This document is a user manual for CLiq liquefaction assessment software. CLiq was developed by GeoLogismiki to assess soil liquefaction using CPTU data. It provides a graphical interface for analyzing CPT data and calculates liquefaction factors including factor of safety, liquefaction potential index, and post-earthquake displacements. The manual describes how to start a new project, import CPTU data, define calculation parameters, perform calculations, customize plots, and export results.
This document is the user manual for CPeT-IT version 1.4 software for analyzing cone penetration test data. It is copyrighted by GeoLogismiki. The manual contains license information, an overview of the software, and step-by-step instructions for using the various features of CPeT-IT for importing data, editing data, creating reports, and exporting results.
This document provides a tutorial for using Target for ArcGIS software from Geosoft. It includes instructions on installing the software, accessing toolbars and menus, importing different types of geospatial data, performing gridding and contouring, creating maps of drillhole data, and using 3D visualization tools. The tutorial is intended to help users get started with the main functions of the Target for ArcGIS software.
This document is the user manual for PrimoPDF version 3.1. It provides instructions on installing and uninstalling PrimoPDF. It describes how to create PDFs and customize PDF document properties and settings. The manual covers general PDF creation and options for optimizing images within PDFs at different resolutions. Copyright information is included and the software is provided on an "as is" basis without warranty.
Introduction to open source licensing, using examples from Boundless Suite and Boundless Desktop to illustrate how to build your own software using open source components.
This document provides instructions for using Siemens' SIMATIC Visualization Architect (SiVArc) tool with the function blocks and faceplates in the Siemens Open Library. It describes how to install and configure SiVArc, add the included screen rules to a project, generate visualizations, and customize properties. Screen rules allow SiVArc to automatically create screens and objects based on the control program and library templates.
This document provides an instruction manual for RTMC Pro software. It describes the key features and components of RTMC Pro for developing real-time monitoring and control displays. RTMC Pro allows users to create graphical screens to display live data from dataloggers and includes more display components than the standard RTMC. Projects can be run in RTMC Run-Time or viewed through the included CSI Web Server. The document provides details on the development environment, display components, data sources, reports, and the web server.
Revised submission for Unified Component Model (UCM) for Distributed, Real-Ti...Remedy IT
Remedy IT revised submission for the Unified Component Model (UCM) for Distributed, Real-Time and Embedded Systems.
Change of address Remedy IT:
Melkrijder 11
3861 SG Nijkerk
tel. +31 (0)88 053 0000
This document is the user manual for CPeT-IT version 1.4 software for analyzing cone penetration test data. It is copyrighted by GeoLogismiki. The manual contains license information, an overview of the software, and step-by-step instructions for using the various features of CPeT-IT for importing data, editing data, creating reports, and exporting results.
This document provides a tutorial for using Target for ArcGIS software from Geosoft. It includes instructions on installing the software, accessing toolbars and menus, importing different types of geospatial data, performing gridding and contouring, creating maps of drillhole data, and using 3D visualization tools. The tutorial is intended to help users get started with the main functions of the Target for ArcGIS software.
This document is the user manual for PrimoPDF version 3.1. It provides instructions on installing and uninstalling PrimoPDF. It describes how to create PDFs and customize PDF document properties and settings. The manual covers general PDF creation and options for optimizing images within PDFs at different resolutions. Copyright information is included and the software is provided on an "as is" basis without warranty.
Introduction to open source licensing, using examples from Boundless Suite and Boundless Desktop to illustrate how to build your own software using open source components.
This document provides instructions for using Siemens' SIMATIC Visualization Architect (SiVArc) tool with the function blocks and faceplates in the Siemens Open Library. It describes how to install and configure SiVArc, add the included screen rules to a project, generate visualizations, and customize properties. Screen rules allow SiVArc to automatically create screens and objects based on the control program and library templates.
This document provides an instruction manual for RTMC Pro software. It describes the key features and components of RTMC Pro for developing real-time monitoring and control displays. RTMC Pro allows users to create graphical screens to display live data from dataloggers and includes more display components than the standard RTMC. Projects can be run in RTMC Run-Time or viewed through the included CSI Web Server. The document provides details on the development environment, display components, data sources, reports, and the web server.
