scripting language
Recently Published Documents


TOTAL DOCUMENTS

293
(FIVE YEARS 71)

H-INDEX

18
(FIVE YEARS 1)

2022 ◽  
Vol 9 (1) ◽  
Author(s):  
Yonatan Garkebo Doyoro ◽  
Ping-Yu Chang ◽  
Jordi Mahardika Puntu ◽  
Ding-Jiun Lin ◽  
Tran Van Huu ◽  
...  

AbstractGeophysical modelling performs to obtain subsurface structures in agreement with measured data. Freeware algorithms for geoelectrical data inversion have not been widely used in geophysical communities; however, different open-source modelling/inversion algorithms were developed in recent years. In this study, we review the structures and applications of openly Python-based inversion packages, such as pyGIMLi (Python Library for Inversion and Modelling in Geophysics), BERT (Boundless Electrical Resistivity Tomography), ResIPy (Resistivity and Induced Polarization with Python), pyres (Python wrapper for electrical resistivity modelling), and SimPEG (Simulation and Parameter Estimation in Geophysics). In addition, we examine the recovering ability of pyGIMLi, BERT, ResIPy, and SimPEG freeware through inversion of the same synthetic model forward responses. A versatile pyGIMLi freeware is highly suitable for various geophysical data inversion. The SimPEG framework is developed to allow the user to explore, experiment with, and iterate over multiple approaches to the inverse problem. In contrast, BERT, pyres, and ResIPy are exclusively designed for geoelectric data inversion. BERT and pyGIMLi codes can be easily modified for the intended applications. Both pyres and ResIPy use the same mesh designs and inversion algorithms, but pyres uses scripting language, while ResIPy uses a graphical user interface (GUI) that removes the need for text inputs. Our numerical modelling shows that all the tested inversion freeware could be effective for relatively larger targets. pyGIMLi and BERT could also obtain reasonable model resolutions and anomaly accuracies for small-sized subsurface structures. Based on the heterogeneous layered model and experimental target scenario results, the geoelectrical data inversion could be more effective in pyGIMLi, BERT, and SimPEG freeware packages. Moreover, this study can provide insight into implementing suitable inversion freeware for reproducible geophysical research, mainly for geoelectrical modelling.


2022 ◽  
pp. 88-102
Author(s):  
Basetty Mallikarjuna ◽  
Anusha D. J. ◽  
Sethu Ram M. ◽  
Munish Sabharwal

An effective video surveillance system is a challenging task in the COVID-19 pandemic. Building a model proper way of wearing a mask and maintaining the social distance minimum six feet or one or two meters by using CNN approach in the COVID-19 pandemic, the video surveillance system works with the help of TensorFlow, Keras, Pandas, which are libraries used in Python programming scripting language used in the concepts of deep learning technology. The proposed model improved the CNN approach in the area of deep learning and named as the Ram-Laxman algorithm. The proposed model proved to build the optimized approach, the convolutional layers grouped as ‘Ram', and fully connected layers grouped as ‘Laxman'. The proposed system results convey that the Ram-Laxman model is easy to implement in the CCTV footage.


Author(s):  
Jean Belo KLAMTI ◽  
M. Anwar HASAN

An adaptor signature can be viewed as a signature concealed with a secret value and, by design, any two of the trio yield the other. In a multiparty setting, an initial adaptor signature allows each party create additional adaptor signatures without the original secret. Adaptor signatures help address scalability and interoperabity issues in blockchain. They can also bring some important advantages to cryptocurrencies, such as low on-chain cost, improved transaction fungibility, and less limitations of a blockchain’s scripting language. In this paper, we propose a new two-party adaptor signature scheme that relies on quantum-safe hard problems in coding theory. The proposed scheme uses a hash-and-sign code-based signature scheme introduced by Debris-Alazard et al. and a code-based hard relation defined from the well-known syndrome decoding problem. To achieve all the basic properties of adaptor signatures formalized by Aumayr et al., we introduce further modifications to the aforementioned signature scheme. We also give a security analysis of our scheme and its application to the atomic swap. After providing a set of parameters for our scheme, we show that it has the smallest pre-signature size compared to existing post-quantum adaptor signatures.


