WorldWideScience

Sample records for personal computers

  1. Selecting Personal Computers.

    Science.gov (United States)

    Djang, Philipp A.

    1993-01-01

    Describes a Multiple Criteria Decision Analysis Approach for the selection of personal computers that combines the capabilities of Analytic Hierarchy Process and Integer Goal Programing. An example of how decision makers can use this approach to determine what kind of personal computers and how many of each type to purchase is given. (nine…

  2. Piping stress analysis with personal computers

    International Nuclear Information System (INIS)

    Revesz, Z.

    1987-01-01

    The growing market of the personal computers is providing an increasing number of professionals with unprecedented and surprisingly inexpensive computing capacity, which if using with powerful software, can enhance immensely the engineers capabilities. This paper focuses on the possibilities which opened in piping stress analysis by the widespread distribution of personal computers, on the necessary changes in the software and on the limitations of using personal computers for engineering design and analysis. Reliability and quality assurance aspects of using personal computers for nuclear applications are also mentioned. The paper resumes with personal views of the author and experiences gained during interactive graphic piping software development for personal computers. (orig./GL)

  3. Personal Computers.

    Science.gov (United States)

    Toong, Hoo-min D.; Gupta, Amar

    1982-01-01

    Describes the hardware, software, applications, and current proliferation of personal computers (microcomputers). Includes discussions of microprocessors, memory, output (including printers), application programs, the microcomputer industry, and major microcomputer manufacturers (Apple, Radio Shack, Commodore, and IBM). (JN)

  4. Processing computed tomography images by using personal computer

    International Nuclear Information System (INIS)

    Seto, Kazuhiko; Fujishiro, Kazuo; Seki, Hirofumi; Yamamoto, Tetsuo.

    1994-01-01

    Processing of CT images was attempted by using a popular personal computer. The program for image-processing was made with C compiler. The original images, acquired with CT scanner (TCT-60A, Toshiba), were transferred to the computer by 8-inch flexible diskette. Many fundamental image-processing, such as displaying image to the monitor, calculating CT value and drawing the profile curve. The result showed that a popular personal computer had ability to process CT images. It seemed that 8-inch flexible diskette was still useful medium of transferring image data. (author)

  5. PERSONALITY AND COMPUTER ADDICTION

    Directory of Open Access Journals (Sweden)

    Grażyna Jurczyńska

    2010-12-01

    Full Text Available Background: The aim of this work is to prove the relation between the personality traits and computer addicting. The research was carried out from 2006 to 2008 among the students of High School of Information Technology in Katowice. Material and methods: Research methods: Scale of Emotional Intelligens at Work, Social Competences Questionnaire, State-Trait Anxiety Inventory – STAI, Kimberly S. Young Test, Questionnaire to Assess the Level of Crises of Values, Directivity Scale and a questionnaire of 23 questions prepared for the research purposes. Results: 12.70% of the examined population met the criteria for computer addiction. In the own view, 76.34% considered themselves addicted to this medium. Conclusions: Personality traits such as emotional intelligence at work, inclination to authoritative behaviors as well as the value system may have influence on the addicting to a computer. No such relation was proven with reference to self – efficacy and anxious personality.

  6. Know Your Personal Computer Introduction to Computers

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 1; Issue 1. Know Your Personal Computer Introduction to Computers. Siddhartha Kumar Ghoshal. Series Article Volume 1 Issue 1 January 1996 pp 48-55. Fulltext. Click here to view fulltext PDF. Permanent link:

  7. Personalized Empathic Computing (PEC)

    NARCIS (Netherlands)

    van Beusekom, W.; van den Broek, Egon; van der Heijden, M.; Janssen, J.H.; Spaak, E.

    2006-01-01

    Until a decade ago, computers were only used by experts, for professional purposes solely. Nowadays, the personal computer (PC) is standard equipment in most western housekeepings and is used to gather information, play games, communicate, etc. In parallel, users' expectations increase and,

  8. Sensitivity Analysis of Personal Exposure Assessment Using a Computer Simulated Person

    DEFF Research Database (Denmark)

    Brohus, Henrik; Jensen, H. K.

    2009-01-01

    The paper considers uncertainties related to personal exposure assessment using a computer simulated person. CFD is used to simulate a uniform flow field around a human being to determine the personal exposure to a contaminant source. For various vertical locations of a point contaminant source...... three additional factors are varied, namely the velocity, details of the computer simulated person, and the CFD model of the wind channel. The personal exposure is found to be highly dependent on the relative source location. Variation in the range of two orders of magnitude is found. The exposure...

  9. CAD on personal computers

    International Nuclear Information System (INIS)

    Lee, Seong U; Cho, Cheol Ho; Ko, Il Du

    1990-02-01

    This book contains four studies of CAD on personal computers. The first thing is computer graphics in computer-aided design by Seong U Lee. The second thing is graphics primer and programming with Fortran by Seong U Lee. The third thing is application of Auto cad by Il Do Ko. The last thing is application of CAD in building construction design by Cheol Ho Cho.

  10. Personal computers in high energy physics

    International Nuclear Information System (INIS)

    Quarrie, D.R.

    1987-01-01

    The role of personal computers within HEP is expanding as their capabilities increase and their cost decreases. Already they offer greater flexibility than many low-cost graphics terminals for a comparable cost and in addition they can significantly increase the productivity of physicists and programmers. This talk will discuss existing uses for personal computers and explore possible future directions for their integration into the overall computing environment. (orig.)

  11. Personal computers in accelerator control

    International Nuclear Information System (INIS)

    Anderssen, P.S.

    1988-01-01

    The advent of the personal computer has created a popular movement which has also made a strong impact on science and engineering. Flexible software environments combined with good computational performance and large storage capacities are becoming available at steadily decreasing costs. Of equal importance, however, is the quality of the user interface offered on many of these products. Graphics and screen interaction is available in ways that were only possible on specialized systems before. Accelerator engineers were quick to pick up the new technology. The first applications were probably for controllers and data gatherers for beam measurement equipment. Others followed, and today it is conceivable to make personal computer a standard component of an accelerator control system. This paper reviews the experience gained at CERN so far and describes the approach taken in the design of the common control center for the SPS and the future LEP accelerators. The design goal has been to be able to integrate personal computers into the accelerator control system and to build the operator's workplace around it. (orig.)

  12. Control by personal computer and Interface 1

    International Nuclear Information System (INIS)

    Kim, Eung Mug; Park, Sun Ho

    1989-03-01

    This book consists of three chapters. The first chapter deals with basic knowledge of micro computer control which are computer system, micro computer system, control of the micro computer and control system for calculator. The second chapter describes Interface about basic knowledge such as 8255 parallel interface, 6821 parallel interface, parallel interface of personal computer, reading BCD code in parallel interface, IEEE-488 interface, RS-232C interface and transmit data in personal computer and a measuring instrument. The third chapter includes control experiment by micro computer, experiment by eight bit computer and control experiment by machine code and BASIC.

  13. The use of personal computers in reactor physics

    International Nuclear Information System (INIS)

    Cullen, D.E.

    1988-01-01

    This paper points out that personal computers are now powerful enough (in terms of core size and speed) to allow them to be used for serious reactor physics applications. In addition the low cost of personal computers means that even small institutes can now have access to a significant amount of computer power. At the present time distribution centers, such as RSIC, are beginning to distribute reactor physics codes for use on personal computers; hopefully in the near future more and more of these codes will become available through distribution centers, such as RSIC

  14. IUE Data Analysis Software for Personal Computers

    Science.gov (United States)

    Thompson, R.; Caplinger, J.; Taylor, L.; Lawton , P.

    1996-01-01

    This report summarizes the work performed for the program titled, "IUE Data Analysis Software for Personal Computers" awarded under Astrophysics Data Program NRA 92-OSSA-15. The work performed was completed over a 2-year period starting in April 1994. As a result of the project, 450 IDL routines and eight database tables are now available for distribution for Power Macintosh computers and Personal Computers running Windows 3.1.

  15. Know Your Personal Computer

    Indian Academy of Sciences (India)

    easily developed. A device that does not plug ... them and this is what we will study in this article and the ones to follow. Personal computers .... General, Control Data, Texas Instruments and Cray Research attempted downsizing their popular ...

  16. Know Your Personal Computer

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 1; Issue 11. Know Your Personal Computer 5. The CPU Base Instruction Set and Assembly Language Programming. Siddhartha Kumar Ghoshal ... Supercomputer Education and Research Centre, Indian Institute of Science, Bangalore 560 012, India ...

  17. Know Your Personal Computer

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 11. Know Your Personal Computer - You and Your PC. Siddhartha Kumar Ghoshal. Series Article Volume 2 Issue 11 November 1997 pp 14-22. Fulltext. Click here to view fulltext PDF. Permanent link:

  18. Know Your Personal Computer

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 9. Know Your Personal Computer High-Level Operating Systems. Siddhartha Kumar Ghoshal. Series Article Volume 2 Issue 9 September 1997 pp 11-17. Fulltext. Click here to view fulltext PDF. Permanent link:

  19. ASTEC: Controls analysis for personal computers

    Science.gov (United States)

    Downing, John P.; Bauer, Frank H.; Thorpe, Christopher J.

    1989-01-01

    The ASTEC (Analysis and Simulation Tools for Engineering Controls) software is under development at Goddard Space Flight Center (GSFC). The design goal is to provide a wide selection of controls analysis tools at the personal computer level, as well as the capability to upload compute-intensive jobs to a mainframe or supercomputer. The project is a follow-on to the INCA (INteractive Controls Analysis) program that has been developed at GSFC over the past five years. While ASTEC makes use of the algorithms and expertise developed for the INCA program, the user interface was redesigned to take advantage of the capabilities of the personal computer. The design philosophy and the current capabilities of the ASTEC software are described.

  20. RI management by personal computer

    International Nuclear Information System (INIS)

    Ono, Isamu; Hiyoshi, Katsunori; Ono, Kazuhiko; Morimitsu, Wataru

    1983-01-01

    For RI-handling facilities up to medium scale, it has been studied whether a personal computer is applicable to the practical management of radioisotopes. In the present system, the number of writing in mini floppy disks is 1280 articles per diskette, which is the sufficient capacity for a storage medium for one year in variety of books. The correction of radioactivity decay as well as various totalizations can be made easily, so that the state of RI storage and use for the whole RI-handling facility can be grasped. Further, by the improvement of the output formats, the transfer to the books as obligated to write is possible. From the above reason, a personal computer is practically applicable with the management system and also leads to labor saving in RI management personnel. (Mori, K.)

  1. Computer-based personality judgments are more accurate than those made by humans.

    Science.gov (United States)

    Youyou, Wu; Kosinski, Michal; Stillwell, David

    2015-01-27

    Judging others' personalities is an essential skill in successful social living, as personality is a key driver behind people's interactions, behaviors, and emotions. Although accurate personality judgments stem from social-cognitive skills, developments in machine learning show that computer models can also make valid judgments. This study compares the accuracy of human and computer-based personality judgments, using a sample of 86,220 volunteers who completed a 100-item personality questionnaire. We show that (i) computer predictions based on a generic digital footprint (Facebook Likes) are more accurate (r = 0.56) than those made by the participants' Facebook friends using a personality questionnaire (r = 0.49); (ii) computer models show higher interjudge agreement; and (iii) computer personality judgments have higher external validity when predicting life outcomes such as substance use, political attitudes, and physical health; for some outcomes, they even outperform the self-rated personality scores. Computers outpacing humans in personality judgment presents significant opportunities and challenges in the areas of psychological assessment, marketing, and privacy.

  2. Computer-based personality judgments are more accurate than those made by humans

    Science.gov (United States)

    Youyou, Wu; Kosinski, Michal; Stillwell, David

    2015-01-01

    Judging others’ personalities is an essential skill in successful social living, as personality is a key driver behind people’s interactions, behaviors, and emotions. Although accurate personality judgments stem from social-cognitive skills, developments in machine learning show that computer models can also make valid judgments. This study compares the accuracy of human and computer-based personality judgments, using a sample of 86,220 volunteers who completed a 100-item personality questionnaire. We show that (i) computer predictions based on a generic digital footprint (Facebook Likes) are more accurate (r = 0.56) than those made by the participants’ Facebook friends using a personality questionnaire (r = 0.49); (ii) computer models show higher interjudge agreement; and (iii) computer personality judgments have higher external validity when predicting life outcomes such as substance use, political attitudes, and physical health; for some outcomes, they even outperform the self-rated personality scores. Computers outpacing humans in personality judgment presents significant opportunities and challenges in the areas of psychological assessment, marketing, and privacy. PMID:25583507

  3. Archetype-Based Modeling of Persona for Comprehensive Personality Computing from Personal Big Data

    Science.gov (United States)

    Ma, Jianhua

    2018-01-01

    A model describing the wide variety of human behaviours called personality, is becoming increasingly popular among researchers due to the widespread availability of personal big data generated from the use of prevalent digital devices, e.g., smartphones and wearables. Such an approach can be used to model an individual and even digitally clone a person, e.g., a Cyber-I (cyber individual). This work is aimed at establishing a unique and comprehensive description for an individual to mesh with various personalized services and applications. An extensive research literature on or related to psychological modelling exists, i.e., into automatic personality computing. However, the integrity and accuracy of the results from current automatic personality computing is insufficient for the elaborate modeling in Cyber-I due to an insufficient number of data sources. To reach a comprehensive psychological description of a person, it is critical to bring in heterogeneous data sources that could provide plenty of personal data, i.e., the physiological data, and the Internet data. In addition, instead of calculating personality traits from personal data directly, an approach to a personality model derived from the theories of Carl Gustav Jung is used to measure a human subject’s persona. Therefore, this research is focused on designing an archetype-based modeling of persona covering an individual’s facets in different situations to approach a comprehensive personality model. Using personal big data to measure a specific persona in a certain scenario, our research is designed to ensure the accuracy and integrity of the generated personality model. PMID:29495343

  4. Archetype-Based Modeling of Persona for Comprehensive Personality Computing from Personal Big Data

    Directory of Open Access Journals (Sweden)

    Ao Guo

    2018-02-01

    Full Text Available A model describing the wide variety of human behaviours called personality, is becoming increasingly popular among researchers due to the widespread availability of personal big data generated from the use of prevalent digital devices, e.g., smartphones and wearables. Such an approach can be used to model an individual and even digitally clone a person, e.g., a Cyber-I (cyber individual. This work is aimed at establishing a unique and comprehensive description for an individual to mesh with various personalized services and applications. An extensive research literature on or related to psychological modelling exists, i.e., into automatic personality computing. However, the integrity and accuracy of the results from current automatic personality computing is insufficient for the elaborate modeling in Cyber-I due to an insufficient number of data sources. To reach a comprehensive psychological description of a person, it is critical to bring in heterogeneous data sources that could provide plenty of personal data, i.e., the physiological data, and the Internet data. In addition, instead of calculating personality traits from personal data directly, an approach to a personality model derived from the theories of Carl Gustav Jung is used to measure a human subject’s persona. Therefore, this research is focused on designing an archetype-based modeling of persona covering an individual’s facets in different situations to approach a comprehensive personality model. Using personal big data to measure a specific persona in a certain scenario, our research is designed to ensure the accuracy and integrity of the generated personality model.

  5. Archetype-Based Modeling of Persona for Comprehensive Personality Computing from Personal Big Data.

    Science.gov (United States)

    Guo, Ao; Ma, Jianhua

    2018-02-25

    A model describing the wide variety of human behaviours called personality, is becoming increasingly popular among researchers due to the widespread availability of personal big data generated from the use of prevalent digital devices, e.g., smartphones and wearables. Such an approach can be used to model an individual and even digitally clone a person, e.g., a Cyber-I (cyber individual). This work is aimed at establishing a unique and comprehensive description for an individual to mesh with various personalized services and applications. An extensive research literature on or related to psychological modelling exists, i.e., into automatic personality computing. However, the integrity and accuracy of the results from current automatic personality computing is insufficient for the elaborate modeling in Cyber-I due to an insufficient number of data sources. To reach a comprehensive psychological description of a person, it is critical to bring in heterogeneous data sources that could provide plenty of personal data, i.e., the physiological data, and the Internet data. In addition, instead of calculating personality traits from personal data directly, an approach to a personality model derived from the theories of Carl Gustav Jung is used to measure a human subject's persona. Therefore, this research is focused on designing an archetype-based modeling of persona covering an individual's facets in different situations to approach a comprehensive personality model. Using personal big data to measure a specific persona in a certain scenario, our research is designed to ensure the accuracy and integrity of the generated personality model.

  6. The algebraic manipulation program DIRAC on IBM personal computers

    International Nuclear Information System (INIS)

    Grozin, A.G.; Perlt, H.

    1989-01-01

    The version DIRAC (2.2) for IBM compatible personal computers is described. It is designed to manipulate algebraically with polynomials and tensors. After a short introduction concerning implementation and usage on personal computers an example program is given. It contains a detailed user's guide to DIRAC (2.2) and, additionally some useful applications. 4 refs

  7. The Relationship between Personality and Computer Deviance

    Science.gov (United States)

    Burns, Cardra E.

    2013-01-01

    Computer deviance by employees, defined as malicious and nonmalicious computer use behaviors, has contributed to billions of dollars of monetary and productivity losses for public and private sector organizations. The purpose of this correlational study was to examine the relationship between personality characteristics and employees' computer…

  8. Computer Activities for Persons With Dementia.

    Science.gov (United States)

    Tak, Sunghee H; Zhang, Hongmei; Patel, Hetal; Hong, Song Hee

    2015-06-01

    The study examined participant's experience and individual characteristics during a 7-week computer activity program for persons with dementia. The descriptive study with mixed methods design collected 612 observational logs of computer sessions from 27 study participants, including individual interviews before and after the program. Quantitative data analysis included descriptive statistics, correlational coefficients, t-test, and chi-square. Content analysis was used to analyze qualitative data. Each participant averaged 23 sessions and 591min for 7 weeks. Computer activities included slide shows with music, games, internet use, and emailing. On average, they had a high score of intensity in engagement per session. Women attended significantly more sessions than men. Higher education level was associated with a higher number of different activities used per session and more time spent on online games. Older participants felt more tired. Feeling tired was significantly correlated with a higher number of weeks with only one session attendance per week. More anticholinergic medications taken by participants were significantly associated with a higher percentage of sessions with disengagement. The findings were significant at p < .05. Qualitative content analysis indicated tailoring computer activities appropriate to individual's needs and functioning is critical. All participants needed technical assistance. A framework for tailoring computer activities may provide guidance on developing and maintaining treatment fidelity of tailored computer activity interventions among persons with dementia. Practice guidelines and education protocols may assist caregivers and service providers to integrate computer activities into homes and aging services settings. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  9. Systems for neutronic, thermohydraulic and shielding calculation in personal computers

    International Nuclear Information System (INIS)

    Villarino, E.A.; Abbate, P.; Lovotti, O.; Santini, M.

    1990-01-01

    The MTR-PC (Materials Testing Reactors-Personal Computers) system has been developed by the Nuclear Engineering Division of INVAP S.E. with the aim of providing working conditions integrated with personal computers for design and neutronic, thermohydraulic and shielding analysis for reactors employing plate type fuel. (Author) [es

  10. A personal computer-based nuclear magnetic resonance spectrometer

    Science.gov (United States)

    Job, Constantin; Pearson, Robert M.; Brown, Michael F.

    1994-11-01

    Nuclear magnetic resonance (NMR) spectroscopy using personal computer-based hardware has the potential of enabling the application of NMR methods to fields where conventional state of the art equipment is either impractical or too costly. With such a strategy for data acquisition and processing, disciplines including civil engineering, agriculture, geology, archaeology, and others have the possibility of utilizing magnetic resonance techniques within the laboratory or conducting applications directly in the field. Another aspect is the possibility of utilizing existing NMR magnets which may be in good condition but unused because of outdated or nonrepairable electronics. Moreover, NMR applications based on personal computer technology may open up teaching possibilities at the college or even secondary school level. The goal of developing such a personal computer (PC)-based NMR standard is facilitated by existing technologies including logic cell arrays, direct digital frequency synthesis, use of PC-based electrical engineering software tools to fabricate electronic circuits, and the use of permanent magnets based on neodymium-iron-boron alloy. Utilizing such an approach, we have been able to place essentially an entire NMR spectrometer console on two printed circuit boards, with the exception of the receiver and radio frequency power amplifier. Future upgrades to include the deuterium lock and the decoupler unit are readily envisioned. The continued development of such PC-based NMR spectrometers is expected to benefit from the fast growing, practical, and low cost personal computer market.

  11. Personal computer as a part of radiometric gauges

    International Nuclear Information System (INIS)

    Machaj, B.

    1992-01-01

    Following the world tendency in the application of microcomputers in measuring instrumentation, standard personal computer, compatible with IBM PC/XT, was employed in the isotope gauges developed lately in the Institute. The are: beta backscatter coating thickness gauge, X-ray fluorescence multilayer coating thickness gauge with X-ray tube as radiation source, and automatic airborne dust pollution gauge. A simple interface containing: address decoder, programmable pulse counter, some buffers and latches was sufficient to connect the computer to the measuring head of the gauges. Thanks to the possibility of programming in higher level language (turbo Pascal), the gauges were developed in much shorter time than required for classical electronics. The experience gained during development of the gauges shows, that even in case of a simple instrument such as the beta backscatter coating thickness gauge, it is more economical to employ ready-made personal computer than to elaborate specific electronics for it, unless the gauge is produced in large numbers. The use of personal computer is particularly advantageous, when processing of the signal or control of the measuring cycle is more sophisticated, as in the case of the two other gauges. Block diagrams of the gauges and their interfaces are presented in the paper. In case of the airborne dust pollution gauge, flow chart of the computer program is also given. (author). 3 refs, 4 figs

  12. Some neutronics and thermal-hydraulics codes for reactor analysis using personal computers

    International Nuclear Information System (INIS)

    Woodruff, W.L.

    1990-01-01

    Some neutronics and thermal-hydraulics codes formerly available only for main frame computers may now be run on personal computers. Brief descriptions of the codes are provided. Running times for some of the codes are compared for an assortment of personal and main frame computers. With some limitations in detail, personal computer versions of the codes can be used to solve many problems of interest in reactor analyses at very modest costs. 11 refs., 4 tabs

  13. X-ray spectrometer instrumentation with a personal computer

    International Nuclear Information System (INIS)

    Skaarup, P.; Vogeley, E.

    1989-01-01

    A description is given of an instrumentation for control of an X-ray spectrometer used in solid state physics experiments. The instrumentation includes a personal computer (PC) and a European Computer Bus (ECB) interface system. Details are given of the operating software. (author)

  14. Fab the coming revolution on your desktop : from personal computers to personal fabrication

    CERN Document Server

    Gershenfeld, Neil

    2005-01-01

    What if you could someday put the manufacturing power of an automobile plant on your desktop? According to Neil Gershenfeld, the renowned MIT scientist and inventor, the next big thing is personal fabrication-the ability to design and produce your own products, in your own home, with a machine that combines consumer electronics and industrial tools. Personal fabricators are about to revolutionize the world just as personal computers did a generation ago, and Fab shows us how.

  15. Application of ubiquitous computing in personal health monitoring systems.

    Science.gov (United States)

    Kunze, C; Grossmann, U; Stork, W; Müller-Glaser, K D

    2002-01-01

    A possibility to significantly reduce the costs of public health systems is to increasingly use information technology. The Laboratory for Information Processing Technology (ITIV) at the University of Karlsruhe is developing a personal health monitoring system, which should improve health care and at the same time reduce costs by combining micro-technological smart sensors with personalized, mobile computing systems. In this paper we present how ubiquitous computing theory can be applied in the health-care domain.

  16. Computer Self-Efficacy, Computer Anxiety, Performance and Personal Outcomes of Turkish Physical Education Teachers

    Science.gov (United States)

    Aktag, Isil

    2015-01-01

    The purpose of this study is to determine the computer self-efficacy, performance outcome, personal outcome, and affect and anxiety level of physical education teachers. Influence of teaching experience, computer usage and participation of seminars or in-service programs on computer self-efficacy level were determined. The subjects of this study…

  17. Data entry system for INIS input using a personal computer

    International Nuclear Information System (INIS)

    Ishikawa, Masashi

    1990-01-01

    Input preparation for the INIS (International Nuclear Information System) has been performed by Japan Atomic Energy Research Institute since 1970. Instead of the input data preparation done by worksheets make out with the typewriters, new method with which data can be directly inputted into a diskette using personal computers is introduced. According to the popularization of personal computers and word processors, this system is easily applied to other system, so the outline and the future development on it are described. A shortcoming of this system is that spell-checking and data entry using authority files are hardly performed because of the limitation of hardware resources, and that data code conversion is needed because applied code systems between personal computer and main frame computer are quite different from each other. On the other hand, improving the timelyness of data entry is expected without duplication of keying. (author)

  18. XCOM: Photon cross sections on a personal computer

    International Nuclear Information System (INIS)

    Berger, M.J.; Hubbell, J.H.

    1987-07-01

    A computer program and data base are presented which can be used to calculate, with a personal computer, photon cross sections for scattering, photoelectric absorption and pair production, as well as total attenuation coefficients, in any element, compound or mixture, at energies from 1 keV to 100 GeV

  19. Chemical emission rates from personal computers

    DEFF Research Database (Denmark)

    Nakagawa, T.; Wargocki, Pawel; Tanabe, S.

    2003-01-01

    Chemical emission measurements from different brands of personal computers (PCs) were conducted in a 1 m3 glass chamber. Eight PCs were tested individually. Each consisted of the same brand of PC tower and one of the 4 different brands of PC monitors. Within each brand both cathode-ray tube (CRT...

  20. Personal computer control system for small size tandem accelerator

    Energy Technology Data Exchange (ETDEWEB)

    Takayama, Hiroshi; Kawano, Kazuhiro; Shinozaki, Masataka [Nissin - High Voltage Co. Ltd., Kyoto (Japan)

    1996-12-01

    As the analysis apparatus using tandem accelerator has a lot of control parameter, numbers of control parts set on control panel are so many to make the panel more complex and its operativity worse. In order to improve these faults, development and design of a control system using personal computer for the control panel mainly constituted by conventional hardware parts were tried. Their predominant characteristics are shown as follows: (1) To make the control panel construction simpler and more compact, because the hardware device on the panel surface becomes the smallest limit as required by using a personal computer for man-machine interface. (2) To make control speed more rapid, because sequence control is closed within each block by driving accelerator system to each block and installing local station of the sequencer network at each block. (3) To make expandability larger, because of few improvement of the present hardware by interrupting the sequencer local station into the net and correcting image of the computer when increasing a new beamline. And, (4) to make control system cheaper, because of cheaper investment and easier programming by using the personal computer. (G.K.)

  1. Controlling Laboratory Processes From A Personal Computer

    Science.gov (United States)

    Will, H.; Mackin, M. A.

    1991-01-01

    Computer program provides natural-language process control from IBM PC or compatible computer. Sets up process-control system that either runs without operator or run by workers who have limited programming skills. Includes three smaller programs. Two of them, written in FORTRAN 77, record data and control research processes. Third program, written in Pascal, generates FORTRAN subroutines used by other two programs to identify user commands with device-driving routines written by user. Also includes set of input data allowing user to define user commands to be executed by computer. Requires personal computer operating under MS-DOS with suitable hardware interfaces to all controlled devices. Also requires FORTRAN 77 compiler and device drivers written by user.

  2. [Use of personal computers by diplomats of anesthesiology in Japan].

    Science.gov (United States)

    Yamamoto, K; Ohmura, S; Tsubokawa, T; Kita, M; Kushida, Y; Kobayashi, T

    1999-04-01

    Use of personal computers by diplomats of the Japanese Board of Anesthesiology working in Japanese university hospitals was investigated. Unsigned questionnaires were returned from 232 diplomats of 18 anesthesia departments. The age of responders ranged from twenties to sixties. Personal computer systems are used by 223 diplomats (96.1%), while nine (3.9%) do not use them. The computer systems used are: Apple Macintosh 77%, IBM compatible PC 21% and UNIX 2%. Although 197 diplomats have e-mail addresses, only 162 of them actually send and receive e-mails. Diplomats in fifties use e-mail most actively and those in sixties come second.

  3. Personalization and perceived personal relevance in computer-tailored persuasion in smoking cessation.

    Science.gov (United States)

    Dijkstra, Arie; Ballast, Karien

    2012-02-01

    In most computer-tailored interventions, the recipient's name is used to personalize the information. This is done to increase the process of persuasion but few empirical data exist that support this notion. An experimental laboratory study was conducted to test the effects of mentioning the participants name and to study whether it was related to the depth of processing in a 2 (personalization/standard) × 2 (weak/strong arguments) design. Over 120 student smokers were randomly assigned to one of the four experimental conditions in which they read smoking cessation messages offering (pre-tested) strong or weak arguments. Personalization was applied by mentioning the recipient's first name three times in the text. The intention to quit smoking was the dependent variable. Personalization increased persuasion when perceived personal relevance was high, but it decreased persuasion when perceived personal relevance was low. The effects on persuasion were only present in the case of strong arguments. Personalization is not always effective, and it may even lead to less persuasion. Therefore, this often used way to tailor messages must be applied with care. ©2011 The British Psychological Society.

  4. Transforming creativity: Personalized manufacturing meets embodied computing

    Directory of Open Access Journals (Sweden)

    Alan B. Craig

    2012-06-01

    Full Text Available This paper discusses aspects of a collaborative investigation of embodied computing and personal manufacturing. We describe the NeuroMaker 1.0, an artwork that playfully implements the concept of “translating of the designer’s ideas into a product”. Visitors to the installation were invited to use their own EEG to fabricate personalized physical objects. While primarily intended to provoke thought about the process of creativity, we also demonstrated that, with the right team, radical new interfaces are well within the reach.

  5. A pilot study of change in cerebral activity during personality rating by questionnaire and personal computer.

    Science.gov (United States)

    Sato, Emi; Matsuda, Kouhei

    2018-06-11

    The purpose of this study was to examine cerebral blood flow in the frontal cortex area during personality self-rating tasks. Our two hypotheses were (1) cerebral blood flow varies based on personality rating condition and (2) cerebral blood flow varies based on the personality traits. This experiment measured cerebral blood flow under 3 personal computer rating conditions and 2 questionnaire conditions. Comparing the rating conditions, the results of the t-test indicated that cerebral blood flow was higher in the questionnaire condition than it was in the personal computer condition. With respect to the Big Five, the result of the correlation coefficient, that is, cerebral blood flow during a personality rating task, changed according to the trait for agreeableness. The results of the analysis of the 5-cluster on individual differences indicated that certain personality traits were related to the factors that increased or decreased cerebral blood flow. An analysis of variance indicated that openness to experience and Behavioural Activation System-drive was significant given that participants with high intellectual curiosity were motivated in this experiment, thus, their cerebral blood flow may have increased. The significance of this experiment was that by employing certain performance measures we could examine differences in physical changes based on personality traits. © 2018 International Union of Psychological Science.

  6. The Influence of Personal Characteristics, Interaction: (Computer/Individual), Computer Self-efficacy, Personal Innovativeness in Information Technology to Computer Anxiety in use of Mind your Own Business Accounting Software

    OpenAIRE

    Mayasari, Mega; ., Gudono

    2015-01-01

    The purpose of this study was to identify the factors that cause computer anxiety in the use of Mind Your Own Business (MYOB) accounting software, i.e., to assess if there are any influence of age, gender, amount of training, ownership (usage of accounting software on a regular basis), computer self-efficacy, personal innovativeness in Information Technology (IT) to computer anxiety. The study also examined whether there is a relationship trait anxiety and negative affect to computer self-eff...

  7. MULTI - multifunctional interface of the IBM XT and AT type personal computers

    International Nuclear Information System (INIS)

    Gross, T.; Kalavski, D.; Rubin, D.; Tulaev, A.B.; Tumanov, A.V.

    1988-01-01

    MULTI multifunctional interface which enables to solve problems of personal computer connestion with physical equipment without application of intermediate buses is described. Parallel 32-digit bidirectional 1/10 register and buffered bus of personal computer represent MULTI base. Ways of MULTI application are described

  8. [Three dimensional CT reconstruction system on a personal computer].

    Science.gov (United States)

    Watanabe, E; Ide, T; Teramoto, A; Mayanagi, Y

    1991-03-01

    A new computer system to produce three dimensional surface image from CT scan has been invented. Although many similar systems have been already developed and reported, they are too expensive to be set up in routine clinical services because most of these systems are based on high power mini-computer systems. According to the opinion that a practical 3D-CT system should be used in daily clinical activities using only a personal computer, we have transplanted the 3D program into a personal computer working in MS-DOS (16-bit, 12 MHz). We added to the program a routine which simulates surgical dissection on the surface image. The time required to produce the surface image ranges from 40 to 90 seconds. To facilitate the simulation, we connected a 3D system with the neuronavigator. The navigator gives the position of the surgical simulation when the surgeon places the navigator tip on the patient's head thus simulating the surgical excision before the real dissection.

  9. Personalization and perceived personal relevance in computer-tailored persuasion in smoking cessation

    NARCIS (Netherlands)

    Dijkstra, Arie; Ballast, Karien

    Objectives. In most computer-tailored interventions, the recipient's name is used to personalize the information. This is done to increase the process of persuasion but few empirical data exist that support this notion. yDesign. An experimental laboratory study was conducted to test the effects of

  10. Geometric data perturbation-based personal health record transactions in cloud computing.

    Science.gov (United States)

    Balasubramaniam, S; Kavitha, V

    2015-01-01

    Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. However, cloud computing raises concerns on how cloud service providers, user organizations, and governments should handle such information and interactions. Personal health records represent an emerging patient-centric model for health information exchange, and they are outsourced for storage by third parties, such as cloud providers. With these records, it is necessary for each patient to encrypt their own personal health data before uploading them to cloud servers. Current techniques for encryption primarily rely on conventional cryptographic approaches. However, key management issues remain largely unsolved with these cryptographic-based encryption techniques. We propose that personal health record transactions be managed using geometric data perturbation in cloud computing. In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud.

  11. Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing

    Science.gov (United States)

    Balasubramaniam, S.; Kavitha, V.

    2015-01-01

    Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. However, cloud computing raises concerns on how cloud service providers, user organizations, and governments should handle such information and interactions. Personal health records represent an emerging patient-centric model for health information exchange, and they are outsourced for storage by third parties, such as cloud providers. With these records, it is necessary for each patient to encrypt their own personal health data before uploading them to cloud servers. Current techniques for encryption primarily rely on conventional cryptographic approaches. However, key management issues remain largely unsolved with these cryptographic-based encryption techniques. We propose that personal health record transactions be managed using geometric data perturbation in cloud computing. In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud. PMID:25767826

  12. Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing

    Directory of Open Access Journals (Sweden)

    S. Balasubramaniam

    2015-01-01

    Full Text Available Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. However, cloud computing raises concerns on how cloud service providers, user organizations, and governments should handle such information and interactions. Personal health records represent an emerging patient-centric model for health information exchange, and they are outsourced for storage by third parties, such as cloud providers. With these records, it is necessary for each patient to encrypt their own personal health data before uploading them to cloud servers. Current techniques for encryption primarily rely on conventional cryptographic approaches. However, key management issues remain largely unsolved with these cryptographic-based encryption techniques. We propose that personal health record transactions be managed using geometric data perturbation in cloud computing. In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud.

  13. 76 FR 71980 - SEDASYS Computer-Assisted Personalized Sedation System; Ethicon Endo-Surgery, Incorporated's...

    Science.gov (United States)

    2011-11-21

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Food and Drug Administration [Docket No. FDA-2010-P-0176] SEDASYS Computer-Assisted Personalized Sedation System; Ethicon Endo-Surgery, Incorporated's Petition for... SEDASYS computer-assisted personalized sedation system (SEDASYS) submitted by Ethicon Endo-Surgery Inc...

  14. Heat exchanger performance analysis programs for the personal computer

    International Nuclear Information System (INIS)

    Putman, R.E.

    1992-01-01

    Numerous utility industry heat exchange calculations are repetitive and thus lend themselves to being performed on a Personal Computer. These programs may be regarded as engineering tools which, when put together, can form a Toolbox. However, the practicing Results Engineer in the utility industry desires not only programs that are robust as well as easy to use but can also be used both on desktop and laptop PC's. The latter also offer the opportunity to take the computer into the plant or control room, and use it there to process test or operating data right on the spot. Most programs evolve through the needs which arise in the course of day-to-day work. This paper describes several of the more useful programs of this type and outlines some of the guidelines to be followed when designing personal computer programs for use by the practicing Results Engineer

  15. Personal computer wallpaper user segmentation based on Sasang typology.

    Science.gov (United States)

    Lee, Joung-Youn

    2015-03-01

    As human-computer interaction (HCI) is becoming a significant part of all human life, the user's emotional satisfaction is an important factor to consider. These changes have been pointed out by several researchers who claim that a user's personality may become the most important factor in the design. The objective of this study is to examine Sasang typology as a user segmentation method in the area of HCI design. To test HCI usage patterns in terms of the user's personality and temperament, this study focuses on personal computer (PC) or lap-top wallpaper settings. One hundred and four Facebook friends completed a QSCC II survey assessing Sasang typology type and sent a captured image of their personal PC or lap-top wallpaper. To classify the computer usage pattern, folder organization and wallpaper setting were investigated. The research showed that So-Yang type organized folders and icons in an orderly manner, whereas So-Eum type did not organize folders and icons at all. With regard to wallpaper settings, So-Yang type used the default wallpaper provided by the PC but So-Eum type used landscape images. Because So-Yang type was reported to be emotionally stable and extrovert, they tended to be highly concerned with online privacy compared with So-Eum type. So-Eum type use a lot of images of landscapes as the background image, which demonstrates So-Eum's low emotional stability, anxiety, and the desire to obtain analogy throughout the computer screen. Also, So-Yang's wallpapers display family or peripheral figures and this is due to the sociability that extrovert So-Yang types possess. By proposing the Sasang typology as a factor in influencing an HCI usage pattern in this study, it can be used to predict the user's HCI experience, or suggest a native design methodology that can actively cope with the user's psychological environment.

