Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Binary files

The dBASEIV (or dBASEIII) form of the parameter sets come in. dbffil s analogous to the. txt files. These dbf files are binary files, so you can t read them directly. They are not required for the product and are provided only as an option. In most situations where there is no extensive use of database operations on parameter sets, the text form is probably more convenient to use. Many spreadsheet programs, including Microsoft Excel, are also capable of reading dbf fil s. [Pg.197]

The archiving of raw data becomes a necessity when the end results depend on data treatment calculations carried out by software whose operations on the data are often unknown to the user. For this reason, more and more instruments are designed with built-in replication of the raw data as binary files that cannot be modified, in order to comply with regulations. [Pg.1]

Vaughn R. 2005. IT Hardware Disposal Risk Management. Available at www.blancco.com/binary/file/-/id/46/fid/500/. [Pg.502]

Some experiments involve more than one FID For example, DEPT analysis (Chapter 7) performs a 13C experiment four times with different parameter settings 2D experiments involve collections of up to 750 similar FIDs. These can be combined in a single binary file. The FIDs are just listed one after the other in a single continuous list of data that Bruker calls a serial file. Varian treats these multiple FID files in the same way as single-FID files, so they can be used for arrayed experiments (a set of ID experiments acquired by varying some parameter such as pulse width) or for 2D experiments. The file name is the same in either case that is, fid Bruker uses the filename fid only for single FIDs, and instead uses ser for the binary data of all serial files. [Pg.119]

VT105 in that it is a richer command set and is a simple ASCII stream, it can be easily read with out resorting to decoding the bit patterns of characters. Graphics figures can be stored as simple sequential files, edited with a standard editor and transported between system (ours or other vendors) without worrying about the oddities of binary file structures and data being interpreted as control codes. ... [Pg.81]

MICA produces a binary file of the submitted program which runs directly on the Advanced Flexible Processor. [Pg.264]

BASIC commands for ML include BLOAD and BSAVE to load and save ML programs or other binary files, and BOOT to load and run an ML program. The familiar USR, WAIT, POKE, PEEK, and SYS commands can now be used to reference the second 64K of memory with the BANK command. SYS can be followed by four parameters that are transferred respectively into the accumulator, X register, Y register, and status flag register. On return from SYS, RREG can be used to... [Pg.8]

In contrast to typical expert systems, ARC is written in C-h- and includes a rules base in binary format, which can be created with information from different file formats, such as MDL Molfile, Brookhaven Protein Database, Gasteiger Cleartext, JCAMP (DX, JDX, JCM, and CS), binary files (molecule sets, databases, code... [Pg.152]

A complete set of descriptors can be calculated by highlighting the node of the corresponding file and selecting data set in the context menu. If not already performed, the data set will be calculated and displayed as a table of all molecules and their basic statistical parameters, like variance, skewness, or kurtosis. Additionally, an ASD is calculated and displayed at the top of the table. The data set table can be saved in different file formats including binary files for fast searches. [Pg.155]

Another type of binary file is the binary database. This type is similar to the binary molecule set but is especially designed for fast searches of similar descriptors and the retrieval of the corresponding molecule. An example of the use of binary databases is the prediction of a descriptor from the neiu al network after a reverse training. [Pg.155]

The method used to download large BDDs relies on binary file manipulation. As a BDD node typically takes 16 bytes of memory for machines with 32 bit pointers, downloaded BDDs take approximately 1/5 of the space that they take on main memory. ... [Pg.174]

At OSI level 7 we measured FTP transfer rates versus nominal transfer rates configured in the access points for the IEEE 802.1 lb, g standards. Every measurement was the average for a single FTP transfer, using a binary file size of 100 Mbytes. The average results thus obtained are summarized in Table 15.1 and represented in Fig. 15.6 both for Expb and Expc. Polynomial fits to data were made for the implementation of each standard. It was found that, for each AP type, the best FTP performances are for 802.llg. APc shows, on average, a better FTP performance than APb, both for 802.11g and 802.1 lb. These results show the same trends found for TCP throughput. [Pg.186]