Author(s):  
Jean Belo KLAMTI ◽  
M. Anwar HASAN

An adaptor signature can be viewed as a signature concealed with a secret value and, by design, any two of the trio yield the other. In a multiparty setting, an initial adaptor signature allows each party create additional adaptor signatures without the original secret. Adaptor signatures help address scalability and interoperabity issues in blockchain. They can also bring some important advantages to cryptocurrencies, such as low on-chain cost, improved transaction fungibility, and less limitations of a blockchain’s scripting language. In this paper, we propose a new two-party adaptor signature scheme that relies on quantum-safe hard problems in coding theory. The proposed scheme uses a hash-and-sign code-based signature scheme introduced by Debris-Alazard et al. and a code-based hard relation defined from the well-known syndrome decoding problem. To achieve all the basic properties of adaptor signatures formalized by Aumayr et al., we introduce further modifications to the aforementioned signature scheme. We also give a security analysis of our scheme and its application to the atomic swap. After providing a set of parameters for our scheme, we show that it has the smallest pre-signature size compared to existing post-quantum adaptor signatures.


2021 ◽  
Vol 6 (2) ◽  
pp. 155-160
Author(s):  
Mykola Voloshyn ◽  
◽  
Yevhenii Vavruk

The quarantine restrictions introduced during COVID-19 are necessary to minimize the spread of coronavirus disease. These measures include a fixed number of people in the room, social distance, wearing protective equipment. These restrictions are achieved by the work of technological control workers and the police. However, people are not ideal creatures, quite often the human factor makes its adjustments. That is why in this work we have developed software for determining the protective elements on the face in real time using the Python scripting language, the open software libraries OpenCV v4.5.4, TensorFlow v2.6.0, Keras v2.6.0 and MobileNetV2 using the camera. The training program uses a prepared set of photos from KAGGLE — with a mask and without a mask. This set has been expanded by the authors to include different types of masks and their location. Using TensorFlow, Keras, MobileNetV2, a model is created to study the neural network by analyzing images. The generated neural network uses a model to determine the masks. You can preview the learning result of the network — it is presented as a graphic file. A program that uses the connected camera is then launched and the user can test the operation. This model can be easily deployed on embedded systems such as Raspberry Pi, Google Coral, and become a hardware and software automated system that can be used in crowded places — airports, shopping malls, stadiums, government agencies and more.


2021 ◽  
Vol 4 ◽  
Author(s):  
Marcelo Arenas ◽  
Thomas Reisenegger ◽  
Juan Reutter ◽  
Domagoj Vrgoč

With the popularity of Bitcoin, there is a growing need to understand the functionality, security, and performance of various mechanisms that comprise it. In this paper, we analyze Bitcoin’s scripting language, Script, that is one of the main building blocks of Bitcoin transactions. We formally define the semantics of Script, and study the problem of determining whether a user-defined script is well-formed; that is, whether it can be unlocked, or whether it contains errors that would prevent this from happening.