  16. Computer-based, personalized cognitive training versus classical computer games: a randomized double-blind prospective trial of cognitive stimulation.

    Science.gov (United States)

    Peretz, Chava; Korczyn, Amos D; Shatil, Evelyn; Aharonson, Vered; Birnboim, Smadar; Giladi, Nir

    2011-01-01

    Many studies have suggested that cognitive training can result in cognitive gains in healthy older adults. We investigated whether personalized computerized cognitive training provides greater benefits than those obtained by playing conventional computer games. This was a randomized double-blind interventional study. Self-referred healthy older adults (n = 155, 68 ± 7 years old) were assigned to either a personalized, computerized cognitive training or to a computer games group. Cognitive performance was assessed at baseline and after 3 months by a neuropsychological assessment battery. Differences in cognitive performance scores between and within groups were evaluated using mixed effects models in 2 approaches: adherence only (AO; n = 121) and intention to treat (ITT; n = 155). Both groups improved in cognitive performance. The improvement in the personalized cognitive training group was significant (p computer games group it was significant (p games in improving visuospatial working memory (p = 0.0001), visuospatial learning (p = 0.0012) and focused attention (p = 0.0019). Personalized, computerized cognitive training appears to be more effective than computer games in improving cognitive performance in healthy older adults. Further studies are needed to evaluate the ecological validity of these findings. Copyright © 2011 S. Karger AG, Basel.

  17. Personal computer based home automation system

    OpenAIRE

    Hellmuth, George F.

    1993-01-01

    The systems engineering process is applied in the development of the preliminary design of a home automation communication protocol. The objective of the communication protocol is to provide a means for a personal computer to communicate with adapted appliances in the home. A needs analysis is used to ascertain that a need exist for a home automation system. Numerous design alternatives are suggested and evaluated to determine the best possible protocol design. Coaxial cable...

  18. Co-occurrence of addictive behaviours: personality factors related to substance use, gambling and computer gaming.

    Science.gov (United States)

    Walther, Birte; Morgenstern, Matthis; Hanewinkel, Reiner

    2012-01-01

    To investigate co-occurrence and shared personality characteristics of problematic computer gaming, problematic gambling and substance use. Cross-sectional survey data were collected from 2,553 German students aged 12-25 years. Self-report measures of substance use (alcohol, tobacco and cannabis), problematic gambling (South Oaks Gambling Screen - Revised for Adolescents, SOGS-RA), problematic computer gaming (Video Game Dependency Scale, KFN-CSAS-II), and of twelve different personality characteristics were obtained. Analyses revealed positive correlations between tobacco, alcohol and cannabis use and a smaller positive correlation between problematic gambling and problematic computer gaming. Problematic computer gaming co-occurred only with cannabis use, whereas problematic gambling was associated with all three types of substance use. Multivariate multilevel analyses showed differential patterns of personality characteristics. High impulsivity was the only personality characteristic associated with all five addictive behaviours. Depression and extraversion were specific to substance users. Four personality characteristics were specifically associated with problematic computer gaming: irritability/aggression, social anxiety, ADHD, and low self-esteem. Problematic gamblers seem to be more similar to substance users than problematic computer gamers. From a personality perspective, results correspond to the inclusion of gambling in the same DSM-V category as substance use and question a one-to-one proceeding for computer gaming. Copyright © 2012 S. Karger AG, Basel.

  19. Personal computer local networks report

    CERN Document Server

    1991-01-01

    Please note this is a Short Discount publication. Since the first microcomputer local networks of the late 1970's and early 80's, personal computer LANs have expanded in popularity, especially since the introduction of IBMs first PC in 1981. The late 1980s has seen a maturing in the industry with only a few vendors maintaining a large share of the market. This report is intended to give the reader a thorough understanding of the technology used to build these systems ... from cable to chips ... to ... protocols to servers. The report also fully defines PC LANs and the marketplace, with in-

  20. Personalized Computer-Assisted Mathematics Problem-Solving Program and Its Impact on Taiwanese Students

    Science.gov (United States)

    Chen, Chiu-Jung; Liu, Pei-Lin

    2007-01-01

    This study evaluated the effects of a personalized computer-assisted mathematics problem-solving program on the performance and attitude of Taiwanese fourth grade students. The purpose of this study was to determine whether the personalized computer-assisted program improved student performance and attitude over the nonpersonalized program.…

  1. The use of personal computers for self-teaching

    International Nuclear Information System (INIS)

    Levrat, B.

    1983-01-01

    The number of personal computers is growing at a phenomenal rate. Their capabilities in man-machine interaction makes them useful in teaching a variety of subjects. They can offer a stimulating presentation of the material to be learned, varied drill and practice exercices and simulations. Testing, evaluation and progress monitoring are also possible. Key issues about quality and content should not be left to businessmen alone. At CERN, Computer Aided Learning could be useful in connexion with large experiments. (orig.)

  2. COMPUTATION FORMAT computer codes X4TOC4 and PLOTC4. Implementing and Testing on a Personal Computer

    International Nuclear Information System (INIS)

    McLaughlin, P.K.

    1987-05-01

    This document describes the contents of the diskette containing the COMPUTATION FORMAT codes X4TOC4 and PLOTC4 by D.E. Cullen, and example data for use in implementing and testing these codes on a Personal Computer of the type IBM-PC/AT. Upon request the codes are available from the IAEA Nuclear Data Section, free of charge, on a single diskette. (author)

  3. Human-computer interface incorporating personal and application domains

    Science.gov (United States)

    Anderson, Thomas G [Albuquerque, NM

    2011-03-29

    The present invention provides a human-computer interface. The interface includes provision of an application domain, for example corresponding to a three-dimensional application. The user is allowed to navigate and interact with the application domain. The interface also includes a personal domain, offering the user controls and interaction distinct from the application domain. The separation into two domains allows the most suitable interface methods in each: for example, three-dimensional navigation in the application domain, and two- or three-dimensional controls in the personal domain. Transitions between the application domain and the personal domain are under control of the user, and the transition method is substantially independent of the navigation in the application domain. For example, the user can fly through a three-dimensional application domain, and always move to the personal domain by moving a cursor near one extreme of the display.

  4. Use of a personal computer for instrumentation testing at the FFTF

    International Nuclear Information System (INIS)

    Clark, D.A.

    1985-01-01

    The FFTF uses computers to assist in performance of instrumentation calibration checks for Technical Specification compliance. When the computers used for these checks are not available, back-up methods must be used. A method of using a personal computer to serve as a back-up is discussed, and the hardware used is described

  5. Experimental data processing techniques by a personal computer

    International Nuclear Information System (INIS)

    Matsuura, Kiyokata; Tsuda, Kenzo; Abe, Yoshihiko; Kojima, Tsuyoshi; Nishikawa, Akira; Shimura, Hitoshi; Hyodo, Hiromi; Yamagishi, Shigeru.

    1989-01-01

    A personal computer (16-bit, about 1 MB memory) can be used at a low cost in the experimental data processing. This report surveys the important techniques on A/D and D/A conversion, display, store and transfer of the experimental data. It is also discussed the items to be considered in the software. Practical softwares programed BASIC and Assembler language are given as examples. Here, we present some techniques to get faster process in BASIC language and show that the system composed of BASIC and Assembler is useful in a practical experiment. The system performance such as processing speed and flexibility in setting operation condition will depend strongly on programming language. We have made test for processing speed by some typical programming languages; BASIC(interpreter), C, FORTRAN and Assembler. As for the calculation, FORTRAN has the best performance which is comparable to or better than Assembler even in the personal computer. (author)

  6. Cloud Computing Application of Personal Information's Security in Network Sales-channels

    OpenAIRE

    Sun Qiong; Min Liu; Shiming Pang

    2013-01-01

    With the promotion of Internet sales, the security of personal information to network users have become increasingly demanding. The existing network of sales channels has personal information security risks, vulnerable to hacker attacking. Taking full advantage of cloud security management strategy, cloud computing security management model is introduced to the network sale of personal information security applications, which is to solve the problem of information leakage. Then we proposed me...

  7. Personality Trait and Facial Expression Filter-Based Brain-Computer Interface

    Directory of Open Access Journals (Sweden)

    Seongah Chin

    2013-02-01

    Full Text Available In this paper, we present technical approaches that bridge the gap in the research related to the use of brain-computer interfaces for entertainment and facial expressions. Such facial expressions that reflect an individual's personal traits can be used to better realize artificial facial expressions in a gaming environment based on a brain-computer interface. First, an emotion extraction filter is introduced in order to classify emotions on the basis of the users' brain signals in real time. Next, a personality trait filter is defined to classify extrovert and introvert types, which manifest as five traits: very extrovert, extrovert, medium, introvert and very introvert. In addition, facial expressions derived from expression rates are obtained by an extrovert-introvert fuzzy model through its defuzzification process. Finally, we confirm this validation via an analysis of the variance of the personality trait filter, a k-fold cross validation of the emotion extraction filter, an accuracy analysis, a user study of facial synthesis and a test case game.

  8. A software to report and file by personal computer

    International Nuclear Information System (INIS)

    Di Giandomenico, E.; Filippone, A.; Esposito, A.; Bonomo, L.

    1989-01-01

    During the past four years the authors have been gaining experince in reporting radiological examinations by personal computer. Today they describe the project of a new software which allows the reporting and filing of roentgenograms. This program was realized by a radiologist, using a well known data base management system: dBASE III. The program was shaped to fit the radiologist's needs: it helps to report, and allows to file, radiological data, with the diagnosic codes used by the American College of Radiology. In this paper the authors describe the data base structure and indicate the software functions which make its use possible. Thus, this paper is not aimed at advertising a new reporting program, but at demonstrating how the radiologist can himself manage some aspects of his work with the help of a personal computer

  9. Establishing a communications link between two different, incompatible, personal computers: with practical examples and illustrations and program code.

    Science.gov (United States)

    Davidson, R W

    1985-01-01

    The increasing need to communicate to exchange data can be handled by personal microcomputers. The necessity for the transference of information stored in one type of personal computer to another type of personal computer is often encountered in the process of integrating multiple sources of information stored in different and incompatible computers in Medical Research and Practice. A practical example is demonstrated with two relatively inexpensive commonly used computers, the IBM PC jr. and the Apple IIe. The basic input/output (I/O) interface chip for serial communication for each computer are joined together using a Null connector and cable to form a communications link. Using BASIC (Beginner's All-purpose Symbolic Instruction Code) Computer Language and the Disk Operating System (DOS) the communications handshaking protocol and file transfer is established between the two computers. The BASIC programming languages used are Applesoft (Apple Personal Computer) and PC BASIC (IBM Personal computer).

  10. Assessment of toxic metals in waste personal computers

    International Nuclear Information System (INIS)

    Kolias, Konstantinos; Hahladakis, John N.; Gidarakos, Evangelos

    2014-01-01

    Highlights: • Waste personal computers were collected and dismantled in their main parts. • Motherboards, monitors and plastic housing were examined in their metal content. • Concentrations measured were compared to the RoHS Directive, 2002/95/EC. • Pb in motherboards and funnel glass of devices released <2006 was above the limit. • Waste personal computers need to be recycled and environmentally sound managed. - Abstract: Considering the enormous production of waste personal computers nowadays, it is obvious that the study of their composition is necessary in order to regulate their management and prevent any environmental contamination caused by their inappropriate disposal. This study aimed at determining the toxic metals content of motherboards (printed circuit boards), monitor glass and monitor plastic housing of two Cathode Ray Tube (CRT) monitors, three Liquid Crystal Display (LCD) monitors, one LCD touch screen monitor and six motherboards, all of which were discarded. In addition, concentrations of chromium (Cr), cadmium (Cd), lead (Pb) and mercury (Hg) were compared with the respective limits set by the RoHS 2002/95/EC Directive, that was recently renewed by the 2012/19/EU recast, in order to verify manufacturers’ compliance with the regulation. The research included disassembly, pulverization, digestion and chemical analyses of all the aforementioned devices. The toxic metals content of all samples was determined using Inductively Coupled Plasma-Mass Spectrometry (ICP-MS). The results demonstrated that concentrations of Pb in motherboards and funnel glass of devices with release dates before 2006, that is when the RoHS Directive came into force, exceeded the permissible limit. In general, except from Pb, higher metal concentrations were detected in motherboards in comparison with plastic housing and glass samples. Finally, the results of this work were encouraging, since concentrations of metals referred in the RoHS Directive were found in

  11. Assessment of toxic metals in waste personal computers

    Energy Technology Data Exchange (ETDEWEB)

    Kolias, Konstantinos; Hahladakis, John N., E-mail: john_chach@yahoo.gr; Gidarakos, Evangelos, E-mail: gidarako@mred.tuc.gr

    2014-08-15

    Highlights: • Waste personal computers were collected and dismantled in their main parts. • Motherboards, monitors and plastic housing were examined in their metal content. • Concentrations measured were compared to the RoHS Directive, 2002/95/EC. • Pb in motherboards and funnel glass of devices released <2006 was above the limit. • Waste personal computers need to be recycled and environmentally sound managed. - Abstract: Considering the enormous production of waste personal computers nowadays, it is obvious that the study of their composition is necessary in order to regulate their management and prevent any environmental contamination caused by their inappropriate disposal. This study aimed at determining the toxic metals content of motherboards (printed circuit boards), monitor glass and monitor plastic housing of two Cathode Ray Tube (CRT) monitors, three Liquid Crystal Display (LCD) monitors, one LCD touch screen monitor and six motherboards, all of which were discarded. In addition, concentrations of chromium (Cr), cadmium (Cd), lead (Pb) and mercury (Hg) were compared with the respective limits set by the RoHS 2002/95/EC Directive, that was recently renewed by the 2012/19/EU recast, in order to verify manufacturers’ compliance with the regulation. The research included disassembly, pulverization, digestion and chemical analyses of all the aforementioned devices. The toxic metals content of all samples was determined using Inductively Coupled Plasma-Mass Spectrometry (ICP-MS). The results demonstrated that concentrations of Pb in motherboards and funnel glass of devices with release dates before 2006, that is when the RoHS Directive came into force, exceeded the permissible limit. In general, except from Pb, higher metal concentrations were detected in motherboards in comparison with plastic housing and glass samples. Finally, the results of this work were encouraging, since concentrations of metals referred in the RoHS Directive were found in

  12. Use of personal computer image for processing a magnetic resonance image (MRI)

    International Nuclear Information System (INIS)

    Yamamoto, Tetsuo; Tanaka, Hitoshi

    1988-01-01

    Image processing of MR imaging was attempted by using a popular personal computer as 16-bit model. The computer processed the images on a 256 x 256 matrix and 512 x 512 matrix. The softwer languages for image-processing were those of Macro-Assembler performed by (MS-DOS). The original images, acuired with an 0.5 T superconducting machine (VISTA MR 0.5 T, Picker International) were transfered to the computer by the flexible disket. Image process are the display of image to monitor, other the contrast enhancement, the unsharped mask contrast enhancement, the various filter process, the edge detections or the color histogram was obtained in 1.6 sec to 67 sec, indicating that commercialzed personal computer had ability for routine clinical purpose in MRI-processing. (author)

  13. Improving personality facet scores with multidimensional computer adaptive testing

    DEFF Research Database (Denmark)

    Makransky, Guido; Mortensen, Erik Lykke; Glas, Cees A W

    2013-01-01

    personality tests contain many highly correlated facets. This article investigates the possibility of increasing the precision of the NEO PI-R facet scores by scoring items with multidimensional item response theory and by efficiently administering and scoring items with multidimensional computer adaptive...

  14. Thinking computers and virtual persons essays on the intentionality of machines

    CERN Document Server

    Dietrich, Eric

    1994-01-01

    Thinking Computers and Virtual Persons: Essays on the Intentionality of Machines explains how computations are meaningful and how computers can be cognitive agents like humans. This book focuses on the concept that cognition is computation.Organized into four parts encompassing 13 chapters, this book begins with an overview of the analogy between intentionality and phlogiston, the 17th-century principle of burning. This text then examines the objection to computationalism that it cannot prevent arbitrary attributions of content to the various data structures and representations involved in a c

  15. Easy-to-use application programs for decay heat and delayed neutron calculations on personal computers

    Energy Technology Data Exchange (ETDEWEB)

    Oyamatsu, Kazuhiro [Nagoya Univ. (Japan)

    1998-03-01

    Application programs for personal computers are developed to calculate the decay heat power and delayed neutron activity from fission products. The main programs can be used in any computers from personal computers to main frames because their sources are written in Fortran. These programs have user friendly interfaces to be used easily not only for research activities but also for educational purposes. (author)

  16. SALP-PC, a computer program for fault tree analysis on personal computers

    International Nuclear Information System (INIS)

    Contini, S.; Poucet, A.

    1987-01-01

    The paper presents the main characteristics of the SALP-PC computer code for fault tree analysis. The program has been developed in Fortran 77 on an Olivetti M24 personal computer (IBM compatible) in order to reach a high degree of portability. It is composed of six processors implementing the different phases of the analysis procedure. This particular structure presents some advantages like, for instance, the restart facility and the possibility to develop an event tree analysis code. The set of allowed logical operators, i.e. AND, OR, NOT, K/N, XOR, INH, together with the possibility to define boundary conditions, make the SALP-PC code a powerful tool for risk assessment. (orig.)

  17. Know Your Personal Computer Basic Input-Output System (BIOS)

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 7. Know Your Personal Computer Basic Input-Output System (BIOS). Siddhartha Kumar Ghoshal. Series Article Volume 2 Issue 7 July 1997 pp 48-54. Fulltext. Click here to view fulltext PDF. Permanent link:

  18. Regional Platform on Personal Computer Electronic Waste in Latin ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Regional Platform on Personal Computer Electronic Waste in Latin America and the Caribbean. Donation of ... This project aims to identify environmentally responsible and sustainable solutions to the problem of e-waste. ... Policy in Focus publishes a special issue profiling evidence to empower women in the labour market.

  19. Online retrieval of patient information by asynchronous communication between general purpose computer and stand-alone personal computer

    International Nuclear Information System (INIS)

    Tsutsumi, Reiko; Takahashi, Kazuei; Sato, Toshiko; Komatani, Akio; Yamaguchi, Koichi

    1988-01-01

    Asynchronous communication was made between host (FACOM M-340) and personal computer (OLIBETTIE S-2250) to get patient's information required for RIA test registration. The retrieval system consists of a keyboad input of six numeric codes, patient's ID, and a real time reply containing six parameters for the patient. Their identified parameters are patient's name, sex, date of birth (include area), department, and out- or inpatient. Linking this program to RIA registration program for individual patient, then, operator can input name of RIA test requested. Our simple retrieval program made a useful data network between different types of host and stand-alone personal computers, and enabled us accurate and labor-saving registration for RIA test. (author)

  20. The image database management system of teaching file using personal computer

    International Nuclear Information System (INIS)

    Shin, M. J.; Kim, G. W.; Chun, T. J.; Ahn, W. H.; Baik, S. K.; Choi, H. Y.; Kim, B. G.

    1995-01-01

    For the systemic management and easy using of teaching file in radiology department, the authors tried to do the setup of a database management system of teaching file using personal computer. We used a personal computer (IBM PC compatible, 486DX2) including a image capture card(Window vision, Dooin Elect, Seoul, Korea) and video camera recorder (8mm, CCD-TR105, Sony, Tokyo, Japan) for the acquisition and storage of images. We developed the database program by using Foxpro for Window 2.6(Microsoft, Seattle, USA) executed in the Window 3.1 (Microsoft, Seattle, USA). Each datum consisted of hospital number, name, sex, age, examination date, keyword, radiologic examination modalities, final diagnosis, radiologic findings, references and representative images. The images were acquired and stored as bitmap format (8 bitmap, 540 X 390 ∼ 545 X 414, 256 gray scale) and displayed on the 17 inch-flat monitor(1024 X 768, Samtron, Seoul, Korea). Without special devices, the images acquisition and storage could be done on the reading viewbox, simply. The image quality on the computer's monitor was less than the one of original film on the viewbox, but generally the characteristics of each lesions could be differentiated. Easy retrieval of data was possible for the purpose of teaching file system. Without high cost appliances, we could consummate the image database system of teaching file using personal computer with relatively inexpensive method

  1. Presence and biofeedback in first-person perspective computer games

    DEFF Research Database (Denmark)

    Grimshaw-Aagaard, Mark Nicholas

    2019-01-01

    . Following the line taken by presence theorists, I differentiate between immersion, an objective measure such that computer game technology can be less or more immersive, and presence, a subjective, human response to that technology. The third section looks at current possibilities for biofeedback...... in relation to sound design for first-person perspective computer games; in line with the first section, biofeedback devices are treated as an immersive technology. I close the chapter by suggesting ways in which sound design in such games might make use of biofeedback to enhance the perception of presence...

  2. Personal computer interface for temmperature measuring in the cutting process with turning

    International Nuclear Information System (INIS)

    Trajchevski, Neven; Filipovski, Velimir; Kuzinonovski, Mikolaj

    2004-01-01

    The computer development aided reserch systems in the investigations of the characteristics of the surface layar forms conditions for decreasing of the measuring uncertainty. Especially important is the fact that the usage of open and self made measuring systems accomplishes the demands for a total control of the research process. This paper describes an original personal computer interface which is used in the newly built computer aided reserrch system for temperatute measuring in the machining with turning. This interface consists of optically-coupled linear isolation amplifier and an analog to digital (A/D) converter. It is designed for measuring of the themo- voltage that is a generated from the natural thermocouple workpiece-cutting tool. That is achived by digitalizing the value of the thermo-voltage in data which is transmitted to the personal computer. The interface realization is a result of the research activity of the faculty of Mechanical Engineering and the Faculty of Electrical Engineering in Skopje.

  3. Study on Thermal Conductivity of Personal Computer Aluminum-Magnesium Alloy Casing

    Science.gov (United States)

    Liao, MeiHong

    With the rapid development of computer technology, micro-state atoms by simulating the movement of material to analyze the nature of the macro-state have become an important subject. Materials, especially aluminium-magnesium alloy materials, often used in personal computer case, this article puts forward heat conduction model of the material, and numerical methods of heat transfer performance of the material.

  4. Computers and Communications. Improving the Employability of Persons with Handicaps.

    Science.gov (United States)

    Deitel, Harvey M.

    1984-01-01

    Reviews applications of computer and communications technologies for persons with visual, hearing, physical, speech, and language impairments, as well as the effects of technologies on transportation, work at home, education, and other aspects affecting the employment of the disabled. (SK)

  5. Providing disabled persons in developing countries access to computer games through a novel gaming input device

    CSIR Research Space (South Africa)

    Smith, Andrew C

    2011-01-01

    Full Text Available A novel input device is presented for use with a personal computer by persons with physical disabilities who would otherwise not be able to enjoy computer gaming. This device is simple to manufacture and low in cost. A gaming application...

  6. USAGE OF STANDARD PERSONAL COMPUTER PORTS FOR DESIGNING OF THE DOUBLE REDUNDANT FAULT-TOLERANT COMPUTER CONTROL SYSTEMS

    Directory of Open Access Journals (Sweden)

    Rafig SAMEDOV

    2005-01-01

    Full Text Available In this study, for designing of the fault-tolerant control systems by using standard personal computers, the ports have been investigated, different structure versions have been designed and the method for choosing of an optimal structure has been suggested. In this scope, first of all, the ÇİFTYAK system has been defined and its work principle has been determined. Then, data transmission ports of the standard personal computers have been classified and analyzed. After that, the structure versions have been designed and evaluated according to the used data transmission methods, the numbers of ports and the criterions of reliability, performance, truth, control and cost. Finally, the method for choosing of the most optimal structure version has been suggested.

  7. Computer-based versus in-person interventions for preventing and reducing stress in workers.

    Science.gov (United States)

    Kuster, Anootnara Talkul; Dalsbø, Therese K; Luong Thanh, Bao Yen; Agarwal, Arnav; Durand-Moreau, Quentin V; Kirkehei, Ingvild

    2017-08-30

    Chronic exposure to stress has been linked to several negative physiological and psychological health outcomes. Among employees, stress and its associated effects can also result in productivity losses and higher healthcare costs. In-person (face-to-face) and computer-based (web- and mobile-based) stress management interventions have been shown to be effective in reducing stress in employees compared to no intervention. However, it is unclear if one form of intervention delivery is more effective than the other. It is conceivable that computer-based interventions are more accessible, convenient, and cost-effective. To compare the effects of computer-based interventions versus in-person interventions for preventing and reducing stress in workers. We searched CENTRAL, MEDLINE, PubMed, Embase, PsycINFO, NIOSHTIC, NIOSHTIC-2, HSELINE, CISDOC, and two trials registers up to February 2017. We included randomised controlled studies that compared the effectiveness of a computer-based stress management intervention (using any technique) with a face-to-face intervention that had the same content. We included studies that measured stress or burnout as an outcome, and used workers from any occupation as participants. Three authors independently screened and selected 75 unique studies for full-text review from 3431 unique reports identified from the search. We excluded 73 studies based on full-text assessment. We included two studies. Two review authors independently extracted stress outcome data from the two included studies. We contacted study authors to gather additional data. We used standardised mean differences (SMDs) with 95% confidence intervals (CIs) to report study results. We did not perform meta-analyses due to variability in the primary outcome and considerable statistical heterogeneity. We used the GRADE approach to rate the quality of the evidence. Two studies met the inclusion criteria, including a total of 159 participants in the included arms of the studies

  8. Copyright and personal use of CERN’s computing infrastructure

    CERN Multimedia

    IT Department

    2009-01-01

    (La version française sera en ligne prochainement)The rules covering the personal use of CERN’s computing infrastructure are defined in Operational Circular No. 5 and its Subsidiary Rules (see http://cern.ch/ComputingRules). All users of CERN’s computing infrastructure must comply with these rules, whether they access CERN’s computing facilities from within the Organization’s site or at another location. In particular, OC5 clause 17 requires that proprietary rights (the rights in software, music, video, etc.) must be respected. The user is liable for damages resulting from non-compliance. Recently, there have been several violations of OC5, where copyright material was discovered on public world-readable disk space. Please ensure that all material under your responsibility (in particular in files owned by your account) respects proprietary rights, including with respect to the restriction of access by third parties. CERN Security Team

  9. Does computer-synthesized speech manifest personality? Experimental tests of recognition, similarity-attraction, and consistency-attraction.

    Science.gov (United States)

    Nass, C; Lee, K M

    2001-09-01

    Would people exhibit similarity-attraction and consistency-attraction toward unambiguously computer-generated speech even when personality is clearly not relevant? In Experiment 1, participants (extrovert or introvert) heard a synthesized voice (extrovert or introvert) on a book-buying Web site. Participants accurately recognized personality cues in text to speech and showed similarity-attraction in their evaluation of the computer voice, the book reviews, and the reviewer. Experiment 2, in a Web auction context, added personality of the text to the previous design. The results replicated Experiment 1 and demonstrated consistency (voice and text personality)-attraction. To maximize liking and trust, designers should set parameters, for example, words per minute or frequency range, that create a personality that is consistent with the user and the content being presented.

  10. Parallelized computation for computer simulation of electrocardiograms using personal computers with multi-core CPU and general-purpose GPU.

    Science.gov (United States)

    Shen, Wenfeng; Wei, Daming; Xu, Weimin; Zhu, Xin; Yuan, Shizhong

    2010-10-01

    Biological computations like electrocardiological modelling and simulation usually require high-performance computing environments. This paper introduces an implementation of parallel computation for computer simulation of electrocardiograms (ECGs) in a personal computer environment with an Intel CPU of Core (TM) 2 Quad Q6600 and a GPU of Geforce 8800GT, with software support by OpenMP and CUDA. It was tested in three parallelization device setups: (a) a four-core CPU without a general-purpose GPU, (b) a general-purpose GPU plus 1 core of CPU, and (c) a four-core CPU plus a general-purpose GPU. To effectively take advantage of a multi-core CPU and a general-purpose GPU, an algorithm based on load-prediction dynamic scheduling was developed and applied to setting (c). In the simulation with 1600 time steps, the speedup of the parallel computation as compared to the serial computation was 3.9 in setting (a), 16.8 in setting (b), and 20.0 in setting (c). This study demonstrates that a current PC with a multi-core CPU and a general-purpose GPU provides a good environment for parallel computations in biological modelling and simulation studies. Copyright 2010 Elsevier Ireland Ltd. All rights reserved.

  11. In person versus computer screening for intimate partner violence among pregnant patients.

    Science.gov (United States)

    Chang, Judy C; Dado, Diane; Schussler, Sara; Hawker, Lynn; Holland, Cynthia L; Burke, Jessica G; Cluss, Patricia A

    2012-09-01

    To compare in person versus computerized screening for intimate partner violence (IPV) in a hospital-based prenatal clinic and explore women's assessment of the screening methods. We compared patient IPV disclosures on a computerized questionnaire to audio-taped first obstetric visits with an obstetric care provider and performed semi-structured interviews with patient participants who reported experiencing IPV. Two-hundred and fifty patient participants and 52 provider participants were in the study. Ninety-one (36%) patients disclosed IPV either via computer or in person. Of those who disclosed IPV, 60 (66%) disclosed via both methods, but 31 (34%) disclosed IPV via only one of the two methods. Twenty-three women returned for interviews. They recommended using both types together. While computerized screening was felt to be non-judgmental and more anonymous, in person screening allowed for tailored questioning and more emotional connection with the provider. Computerized screening allowed disclosure without fear of immediate judgment. In person screening allows more flexibility in wording of questions regarding IPV and opportunity for interpersonal rapport. Both computerized or self-completed screening and in person screening is recommended. Providers should address IPV using non-judgmental, descriptive language, include assessments for psychological IPV, and repeat screening in person, even if no patient disclosure occurs via computer. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  12. A data acquisition system based on a personal computer

    International Nuclear Information System (INIS)

    Omata, K.; Fujita, Y.; Yoshikawa, N.; Sekiguchi, M.; Shida, Y.

    1991-07-01

    A versatile and flexible data acquisition system KODAQ (Kakuken Online Data AcQuisition system) has been developed. The system runs with CAMAC and a most popular Japanese personal computer, PC9801 (NEC), similar to the IBM PC/AT. The system is designed to set up easily a data acquisition system for various kinds of nuclear-physics experiments. (author)

  13. Sixties Counterculture and the Personal Computer (What the Dormouse Said: How the Sixties Counterculture Shaped the Personal Computer Industry)

    International Nuclear Information System (INIS)

    Markoff, John

    2006-01-01

    The Internet is arguably the largest accumulation of information in one place, yet its own beginnings remain largely undocumented. In researching his recent book, John Markoff collected oral histories from many of the Stanford-area researchers whose technological inventions defined the both modern internet and personal computer. In his talk, Markoff will explore the role that the counterculture and anti war movements of the 1960s and 1970s played in the work of these researchers as they created what would later be called the 'world's largest legal accumulation of wealth.'

  14. PERKAM: Personalized Knowledge Awareness Map for Computer Supported Ubiquitous Learning

    Science.gov (United States)

    El-Bishouty, Moushir M.; Ogata, Hiroaki; Yano, Yoneo

    2007-01-01

    This paper introduces a ubiquitous computing environment in order to support the learners while doing tasks; this environment is called PERKAM (PERsonalized Knowledge Awareness Map). PERKAM allows the learners to share knowledge, interact, collaborate, and exchange individual experiences. It utilizes the RFID ubiquities technology to detect the…

  15. Improving operational safety management through probabilistic safety assessment on personal computers

    International Nuclear Information System (INIS)

    1988-10-01

    The Technical Committee Meeting considered the current effort in the implementation and use of PSA information for day-to-day operational safety management on Personal Computers. Due to the very recent development of the necessary hardware and software for Personal Computers, the application of PSA information for day-to-day operational safety management on PCs is essentially still in a pioneering stage. There is at present only one such system for end users existing, the PRISIM (Plant Risk Status Information Management) program for which a limited practical application experience is available. Others are still in the development stage. The main aim of the Technical Committee Meeting was to discuss the present status of PSA based systems for operational safety management support on small computers, to consider practical aspects when implementing these systems into a nuclear installation and to address problems related to the further work in the area. A separate abstract was prepared for the summary of the Technical Committee Meeting and for the 8 papers presented by the participants. Refs, figs and tabs

  16. A self-taught artificial agent for multi-physics computational model personalization.

    Science.gov (United States)

    Neumann, Dominik; Mansi, Tommaso; Itu, Lucian; Georgescu, Bogdan; Kayvanpour, Elham; Sedaghat-Hamedani, Farbod; Amr, Ali; Haas, Jan; Katus, Hugo; Meder, Benjamin; Steidl, Stefan; Hornegger, Joachim; Comaniciu, Dorin

    2016-12-01

    Personalization is the process of fitting a model to patient data, a critical step towards application of multi-physics computational models in clinical practice. Designing robust personalization algorithms is often a tedious, time-consuming, model- and data-specific process. We propose to use artificial intelligence concepts to learn this task, inspired by how human experts manually perform it. The problem is reformulated in terms of reinforcement learning. In an off-line phase, Vito, our self-taught artificial agent, learns a representative decision process model through exploration of the computational model: it learns how the model behaves under change of parameters. The agent then automatically learns an optimal strategy for on-line personalization. The algorithm is model-independent; applying it to a new model requires only adjusting few hyper-parameters of the agent and defining the observations to match. The full knowledge of the model itself is not required. Vito was tested in a synthetic scenario, showing that it could learn how to optimize cost functions generically. Then Vito was applied to the inverse problem of cardiac electrophysiology and the personalization of a whole-body circulation model. The obtained results suggested that Vito could achieve equivalent, if not better goodness of fit than standard methods, while being more robust (up to 11% higher success rates) and with faster (up to seven times) convergence rate. Our artificial intelligence approach could thus make personalization algorithms generalizable and self-adaptable to any patient and any model. Copyright © 2016. Published by Elsevier B.V.

  17. Automatic data acquisition system of environmental radiation monitor with a personal computer

    International Nuclear Information System (INIS)

    Ohkubo, Tohru; Nakamura, Takashi.

    1984-05-01

    The automatic data acquisition system of environmental radiation monitor was developed in a low price by using a PET personal computer. The count pulses from eight monitors settled at four site boundaries were transmitted to a radiation control room by a signal transmission device and analyzed by the computer via 12 channel scaler and PET-CAMAC Interface for graphic display and printing. (author)

  18. Use of personal computers in performing a linear modal analysis of a large finite-element model

    International Nuclear Information System (INIS)

    Wagenblast, G.R.

    1991-01-01

    This paper presents the use of personal computers in performing a dynamic frequency analysis of a large (2,801 degrees of freedom) finite-element model. Large model linear time history dynamic evaluations of safety related structures were previously restricted to mainframe computers using direct integration analysis methods. This restriction was a result of the limited memory and speed of personal computers. With the advances in memory capacity and speed of the personal computers, large finite-element problems now can be solved in the office in a timely and cost effective manner. Presented in three sections, this paper describes the procedure used to perform the dynamic frequency analysis of the large (2,801 degrees of freedom) finite-element model on a personal computer. Section 2.0 describes the structure and the finite-element model that was developed to represent the structure for use in the dynamic evaluation. Section 3.0 addresses the hardware and software used to perform the evaluation and the optimization of the hardware and software operating configuration to minimize the time required to perform the analysis. Section 4.0 explains the analysis techniques used to reduce the problem to a size compatible with the hardware and software memory capacity and configuration

  19. [Individual psychological features in patients with computer game addiction suffering and predisposed persons].

    Science.gov (United States)

    Kardashian, R A

    2018-01-01

    To study personality characteristics in adolescents with computer game addiction. The study included students of grades 7 to 10 at the age of 12-17 years (14.6±2.4 years), their parents and school teachers. The results of a study showed the following combination in patients: 'genophilic' type of DPT with schizoid personality accentuation and 'projection' type of psychological protection, and 'dignitophilic' type of DPT with labile personality accentuation and 'denial' type of PP.

  20. Talbot's method for the numerical inversion of Laplace transforms: an implementation for personal computers

    International Nuclear Information System (INIS)

    Garratt, T.J.

    1989-05-01

    Safety assessments of radioactive waste disposal require efficient computer models for the important processes. The present paper is based on an efficient computational technique which can be used to solve a wide variety of safety assessment models. It involves the numerical inversion of analytical solutions to the Laplace-transformed differential equations using a method proposed by Talbot. This method has been implemented on a personal computer in a user-friendly manner. The steps required to implement a particular transform and run the program are outlined. Four examples are described which illustrate the flexibility, accuracy and efficiency of the program. The improvements in computational efficiency described in this paper have application to the probabilistic safety assessment codes ESCORT and MASCOT which are currently under development. Also, it is hoped that the present work will form the basis of software for personal computers which could be used to demonstrate safety assessment procedures to a wide audience. (author)

  1. A flexible image archiving system using a personal computer and optical disk

    International Nuclear Information System (INIS)

    Parkin, A.; Norwood, H.; Hall, A.J.

    1989-01-01

    The authors describe the application of a personal computer and optical disk as an image archiving device, which brings the advantages of large capacity, low cost and savings on storage space. (author)

  2. Calculation of transmission and other functionals from evaluated data in ENDF format by means of personal computers

    International Nuclear Information System (INIS)

    Vertes, P.

