Displaying 20 results from an estimated 514 matches for "asymmetric".
Did you mean:
symmetric
2012 Sep 27
3
Drawing asymmetric error bars
Hello,
I have data which I have arcsin transformed to analyse.
I want to plot my data with error bars however as my data is
back-transformed my standard errors are uneven.
Is there a simple way to draw these asymmetric error bars in R?
Thanks for your help.
[[alternative HTML version deleted]]
2005 Jul 27
3
Asymmetric colors for heatmap
...easy to achieve this, especially that CN=2 is always
> displayed as black, however, I do not know how to do it in R.
> Can you tell me how I have to create the colors to achieve this?
>
> (P.S.: Of course, I could do: snp[snp>8] <- 8, but this will not solve my
> problem with asymmetric colors)
>
> Thank you in advance
> Christian Stratowa
>
>
>
>
>
>
2014 Dec 19
2
Asymmetric encryption for very large tar file
...hat you want to be using for this. OpenSSL is a general
> toolkit that provide a lot of good functions, but you need to cobble some
> things together yourself. GPG is meant to handle all of the other parts of
> dealing with files.
>
> I will expand on what someone else mentioned -- asymmetric encryption is
> not meant for, and has very poor performance for encrypting data, and also
> has a lot of limitations. The correct way to handle this is to create a
> symmetric key and use that to encrypt the data, then use asymmetric
> encryption to encrypt only the symmetric key.
>...
2015 Sep 07
1
Asymmetric routing and firewalls dropping UDP packets
We are running tinc (v. 1.0.26) in switch mode with bmx6 (another mesh
protocol) running on top of the tap0 interface on about 25 devices. The
asymmetric routing of UDP packets is causing my firewall and I presume
others to drop some of the packets, since there are no outbound SYN packets
originating from the device running tinc. Is there any way to mitigate
this issue besides enabling tcponly (and not putting the tinc device in the
dmz)? tcplonly...
2008 Dec 02
1
Asymmetric CIs
Hi, I was wondering if there was some sort of package or function that calculated asymmetric confidence intervals for small proportions. I thought of both the epicalc and epitools package, but I am hoping to find something where you can just plug in a standard error and point estimate and it will output the upper and lower CI bounds.
Thanks!
Sarah
2014 Dec 19
0
Asymmetric encryption for very large tar file
...n?t leave the un-encrypted symmetric key there on the server but we
> have to use the un-encrypted symmetric key for encryption process. Plus
> we?ll need to manage the symmetric encryption key, public and private key
> pair 3 things securely.
> Has anyone had experience on managing the asymmetric encryption for very
> large file and what?s the best practice for that?
> Thanks.
> - xinhuan
>
GPG is really what you want to be using for this. OpenSSL is a general
toolkit that provide a lot of good functions, but you need to cobble some
things together yourself. GPG is meant to...
2006 Dec 14
2
Asymmetrical ANOVA / contrasts
Dear all,
I have problems to code contrasts for performing an asymmetrical anova
with aov(). I am using aov() because I want to get the Mean Squares for
further analyses. I didn't find any solution to my problem in the help
files of functions aov(), contrasts(), C(), etc.
Let's say I have three locations, one with treatment P, and two with
treatment C:
>...
2014 Dec 19
0
Asymmetric encryption for very large tar file
...his. OpenSSL is a general
> > toolkit that provide a lot of good functions, but you need to cobble some
> > things together yourself. GPG is meant to handle all of the other parts
> of
> > dealing with files.
> >
> > I will expand on what someone else mentioned -- asymmetric encryption is
> > not meant for, and has very poor performance for encrypting data, and
> also
> > has a lot of limitations. The correct way to handle this is to create a
> > symmetric key and use that to encrypt the data, then use asymmetric
> > encryption to encrypt on...
2017 Aug 18
1
help with stacked ggplot
Hi,
I am new to R and this is probably a very basic question but I can?t seem to figure out a solution. I am creating a stacked ggplot with the following data and code:
PercentageData.csv looks like this:
decision
treatment
percentage
labtreatment
defect
0
53.49
COMMON
defect
1
78.00
ASYMMETRIC
defect
2
96.67
PRIVATE
coop
0
46.51
COMMON
coop
1
22.00
ASYMMETRIC
coop
2
3.33
PRIVATE
%Load data:
charts.data <- read.csv("PercentageData.csv?)
%create stacked ggplot
p4 <- ggplot() + geom_bar(aes(y = percentage, x = treatment, fill = decision), data = charts.data, stat="identi...