Revised submission for Unified Component Model (UCM) for Distributed, Real-Ti...Remedy IT
Remedy IT revised submission for the Unified Component Model (UCM) for Distributed, Real-Time and Embedded Systems.
Change of address Remedy IT:
Melkrijder 11
3861 SG Nijkerk
tel. +31 (0)88 053 0000
Business Process Model and Notation,BPMN2.0(Beta1)BPC流程社区
This document provides an overview of the Business Process Model and Notation (BPMN) Beta 1 specification for Version 2.0. It introduces BPMN as a standard for business process modeling and outlines the key elements and concepts in BPMN including processes, collaboration, choreography, activities, events, gateways, data, and more. The document also establishes the conformance requirements and references for BPMN and provides copyright and usage information.
CopanMobile is a software program for Windows Mobile devices that allows users to perform coordinate geometry calculations. It was created by Underhill Geomatics Ltd. for surveying tasks. Key features include traverse calculations, coordinate transformations, area calculations, map checking, and GPS navigation. The software also allows users to store coordinate data in files and share files across sessions.
The document discusses Enthought Deployment Manager (EDM), a tool for delivering scientific software applications and environments. EDM allows developers to quickly iterate on solutions and have confidence their code will work for end users. It supports all phases of software development and deployment, from initial ideas to delivering finished applications. EDM code is licensed under BSD terms unless otherwise specified. The software also contains Microsoft Visual C/C++ redistributable binaries, which are governed by the Microsoft Visual Studio Community 2019 license agreement.
NOTE: This document has been obsoleted by the Adopted DDS Specification
OMG DDS Security Draft Specification. This is the 4th Revised Submission to the DDS Security Specification.
Also accessible from the OMG at:
http://www.omg.org/members/cgi-bin/doc?mars/13-02-15.pdf
In this lesson, you learn how to use the Revit MEP tutorials, including where to find the training files and
how to create a new Revit MEP project from a template file.
The Contents tab of the Revit MEP Tutorials window displays the available tutorial titles. Expand a title for
a list of lessons in the tutorial. Expand a lesson title for a list of exercises in the lesson.
This document provides a C++ language mapping specification for CORBA. It defines how CORBA IDL constructs like modules, interfaces, constants, data types etc. are mapped to equivalent C++ constructs. It covers mapping rules for basic types, structured types, exceptions, operations and other CORBA core components. The document also specifies how CORBA services like the ORB, object references and portable servants are mapped to C++. It aims to provide an interoperable mapping standard for CORBA implementations and applications developed in the C++ language.
This document is a license agreement for Microsoft Windows 8.1 Pro software. It outlines the terms of use for the software, including that the user is granted a license to install the software on one computer for use by one person at a time. The software is not licensed for server or commercial hosting use. The agreement also covers transferring the software to another user or computer, internet activation of the software, data collection and privacy practices, limitations on certain uses of the software, and additional terms for multi-user scenarios and virtualization.
This document is the license agreement for Portlock Storage Manager 4.0 for NetWare. It outlines the terms of use for the software, including that it is for personal use on a single computer only, there is a 90 day warranty, and liability is limited to the purchase price. The user must agree to these terms before using the software.
This document is the user manual for the IC-3116W camera. It contains information about package contents, hardware installation, camera setup using the EdiView app and EdiView Finder software, as well as details on the web-based management interface for configuring camera settings like video, events, storage, system settings and more. The manual provides step-by-step instructions and screenshots to guide users through setup and configuration of the camera.
We discuss the concepts behind CrXPRT 2015, its development process, as well as the application’s structure. We also describe the component tests and detail the statistical processes used to calculate expected battery life.
Ecma 385 Near Field Communication standardAili Luggymix
This document specifies security services and protocols for Near Field Communication (NFC) technology. It defines a shared secret service and secure channel service for NFCIP-1. It also outlines the protocol data units and states involved in the security protocol. The document references related NFC security standards and provides normative definitions and requirements for conformant implementations.