    1991-04-01

    The FDMXPC program package was developed on the basis of the program system FEDMIX written for mainframe computers. The new program package for personal computers was developed for the interpretation of neutron transmission experiments and for producing group averaged infinite diluted and self-shielded cross sections, starting from evaluated data in ENDF format. The package was written for different FORTRAN compilers residing in personal computers under MS-DOS. (R.P.) 12 refs

  3. Transmission of DICOM 3.0 type MR data to the personal computer in the hospital without PACS

    International Nuclear Information System (INIS)

    Lee, Seon Kyu; Kim, Hak Soo; Hwang, Hee Young; Kim, Ji Hye; Chung, Hyo Sun; Kim, Hyung Sik

    1999-01-01

    To transmit DICOM data to a personal computer in the hospital without PACS, and estimate the usefulness of digital image management and its convenience for physicians through transmitted file size, transmission time and quality of transmitted images. The raw data of three brain MRI and lumbar spine MRI were transmitted from an MR system to a personal computer via Ethernet TCP/IP connection. The file size and transmission time of transmitted images were measured according to the matrix number. Three board-certified radiologists compared the image quality of the transmitted and scanned images. The transmission of DICOM data to the personal computer was successful and the transmitted images and their header information were displayed by various personal computer-based DICOM viewing programs. The file size and transmission time of the 256 and 512 matrix images were 136 Kbyte, 2.17 seconds/slice and 520 Kbyte, 4.37 seconds/slice, respectively. All radiologists regarded the transmitted brain MRI images as superior. One radiologist considered the transmitted lumbar spine MRI images superior, while others decided that the quality of transmitted and scanned images was the same. The transmission of DICOM format image data to a personal computer through an appropriate DICOM receiving program is useful for managing digital images and convenient for physicians in the hospital without PACS

  4. A Computer-Supported Method to Reveal and Assess Personal Professional Theories in Vocational Education

    Science.gov (United States)

    van den Bogaart, Antoine C. M.; Bilderbeek, Richel J. C.; Schaap, Harmen; Hummel, Hans G. K.; Kirschner, Paul A.

    2016-01-01

    This article introduces a dedicated, computer-supported method to construct and formatively assess open, annotated concept maps of Personal Professional Theories (PPTs). These theories are internalised, personal bodies of formal and practical knowledge, values, norms and convictions that professionals use as a reference to interpret and acquire…

  5. Tablet computers and eBooks. Unlocking the potential for personal learning environments?

    NARCIS (Netherlands)

    Kalz, Marco

    2012-01-01

    Kalz, M. (2012, 9 May). Tablet computers and eBooks. Unlocking the potential for personal learning environments? Invited presentation during the annual conference of the European Association for Distance Learning (EADL), Noordwijkerhout, The Netherlands.

  6. Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.

    Science.gov (United States)

    Caruso, Ronald D

    2003-01-01

    Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003

  7. Different perspectives on the use of personal computers for technical analyses

    International Nuclear Information System (INIS)

    Libby, R.A.; Doherty, A.L.

    1986-01-01

    Personal computers (PCs) have widespread availability and use in many technical environments. The machines may have initially been justified for use as word processors or for data base management, but many technical applications are being performed and often the computer codes used in these technical analyses have been moved from large mainframe machines. The general feeling in the user community is that the free computer time on these machines justifies moving as many applications as possible from the large computer systems. Many of these PC applications cannot be justified if the total cost of using microcomputers is considered. A Hanford-wide local area network (LAN) is being established which allows individual PCs to be used as terminals to connect to mainframe computers at high data transfer rates (9600 baud). This system allows fast, easy connection to a variety of different computers with a few keystrokes. The LAN eliminates the problem of low-speed communication with mainframe computers and makes operation on the mainframes as simple as operation on the host PC, itself

  8. Survey of ANL organization plans for word processors, personal computers, workstations, and associated software

    Energy Technology Data Exchange (ETDEWEB)

    Fenske, K.R.

    1991-11-01

    The Computing and Telecommunications Division (CTD) has compiled this Survey of ANL Organization Plans for Word Processors, Personal Computers, Workstations, and Associated Software to provide DOE and Argonne with a record of recent growth in the acquisition and use of personal computers, microcomputers, and word processors at ANL. Laboratory planners, service providers, and people involved in office automation may find the Survey useful. It is for internal use only, and any unauthorized use is prohibited. Readers of the Survey should use it as a reference that documents the plans of each organization for office automation, identifies appropriate planners and other contact people in those organizations, and encourages the sharing of this information among those people making plans for organizations and decisions about office automation. The Survey supplements information in both the ANL Statement of Site Strategy for Computing Workstations and the ANL Site Response for the DOE Information Technology Resources Long-Range Plan.

  9. Survey of ANL organization plans for word processors, personal computers, workstations, and associated software

    Energy Technology Data Exchange (ETDEWEB)

    Fenske, K.R.; Rockwell, V.S.

    1992-08-01

    The Computing and Telecommunications Division (CTD) has compiled this Survey of ANL Organization plans for Word Processors, Personal Computers, Workstations, and Associated Software (ANL/TM, Revision 4) to provide DOE and Argonne with a record of recent growth in the acquisition and use of personal computers, microcomputers, and word processors at ANL. Laboratory planners, service providers, and people involved in office automation may find the Survey useful. It is for internal use only, and any unauthorized use is prohibited. Readers of the Survey should use it as a reference document that (1) documents the plans of each organization for office automation, (2) identifies appropriate planners and other contact people in those organizations and (3) encourages the sharing of this information among those people making plans for organizations and decisions about office automation. The Survey supplements information in both the ANL Statement of Site Strategy for Computing Workstations (ANL/TM 458) and the ANL Site Response for the DOE Information Technology Resources Long-Range Plan (ANL/TM 466).

  10. Obstetrical ultrasound data-base management system by using personal computer

    International Nuclear Information System (INIS)

    Jeon, Hae Jeong; Park, Jeong Hee; Kim, Soo Nyung

    1993-01-01

    A computer program which performs obstetric calculations on Clipper Language using the data from ultrasonography was developed for personal computer. It was designed for fast assessment of fetal development, prediction of gestational age, and weight from ultrasonographic measurements which included biparietal diameter, femur length, gestational sac, occipito-frontal diameter, abdominal diameter, and etc. The Obstetrical-Ultrasound Data-Base Management System was tested for its performance. The Obstetrical-Ultrasound Data-Base Management System was very useful in patient management with its convenient data filing, easy retrieval of previous report, prompt but accurate estimation of fetal growth and skeletal anomaly and production of equation and growth curve for pregnant women

  11. FORMING SCHOOLCHILD’S PERSONALITY IN COMPUTER STUDY LESSONS AT PRIMARY SCHOOL

    Directory of Open Access Journals (Sweden)

    Natalia Salan

    2017-04-01

    Full Text Available The influence of computer on the formation of primary schoolchildren’s personality and their implementing into learning activity are considered in the article. Based on the materials of state standards and the Law of Ukraine on Higher Education the concepts “computer”, “information culture” are defined, modern understanding of the concept “basics of computer literacy” is identified. The main task of school propaedeutic course in Computer Studies is defined. Interactive methods of activity are singled out. They are didactic games, designing, research, collaboration in pairs, and group interaction, etc. The essential characteristics of didactic game technologies are distinguished, the peculiarities of their use at primary school in Computer Study lessons are analyzed. Positive and negative aspects of using these technologies in Computer Study lessons are defined. The expediency of using game technologies while organizing students’ educational and cognitive activity in Computer Studies is substantiated. The idea to create a school course “Computer Studies at primary school” is caused by the wide introduction of computer technics into the educational system. Today’s schoolchild has to be able to use a computer as freely and easily as he can use a pen, a pencil or a ruler. That’s why it is advisable to start studying basics of Computer Studies at the primary school age. This course is intended for the pupils of the 2nd-4th forms. Firstly, it provides mastering practical skills of computer work and, secondly, it anticipates the development of children’s logical and algorithmic thinking styles. At these lessons students acquire practical skills to work with information on the computer. Having mastered the computer skills at primary school, children will be able to use it successfully in their work. In senior classes they will be able to realize acquired knowledge of the methods of work with information, ways of problem solving

  12. Processing of evaluated neutron data files in ENDF format on personal computers

    International Nuclear Information System (INIS)

    Vertes, P.

    1991-11-01

    A computer code package - FDMXPC - has been developed for processing evaluated data files in ENDF format. The earlier version of this package is supplemented with modules performing calculations using Reich-Moore and Adler-Adler resonance parameters. The processing of evaluated neutron data files by personal computers requires special programming considerations outlined in this report. The scope of the FDMXPC program system is demonstrated by means of numerical examples. (author). 5 refs, 4 figs, 4 tabs

  13. Image processing with personal computer

    International Nuclear Information System (INIS)

    Hara, Hiroshi; Handa, Madoka; Watanabe, Yoshihiko

    1990-01-01

    The method of automating the judgement works using photographs in radiation nondestructive inspection with a simple type image processor on the market was examined. The software for defect extraction and making binary and the software for automatic judgement were made for trial, and by using the various photographs on which the judgement was already done as the object, the accuracy and the problematic points were tested. According to the state of the objects to be photographed and the condition of inspection, the accuracy of judgement from 100% to 45% was obtained. The criteria for judgement were in conformity with the collection of reference photographs made by Japan Cast Steel Association. In the non-destructive inspection by radiography, the number and size of the defect images in photographs are visually judged, the results are collated with the standard, and the quality is decided. Recently, the technology of image processing with personal computers advanced, therefore by utilizing this technology, the automation of the judgement of photographs was attempted to improve the accuracy, to increase the inspection efficiency and to realize labor saving. (K.I.)

  14. A personal computer code for seismic evaluations of nuclear power plants facilities

    International Nuclear Information System (INIS)

    Xu, J.; Philippacopoulos, A.J.; Graves, H.

    1990-01-01

    The program CARES (Computer Analysis for Rapid Evaluation of Structures) is an integrated computational system being developed by Brookhaven National Laboratory (BNL) for the U.S. Nuclear Regulatory Commission. It is specifically designed to be a personal computer (PC) operated package which may be used to determine the validity and accuracy of analysis methodologies used for structural safety evaluations of nuclear power plants. CARES is structured in a modular format. Each module performs a specific type of analysis i.e., static or dynamic, linear or nonlinear, etc. This paper describes the various features which have been implemented into the Seismic Module of CARES

  15. Dissemination of Information in Developing Countries: The Personal Computer and beyond

    Science.gov (United States)

    Wong, Wai-Man

    2005-01-01

    With the blooming of information in digital format, dissemination of information is becoming a big challenge for developing countries. It is not only due to the limited provision of personal computers--in addition, the technological infrastructure and the ability to access information are also becoming major concerns in developing countries. This…

  16. Hepatic volumetry with PhotoShop in personal computer.

    Science.gov (United States)

    Lu, Yi; Wu, Zheng; Liu, Chang; Wang, Hao-Hua

    2004-02-01

    Convenient way to clarify liver volume or tumor volume in the liver is eagerly demanded by hepatobiliary surgeons, for so many aspects of clinical work need to know the liver volumetry. At present, some methods have been used to measure the liver volumetry, such as computed tomography (CT) scans, three-dimensional ultrasound volumetric system([1]) and 3-dimensional sonography([2,3]) et al. But enough volumetric information was failed to obtain by surgeons and a new way of measuring the liver volumetry that can be operated by themselves is exigent. Whereas we devise a new method of using PhotoShop in personal computer to measure the liver volumetry. A piece of whole CT film was transformed to a high quality digitized image by digital camera or scanner and then the digitized image was conducted as JPEG file into personal computer. The JPEG image file of CT film was opened by PhotoShop. Determining the edge of interested areas, and the data of pixel values of the interested areas divided by 1 cm2 pixel value will produce the actual area with the unit of square centimeter. If section thickness of CT scan is 1 cm, the sum of the areas of the liver or tumor in all sections naturally is the volume of the liver or tumor. Comparison of 10 hepatic volumes gained by this method and those gained by the GE Prospeed CT set showed a good relativity between the two groups. The volumes of three right lobes were calculated by this method before lobectomy and their real volumes were obtained postoperatively by a volumenometer. Their variation was limited to 5%. Hepatic volume obtained by PhotoShop is reliable. This method can be used to measure hepatic volume perfectly to meet clinical demand, and many parameters such as liver resection rate, graft volume can be achieved. The disadvantage of this method is the step of copying the pixel value from PhotoShop to Microsoft Excel.

  17. Personal Computer-less (PC-less) Microcontroller Training Kit

    Science.gov (United States)

    Somantri, Y.; Wahyudin, D.; Fushilat, I.

    2018-02-01

    The need of microcontroller training kit is necessary for practical work of students of electrical engineering education. However, to use available training kit not only costly but also does not meet the need of laboratory requirements. An affordable and portable microcontroller kit could answer such problem. This paper explains the design and development of Personal Computer Less (PC-Less) Microcontroller Training Kit. It was developed based on Lattepanda processor and Arduino microcontroller as target. The training kit equipped with advanced input-output interfaces that adopted the concept of low cost and low power system. The preliminary usability testing proved this device can be used as a tool for microcontroller programming and industrial automation training. By adopting the concept of portability, the device could be operated in the rural area which electricity and computer infrastructure are limited. Furthermore, the training kit is suitable for student of electrical engineering student from university and vocational high school.

  18. Gamma spectrometric system based on the personal computer Pravetz-83

    International Nuclear Information System (INIS)

    Yanakiev, K; Grigorov, T.; Vuchkov, M.

    1985-01-01

    A gamma spectrometric system based on a personal microcomputer Pravets-85 is described. The analog modules are NIM standard. ADC data are stored in the memory of the computer via a DMA channel and a real-time data processing is possible. The results from a series of tests indicate that the performance of the system is comparable with that of comercially avalable computerized spectrometers Ortec and Canberra

  19. [Personal computer-based computer monitoring system of the anesthesiologist (2-year experience in development and use)].

    Science.gov (United States)

    Buniatian, A A; Sablin, I N; Flerov, E V; Mierbekov, E M; Broĭtman, O G; Shevchenko, V V; Shitikov, I I

    1995-01-01

    Creation of computer monitoring systems (CMS) for operating rooms is one of the most important spheres of personal computer employment in anesthesiology. The authors developed a PC RS/AT-based CMS and effectively used it for more than 2 years. This system permits comprehensive monitoring in cardiosurgical operations by real time processing the values of arterial and central venous pressure, pressure in the pulmonary artery, bioelectrical activity of the brain, and two temperature values. Use of this CMS helped appreciably improve patients' safety during surgery. The possibility to assess brain function by computer monitoring the EEF simultaneously with central hemodynamics and body temperature permit the anesthesiologist to objectively assess the depth of anesthesia and to diagnose cerebral hypoxia. Automated anesthesiological chart issued by the CMS after surgery reliably reflects the patient's status and the measures taken by the anesthesiologist.

  20. Inducing and measuring emotion through a multiplayer first-person shooter computer game

    NARCIS (Netherlands)

    Merkx, P.A.B.; Truong, K.P.; Neerincx, M.A.

    2007-01-01

    To develop an annotated database of spontaneous, multimodal, emotional expressions, recordings were made of facial and vocal expressions of emotions while participants were playing a multiplayer first-person shooter (fps) computer game. During a replay of the session, participants scored their own

  1. Multi channel analyzer system addible to personal computer

    International Nuclear Information System (INIS)

    Ramirez J, F.J.; Garcia R, R.; Ramirez N, R.; Torres B, M.A.

    1996-01-01

    It has been developed a Multichannel analyzer system which was added to personal computer of 4096 channels for its use, in nuclear radiations matters, such as X-ray fluorescence analysis, Neutron activation analysis, etc. in that is interesting to know the radiation energy distribution. This system has three modules; a Digital analogical converter of 12 bits, fast (total conversion time of 6 μ s) that use a successive approximation technique with linearity correction by the gliding rule method. A digital card with microprocessor that is useful as an interface with the computer for the acquisition, data storage and the process control. A computer program with extensive use of graphics, friendly with the user in order to facilitate its utilization, also with the option to find peaks, an expansion of an interesting area, information storage in compatible format with spectra analysis programs, etc. Twenty five units of this system have been constructed which all of they were distributed to the ARCAL Member countries and the other 10 units were distributed in the National Institute of Nuclear Research. On the other hand, it has been able to find other applications where the information can be converted to pulses and the interest variable is represented by the pulse amplitude. (Author)

  2. Comparison of personal computer with CT workstation in the evaluation of 3-dimensional CT image of the skull

    International Nuclear Information System (INIS)

    Kang, Bok Hee; Kim, Kee Deog; Park, Chang Seo

    2001-01-01

    To evaluate the usefulness of the reconstructed 3-dimensional image on the personal computer in comparison with that of the CT workstation by quantitative comparison and analysis. The spiral CT data obtained from 27 persons were transferred from the CT workstation to a personal computer, and they were reconstructed as 3-dimensional image on the personal computer using V-works 2.0 TM . One observer obtained the 14 measurements on the reconstructed 3-dimensional image on both the CT workstation and the personal computer. Paired test was used to evaluate the intraobserver difference and the mean value of the each measurement on the CT workstation and the personal computer. Pearson correlation analysis and % imcongruence were also performed. I-Gn, N-Gn, N-A, N-Ns, B-A and G-Op did not show any statistically significant difference (p>0.05), B-O, B-N, Eu-Eu, Zy-Zy, Biw, D-D, Orbrd R, and L had statistically significant difference (p<0.05), but the mean values of the differences of all measurements were below 2 mm, except for D-D. The value of correlation coefficient γ was greater than 0.95 at I-Gn, N-Gn, N-A, N-Ns, B-A, B-N, G-Op, Eu-Eu, Zy-Zy, and Biw, and it was 0.75 at B-O, 0.78 at D-D, and 0.82 at both Orbrb R and L. The % incongruence was below 4% at I-Gn, N-Gn, N-A, N-Ns, B-A, B-N, G-Op, Eu-Eu, Zy-Zy, and Biw, and 7.18%, 10.78%, 4.97%, 5.89% at B-O, D-D, Orbrb R and L respectively. It can be considered that the utilization of the personal computer has great usefulness in reconstruction of the 3-dimensional image when it comes to the economics, accessibility and convenience, except for thin bones and the landmarks which and difficult to be located

  3. Leveraging Social Computing for Personalized Crisis Communication using Social Media

    Science.gov (United States)

    Leykin, Dmitry; Aharonson-Daniel, Limor; Lahad, Mooli

    2016-01-01

    Introduction: The extensive use of social media in modern life redefines social interaction and communication. Communication plays an important role in mitigating, or exacerbating, the psychological and behavioral responses to critical incidents and disasters. As recent disasters demonstrated, people tend to converge to social media during and following emergencies. Authorities can then use this media and other computational methods to gain insights from the public, mainly to enhance situational awareness, but also to improve their communication with the public and public adherence to instructions. Methods: The current review presents a conceptual framework for studying psychological aspects of crisis and risk communication using the social media through social computing. Results: Advanced analytical tools can be integrated in the processes and objectives of crisis communication. The availability of the computational techniques can improve communication with the public by a process of Hyper-Targeted Crisis Communication. Discussion: The review suggests that using advanced computational tools for target-audience profiling and linguistic matching in social media, can facilitate more sensitive and personalized emergency communication. PMID:27092290

  4. Leveraging Social Computing for Personalized Crisis Communication using Social Media.

    Science.gov (United States)

    Leykin, Dmitry; Aharonson-Daniel, Limor; Lahad, Mooli

    2016-03-24

    The extensive use of social media in modern life redefines social interaction and communication. Communication plays an important role in mitigating, or exacerbating, the psychological and behavioral responses to critical incidents and disasters. As recent disasters demonstrated, people tend to converge to social media during and following emergencies. Authorities can then use this media and other computational methods to gain insights from the public, mainly to enhance situational awareness, but also to improve their communication with the public and public adherence to instructions. The current review presents a conceptual framework for studying psychological aspects of crisis and risk communication using the social media through social computing. Advanced analytical tools can be integrated in the processes and objectives of crisis communication. The availability of the computational techniques can improve communication with the public by a process of Hyper-Targeted Crisis Communication. The review suggests that using advanced computational tools for target-audience profiling and linguistic matching in social media, can facilitate more sensitive and personalized emergency communication.

  5. A Context-Aware Ubiquitous Learning Approach for Providing Instant Learning Support in Personal Computer Assembly Activities

    Science.gov (United States)

    Hsu, Ching-Kun; Hwang, Gwo-Jen

    2014-01-01

    Personal computer assembly courses have been recognized as being essential in helping students understand computer structure as well as the functionality of each computer component. In this study, a context-aware ubiquitous learning approach is proposed for providing instant assistance to individual students in the learning activity of a…

  6. Application of a personal computer in a high energy physics experiment

    International Nuclear Information System (INIS)

    Petta, P.

    1987-04-01

    UA1 is a detector block at the CERN Super Synchrotron Collider, MacVEE is Micro computer applied to the Control of VME Electronic Equipment, a software development system for the data readout system and for the implementation of the user interface of the experiment control. A commercial personal computer is used. Examples of applications are the Data Acquisition Console, the Scanner Desc equipment and the AMERICA Ram Disks codes. Further topics are the MacUA1 development system for M68K-VME codes and an outline of the future MacVEE System Supervisor. 23 refs., 10 figs., 3 tabs. (qui)

  7. Transfer of numeric ASCII data files between Apple and IBM personal computers.

    Science.gov (United States)

    Allan, R W; Bermejo, R; Houben, D

    1986-01-01

    Listings for programs designed to transfer numeric ASCII data files between Apple and IBM personal computers are provided with accompanying descriptions of how the software operates. Details of the hardware used are also given. The programs may be easily adapted for transferring data between other microcomputers.

  8. A performance evaluation of the IBM 370/XT personal computer

    Science.gov (United States)

    Dominick, Wayne D. (Editor); Triantafyllopoulos, Spiros

    1984-01-01

    An evaluation of the IBM 370/XT personal computer is given. This evaluation focuses primarily on the use of the 370/XT for scientific and technical applications and applications development. A measurement of the capabilities of the 370/XT was performed by means of test programs which are presented. Also included is a review of facilities provided by the operating system (VM/PC), along with comments on the IBM 370/XT hardware configuration.

  9. Developing a personal computer based expert system for radionuclide identification

    International Nuclear Information System (INIS)

    Aarnio, P.A.; Hakulinen, T.T.

    1990-01-01

    Several expert system development tools are available for personal computers today. We have used one of the LISP-based high end tools for nearly two years in developing an expert system for identification of gamma sources. The system contains a radionuclide database of 2055 nuclides and 48000 gamma transitions with a knowledge base of about sixty rules. This application combines a LISP-based inference engine with database management and relatively heavy numerical calculations performed using C-language. The most important feature needed has been the possibility to use LISP and C together with the more advanced object oriented features of the development tool. Main difficulties have been long response times and the big amount (10-16 MB) of computer memory required

  10. Cluster Analysis of Flow Cytometric List Mode Data on a Personal Computer

    NARCIS (Netherlands)

    Bakker Schut, Tom C.; Bakker schut, T.C.; de Grooth, B.G.; Greve, Jan

    1993-01-01

    A cluster analysis algorithm, dedicated to analysis of flow cytometric data is described. The algorithm is written in Pascal and implemented on an MS-DOS personal computer. It uses k-means, initialized with a large number of seed points, followed by a modified nearest neighbor technique to reduce

  11. Industrial Personal Computer based Display for Nuclear Safety System

    International Nuclear Information System (INIS)

    Kim, Ji Hyeon; Kim, Aram; Jo, Jung Hee; Kim, Ki Beom; Cheon, Sung Hyun; Cho, Joo Hyun; Sohn, Se Do; Baek, Seung Min

    2014-01-01

    The safety display of nuclear system has been classified as important to safety (SIL:Safety Integrity Level 3). These days the regulatory agencies are imposing more strict safety requirements for digital safety display system. To satisfy these requirements, it is necessary to develop a safety-critical (SIL 4) grade safety display system. This paper proposes industrial personal computer based safety display system with safety grade operating system and safety grade display methods. The description consists of three parts, the background, the safety requirements and the proposed safety display system design. The hardware platform is designed using commercially available off-the-shelf processor board with back plane bus. The operating system is customized for nuclear safety display application. The display unit is designed adopting two improvement features, i.e., one is to provide two separate processors for main computer and display device using serial communication, and the other is to use Digital Visual Interface between main computer and display device. In this case the main computer uses minimized graphic functions for safety display. The display design is at the conceptual phase, and there are several open areas to be concreted for a solid system. The main purpose of this paper is to describe and suggest a methodology to develop a safety-critical display system and the descriptions are focused on the safety requirement point of view

  12. Industrial Personal Computer based Display for Nuclear Safety System

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Ji Hyeon; Kim, Aram; Jo, Jung Hee; Kim, Ki Beom; Cheon, Sung Hyun; Cho, Joo Hyun; Sohn, Se Do; Baek, Seung Min [KEPCO, Youngin (Korea, Republic of)

    2014-08-15

    The safety display of nuclear system has been classified as important to safety (SIL:Safety Integrity Level 3). These days the regulatory agencies are imposing more strict safety requirements for digital safety display system. To satisfy these requirements, it is necessary to develop a safety-critical (SIL 4) grade safety display system. This paper proposes industrial personal computer based safety display system with safety grade operating system and safety grade display methods. The description consists of three parts, the background, the safety requirements and the proposed safety display system design. The hardware platform is designed using commercially available off-the-shelf processor board with back plane bus. The operating system is customized for nuclear safety display application. The display unit is designed adopting two improvement features, i.e., one is to provide two separate processors for main computer and display device using serial communication, and the other is to use Digital Visual Interface between main computer and display device. In this case the main computer uses minimized graphic functions for safety display. The display design is at the conceptual phase, and there are several open areas to be concreted for a solid system. The main purpose of this paper is to describe and suggest a methodology to develop a safety-critical display system and the descriptions are focused on the safety requirement point of view.

  13. Device controllers using an industrial personal computer of the PF 2.5-GeV Electron Linac at KEK

    International Nuclear Information System (INIS)

    Otake, Yuji; Yokota, Mitsuhiro; Kakihara, Kazuhisa; Ogawa, Yujiro; Ohsawa, Satoshi; Shidara, Tetsuo; Nakahara, Kazuo

    1992-01-01

    Device controllers for electron guns and slits using an industrial personal computer have been designed and installed in the Photon Factory 2.5-GeV Electron Linac at KEK. The design concept of the controllers is to realize a reliable system and good productivity of hardware and software by using an industrial personal computer and a programmable sequence controller. The device controllers have been working reliably for several years. (author)

  14. Analysis of Brand Personality on Customer Loyalty (Case Study Tablet Computer: Apple Ipad and Samsung Galaxy Tab)

    OpenAIRE

    Andu, Risca A.

    2013-01-01

    Brand personality is a potential marketing strategy to increase the customer loyalty towards the particular brand. Many customers will choose products with a brand that suitable with their personality. It also applies to tablet computer customers. The objectives of this research are to describe the effect of brand personality on customer loyalty in purchasing Apple Ipad and Samsung Galaxy Tab. This research also will analyze the difference in customer loyalty based on brand personality betwee...

  15. An Amphibious Ship-To-Shore Simulation for Use on an IBM PC (Personal Computer)

    Science.gov (United States)

    1984-09-01

    CA : «< <- j Special ■ *- amphibious ship- an IBM Personal ion of the phy- he logic used analysis, and a DD | JAM 11 1473 COITION...research, for instance, wiL1 be geared toward a technically oriented person who is familiar with computers, programming and the associated logic. A...problem, often vaguely stated by the decision aaker , into precise and operational terms [Ref. Hz p.51]. The analysis begins with specification of the

  16. Personal Computer Transport Analysis Program

    Science.gov (United States)

    DiStefano, Frank, III; Wobick, Craig; Chapman, Kirt; McCloud, Peter

    2012-01-01

    The Personal Computer Transport Analysis Program (PCTAP) is C++ software used for analysis of thermal fluid systems. The program predicts thermal fluid system and component transients. The output consists of temperatures, flow rates, pressures, delta pressures, tank quantities, and gas quantities in the air, along with air scrubbing component performance. PCTAP s solution process assumes that the tubes in the system are well insulated so that only the heat transfer between fluid and tube wall and between adjacent tubes is modeled. The system described in the model file is broken down into its individual components; i.e., tubes, cold plates, heat exchangers, etc. A solution vector is built from the components and a flow is then simulated with fluid being transferred from one component to the next. The solution vector of components in the model file is built at the initiation of the run. This solution vector is simply a list of components in the order of their inlet dependency on other components. The component parameters are updated in the order in which they appear in the list at every time step. Once the solution vectors have been determined, PCTAP cycles through the components in the solution vector, executing their outlet function for each time-step increment.

  17. Personal computer versus personal computer/mobile device combination users' preclinical laboratory e-learning activity.

    Science.gov (United States)

    Kon, Haruka; Kobayashi, Hiroshi; Sakurai, Naoki; Watanabe, Kiyoshi; Yamaga, Yoshiro; Ono, Takahiro

    2017-11-01

    The aim of the present study was to clarify differences between personal computer (PC)/mobile device combination and PC-only user patterns. We analyzed access frequency and time spent on a complete denture preclinical website in order to maximize website effectiveness. Fourth-year undergraduate students (N=41) in the preclinical complete denture laboratory course were invited to participate in this survey during the final week of the course to track login data. Students accessed video demonstrations and quizzes via our e-learning site/course program, and were instructed to view online demonstrations before classes. When the course concluded, participating students filled out a questionnaire about the program, their opinions, and devices they had used to access the site. Combination user access was significantly more frequent than PC-only during supplementary learning time, indicating that students with mobile devices studied during lunch breaks and before morning classes. Most students had favorable opinions of the e-learning site, but a few combination users commented that some videos were too long and that descriptive answers were difficult on smartphones. These results imply that mobile devices' increased accessibility encouraged learning by enabling more efficient time use between classes. They also suggest that e-learning system improvements should cater to mobile device users by reducing video length and including more short-answer questions. © 2016 John Wiley & Sons Australia, Ltd.

  18. Programmed temperature control of capsule in irradiation test with personal computer at JMTR

    International Nuclear Information System (INIS)

    Saito, H.; Uramoto, T.; Fukushima, M.; Obata, M.; Suzuki, S.; Nakazaki, C.; Tanaka, I.

    1992-01-01

    The capsule irradiation facility is one of various equipments employed at the Japan Materials Testing Reactor (JMTR). The capsule facility has been used in irradiation tests of both nuclear fuels and materials. The capsule to be irradiated consists of the specimen, the outer tube and inner tube with a annular space between them. The temperature of the specimen is controlled by varying the degree of pressure (below the atmospheric pressure) of He gas in the annular space (vacuum-controlled). Beside this, in another system the temperature of the specimen is controlled with electric heaters mounted around the specimen (heater-controlled). The use of personal computer in the capsule facility has led to the development of a versatile temperature control system at the JMTR. Features of this newly-developed temperature control system lie in the following: the temperature control mode for a operation period can be preset prior to the operation; and the vacuum-controlled irradiation facility can be used in cooperation with the heater-controlled. The introduction of personal computer has brought in automatic heat-up and cool-down operations of the capsule, setting aside the hand-operated jobs which had been conducted by the operators. As a result of this, the various requirements seeking a higher accuracy and efficiency in the irradiation can be met by fully exploiting the capabilities incorporated into the facility which allow the cyclic or delicate changes in the temperature. This paper deals with a capsule temperature control system with personal computer. (author)

  19. PCTRAN-3: The third generation of personal computer-based plant analyzer for severe accident management

    International Nuclear Information System (INIS)

    Li-Chi Cliff Po; Link, John M.

    2004-01-01

    PCTRAN is a plant analyzer that uses a personal computer to simulate plant response. The plant model is recently expanded to accommodate beyond design-basis severe accidents. In the event of multiple failures of the plant safety systems, the core may experience heatup and extensive failure. Using a high-powered personal computer (PC), PCTRAN-3 is designed to operate at a speed significantly faster than real-time. A convenient, interactive and user-friendly graphics interface allows full control by the operator. The plant analyzer is intended for use in severe accident management. In this paper the code's component models and sample runs ranging from normal operational transients to severe accidents are reviewed. (author)

  20. 76 FR 75887 - SEDASYS Computer-Assisted Personalized Sedation System; Ethicon Endo-Surgery, Incorporated's...

    Science.gov (United States)

    2011-12-05

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Food and Drug Administration [Docket No. FDA-2010-P-0176] SEDASYS Computer-Assisted Personalized Sedation System; Ethicon Endo-Surgery, Incorporated's Petition for... system (SEDASYS) submitted by Ethicon Endo-Surgery Inc. (EES), the sponsor for SEDASYS. This meeting has...

  1. Characteristics of multiprocessing MCNP5 on small personal computer clusters

    International Nuclear Information System (INIS)

    Robinson, S M; Mc Conn, R J Jr; Pagh, R T; Schweppe, J E; Siciliano, E R

    2006-01-01

    The feasibility and efficiency of performing MCNP5 calculations with a small, heterogeneous computing cluster built from Microsoft ( R) Windows TM personal computers (PC) are explored. The performance increases that may be expected with such clusters are estimated for cases that typify general radiation-shielding calculations. Our results show that the speed increase from additional slave PCs is nearly linear up to 10 processors. Guidance is given as to the specific advantages of changing various parameters present in the system. Implementing load balancing, and reducing the overhead from the MCNP rendezvous mechanism add to heterogeneous cluster efficiency. Hyper-threading technology and matching the total number of slave processes to the total number of logical processors also yield modest speed increases in the range below 7 processors. Because of the ease of acquisition of heterogeneous desktop computers, and the peak in efficiency at the level of a few physical processors, a strong case is made for the use of small clusters as a tool for producing MCNP5 calculations rapidly, and detailed instructions for constructing such clusters are provided

  2. Survey of ANL organization plans for word processors, personal computers, workstations, and associated software. Revision 3

    Energy Technology Data Exchange (ETDEWEB)

    Fenske, K.R.

    1991-11-01

    The Computing and Telecommunications Division (CTD) has compiled this Survey of ANL Organization Plans for Word Processors, Personal Computers, Workstations, and Associated Software to provide DOE and Argonne with a record of recent growth in the acquisition and use of personal computers, microcomputers, and word processors at ANL. Laboratory planners, service providers, and people involved in office automation may find the Survey useful. It is for internal use only, and any unauthorized use is prohibited. Readers of the Survey should use it as a reference that documents the plans of each organization for office automation, identifies appropriate planners and other contact people in those organizations, and encourages the sharing of this information among those people making plans for organizations and decisions about office automation. The Survey supplements information in both the ANL Statement of Site Strategy for Computing Workstations and the ANL Site Response for the DOE Information Technology Resources Long-Range Plan.

  3. Survey of ANL organization plans for word processors, personal computers, workstations, and associated software. Revision 4

    Energy Technology Data Exchange (ETDEWEB)

    Fenske, K.R.; Rockwell, V.S.

    1992-08-01

    The Computing and Telecommunications Division (CTD) has compiled this Survey of ANL Organization plans for Word Processors, Personal Computers, Workstations, and Associated Software (ANL/TM, Revision 4) to provide DOE and Argonne with a record of recent growth in the acquisition and use of personal computers, microcomputers, and word processors at ANL. Laboratory planners, service providers, and people involved in office automation may find the Survey useful. It is for internal use only, and any unauthorized use is prohibited. Readers of the Survey should use it as a reference document that (1) documents the plans of each organization for office automation, (2) identifies appropriate planners and other contact people in those organizations and (3) encourages the sharing of this information among those people making plans for organizations and decisions about office automation. The Survey supplements information in both the ANL Statement of Site Strategy for Computing Workstations (ANL/TM 458) and the ANL Site Response for the DOE Information Technology Resources Long-Range Plan (ANL/TM 466).

  4. Simulation of mixed bond graphs and block diagrams on personal computers using TUTSIM

    NARCIS (Netherlands)

    Beukeboom, J.J.A.J.; van Dixhoorn, J.J.; Meerman, J.W.

    1985-01-01

    The TUTSIM simulation program for continuous dynamic systems accepts (nonlinear) block diagrams, bond graphs or a free mix of both. The simulation is “hands on” interactive, providing a direct contact with the model. The implementation of the program on existing personal computers (Apple II, IBM PC)

  5. A Five-Year Hedonic Price Breakdown for Desktop Personal Computer Attributes in Brazil

    Directory of Open Access Journals (Sweden)

    Nuno Manoel Martins Dias Fouto

    2009-07-01

    Full Text Available The purpose of this article is to identify the attributes that discriminate the prices of personal desktop computers. We employ the hedonic price method in evaluating such characteristics. This approach allows market prices to be expressed as a function, a set of attributes present in the products and services offered. Prices and characteristics of up to 3,779 desktop personal computers offered in the IT pages of one of the main Brazilian newspapers were collected from January 2003 to December 2007. Several specifications for the hedonic (multivariate linear regression were tested. In this particular study, the main attributes were found to be hard drive capacity, screen technology, main board brand, random memory size, microprocessor brand, video board memory, digital video and compact disk recording devices, screen size and microprocessor speed. These results highlight the novel contribution of this study: the manner and means in which hedonic price indexes may be estimated in Brazil.

  6. Energy Use and Power Levels in New Monitors and Personal Computers; TOPICAL

    International Nuclear Information System (INIS)

    Roberson, Judy A.; Homan, Gregory K.; Mahajan, Akshay; Nordman, Bruce; Webber, Carrie A.; Brown, Richard E.; McWhinney, Marla; Koomey, Jonathan G.

    2002-01-01

    Our research was conducted in support of the EPA ENERGY STAR Office Equipment program, whose goal is to reduce the amount of electricity consumed by office equipment in the U.S. The most energy-efficient models in each office equipment category are eligible for the ENERGY STAR label, which consumers can use to identify and select efficient products. As the efficiency of each category improves over time, the ENERGY STAR criteria need to be revised accordingly. The purpose of this study was to provide reliable data on the energy consumption of the newest personal computers and monitors that the EPA can use to evaluate revisions to current ENERGY STAR criteria as well as to improve the accuracy of ENERGY STAR program savings estimates. We report the results of measuring the power consumption and power management capabilities of a sample of new monitors and computers. These results will be used to improve estimates of program energy savings and carbon emission reductions, and to inform rev isions of the ENERGY STAR criteria for these products. Our sample consists of 35 monitors and 26 computers manufactured between July 2000 and October 2001; it includes cathode ray tube (CRT) and liquid crystal display (LCD) monitors, Macintosh and Intel-architecture computers, desktop and laptop computers, and integrated computer systems, in which power consumption of the computer and monitor cannot be measured separately. For each machine we measured power consumption when off, on, and in each low-power level. We identify trends in and opportunities to reduce power consumption in new personal computers and monitors. Our results include a trend among monitor manufacturers to provide a single very low low-power level, well below the current ENERGY STAR criteria for sleep power consumption. These very low sleep power results mean that energy consumed when monitors are off or in active use has become more important in terms of contribution to the overall unit energy consumption (UEC

  7. Analysis of cardiac images of radionuclide ventriculography in AT-Type personal computer

    International Nuclear Information System (INIS)

    Lillo, R.; Gonzalez, P.; Ehijo, A.; Otarola, T.M.S.; Ortiz, M.; Silva, A.M.; Ortiz, M.

