skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: The absolute path command

Abstract

The ap command traveres all symlinks in a given file, directory, or executable name to identify the final absolute path. It can print just the final path, each intermediate link along with the symlink chan, and the permissions and ownership of each directory component in the final path. It has functionality similar to "which", except that it shows the final path instead of the first path. It is also similar to "pwd", but it can provide the absolute path to a relative directory from the current working directory.

Authors:
Publication Date:
Research Org.:
Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1231575
Report Number(s):
AP COMMAND; 002800WKSTN00
LLNL-CODE-557474
DOE Contract Number:
AC52-07NA27344
Resource Type:
Software
Software Revision:
00
Software Package Number:
002800
Software Package Contents:
Open Source software package available from Lawrence Livermore National Laboratory at the following URL: https://github.com/LLNL/ap
Software CPU:
WKSTN
Open Source:
Yes
Source Code Available:
Yes
Country of Publication:
United States

Citation Formats

Moody, A. The absolute path command. Computer software. https://www.osti.gov//servlets/purl/1231575. Vers. 00. USDOE. 11 May. 2012. Web.
Moody, A. (2012, May 11). The absolute path command (Version 00) [Computer software]. https://www.osti.gov//servlets/purl/1231575.
Moody, A. The absolute path command. Computer software. Version 00. May 11, 2012. https://www.osti.gov//servlets/purl/1231575.
@misc{osti_1231575,
title = {The absolute path command, Version 00},
author = {Moody, A.},
abstractNote = {The ap command traveres all symlinks in a given file, directory, or executable name to identify the final absolute path. It can print just the final path, each intermediate link along with the symlink chan, and the permissions and ownership of each directory component in the final path. It has functionality similar to "which", except that it shows the final path instead of the first path. It is also similar to "pwd", but it can provide the absolute path to a relative directory from the current working directory.},
url = {https://www.osti.gov//servlets/purl/1231575},
doi = {},
year = {Fri May 11 00:00:00 EDT 2012},
month = {Fri May 11 00:00:00 EDT 2012},
note =
}

Software:
To order this software, request consultation services, or receive further information, please fill out the following request.

Save / Share:
  • Virtually all inelastic helium atom scattering experiments utilize time-of-flight (TOF) analysis to energy analyze the scattered beam. To date, the demands upon the accuracy of these TOF measurements have not been particularly great (typically a few percent), and rather rudimentary calibration techniques have sufficed. For certain experiments, e.g., for time-resolved measurements of specular scattering to determine surface-bound states of helium or to observe surface-step interference, this is no longer the case. We describe an in situ calibration technique based upon a variation of the TOF flight path that allows us to calibrate our path length and time origin to withinmore » a few millimeters and microseconds, respectively (<2 x 10/sup -3/). A comparison with ''zero flight time'' laser timing measurements shows that finite drawout/transit times through the beam detector can introduce nonnegligible systematic errors into the laser calibration technique, even in the present favorable instance (light beam mass, drawout along the beam axis). We demonstrate the utility of surface diffraction as either a consistency check or to accurately determine unknown reciprocal lattice vectors.« less
  • This research project demonstrated the effectiveness of using evolutionary software techniques in the development of path-planning algorithms and control programs for mobile vehicles in radioactive environments. The goal was to take maximum advantage of the programmer's intelligence by tasking the programmer with encoding the measures of success for a path-planning algorithm, rather than developing the path-planning algorithms themselves. Evolutionary software development techniques could then be used to develop algorithms most suitable to the particular environments of interest. The measures of path-planning success were encoded in the form of a fitness function for an evolutionary software development engine. The task formore » the evolutionary software development engine was to evaluate the performance of individual algorithms, select the best performers for the population based on the fitness function, and breed them to evolve the next generation of algorithms. The process continued for a set number of generations or until the algorithm converged to an optimal solution. The task environment was the navigation of a rover from an initial location to a goal, then to a processing point, in an environment containing physical and radioactive obstacles. Genetic algorithms were developed for a variety of environmental configurations. Algorithms were simple and non-robust strings of behaviors, but they could be evolved to be nearly optimal for a given environment. In addition, a genetic program was evolved in the form of a control algorithm that operates at every motion of the robot. Programs were more complex than algorithms and less optimal in a given environment. However, after training in a variety of different environments, they were more robust and could perform acceptably in environments they were not trained in. This paper describes the evolutionary software development engine and the performance of algorithms and programs evolved by it for the chosen task.« less
  • The goal of this work is to extend the use of existing path expression theory and methodologies to ensure that critical software event sequences are maintained even in the face of malevolent attacks and harsh or unstable operating environments. This will be accomplished by providing dynamic fault management measures directly to the software developer and to their varied development environments. This paper discusses the perceived problems, a brief overview of path expressions, and the author`s proposed extension areas. The authors discuss how the traditional path expression usage and implementation differs from the intended usage and implementation.
  • POV-Ray Ricochet Tracker is a freeware computer code developed to analyze high-speed fragment ricochet trajectory paths in complex 3-D areas such as explosives tiring chambers, facility equipment rooms, or shipboard Command and Control Centers. The code analyzes as many as millions of individual fragment trajectory paths in three dimensions and tracks these trajectory paths for up to four bounces through the three-dimensional model. It allows determination of the probabilities of hitting any designated areas or objects in the model. It creates renderings of any ricochet flight paths of interest in photo realistic renderings of the 3-D model. POV-Ray Ricochet Trackermore » is a customized version of the Persistence of Vision{trademark} Ray-Tracer (POV-Ray{trademark}) version 3.02 code for the Macintosh{trademark} Operating System (MacOS{trademark}). POV-Ray is a third generation graphics engine that creates three-dimensional, very high quality (photo-realistic) images with realistic reflections, shading, textures, perspective, and other effects using a rendering technique called ray-tracing. It reads a text tile that describes the objects, lighting, and camera location in a scene and generates an image of that scene from the viewpoint of the camera. More information about POV-Ray, including the executable and source code, may be found at http://www.povray.org. The customized code (POV-Ray Shrapnel Tracker, V3.02-Custom Build 2) generates individual fragment trajectory paths at any desired angle intervals in three dimensions. The code tracks these trajectory paths through any complex three-dimensional space, and outputs detailed data for each ray as requested by the user. The output may include trajectory source location, initial direction of each trajectory, vector data for each bounce point, and any impacts with designated model target surfaces during any trajectory segment (direct path or reflected paths). This allows determination of the three-dimensional trajectory of each simulated particle, as well as overall and individual fragment probabilities of impact with any designated target(s) in the three-dimensional model. It also allows identification of any areas of particular concern due to grouping (in discrete areas) of fragment paths that lead to hits on the target areas of concern.« less

To initiate an order for this software, request consultation services, or receive further information, fill out the request form below. You may also reach us by email at: .

OSTI staff will begin to process an order for scientific and technical software once the payment and signed site license agreement are received. If the forms are not in order, OSTI will contact you. No further action will be taken until all required information and/or payment is received. Orders are usually processed within three to five business days.

Software Request

(required)
(required)
(required)
(required)
(required)
(required)
(required)
(required)