Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Memory, computer

The Pascal code was updated to handle four channels. To follow the inspection speed all raw measuring data were captured and stored in the computer. All data for one coil could be stored in the computer memory (RAM) and transferred to the disk before inspection of the next coil. Evaluation of the data could be performed on-line or later using a special evaluation program. [Pg.900]

Despite all the shortcomings listed above, full particle classical MD can be considered mature [84]. Even when all shortcomings will be overcome, we can now clearly delineate the limits for application. These are mainly in the size of the system and the length of the possible simulation. With the rapidly growing cheap computer memory shear size by itself is hardly a limitation several tens of thousands of particles can be handled routinely (for example, we report a simulation of a porin trimer protein embedded in a phospholipid membrane in aqueous environment with almost 70,000 particles [85] see also the contribution of K. Schulten in this symposium) and a million particles could be handled should that be desired. [Pg.13]

Memory complexity. How much computer memory is needed to perform the searching ... [Pg.292]

ASEMB - reads and assembles the elemental stiffness equations in a banded form, as is illustrated in Figure 7.1 to minimize computer memory requirements. [Pg.212]

Many computational chemistry techniques are extremely computer-intensive. Depending on the type of calculation desired, it could take anywhere from seconds to weeks to do a single calculation. There are many calculations, such as ah initio analysis of biomolecules, that cannot be done on the largest computers in existence. Likewise, calculations can take very large amounts of computer memory and hard disk space. In order to complete work in a reasonable amount of time, it is necessary to understand what factors contribute to the computer resource requirements. Ideally, the user should be able to predict in advance how much computing power will be needed. [Pg.128]

Electron ionization occurs when an electron beam crosses an ion source (box) and interacts with sample molecules that have been vaporized into the source. Where the electrons and sample molecules interact, ions are formed, representing intact sample molecular ions and also fragments produced from them. These molecular and fragment ions compose the mass spectrum, which is a correlation of ion mass and its abundance. El spectra of tens of thousands of substances have been recorded and form the basis of spectral libraries, available either in book form or stored in computer memory banks. [Pg.15]

Any one bin can be electronically distinguished from the next one, and therefore the bins can be used like the tick of a standard clock. Each bin serves as one tick, which lasts for only 0.3 nsec. By counting the ticks and knowing into which bin the ion pulse has gone, the time taken for the ion to arrive at the detector can be measured to an accuracy of 0.3 nsec, which is the basis for measuring very short ion arrival times after the ions have traveled along the TOE analyzer tube. Each ion arrival pulse (event) is extracted from its time bin and stored in an associated computer memory location. [Pg.222]

As set out above, certain parts of computer memory are reserved exclusively for the central processor and other parts for driving any peripherals, such as a keyboard. Although this memory can be accessed (read), it cannot be changed, hence its name read-only memory (ROM). The user has... [Pg.309]

Blt-M ppedImages. A bit map is a grid pattern composed of tiny cells or picture elements called pixels. Each pixel has two attributes a location and a value or set of values. Location is defined as the address of the cell in a Cartesian, ie, x andjy coordinate, system. Value is defined as the color of the pixel in a specified color system. Geometric quaUties of images are a function of the location attribute, ie, the finer the grid pattern, the more precisely can the geometric quaUties be controlled. Color quaUties are a function of the value attribute, ie, the more bytes of computer memory assigned to describe each pixel, the more precisely can the color quaUties be controlled. [Pg.33]

Step 2. The computer opens a shutter, bathing the crystal in a monochromatic x-ray beam. The computer rotates the crystal for about one minute and the rotation diffraction image is stored on the detector and then read into the computer memory. When the operator examines the image and is confident that the sample is indeed a single crystal, the experiment can proceed. [Pg.378]

Other. Alkali chiorochromate compounds, including cesium chiorochromate, CsCrCl, are ferromagnetic substances being studied for potential apphcation in optically-read computer memory devices. Cesium has also been used in vapor glow lamps (44), vapor rectifiers, and high energy lasers (qv)... [Pg.378]

Numerical simulations offer several potential advantages over experimental methods for studying dynamic material behavior. For example, simulations allow nonintrusive investigation of material response at interior points of the sample. No gauges, wires, or other instrumentation are required to extract the information on the state of the material. The response at any of the discrete points in a numerical simulation can be monitored throughout the calculation simply by recording the material state at each time step of the calculation. Arbitrarily fine resolution in space and time is possible, limited only by the availability of computer memory and time. [Pg.323]

We have been discussing a class of penetration problems that are accurately modeled by two-dimensional calculations. There are many three-dimensional problems, however, that can be well approximated by two-dimensional analyses, and the greatly reduced computer memory and time requirements for such calculations make them attractive alternatives for scoping studies, or for parameter sensitivity studies. Although good quantitative predictions may not be obtained with such approximations, the calculations can be expected to reveal trends and qualitative results that will carry over to the full three-dimensional problem. [Pg.347]


See other pages where Memory, computer is mentioned: [Pg.516]    [Pg.570]    [Pg.571]    [Pg.1475]    [Pg.279]    [Pg.87]    [Pg.187]    [Pg.61]    [Pg.367]    [Pg.393]    [Pg.15]    [Pg.220]    [Pg.306]    [Pg.309]    [Pg.320]    [Pg.85]    [Pg.261]    [Pg.165]    [Pg.253]    [Pg.437]    [Pg.139]    [Pg.377]    [Pg.349]    [Pg.83]    [Pg.113]    [Pg.156]    [Pg.1980]    [Pg.116]    [Pg.188]    [Pg.109]    [Pg.145]    [Pg.251]    [Pg.259]    [Pg.262]    [Pg.285]    [Pg.288]   
See also in sourсe #XX -- [ Pg.309 ]

See also in sourсe #XX -- [ Pg.128 , Pg.129 ]

See also in sourсe #XX -- [ Pg.92 , Pg.94 ]

See also in sourсe #XX -- [ Pg.6 ]

See also in sourсe #XX -- [ Pg.31 ]

See also in sourсe #XX -- [ Pg.92 , Pg.94 ]

See also in sourсe #XX -- [ Pg.10 ]




SEARCH



Address, computer memory

Computer random access memory

Computers read-only memory

Computers, large-memory

Core memory, computer

Cycle time, computer memory

Distributed memory computer

Parallel computer distributed memory

Parallel computer shared memory

Personal Computer Memory

Personal Computer Memory Card Association

Word, computer memory

© 2024 chempedia.info