    1990-01-01

    The goal of this research was to produce software for the processing of Cardiac Phase images in personal computers. The results of standard radionuclide Ventriculography and Fourier analysis, got on gamma camera Ohio Nuclear 410 Sygma and Digital PDP 11/34 computer were coded into ASCII file and then transfered via Smarterm 220/Kermit to an Accel 900 AT PC. After decoding the images they were processed with a program develope in C Lenguaje obtaining the values of Phase Angles in the whole phase images and in regions of interest drawn around the cardiac chambers. The images and values were the same as those obtained by conventional processing in the PDP 11/34 computer. This is considered a first stage for the use of PC to Nuclear Medicine imaging studies. (author)

  8. Ergonomic guidelines for using notebook personal computers. Technical Committee on Human-Computer Interaction, International Ergonomics Association.

    Science.gov (United States)

    Saito, S; Piccoli, B; Smith, M J; Sotoyama, M; Sweitzer, G; Villanueva, M B; Yoshitake, R

    2000-10-01

    In the 1980's, the visual display terminal (VDT) was introduced in workplaces of many countries. Soon thereafter, an upsurge in reported cases of related health problems, such as musculoskeletal disorders and eyestrain, was seen. Recently, the flat panel display or notebook personal computer (PC) became the most remarkable feature in modern workplaces with VDTs and even in homes. A proactive approach must be taken to avert foreseeable ergonomic and occupational health problems from the use of this new technology. Because of its distinct physical and optical characteristics, the ergonomic requirements for notebook PCs in terms of machine layout, workstation design, lighting conditions, among others, should be different from the CRT-based computers. The Japan Ergonomics Society (JES) technical committee came up with a set of guidelines for notebook PC use following exploratory discussions that dwelt on its ergonomic aspects. To keep in stride with this development, the Technical Committee on Human-Computer Interaction under the auspices of the International Ergonomics Association worked towards the international issuance of the guidelines. This paper unveils the result of this collaborative effort.

  9. PENGARUH PERSONALIZATION, COMPUTER SELF EFFICACY, DAN TRUST TERHADAP PERCEIVED USEFULLNESS PADA PENGGUNA INTERNET BANKING DI PT. BANK BRI (Persero, Tbk. CABANG MADIUN

    Directory of Open Access Journals (Sweden)

    Yoyok Sugiantoro

    2015-04-01

    Full Text Available Penelitian ini bertujuan untuk mengetahui pengaruh personalization terhadap perceived usefulness, pengaruh computer self efficacy terhadap perceived usefulness, pengaruh trust terhadap perceived usefulness, dan pengaruh secara simultan personalization, computer self efficacy, dan trust terhadap perceived usefulness. Populasi dalam penelitian ini adalah semua nasabah pengguna internet banking di Bank BRI KCP Dolopo Madiun hingga akhir bulan Mei 2014, yaitu sejumlah 157 orang. Pengambilan sampel menggunakan sampling jenuh sehingga jumlah sampel penelitian ini sebanyak 157 orang. Penelitian ini menggunakan metode analisis regresi linier berganda. Hasil penelitian ini menunjukkan bahwa variabel personalization berpengaruh terhadap perceived usefulness, variabel computer self efficacy berpengaruh terhadap perceived usefulness, variabel trust berpengaruh terhadap perceived usefulness, serta variabel personalization, computer self efficacy, dan trust secara simultan berpengaruh terhadap perceived usefulness pada pengguna layanan internet banking di PT. Bank BRI (Persero, Tbk Cabang Madiun.

  10. Data acquisition with the personal computer to the microwaves generator of the microtron MT-25

    International Nuclear Information System (INIS)

    Rivero Ramirez, D.; Benavides Benitez, J. I.; Quiles Latorre, F. J.; Pahor, J.; Ponikvar, D.; Lago, G.

    2000-01-01

    The following paper includes the description of the design, construction and completion of a data acquisition system. The system is destined to the sampling of the work parameters of the generator of microwaves of the Microtron-25 that will settle in the High Institute of Nuclear Sciences and Technology, Havana, Cuba. In order to guarantee the suitable operation of the system a monitor program in assembler language has been developed. This program allows the communication of the system with one personal computer through the interface RS-232, as well as executes the commands received through it. Also the development of a program of attention to the system from one personal computer using the methods of the virtual instrumentation is included in this paper

  11. Personal computer based decision support system for routing nuclear spent fuel

    International Nuclear Information System (INIS)

    Chin, Shih-Miao; Joy, D.S.; Johnson, P.E.; Bobic, S.M.; Miaou, Shaw-Pin

    1989-01-01

    An approach has been formulated to route nuclear spent fuel over the US Interstate highway network. This approach involves the generation of alternative routes so that any potential adverse impacts will not only concentrate on regions along the shortest path between the nuclear power plant and repository. Extensive literature research on the shortest path finding algorithms has been carried out. Consequently, an extremely efficient shortest path algorithm has been implemented and significantly increases the overall system performance. State-of-the-art interactive computer graphics is used. In addition to easy-to-use pop-up menus, full color mapping and display capabilities are also incorporated. All of these features have been implemented on commonly available personal computers. 6 figs., 2 tabs

  12. ENDF/B Pre-Processing Codes: Implementing and testing on a Personal Computer

    International Nuclear Information System (INIS)

    McLaughlin, P.K.

    1987-05-01

    This document describes the contents of the diskettes containing the ENDF/B Pre-Processing codes by D.E. Cullen, and example data for use in implementing and testing these codes on a Personal Computer of the type IBM-PC/AT. Upon request the codes are available from the IAEA Nuclear Data Section, free of charge, on a series of 7 diskettes. (author)

  13. Half a century of optics in computing--a personal perspective [Invited].

    Science.gov (United States)

    Shamir, Joseph

    2013-02-01

    Optical signal processing and computing was triggered by the invention of the laser. Starting practically in 1960, it really took off with the introduction of the spatial-matched filter in 1964. Almost half a century later, research and engineering activity in the field continues unabated but in directions that could not have been anticipated in those early days. This paper presents an overview of the developments in the field, discussing the advantages, disadvantages, and limitations of optics in computing paradigms to indicate where and how optics can be exploited in this area. Initially, optical methods were introduced for processing analog signals. Early attempts to extend optical methods toward digital processing failed because the differences between photons and electrons were not properly appreciated. In the last part of the paper we show that some novel concepts and advanced technology may revitalize also optical processes within the digital computing world. This latter development is demonstrated by digital logic functions implemented on simple electro-optic networks. (My personal perspective on the role of optics in computing is deeply rooted in many years of collaboration with my late friend, H. John Caulfield, and I dedicate this paper to his memory.).

  14. Know Your Personal Computer

    Indian Academy of Sciences (India)

    computer with IBM PC .... read by a human and not translated by a compiler are called .... by different stages of education becomes a computer scientist. ... ancestors knew and carried out the semantic actions without question or comment.

  15. Incorporation of personal computers in a research reactor instrumentation system for data monitoring and analysis

    International Nuclear Information System (INIS)

    Leopando, L.S.

    1998-01-01

    The research contract was implemented by obtaining off-the shelf personal computer hardware and data acquisition cards, designing the interconnection with the instrumentation system, writing and debugging the software, and the assembling and testing the set-up. The hardware was designed to allow all variables monitored by the instrumentation system to be accessible to the computers, without requiring any major modification of the instrumentation system and without compromising reactor safety in any way. The computer hardware addition was also designed to have no effect on any existing function of the instrumentation system. The software was designed to implement only graphical display and automated logging of reactor variables. Additional functionality could be easily added in the future with software revision because all the reactor variables are already available in the computer. It would even be possible to ''close the loop'' and control the reactor through software. It was found that most of the effort in an undertaking of this sort will be in software development, but the job can be done even by non-computer specialized reactor people working with programming languages they are already familiar with. It was also found that the continuing rapid advance of personal computer technology makes it essential that such a project be undertaken with inevitability of future hardware upgrading in mind. The hardware techniques and the software developed may find applicability in other research reactors, especially those with a generic analog research reactor TRIGA console. (author)

  16. Application of a portable briefcase personal computer to research reactor safeguards

    International Nuclear Information System (INIS)

    Ryan, R.D.

    1985-01-01

    The Kookaburra Portable Briefcase Personal Computer (PBPC) has been applied to safeguards inspections at the HIFAR research reactor. A complete portable measuring system provides for non-destructive assay on both fresh and spent fuel. Application programs developed for the PBPC make it possible to immediately analyse the results of the measurements to verify the amounts of nuclear material declared by the operator. This contributes significantly to meeting the essential safeguards criteria of timely detection of diversion

  17. Development of expert system on personal computer for diagnosis of nuclear reactor malfunctions

    International Nuclear Information System (INIS)

    Kameyama, Takanori; Uekata, Tomomichi; Oka, Yoshiaki; Kondo, Shunsuke; Togo, Yasumasa

    1988-01-01

    An expert system on a personal computer has been developed for diagnosis of malfunction of the fast experimental reactor 'JOYO'. Prolog-KABA is used as the language. The system diagnoses the event which causes scram or set-back of the control rod after an alarm at steady state operation. The knowledge base (KB) consists of several sub-KBs and a meta-KB. Using the forward chaining, the meta-KB decides which sub-KB should be accessed. The cause of the malfunction is identified in the sub-KB using the backward chaining. The terms expressing the characteristics of the events are involved in the production rules as attributes in order to use the Prolog function of pattern matching and back-tracking for efficient inference. The total number of the rules in the system is about 400. The experiments using the plant simulator of 'JOYO' have shown that malfunctions are successfully identified by the diagnosis system. It takes about 10s for each diagnosis using the 16-bits personal computer, PC-9801 VM. (author)

  18. ANCON: A code for the evaluation of complex fault trees in personal computers

    International Nuclear Information System (INIS)

    Napoles, J.G.; Salomon, J.; Rivero, J.

    1990-01-01

    Performing probabilistic safety analysis has been recognized worldwide as one of the more effective ways for further enhancing safety of Nuclear Power Plants. The evaluation of fault trees plays a fundamental role in these analysis. Some existing limitations in RAM and execution speed of personal computers (PC) has restricted so far their use in the analysis of complex fault trees. Starting from new approaches in the data structure and other possibilities the ANCON code can evaluate complex fault trees in a PC, allowing the user to do a more comprehensive analysis of the considered system in reduced computing time

  19. x-y-recording in transmission electron microscopy. A versatile and inexpensive interface to personal computers with application to stereology.

    Science.gov (United States)

    Rickmann, M; Siklós, L; Joó, F; Wolff, J R

    1990-09-01

    An interface for IBM XT/AT-compatible computers is described which has been designed to read the actual specimen stage position of electron microscopes. The complete system consists of (i) optical incremental encoders attached to the x- and y-stage drivers of the microscope, (ii) two keypads for operator input, (iii) an interface card fitted to the bus of the personal computer, (iv) a standard configuration IBM XT (or compatible) personal computer optionally equipped with a (v) HP Graphic Language controllable colour plotter. The small size of the encoders and their connection to the stage drivers by simple ribbed belts allows an easy adaptation of the system to most electron microscopes. Operation of the interface card itself is supported by any high-level language available for personal computers. By the modular concept of these languages, the system can be customized to various applications, and no computer expertise is needed for actual operation. The present configuration offers an inexpensive attachment, which covers a wide range of applications from a simple notebook to high-resolution (200-nm) mapping of tissue. Since section coordinates can be processed in real-time, stereological estimations can be derived directly "on microscope". This is exemplified by an application in which particle numbers were determined by the disector method.

  20. Application of personal computers to study the kinetics of heterogeneous isotopic exchange

    International Nuclear Information System (INIS)

    Koernyei, Jozsef; Lakatos, Mihaly

    1985-01-01

    The kinetics of some heterogeneous isotopic exchange reactions of alkaline metal ions between solid (crystalline zirconium phosphate) and liquid phases were investigated. Ion diffusion in solid phase was considered as rate controlling step. The Laplace transformation solution of Fick's II law was used with a Sinclair ZX Spectrum personal computer. In some cases the exchange reaction should be regarded as a superposition of diffusion and a first order process. (author)

  1. Outpatient follow-up system using a personal computer for patients with hepatocellular carcinoma after surgery.

    Science.gov (United States)

    Itasaka, H; Matsumata, T; Taketomi, A; Yamamoto, K; Yanaga, K; Takenaka, K; Akazawa, K; Sugimachi, K

    1994-12-01

    A simple outpatient follow-up system was developed with a laptop personal computer to assist management of patients with hepatocellular carcinoma after hepatic resections. Since it is based on a non-relational database program and the graphical user interface of Macintosh operating system, those who are not a specialist of the computer operation can use it. It is helpful to promptly recognize current status and problems of the patients, to diagnose recurrences of the disease and to prevent lost from follow-up cases. A portability of the computer also facilitates utilization of these data everywhere, such as in clinical conferences and laboratories.

  2. Inverse kinetics equations for on line measurement of reactivity using personal computer

    International Nuclear Information System (INIS)

    Ratemi, Wajdi; El Gadamsi, Walied; Beleid, Abdul Kariem

    1993-01-01

    Computer with their astonishing speed of calculations along with their easy connection to real systems, are very appropriate for digital measurements of real system variables. In the nuclear industry, such computer application will produce compact control rooms of real power plants, where information and results display can be obtained through push button concept. In our study, we use two personal computers for the purpose of simulation and measurement. One of them is used as a digital simulator to a real reactor, where we effectively simulate the reactor power through a cross talk network. The computed power is passed at certain chosen sampling time to the other computer. The purpose of the other computer is to use the inverse kinetics equations to calculate the reactivity parameter based on the received power and then it performs on line display of the power curve and the reactivity curve using color graphics. In this study, we use the one group version of the inverse kinetics algorithm which can easily be extended to larger group version. The language of programming used in Turbo BASIC, which is very comparable, in terms of efficiency, to FORTRAN language, besides its effective graphics routines. With the use of the extended version of the Inverse Kinetics algorithm, we can effectively apply this techniques of measurement for the purpose of on line display of the reactivity of the Tajoura Research Reactor. (author)

  3. Development of personnel exposure management system with personal computer

    International Nuclear Information System (INIS)

    Yamato, Ichiro; Yamamoto, Toshiki

    1992-01-01

    In nuclear power plants, large scale personnel exposure management systems have been developed and established by utilities. Though being common in the base, the implementations are specific by plants. Contractors must control their workers' exposures by their own methods and systems. To comply with the utilities' parental systems, contractors' systems tend to differ by plants, thus make it difficult for contractors to design a standard system that is common to all relevant plants. Circumstances being as such, however, we have developed a system which is applicable to various customer utilities with minimal variations, using personal computers with database management and data communication softwares, with relatively low cost. We hope that this system will develop to the standard model for all Japanese contractors' personnel exposure management systems. (author)

  4. Design of pulse oximetry signal based on personal computer for detection oxygen saturation

    International Nuclear Information System (INIS)

    Umi Salamah; Margi Sasono

    2015-01-01

    The lack or excess of oxygen in the blood will cause healthy and body system disorder. At certain level, the disease can lead to death. For that reason, the information about oxygen saturation in blood becomes important to be identified. One of the devices used to monitor the blood oxygen saturation is pulse oximetry. This research attempt to designed Pulse Oximetry based on personal computer using red LED and infrared as its light source, while the light sensor using photodiode. The designed Pulse Oximetry is a non-invasive instrumentation which LED drivers is placed on the fingertips. The LED light goes through the finger will be a signal that is fed to the photodiode and will be converted into digital signals by ADC (Analog to Digital Converter) and will be processed further by a personal computer to display the pulse oximetry graphics. This study uses Delphi 7, Microsoft Excel, and Mt Lab as its software.This designed pulse oximetry has been tested in two peoples: sample A, male 38 years; and sample B, a woman 23 years old. Oxygen saturation of sample A is 80.75, while the sample B is 90.75. (author)

  5. 76 FR 15321 - SEDASYS Computer-Assisted Personalized Sedation System; Ethicon Endo-Surgery, Inc.'s, Petition...

    Science.gov (United States)

    2011-03-21

    ...] SEDASYS Computer-Assisted Personalized Sedation System; Ethicon Endo-Surgery, Inc.'s, Petition for Review... an advisory committee Ethicon Endo- Surgery Inc.'s (EES's), petition for review of the Agency's... Foreman, FDA, CDRH, to Ken Charak, Ethicon Endo-Surgery, Inc., containing the order denying approval of...

  6. Development of 3-D Radiosurgery Planning System Using IBM Personal Computer

    International Nuclear Information System (INIS)

    Suh, Tae Suk; Park, Charn Il; Ha, Sung Whan; Kang, Wee Saing; Suh, Doug Young; Park, Sung Hun

    1993-01-01

    Recently, stereotactic radiosurgery plan is required with the information of 3-D image and dose distribution. A project has been doing if developing LINAC based stereotactic radiosurgery since April 1991. The purpose of this research is to develop 3-D radiosurgery planning system using personal computer. The procedure of this research is based on two steps. The first step is to develop 3-D localization system, which input the image information of the patient, coordinate transformation, the position and shape of target, and patient contour into computer system using CT image and stereotactic frame. The second step is to develop 3-D dose planning system, which compute dose distribution on image plane, display on high resolution monitor both isodose distribution and patient image simultaneously and develop menu-driven planning system. This prototype of radiosurgery planning system was applied recently for several clinical cases. It was shown that our planning system is fast, accurate and efficient while making it possible to handle various kinds of image modalities such as angiography, CT and MRI. It makes it possible to develop general 3-D planning system using beam eye view or CT simulation in radiation therapy in future

  7. Analisis Perancangan PC (Personal Computer Router Proxy Untuk Menggabungkan Tiga Jalur Koneksi Di Indospeed

    Directory of Open Access Journals (Sweden)

    Bangun Harizal

    2012-05-01

    Full Text Available Router very important for computer network. To get the router can buy a router products but can also design your own using personal computers. Mikrotik is one of the router manufacturer that provides products in the form of hardware or software. If you want to pay less to design a router can use operating system Ubuntu. This operating system is open source and provided free of charge by the manufacturer. If you want to design a router with this OS can make use of personal computers are often used in homes or offices. Merging the performance of both types of routers can also be usedto cover the lack of one another. With the proxy on a local network then the use of bandwidth can be saved. Becausethere are several websites cached and stored therein if the same website is accessed by other users, the router transmits only from the proxy to the computerwhich make the request.

  8. A personal computer code for seismic evaluations of nuclear power plant facilities

    International Nuclear Information System (INIS)

    Xu, J.; Graves, H.

    1991-01-01

    In the process of review and evaluation of licensing issues related to nuclear power plants, it is essential to understand the behavior of seismic loading, foundation and structural properties and their impact on the overall structural response. In most cases, such knowledge could be obtained by using simplified engineering models which, when properly implemented, can capture the essential parameters describing the physics of the problem. Such models do not require execution on large computer systems and could be implemented through a personal computer (PC) based capability. Recognizing the need for a PC software package that can perform structural response computations required for typical licensing reviews, the US Nuclear Regulatory Commission sponsored the development of a PC operated computer software package CARES (Computer Analysis for Rapid Evaluation of Structures) system. This development was undertaken by Brookhaven National Laboratory (BNL) during FY's 1988 and 1989. A wide range of computer programs and modeling approaches are often used to justify the safety of nuclear power plants. It is often difficult to assess the validity and accuracy of the results submitted by various utilities without developing comparable computer solutions. Taken this into consideration, CARES is designed as an integrated computational system which can perform rapid evaluations of structural behavior and examine capability of nuclear power plant facilities, thus CARES may be used by the NRC to determine the validity and accuracy of analysis methodologies employed for structural safety evaluations of nuclear power plants. CARES has been designed to operate on a PC, have user friendly input/output interface, and have quick turnaround. This paper describes the various features which have been implemented into the seismic module of CARES version 1.0

  9. An external irradiation treatment planning system installed on a personal computer. 137

    International Nuclear Information System (INIS)

    Kunieda, Etso; Ogawa, Koichi; Mita, Kazumasa; Sekiguchi, Kozo; Wada, Tadashi; Hashimoto, Shyozo

    1987-01-01

    A compact and practical treatment planning system for external photon therapy has been developed for use on a desk-top personal computer. The system calculates the dose distributions of inhomogeneous density fields by using the CT-value of each pixel and displays isodose curves on the CRT superimposed on the gray scale CT image or on a hard-copy. Inhomogeneity correction is based on the TAR method where the path length from the calculation point to the surface is determined by summing up electron density derived from the CT-values of pixels on the path. Wedge filter correction is also available by using stored geometric data. The contour of patients is acquired by tracting the CT image on the light panel of the digitizer, or directly from the digital CT data. Though some critical parts of the programs are written in machine language, the system is mostly in BASIC and C languages. The minimum required hardware consists of a MS-DOS based personal computer, a color CRT display, an 8 inch floppy disk drive and a digitizer. They are generally available in Japan at reasonable cost. Tests were carried out in homogeneous and inhomogeneous density phantoms to evaluate the accuracy of the acquired dosage, and showed reasonable results compared with other commercially available treatment planning systems. The overall calculation time is satisfactory for multiple beam calculations. 5 refs.; 3 figs

  10. Usefulness and preference for tablet personal computers by medical students: are the features worth the money?

    Science.gov (United States)

    Wiese, Dawn; Atreja, Ashish; Mehta, Neil

    2008-11-06

    Tablet Personal Computers (PCs) have a huge potential in medical education due to their interactive human- computer interface and the need for anatomical diagrams, annotations, biochemistry flow charts etc. We conducted an online survey of medical students to determine their pattern of usage of the tablet features. The results revealed that the majority of medical students use the tablet features infrequently and most do not place a high value on the tablet features.

  11. A CAMAC crate controller KK009 for the Pravetz-16 and IBM PC/XT personal computers

    International Nuclear Information System (INIS)

    Georgiev, A.; Churin, I.N.

    1988-01-01

    A CAMAC crate controller and a computer bus adapter for the Pravetz 16 and IBM PC/XT personal computers are described. The following features are included in the controller: operation under program control; access to CAMAC registers treated as memory locations corresponding to given N, A, F; hardware for fast LAM processing and execution of multi-crate commands; device up to 7 crates in one CAMAC system; built-in hardware for controller and crate dataway test

  12. Computer modeling with randomized-controlled trial data informs the development of person-centered aged care homes.

    Science.gov (United States)

    Chenoweth, Lynn; Vickland, Victor; Stein-Parbury, Jane; Jeon, Yun-Hee; Kenny, Patricia; Brodaty, Henry

    2015-10-01

    To answer questions on the essential components (services, operations and resources) of a person-centered aged care home (iHome) using computer simulation. iHome was developed with AnyLogic software using extant study data obtained from 60 Australian aged care homes, 900+ clients and 700+ aged care staff. Bayesian analysis of simulated trial data will determine the influence of different iHome characteristics on care service quality and client outcomes. Interim results: A person-centered aged care home (socio-cultural context) and care/lifestyle services (interactional environment) can produce positive outcomes for aged care clients (subjective experiences) in the simulated environment. Further testing will define essential characteristics of a person-centered care home.

  13. Feedback control of plasma equilibrium with control system aided by personal computer on the JIPP T-IIU tokamak

    International Nuclear Information System (INIS)

    Tsuzuki, T.; Toi, K.; Matsuura, K.

    1991-04-01

    A feedback control system aided by a personal computer is developed to maintain plasma position on the required position in the JIPP T-IIU tokamak. The personal computer enables to adjust various control parameters easily. In this control system, a control demand for driving the power supply of feedback controlled vertical field coils is composed to be proportional to a total plasma current. This system has been successfully employed throughout the discharge where the plasma current substantially changes from zero to hundreds of kiloamperes, because the feedback control can be done, being independent of the plasma current. The analysis of this feedback control system taken into account of digital sampling agrees well with the experimental results. (author)

  14. Computerized management of radiology department: Installation and use of local area network(LAN) by personal computers

    International Nuclear Information System (INIS)

    Lee, Young Joon; Han, Kook Sang; Geon, Do Ig; Sol, Chang Hyo; Kim, Byung Soo

    1993-01-01

    There is increasing need for network connecting personal computers(PC) together. Thus local area network(LAN) emerged, which was designed to allow multiple computers to access and share multiple files and programs and expensive peripheral devices and to communicate with each user. We build PC-LAN in our department that consisted of 1) hardware-9 sets of personal computers(IBM compatible 80386 DX, 1 set; 80286 AT, 8 sets) and cables and network interface cards (Ethernet compatible, 16 bits) that connected PC and peripheral devices 2) software - network operating system and database management system. We managed this network for 6 months. The benefits of PC-LAN were 1) multiuser (share multiple files and programs, peripheral devices) 2) real data processing 3) excellent expandability and flexibility, compatibility, easy connectivity 4) single cable for networking) rapid data transmission 5) simple and easy installation and management 6) using conventional PC's software running under DOS(Disk Operating System) without transformation 7) low networking cost. In conclusion, PC-lan provides an easier and more effective way to manage multiuser database system needed at hospital departments instead of more expensive and complex network of minicomputer or mainframe

  15. A Personal Computer-Based Simulator for Nuclear-Heating Reactors

    International Nuclear Information System (INIS)

    Liu Jie; Zhang Zuoyi; Lu Dongsen; Shi Zhengang; Chen Xiaoming; Dong Yujie

    2000-01-01

    A personal computer (PC)-based simulator for nuclear-heating reactors (NHRs), PC-NHR, has been developed to provide an educational tool for understanding the design and operational characteristics of an NHR system. A general description of the reactor system as well as the technical basis for the design and operation of the heating reactor is provided. The basic models and equations for the NHR simulation are then given, which include models of the reactor core, the reactor coolant system, the containment, and the control system. The graphical user interface is described in detail to provide a manual for the user to operate the simulator properly. Steady state and several transients have been simulated. The results of PC-NHR are in good agreement with design data and the results of RETRAN-02. The real-time capability is also confirmed

  16. USER'S GUIDE TO THE PERSONAL COMPUTER VERSION OF THE BIOGENIC EMISSIONS INVENTORY SYSTEM (PC-BEIS2)

    Science.gov (United States)

    The document is a user's guide for an updated Personal Computer version of the Biogenic Emissions Inventory System (PC-BEIS2), allowing users to estimate hourly emissions of biogenic volatile organic compounds (BVOCs) and soil nitrogen oxide emissions for any county in the contig...

  17. Testing a bedside personal computer Clinical Care Classification System for nursing students using Microsoft Access.

    Science.gov (United States)

    Feeg, Veronica D; Saba, Virginia K; Feeg, Alan N

    2008-01-01

    This study tested a personal computer-based version of the Sabacare Clinical Care Classification System on students' performance of charting patient care plans. The application was designed as an inexpensive alternative to teach electronic charting for use on any laptop or personal computer with Windows and Microsoft Access. The data-based system was tested in a randomized trial with the control group using a type-in text-based-only system also mounted on a laptop at the bedside in the laboratory. Student care plans were more complete using the data-based system over the type-in text version. Students were more positive but not necessarily more efficient with the data-based system. The results demonstrate that the application is effective for improving student nursing care charting using the nursing process and capturing patient care information with a language that is standardized and ready for integration with other patient electronic health record data. It can be implemented on a bedside stand in the clinical laboratory or used to aggregate care planning over a student's clinical experience.

  18. Informatics in Radiology (infoRAD): personal computer security: part 2. Software Configuration and file protection.

    Science.gov (United States)

    Caruso, Ronald D

    2004-01-01

    Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user. Copyright RSNA, 2004

  19. Person-related determinants of TV viewing and computer time in a cohort of young Dutch adults: Who sits the most?

    NARCIS (Netherlands)

    Uijtdewilligen, L.; Singh, A.S.; Chin A Paw, M.J.M.; Twisk, J.W.R.; van Mechelen, W.

    2015-01-01

    We aimed to assess the associations of person-related factors with leisure time television (TV) viewing and computer time among young adults. We analyzed self-reported TV viewing (h/week) and leisure computer time (h/week) from 475 Dutch young adults (47% male) who had participated in the Amsterdam

  20. A computer-assisted personalized approach in an undergraduate plant physiology class

    Science.gov (United States)

    Artus; Nadler

    1999-04-01

    We used Computer-Assisted Personalized Approach (CAPA), a networked teaching and learning tool that generates computer individualized homework problem sets, in our large-enrollment introductory plant physiology course. We saw significant improvement in student examination performance with regular homework assignments, with CAPA being an effective and efficient substitute for hand-graded homework. Using CAPA, each student received a printed set of similar but individualized problems of a conceptual (qualitative) and/or quantitative nature with quality graphics. Because each set of problems is unique, students were encouraged to work together to clarify concepts but were required to do their own work for credit. Students could enter answers multiple times without penalty, and they were able to obtain immediate feedback and hints until the due date. These features increased student time on task, allowing higher course standards and student achievement in a diverse student population. CAPA handles routine tasks such as grading, recording, summarizing, and posting grades. In anonymous surveys, students indicated an overwhelming preference for homework in CAPA format, citing several features such as immediate feedback, multiple tries, and on-line accessibility as reasons for their preference. We wrote and used more than 170 problems on 17 topics in introductory plant physiology, cataloging them in a computer library for general access. Representative problems are compared and discussed.

  1. Multichannel analyzer using the direct-memory-access channel in a personal computer; Mnogokanal`nyj analizator v personal`nom komp`yutere, ispol`zuyushchij kanal pryamogo dostupa k pamyati

    Energy Technology Data Exchange (ETDEWEB)

    Georgiev, G; Vankov, I; Dimitrov, L [Incn. Yadernykh Issledovanij i Yadernoj Ehnergetiki Bolgarskoj Akademii Nuk, Sofiya (Bulgaria); Peev, I [Firma TOIVEL, Sofiya (Bulgaria)

    1996-12-31

    Paper describes a multichannel analyzer of the spectrometry data developed on the basis of a personal computer memory and a controlled channel of direct access. Analyzer software covering a driver and program of spectrum display control is studied. 2 figs.

  2. Adaptation of OCA-P, a probabilistic fracture-mechanics code, to a personal computer

    International Nuclear Information System (INIS)

    Ball, D.G.; Cheverton, R.D.

    1985-01-01

    The OCA-P probabilistic fracture-mechanics code can now be executed on a personal computer with 512 kilobytes of memory, a math coprocessor, and a hard disk. A user's guide for the particular adaptation has been prepared, and additional importance sampling techniques for OCA-P have been developed that allow the sampling of only the tails of selected distributions. Features have also been added to OCA-P that permit RTNDT to be used as an ''independent'' variable in the calculation of P

  3. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false IEEE 1680 Standard for the... CONTRACT CLAUSES Text of Provisions and Clauses 52.223-16 IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products. As prescribed in 23.706(b)(1), insert the following clause: IEEE...

  4. A PC [personal computer]-based version of KENO V.a

    International Nuclear Information System (INIS)

    Nigg, D.A.; Atkinson, C.A.; Briggs, J.B.; Taylor, J.T.

    1990-01-01

    The use of personal computers (PCs) and engineering workstations for complex scientific computations has expanded rapidly in the last few years. This trend is expected to continue in the future with the introduction of increasingly sophisticated microprocessors and microcomputer systems. For a number of reasons, including security, economy, user convenience, and productivity, an integrated system of neutronics and radiation transport software suitable for operation in an IBM PC-class environment has been under development at the Idaho National Engineering Laboratory (INEL) for the past 3 yr. Nuclear cross-section data and resonance parameters are preprocessed from the Evaluated Nuclear Data Files Version 5 (ENDF/B-V) and supplied in a form suitable for use in a PC-based spectrum calculation and multigroup cross-section generation module. This module produces application-specific data libraries that can then be used in various neutron transport and diffusion theory code modules. This paper discusses several details of the Monte Carlo criticality module, which is based on the well-known highly-sophisticated KENO V.a package developed at Oak Ridge National Laboratory and previously released in mainframe form by the Radiation Shielding Information Center (RSIC). The conversion process and a variety of benchmarking results are described

  5. Geophysical data collection using an interactive personal computer system. Part 1. ; Experimental monitoring of Suwanosejima volcano

    Energy Technology Data Exchange (ETDEWEB)

    Iguchi, M. (Kyoto Univerdity, Kyoto (Japan). Disaster Prevention Reserach Institute)

    1991-10-15

    In the article, a computer-communication system was developed in order to collect geophysical data from remote volcanos via a public telephpne network. This system is composed of a host presonal computer at an observatory and several personal computers as terminals at remote stations. Each terminal acquires geophysical data, such as seismic, intrasonic, and ground deformation date. These gara are stored in the terminals temporarily, and transmitted to the host computer upon command from host computer. Experimental monitoring was conducted between Sakurajima Volcanological Observatory and several statins in the Satsunan Islands and southern Kyushu. The seismic and eruptive activities of Suwanosejima volcano were monitored by this system. Consequently, earthquakes and air-shocks accompanied by the explosive activity were observed. B-type earthquakes occurred prio to the relatively prolonged eruptive activity. Intermittent occurrences of volcanic tremors were also clearly recognized from the change in mean amplitubes of seismic waves. 7 refs., 10 figs., 2 tabs.

  6. A dual-parameter multichannel analyzer using a personal computer

    International Nuclear Information System (INIS)

    Akimoto, T.; Murai, I.; Chaki, S.; Ogawa, Y.; Shoji, I.

    1989-01-01

    The design of a practical system for measuring two-parameter signals is reported. To obtain constantly changing energy spectra of nuclear reactor assemblies due to repeated insertion of pulsed neutron sources, the simultaneous acquisition of time and energy data are needed. A computer-based dual-parameter multichannel pulse-height analyzer (MCA) has been developed; it employs a personal computer, two analog-to-digital converters (ADC's), and a parallel interface board for handling these signals. The system showed excellent performance characteristics with a minimum data processing time of about 14 μs; a maximum conversion gain of 2 18 channels (for example, 512 x 512 ch); a count capacity of 2 32 -1/ch(2 16 -1/ch at 512 x 512 ch); and the time required for graphic display of approximately 3 s/2 16 dots (contour display) or about 0.1 s/(2 16 /16) dots (isometric display). Large data arrays were handled dynamically with a segment register. The data processing speed was improved by transferring the data from the ADC to the central processing unit (CPU) in 16-bit words and simultaneously reading the status flag and the data. The graphic display process was speeded up by writing the data bit corresponding to the locations directly into the graphic video random access memory (VRAM). The system is simple to operate, and by changing the memory size and coincidence resolution time by software operations, it is highly flexible

  7. PC-BEIS: a personal computer version of the biogenic emissions inventory system

    International Nuclear Information System (INIS)

    Pierce, T.E.; Waldruff, P.S.

    1991-01-01

    The US Environmental Protection Agency's Biogenic Emissions Inventory System (BEIS) has been adapted for use on IBM-compatible personal computers (PCs). PC-BEIS estimates hourly emissions of isoprene, α-pinene, other monoterpenes, and unidentified hydrocarbons for any county in the contiguous United States. To run the program, users must provide hourly data on ambient temperature, relative humidity, wind speed, cloud cover, and a code that identifies the particular county. This paper provides an overview of the method used to calculate biogenic emissions, shows an example application, and gives information on how to obtain a copy of the program

  8. GAMCAT - a personal computer database on alpha particles and gamma rays from radioactive decay

    International Nuclear Information System (INIS)

    Tepel, J.W.; Mueller, H.W.

    1990-01-01

    The GAMCAT database is a compilation of data describing the alpha particles and gamma rays that occur in the radioactive decay of all known nuclides, adapted for IBM Personal Computers and compatible systems. These compiled data have been previously published, and are now available as a compact database. Entries can be retrieved by defining the properties of the parent nuclei as well as alpha-particle and gamma-ray energies or any combination of these parameters. The system provides fast access to the data and has been completely written in C to run on an AT-compatible computer, with a hard disk and 640K of memory under DOS 2.11 or higher. GAMCAT is available from the Fachinformationszentrum Karlsruhe. (orig.)

  9. Application of personal computers to enhance operation and management of research reactors. Proceedings of a final research co-ordination meeting

    International Nuclear Information System (INIS)

    1998-02-01

    The on-line of personal computers (PCs) can be valuable to guide the research reactor operator in analysing both normal and abnormal situations. PCs can effectively be used for data acquisition and data processing, and providing information to the operator. Typical areas of on-line applications of PCs in nuclear research reactors include: Acquisition and display of data on process parameters; performance evaluation of major equipment and safety related components; fuel management; computation of reactor physics parameters; failed fuel detection and location; inventory of system fluids; training using computer aided simulation; operator advice. All these applications require the development of computer programmes and interface hardware. In recognizing this need, the IAEA initiated in 1990 a Co-ordinated Research Programme (CRP) on ''Application of Personal Computers to Enhance Operation and Management of Research Reactors''. The final meeting of the CRP was held from 30 October to 3 November 1995 in Dalata Viet Nam. This report was written by contributors from Bangladesh, Germany, India, the Republic of Korea, Pakistan, Philippines, Thailand and Viet Nam. The IAEA staff members responsible for the publication were K. Akhtar and V. Dimic of the Physics Section, Division of Physical and Chemical Sciences

  10. Comparison of Knowledge and Attitudes Using Computer-Based and Face-to-Face Personal Hygiene Training Methods in Food Processing Facilities

    Science.gov (United States)

    Fenton, Ginger D.; LaBorde, Luke F.; Radhakrishna, Rama B.; Brown, J. Lynne; Cutter, Catherine N.

    2006-01-01

    Computer-based training is increasingly favored by food companies for training workers due to convenience, self-pacing ability, and ease of use. The objectives of this study were to determine if personal hygiene training, offered through a computer-based method, is as effective as a face-to-face method in knowledge acquisition and improved…

  11. Image-based surveillance and security systems using personal computers for device aiming and digital image comparison

    International Nuclear Information System (INIS)

    Quiett, S.; Axtell, L.H.

