Graph - plotting job, Operating System

Assignment Help:

This exercise uses a graph-plotting program (gnuplot) to convert tabular data into an image. This is a technique that is very widely used to visualize scientific data; with appropriate instructions, gnuplot can produce significantly more complex graphs than almost all of its competitors.

Note that povray and gnuplot have quite substantially different ways of being controlled. The povray executable (from the previous example) has a complex command line interface that has been configured into the Unicore server. By comparison, gnuplot is extremely simple (so much so that it doesn't need explicit support at the server level) but it has to have the name of associated files placed in its control file: this increased coupling tends to make code more fragile.

1.      Save this job definition to a JSON file called gnuplot.u:

{

    Executable: "/bin/sh",

    Arguments: ["control.sh"],

    Imports: [

        {From: "control.sh", To: "control.sh"},

        {From: "data.csv", To: "data.csv"},

    ],

    Exports: [

        {From: "output.png", To: "plot.png"}

    ],

}


Related Discussions:- Graph - plotting job

What are placement and replacement algorithms, Placement algorithms :calcu...

Placement algorithms :calculate where in available real-memory to execute a program. Common functions are next-fit, first-fit, and best-fit. Replacement algorithms :are

Explain producer-consumer problem using semaphores, Producer-Consumer Probl...

Producer-Consumer Problem Using Semaphores The Solution to producer-consumer problem use three semaphores namely- full, empty and mutex. The semaphore 'full' is utilized for

Recognition of essential syntactic constructs by reductions, Recognition of...

Recognition of essential syntactic constructs by reductions, this task is carried out by Recognition of essential syntactic constructs by reductions, this task is carried out

Peer to peer network and a client server network, Question : a) Describ...

Question : a) Describe the difference between the authentication of a user account on a peer to peer network and a client server network. b) Compare an end user account with

What is the basic approach of page replacement, What is the basic approach ...

What is the basic approach of page replacement? If no frame is free is available, find one that is not presently being used and free it. A frame can be freed by writing its con

What are the necessary conditions for deadlocks?, What are the necessary co...

What are the necessary conditions for deadlocks? 1. Mutual exclusion :  Only one process at a time is able to use the resource. 2. Hold and wait :  A process should be holdi

Why do systems store the operating system in firm ware, Q. Why do several s...

Q. Why do several systems store the operating system in firm ware and others on disk? Answer: For certain devices such like handheld PDAs and cellular telephones a disk with

Explain relative file organization, Relative file organization A rela...

Relative file organization A relative file is an array of fixed-length slots and the records can be inserted in the first free slot found from the beginning of the file and

What advantages are there to this two-level directory, What advantages are ...

What advantages are there to this two-level directory? Users are isolated from each other. Users have more freedom in choosing file names.

Explain medium term scheduling, Medium term scheduling This is componen...

Medium term scheduling This is component of the swapping function. Usually the swapping in decision is based on the need to manage the degree of multiprogramming. At a system t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd