Graph - plotting job, Operating System

This exercise uses a graph-plotting program (gnuplot) to convert tabular data into an image. This is a technique that is very widely used to visualize scientific data; with appropriate instructions, gnuplot can produce significantly more complex graphs than almost all of its competitors.

Note that povray and gnuplot have quite substantially different ways of being controlled. The povray executable (from the previous example) has a complex command line interface that has been configured into the Unicore server. By comparison, gnuplot is extremely simple (so much so that it doesn't need explicit support at the server level) but it has to have the name of associated files placed in its control file: this increased coupling tends to make code more fragile.

1.      Save this job definition to a JSON file called gnuplot.u:

{

    Executable: "/bin/sh",

    Arguments: ["control.sh"],

    Imports: [

        {From: "control.sh", To: "control.sh"},

        {From: "data.csv", To: "data.csv"},

    ],

    Exports: [

        {From: "output.png", To: "plot.png"}

    ],

}

Posted Date: 4/2/2013 6:23:24 AM | Location : United States







Related Discussions:- Graph - plotting job, Assignment Help, Ask Question on Graph - plotting job, Get Answer, Expert's Help, Graph - plotting job Discussions

Write discussion on Graph - plotting job
Your posts are moderated
Related Questions
Q. What is the major difficulty that a programmer should overcome in writing an operating system for a real-time environment? Answer: The major difficulty is keeping the oper

What are a safe state and an unsafe state? Answer:  A state is safe if the system can allocate resources to every process in some order and still avoid a deadlock. A system is

Q. Explain about Deadlocks? Deadlocks for (int i = 0; i // first find a thread that can finish for (int j = 0; j if (!finish[j]) { boolean temp = true; for

Explain what ISAM is. Indexed sequential access method. The file is stored in sorted order. ISAM has a master index file, indicating in what part of another index file the key

What are the disadvantages of swapping technique used in pre-3BSD UNIX systems? If there is excessively much memory contention, processes are swapped out until sufficient

To explore the UNIX file system, use basic UNIX commands and use a text editor. Task:   1.      Logon to Linux. 2.      Create a directory "Unix" under your home d

why we say " OS is a resource allocator" and “OS is a control program"?

What are scheduling queues? Since the processes enter the system they are put into job queue. This queue contains all processes in the system. The processes that are exist in m

Safety algorithm : This is to make sure if the system is in safe state or not. It may need an order of m x n2 operation to determine if the state of the system is safe or not.

When do we write a page from physical memory back to the disk? In general, caches have two broad types of writing policies. One approach is a write-through cache. In this case,