    1987-01-01

    A detection-type security system using enhanced capability cameras or other imaging devices can aid in maintaining security from long distance and/or for large areas. To do so requires that the imaging device(s) be repeatedly and accurately positioned so that no areas are overlooked. Digital control using personal computers is the simplest method of achieving positional accuracy. The monitoring of large areas and/or a large number of areas also requires that a substantial quantity of visual information be catalogued and evaluated for potential security problems. While security personnel alone are typically used for such monitoring, as the quantity of visual information increases, the likelihood that potential security threats will be missed also increases. The ability of an image-based security system to detect potential security problems can be further increased with the use of selected image processing techniques. Utilizing personal computers for both imaging device position control as well as image processing, surveillance of large areas can be performed by a limited number of individuals with a high level of system confidence

  12. Application of a brain-computer interface for person authentication using EEG responses to photo stimuli.

    Science.gov (United States)

    Mu, Zhendong; Yin, Jinhai; Hu, Jianfeng

    2018-01-01

    In this paper, a person authentication system that can effectively identify individuals by generating unique electroencephalogram signal features in response to self-face and non-self-face photos is presented. In order to achieve a good stability performance, the sequence of self-face photo including first-occurrence position and non-first-occurrence position are taken into account in the serial occurrence of visual stimuli. In addition, a Fisher linear classification method and event-related potential technique for feature analysis is adapted to yield remarkably better outcomes than that by most of the existing methods in the field. The results have shown that the EEG-based person authentications via brain-computer interface can be considered as a suitable approach for biometric authentication system.

  13. Neutron shielding point kernel integral calculation code for personal computer: PKN-pc

    International Nuclear Information System (INIS)

    Kotegawa, Hiroshi; Sakamoto, Yukio; Nakane, Yoshihiro; Tomita, Ken-ichi; Kurosawa, Naohiro.

    1994-07-01

    A personal computer version of PKN code, PKN-pc, has been developed to calculate neutron and secondary gamma-ray 1cm depth dose equivalents in water, ordinary concrete and iron for neutron source. Characteristics of PKN code are, to able to calculate dose equivalents in multi-layer three-dimensional system, which are described with two-dimensional surface, for monoenergetic neutron source from 0.01 to 14.9 MeV, 252 Cf fission and 241 Am-Be neutron source quick and easily. In addition to these features, the PKN-pc is possible to process interactive input and to get graphical system configuration and graphical results easily. (author)

  14. Rater reliability and concurrent validity of the Keyboard Personal Computer Style instrument (K-PeCS).

    Science.gov (United States)

    Baker, Nancy A; Cook, James R; Redfern, Mark S

    2009-01-01

    This paper describes the inter-rater and intra-rater reliability, and the concurrent validity of an observational instrument, the Keyboard Personal Computer Style instrument (K-PeCS), which assesses stereotypical postures and movements associated with computer keyboard use. Three trained raters independently rated the video clips of 45 computer keyboard users to ascertain inter-rater reliability, and then re-rated a sub-sample of 15 video clips to ascertain intra-rater reliability. Concurrent validity was assessed by comparing the ratings obtained using the K-PeCS to scores developed from a 3D motion analysis system. The overall K-PeCS had excellent reliability [inter-rater: intra-class correlation coefficients (ICC)=.90; intra-rater: ICC=.92]. Most individual items on the K-PeCS had from good to excellent reliability, although six items fell below ICC=.75. Those K-PeCS items that were assessed for concurrent validity compared favorably to the motion analysis data for all but two items. These results suggest that most items on the K-PeCS can be used to reliably document computer keyboarding style.

  15. On-line use of personal computers to monitor and evaluate important parameters in the research reactor DHRUVA

    International Nuclear Information System (INIS)

    Sharma, S.K.; Sengupta, S.N.; Darbhe, M.D.; Agarwal, S.K.

    1998-01-01

    The on-line use of Personal Computers in research reactors, with custom made applications for aiding the operators in analysing plant conditions under normal and abnormal situations, has become extremely popular. A system has been developed to monitor and evaluate important parameters for the research reactor DHRUVA, a 100 MW research reactor located at the Bhabha Atomic Research Centre, Trombay. The system was essentially designed for on-line computation of the following parameters: reactor thermal power, reactivity load due to Xenon, core reactivity balance and performance monitoring of shut-down devices. Apart from the on-line applications, the system has also been developed to cater some off-line applications with Local Area Network in the Dhruva complex. The microprocessor based system is designed to function as an independent unit, parallel dumping the acquired data to a PC for application programmes. The user interface on the personal computer is menu driven application software written in 'C' language. The main input parameters required for carrying out the options given in the above menu are: Reactor power, Moderator level, Coolant inlet temperature to the core, Secondary coolant flow rate, temperature rise of secondary coolant across the heat exchangers, heavy water level in the Dump tank and Drop time of individual shut off rods. (author)

  16. Your digital home is no longer your castle: how cloud computing transforms the (legal) relationship between individuals and their personal records

    NARCIS (Netherlands)

    Irion, K.

    2015-01-01

    In line with the overall trend individuals’ personal affairs, too, are composed of digital records to an increasing amount. At about the same time, the era of local storage in end-user equipment is about to give way to remote computing where data resides on third party equipment (cloud computing).

  17. SHEAT for PC. A computer code for probabilistic seismic hazard analysis for personal computer, user's manual

    International Nuclear Information System (INIS)

    Yamada, Hiroyuki; Tsutsumi, Hideaki; Ebisawa, Katsumi; Suzuki, Masahide

    2002-03-01

    The SHEAT code developed at Japan Atomic Energy Research Institute is for probabilistic seismic hazard analysis which is one of the tasks needed for seismic Probabilistic Safety Assessment (PSA) of a nuclear power plant. At first, SHEAT was developed as the large sized computer version. In addition, a personal computer version was provided to improve operation efficiency and generality of this code in 2001. It is possible to perform the earthquake hazard analysis, display and the print functions with the Graphical User Interface. With the SHEAT for PC code, seismic hazard which is defined as an annual exceedance frequency of occurrence of earthquake ground motions at various levels of intensity at a given site is calculated by the following two steps as is done with the large sized computer. One is the modeling of earthquake generation around a site. Future earthquake generation (locations, magnitudes and frequencies of postulated earthquake) is modeled based on the historical earthquake records, active fault data and expert judgment. Another is the calculation of probabilistic seismic hazard at the site. An earthquake ground motion is calculated for each postulated earthquake using an attenuation model taking into account its standard deviation. Then the seismic hazard at the site is calculated by summing the frequencies of ground motions by all the earthquakes. This document is the user's manual of the SHEAT for PC code. It includes: (1) Outline of the code, which include overall concept, logical process, code structure, data file used and special characteristics of code, (2) Functions of subprogram and analytical models in them, (3) Guidance of input and output data, (4) Sample run result, and (5) Operational manual. (author)

  18. Pediatric personalized CT-dosimetry Monte Carlo simulations, using computational phantoms

    International Nuclear Information System (INIS)

    Papadimitroulas, P; Kagadis, G C; Ploussi, A; Kordolaimi, S; Papamichail, D; Karavasilis, E; Syrgiamiotis, V; Loudos, G

    2015-01-01

    The last 40 years Monte Carlo (MC) simulations serve as a “gold standard” tool for a wide range of applications in the field of medical physics and tend to be essential in daily clinical practice. Regarding diagnostic imaging applications, such as computed tomography (CT), the assessment of deposited energy is of high interest, so as to better analyze the risks and the benefits of the procedure. The last few years a big effort is done towards personalized dosimetry, especially in pediatric applications. In the present study the GATE toolkit was used and computational pediatric phantoms have been modeled for the assessment of CT examinations dosimetry. The pediatric models used come from the XCAT and IT'IS series. The X-ray spectrum of a Brightspeed CT scanner was simulated and validated with experimental data. Specifically, a DCT-10 ionization chamber was irradiated twice using 120 kVp with 100 mAs and 200 mAs, for 1 sec in 1 central axial slice (thickness = 10mm). The absorbed dose was measured in air resulting in differences lower than 4% between the experimental and simulated data. The simulations were acquired using ∼10 10 number of primaries in order to achieve low statistical uncertainties. Dose maps were also saved for quantification of the absorbed dose in several children critical organs during CT acquisition. (paper)

  19. Image viewing station for MR and SPECT : using personal computer

    International Nuclear Information System (INIS)

    Yim, Byung Il; Jeong, Eun Kee; Suh, Jin Suck; Kim, Myeong Joon

    1996-01-01

    Macro language was programmed to analyze and process on Macintosh personal computers, GEMR images digitally transferred from the MR main computer, with special interest in the interpretation of information such as patients data and imaging parameters under each image header. By this method, raw data(files) of certain patients may be digitally stored on a hard disk or CD ROM, and the quantitative analysis, interpretation and display is possible. Patients and images were randomly selected 4.X MR images were transferred through FTP using the ethernet network. 5.X and SPECT images were transferred using floppy diskettes. To process transferred images, an freely distributed software for Macintosh namely NIH Image, with its macro language, was used to import images and translate header information. To identify necessary information, a separate window named I nfo=txt , was made for each image series. MacLC, Centris650, and PowerMac6100/CD, 7100/CD, 8100/CD models with 256 color and RAM over 8Mbyte were used. Different versions of MR images and SPECT images were displayed simultaneously and a separate window named 'info-txt' was used to show all necessary information(name of the patient, unit number, date, TR, TE, FOV etc.). Additional information(diagnosis, pathologic report etc.) was stored in another text box in 'info-txt'. The size of the file for each image plane was about 149Kbytes and the images were stored in a step-like file folders. 4.X and 5.X GE Signa 1.5T images were successfully processed with Macintosh computer and NIH Image. This result may be applied to many fields and there is hope of a broader area of application with the linkage of NIH Image and a database program

  20. A personal computer based console monitor for a TRIGA reactor

    International Nuclear Information System (INIS)

    Rieke, Phillip E.; Hood, William E.; Razvi, Junaid

    1990-01-01

    Numerous improvements have been made to the Mark F facility to provide a minimum reactor down time, giving a high reactor availability. A program was undertaken to enhance the monitoring capabilities of the instrumentation and control system on this reactor. To that end, a personal computer based console monitoring system has been developed, installed in the control room and is operational to provide real-time monitoring and display of a variety of reactor operating parameters. This system is based on commercially available hardware and an applications software package developed internally at the GA facility. It has (a) assisted the operator in controlling reactor parameters to maintain the high degree of power stability required during extended runs with thermionic devices in-core, and (b) provided data trending and archiving capabilities on all monitored channels to allow a post-mortem analysis to be performed on any of the monitored parameters

  1. A Computer-Assisted Personalized Approach in an Undergraduate Plant Physiology Class1

    Science.gov (United States)

    Artus, Nancy N.; Nadler, Kenneth D.

    1999-01-01

    We used Computer-Assisted Personalized Approach (CAPA), a networked teaching and learning tool that generates computer individualized homework problem sets, in our large-enrollment introductory plant physiology course. We saw significant improvement in student examination performance with regular homework assignments, with CAPA being an effective and efficient substitute for hand-graded homework. Using CAPA, each student received a printed set of similar but individualized problems of a conceptual (qualitative) and/or quantitative nature with quality graphics. Because each set of problems is unique, students were encouraged to work together to clarify concepts but were required to do their own work for credit. Students could enter answers multiple times without penalty, and they were able to obtain immediate feedback and hints until the due date. These features increased student time on task, allowing higher course standards and student achievement in a diverse student population. CAPA handles routine tasks such as grading, recording, summarizing, and posting grades. In anonymous surveys, students indicated an overwhelming preference for homework in CAPA format, citing several features such as immediate feedback, multiple tries, and on-line accessibility as reasons for their preference. We wrote and used more than 170 problems on 17 topics in introductory plant physiology, cataloging them in a computer library for general access. Representative problems are compared and discussed. PMID:10198076

  2. Sensory emission rates from personal computers and television sets

    DEFF Research Database (Denmark)

    Wargocki, Pawel; Bako-Biro, Zsolt; Baginska, S.

    2003-01-01

    Sensory emissions from personal computers (PCs), PC monitors + PC towers, and television sets (TVs) having been in operation for 50, 400 and 600 h were assessed by a panel of 48 subjects. One brand of PC tower and four brands of PC monitors were tested. Within each brand, cathode-ray tube (CRT......) and thin-flat-transistor (TFT) monitors were selected. Two brands of TVs were tested. All brands are prevalent on the world market. The assessments were conducted in low-polluting 40 m3 test offices ventilated with a constant outdoor air change rate of 1.3 ± 0.2 h–1 corresponding to 7 L/s per PC or TV...... with two units placed at a time in the test offices; air temperature was controlled at 22 ± 0.1°C and relative humidity at 41 ± 0.5%. The subjects entered the offices individually and immediately assessed the air quality. They did not see the PCs or TVs that were placed behind a screen and were...

  3. Evaluating Students' Programming Skill Behaviour and Personalizing Their Computer Learning Environment Using "The Hour of Code" Paradigm

    Science.gov (United States)

    Mallios, Nikolaos; Vassilakopoulos, Michael Gr.

    2015-01-01

    One of the most intriguing objectives when teaching computer science in mid-adolescence high school students is attracting and mainly maintaining their concentration within the limits of the class. A number of theories have been proposed and numerous methodologies have been applied, aiming to assist in the implementation of a personalized learning…

  4. Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer

    Science.gov (United States)

    Mannan, Mohammad; van Oorschot, P. C.

    Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users' financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a user's long-term secret input from (typically untrusted) client PCs; a client PC performs most computations but has access only to temporary secrets. The user's long-term secret (typically short and low-entropy) is input through an independent personal trusted device such as a cellphone. The personal device provides a user's long-term secrets to a client PC only after encrypting the secrets using a pre-installed, "correct" public key of a remote service (the intended recipient of the secrets). The proposed protocol (MP-Auth) realizes such an approach, and is intended to safeguard passwords from keyloggers, other malware (including rootkits), phishing attacks and pharming, as well as to provide transaction security to foil session hijacking. We report on a prototype implementation of MP-Auth, and provide a comparison of web authentication techniques that use an additional factor of authentication (e.g. a cellphone, PDA or hardware token).

  5. Resource Guide for Persons with Learning Impairments.

    Science.gov (United States)

    IBM, Atlanta, GA. National Support Center for Persons with Disabilities.

    The resource guide identifies products which assist learning disabled and mentally retarded individuals in accessing IBM (International Business Machine) Personal Computers or the IBM Personal System/2 family of products. An introduction provides a general overview of ways computers can help learning disabled or retarded persons. The document then…

  6. Effects of pollution from personal computers on perceived air quality, SBS symptoms and productivity in offices

    DEFF Research Database (Denmark)

    Bako-Biro, Zsolt; Wargocki, Pawel; Weschler, Charles J.

    2004-01-01

    In groups of six, 30 female subjects were exposed for 4.8 h in a low-polluting office to each of two conditions the presence or absence of 3-month-old personal computers (PCs). These PCs were placed behind a screen so that they were not visible to the subjects. Throughout the exposure the outdoor...... air supply was maintained at 10 l/s per person. Under each of the two conditions the subjects performed simulated office work using old low-polluting PCs. They also evaluated the air quality and reported Sick Building Syndrome (SBS) symptoms. The PCs were found to be strong indoor pollution sources......, even after they had been in service for 3 months. The sensory pollution load of each PC was 3.4 olf, more than three times the pollution of a standard person. The presence of PCs increased the percentage of people dissatisfied with the perceived air quality from 13 to 41% and increased by 9% the time...

  7. DATA TRANSFER FROM A DEC PDP-11 BASED MASS-SPECTROMETRY DATA STATION TO AN MS-DOS PERSONAL-COMPUTER

    NARCIS (Netherlands)

    RAFFAELLI, A; BRUINS, AP

    This paper describes a simple procedure for obtaining better quality graphic output for mass spectrometry data from data systems equipped with poor quality printing devices. The procedure uses KERMIT, a low cost public domain software, to transfer ASCII tables to a MS-DOS personal computer where

  8. Personality Questionnaires as a Basis for Improvement of University Courses in Applied Computer Science and Informatics

    Directory of Open Access Journals (Sweden)

    Vladimir Ivančević

    2017-07-01

    Full Text Available In this paper, we lay the foundation for an adaptation of the teaching process to the personality traits and academic performance of the university students enrolled in applied computer science and informatics (ACSI. We discuss how such an adaptation could be supported by an analytical software solution and present the initial version of this solution. In the form of a case study, we discuss the scores from a personality questionnaire that was administered to a group of university students enrolled in an introductory programming course at the Faculty of Technical Sciences, University of Novi Sad, Serbia. During a non-mandatory workshop on programming, the participants completed the 48-item short-scale Eysenck Personality Questionnaire–Revised (EPQ– R. By using various exploratory and analytical techniques, we inspect the student EPQ–R scores and elaborate on the specificities of the participating student group. As part of our efforts to understand the broader relevance of different student personality traits in an academic environment, we also discuss how the EPQ–R scores of students could provide information valuable to the process of improving student learning and performance in university courses in ACSI.

  9. STAPRE and SCAT2. Statistical pre-equilibrium and optical nuclear model code for Personal Computer IBM/AT

    International Nuclear Information System (INIS)

    Goulo, V.G.

    1988-01-01

    This document describes the content of the diskettes with nuclear data production codes SCAT2 and STAPRE and the example data set for implementing and testing of these codes for personal computers IBM/AT. They are available on two diskettes, free fo charge, upon request from the NEA Data Bank, Saclay, France. (author). 4 refs, 1 fig

  10. Internet Use for Health-Related Information via Personal Computers and Cell Phones in Japan: A Cross-Sectional Population-Based Survey

    Science.gov (United States)

    Takahashi, Yoshimitsu; Ohura, Tomoko; Ishizaki, Tatsuro; Okamoto, Shigeru; Miki, Kenji; Naito, Mariko; Akamatsu, Rie; Sugimori, Hiroki; Yoshiike, Nobuo; Miyaki, Koichi; Shimbo, Takuro

    2011-01-01

    Background The Internet is known to be used for health purposes by the general public all over the world. However, little is known about the use of, attitudes toward, and activities regarding eHealth among the Japanese population. Objectives This study aimed to measure the prevalence of Internet use for health-related information compared with other sources, and to examine the effects on user knowledge, attitudes, and activities with regard to Internet use for health-related information in Japan. We examined the extent of use via personal computers and cell phones. Methods We conducted a cross-sectional survey of a quasi-representative sample (N = 1200) of the Japanese general population aged 15–79 years in September 2007. The main outcome measures were (1) self-reported rates of Internet use in the past year to acquire health-related information and to contact health professionals, family, friends, and peers specifically for health-related purposes, and (2) perceived effects of Internet use on health care. Results The prevalence of Internet use via personal computer for acquiring health-related information was 23.8% (286/1200) among those surveyed, whereas the prevalence via cell phone was 6% (77). Internet use via both personal computer and cell phone for communicating with health professionals, family, friends, or peers was not common. The Internet was used via personal computer for acquiring health-related information primarily by younger people, people with higher education levels, and people with higher household incomes. The majority of those who used the Internet for health care purposes responded that the Internet improved their knowledge or affected their lifestyle attitude, and that they felt confident in the health-related information they obtained from the Internet. However, less than one-quarter thought it improved their ability to manage their health or affected their health-related activities. Conclusions Japanese moderately used the Internet via

  11. Internet use for health-related information via personal computers and cell phones in Japan: a cross-sectional population-based survey.

    Science.gov (United States)

    Takahashi, Yoshimitsu; Ohura, Tomoko; Ishizaki, Tatsuro; Okamoto, Shigeru; Miki, Kenji; Naito, Mariko; Akamatsu, Rie; Sugimori, Hiroki; Yoshiike, Nobuo; Miyaki, Koichi; Shimbo, Takuro; Nakayama, Takeo

    2011-12-14

    The Internet is known to be used for health purposes by the general public all over the world. However, little is known about the use of, attitudes toward, and activities regarding eHealth among the Japanese population. This study aimed to measure the prevalence of Internet use for health-related information compared with other sources, and to examine the effects on user knowledge, attitudes, and activities with regard to Internet use for health-related information in Japan. We examined the extent of use via personal computers and cell phones. We conducted a cross-sectional survey of a quasi-representative sample (N = 1200) of the Japanese general population aged 15-79 years in September 2007. The main outcome measures were (1) self-reported rates of Internet use in the past year to acquire health-related information and to contact health professionals, family, friends, and peers specifically for health-related purposes, and (2) perceived effects of Internet use on health care. The prevalence of Internet use via personal computer for acquiring health-related information was 23.8% (286/1200) among those surveyed, whereas the prevalence via cell phone was 6% (77). Internet use via both personal computer and cell phone for communicating with health professionals, family, friends, or peers was not common. The Internet was used via personal computer for acquiring health-related information primarily by younger people, people with higher education levels, and people with higher household incomes. The majority of those who used the Internet for health care purposes responded that the Internet improved their knowledge or affected their lifestyle attitude, and that they felt confident in the health-related information they obtained from the Internet. However, less than one-quarter thought it improved their ability to manage their health or affected their health-related activities. Japanese moderately used the Internet via personal computers for health purposes, and rarely

  12. Person Recognition in Social Media Photos

    OpenAIRE

    Oh, Seong Joon; Benenson, Rodrigo; Fritz, Mario; Schiele, Bernt

    2017-01-01

    People nowadays share large parts of their personal lives through social media. Being able to automatically recognise people in personal photos may greatly enhance user convenience by easing photo album organisation. For human identification task, however, traditional focus of computer vision has been face recognition and pedestrian re-identification. Person recognition in social media photos sets new challenges for computer vision, including non-cooperative subjects (e.g. backward viewpoints...

  13. [Realistic possibilities of utilization of a personal computer in the office of a general practitioner].

    Science.gov (United States)

    Masopust, V

    1991-04-01

    In May 1990 work on the programme "Computer system of the health community doctor Mic DOKI was" completed which resolves more than 70 basic tasks pertaining to the keeping of health documentation by health community doctors; it resolves automatically the entire administrative work in the health community, makes it possible to evaluate the activity of doctors and nurses it will facilitate the work of control organs of future health insurance companies and contribute to investigations of the health status of the population. Despite some problems ensuing from the contemporary economic situation of the country, the validity of contemporary health regulations and minimal training of our health personnel in the use of personal computers computerization of the health community system can be considered an asset to the reform of the health services which is under way.

  14. PRO/Mapper: a plotting program for the DEC PRO/300 personal computers utilizing the MAPPER graphics language

    International Nuclear Information System (INIS)

    Wachter, J.W.

    1986-05-01

    PRO/Mapper is an application for the Digital Equipment Corporation PRO/300 series of personal computers that facilitates the preparation of visuals such as graphs, charts, and maps in color or black and white. The user prepares an input data file containing English-language commands and writes it into a file using standard editor. PRO/Mapper then reads these files and draws graphs, maps, boxes, and complex line segments onto the computer screen. Axes, curves, and error bars may be plotted in graphical presentations. The commands of PRO/Mapper are a subset of the commands of the more sophisticated MAPPER program written for mainframe computers. The PRO/Mapper commands were chosen primarily for the production of linear graphs. Command files written for the PRO/300 are upward compatible with the Martin Marietta Energy Systems version of MAPPER and can be used to produce publication-quality slides, drawings, and maps on the various output devices of the Oak Ridge National Laboratory mainframe computers

  15. An Introduction to Parallel Cluster Computing Using PVM for Computer Modeling and Simulation of Engineering Problems

    International Nuclear Information System (INIS)

    Spencer, VN

    2001-01-01

    An investigation has been conducted regarding the ability of clustered personal computers to improve the performance of executing software simulations for solving engineering problems. The power and utility of personal computers continues to grow exponentially through advances in computing capabilities such as newer microprocessors, advances in microchip technologies, electronic packaging, and cost effective gigabyte-size hard drive capacity. Many engineering problems require significant computing power. Therefore, the computation has to be done by high-performance computer systems that cost millions of dollars and need gigabytes of memory to complete the task. Alternately, it is feasible to provide adequate computing in the form of clustered personal computers. This method cuts the cost and size by linking (clustering) personal computers together across a network. Clusters also have the advantage that they can be used as stand-alone computers when they are not operating as a parallel computer. Parallel computing software to exploit clusters is available for computer operating systems like Unix, Windows NT, or Linux. This project concentrates on the use of Windows NT, and the Parallel Virtual Machine (PVM) system to solve an engineering dynamics problem in Fortran

  16. A fast reactor transient analysis methodology for personal computers

    International Nuclear Information System (INIS)

    Ott, K.O.

    1993-01-01

    A simplified model for a liquid-metal-cooled reactor (LMR) transient analysis, in which point kinetics as well as lumped descriptions of the heat transfer equations in all components are applied, is converted from a differential into an integral formulation. All 30 differential balance equations are implicitly solved in terms of convolution integrals. The prompt jump approximation is applied as the strong negative feedback effectively keeps the net reactivity well below prompt critical. After implicit finite differencing of the convolution integrals, the kinetics equation assumes a new form, i.e., the quadratic dynamics equation. In this integral formulation, the initial value problem of typical LMR transients can be solved with large item steps (initially 1 s, later up to 256 s). This then makes transient problems amenable to a treatment on personal computer. The resulting mathematical model forms the basis for the GW-BASIC program LMR transient calculation (LTC) program. The LTC program has also been converted to QuickBASIC. The running time for a 10-h transient overpower transient is then ∼40 to 10 s, depending on the hardware version (286, 386, or 486 with math coprocessors)

  17. Relearning and Retaining Personally-Relevant Words using Computer-Based Flashcard Software in Primary Progressive Aphasia

    Directory of Open Access Journals (Sweden)

    William Streicher Evans

    2016-11-01

    Full Text Available Although anomia treatments have often focused on training small sets of words in the hopes of promoting generalization to untrained items, an alternative is to directly train a larger set of words more efficiently. The current case report study reports on a novel treatment for a patient with semantic variant Primary Progressive Aphasia (svPPA, in which the patient was taught to make and practice flashcards for personally-relevant words using an open-source computer program (Anki. Results show that the patient was able to relearn and retain a large subset of her studied words over a 20-month period. At the end of treatment, she showed good retention for 139 studied words, far more than the number typically treated in svPPA studies. Furthermore, she showed evidence of stimulus generalization to confrontation-naming tasks for studied items, and of relearning forgotten items with additional practice. This case represents a successful example of patient-centered computer-based asynchronous telepractice. It also illustrates how data captured from computer-based treatments can provide powerful practice-based evidence, obtained during routine clinical care.

  18. Design and construction the identification of nitriding plasma process parameters using personal computer based on serial communication

    International Nuclear Information System (INIS)

    Frida Iswinning Diah; Slamet Santosa

    2012-01-01

    Design and construction the identification of process parameters using personal computer based on serial communication PLC M-series has been done. The function of this device is to identify the process parameters of a system (plan), to which then be analyzed and conducted a follow-up given to the plan by the user. The main component of this device is the M-Series T100MD1616 PLC and personal computer (PC). In this device the data plan parameters obtained from the corresponding sensor outputs in the form of voltage or current. While the analog parameter data is adjusted to the ADC analog input of the PLC using a signal conditioning system. Then, as the parameter is processed by the PLC then sent to a PC via RS232 to be displayed in the form of graphs or tables and stored in the database. Software to program the database is created using Visual Basic Programming V-6. The device operation test is performed for the measurement of temperature parameter and vacuum level on the plasma nitriding machine. The results indicate that the device has functioning as an identification device parameters process of plasma nitriding machine. (author)

  19. Computer-Based Training in Eating and Nutrition Facilitates Person-Centered Hospital Care: A Group Concept Mapping Study.

    Science.gov (United States)

    Westergren, Albert; Edfors, Ellinor; Norberg, Erika; Stubbendorff, Anna; Hedin, Gita; Wetterstrand, Martin; Rosas, Scott R; Hagell, Peter

    2018-04-01

    Studies have shown that computer-based training in eating and nutrition for hospital nursing staff increased the likelihood that patients at risk of undernutrition would receive nutritional interventions. This article seeks to provide understanding from the perspective of nursing staff of conceptually important areas for computer-based nutritional training, and their relative importance to nutritional care, following completion of the training. Group concept mapping, an integrated qualitative and quantitative methodology, was used to conceptualize important factors relating to the training experiences through four focus groups (n = 43), statement sorting (n = 38), and importance rating (n = 32), followed by multidimensional scaling and cluster analysis. Sorting of 38 statements yielded four clusters. These clusters (number of statements) were as follows: personal competence and development (10), practice close care development (10), patient safety (9), and awareness about the nutrition care process (9). First and second clusters represented "the learning organization," and third and fourth represented "quality improvement." These findings provide a conceptual basis for understanding the importance of training in eating and nutrition, which contributes to a learning organization and quality improvement, and can be linked to and facilitates person-centered nutritional care and patient safety.

  20. Dynamic leaching test of personal computer components.

    Science.gov (United States)

    Li, Yadong; Richardson, Jay B; Niu, Xiaojun; Jackson, Ollie J; Laster, Jeremy D; Walker, Aaron K

    2009-11-15

    A dynamic leaching test (DLT) was developed and used to evaluate the leaching of toxic substances for electronic waste in the environment. The major components in personal computers (PCs) including motherboards, hard disc drives, floppy disc drives, and compact disc drives were tested. The tests lasted for 2 years for motherboards and 1.5 year for the disc drives. The extraction fluids for the standard toxicity characteristic leaching procedure (TCLP) and synthetic precipitation leaching procedure (SPLP) were used as the DLT leaching solutions. A total of 18 elements including Ag, Al, As, Au, Ba, Be, Cd, Cr, Cu, Fe, Ga, Ni, Pd, Pb, Sb, Se, Sn, and Zn were analyzed in the DLT leachates. Only Al, Cu, Fe, Ni, Pb, and Zn were commonly found in the DLT leachates of the PC components. Their leaching levels were much higher in TCLP extraction fluid than in SPLP extraction fluid. The toxic heavy metal Pb was found to continuously leach out of the components over the entire test periods. The cumulative amounts of Pb leached out of the motherboards in TCLP extraction fluid reached 2.0 g per motherboard over the 2-year test period, and that in SPLP extraction fluid were 75-90% less. The leaching rates or levels of Pb were largely affected by the content of galvanized steel in the PC components. The higher was the steel content, the lower the Pb leaching rate would be. The findings suggest that the obsolete PCs disposed of in landfills or discarded in the environment continuously release Pb for years when subjected to landfill leachate or rains.

  1. Portable computers - portable operating systems

    International Nuclear Information System (INIS)

    Wiegandt, D.

    1985-01-01

    Hardware development has made rapid progress over the past decade. Computers used to have attributes like ''general purpose'' or ''universal'', nowadays they are labelled ''personal'' and ''portable''. Recently, a major manufacturing company started marketing a portable version of their personal computer. But even for these small computers the old truth still holds that the biggest disadvantage of a computer is that it must be programmed, hardware by itself does not make a computer. (orig.)

  2. Person-related determinants of TV viewing and computer time in a cohort of young Dutch adults: Who sits the most?

    Science.gov (United States)

    Uijtdewilligen, L; Singh, A S; Chinapaw, M J M; Twisk, J W R; van Mechelen, W

    2015-10-01

    We aimed to assess the associations of person-related factors with leisure time television (TV) viewing and computer time among young adults. We analyzed self-reported TV viewing (h/week) and leisure computer time (h/week) from 475 Dutch young adults (47% male) who had participated in the Amsterdam Growth and Health Longitudinal Study at the age of 32 and 36 years. Sociodemographic factors (i.e., marital and employment status), physical factors (i.e., skin folds, aerobic fitness, neuromotor fitness, back problems), psychological factors (i.e., problem- and emotion-focused coping, personality), lifestyle (i.e., alcohol consumption, smoking, energy intake, physical activity), and self-rated health (i.e., general health status, mild health complaints) were assessed. Univariable and multivariable generalized estimating equations were performed. Male gender, higher sum of skin folds, lower values of aerobic fitness, higher rigidity, higher self-sufficiency/recalcitrance, and smoking were positively associated with TV time. Male gender, higher sum of skin folds, higher scores on self-esteem, low energy intake, and a not so good general health status were significantly associated with higher computer time. Determinants of TV viewing and computer time were not identical, suggesting that both behaviors (a) have different at-risk populations and (b) should be targeted differently. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  3. Functional magnetic resonance maps obtained by personal computer

    International Nuclear Information System (INIS)

    Gomez, F. j.; Manjon, J. V.; Robles, M.; Marti-Bonmati, L.; Dosda, R.; Molla, E.

    2001-01-01

    Functional magnetic resonance (fMR) is of special relevance in the analysis of certain types of brain activation. The present report describes the development of a simple software program for use with personal computers (PCs) that analyzes these images and provides functional activation maps. Activation maps are based on the temporal differences in oxyhemoglobin in tomographic images. To detect these differences, intensities registered repeatedly during brain control and activation are compared. The experiments were performed with a 1.5-Tesla MR unit. To verify the reliability of the program fMR studies were carried out in 4 healthy individuals (12 contiguous slices, 80 images per slice every 3.1 seconds for a total of 960 images). All the images were transferred to a PC and were processed pixel by pixel within each sequence to obtain an intensity/time curve. The statistical study of the results (Student's test and cross correlation analysis) made it possible to establish the activation of each pixel. The images were prepared using spatial filtering, temporal filtering, baseline correction, normalization and segmentation of the parenchyma. The postprocessing of the results involved the elimination of single pixels, superposition of an anatomical image of greater spatial resolution and anti-aliasing. The application (Xfun 1.0, Valencia, Spain) was developed in Microsoft Visual C++5.0 Developer Studio for Windows NT Workstation. As a representative example, the program took 8.2 seconds to calculate and present the results of the entire study (12 functional maps). In the motor and visual activation experiments, the activation corresponding to regions proximal to the central sulcus of the hemisphere contralateral to the hand that moved and in the occipital cortex were observed. While programs that calculate activation maps are available, the development of software for PCs running Microsoft Windows ensures several key features for its use on a daily basis: it is easy

  4. LUDEP 1. 0, a personal computer program to implement the new ICRP respiratory tract model

    Energy Technology Data Exchange (ETDEWEB)

    Jarvis, N.S.; Birchall, A. (National Radiological Protection Board, Chilton (United Kingdom))

    1994-01-01

    The International Commission on Radiological Protection has recently approved a new model of the human respiratory tract. This model has been designed to represent realistically the deposition and biokinetic behaviour of inhaled radionuclides, and to calculate doses to the respiratory tract. In order to examine the practical application and radiological implications of the new model, a Personal Computer program has been developed. LUDEP 1.0 is a user-friendly program for the IBM-compatible PC which enables the user to calculate doses to the respiratory tract and to other organs. (author).

  5. Complex on the base of the ISKRA 226.6 personal computer for nuclear quadrupole resonance signal processing

    International Nuclear Information System (INIS)

    Morgunov, V.G.; Kravchenko, Eh.A.

    1988-01-01

    Complex, designed to conduct investigations by means of nuclear quadrupole resonance (NQR) method, which includes radiospectrometer, multichannel spectrum analyzer and ISKRA 226.6 personal computer, is developed. Analog-to-digital converter (ADC) with buffer storage device, interface and microcomputer are used to process NQR-signals. ADS conversion time is no more, than 50 ns, linearity - 1%. Programs on Fourier analysis of NQR-signals and calculation of relaxation times are developed

  6. Personal Computer Based Controller For Switched Reluctance Motor Drives

    Science.gov (United States)

    Mang, X.; Krishnan, R.; Adkar, S.; Chandramouli, G.

    1987-10-01

    Th9, switched reluctance motor (SRM) has recently gained considerable attention in the variable speed drive market. Two important factors that have contributed to this are, the simplicity of construction and the possibility of developing low cost con-trollers with minimum number of switching devices in the drive circuits. This is mainly due to the state-of-art of the present digital circuits technology and the low cost of switching devices. The control of this motor drive is under research. Optimized performance of the SRM motor drive is very dependent on the integration of the controller, converter and the motor. This research on system integration involves considerable changes in the control algorithms and their implementation. A Personal computer (PC) based controller is very appropriate for this purpose. Accordingly, the present paper is concerned with the design of a PC based controller for a SRM. The PC allows for real-time microprocessor control with the possibility of on-line system parameter modifications. Software reconfiguration of this controller is easier than a hardware based controller. User friendliness is a natural consequence of such a system. Considering the low cost of PCs, this controller will offer an excellent cost-effective means of studying the control strategies for the SRM drive intop greater detail than in the past.

  7. Implementasi Penggunaan Smartphone Android untuk Control PC (Personal Computer

    Directory of Open Access Journals (Sweden)

    Imam Solikin

    2018-05-01

    Full Text Available The purpose of this research is to simplify the control of personal computer (PC such as control pointer, keyboard control and make it easier to do the presentation by controlling the slide remotely using smartphone through wifi connections facility. The smartphone is a multimedia phone that combines PC functionality with microprocessor, memory, and built-in modem to produce smart smartphone gadgets. Problems that occur when performing a presentation such as PC control, control pointer and keyboard control for input should be close to the PC so it is less than optimal in explaining the material. The model used in implementing the use of Android Smartphone for PC control is a conceptual model consisting of several stages: potential and problems, data collection, system testing, test results, and system implementation or implementation. From the results of PC control research can be done by connecting the Smartphone with a PC via wifi network so that PC can be controlled remotely. PC control application is an application that can control PC remotely connected via wifi network connection. Benefits derived from this research make it easy to mengedalikan PC remotely such as facilitate in the percentage and control pointer and control Keyboard for input process.

  8. Affect and the computer game player: the effect of gender, personality, and game reinforcement structure on affective responses to computer game-play.

    Science.gov (United States)

    Chumbley, Justin; Griffiths, Mark

    2006-06-01

    Previous research on computer games has tended to concentrate on their more negative effects (e.g., addiction, increased aggression). This study departs from the traditional clinical and social learning explanations for these behavioral phenomena and examines the effect of personality, in-game reinforcement characteristics, gender, and skill on the emotional state of the game-player. Results demonstrated that in-game reinforcement characteristics and skill significantly effect a number of affective measures (most notably excitement and frustration). The implications of the impact of game-play on affect are discussed with reference to the concepts of "addiction" and "aggression."