This document provides instructions for downloading and installing the maintenance application software for Sumitomo fusion splicers onto a PC. It outlines the system requirements, describes how to access the download page by entering the splicer serial number, and guides the user through installing necessary runtime libraries and frameworks before installing the application itself. The installation process includes accepting license agreements and installing additional components as prompted. Once installed, a desktop shortcut is created to launch the maintenance application.
It’s not news to anyone in IT that container technology has become one of the fastest growing areas of innovation, facilitating ease of packaging and consistent deployment environments for applications. If you’re in IT, you are also likely familiar with Kubernetes—the leading container orchestration platform.
This advanced technology session will cover the integration of Nutanix Enterprise Cloud OS platform with Kubernetes. Binny Gill, Nutanix Chief Architect, and Allan Naim, Google Product Manager, will guide you through how Kubernetes is enabled by Google in GKE and by Nutanix on-premises, to provide a simple, consistent, and hybrid platform for all your containerized apps.
The document provides an introduction and getting started guide for the Proteus Design Suite. It includes information about copyright, warnings regarding copying and licensing, and disclaimers of warranty. The table of contents outlines tutorials for schematic capture and PCB layout, and sections on library parts, creating new devices, and preparation for board fabrication.
This guide contains information about:
1. Transactional Business Intelligence (OTBI) subject areas in Oracle Risk Management Cloud, the business questions they can answer, and the types of real-time data they provide.
2. Job roles and duty roles that have access to analyze and report on the OTBI subject area data.
3. Examples of common business questions that each OTBI subject area can help answer related to risk management, controls, access certification, security and more.
This is the DDS Security adopted specification.
It was adopted as an OMG standard in June 2014.
The official URL is http://www.omg.org/spec/DDS-SECURITY/
This document provides an introduction to advanced reporting features in MicroStrategy Desktop, including:
- Filters, derived metrics, dynamic aggregation, view filters, subtotals, shortcut metrics, formatting, deployment, evaluation order, and finding and replacing objects.
- It describes how reports are executed and how different features interact, with examples to illustrate concepts like levels, qualifications, and exceptions to dynamic aggregation.
- The document also covers creating freeform SQL reports from various data sources, as well as creating OLAP cube reports by connecting to SAP BW servers and mapping cube objects.
- Advanced techniques are presented for customizing reports through filters, prompts, drilling, authentication, and managed objects. Formatting and styles
This document is a license agreement for Crystal Reports 9 Developer and Advanced software. It outlines the terms and conditions for use, installation, deployment and distribution of the software. Key points include:
- The software includes Design Tools, Report Application Server and Runtime Software.
- Licenses are required for single users, multiple users (5 user packs) and upgrades. Evaluation licenses are limited to evaluation purposes.
- The Report Application Server can be used on a single computer and accessed by remote applications for internal business. It cannot be distributed without authorization.
- Runtime Software can be used to develop Client and Server/Web Applications. Distribution terms differ based on application type.
- Client Applications utilizing Runtime Software can
This document describes a specification for performing remote procedure calls over the Data Distribution Service (DDS). It provides machine-readable files for C++ and Java implementations and replaces an earlier beta 1 version. The document outlines copyrights and licensing for using the specification and contacting representatives from companies involved in its development. It also details OMG's issue reporting process for providing feedback.
Software Engineering and Project Management - Software Testing + Agile Method...Prakhyath Rai
Software Testing: A Strategic Approach to Software Testing, Strategic Issues, Test Strategies for Conventional Software, Test Strategies for Object -Oriented Software, Validation Testing, System Testing, The Art of Debugging.
Agile Methodology: Before Agile – Waterfall, Agile Development.
Business Process Model and Notation,BPMN2.0(Beta1)BPC流程社区
This document provides an overview of the Business Process Model and Notation (BPMN) Beta 1 specification for Version 2.0. It introduces BPMN as a standard for business process modeling and outlines the key elements and concepts in BPMN including processes, collaboration, choreography, activities, events, gateways, data, and more. The document also establishes the conformance requirements and references for BPMN and provides copyright and usage information.
CopanMobile is a software program for Windows Mobile devices that allows users to perform coordinate geometry calculations. It was created by Underhill Geomatics Ltd. for surveying tasks. Key features include traverse calculations, coordinate transformations, area calculations, map checking, and GPS navigation. The software also allows users to store coordinate data in files and share files across sessions.
