Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Network environment

NOTES (1) PCs and monitors are to be shipped with the power saving features enabled and those features must be tested in a networked environment,... [Pg.902]

Y. Xie, P.K. Hopke and D. Wienke, Airborne particle classification with a combination of chemical composition and shape index utilizing an adaptive resonance artificial neural network. Environ. Sci. Technol., 28 (1994) 1399-1407. [Pg.699]

Eondi M, Eani R (2010) The horizontal flow of the plasmid resistome clues from intergeneric similarity networks. Environ Microbiol 12(12) 3228-3242... [Pg.205]

The security strategy selected has to ensure that cells containing formulas (on purpose, by mistake, or by the auto-save function) of the spreadsheet cannot be overwritten. In today s standard office network environment, in some cases, the network itself is, not validated and does not fulfill the electronic record/electro-nic signature requirement. Therefore, the validated spreadsheets should be stored in a protected drive to which only restricted personnel have access. Furthermore, the server used for storage/handling should be qualified. Figure 18.7 is an example. [Pg.288]

The following items are the key practices that are applicable for the security of the network environment. [Pg.107]

For example, in a network environment it may be necessary for security reasons to limit the issuance of critical commands to a particular authorized workstation. [Pg.139]

Personal computing as defined here will begin to impact the author s field of application as the PC becomes integrated into the UNIX network environment. Aspects of this have already been achieved, but full realization of chemists goals in this area awaits availability of efficient parallelized supercomputers with speeds 10 to 1000 times that of today s largest computing systems. This will enable us to interactively model protein molecules and other complex systems in realistic chemical environments. [Pg.194]

Facchiano A, A Weisz Internet tools for the analysis of gene expression by database integration, Proceedings of the NETTAB 2001 Workshop CORBA and XML—Toward a bioinformatics integrated network environment , Italy, 2001, pp. 99-102. [Pg.563]

It takes several items to make a workstation into a client. You must install a network interface card (NIC), a special expansion card that allows the PC to talk on a network. You must connect it to a cabling system that connects to another computer (or several other computers). And you must install some special software, called client software, which allows the computer to talk to the servers. Once all this has been accomplished, the computer will be on the network. To the client, the server may be nothing more than just another drive letter. However, because it is in a network environment, the client is able to use the server as a doorway to more storage or more applications, or through which it may communicate with other computers or other networks. To a user, being on a network changes a few things ... [Pg.308]

Xu, L., Ball, J., Dixon, S.L. and Jurs, PC. (1994). Quantitative Structure-Activity Relationships for Toxicity of Phenols Using Regressions Analysis and Computational Networks. Environ. Toxicol.Chem., 13,841-851. [Pg.664]

Conservation Why Care About Reefs REN Reef Education Network, Environment Australia. Available online. URL http //www.reef.edu.au/ asp pages/search.asp. Accessed November 18, 2004. A superb Web site dedicated to the organisms living in and the health of the coral reefs. [Pg.126]

Vracko M, Mills D, Basak SC. Structure-mutagenicity modelling using counter propagation neural networks. Environ Toxicol Pharmacol 2004 16(l-2) 25-36. [Pg.200]

As to the envisaged users of the system, for the duration of the project, the idea is to provide timely information to researchers belonging to organizations involved in the project and, upon the project s completion, make this information available to public users in an open database. On the matter of method of access, direct access via the Internet has been chosen. At the inception of the project, a network was deployed using modems connected to the public telephone lines but, in response to changes in the network environment cause by the growing availabUity of the Internet, a switch was made to direct access via the net. [Pg.102]

Abdul-Wahab, S A. and S. M. Al-Alawi Assessment and prediction of tropospheric ozone concentration levels using artificial neural networks, Environ. Model. Software 17 (2002) 219-228. [Pg.430]

Resource management. This covers the computational and network realities that the workflow must deal with. Data reside in databases and on file servers with their individual networking and security considerations. Similarly, the invocation of an application that is needed to complete a workflow may have specific network requirements. To be useful in a typical organizational network environment, the workflow engine has to maintain information about network locations and network users, plus have the ability to utilize these data in the way that is expected by users and administrators. [Pg.429]

Gdtz, R. and Lauer, R. (2003) Analysis of sources of dioxin contamination in sediments and soils using multivariate statistical methods and neural networks. Environ. Sci. TechnoL, 37, pp. 5559-5565. [Pg.384]

COM has been further enhanced to operate across multiple platforms in a network environment and in a distributed manner. This is known a D-COM (distributed component object model), but even D-COM fails to address... [Pg.176]

In addition, highly networked environments will increase user needs for instantaneous information. Information on demand will be a requirement of all network participants. Users won t be satisfied with paging through static report images they will need to analyze data—within the scope of the reporting system—from multiple perspectives in order to answer critical business questions involving all aspects of the value chain. [Pg.39]

The networked environment on the Internet offers a possibility of allowing such portfolio-based transactions. In essence, the desired auction mechanism must unbundle and rebundle offers and bids presented by both sellers and buyers. A prototype of such a mechanism is a portfolio trading algorithm developed for the investment community (Fan et al. 1999 Srinivasan et al. 1999). Its basic setup, however, can extend into procurement process in manufacturing as well as bundle trading in physical products tmd persontil services. [Pg.277]

Information transfer between different function units has three main functions data output from application software in a certain data format to a certain kind of data repository data format transformation, and data transfer from one application to another application within the same computer or in a network environment. [Pg.489]

The two operating systems interface with the Octopus network environment to provide parallel services for applications programs. This compatibility is reflected in the use of the general term, Livermore Time Sharing System (LTSS), to encompass both systems. FROST and FLOE interface with the Octopus network to provide interactive and file transfer support for the over 700 on-site terminals and the LLL mass storage devices. Each operating system occupies about twenty percent of the resident worker computer s core memory with approximately three-fifths of this space allotted to system tables. [Pg.312]

ERAMsim is a software program developed for running basic simulations of the ERAM framework. Providing both simplified physical and network environment simulations, it implements the AGO algorithm as well as the behavior of individuals trying to reach a safe area in a floor plan. Figure 6 shows a screenshot of the simulation enviromnent. [Pg.137]

B. A. Mah, INSANE - An Internet Simulated ATM Networking Environment , available at http //HTTP.CS.Berkeley.EDU/ bmah/Software/Insane/... [Pg.250]

Y-Comm is a communication architecture to support a heterogeneous networking environment. The architecture has two frameworks ... [Pg.200]

McNair J, Zhu F (2004) Vertical handoffs in fourth-generation multi-network environments. IEEE Wireless Comm 11 pp 8-15... [Pg.206]

More and more companies are integrating their CDS in the companies own network environment. Provided that the CDS supports network capability, many advantages are offered ... [Pg.270]


See other pages where Network environment is mentioned: [Pg.261]    [Pg.280]    [Pg.118]    [Pg.297]    [Pg.617]    [Pg.279]    [Pg.132]    [Pg.136]    [Pg.79]    [Pg.280]    [Pg.334]    [Pg.561]    [Pg.848]    [Pg.292]    [Pg.757]    [Pg.1202]    [Pg.103]    [Pg.330]    [Pg.219]    [Pg.263]    [Pg.19]    [Pg.340]    [Pg.240]    [Pg.270]   
See also in sourсe #XX -- [ Pg.270 ]




SEARCH



Modern network environment

Participation in Virtual, Networked Environments Becomes the Objective

© 2024 chempedia.info