  9. A roadmap towards personalized immunology

    DEFF Research Database (Denmark)

    Delhalle, Sylvie; Bode, Sebastian F N; Balling, Rudi

    2018-01-01

    Big data generation and computational processing will enable medicine to evolve from a "one-size-fits-all" approach to precise patient stratification and treatment. Significant achievements using "Omics" data have been made especially in personalized oncology. However, immune cells relative to tu......-communicable inflammatory diseases such as autoimmune diseases or allergies. We provide a roadmap and highlight experimental, clinical, computational analysis, data management, ethical and regulatory issues to accelerate the implementation of personalized immunology....

  10. Application of personal computer to development of entrance management system for radiating facilities

    International Nuclear Information System (INIS)

    Suzuki, Shogo; Hirai, Shouji

    1989-01-01

    The report describes a system for managing the entrance and exit of personnel to radiating facilities. A personal computer is applied to its development. Major features of the system is outlined first. The computer is connected to the gate and two magnetic card readers provided at the gate. The gate, which is installed at the entrance to a room under control, opens only for those who have a valid card. The entrance-exit management program developed is described next. The following three files are used: ID master file (random file of the magnetic card number, name, qualification, etc., of each card carrier), entrance-exit management file (random file of time of entrance/exit, etc., updated everyday), and entrance-exit record file (sequential file of card number, name, date, etc.), which are stored on floppy disks. A display is provided to show various lists including a list of workers currently in the room and a list of workers who left the room at earlier times of the day. This system is useful for entrance management of a relatively small facility. Though small in required cost, it requires only a few operators to perform effective personnel management. (N.K.)

  11. Human Perception, SBS Sympsoms and Performance of Office Work during Exposure to Air Polluted by Building Materials and Personal Computers

    DEFF Research Database (Denmark)

    Bako-Biro, Zsolt

    The present thesis deals with the impact of polluted air from building materials and personal computers on human perception, Sick Building Syndrome (SBS) symptoms and performance of office work. These effects have been studies in a series of experiments that are described in two different chapters...

  12. Psychological and Pedagogical Features of Teaching Students with Visual Deprivation in Training to Work on a Personal Computer

    Directory of Open Access Journals (Sweden)

    Sokolov V. V.

    2015-08-01

    Full Text Available This article discusses how children with profound sight impairment percieve visual information from a computer screen using synthesized speech and the tactile display system Braille. Describes research of characteristics of user skills development in children with visual deprivation. Illustrated are the main differences in the perception of information from the screen of the user's computer using a visual interface, and users forced to use special software to non-visual access. Provide the most significant results of research and a number of methodical recommendations on educating children of this category in work on the personal computer without visual control. The article may be interest to teachers of informatics, teaching students with profound visual impairment, for parents with children in this category, as well as for scientists, whose professional interests are in the area of pedagogy of the blind

  13. A roadmap towards personalized immunology.

    Science.gov (United States)

    Delhalle, Sylvie; Bode, Sebastian F N; Balling, Rudi; Ollert, Markus; He, Feng Q

    2018-01-01

    Big data generation and computational processing will enable medicine to evolve from a "one-size-fits-all" approach to precise patient stratification and treatment. Significant achievements using "Omics" data have been made especially in personalized oncology. However, immune cells relative to tumor cells show a much higher degree of complexity in heterogeneity, dynamics, memory-capability, plasticity and "social" interactions. There is still a long way ahead on translating our capability to identify potentially targetable personalized biomarkers into effective personalized therapy in immune-centralized diseases. Here, we discuss the recent advances and successful applications in "Omics" data utilization and network analysis on patients' samples of clinical trials and studies, as well as the major challenges and strategies towards personalized stratification and treatment for infectious or non-communicable inflammatory diseases such as autoimmune diseases or allergies. We provide a roadmap and highlight experimental, clinical, computational analysis, data management, ethical and regulatory issues to accelerate the implementation of personalized immunology.

  14. Balancing personalized medicine and personalized care.

    Science.gov (United States)

    Cornetta, Kenneth; Brown, Candy Gunther

    2013-03-01

    The current description of personalized medicine by the National Institutes of Health is "the science of individualized prevention and therapy." Although physicians are beginning to see the promise of genetic medicine coming to fruition, the rapid pace of sequencing technology, informatics, and computer science predict a revolution in the ability to care for patients in the near future. The enthusiasm expressed by researchers is well founded, but the expectations voiced by the public do not center on advancing technology. Rather, patients are asking for personalized care: a holistic approach that considers physical, mental, and spiritual well-being. This perspective considers psychological, religious, and ethical challenges that may arise as the precision of preventive medicine improves. Psychological studies already highlight the barriers to single gene testing and suggest significant barriers to the predictive testing envisioned by personalized medicine. Certain religious groups will likely mount opposition if they believe personalized medicine encourages embryo selection. If the technology prompts cost-containment discussions, those concerned about the sanctity of life may raise ethical objections. Consequently, the availability of new scientific developments does not guarantee advances in treatment because patients may prove unwilling to receive and act on personalized genetic information. This perspective highlights current efforts to incorporate personalized medicine and personalized care into the medical curriculum, genetic counseling, and other aspects of clinical practice. Because these efforts are generally independent, the authors offer recommendations for physicians and educators so that personalized medicine can be implemented in a manner that meets patient expectations for personalized care.

  15. Computer Language Settings and Canadian Spellings

    Science.gov (United States)

    Shuttleworth, Roger

    2011-01-01

    The language settings used on personal computers interact with the spell-checker in Microsoft Word, which directly affects the flagging of spellings that are deemed incorrect. This study examined the language settings of personal computers owned by a group of Canadian university students. Of 21 computers examined, only eight had their Windows…

  16. Intelligent Adaptation and Personalization Techniques in Computer-Supported Collaborative Learning

    CERN Document Server

    Demetriadis, Stavros; Xhafa, Fatos

    2012-01-01

    Adaptation and personalization have been extensively studied in CSCL research community aiming to design intelligent systems that adaptively support eLearning processes and collaboration. Yet, with the fast development in Internet technologies, especially with the emergence of new data technologies and the mobile technologies, new opportunities and perspectives are opened for advanced adaptive and personalized systems. Adaptation and personalization are posing new research and development challenges to nowadays CSCL systems. In particular, adaptation should be focused in a multi-dimensional way (cognitive, technological, context-aware and personal). Moreover, it should address the particularities of both individual learners and group collaboration. As a consequence, the aim of this book is twofold. On the one hand, it discusses the latest advances and findings in the area of intelligent adaptive and personalized learning systems. On the other hand it analyzes the new implementation perspectives for intelligen...

  17. Internet resources for dentistry: computer, Internet, reference, and sites for enhancing personal productivity of the dental professional.

    Science.gov (United States)

    Guest, G F

    2000-08-15

    At the onset of the new millennium the Internet has become the new standard means of distributing information. In the last two to three years there has been an explosion of e-commerce with hundreds of new web sites being created every minute. For most corporate entities, a web site is as essential as the phone book listing used to be. Twenty years ago technologist directed how computer-based systems were utilized. Now it is the end users of personal computers that have gained expertise and drive the functionality of software applications. The computer, initially invented for mathematical functions, has transitioned from this role to an integrated communications device that provides the portal to the digital world. The Web needs to be used by healthcare professionals, not only for professional activities, but also for instant access to information and services "just when they need it." This will facilitate the longitudinal use of information as society continues to gain better information access skills. With the demand for current "just in time" information and the standards established by Internet protocols, reference sources of information may be maintained in dynamic fashion. News services have been available through the Internet for several years, but now reference materials such as online journals and digital textbooks have become available and have the potential to change the traditional publishing industry. The pace of change should make us consider Will Rogers' advice, "It isn't good enough to be moving in the right direction. If you are not moving fast enough, you can still get run over!" The intent of this article is to complement previous articles on Internet Resources published in this journal, by presenting information about web sites that present information on computer and Internet technologies, reference materials, news information, and information that lets us improve personal productivity. Neither the author, nor the Journal endorses any of the

  18. Blackboard architecture and qualitative model in a computer aided assistant designed to define computers for HEP computing

    International Nuclear Information System (INIS)

    Nodarse, F.F.; Ivanov, V.G.

    1991-01-01

    Using BLACKBOARD architecture and qualitative model, an expert systm was developed to assist the use in defining the computers method for High Energy Physics computing. The COMEX system requires an IBM AT personal computer or compatible with than 640 Kb RAM and hard disk. 5 refs.; 9 figs

  19. Personal computers pollute indoor air: effects on perceived air quality, SBS symptoms and productivity in offices

    DEFF Research Database (Denmark)

    Bako-Biro, Zsolt; Wargocki, Pawel; Weschler, Charles J.

    2002-01-01

    was reduced and air freshness increased; all effects were significant. In the presence of PCs the performance of text typing significantly decreased. The sensory pollution load of the PCs was found to be 3 olf per PC, i.e. three times the load of the occupants. Present results indicate negative effects of PCs......Perceived air quality and Sick Building Syndrome (SBS) symptoms were studied in a low-polluting office space ventilated at an air change rate of 2 h-1 (10 L/s per person with 6 people present) with and without personal computers (PCs). Other environmental parameters were kept constant. Thirty...... female subjects were exposed for 4.8 h to each of the two conditions in the office and performed simulated office work. They remained thermally neutral by adjusting their clothing and were blind to the interventions. In the absence of PCs in the office the perceived air quality improved, odour intensity...

  20. VAT: a computational framework to functionally annotate variants in personal genomes within a cloud-computing environment.

    Science.gov (United States)

    Habegger, Lukas; Balasubramanian, Suganthi; Chen, David Z; Khurana, Ekta; Sboner, Andrea; Harmanci, Arif; Rozowsky, Joel; Clarke, Declan; Snyder, Michael; Gerstein, Mark

    2012-09-01

    The functional annotation of variants obtained through sequencing projects is generally assumed to be a simple intersection of genomic coordinates with genomic features. However, complexities arise for several reasons, including the differential effects of a variant on alternatively spliced transcripts, as well as the difficulty in assessing the impact of small insertions/deletions and large structural variants. Taking these factors into consideration, we developed the Variant Annotation Tool (VAT) to functionally annotate variants from multiple personal genomes at the transcript level as well as obtain summary statistics across genes and individuals. VAT also allows visualization of the effects of different variants, integrates allele frequencies and genotype data from the underlying individuals and facilitates comparative analysis between different groups of individuals. VAT can either be run through a command-line interface or as a web application. Finally, in order to enable on-demand access and to minimize unnecessary transfers of large data files, VAT can be run as a virtual machine in a cloud-computing environment. VAT is implemented in C and PHP. The VAT web service, Amazon Machine Image, source code and detailed documentation are available at vat.gersteinlab.org.

  1. Power cycle heat balance software for personal computer (PC)2TM

    International Nuclear Information System (INIS)

    Bockh, P. von; Rodriguez, H.

    1996-01-01

    This paper describes the PC-based power cycle balance of plant software (PC)trademark (Power Cycle on Personal Computer). It is designed to assist nuclear, fossil, and industrial power plants so that steam cycles can be simulated, analyzed and optimized. First, the cycle model is developed on the screen. The elements of the power cycle are taken from a tool box containing all components of a modern power cycle. The elements are connected by using a mouse. The next step is the input of the design values of the components or data taken from performance tests. This entire input sequence is guided by the program. Based on the input data, the physical behavior of each component is simulated according to established physical rules. Part load operation or other off-design conditions can be calculated. The program is designed for use by power plant engineers and power engineering firms to optimize new power cycles, perform problem-solving analyses, optimize component retrofit, and train power plant engineers and operators. It also can be used by universities to educate engineering students

  2. Towards personalized computational oncology: from spatial models of tumour spheroids, to organoids, to tissues.

    Science.gov (United States)

    Karolak, Aleksandra; Markov, Dmitry A; McCawley, Lisa J; Rejniak, Katarzyna A

    2018-01-01

    A main goal of mathematical and computational oncology is to develop quantitative tools to determine the most effective therapies for each individual patient. This involves predicting the right drug to be administered at the right time and at the right dose. Such an approach is known as precision medicine. Mathematical modelling can play an invaluable role in the development of such therapeutic strategies, since it allows for relatively fast, efficient and inexpensive simulations of a large number of treatment schedules in order to find the most effective. This review is a survey of mathematical models that explicitly take into account the spatial architecture of three-dimensional tumours and address tumour development, progression and response to treatments. In particular, we discuss models of epithelial acini, multicellular spheroids, normal and tumour spheroids and organoids, and multi-component tissues. Our intent is to showcase how these in silico models can be applied to patient-specific data to assess which therapeutic strategies will be the most efficient. We also present the concept of virtual clinical trials that integrate standard-of-care patient data, medical imaging, organ-on-chip experiments and computational models to determine personalized medical treatment strategies. © 2018 The Author(s).

  3. Is remanufacturing effective and eco-efficient?: An analysis of the eco-efficiency of personal computers and mobile phones

    OpenAIRE

    Quariguasi Frota Neto, João; Bloemhof-Ruwaard, Jacqueline

    2009-01-01

    textabstractRemanufacturing has long been perceived as an environmentally-friendly initiative, and it is therefore sup- ported by a number of governments, in particular in Europe. Yet, the assumption that remanufacturing is desirable to society has never been systematically investigated. In this paper, we focus our attention on the electronics industry. In particular, we take a close look at remanufacturing within the personal computer and mobile phone industries. We investigate whether reman...

  4. A Security Architecture for Personal Networks

    NARCIS (Netherlands)

    Jehangir, A.

    2009-01-01

    The proliferation of personal mobile computing devices such as laptops and mo- bile phones, as well as wearable computing devices such as belt computers, digital bracelets and bio-medical sensors has created an opportunity to create a wireless network to share information and resources amongst

  5. Image storage, cataloguing and retrieval using a personal computer database software application

    International Nuclear Information System (INIS)

    Lewis, G.; Howman-Giles, R.

    1999-01-01

    Full text: Interesting images and cases are collected and collated by most nuclear medicine practitioners throughout the world. Changing imaging technology has altered the way in which images may be presented and are reported, with less reliance on 'hard copy' for both reporting and archiving purposes. Digital image generation and storage is rapidly replacing film in both radiological and nuclear medicine practice. A personal computer database based interesting case filing system is described and demonstrated. The digital image storage format allows instant access to both case information (e.g. history and examination, scan report or teaching point) and the relevant images. The database design allows rapid selection of cases and images appropriate to a particular diagnosis, scan type, age or other search criteria. Correlative X-ray, CT, MRI and ultrasound images can also be stored and accessed. The application is in use at The New Children's Hospital as an aid to postgraduate medical education, with new cases being regularly added to the database

  6. Personalized Opportunistic Computing for CMS at Large Scale

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    **Douglas Thain** is an Associate Professor of Computer Science and Engineering at the University of Notre Dame, where he designs large scale distributed computing systems to power the needs of advanced science and...

  7. Multi-kanban mechanism for personal computer disassembly

    Science.gov (United States)

    Udomsawat, Gun; Gupta, Surendra M.; Kamarthi, Sagar V.

    2004-12-01

    The use of personal computers (PCs) continues to increase every year. According to a 1999 figure, 50 percent of all US households owned PCs, a figure that continues to rise every year. With continuous development of sophisticated software, PCs are becoming increasingly powerful. In addition, the price of a PC continues to steadily decline. Furthermore, the typical life of a PC in the workplace is approximately two to three years while in the home it is three to five years. As these PCs become obsolete, they are replaced and the old PCs are disposed of. It is estimated that between 14 and 20 million PCs are retired annually in the US. While 20 to 30% of the units may be resold, the others are discarded. These discards represent a significant potential source of lead for the waste stream. In some communities, waste cathode ray tubes (CRTs) represent the second largest source of lead in the waste stream after vehicular lead acid batteries. PCs are, therefore, not suitable for dumping in landfills. Besides, several components of a PC can be reused and then there are other valuable materials that can also be harvested. And with the advent of product stewardship, product recovery is the best solution for manufacturers. Disassembly line is perhaps the most suitable set up for disassembling PCs. However, planning and scheduling of disassembly on a disassembly line is complicated. In this paper, we discuss some of the complications including product arrival, demand arrival, inventory fluctuation and production control mechanisms. We then show how to overcome them by implementing a multi-kanban mechanism in the PC disassembly line setting. The multi-kanban mechanism relies on dynamic routing of kanbans according to the state of the system. We investigate the multi-kanban mechanism using simulation and demonstrate that this mechanism is superior to the traditional push system in terms of controlling the system"s inventory while maintaining a decent customer service level.

  8. LABORATORY PROCESS CONTROLLER USING NATURAL LANGUAGE COMMANDS FROM A PERSONAL COMPUTER

    Science.gov (United States)

    Will, H.

    1994-01-01

    The complex environment of the typical research laboratory requires flexible process control. This program provides natural language process control from an IBM PC or compatible machine. Sometimes process control schedules require changes frequently, even several times per day. These changes may include adding, deleting, and rearranging steps in a process. This program sets up a process control system that can either run without an operator, or be run by workers with limited programming skills. The software system includes three programs. Two of the programs, written in FORTRAN77, record data and control research processes. The third program, written in Pascal, generates the FORTRAN subroutines used by the other two programs to identify the user commands with the user-written device drivers. The software system also includes an input data set which allows the user to define the user commands which are to be executed by the computer. To set the system up the operator writes device driver routines for all of the controlled devices. Once set up, this system requires only an input file containing natural language command lines which tell the system what to do and when to do it. The operator can make up custom commands for operating and taking data from external research equipment at any time of the day or night without the operator in attendance. This process control system requires a personal computer operating under MS-DOS with suitable hardware interfaces to all controlled devices. The program requires a FORTRAN77 compiler and user-written device drivers. This program was developed in 1989 and has a memory requirement of about 62 Kbytes.

  9. Temporal digital subtraction radiography with a personal computer digital workstation

    International Nuclear Information System (INIS)

    Kircos, L.; Holt, W.; Khademi, J.

    1990-01-01

    Technique have been developed and implemented on a personal computer (PC)-based digital workstation to accomplish temporal digital subtraction radiography (TDSR). TDSR is useful in recording radiologic change over time. Thus, this technique is useful not only for monitoring chronic disease processes but also for monitoring the temporal course of interventional therapies. A PC-based digital workstation was developed on a PC386 platform with add-in hardware and software. Image acquisition, storage, and processing was accomplished using 512 x 512 x 8- or 12-bit frame grabber. Software and hardware were developed to accomplish image orientation, registration, gray scale compensation, subtraction, and enhancement. Temporal radiographs of the jaws were made in a fixed and reproducible orientation between the x-ray source and image receptor enabling TDSR. Temporal changes secondary to chronic periodontal disease, osseointegration of endosseous implants, and wound healing were demonstrated. Use of TDSR for chest imaging was also demonstrated with identification of small, subtle focal masses that were not apparent with routine viewing. The large amount of radiologic information in images of the jaws and chest may obfuscate subtle changes that TDSR seems to identify. TDSR appears to be useful as a tool to record temporal and subtle changes in radiologic images

  10. Dose calculation for iridium-192 sources by a personal computer

    International Nuclear Information System (INIS)

    Takahashi, Kenichi; Ishigaki, Hideyo; Udagawa, Kimio; Saito, Masami; Yamaguchi, Kyoko

    1988-01-01

    Recently Ir-192 sources have been used for interstitial radiotherapy instead of Ra-226 needles. One end of Ir-192 (single-pin) is formed with circlet and implanted Ir-192 sources are not always straight line. So the authors have developed a new dose calculation system, in which the authers employed conventional method considering oblique filteration for linear source and multi-point source method for curved source. Conventionally the positions of sources in three dimensions are determined from projections of the implanted sources on orthogonal or stereo radiographs. But it is frequentry impossible to define the end of sources on account of overlap. Then the authers have devised a method to determine the positions of sources from two radiographs which were taken with arbitrary directions. For tongue cancer injuries of mandibula so frequently occur after interstitial radiotherapy that the calculation of gingival dose is necessary. The positions of the gingival line are determined from two directional radiographs too. Further the three dimensional dose distributions can be displayed on the cathod ray tube. These calculations are performed by using a personal computer because of its distinctive features such as superiority in cost performance and flexibility for development and modification of programs. (author)

  11. Personality similarity and life satisfaction in couples

    OpenAIRE

    Furler Katrin; Gomez Veronica; Grob Alexander

    2013-01-01

    The present study examined the association between personality similarity and life satisfaction in a large nationally representative sample of 1608 romantic couples. Similarity effects were computed for the Big Five personality traits as well as for personality profiles with global and differentiated indices of similarity. Results showed substantial actor and partner effects indicating that both partners' personality traits were related to both partners' life satisfaction. Personality similar...

  12. Evaluation of user input methods for manipulating a tablet personal computer in sterile techniques.

    Science.gov (United States)

    Yamada, Akira; Komatsu, Daisuke; Suzuki, Takeshi; Kurozumi, Masahiro; Fujinaga, Yasunari; Ueda, Kazuhiko; Kadoya, Masumi

    2017-02-01

    To determine a quick and accurate user input method for manipulating tablet personal computers (PCs) in sterile techniques. We evaluated three different manipulation methods, (1) Computer mouse and sterile system drape, (2) Fingers and sterile system drape, and (3) Digitizer stylus and sterile ultrasound probe cover with a pinhole, in terms of the central processing unit (CPU) performance, manipulation performance, and contactlessness. A significant decrease in CPU score ([Formula: see text]) and an increase in CPU temperature ([Formula: see text]) were observed when a system drape was used. The respective mean times taken to select a target image from an image series (ST) and the mean times for measuring points on an image (MT) were [Formula: see text] and [Formula: see text] s for the computer mouse method, [Formula: see text] and [Formula: see text] s for the finger method, and [Formula: see text] and [Formula: see text] s for the digitizer stylus method, respectively. The ST for the finger method was significantly longer than for the digitizer stylus method ([Formula: see text]). The MT for the computer mouse method was significantly longer than for the digitizer stylus method ([Formula: see text]). The mean success rate for measuring points on an image was significantly lower for the finger method when the diameter of the target was equal to or smaller than 8 mm than for the other methods. No significant difference in the adenosine triphosphate amount at the surface of the tablet PC was observed before, during, or after manipulation via the digitizer stylus method while wearing starch-powdered sterile gloves ([Formula: see text]). Quick and accurate manipulation of tablet PCs in sterile techniques without CPU load is feasible using a digitizer stylus and sterile ultrasound probe cover with a pinhole.

  13. Computer Viruses: An Overview.

    Science.gov (United States)

    Marmion, Dan

    1990-01-01

    Discusses the early history and current proliferation of computer viruses that occur on Macintosh and DOS personal computers, mentions virus detection programs, and offers suggestions for how libraries can protect themselves and their users from damage by computer viruses. (LRW)

  14. PC Tutor. Bericht uber ein PC-gestutzes Tutorensystem = PC Tutor. Report on a Tutoring System with Personal Computer. ZIFF Papiere 75.

    Science.gov (United States)

    Fritsch, Helmut

    A project was conducted to increase as well as to professionalize communication between tutors and learners in a West German university's distance education program by the use of personal computers. Two tutors worked on the systematic development of a PC-based correcting system. The goal, apart from developing general language skills in English,…

  15. Computers in nuclear medicine

    International Nuclear Information System (INIS)

    Giannone, Carlos A.

    1999-01-01

    This chapter determines: capture and observation of images in computers; hardware and software used, personal computers, networks and workstations. The use of special filters determine the quality image

  16. A Computer Security Course in the Undergraduate Computer Science Curriculum.

    Science.gov (United States)

    Spillman, Richard

    1992-01-01

    Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…

  17. Application of a personal computer relational data base management system to fuel cycle economic scoping

    International Nuclear Information System (INIS)

    Malone, J.P.; Dooley, G.D.

    1986-01-01

    A personal computer (PC) relational data base management system (RDBMS) permits large quantities of data to be maintained in a data base composed of structured data sets or files and provides data access through a software environment, procedure, or program language. The features of an RDBMS-based system create an environment on a PC that can provide significant benefits to any fuel cycle economics analysis. The ability to maintain a separate data set for each fuel cycle parameter group and the ability to manipulate the data through a series of independent calculation modules combine to provide the fuel cycle analyst with more time to examine and use the data, because less time is required to manipulate it

  18. Computer-based written emotional disclosure: the effects of advance or real-time guidance and moderation by Big 5 personality traits.

    Science.gov (United States)

    Beyer, Jonathan A; Lumley, Mark A; Latsch, Deborah V; Oberleitner, Lindsay M S; Carty, Jennifer N; Radcliffe, Alison M

    2014-01-01

    Standard written emotional disclosure (WED) about stress, which is private and unguided, yields small health benefits. The effect of providing individualized guidance to writers may enhance WED, but has not been tested. This trial of computer-based WED compared two novel therapist-guided forms of WED - advance guidance (before sessions) and real-time guidance (during sessions, through instant messaging) - to both standard WED and control writing; it also tested Big 5 personality traits as moderators of guided WED. Young adult participants (n = 163) with unresolved stressful experiences were randomized to conditions, had three, 30-min computer-based writing sessions, and were reassessed six weeks later. Contrary to hypotheses, real-time guidance WED had poorer outcomes than the other conditions on several measures, and advance guidance WED also showed some poorer outcomes. Moderator analyses revealed that participants with low baseline agreeableness, low extraversion, or high conscientiousness had relatively poor responses to guidance. We conclude that providing guidance for WED, especially in real-time, may interfere with emotional processing of unresolved stress, particularly for people whose personalities have poor fit with this interactive form of WED.

  19. [The digital reprocessing of under- and overexposed x-ray films with a personal computer].

    Science.gov (United States)

    Fuhrmann, R; Diedrich, P

    1993-02-01

    An image processing work station for digitalizing and interactively manipulating under- and overexposed X-rays was set up by adding modules to an IBM compatible personal computer. Overexposed X-rays can be qualitatively enhanced by means of controlled manipulation of contrast and brightness and by means of the use of various digital filtering techniques. With underexposed X-rays an equalized grey scale can be achieved by means of regulating contrast and brightness. Digital filtering is not required. To assure a high degree of anatomical detail (periodontal ligament) in the digitalized image a maximum pixel of 0.1 mm was defined as a qualitative norm. Since in every digitalization process resolution is diminished, it proved best to select for interactive manipulation out of the total image only the section of interest.

  20. Towards personalized feedback in educational computer games for children

    NARCIS (Netherlands)

    Vasilyeva, E.; Uskov, V.

    2007-01-01

    Educational games as well as other computer games become an important part of children’s life and modern education. Feedback that is provided during a game to a child plays a significant role in computer games in general. In the context of educational computer games being developed for children game

  1. Advancement of the state system of accounting for mainframe to personal computer (PC) technology

    International Nuclear Information System (INIS)

    Proco, G.; Nardi, J.

    1999-01-01

    The advancement of the U.S. government's state system of accounting from a mainframe computer to a personal computer (PC) had been successfully completed. The accounting system, from 1965 until 1995 a mainframe application, was replaced in September 1995 by an accounting system employing local area network (LAN) capabilities and other state-of-the-art characteristics. The system is called the Nuclear Materials Management and Safeguards System (NMMSS), tracking nuclear material activities and providing accounting reports for a variety of government and private users. The uses of the system include not only the tracking of nuclear materials for international and domestic safeguards purposes but also serving to facilitate the government's resource management purposes as well. The system was converted to PC hardware and fourth generation software to improve upon the mainframe system. The change was motivated by the desire to have a system amenable to frequent modifications, to improve upon services to users and to reduce increasing operating costs. Based on two years of operating the new system, it is clear that these objectives were met. Future changes to the system are inevitable and the national system of accounting for nuclear materials has the technology base to meet the challenges with proven capability. (author)

  2. Explicating Development of Personal Professional Theories from Higher Vocational Education to Beginning a Professional Career through Computer-Supported Drawing of Concept Maps

    Science.gov (United States)

    van den Bogaart, Antoine C. M.; Hummel, Hans G. K.; Kirschner, Paul A.

    2018-01-01

    This article explores how personal professional theories (PPTs) develop. PPT development of nine junior accountants and nine novice teachers was monitored by repeated measurements over a period of 1.5 years, from the last year of vocational education until the second year of their professional careers. Computer-supported construction of PPT…

  3. So, you are buying your first computer.

    Science.gov (United States)

    Ferrara-Love, R

    1999-06-01

    Buying your first computer need not be that complicated. The first thing that is needed is an understanding of what you want and need the computer for. By making a list of the various essentials, you will be on your way to purchasing that computer. Once that is completed, you will need an understanding of what each of the components of the computer is, how it works, and what options you have. This way, you will be better able to discuss your needs with the salesperson. The focus of this article is limited to personal computers or PCs (i.e., IBMs [Armonk, NY], IBM clones, Compaq [Houston, TX], Gateway [North Sioux City, SD], and so on). I am not including Macintosh or Apple [Cupertino, CA] in this discussion; most software is often made exclusively for personal computers or at least on the market for personal computers before becoming available in Macintosh version.

  4. A Temporal-Causal Network Model for the Internal Processes of a Person with a Borderline Personality Disorder

    NARCIS (Netherlands)

    Hoțoiu, Maria; Tavella, Federico; Treur, Jan

    2018-01-01

    This paper presents a computational network model for a person with a Borderline Personality Disorder. It was designed according to a Network-Oriented Modeling approach as a temporal-causal network based on neuropsychological background knowledge. Some example simulations are discussed. The model

  5. Activity-based computing: computational management of activities reflecting human intention

    DEFF Research Database (Denmark)

    Bardram, Jakob E; Jeuris, Steven; Houben, Steven

    2015-01-01

    paradigm that has been applied in personal information management applications as well as in ubiquitous, multidevice, and interactive surface computing. ABC has emerged as a response to the traditional application- and file-centered computing paradigm, which is oblivious to a notion of a user’s activity...

  6. Simulation of Safety and Transient Analysis of a Pressurized Water Reactor using the Personal Computer Transient Analyzer

    Directory of Open Access Journals (Sweden)

    Sunday J. IBRAHIM

    2013-06-01

    Full Text Available Safety and transient analyses of a pressurised water reactor (PWR using the Personal Computer Transient Analyzer (PCTRAN simulator was carried out. The analyses presented a synergistic integration of a numerical model; a full scope high fidelity simulation system which adopted point reactor neutron kinetics model and movable boundary two phase fluid models to simplify the calculation of the program, so it could achieve real-time simulation on a personal computer. Various scenarios of transients and accidents likely to occur at any nuclear power plant were simulated. The simulations investigated the change of signals and parameters vis a vis loss of coolant accident, scram, turbine trip, inadvertent control rod insertion and withdrawal, containment failure, fuel handling accident in auxiliary building and containment, moderator dilution as well as a combination of these parameters. Furthermore, statistical analyses of the PCTRAN results were carried out. PCTRAN results for the loss of coolant accident (LOCA caused a rapid drop in coolant pressure at the rate of 21.8KN/m2/sec triggering a shutdown of the reactor protection system (RPS, while the turbine trip accident showed a rapid drop in total plant power at the rate of 14.3 MWe/sec causing a downtime in the plant. Fuel handling accidents mimic results showed release of radioactive materials in unacceptable doses. This work shows the potential classes of nuclear accidents likely to occur during operation in proposed reactor sites. The simulations are very appropriate in the light of Nigeria’s plan to generate nuclear energy in the region of 1000 MWe from reactors by 2017.

  7. Personal Exposure to Contaminant Sources in Ventilated Rooms

    DEFF Research Database (Denmark)

    Brohus, Henrik

    Three different tools for personal exposure assessment are presented. They are all able to consider the local influence of persons in ventilated rooms where concentration gradients prevail: A Breathing Thermal Manikin, a Computer Simulated Person, and a Trained Sensory Panel. The tools are applied...

  8. Poisson/Superfish codes for personal computers

    International Nuclear Information System (INIS)

    Humphries, S.

    1992-01-01

    The Poisson/Superfish codes calculate static E or B fields in two-dimensions and electromagnetic fields in resonant structures. New versions for 386/486 PCs and Macintosh computers have capabilities that exceed the mainframe versions. Notable improvements are interactive graphical post-processors, improved field calculation routines, and a new program for charged particle orbit tracking. (author). 4 refs., 1 tab., figs

  9. Factors Affecting Preservice Teachers' Computer Use for General Purposes: Implications for Computer Training Courses

    Science.gov (United States)

    Zogheib, Salah

    2014-01-01

    As the majority of educational research has focused on preservice teachers' computer use for "educational purposes," the question remains: Do preservice teachers use computer technology for daily life activities and encounters? And do preservice teachers' personality traits and motivational beliefs related to computer training provided…

  10. Constraint Patch Matching for Faster Person Re-identification

    DEFF Research Database (Denmark)

    Lejbølle, Aske Rasch; Nasrollahi, Kamal; Moeslund, Thomas B.

    2017-01-01

    In person re-identification, it is of great importance toextract very discriminative features in order to distinguishbetween images of different persons captured in differentcamera views. Features can be extracted globally from theentire or parts of the image, or locally from patches. Inaddition......36ms to compute per person....

  11. The Challenge of Computers.

    Science.gov (United States)

    Leger, Guy

    Computers may change teachers' lifestyles, teaching styles, and perhaps even their personal values. A brief survey of the history of computers demonstrates the incredible pace at which computer technology is moving ahead. The cost and size of microchips will continue to decline dramatically over the next 20 years, while the capability and variety…

  12. Optimal design of structures with multiple design variables per group and multiple loading conditions on the personal computer

    Science.gov (United States)

    Nguyen, D. T.; Rogers, J. L., Jr.

    1986-01-01

    A finite element based programming system for minimum weight design of a truss-type structure subjected to displacement, stress, and lower and upper bounds on design variables is presented. The programming system consists of a number of independent processors, each performing a specific task. These processors, however, are interfaced through a well-organized data base, thus making the tasks of modifying, updating, or expanding the programming system much easier in a friendly environment provided by many inexpensive personal computers. The proposed software can be viewed as an important step in achieving a 'dummy' finite element for optimization. The programming system has been implemented on both large and small computers (such as VAX, CYBER, IBM-PC, and APPLE) although the focus is on the latter. Examples are presented to demonstrate the capabilities of the code. The present programming system can be used stand-alone or as part of the multilevel decomposition procedure to obtain optimum design for very large scale structural systems. Furthermore, other related research areas such as developing optimization algorithms (or in the larger level: a structural synthesis program) for future trends in using parallel computers may also benefit from this study.

  13. Personal Learning Network Clusters: A Comparison between Mathematics and Computer Science Students

    Science.gov (United States)

    Harding, Ansie; Engelbrecht, Johann

    2015-01-01

    "Personal learning environments" (PLEs) and "personal learning networks" (PLNs) are well-known concepts. A personal learning network "cluster" is a small group of people who regularly interact academically and whose PLNs have a non-empty intersection that includes all the other members. At university level PLN…

  14. Computer Algebra-based RBES personalized menu generator

    OpenAIRE

    Roanes-Lozano, Eugenio; Galán-García, José Luis; Aguilera-Venegas, Gabriel

    2015-01-01

    People have many constraints concerning the food they eat. These constraints can be based on religious believes, be due to food allergies or to illnesses, or can be derived just from personal preferences. Therefore, preparing menus at hospitals and restaurants can be really complex. Another special situation arise when travel- ing abroad. It is not always enough to know the brief description in the restaurant menu or the explanation of the waiter. For example, “calamares en su...

  15. Seamless personal health information system in cloud computing.

    Science.gov (United States)

    Chung, Wan-Young; Fong, Ee May

    2014-01-01

    Noncontact ECG measurement has gained popularity these days due to its noninvasive and conveniences to be applied on daily life. This approach does not require any direct contact between patient's skin and sensor for physiological signal measurement. The noncontact ECG measurement is integrated with mobile healthcare system for health status monitoring. Mobile phone acts as the personal health information system displaying health status and body mass index (BMI) tracking. Besides that, it plays an important role being the medical guidance providing medical knowledge database including symptom checker and health fitness guidance. At the same time, the system also features some unique medical functions that cater to the living demand of the patients or users, including regular medication reminders, alert alarm, medical guidance, appointment scheduling. Lastly, we demonstrate mobile healthcare system with web application for extended uses, thus health data are clouded into web server system and web database storage. This allows remote health status monitoring easily and so forth it promotes a cost effective personal healthcare system.

  16. Creating robots with personality : the effect of personality on social intelligence

    NARCIS (Netherlands)

    Mileounis, A.; Cuijpers, R.H.; Barakova, E.I.

    2015-01-01

    This study investigates the effect of two personality traits, dominance and extroversion, on social intelligence. To test these traits, a NAO robot was used, which was teleoperated through a computer using a Wizard of Oz technique. A within-subject design was conducted with extroversion as

  17. Advancing E-Commerce Personalization: Process Framework and Case Study

    NARCIS (Netherlands)

    Kaptein, M.C.; Parvinen, P.

    2015-01-01

    Personalization is widely used in e-commerce, and as computational power increases, personalization is now within reach for many online vendors. We describe a process framework to structure our knowledge of online personalization both from academia and from applied attempts. This framework is

  18. Development of a personal computer based facility-level SSAC component and inspector support system

    International Nuclear Information System (INIS)

    Markov, A.