The document discusses Enthought Deployment Manager (EDM), a tool for delivering scientific software applications and environments. EDM allows developers to quickly iterate on solutions and have confidence their code will work for end users. It supports all phases of software development and deployment, from initial ideas to delivering finished applications. EDM code is licensed under BSD terms unless otherwise specified. The software also contains Microsoft Visual C/C++ redistributable binaries, which are governed by the Microsoft Visual Studio Community 2019 license agreement.
NOTE: This document has been obsoleted by the Adopted DDS Specification
OMG DDS Security Draft Specification. This is the 4th Revised Submission to the DDS Security Specification.
Also accessible from the OMG at:
http://www.omg.org/members/cgi-bin/doc?mars/13-02-15.pdf
In this lesson, you learn how to use the Revit MEP tutorials, including where to find the training files and
how to create a new Revit MEP project from a template file.
The Contents tab of the Revit MEP Tutorials window displays the available tutorial titles. Expand a title for
a list of lessons in the tutorial. Expand a lesson title for a list of exercises in the lesson.
This document provides a C++ language mapping specification for CORBA. It defines how CORBA IDL constructs like modules, interfaces, constants, data types etc. are mapped to equivalent C++ constructs. It covers mapping rules for basic types, structured types, exceptions, operations and other CORBA core components. The document also specifies how CORBA services like the ORB, object references and portable servants are mapped to C++. It aims to provide an interoperable mapping standard for CORBA implementations and applications developed in the C++ language.
This document is a license agreement for Microsoft Windows 8.1 Pro software. It outlines the terms of use for the software, including that the user is granted a license to install the software on one computer for use by one person at a time. The software is not licensed for server or commercial hosting use. The agreement also covers transferring the software to another user or computer, internet activation of the software, data collection and privacy practices, limitations on certain uses of the software, and additional terms for multi-user scenarios and virtualization.
This document is the license agreement for Portlock Storage Manager 4.0 for NetWare. It outlines the terms of use for the software, including that it is for personal use on a single computer only, there is a 90 day warranty, and liability is limited to the purchase price. The user must agree to these terms before using the software.
This document is the user manual for the IC-3116W camera. It contains information about package contents, hardware installation, camera setup using the EdiView app and EdiView Finder software, as well as details on the web-based management interface for configuring camera settings like video, events, storage, system settings and more. The manual provides step-by-step instructions and screenshots to guide users through setup and configuration of the camera.
We discuss the concepts behind CrXPRT 2015, its development process, as well as the application’s structure. We also describe the component tests and detail the statistical processes used to calculate expected battery life.
Ecma 385 Near Field Communication standardAili Luggymix
This document specifies security services and protocols for Near Field Communication (NFC) technology. It defines a shared secret service and secure channel service for NFCIP-1. It also outlines the protocol data units and states involved in the security protocol. The document references related NFC security standards and provides normative definitions and requirements for conformant implementations.
This document provides instructions for downloading and installing the maintenance application software for Sumitomo fusion splicers onto a PC. It outlines the system requirements, describes how to access the download page by entering the splicer serial number, and guides the user through installing necessary runtime libraries and frameworks before installing the application itself. The installation process includes accepting license agreements and installing additional components as prompted. Once installed, a desktop shortcut is created to launch the maintenance application.
It’s not news to anyone in IT that container technology has become one of the fastest growing areas of innovation, facilitating ease of packaging and consistent deployment environments for applications. If you’re in IT, you are also likely familiar with Kubernetes—the leading container orchestration platform.
This advanced technology session will cover the integration of Nutanix Enterprise Cloud OS platform with Kubernetes. Binny Gill, Nutanix Chief Architect, and Allan Naim, Google Product Manager, will guide you through how Kubernetes is enabled by Google in GKE and by Nutanix on-premises, to provide a simple, consistent, and hybrid platform for all your containerized apps.
The document provides an introduction and getting started guide for the Proteus Design Suite. It includes information about copyright, warnings regarding copying and licensing, and disclaimers of warranty. The table of contents outlines tutorials for schematic capture and PCB layout, and sections on library parts, creating new devices, and preparation for board fabrication.