Other sub-directories contain pre-built binary files and interfaces to other languages. [Pg.140]

Changing directory by typing CD/pub/wcjohnson/CDsstr , then bin to specify binary file transfer, and then typing mget. will retrieve the program files. [Pg.125]

The input file for SDEL, called path.inp in MOIL (Table 1), contains the names for the file rcrd) with the initial guess trajectory (i.e., a binary file with extension pth), and the molecule s connectivity file used to extract the potential parameters for the force field. The connectivity file (with extension wcon) is generated by the program conn in MOIL. [Pg.398]

The CSD is released, twice each year, as an indexed sequential binary file that contains additional data items derived from the basic input. Principally, these are bit-encoded screens that are required to enhance search speeds within the CSD software. Most screens are derived from the 2D connectivity... [Pg.157]

The CSD database format is a set of proprietary binary files which contain indexes, keys and data for ID (e.g., numeric data), 2D and 3D aspects of crystallographic data. A subset of the CSD is now available from CCDC in MDLI s proprietary binary format containing only molecule (not crystallographic) data this version, covering about 80% of the CSD, represents nearly all those entries for which 2D-to-3D matching records exist. The intermediate files from this effort, in SDfile interchange format, may be used to construct 3D molecule databases under other database managers. [Pg.2782]

The transforms are gathered in unordered sequential source files which are compiled by another program into binary files,... [Pg.2936]

Start-up kit consists of laboratory materials, as well as other required materials for successfully performing the exercise, such as source codes, scripts, and binary files, collected as separate archive files (e.g. tar, zip, or 7z), usually one archive per exercise, and sometimes an additional one archive for a course. In addition to laboratory exercise materials, some authors give a larger number of various supporting materials that can help the students, and make the process of conducting the exercise more effective. The materials are classified in terms of their purpose (lab instructions, work materials for students, exercise solution, tutorial documents, and tutorial examples) and scope of use (exercise, course). [Pg.54]

The malware have been collected on a distributed honeypot architecture using Dio-naea - a low-interaction honeypot used to emulate common vulnerabilities, capture malicious payloads attempting to exploit the vulnerabilities and collect the binary files downloaded or uploaded. In summary, the main components of the experimental infrastructure and the process of data collection are as follows (full details are available in our technical report [11]) ... [Pg.96]

Every day at midnight a Perl script downloads from the virtual machines running Dionaea the binary files and the SQLite database containing the malware capture information. This script then submits the whole malware repository to VirusTotal [5], which is a web service providing online malware analysis for various AVs. For each binary file successfully submitted, VirusTotal returns a scan key. The scan key is composed of the binary s SHAl hash and the timestamp of the submission. To ensure a correct submission of each file and to later retrieve the analysis results the script keeps track of the scan keys. [Pg.97]

The digitized data are transmitted to an industrial PC on site. A binary file, containing three acceleration time series (sampled at 200 Hz) and the temperature data, is created every hour, stored on the local PC, and transmitted to Politecnico di Milano for subsequent data processing. [Pg.50]

The library consists of a binary file. It consists of a header defining the number and type of custom field as well as the column description for the retention indexes. The data for each compound are recorded in an indexed sequential record according to a proprietary format. Each record includes the parameter pertinent to the compounds ... [Pg.282]


See other pages where Binary files is mentioned: [Pg.173]    [Pg.173]    [Pg.182]    [Pg.436]    [Pg.114]    [Pg.119]    [Pg.12]    [Pg.264]    [Pg.509]    [Pg.188]    [Pg.498]    [Pg.406]    [Pg.95]    [Pg.278]    [Pg.174]    [Pg.422]    [Pg.143]    [Pg.270]    [Pg.427]    [Pg.49]    [Pg.49]    [Pg.26]    [Pg.302]    [Pg.2821]    [Pg.2936]    [Pg.1902]    [Pg.134]   
See also in sourсe #XX -- [ Pg.8 ]




SEARCH



© 2024 chempedia.info