    1989-08-01

    Research Contract No. 4658/RB was conducted between the IAEA and the Bulgarian Committee on Use of Atomic Energy for Peaceful Purposes. The contract required the Committee to develop and program a personal computer based software package to be used as a facility-level computerized State System of Accounting and Control (SSAC) at an off-load power reactor. The software delivered, called the National Safeguards System (NSS) keeps track of all fuel assembly activity at a power reactor and generates all ledgers, MBA material balances and any required reports to national or international authorities. The NSS is designed to operate on a PC/AT or compatible equipment with a hard disk of 20 MB, color graphics monitor or adaptor and at least one floppy disk drive, 360 Kb. The programs are written in Basic (compiler 2.0). They are executed under MS DOS 3.1 or later

  19. Efficiency Improvement Opportunities for Personal Computer Monitors. Implications for Market Transformation Programs

    Energy Technology Data Exchange (ETDEWEB)

    Park, Won Young [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Phadke, Amol [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Shah, Nihar [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-06-29

    Displays account for a significant portion of electricity consumed in personal computer (PC) use, and global PC monitor shipments are expected to continue to increase. We assess the market trends in the energy efficiency of PC monitors that are likely to occur without any additional policy intervention and estimate that display efficiency will likely improve by over 40% by 2015 compared to today’s technology. We evaluate the cost effectiveness of a key technology which further improves efficiency beyond this level by at least 20% and find that its adoption is cost effective. We assess the potential for further improving efficiency taking into account the recent development of universal serial bus (USB) powered liquid crystal display (LCD) monitors and find that the current technology available and deployed in USB powered monitors has the potential to deeply reduce energy consumption by as much as 50%. We provide insights for policies and programs that can be used to accelerate the adoption of efficient technologies to capture global energy saving potential from PC monitors which we estimate to be 9.2 terawatt-hours [TWh] per year in 2015.

  20. Advancing e-commerce personalization : Process framework and case study

    NARCIS (Netherlands)

    Kaptein, Maurits; Parvinen, Petri

    2015-01-01

    Personalization is widely used in e-commerce, and as computational power increases, personalization is now within reach for many online vendors. We describe a process framework to structure our knowledge of online personalization —both from academia and from applied attempts. This framework is

  1. COMPUTER GAMES AND EDUCATION

    OpenAIRE

    Sukhov, Anton

    2018-01-01

    This paper devoted to the research of educational resources and possibilities of modern computer games. The “internal” educational aspects of computer games include educational mechanism (a separate or integrated “tutorial”) and representation of a real or even fantastic educational process within virtual worlds. The “external” dimension represents educational opportunities of computer games for personal and professional development in different genres of computer games (various transport, so...

  2. Implications of the Protection of Personal Information (POPI)

    African Journals Online (AJOL)

    The main purpose of the POPI act is to protect the processing of personal information ... a smartphone, iPad or personal computer), digital storage devices. (iCloud, Dropbox ... (vi) Reasonable security regarding the safeguarding, integrity and.

  3. Computer ray tracing speeds.

    Science.gov (United States)

    Robb, P; Pawlowski, B

    1990-05-01

    The results of measuring the ray trace speed and compilation speed of thirty-nine computers in fifty-seven configurations, ranging from personal computers to super computers, are described. A correlation of ray trace speed has been made with the LINPACK benchmark which allows the ray trace speed to be estimated using LINPACK performance data. The results indicate that the latest generation of workstations, using CPUs based on RISC (Reduced Instruction Set Computer) technology, are as fast or faster than mainframe computers in compute-bound situations.

  4. Revision of the European Ecolabel Criteria for Personal, Notebook and Tablet Computers TECHNICAL REPORT Summary of the final criteria proposals

    OpenAIRE

    DODD NICHOLAS; VIDAL ABARCA GARRIDO CANDELA; WOLF Oliver; GRAULICH Kathrin; BUNKE Dirk; GROSS Rita; LIU Ran; MANHART Andreas; PRAKASH Siddharth

    2015-01-01

    This technical report provide the background information for the revision of the EU Ecolabel criteria for Personal and Notebook Computers. The study has been carried out by the Joint Research Centre with technical support from the Oeko-Institut. The work has been developed for the European Commission's Directorate General for the Environment. The main purpose of this report is to provide a summary of the technical background and rationale for each criterion proposal. This document is compl...

  5. PCACE-Personal-Computer-Aided Cabling Engineering

    Science.gov (United States)

    Billitti, Joseph W.

    1987-01-01

    PCACE computer program developed to provide inexpensive, interactive system for learning and using engineering approach to interconnection systems. Basically database system that stores information as files of individual connectors and handles wiring information in circuit groups stored as records. Directly emulates typical manual engineering methods of handling data, thus making interface between user and program very natural. Apple version written in P-Code Pascal and IBM PC version of PCACE written in TURBO Pascal 3.0

  6. A management system of data for department of diagnostic radiology and patients using the personal computer

    International Nuclear Information System (INIS)

    Kim, Jin Hee; Park, Tae Joon; Choi, Tae Haing; Lim, Se Hwan; Joon Yang Noh; Kim, Sung Jin

    1996-01-01

    With the use of personal computers generalized, departmental society leveled computerization is going on in some other departments. So we tried to develop a program having a simple user interface, various retrieval functions and, analytic and statistic process system to effectively help patient care suitable for works concerned with department of diagnostic radiology and works of department. This program deals with such target works as department of diagnostic radiology and some works to need a lot of bookkeeping. It is deviced to operate with Windows (Microsoft, America), and central processing unit(486DX-2), memory unit(8 Mbyte). As a developmental tool, Foxpro 2.6 for windows R (Microsoft, America). This program can be easily accessed even by staffs poor at computer and it can make many books recording various check-ups and operations unnecessary, which were difficult to keep. Besides, it can keep data as a unified form, and so it provides patient care and other works with convenience and helps applying those stored data scientific research. The above result shows that works of department can be effectively controlled by analyzing or printing various check-up and operation done by department of diagnostic radiology

  7. COMPUTATIONAL THINKING

    Directory of Open Access Journals (Sweden)

    Evgeniy K. Khenner

    2016-01-01

    Full Text Available Abstract. The aim of the research is to draw attention of the educational community to the phenomenon of computational thinking which actively discussed in the last decade in the foreign scientific and educational literature, to substantiate of its importance, practical utility and the right on affirmation in Russian education.Methods. The research is based on the analysis of foreign studies of the phenomenon of computational thinking and the ways of its formation in the process of education; on comparing the notion of «computational thinking» with related concepts used in the Russian scientific and pedagogical literature.Results. The concept «computational thinking» is analyzed from the point of view of intuitive understanding and scientific and applied aspects. It is shown as computational thinking has evolved in the process of development of computers hardware and software. The practice-oriented interpretation of computational thinking which dominant among educators is described along with some ways of its formation. It is shown that computational thinking is a metasubject result of general education as well as its tool. From the point of view of the author, purposeful development of computational thinking should be one of the tasks of the Russian education.Scientific novelty. The author gives a theoretical justification of the role of computational thinking schemes as metasubject results of learning. The dynamics of the development of this concept is described. This process is connected with the evolution of computer and information technologies as well as increase of number of the tasks for effective solutions of which computational thinking is required. Author substantiated the affirmation that including «computational thinking » in the set of pedagogical concepts which are used in the national education system fills an existing gap.Practical significance. New metasubject result of education associated with

  8. Developmental Stages in School Computer Use: Neither Marx Nor Piaget.

    Science.gov (United States)

    Lengel, James G.

    Karl Marx's theory of stages can be applied to computer use in the schools. The first stage, the P Stage, comprises the entry of the computer into the school. Computer use at this stage is personal and tends to center around one personality. Social studies teachers are seldom among this select few. The second stage of computer use, the D Stage, is…

  9. Rapid Generation of Personalized HRTFs

    DEFF Research Database (Denmark)

    Huttunen, Tomi; Vanne, Antti; Harder, Stine

    Numerical simulations offer a viable alternative to measurements for generating personalized head-related transfer functions (HRTFs). The fast multipole boundary element method (FM-BEM) is a popular method for simulating the HRTFs since it requires a surface mesh of the head (and torso) only....... The FM-BEM simulation of the HRTF at a single frequency can be computed in a few minutes. Utilizing cloud computing, the entire audible frequency range can be simulated in less than an hour. A bottleneck in the fast acquisition of the personalized HRTFs has been the complexity of generating good quality...... head models for the simulation. We compare three photography based geometry acquisition methods, ranging from a system of 52 cameras to a method using a single mobile phone camera only....

  10. [Reconstruction of long polynucleotide sequences from fragments using the Iskra-226 personal computer

    Science.gov (United States)

    Kostetskiĭ, P V; Dobrova, I E

    1988-04-01

    An algorithm for reconstructing long DNA sequences, i.e. arranging all overlapping gel readings in the contigs, and the corresponding BASIC programme for personal computer "Iskra-226" (USSR) are described. The contig construction begins with the search for all fragments overlapping the basic (longest) one follower by determination of coordinates of 5' ends of the overlapping fragments. Then the gel reading with minimal 5' end coordinate and the gel reading with maximal 3' end coordinate are selected and used as basic ones at the next assembly steps. The procedure is finished when no gel reading overlapping the basic one can be found. All gel readings entered the contig are ignored at the next steps of the assembly. Finally, one or several contigs consisted of DNA fragments are obtained. Effectiveness of the algorithm was tested on a model based on the multiple assembly of the nucleotide sequence, encoding the Na, K-ATPase alpha-subunit of pig kidney. The programme does not call for user's participation and can comprise contigs up to 10,000 nucleotides long.

  11. Personality in speech assessment and automatic classification

    CERN Document Server

    Polzehl, Tim

    2015-01-01

    This work combines interdisciplinary knowledge and experience from research fields of psychology, linguistics, audio-processing, machine learning, and computer science. The work systematically explores a novel research topic devoted to automated modeling of personality expression from speech. For this aim, it introduces a novel personality assessment questionnaire and presents the results of extensive labeling sessions to annotate the speech data with personality assessments. It provides estimates of the Big 5 personality traits, i.e. openness, conscientiousness, extroversion, agreeableness, and neuroticism. Based on a database built on the questionnaire, the book presents models to tell apart different personality types or classes from speech automatically.

  12. Developing Educational Computer Animation Based on Human Personality Types

    Science.gov (United States)

    Musa, Sajid; Ziatdinov, Rushan; Sozcu, Omer Faruk; Griffiths, Carol

    2015-01-01

    Computer animation in the past decade has become one of the most noticeable features of technology-based learning environments. By its definition, it refers to simulated motion pictures showing movement of drawn objects, and is often defined as the art in movement. Its educational application known as educational computer animation is considered…

  13. Human-Computer Interfaces for Wearable Computers: A Systematic Approach to Development and Evaluation

    OpenAIRE

    Witt, Hendrik

    2007-01-01

    The research presented in this thesis examines user interfaces for wearable computers.Wearable computers are a special kind of mobile computers that can be worn on the body. Furthermore, they integrate themselves even more seamlessly into different activities than a mobile phone or a personal digital assistant can.The thesis investigates the development and evaluation of user interfaces for wearable computers. In particular, it presents fundamental research results as well as supporting softw...

  14. Computer Use Exposed

    NARCIS (Netherlands)

    J.M. Richter (Janneke)

    2009-01-01

    textabstractEver since the introduction of the personal computer, our daily lives are infl uenced more and more by computers. A day in the life of a PhD-student illustrates this: “At the breakfast table, I check my e-mail to see if the meeting later that day has been confi rmed, and I check the time

  15. Ubiquitous human computing.

    Science.gov (United States)

    Zittrain, Jonathan

    2008-10-28

    Ubiquitous computing means network connectivity everywhere, linking devices and systems as small as a drawing pin and as large as a worldwide product distribution chain. What could happen when people are so readily networked? This paper explores issues arising from two possible emerging models of ubiquitous human computing: fungible networked brainpower and collective personal vital sign monitoring.

  16. Real-time personal dose monitoring and management system

    International Nuclear Information System (INIS)

    Zhang Zhiyong; Cheng Chang; Yang Huating; Liu Zhengshan; Deng Changming; Li Mei

    2000-01-01

    This paper mainly describes a real-time personal dose monitoring and management system. The system is composed of three parts that include SDM-98 semiconductor detector personal dosimeters, Data Readers and a Management System Software. It can be used for personal dose monitoring and management and other controlling actions in a radioactive controlled area. Adopting semiconductor detector and microcontroller, SDM-98 Personal Dosimeter is used to measure personal accumulated dose equivalent and dose rate caused by X-ray and Gamma ray. The results can be read directly on LCD. All the data stored in dosimeter can be transmitted into a data reader by infrared optical link. The alarm threshold can be adjusted successively in whole range of dose or dose rate. The Data Reader is an intelligent interface between the dosimeter and master computer. The data received from dosimeter will be sent to a master computer through RS-232 serial interface. According to the master computer's order, the Data Reader can turn on the dosimeter's power at entrance and shutdown it at exit. The Management System Software which written by Visual BASIC 5.0 runs on MS Win95. All the measuring data from dosimeters can be analyzed and treated according to requirements and stored in database. Therefore, some figures and tables relative to dose or rate can be shown on screen or printed out. (author)

  17. Artificial intelligence in medicine and cardiac imaging: harnessing big data and advanced computing to provide personalized medical diagnosis and treatment.

    Science.gov (United States)

    Dilsizian, Steven E; Siegel, Eliot L

    2014-01-01

    Although advances in information technology in the past decade have come in quantum leaps in nearly every aspect of our lives, they seem to be coming at a slower pace in the field of medicine. However, the implementation of electronic health records (EHR) in hospitals is increasing rapidly, accelerated by the meaningful use initiatives associated with the Center for Medicare & Medicaid Services EHR Incentive Programs. The transition to electronic medical records and availability of patient data has been associated with increases in the volume and complexity of patient information, as well as an increase in medical alerts, with resulting "alert fatigue" and increased expectations for rapid and accurate diagnosis and treatment. Unfortunately, these increased demands on health care providers create greater risk for diagnostic and therapeutic errors. In the near future, artificial intelligence (AI)/machine learning will likely assist physicians with differential diagnosis of disease, treatment options suggestions, and recommendations, and, in the case of medical imaging, with cues in image interpretation. Mining and advanced analysis of "big data" in health care provide the potential not only to perform "in silico" research but also to provide "real time" diagnostic and (potentially) therapeutic recommendations based on empirical data. "On demand" access to high-performance computing and large health care databases will support and sustain our ability to achieve personalized medicine. The IBM Jeopardy! Challenge, which pitted the best all-time human players against the Watson computer, captured the imagination of millions of people across the world and demonstrated the potential to apply AI approaches to a wide variety of subject matter, including medicine. The combination of AI, big data, and massively parallel computing offers the potential to create a revolutionary way of practicing evidence-based, personalized medicine.

  18. A person is not a number: discourse involvement in subject-verb agreement computation.

    Science.gov (United States)

    Mancini, Simona; Molinaro, Nicola; Rizzi, Luigi; Carreiras, Manuel

    2011-09-02

    Agreement is a very important mechanism for language processing. Mainstream psycholinguistic research on subject-verb agreement processing has emphasized the purely formal and encapsulated nature of this phenomenon, positing an equivalent access to person and number features. However, person and number are intrinsically different, because person conveys extra-syntactic information concerning the participants in the speech act. To test the person-number dissociation hypothesis we investigated the neural correlates of subject-verb agreement in Spanish, using person and number violations. While number agreement violations produced a left-anterior negativity followed by a P600 with a posterior distribution, the negativity elicited by person anomalies had a centro-posterior maximum and was followed by a P600 effect that was frontally distributed in the early phase and posteriorly distributed in the late phase. These data reveal that the parser is differentially sensitive to the two features and that it deals with the two anomalies by adopting different strategies, due to the different levels of analysis affected by the person and number violations. Copyright © 2011 Elsevier B.V. All rights reserved.

  19. A Cloud Computing Approach to Personal Risk Management: The Open Hazards Group

    Science.gov (United States)

    Graves, W. R.; Holliday, J. R.; Rundle, J. B.

    2010-12-01

    According to the California Earthquake Authority, only about 12% of current California residences are covered by any form of earthquake insurance, down from about 30% in 1996 following the 1994, M6.7 Northridge earthquake. Part of the reason for this decreasing rate of insurance uptake is the high deductible, either 10% or 15% of the value of the structure, and the relatively high cost of the premiums, as much as thousands of dollars per year. The earthquake insurance industry is composed of the CEA, a public-private partnership; modeling companies that produce damage and loss models similar to the FEMA HAZUS model; and financial companies such as the insurance, reinsurance, and investment banking companies in New York, London, the Cayman Islands, Zurich, Dubai, Singapore, and elsewhere. In setting earthquake insurance rates, financial companies rely on models like HAZUS, that calculate on risk and exposure. In California, the process begins with an official earthquake forecast by the Working Group on California Earthquake Probabilities. Modeling companies use these 30 year earthquake probabilities as inputs to their attenuation and damage models to estimate the possible damage factors from scenario earthquakes. Economic loss is then estimated from processes such as structural failure, lost economic activity, demand surge, and fire following the earthquake. Once the potential losses are known, rates can be set so that a target ruin probability of less than 1% or so can be assured. Open Hazards Group was founded with the idea that the global public might be interested in a personal estimate of earthquake risk, computed using data supplied by the public, with models running in a cloud computing environment. These models process data from the ANSS catalog, updated at least daily, to produce rupture forecasts that are backtested with standard Reliability/Attributes and Receiver Operating Characteristic tests, among others. Models for attenuation and structural damage

  20. COMPUTING

    CERN Multimedia

    M. Kasemann

    Overview In autumn the main focus was to process and handle CRAFT data and to perform the Summer08 MC production. The operational aspects were well covered by regular Computing Shifts, experts on duty and Computing Run Coordination. At the Computing Resource Board (CRB) in October a model to account for service work at Tier 2s was approved. The computing resources for 2009 were reviewed for presentation at the C-RRB. The quarterly resource monitoring is continuing. Facilities/Infrastructure operations Operations during CRAFT data taking ran fine. This proved to be a very valuable experience for T0 workflows and operations. The transfers of custodial data to most T1s went smoothly. A first round of reprocessing started at the Tier-1 centers end of November; it will take about two weeks. The Computing Shifts procedure was tested full scale during this period and proved to be very efficient: 30 Computing Shifts Persons (CSP) and 10 Computing Resources Coordinators (CRC). The shift program for the shut down w...

  1. Evolution of product lifespan and implications for environmental assessment and management: a case study of personal computers in higher education.

    Science.gov (United States)

    Babbitt, Callie W; Kahhat, Ramzy; Williams, Eric; Babbitt, Gregory A

    2009-07-01

    Product lifespan is a fundamental variable in understanding the environmental impacts associated with the life cycle of products. Existing life cycle and materials flow studies of products, almost without exception, consider lifespan to be constant over time. To determine the validity of this assumption, this study provides an empirical documentation of the long-term evolution of personal computer lifespan, using a major U.S. university as a case study. Results indicate that over the period 1985-2000, computer lifespan (purchase to "disposal") decreased steadily from a mean of 10.7 years in 1985 to 5.5 years in 2000. The distribution of lifespan also evolved, becoming narrower over time. Overall, however, lifespan distribution was broader than normally considered in life cycle assessments or materials flow forecasts of electronic waste management for policy. We argue that these results suggest that at least for computers, the assumption of constant lifespan is problematic and that it is important to work toward understanding the dynamics of use patterns. We modify an age-structured model of population dynamics from biology as a modeling approach to describe product life cycles. Lastly, the purchase share and generation of obsolete computers from the higher education sector is estimated using different scenarios for the dynamics of product lifespan.

  2. Embedded systems for supporting computer accessibility.

    Science.gov (United States)

    Mulfari, Davide; Celesti, Antonio; Fazio, Maria; Villari, Massimo; Puliafito, Antonio

    2015-01-01

    Nowadays, customized AT software solutions allow their users to interact with various kinds of computer systems. Such tools are generally available on personal devices (e.g., smartphones, laptops and so on) commonly used by a person with a disability. In this paper, we investigate a way of using the aforementioned AT equipments in order to access many different devices without assistive preferences. The solution takes advantage of open source hardware and its core component consists of an affordable Linux embedded system: it grabs data coming from the assistive software, which runs on the user's personal device, then, after processing, it generates native keyboard and mouse HID commands for the target computing device controlled by the end user. This process supports any operating system available on the target machine and it requires no specialized software installation; therefore the user with a disability can rely on a single assistive tool to control a wide range of computing platforms, including conventional computers and many kinds of mobile devices, which receive input commands through the USB HID protocol.

  3. Multi-person localization and orientation estimation in volumetric scene reconstructions

    NARCIS (Netherlands)

    Liem, M.C.

    2014-01-01

    Accurate localization of persons and estimation of their pose are important topics in current-day computer vision research. As part of the pose estimation, estimating the body orientation of a person (i.e. rotation around torso major axis) conveys important information about the person's current

  4. Un moteur de recherche scalable pour le Personal Cloud

    OpenAIRE

    Lallali , Saliha

    2016-01-01

    The emerging Personal Cloud paradigm holds the promise of a Privacy-by-Design storage and computing platform where personal data remains under the individual's control while being shared by valuable applications. However, leaving the data management control to user's hands pushes the security issues to the user's platform, i.e., the Personal server. This Personal server is in charge of organizing the personal dataspace in a document database style to ease its management, to allow crossing dat...

  5. Efficiency improvement opportunities for personal computer monitors. Implications for market transformation programs

    Energy Technology Data Exchange (ETDEWEB)

    Park, Won Young; Phadke, Amol; Shah, Nihar [Environmental Energy Technologies Division, Lawrence Berkeley National Laboratory, Berkeley, CA (United States)

    2013-08-15

    Displays account for a significant portion of electricity consumed in personal computer (PC) use, and global PC monitor shipments are expected to continue to increase. We assess the market trends in the energy efficiency of PC monitors that are likely to occur without any additional policy intervention and estimate that PC monitor efficiency will likely improve by over 40 % by 2015 with saving potential of 4.5 TWh per year in 2015, compared to today's technology. We discuss various energy-efficiency improvement options and evaluate the cost-effectiveness of three of them, at least one of which improves efficiency by at least 20 % cost effectively beyond the ongoing market trends. We assess the potential for further improving efficiency taking into account the recent development of universal serial bus-powered liquid crystal display monitors and find that the current technology available and deployed in them has the potential to deeply and cost effectively reduce energy consumption by as much as 50 %. We provide insights for policies and programs that can be used to accelerate the adoption of efficient technologies to further capture global energy saving potential from PC monitors which we estimate to be 9.2 TWh per year in 2015.

  6. An Approach To Personalized e-Learning

    Directory of Open Access Journals (Sweden)

    Matteo Gaeta

    2013-02-01

    Full Text Available This paper focuses on the concept of personalized e-Learning for the computer science (or informatics education. Several authors have stated that personalization, in educational context, allows executing more efficient and effective learning processes. On the other side the use of Semantic Web technologies (e.g. ontologies is more and more often considered as a technological basis for personalization in e-Learning (the so-called self-regulated learning. In this paper we describe how personalization can be exploited in e-Learning systems, focusing on our proposal: the Intelligent Web Teacher (IWT. Therefore we present the evaluation of our personalization tools tested in real academic courses, where e-Learning activities are carried out to complement the traditional lectures.

  7. Real-time image reconstruction and display system for MRI using a high-speed personal computer.

    Science.gov (United States)

    Haishi, T; Kose, K

    1998-09-01

    A real-time NMR image reconstruction and display system was developed using a high-speed personal computer and optimized for the 32-bit multitasking Microsoft Windows 95 operating system. The system was operated at various CPU clock frequencies by changing the motherboard clock frequency and the processor/bus frequency ratio. When the Pentium CPU was used at the 200 MHz clock frequency, the reconstruction time for one 128 x 128 pixel image was 48 ms and that for the image display on the enlarged 256 x 256 pixel window was about 8 ms. NMR imaging experiments were performed with three fast imaging sequences (FLASH, multishot EPI, and one-shot EPI) to demonstrate the ability of the real-time system. It was concluded that in most cases, high-speed PC would be the best choice for the image reconstruction and display system for real-time MRI. Copyright 1998 Academic Press.

  8. High speed graphic program on a personal computer and its utilization in JIPP T-IIU online data-processing system

    International Nuclear Information System (INIS)

    Taniguchi, Yoshiyuki; Noda, Nobuaki; Sasao, Mamiko; Sato, Masahiro

    1986-01-01

    A high speed graphic program was developed on a personal computer PC9801. Using this program, one can draw a waveform of successive 16 bit-integer data, such as obtained by analog-to-digital convertor. The program is written by the machine language and has a form of a subroutine program which can be called from main programs under N 88 BASIC. The time for drawing one waveform is 4 ms, which is two orders faster than the time with standard graphic routines of BASIC interpreter. This program is very convenient for the real-time display of plasma-monitoring raw data, such as plasma current, loop voltage, rf power etc. in tokamak experiments. This program has been utilized in JIPP T-IIU experiments and enables to display data of 8 channel ADC within a few seconds before the system transmits the data from CAMAC to the computer center of the institute. The program and its utilization are presented. (author)

  9. Medical Imaging Informatics: Towards a Personalized Computational Patient.

    Science.gov (United States)

    Ayache, N

    2016-05-20

    Medical Imaging Informatics has become a fast evolving discipline at the crossing of Informatics, Computational Sciences, and Medicine that is profoundly changing medical practices, for the patients' benefit.

  10. Pilot evaluation of the Computer-Based Assessment for Sampling Personal Characteristics test.

    Science.gov (United States)

    Shipper, Edward S; Mazer, Laura M; Merrell, Sylvia Bereknyei; Lin, Dana T; Lau, James N; Melcher, Marc L

    2017-07-01

    High attrition rates hint at deficiencies in the resident selection process. The evaluation of personal characteristics representative of success is difficult. Here, we evaluate a novel tool for assessing personal characteristics. To evaluate feasibility, we used an anonymous voluntary survey questionnaire offered to study participants before and after contact with the CASPer test. To evaluate the CASPer test as a predictor of success, we compared CASPer test assessments of personal characteristics versus traditional faculty assessment of personal characteristics with applicant rank list position. All applicants (n = 77) attending an in-person interview for general surgery residency, and all faculty interviewers (n = 34) who reviewed these applications were invited to participate. Among applicants, 84.4% of respondents (65 of 77) reported that a requirement to complete the CASPer test would have no bearing or would make them more likely to apply to the program (mean = 3.30, standard deviation = 0.96). Among the faculty, 62.5% respondents (10 of 16) reported that the same condition would have no bearing or would make applicants more likely to apply to the program (mean = 3.19, standard deviation = 1.33). The Spearman's rank-order correlation coefficients for the relationships between traditional faculty assessment of personal characteristics and applicant rank list position, and novel CASPer assessment of personal characteristics and applicant rank list position, were -0.45 (P = 0.033) and -0.41 (P = 0.055), respectively. The CASPer test may be feasibly implemented as component of the resident selection process, with the potential to predict applicant rank list position and improve the general surgery resident selection process. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. Click! 101 Computer Activities and Art Projects for Kids and Grown-Ups.

    Science.gov (United States)

    Bundesen, Lynne; And Others

    This book presents 101 computer activities and projects geared toward children and adults. The activities for both personal computers (PCs) and Macintosh were developed on the Windows 95 computer operating system, but they are adaptable to non-Windows personal computers as well. The book is divided into two parts. The first part provides an…

  12. Context-aware Cloud Computing for Personal Learning Environment

    OpenAIRE

    Chen, Feng; Al-Bayatti, Ali Hilal; Siewe, Francois

    2016-01-01

    Virtual learning means to learn from social interactions in a virtual platform that enables people to study anywhere and at any time. Current Virtual Learning Environments (VLEs) are a range of integrated web based applications to support and enhance the education. Normally, VLEs are institution centric; are owned by the institutions and are designed to support formal learning, which do not support lifelong learning. These limitations led to the research of Personal Learning Environments (PLE...

  13. Computing shifts to monitor ATLAS distributed computing infrastructure and operations

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00068610; The ATLAS collaboration; Barberis, Dario; Crepe-Renaudin, Sabine Chrystel; De, Kaushik; Fassi, Farida; Stradling, Alden; Svatos, Michal; Vartapetian, Armen; Wolters, Helmut

    2017-01-01

    The ATLAS Distributed Computing (ADC) group established a new Computing Run Coordinator (CRC) shift at the start of LHC Run 2 in 2015. The main goal was to rely on a person with a good overview of the ADC activities to ease the ADC experts’ workload. The CRC shifter keeps track of ADC tasks related to their fields of expertise and responsibility. At the same time, the shifter maintains a global view of the day-to-day operations of the ADC system. During Run 1, this task was accomplished by a person of the expert team called the ADC Manager on Duty (AMOD), a position that was removed during the shutdown period due to the reduced number and availability of ADC experts foreseen for Run 2. The CRC position was proposed to cover some of the AMODs former functions, while allowing more people involved in computing to participate. In this way, CRC shifters help with the training of future ADC experts. The CRC shifters coordinate daily ADC shift operations, including tracking open issues, reporting, and representing...

  14. Personality from a cognitive-biological perspective

    Science.gov (United States)

    Neuman, Yair

    2014-12-01

    The term "personality" is used to describe a distinctive and relatively stable set of mental traits that aim to explain the organism's behavior. The concept of personality that emerged in human psychology has been also applied to the study of non-human organisms from birds to horses. In this paper, I critically review the concept of personality from an interdisciplinary perspective, and point to some ideas that may be used for developing a cognitive-biological theory of personality. Integrating theories and research findings from various fields such as cognitive ethnology, clinical psychology, and neuroscience, I argue that the common denominator of various personality theories are neural systems of threat/trust management and their emotional, cognitive, and behavioral dimensions. In this context, personality may be also conceived as a meta-heuristics both human and non-human organisms apply to model and predict the behavior of others. The paper concludes by suggesting a minimal computational model of personality that may guide future research.

  15. Computer Games as Therapy for Persons with Stroke.

    Science.gov (United States)

    Lauterbach, Sarah A; Foreman, Matt H; Engsberg, Jack R

    2013-02-01

    Stroke affects approximately 800,000 individuals each year, with 65% having residual impairments. Studies have demonstrated that mass practice leads to regaining motor function in affected extremities; however, traditional therapy does not include the repetitions needed for this recovery. Videogames have been shown to be good motivators to complete repetitions. Advances in technology and low-cost hardware bring new opportunities to use computer games during stroke therapy. This study examined the use of the Microsoft (Redmond, WA) Kinect™ and Flexible Action and Articulated Skeleton Toolkit (FAAST) software as a therapy tool to play existing free computer games on the Internet. Three participants attended a 1-hour session where they played two games with upper extremity movements as game controls. Video was taken for analysis of movement repetitions, and questions were answered about participant history and their perceptions of the games. Participants remained engaged through both games; regardless of previous computer use all participants successfully played two games. Five minutes of game play averaged 34 repetitions of the affected extremity. The Intrinsic Motivation Inventory showed a high level of satisfaction in two of the three participants. The Kinect Sensor with the FAAST software has the potential to be an economical tool to be used alongside traditional therapy to increase the number of repetitions completed in a motivating and engaging way for clients.

  16. Personal optical disk library (PODL) for knowledge engineering

    Science.gov (United States)

    Wang, Hong; Jia, Huibo; Xu, Duanyi

    2001-02-01

    This paper describes the structure of Personal Optical Disk Library (PODL), a kind of large capacity (40 GB) optical storage equipment for personal usage. With the knowledge engineering technology integrated in the PODL, it can be used on knowledge query, knowledge discovery, Computer-Aided Instruction (CAI) and Online Analysis Process (OLAP).

  17. Advancing E-Commerce Personalization: Process Framework and Case Study

    NARCIS (Netherlands)

    Kaptein, M.C.; Parvinen, P.

    2015-01-01

    Personalization is widely used in e-commerce, and as computational power increases, personalization is now within reach for many online vendors. We describe a process framework to structure our knowledge of online personalization both from academia and from applied attempts. This framework is

  18. Personal continuous route pattern mining

    Institute of Scientific and Technical Information of China (English)

    Qian YE; Ling CHEN; Gen-cai CHEN

    2009-01-01

    In the daily life, people often repeat regular routes in certain periods. In this paper, a mining system is developed to find the continuous route patterns of personal past trips. In order to count the diversity of personal moving status, the mining system employs the adaptive GPS data recording and five data filters to guarantee the clean trips data. The mining system uses a client/server architecture to protect personal privacy and to reduce the computational load. The server conducts the main mining procedure but with insufficient information to recover real personal routes. In order to improve the scalability of sequential pattern mining, a novel pattern mining algorithm, continuous route pattern mining (CRPM), is proposed. This algorithm can tolerate the different disturbances in real routes and extract the frequent patterns. Experimental results based on nine persons' trips show that CRPM can extract more than two times longer route patterns than the traditional route pattern mining algorithms.

  19. Cloud Computing-An Ultimate Technique to Minimize Computing cost for Developing Countries

    OpenAIRE

    Narendra Kumar; Shikha Jain

    2012-01-01

    The presented paper deals with how remotely managed computing and IT resources can be beneficial in the developing countries like India and Asian sub-continent countries. This paper not only defines the architectures and functionalities of cloud computing but also indicates strongly about the current demand of Cloud computing to achieve organizational and personal level of IT supports in very minimal cost with high class flexibility. The power of cloud can be used to reduce the cost of IT - r...

  20. Power levels in office equipment: Measurements of new monitors and personal computers

    International Nuclear Information System (INIS)

    Roberson, Judy A.; Brown, Richard E.; Nordman, Bruce; Webber, Carrie A.; Homan, Gregory H.; Mahajan, Akshay; McWhinney, Marla; Koomey, Jonathan G.

    2002-01-01

    Electronic office equipment has proliferated rapidly over the last twenty years and is projected to continue growing in the future. Efforts to reduce the growth in office equipment energy use have focused on power management to reduce power consumption of electronic devices when not being used for their primary purpose. The EPA ENERGY STAR[registered trademark] program has been instrumental in gaining widespread support for power management in office equipment, and accurate information about the energy used by office equipment in all power levels is important to improving program design and evaluation. This paper presents the results of a field study conducted during 2001 to measure the power levels of new monitors and personal computers. We measured off, on, and low-power levels in about 60 units manufactured since July 2000. The paper summarizes power data collected, explores differences within the sample (e.g., between CRT and LCD monitors), and discusses some issues that arise in m etering office equipment. We also present conclusions to help improve the success of future power management programs.Our findings include a trend among monitor manufacturers to provide a single very low low-power level, and the need to standardize methods for measuring monitor on power, to more accurately estimate the annual energy consumption of office equipment, as well as actual and potential energy savings from power management

  1. FITSManager: Management of Personal Astronomical Data

    Science.gov (United States)

    Cui, Chenzhou; Fan, Dongwei; Zhao, Yongheng; Kembhavi, Ajit; He, Boliang; Cao, Zihuang; Li, Jian; Nandrekar, Deoyani

    2011-07-01

    With the increase of personal storage capacity, it is easy to find hundreds to thousands of FITS files in the personal computer of an astrophysicist. Because Flexible Image Transport System (FITS) is a professional data format initiated by astronomers and used mainly in the small community, data management toolkits for FITS files are very few. Astronomers need a powerful tool to help them manage their local astronomical data. Although Virtual Observatory (VO) is a network oriented astronomical research environment, its applications and related technologies provide useful solutions to enhance the management and utilization of astronomical data hosted in an astronomer's personal computer. FITSManager is such a tool to provide astronomers an efficient management and utilization of their local data, bringing VO to astronomers in a seamless and transparent way. FITSManager provides fruitful functions for FITS file management, like thumbnail, preview, type dependent icons, header keyword indexing and search, collaborated working with other tools and online services, and so on. The development of the FITSManager is an effort to fill the gap between management and analysis of astronomical data.

  2. Computer training, present and future.

    Science.gov (United States)

    Smith, G. A.

    1972-01-01

    The products of educational firms today lead toward a multimedia approach to the education and training of commercial programmers and systems analysts. Computer-assisted instruction or CAI is a relatively new medium to augment the other media. The government use of computers is discussed together with the importance of computer pretests. Pretests can aid in determining a person's ability to absorb a particular instructional level. The material presented in a number of computer courses is listed.

  3. SmartShadow models and methods for pervasive computing

    CERN Document Server

    Wu, Zhaohui

    2013-01-01

    SmartShadow: Models and Methods for Pervasive Computing offers a new perspective on pervasive computing with SmartShadow, which is designed to model a user as a personality ""shadow"" and to model pervasive computing environments as user-centric dynamic virtual personal spaces. Just like human beings' shadows in the physical world, it follows people wherever they go, providing them with pervasive services. The model, methods, and software infrastructure for SmartShadow are presented and an application for smart cars is also introduced.  The book can serve as a valuable reference work for resea

  4. Life cycle assessment study of a Chinese desktop personal computer.

    Science.gov (United States)

    Duan, Huabo; Eugster, Martin; Hischier, Roland; Streicher-Porte, Martin; Li, Jinhui

    2009-02-15

    Associated with the tremendous prosperity in world electronic information and telecommunication industry, there continues to be an increasing awareness of the environmental impacts related to the accelerating mass production, electricity use, and waste management of electronic and electric products (e-products). China's importance as both a consumer and supplier of e-products has grown at an unprecedented pace in recent decade. Hence, this paper aims to describe the application of life cycle assessment (LCA) to investigate the environmental performance of Chinese e-products from a global level. A desktop personal computer system has been selected to carry out a detailed and modular LCA which follows the ISO 14040 series. The LCA is constructed by SimaPro software version 7.0 and expressed with the Eco-indicator'99 life cycle impact assessment method. For a sensitivity analysis of the overall LCA results, the so-called CML method is used in order to estimate the influence of the choice of the assessment method on the result. Life cycle inventory information is complied by ecoinvent 1.3 databases, combined with literature and field investigations on the present Chinese situation. The established LCA study shows that that the manufacturing and the use of such devices are of the highest environmental importance. In the manufacturing of such devices, the integrated circuits (ICs) and the Liquid Crystal Display (LCD) are those parts contributing most to the impact. As no other aspects are taken into account during the use phase, the impact is due to the way how the electricity is produced. The final process steps--i.e. the end of life phase--lead to a clear environmental benefit if a formal and modern, up-to-date technical system is assumed, like here in this study.