2021 ◽  
Vol 1 ◽  
pp. 185-186
Author(s):  
Carsten Rücker

Abstract. This contributed poster shows the current state of development of a finite element implementation as part of an open source software library (OSSL) for the simulation of thermo-hydro-mechanical (THM) coupled processes. The reliable handling of numerical methods is fundamental for the understanding of scientific interrelationships and thus, a crucial prerequisite for modeling THM scenarios, as well as for the understanding and evaluation of preliminary safety investigations during the site selection process for the storage of high-level radioactive waste. There are several motivations for developing an in-house OSSL, which will allow us to: Build capacity and maintenance within BASE (Federal Office for the Safety of Nuclear Waste Management) regarding issues of the numerical modeling of safety-relevant aspects on the long-term safety analyses specified by the German legislator in the site selection process. Develop a collection of known benchmarks and evaluation examples for the comparison of different software tools, applying a uniform interface to simplify the use of the available highly specialized open source codes. Diversify the testing possibilities regarding the preliminary safety investigations by means of our own, independent modeling software. Document basic THM scenarios for internal or, if necessary, public technical training, e.g., density-driven fluid flow (Fig. 1), convergence in salt, temperature propagation in the repository area, crack development, diffusive or advective mass transport. Ensure transparency and, in principle, might allow for appropriately proven-quality (validated) and documented simulation tools for the public regarding questions about the preliminary safety investigations during the site selection process. The development of the OSSL is mainly based on the scripting language Python, which allows the necessary flexibility for the diverse fields of application and at the same time enables maximum transparency for all aspects of the source code. To ensure the high quality of the software, state of the art development tools are used (e.g., version control, automated tests, and documentation generation). Figure 1 shows our preliminary simulation results of the so-called Elder problem (Elder, 1967), a popular standard benchmark for thermo-hydrogeological coupling in which fluid motion in a porous medium is driven by buoyancy forces.


2021 ◽  
Author(s):  
Matt Carland ◽  
Madhuchanda Bose ◽  
Biljana Novković ◽  
Haley Pedersen ◽  
Charles Manson ◽  
...  

The vast majority of human traits, including many disease phenotypes, are affected by alleles at numerous genomic loci. With a continually increasing set of variants with published clinical disease or biomarker associations, an easy-to-use tool for non-programmers to rapidly screen VCF files for risk alleles is needed. We have developed EZTraits as a tool to quickly evaluate genotype data (e.g. from microarrays), against a set of rules defined by the user. These rules can be defined directly in the scripting language Lua , for genotype calls using variant ID (RS number) or chromosomal position. Alternatively, EZTraits can parse simple and intuitive text including concepts like ' any ' or ' all '. Thus, EZTraits is designed to support rapid genetic analysis and hypothesis-testing by researchers, regardless of programming experience or technical background.


2021 ◽  
Vol 40 (2) ◽  
pp. 284-291
Author(s):  
A.E. Evwiekpaefe ◽  
V.O. Eyinla

The use of computers to conduct examinations is more effective than traditional paper-based examinations in terms of immediate availability of results and long term cost effectiveness. This however is faced with identifying and authenticating the real identities of the examinees so as to reduce impersonation. The study examined the existing authentication method available on the Computer-based test system of Air Force Institute of Technology (AFIT), Kaduna, Nigeria and proposed the fingerprint biometric technique as an additional method to authenticate the examinees. The fingerprint biometric authentication was developed using FlexCode SDK and implemented on DigitalPersona 4500 fingerprint reader – the recommended scanner by JAMB for fingerprint enrollment. The system was developed using PHP scripting language on XAMPP local server and MySQL database system. The results obtained showed that there is no need for a middleware to link the authentication module with the CBT because of the Single Sign-On technique implemented. This result thus improved the level of authentication and access to the CBT. This will therefore reduce impersonation and increase the level of awareness of CBT by academic stakeholders.


2021 ◽  
Vol 4 (1) ◽  
pp. 168-180
Author(s):  
PO Obilikwu ◽  
VS Terwase

Web services provide application to application integration across different platforms. However, the consumption of web services generates request traffic that must be attended to by an instance of the web server without fail. To guarantee dependability of the web service, the instances of the web service are replicated as a way of scaling the web service. The Replication Oriented Architecture (ROA) has been designed and implemented using the Java Enterprise application development platform and interesting results have been obtained. Improvements in the PHP scripting language have made it a popular programming language for web and enterprise application development. In this paper, an implementation of the ROA architecture using PHP is done. The implementation is simulated on the Apache Jmeter and results compared to the results obtained in the Java implementation. The results show that both application development platforms achieve web service scalability as a quality of service (QOS) expected of a web service. In specific terms, 50.9% at 95.0% confidence level improvement in response time was achieved when PHP is used which compares favorably with 22.5% improvement at 95.0% confidence level achieved on the Java platform.


Sign in / Sign up

Export Citation Format

Share Document