Explore chapters and articles related to this topic
Gas Chromatography
Published in Grinberg Nelu, Rodriguez Sonia, Ewing’s Analytical Instrumentation Handbook, Fourth Edition, 2019
Yuwen Wang, Mochammad Yuwono, Gunawan Indrayanto
In the last few years, most producers of the GC equipment have introduced new 32-bit version programs or have enhanced their existing 16-bit programs. All the programs are mostly designed to work with 32-bit Windows operating systems, Windows 95/98/2000 and Windows NT 4.0 or 5.0. Although some GC producers have used other systems, such as Macintosh or Unix, their development is very limited. During the 1980s and 1990s, producers developed several software systems simultaneously: perhaps one for GC and another for LC or GC-MS. With the development of 32-bit programs, many companies are trying to consolidate all the major techniques into one program. At the present time, most of the software modules have several functionalities: that is, integrated instrument controls including automatic sampler, data analysis, integrated system automation, software validation tools, custom reports, and user-defined security. There is also a trend to include a database with the chromatography software. The new programs can also be used to control four chromatographic systems at the same time, either GC or LC.
Software Reliability: A Quantitative Approach
Published in Adarsh Anand, Mangey Ram, System Reliability Management, 2019
In Table 13.6, we see that the source code size is 16 and 18 MSLOC (million source lines of code) for Windows NT 4.0 and Windows 98, respectively, which is approximately the same. The reported defect densities at release, 0.625 and 0.556, are also similar for the two OSs. The known vulnerabilities in Table 13.6 are as of the period 1999–2008 (no vulnerabilities were reported after that). For Windows 98, the vulnerability density was 0.0047, whereas for Windows NT 4.0 it is 0.0129, nearly three times. The higher vulnerability density for Windows NT 4.0 is likely due to two factors. First, since it is a server OS, it contains more code that handles external accesses. Second, attacking servers would generally be much more rewarding, and thus it must have attracted more attention by the vulnerability finders causing detection of more vulnerabilities.
Reliability and fault-finding
Published in Mike Tooley, PC Based Instrumentation and Control, 2013
In addition to absolute measurement of performance, Fresh Diagnose can provide a comparison of the current system with others. This information can be invaluable in confirming (or otherwise!) that a PC is performing according to expectation. Fresh Diagnose will operate successfully with systems that use Windows 95, Windows 95 OSR2, Windows 98, Windows 98 Second Edition, Windows ME, Windows NT 4.0, Windows 2000, and Windows XP (Figure 13.11).
Arrangement and Accomplishment of Interconnected Networks with Virtual Reality
Published in IETE Journal of Research, 2022
A University of Southwestern Louisiana's Mechatronics and Automated Laboratories (RAL) uses an experimental multi-user connected VE to teleoperate a mobility robot. Computer work has taken place in the Virtually Realities and Media Centre. These helmet or operational platforms are used by testbed elements: I a portable robotics platform having a common storage multi-processor management platform, such as the Nomad 200. I Silicon Graphics workstation O2, running IRIX 6.3; (ii) numerous Gateway 2000 PCs (Pentium II 333 MHz, 384 MB RAM), running Metropolitan Window 95/NT/98; (iii) multiple Gateway 2000 PCs (Pentium II 333 MHz, 384 MB RAM), running Microsoft Windows 95/NT/98. Numerous Silicone Graphic desktops and Pentium-based PCs attached to a 10 Mb/s Gigabit LAN are also employed in a multi-user setup. To connect without additional machines on your LAN, the robots employ a wirelessly Internet network via RangeLAN2/Access Points. VRML, DIS, and Java were used to create the VE.
Noise in the velocity measurements and boundaries effect in an open channel with Piano Key Weir
Published in ISH Journal of Hydraulic Engineering, 2020
Harinarayan Tiwari, Nayan Sharma, Sébastien Erpicum
It is the most robust method because it requires no external parameters. Other methods such as the one based on an acceleration criterion suffer from ambiguity in what thresholds to choose and the fact that different records may need different thresholds (Goring and Nikora 2002). Phase-Space Threshold method (WIN ADV) has been adopted for the removal of spikes. WinADV provides an integrated environment for viewing, reviewing, and processing data collected using SonTek and Nortek acoustic Doppler Velocimeter (ADV’s). WinADV was written for Windows 95/NT, using Visual Basic 4.0. WinADV permits easy, visual review of ADV data files in the office following data collection. It simplifies filtering of data and aids in the identification of anomalies caused by low signal strength or over ranging of the ADV probe. This is the most general method to state space distribution in one dimension. The process can be extended to nth dimension, where the order of noise is very much higher.