This guide contains information about:
1. Transactional Business Intelligence (OTBI) subject areas in Oracle Risk Management Cloud, the business questions they can answer, and the types of real-time data they provide.
2. Job roles and duty roles that have access to analyze and report on the OTBI subject area data.
3. Examples of common business questions that each OTBI subject area can help answer related to risk management, controls, access certification, security and more.
This is the DDS Security adopted specification.
It was adopted as an OMG standard in June 2014.
The official URL is http://www.omg.org/spec/DDS-SECURITY/
This document provides an introduction to advanced reporting features in MicroStrategy Desktop, including:
- Filters, derived metrics, dynamic aggregation, view filters, subtotals, shortcut metrics, formatting, deployment, evaluation order, and finding and replacing objects.
- It describes how reports are executed and how different features interact, with examples to illustrate concepts like levels, qualifications, and exceptions to dynamic aggregation.
- The document also covers creating freeform SQL reports from various data sources, as well as creating OLAP cube reports by connecting to SAP BW servers and mapping cube objects.
- Advanced techniques are presented for customizing reports through filters, prompts, drilling, authentication, and managed objects. Formatting and styles
This document is a license agreement for Crystal Reports 9 Developer and Advanced software. It outlines the terms and conditions for use, installation, deployment and distribution of the software. Key points include:
- The software includes Design Tools, Report Application Server and Runtime Software.
- Licenses are required for single users, multiple users (5 user packs) and upgrades. Evaluation licenses are limited to evaluation purposes.
- The Report Application Server can be used on a single computer and accessed by remote applications for internal business. It cannot be distributed without authorization.
- Runtime Software can be used to develop Client and Server/Web Applications. Distribution terms differ based on application type.
- Client Applications utilizing Runtime Software can
This document describes a specification for performing remote procedure calls over the Data Distribution Service (DDS). It provides machine-readable files for C++ and Java implementations and replaces an earlier beta 1 version. The document outlines copyrights and licensing for using the specification and contacting representatives from companies involved in its development. It also details OMG's issue reporting process for providing feedback.
Software Engineering and Project Management - Software Testing + Agile Method...Prakhyath Rai
Software Testing: A Strategic Approach to Software Testing, Strategic Issues, Test Strategies for Conventional Software, Test Strategies for Object -Oriented Software, Validation Testing, System Testing, The Art of Debugging.
Agile Methodology: Before Agile – Waterfall, Agile Development.
AI for Legal Research with applications, toolsmahaffeycheryld
AI applications in legal research include rapid document analysis, case law review, and statute interpretation. AI-powered tools can sift through vast legal databases to find relevant precedents and citations, enhancing research accuracy and speed. They assist in legal writing by drafting and proofreading documents. Predictive analytics help foresee case outcomes based on historical data, aiding in strategic decision-making. AI also automates routine tasks like contract review and due diligence, freeing up lawyers to focus on complex legal issues. These applications make legal research more efficient, cost-effective, and accessible.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...PIMR BHOPAL
Variable frequency drive .A Variable Frequency Drive (VFD) is an electronic device used to control the speed and torque of an electric motor by varying the frequency and voltage of its power supply. VFDs are widely used in industrial applications for motor control, providing significant energy savings and precise motor operation.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
3. CLiq v.1.7
Liquefaction assessment software from CPTU
measurments
by GeoLogismiki
CLiq is software for the assessment of soil liquefaction using CPT/CPTU data. CLiq
was developed in collaboration with Gregg Drilling & Testing Inc., a leading
company in site investigation and CPT, and Professor Peter Robertson, author of
the method used in the software.
CLiq provides users with an easy to use graphical environment specifically tailored
for CPT and CPTU data. This new software addresses advanced issues such as
cyclic softening in clay-like soils and thin layer/layer transition zone detection.
CLiq provides results and plots for each calculation step, starting with the basic
CPT data interpretation through to final plots of factor of safety, liquefaction
potential index and post-earthquake displacements, both vertical settlement and
lateral displacements. CLiq provides consistent output results by applying the
state-of-the-art methods (e.g. Youd et al, 2001) along with the calibrated
procedures for post-earthquake displacements (e.g. Zhang et al 2002 & 2004).