a Land Deed Making Official who makes deeds related to land. In carrying out this work, records are still carried out manually, namely still using a recording system in the book which consists of a file monitoring management process, payment for services, and does not provide information regarding the reporting of files that have been completed. This results in each service requiring time from the time the application is submitted to the completion of the file, besides that proof of payment for services can be lost if not recorded. Based on these problems, needed a system to facilitate the management of the file being executed and facilitate business processes that exist in this study created a system with the title Design of Information System File Management in the Office of Notary / PPAT which include data management of the applicant, the data in the file status request , payments and report. This research process uses a linear sequential model method, starting from determining needs, analyzing needs and designing CDM and PDM for the next steps. Furthermore, the authors build and design a system using the PHP programming language and MySQL as a database. The final result of this research is a file management information system at the Notary Office I Gusti Rai Daniel Ari Putra, SH., M.Kn. and testing has been carried out on the system using black box testing whose results are in accordance with the system design.


1993 ◽  
Vol 18 (1) ◽  
pp. 65-73 ◽  
Author(s):  
Federico Vazquez ◽  
Guy Hanacek
Keyword(s):  

2013 ◽  
Vol 760-762 ◽  
pp. 1197-1201
Author(s):  
Qin Lu He ◽  
Zhan Huai Li ◽  
Le Xiao Wang ◽  
Hui Feng Wang ◽  
Jian Sun

Researches on technologies about testing aggregate bandwidth of file systems in cloud storage systems. Through the memory file system, network file system, parallel file system theory analysis, according to the cloud storage system polymerization bandwidth and concept, developed to cloud storage environment file system polymerization bandwidth test software called FSPoly. In this paper, use FSpoly to luster file system testing, find reasonable test methods, and then evaluations latest development in cloud storage system file system performance by using FSPoly.


1974 ◽  
Vol 53 (1) ◽  
pp. 107-132
Author(s):  
J. W. Hopkins ◽  
P. D. Hunter ◽  
R. E. Machol ◽  
J. J. DiSalvo ◽  
R. J. Piereth
Keyword(s):  

2021 ◽  
Author(s):  
asghar dabiri ◽  
Nader Jafarnia Dabanloo ◽  
Fereidoon Nooshirvan Rahatabad ◽  
Keivan Maghooli

Abstract This paper presents estimation of missed samples recovery of Synthetic electrocardiography (ECG) signals by an ANFIS (Adaptive neuro-fuzzy inference system) method. After designing the ANFIS model using FCM (Fuzzy C Means) clustering method. In MATLAB’s standard library for ANFIS, only least-square-estimation and the back-propagation algorithms are used for tuning membership functions and generation of fis (fuzzy inference system) file, but at current work we have used FCM method that shows better result. Root mean square error (difference of the reference input and the generated data by ANFIS) for the three synthetic data cases are: a. Train data: RMSE = 1.7112e-5b. Test data: RMSE = 5.184e-3c. All data: RMSE = 2.2663e-3


Sign in / Sign up

Export Citation Format

Share Document