2009 Apr 24
4
Long string in crypting
I use a solution to crypt a string that I found using OpenSSL. But the
crypted string becomes very long, too long for a varchar 255 to hold it.
What can I do to make it shorter? Or should I just use text as column in
the mysql db?
public_key_file = ''lib/public.pem''
public_key = OpenSSL::PKey::RSA.new(File.read(public_key_file))
@encrypted_string =
2006 Jan 04
5
habtm recusive
I have a people table:
CREATE TABLE people (
id int(10) unsigned NOT NULL auto_increment,
first_name varchar(75) default NULL,
middle_name varchar(75) default NULL,
last_name varchar(75) default NULL,
PRIMARY KEY (id)
) ENGINE=MyISAM DEFAULT CHARSET=latin1 AUTO_INCREMENT=1272 ;
and a people_people table:
CREATE TABLE people_people (
person_id int(11) unsigned NOT NULL,
2014 Dec 19
0
Asymmetric encryption for very large tar file
...fectly. I
think openssl installed on the system is capable of doing large file
support. However, when using ?openssl smime?, it is not able to.
Apparently it?s smime method limitations, not the openssl. Other than
smime and enc, what other methods can I use for large file support that
would use the asymmetric public/private keys?
- xinhuan
2007 Dec 05
0
Asymmetrically dependent variables to 2D-map?
Hello,
I'm searching for a method which maps variables of this kind of table, see below, to 2-dimensional space, like in multidimensional scaling. However, this table is asymmetric: for example, variable T1 affects T2 more than T2 affects T1(0.41 vs. 0.21).
> DEPTABLE
T1 T2 T3 T4
T1 0.00 0.41 0.24 1.18
T2 0.21 0.00 0.46 0.12
T3 0.80 0.89 0.00 0.20
T4 0.09 1.04 0.17 0.00
Any suggestions? Something like gplot+mds+weighted arrays?
Atte Tenkanen
University o...
2009 May 17
0
Asymmetric t - copula code in R
Hi R-users,
Where can I find the code for asymmetric t-copula in R?
Thank you for any help given.
[[alternative HTML version deleted]]
2009 May 18
0
asymmetric t-copula in R
Hi R-users,
Where can I find the code for asymmetric t-copula in R?
Thank you for any help given.
[[alternative HTML version deleted]]
2009 May 20
0
Asymmetric t-copula code?
Hi R-users,
Anybody got any idea where can I find the code for asymmetric t-copula?
I found the copula package written by Jun Yan.
Thank you so much for any help given.
[[alternative HTML version deleted]]
2005 Jan 29
1
IAX2 Asymmetric Latency
...When I make a call from home using iaxComm connected to Office Asterisk,
the outgoing latency is about 0.25 sec, which is quite OK. But to incoming
latency begins on 0.5 sec and in a minute it's about 5 seconds (!) and
growing fast.
The thing I really don't understand that the latency is asymmetric and
growing...
I use 9.6kbps GSM and my average pingrate is about 20ms both directions
(2Mbps/0.5Mbps Cable) so I just don't see the reason for such problems...
Any ideas, anybody?
Big TNX in advance...
--ZK
- - -----------------------[ CESKE TELEKOMUNIKACE ]------ - -
Zdik Kudrle...
2014 Dec 17
8
Asymmetric encryption for very large tar file
...key securely.
We can?t leave the un-encrypted symmetric key there on the server but we
have to use the un-encrypted symmetric key for encryption process. Plus
we?ll need to manage the symmetric encryption key, public and private key
pair 3 things securely.
Has anyone had experience on managing the asymmetric encryption for very
large file and what?s the best practice for that?
Thanks.
- xinhuan
2006 Nov 12
2
IAX2 one way audio
Experiencing one way audio using IAX2.
I did see some other posts on this, and see there may be some internal issues with asterisk and one way audio. Can this be a widespread problem? So many seem to be using IAX, I find it puzzling.
Some information points to this being a problem on asymmetrical connections. This is a decidedly asymmetrical connection, with 1.5 Mbs download and 256 kbs, upload. A satellite link, to boot. So, maybe this is a meltdown right from the start? Event the vendor of the IAX service was not too keen.
Oddly, my first few connections worked fine (unexpectedly...
2008 Jul 21
3
Asymmetrical HABTM(?)
What is the best way to set up a relationship between two tables where
table-1 has a one-to-one relationship with table-2 but table-2 has a
one-to-many relationship with table-1?
For example, suppose there is an events application (seminars, forums,
conferences, etc). Each event has only one address but since many
events can occur at the same location throughout the year, a given
address can