  5. Life cycle assessment study of a Chinese desktop personal computer

    International Nuclear Information System (INIS)

    Duan Huabo; Eugster, Martin; Hischier, Roland; Streicher-Porte, Martin; Li Jinhui

    2009-01-01

    Associated with the tremendous prosperity in world electronic information and telecommunication industry, there continues to be an increasing awareness of the environmental impacts related to the accelerating mass production, electricity use, and waste management of electronic and electric products (e-products). China's importance as both a consumer and supplier of e-products has grown at an unprecedented pace in recent decade. Hence, this paper aims to describe the application of life cycle assessment (LCA) to investigate the environmental performance of Chinese e-products from a global level. A desktop personal computer system has been selected to carry out a detailed and modular LCA which follows the ISO 14040 series. The LCA is constructed by SimaPro software version 7.0 and expressed with the Eco-indicator'99 life cycle impact assessment method. For a sensitivity analysis of the overall LCA results, the so-called CML method is used in order to estimate the influence of the choice of the assessment method on the result. Life cycle inventory information is complied by ecoinvent 1.3 databases, combined with literature and field investigations on the present Chinese situation. The established LCA study shows that that the manufacturing and the use of such devices are of the highest environmental importance. In the manufacturing of such devices, the integrated circuits (ICs) and the Liquid Crystal Display (LCD) are those parts contributing most to the impact. As no other aspects are taken into account during the use phase, the impact is due to the way how the electricity is produced. The final process steps - i.e. the end of life phase - lead to a clear environmental benefit if a formal and modern, up-to-date technical system is assumed, like here in this study

  6. Advancing e-commerce personalization : Process framework and case study

    NARCIS (Netherlands)

    Kaptein, Maurits; Parvinen, Petri

    2015-01-01

    Personalization is widely used in e-commerce, and as computational power increases, personalization is now within reach for many online vendors. We describe a process framework to structure our knowledge of online personalization —both from academia and from applied attempts. This framework is

  7. CFD Simulations of Contaminant Transport between two Breathing Persons

    DEFF Research Database (Denmark)

    Bjørn, Erik; Nielsen, Peter V.

    Experiments have shown that exhalation from one person is able to penetrate the breathing zone of another person at a distance. Computational Fluid Dynamics (CFD) is used to investigate the dependency of the personal exposure on some physical parameters, namely: Pulmonary ventilation rate......, convective heat output, exhalation temperature, and crosssectional exhalation area. Full-scale experimental results are used to calibrate/validate the CFD model....

  8. Multi-patch matching for person re-identification

    Science.gov (United States)

    Labidi, Hocine; Luo, Sen-Lin; Boubekeur, Mohamed B.; Benlefki, Tarek

    2015-08-01

    Recognizing a target object across non-overlapping distributed cameras is known in the computer vision community as the problem of person re-identification. In this paper, a multi-patch matching method for person reidentification is presented. Starting from the assumption that: the appearance (clothes) of a person does not change during the time of passing in different cameras field of view , which means the regions with the same color in target image will be identical while crossing cameras. First, we extract distinctive features in the training procedure, where each image target is devised into small patches, the SIFT features and LAB color histograms are computed for each patch. Then we use the KNN approach to detect group of patches with high similarity in the target image and then we use a bi-directional weighted group matching mechanism for the re-identification. Experiments on a challenging VIPeR dataset show that the performances of the proposed method outperform several baselines and state of the art approaches.

  9. Minimal mobile human computer interaction

    NARCIS (Netherlands)

    el Ali, A.

    2013-01-01

    In the last 20 years, the widespread adoption of personal, mobile computing devices in everyday life, has allowed entry into a new technological era in Human Computer Interaction (HCI). The constant change of the physical and social context in a user's situation made possible by the portability of

  10. Automation of potentiometric titration with a personal computer using ...

    African Journals Online (AJOL)

    sampling was designed and tested for automation of potentiometric titrations with personal ... automation permits us to carry out new types of experiments, such as those requiring ... have proved to be very useful in routine tasks but not in research, due to their ... This is done by a simple delay sub-routine in data acquisition.

  11. Operational Circular nr 5 - October 2000 USE OF CERN COMPUTING FACILITIES

    CERN Multimedia

    Division HR

    2000-01-01

    New rules covering the use of CERN Computing facilities have been drawn up. All users of CERN’s computing facilites are subject to these rules, as well as to the subsidiary rules of use. The Computing Rules explicitly address your responsibility for taking reasonable precautions to protect computing equipment and accounts. In particular, passwords must not be easily guessed or obtained by others. Given the difficulty to completely separate work and personal use of computing facilities, the rules define under which conditions limited personal use is tolerated. For example, limited personal use of e-mail, news groups or web browsing is tolerated in your private time, provided CERN resources and your official duties are not adversely affected. The full conditions governing use of CERN’s computing facilities are contained in Operational Circular N° 5, which you are requested to read. Full details are available at : http://www.cern.ch/ComputingRules Copies of the circular are also available in the Divis...

  12. Personality types and Facebook advertising::an exploratory study

    OpenAIRE

    Clark, Lillian; Calli, Levent

    2014-01-01

    The Five-Factor Model of personality types has been utilized by a number of computer science and psychology academics as a framework to explore aspects of internet adoption and, more recently, social media adoption and behaviours. While the use of personality type models in research has been less popular with marketing academics, the Five-Factor Model has been used to predict the emotional appeal of advertising based on personality types and potentially to provide guidelines for tailoring adv...

  13. Speech spectrum's correlation with speakers' Eysenck personality traits.

    Directory of Open Access Journals (Sweden)

    Chao Hu

    Full Text Available The current study explored the correlation between speakers' Eysenck personality traits and speech spectrum parameters. Forty-six subjects completed the Eysenck Personality Questionnaire. They were instructed to verbally answer the questions shown on a computer screen and their responses were recorded by the computer. Spectrum parameters of /sh/ and /i/ were analyzed by Praat voice software. Formant frequencies of the consonant /sh/ in lying responses were significantly lower than that in truthful responses, whereas no difference existed on the vowel /i/ speech spectrum. The second formant bandwidth of the consonant /sh/ speech spectrum was significantly correlated with the personality traits of Psychoticism, Extraversion, and Neuroticism, and the correlation differed between truthful and lying responses, whereas the first formant frequency of the vowel /i/ speech spectrum was negatively correlated with Neuroticism in both response types. The results suggest that personality characteristics may be conveyed through the human voice, although the extent to which these effects are due to physiological differences in the organs associated with speech or to a general Pygmalion effect is yet unknown.

  14. Computer-Based Simulation Games in Public Administration Education

    OpenAIRE

    Kutergina Evgeniia

    2017-01-01

    Computer simulation, an active learning technique, is now one of the advanced pedagogical technologies. Th e use of simulation games in the educational process allows students to gain a firsthand understanding of the processes of real life. Public- administration, public-policy and political-science courses increasingly adopt simulation games in universities worldwide. Besides person-to-person simulation games, there are computer-based simulations in public-administration education. Currently...

  15. Use of personal computers for Gothic arch tracing: analysis and evaluation of horizontal mandibular positions with edentulous prosthesis.

    Science.gov (United States)

    Watanabe, Y

    1999-11-01

    Determining mandibular position for an edentulous patient raises the question of whether to emphasize centric relation or muscular position. This challenge results from the lack of a convenient procedure for quantifying the horizontal mandibular position, which can be determined by a variety of methods. This study analyzed and evaluated the horizontal mandibular positions produced by different guidance systems. Twenty-six edentulous subjects with no clinical evidence of abnormality of temporomandibular disorder were selected. Horizontal position data for the mandible obtained by gothic arch tracing was loaded into a personal computer by setting the sensor portion of a digitizer into the oral cavity to serve as a miniature lightweight tracing board. By connecting this with a digitizer control circuit set in an extraoral location, each mandibular position was displayed in a distinguishable manner on a computer display in real time, then recorded and analyzed. The gothic arch apex and tapping point varied, depending on body position. In the supine position, the gothic arch apex and the tapping point were close to the mandibular position determined by bilateral manipulation. This system provides effective data concerning mandibular positions for fabrication of dentures.

  16. Personality from a cognitive-biological perspective.

    Science.gov (United States)

    Neuman, Yair

    2014-12-01

    The term "personality" is used to describe a distinctive and relatively stable set of mental traits that aim to explain the organism's behavior. The concept of personality that emerged in human psychology has been also applied to the study of non-human organisms from birds to horses. In this paper, I critically review the concept of personality from an interdisciplinary perspective, and point to some ideas that may be used for developing a cognitive-biological theory of personality. Integrating theories and research findings from various fields such as cognitive ethnology, clinical psychology, and neuroscience, I argue that the common denominator of various personality theories are neural systems of threat/trust management and their emotional, cognitive, and behavioral dimensions. In this context, personality may be also conceived as a meta-heuristics both human and non-human organisms apply to model and predict the behavior of others. The paper concludes by suggesting a minimal computational model of personality that may guide future research. Copyright © 2014 Elsevier B.V. All rights reserved.

  17. PENGEMBANGAN SISTEM EKSPERIMEN VISKOSITAS BERBASIS PERSONAL KOMPUTER DAN MIKROKONTROLER MCS-51

    OpenAIRE

    Yohandri Yohandri

    2010-01-01

    In this work, viscosity experiment system based on personal computer and microcontroller MCS-51 has been developed. The new model of viscosity experiment system is purposed to perfom the time and viscosity calculation automatically on the personal computer. The graph and statical analysis are used to determine characteristics of LDR sensor and experiment system such as sensitivity, accuracy, and precision. There were four main results of this research as follow : 1). LDR sensor resistance dec...

  18. Computer codes used in particle accelerator design: First edition

    International Nuclear Information System (INIS)

    1987-01-01

    This paper contains a listing of more than 150 programs that have been used in the design and analysis of accelerators. Given on each citation are person to contact, classification of the computer code, publications describing the code, computer and language runned on, and a short description of the code. Codes are indexed by subject, person to contact, and code acronym

  19. Designer Modeling for Personalized Game Content Creation Tools

    DEFF Research Database (Denmark)

    Liapis, Antonios; Yannakakis, Georgios N.; Togelius, Julian

    2013-01-01

    preferences, goals and processes from their interaction with a computer-aided design tool, and suggests methods and domains within game development where such a model can be applied. We describe how designer modeling could be integrated with current work on automated and mixed-initiative content creation......With the growing use of automated content creation and computer-aided design tools in game development, there is potential for enhancing the design process through personalized interactions between the software and the game developer. This paper proposes designer modeling for capturing the designer’s......, and envision future directions which focus on personalizing the processes to a designer’s particular wishes....

  20. Advanced computer-based training

    Energy Technology Data Exchange (ETDEWEB)

    Fischer, H D; Martin, H D

    1987-05-01

    The paper presents new techniques of computer-based training for personnel of nuclear power plants. Training on full-scope simulators is further increased by use of dedicated computer-based equipment. An interactive communication system runs on a personal computer linked to a video disc; a part-task simulator runs on 32 bit process computers and shows two versions: as functional trainer or as on-line predictor with an interactive learning system (OPAL), which may be well-tailored to a specific nuclear power plant. The common goal of both develoments is the optimization of the cost-benefit ratio for training and equipment.

  1. Advanced computer-based training

    International Nuclear Information System (INIS)

    Fischer, H.D.; Martin, H.D.

    1987-01-01

    The paper presents new techniques of computer-based training for personnel of nuclear power plants. Training on full-scope simulators is further increased by use of dedicated computer-based equipment. An interactive communication system runs on a personal computer linked to a video disc; a part-task simulator runs on 32 bit process computers and shows two versions: as functional trainer or as on-line predictor with an interactive learning system (OPAL), which may be well-tailored to a specific nuclear power plant. The common goal of both develoments is the optimization of the cost-benefit ratio for training and equipment. (orig.) [de

  2. Neuroimaging in Antisocial Personality Disorder

    Directory of Open Access Journals (Sweden)

    Abdullah Yildirim

    2015-03-01

    Full Text Available Neuroimaging has been used in antisocial personality disorder since the invention of computed tomography and new modalities are introduced as technology advances. Magnetic resonance imaging, diffusion tensor imaging, functional magnetic resonance imaging and radionuclide imaging are such techniques that are currently used in neuroimaging. Although neuroimaging is an indispensible tool for psychiatric reseach, its clinical utility is questionable until new modalities become more accessible and regularly used in clinical practice. The aim of this paper is to provide clinicians with an introductory knowledge on neuroimaging in antisocial personality disorder including basic physics principles, current contributions to general understanding of pathophysiology in antisocial personality disorder and possible future applications of neuroimaging. [Psikiyatride Guncel Yaklasimlar - Current Approaches in Psychiatry 2015; 7(1: 98-108

  3. Quantum mechanics on the personal computer

    International Nuclear Information System (INIS)

    Brandt, S.; Dahmen, H.D.

    1989-01-01

    'Quantum Mechanics on the PC' presents the most up-to-date access to elementary quantum mechanics. Based on the interactive program Interquanta (included on a 5 1/4'' Floppy Disk, MS-DOS) and its extensive 3D colour graphic features, the book guides its readers through computer experiments on - free particles and wave packets - bound states in various potentials - coherent and squeezed states in time-dependent motion - scattering and resonances - analogies in optics - quantized angular momentum - distinguishable and indistinguishable particles - special functions of mathematical physics. The course with a wide variety of more than 250 detailed, class-tested problems provides students with a unique practical experience of complex probability amplitudes, eigenvalues, scattering cross sections and the like. Lecturers and teachers will find excellent, hands-on classroom demonstrations for their quantum mechanics course. (orig.)

  4. Factors influencing exemplary science teachers' levels of computer use

    Science.gov (United States)

    Hakverdi, Meral

    This study examines exemplary science teachers' use of technology in science instruction, factors influencing their level of computer use, their level of knowledge/skills in using specific computer applications for science instruction, their use of computer-related applications/tools during their instruction, and their students' use of computer applications/tools in or for their science class. After a relevant review of the literature certain variables were selected for analysis. These variables included personal self-efficacy in teaching with computers, outcome expectancy, pupil-control ideology, level of computer use, age, gender, teaching experience, personal computer use, professional computer use and science teachers' level of knowledge/skills in using specific computer applications for science instruction. The sample for this study includes middle and high school science teachers who received the Presidential Award for Excellence in Science Teaching Award (sponsored by the White House and the National Science Foundation) between the years 1997 and 2003 from all 50 states and U.S. territories. Award-winning science teachers were contacted about the survey via e-mail or letter with an enclosed return envelope. Of the 334 award-winning science teachers, usable responses were received from 92 science teachers, which made a response rate of 27.5%. Analysis of the survey responses indicated that exemplary science teachers have a variety of knowledge/skills in using computer related applications/tools. The most commonly used computer applications/tools are information retrieval via the Internet, presentation tools, online communication, digital cameras, and data collection probes. Results of the study revealed that students' use of technology in their science classroom is highly correlated with the frequency of their science teachers' use of computer applications/tools. The results of the multiple regression analysis revealed that personal self-efficacy related to

  5. From fear to flow personality and information interaction

    CERN Document Server

    Heinstrom, Jannica

    2010-01-01

    From Fear to Flow explores how personality traits may influence attitude, behaviour and reaction to information. Consideration is made for individual differences in information behaviour and reasons behind individual search differences. The book reviews personality and information behaviour and discusses how personality may influence the attitude towards information. Reaction to information is examined in contexts such as everyday life, decision-making, work, studies and human-computer interaction.Introduces a little researched area which is current and needed in our Informatio

  6. Graphing and Percentage Applications Using the Personal Computer.

    Science.gov (United States)

    Innes, Jay

    1985-01-01

    The paper describes how "IBM Graphing Assistant" and "Apple Softgraph" can foster a multifaceted approach to application of mathematical concepts and how a survey can be undertaken using the computer as word processor, data bank, and source of visual displays. Mathematical skills reinforced include estimating, rounding, graphing, and solving…

  7. COMPUTER-ASSISTED ACCOUNTING

    Directory of Open Access Journals (Sweden)

    SORIN-CIPRIAN TEIUŞAN

    2009-01-01

    Full Text Available What is computer-assisted accounting? Where is the place and what is the role of the computer in the financial-accounting activity? What is the position and importance of the computer in the accountant’s activity? All these are questions that require scientific research in order to find the answers. The paper approaches the issue of the support granted to the accountant to organize and manage the accounting activity by the computer. Starting from the notions of accounting and computer, the concept of computer-assisted accounting is introduced, it has a general character and it refers to the accounting performed with the help of the computer or using the computer to automate the procedures performed by the person who is doing the accounting activity; this is a concept used to define the computer applications of the accounting activity. The arguments regarding the use of the computer to assist accounting targets the accounting informatization, the automating of the financial-accounting activities and the endowment with modern technology of the contemporary accounting.

  8. Personal information search on mobile devices

    OpenAIRE

    Akbas, Mehmet.

    2007-01-01

    Today's mobile devices, especially mobile phones, are comparable in computing capability and storage to the desktop computers of a few years ago. The volume and diversity of the information kept on mobile devices has continually increased and users have taken advantage of this. Since information is being stored on multiple devices, searching for and retrieving the desired information has become an important function. This thesis focuses on search with regard to Personal Information Manag...

  9. Use of computer games as an intervention for stroke.

    Science.gov (United States)

    Proffitt, Rachel M; Alankus, Gazihan; Kelleher, Caitlin L; Engsberg, Jack R

    2011-01-01

    Current rehabilitation for persons with hemiparesis after stroke requires high numbers of repetitions to be in accordance with contemporary motor learning principles. The motivational characteristics of computer games can be harnessed to create engaging interventions for persons with hemiparesis after stroke that incorporate this high number of repetitions. The purpose of this case report was to test the feasibility of using computer games as a 6-week home therapy intervention to improve upper extremity function for a person with stroke. One person with left upper extremity hemiparesis after stroke participated in a 6-week home therapy computer game intervention. The games were customized to her preferences and abilities and modified weekly. Her performance was tracked and analyzed. Data from pre-, mid-, and postintervention testing using standard upper extremity measures and the Reaching Performance Scale (RPS) were analyzed. After 3 weeks, the participant demonstrated increased upper extremity range of motion at the shoulder and decreased compensatory trunk movements during reaching tasks. After 6 weeks, she showed functional gains in activities of daily living (ADLs) and instrumental ADLs despite no further improvements on the RPS. Results indicate that computer games have the potential to be a useful intervention for people with stroke. Future work will add additional support to quantify the effectiveness of the games as a home therapy intervention for persons with stroke.

  10. Planning Computer-Aided Distance Learning

    Directory of Open Access Journals (Sweden)

    Nadja Dobnik

    1996-12-01

    Full Text Available Didactics of autonomous learning changes under the influence of new technologies. Computer technology can cover all the functions that a teacher develops in personal contact with the learner. People organizing distance learning must realize all the possibilities offered by computers. Computers can take over and also combine the functions of many tools and systems, e. g. type­ writer, video, telephone. This the contents can be offered in form of classic media by means of text, speech, picture, etc. Computers take over data pro­cessing and function as study materials. Computer included in a computer network can also function as a medium for interactive communication.

  11. Reporducibilities of cephalometric measurements of three-dimensional CT images reconstructed in the personal computer

    Energy Technology Data Exchange (ETDEWEB)

    Jeon, Kug Jin; Park, Hyok; Lee, Hee Cheol; Kim, Kee Deog; Park, Chang Seo [Yonsei University College of Medicine, Seoul (Korea, Republic of)

    2003-09-15

    The purpose of this study was to report the reproducibility of intra-observer and inter-observer consistency of cephalometric measurements using three-dimensional (3D) computed tomography (CT), and the degree of difference of the cephalometric measurements. CT images of 16 adult patients with normal class I occlusion were sent to personal computer and reconstructed into 3D images using V-Works 3.5{sup TM} (Cybermed Inc., Seoul, Korea). With the internal program of V-Works 3.5{sup TM}, 12 landmarks on regular cephalograms were transformed into 21 analytic categories and measured by 2 observers and in addition, one of the observers repeated their measurements. Intra-observer difference was calculated using paired t-test, and inter-observer by two sample test. There were significant differences in the intra-observer measurements (p<0.05) in four of the categories which included ANS-Me, ANS-PNS, Cdl-GO (Lt), GoL-GoR, but with the exception of Cdl-Go (Lt), ZmL-ZmR, Zyo-Zyo, the average differences were within 2 mm of each other. The inter-observer observations also showed significant differences in the measurements of the ZmL-ZmR and Zyo-Zyo categories (p<0.05). With the exception of the Cdl-Me (Rt), ZmL-ZmR, Zyo-Zyo categories, the average differences between the two observers were within 2mm, but the ZmL-ZmR and Zyo-Zyo values differed greatly with values of 8.10 and 19.8 mm respectively. In general, 3D CT images showed greater accuracy and reproducibility, with the exception of suture areas such as Zm and Zyo, than regular cephalograms in orthodontic measurement, showing differences of less than 2 mm, therefore 3D CT images can be useful in cephalometric measurements and treatment planning.

  12. VIBRO-DIAGNOSTIC SYSTEM ON BASIS OF PERSONAL COMPUTER

    Directory of Open Access Journals (Sweden)

    V. V. Bokut

    2007-01-01

    Full Text Available A system for vibration diagnostics based on a mobile computer and two-channel microprocessor measuring device has been developed. Usage of fast Hartley-Fourier transform allows to increase frequency resolution up to 25000 spectral lines that makes it possible to use the system for wide range of applications. 

  13. THE USE OF COMPUTERS FOR TEACHING

    Directory of Open Access Journals (Sweden)

    Stanika DIKIC

    1997-09-01

    Full Text Available Experts of the developed countries try to make the handicapped persons familiar with the computer. Nowadays exist the series hardwares and softwares that are adjusted to the handicapped persons and by which their problem are solved. That way, the modern technology, helps the alleviation of their handicaps.In this paper are presented the results of the design “Development of the Computers and Electronic Devices for the Blind and the Visually Impaired”, Chair of Tiflology, the University of Defectology, that is financed by the Department of Science and Technology of the Republic of Serbia.

  14. Applying knowledge engineering tools for the personal computer to the operation and maintenance of radiopharmaceutical production systems

    International Nuclear Information System (INIS)

    Alexoff, D.L.

    1990-01-01

    A practical consequence of over three decades of Artificial Intelligence (AI) research has been the emergence of Personal Computer-based AI programming tools. A special class of this microcomputer-based software, called expert systems shells, is now applied routinely outside the realm of classical AI to solve many types of problems, particularly in analytical chemistry. These AI tools offer not only some of the advantages inherent to symbolic programming languages, but, as significant, they bring with them advanced program development environments which can facilitate software development and maintenance. Exploitation of this enhanced programming environment was a major motivation for using an AI tool. The goal of this work is to evaluate the use of an example-based expert system shell (1st Class FUSION, 1st Class Expert Systems, Inc.) as a programming tool for developing software useful for automated radiopharmaceutical production

  15. Community Cloud Computing

    Science.gov (United States)

    Marinos, Alexandros; Briscoe, Gerard

    Cloud Computing is rising fast, with its data centres growing at an unprecedented rate. However, this has come with concerns over privacy, efficiency at the expense of resilience, and environmental sustainability, because of the dependence on Cloud vendors such as Google, Amazon and Microsoft. Our response is an alternative model for the Cloud conceptualisation, providing a paradigm for Clouds in the community, utilising networked personal computers for liberation from the centralised vendor model. Community Cloud Computing (C3) offers an alternative architecture, created by combing the Cloud with paradigms from Grid Computing, principles from Digital Ecosystems, and sustainability from Green Computing, while remaining true to the original vision of the Internet. It is more technically challenging than Cloud Computing, having to deal with distributed computing issues, including heterogeneous nodes, varying quality of service, and additional security constraints. However, these are not insurmountable challenges, and with the need to retain control over our digital lives and the potential environmental consequences, it is a challenge we must pursue.

  16. Computer anxiety among university and college students majoring ...

    African Journals Online (AJOL)

    This study examined computer anxiety among university and college of education Physical and Health Education (PHE) majors. The influence of personal characteristics of gender, age and experience of PHE majors on computer anxiety level were analysed. The Computer Anxiety Scale (CAS) developed by Marcoulides ...

  17. Personal hygienic concerns in long term space flight

    Science.gov (United States)

    1973-01-01

    Data from numerous experiments and hardware inventories were scanned for Skylab personal hygiene use. A computer program was formulated for predicting the degree of man's involvement with personal hygiene needs. A tabulation was kept for such events as water intake, frequency of urination and defecation, accidents or events requiring clean-up, methods of clean-up, microbiological environment and shower water contamination.

  18. Potential of a suite of robot/computer-assisted motivating systems for personalized, home-based, stroke rehabilitation

    Directory of Open Access Journals (Sweden)

    Feng Xin

    2007-03-01

    Full Text Available Abstract Background There is a need to improve semi-autonomous stroke therapy in home environments often characterized by low supervision of clinical experts and low extrinsic motivation. Our distributed device approach to this problem consists of an integrated suite of low-cost robotic/computer-assistive technologies driven by a novel universal access software framework called UniTherapy. Our design strategy for personalizing the therapy, providing extrinsic motivation and outcome assessment is presented and evaluated. Methods Three studies were conducted to evaluate the potential of the suite. A conventional force-reflecting joystick, a modified joystick therapy platform (TheraJoy, and a steering wheel platform (TheraDrive were tested separately with the UniTherapy software. Stroke subjects with hemiparesis and able-bodied subjects completed tracking activities with the devices in different positions. We quantify motor performance across subject groups and across device platforms and muscle activation across devices at two positions in the arm workspace. Results Trends in the assessment metrics were consistent across devices with able-bodied and high functioning strokes subjects being significantly more accurate and quicker in their motor performance than low functioning subjects. Muscle activation patterns were different for shoulder and elbow across different devices and locations. Conclusion The Robot/CAMR suite has potential for stroke rehabilitation. By manipulating hardware and software variables, we can create personalized therapy environments that engage patients, address their therapy need, and track their progress. A larger longitudinal study is still needed to evaluate these systems in under-supervised environments such as the home.

  19. Power plant process computer

    International Nuclear Information System (INIS)

    Koch, R.

    1982-01-01

    The concept of instrumentation and control in nuclear power plants incorporates the use of process computers for tasks which are on-line in respect to real-time requirements but not closed-loop in respect to closed-loop control. The general scope of tasks is: - alarm annunciation on CRT's - data logging - data recording for post trip reviews and plant behaviour analysis - nuclear data computation - graphic displays. Process computers are used additionally for dedicated tasks such as the aeroball measuring system, the turbine stress evaluator. Further applications are personal dose supervision and access monitoring. (orig.)

  20. Design of control system parameters of voltage, current and timer on x-ray device mobile type IX 7-02 using personal computer

    International Nuclear Information System (INIS)

    Sujatno; Tatah Nurbarkah; Toto Trikasjono; Nugroho

    2013-01-01

    The control system has made a parameter X-ray machine mobile IX 7-02 using personal computers. The X-Ray or Roentgen apparatus is an equipment used for medical diagnosis. Before the X-Ray apparatus is operated, its parameter to be set are high voltage (kV), tube current (mA) and exposure time (s). The control system in a conventional X-Ray apparatus still use analog system. On the X-Ray manual operations resulted the value of velocity data that are less accurate, therefore it needs to be carried out a control system modifying using micro controller AT89S51 and the parameter value was setting through personal computer. In the limited voltage regulation to the movement of the stepper motor that drives the chain dimer, the result of testing obtained the value of angle stepper motors with an estimated value of voltage 50 kV, 60 kV, 70 kV, 80 kV, 90 kV and 100 kV respectively 164°, 182°, 200°, 218°, 236° and 258°. Current selection by 4 choices such as 50 mA, 60 mA, 70 mA and 80 mA can successfully activate the relay. The timing of exposure in the range of 0.01 to 1 second which is set through the microcontroller program can be realized as well. The X-ray can be operated with these results. (author)

  1. Computer self-efficacy - is there a gender gap in tertiary level introductory computing classes?

    Directory of Open Access Journals (Sweden)

    Shirley Gibbs

    Full Text Available This paper explores the relationship between introductory computing students, self-efficacy, and gender. Since the use of computers has become more common there has been speculation that the confidence and ability to use them differs between genders. Self-efficacy is an important and useful concept used to describe how a student may perceive their own ability or confidence in using and learning new technology. A survey of students in an introductory computing class has been completed intermittently since the late 1990\\'s. Although some questions have been adapted to meet the changing technology the aim of the survey has remain unchanged. In this study self-efficacy is measured using two self-rating questions. Students are asked to rate their confidence using a computer and also asked to give their perception of their computing knowledge. This paper examines these two aspects of a person\\'s computer self-efficacy in order to identify any differences that may occur between genders in two introductory computing classes, one in 1999 and the other in 2012. Results from the 1999 survey are compared with those from the survey completed in 2012 and investigated to ascertain if the perception that males were more likely to display higher computer self-efficacy levels than their female classmates does or did exist in a class of this type. Results indicate that while overall there has been a general increase in self-efficacy levels in 2012 compared with 1999, there is no significant gender gap.

  2. Modeling the Impact of Motivation, Personality, and Emotion on Social Behavior

    Science.gov (United States)

    Miller, Lynn C.; Read, Stephen J.; Zachary, Wayne; Rosoff, Andrew

    Models seeking to predict human social behavior must contend with multiple sources of individual and group variability that underlie social behavior. One set of interrelated factors that strongly contribute to that variability - motivations, personality, and emotions - has been only minimally incorporated in previous computational models of social behavior. The Personality, Affect, Culture (PAC) framework is a theory-based computational model that addresses this gap. PAC is used to simulate social agents whose social behavior varies according to their personalities and emotions, which, in turn, vary according to their motivations and underlying motive control parameters. Examples involving disease spread and counter-insurgency operations show how PAC can be used to study behavioral variability in different social contexts.

  3. [Computer technologies in teaching pathological anatomy].

    Science.gov (United States)

    Ponomarev, A B; Fedorov, D N

    2015-01-01

    The paper gives experience with personal computers used at the Academician A.L. Strukov Department of Pathological Anatomy for more than 20 years. It shows the objective necessity of introducing computer technologies at all stages of acquiring skills in anatomical pathology, including lectures, students' free work, test check, etc.

  4. SLAC B Factory computing

    International Nuclear Information System (INIS)

    Kunz, P.F.

    1992-02-01

    As part of the research and development program in preparation for a possible B Factory at SLAC, a group has been studying various aspects of HEP computing. In particular, the group is investigating the use of UNIX for all computing, from data acquisition, through analysis, and word processing. A summary of some of the results of this study will be given, along with some personal opinions on these topics

  5. A personal radon dosemeter

    International Nuclear Information System (INIS)

    Oberstedt, S.; Vanmarcke, H.

    1994-03-01

    In the last decade the radon issue has become one of the major problems of radiation protection. Animal studies as well as epidemiological studies showed an increased lung cancer risk. A new personal radon-dosemeter on the basis of a CR-39 (poly-allyl diglycol carbonate) track-etch detector has been developed. The read-out of the detectors is based on the image- processing technique. The actual efficiency of the new dosemeter, obtained with a semi-automatic personal-computer based image-analysis system, is 1.43 +/- 0.15 tracks/cm 2 /(kBq/m 3 h), which is about three times that of the widely used Karlsruhe-type detector based on polycarbonate detectors

  6. Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Bardram, Jakob Eyvind; Friday, Adrian

    2009-01-01

    . While such growth is positive, the newest generation of ubicomp practitioners and researchers, isolated to specific tasks, are in danger of losing their sense of history and the broader perspective that has been so essential to the field’s creativity and brilliance. Under the guidance of John Krumm...... applications Privacy protection in systems that connect personal devices and personal information Moving from the graphical to the ubiquitous computing user interface Techniques that are revolutionizing the way we determine a person’s location and understand other sensor measurements While we needn’t become...

  7. IMPLEMENTATION RASPBERRY PI USING PRIVATE CLOUD FOR ACCESSING PERSONAL DATA

    Directory of Open Access Journals (Sweden)

    Sitti Aisa

    2016-12-01

    Full Text Available The continued development and widespread use of current technology so that accessing and managing data from a personal computer to make private users become inflexible due to the personal computer requires a power source directly and storage areas are static, therefore, the author plans to implement a service private cloud that uses raspberry pi as a server and will be tested by the test Blackbox. Our research by collecting data that we did put a literature study, experiments, and observations. The design method using UML use case diagrams, class diagrams, activity diagrams and sequence diagrams. This application is built using Django, Python, Raspberry Pi, MySQL. Hopefully the benefit of this implementation can help a person in terms of managing data from a wide variety of resources (resource quickly and anywhere.

  8. Computers for use in nuclear medicine

    International Nuclear Information System (INIS)

    Surova, H.

    1991-01-01

    Brief information is presented on computers for nuclear medicine that are currently available on the market. The treatment is based on print material by various manufacturers and commercial organizations and on the publication ''Nuclear Medicine Computers - A Personal Comparison Chart'' of May 1991, issued by the Reilly Publishing Company. (Z.S.)

  9. Providing Assistive Technology Applications as a Service Through Cloud Computing.

    Science.gov (United States)

    Mulfari, Davide; Celesti, Antonio; Villari, Massimo; Puliafito, Antonio

    2015-01-01

    Users with disabilities interact with Personal Computers (PCs) using Assistive Technology (AT) software solutions. Such applications run on a PC that a person with a disability commonly uses. However the configuration of AT applications is not trivial at all, especially whenever the user needs to work on a PC that does not allow him/her to rely on his / her AT tools (e.g., at work, at university, in an Internet point). In this paper, we discuss how cloud computing provides a valid technological solution to enhance such a scenario.With the emergence of cloud computing, many applications are executed on top of virtual machines (VMs). Virtualization allows us to achieve a software implementation of a real computer able to execute a standard operating system and any kind of application. In this paper we propose to build personalized VMs running AT programs and settings. By using the remote desktop technology, our solution enables users to control their customized virtual desktop environment by means of an HTML5-based web interface running on any computer equipped with a browser, whenever they are.

  10. Restrictions on Software for Personal and Professional Use

    CERN Multimedia

    2004-01-01

    A growing number of computer security incidents detected at CERN are due to additional software installed for personal and professional use. As a consequence, the smooth operation of CERN is put at risk and often many hours are lost solving the problems. To reduce this security risk, installation and/or use of software on CERN's computing and network infrastructure needs to be restricted. Therefore: Do NOT install software for personal use Do NOT install 'free' or other software unless you have the expertise to configure and maintain it securely. Please comply to these rules to keep our computer systems safe. Further explanation of these restrictions is at http://cern.ch/security/software-restrictions Restricted software, known to cause security and/or network problems (e.g. KaZaA and other P2P/Peer-to-Peer file sharing applications, Skype P2P telephony software, ICQ, VNC, ...), is listed at: http://cern.ch/security/software-restrictions/list

  11. The Experiment Method for Manufacturing Grid Development on Single Computer

    Institute of Scientific and Technical Information of China (English)

    XIAO Youan; ZHOU Zude

    2006-01-01

    In this paper, an experiment method for the Manufacturing Grid application system development in the single personal computer environment is proposed. The characteristic of the proposed method is constructing a full prototype Manufacturing Grid application system which is hosted on a single personal computer with the virtual machine technology. Firstly, it builds all the Manufacturing Grid physical resource nodes on an abstraction layer of a single personal computer with the virtual machine technology. Secondly, all the virtual Manufacturing Grid resource nodes will be connected with virtual network and the application software will be deployed on each Manufacturing Grid nodes. Then, we can obtain a prototype Manufacturing Grid application system which is working in the single personal computer, and can carry on the experiment on this foundation. Compared with the known experiment methods for the Manufacturing Grid application system development, the proposed method has the advantages of the known methods, such as cost inexpensively, operation simple, and can get the confidence experiment result easily. The Manufacturing Grid application system constructed with the proposed method has the high scalability, stability and reliability. It is can be migrated to the real application environment rapidly.

  12. Designing Computer Agents With Facial Personality To Improve Human-Machine Collaboration

    National Research Council Canada - National Science Library

    Tidball, Brian E

    2006-01-01

    .... This study examined whether people perceive personality in static digital faces that portray expressions of emotion, and if the digital faces would influence human performance on a simple human...

  13. 31 CFR 359.31 - What definitive Series I savings bonds are included in the computation?

    Science.gov (United States)

    2010-07-01

    ... definitive Series I savings bonds are included in the computation? In computing the purchases for each person, we include the following outstanding definitive bonds purchased in that calendar year: (a) All bonds... bearing that person's TIN; and (c) All gift bonds registered in the name of that person but bearing the...

  14. Employing Subgoals in Computer Programming Education

    Science.gov (United States)

    Margulieux, Lauren E.; Catrambone, Richard; Guzdial, Mark

    2016-01-01

    The rapid integration of technology into our professional and personal lives has left many education systems ill-equipped to deal with the influx of people seeking computing education. To improve computing education, we are applying techniques that have been developed for other procedural fields. The present study applied such a technique, subgoal…

  15. The Fourth Revolution--Computers and Learning.

    Science.gov (United States)

    Bork, Alfred

    The personal computer is sparking a major historical change in the way people learn, a change that could lead to the disappearance of formal education as we know it. The computer can help resolve many of the difficulties now crippling education by enabling expert teachers and curriculum developers to prepare interactive and individualized…

  16. Computer Aided Braille Trainer

    Science.gov (United States)

    Sibert, Thomas W.

    1984-01-01

    The problems involved in teaching visually impaired persons to Braille are numerous. Training while the individual is still sighted and using a computer to assist is one way of shortening the learning curve. Such a solution is presented here.

  17. Designing Computer Agents With Facial Personality To Improve Human-Machine Collaboration

    National Research Council Canada - National Science Library

    Tidball, Brian E

    2006-01-01

    ...-machine collaborative task. The first experiment measured user-perception of personality based on the emotional expression in two sets of five static digital faces, one face from each set represented the five primary emotions...

  18. Personal diabetes management system based on ubiquitous computing technology.

    Science.gov (United States)

    Park, Kyung-Soon; Kim, Nam-Jin; Hong, Joo-Hyun; Park, Mi-Sook; Cha, Eun-Jung; Lee, Tae-Soo

    2006-01-01

    Assisting diabetes patients to self manage blood glucose test and insulin injection is of great importance for their healthcare. This study presented a PDA based system to manage the personal glucose level data interfaced with a small glucometer through a serial port. The data stored in the PDA can be transmitted by cradle or wireless communication to the remote web-server, where further medical analysis and service is provided. This system enables more efficient and systematic management of diabetes patients through self management and remote medical practice.

  19. NFDRSPC: The National Fire-Danger Rating System on a Personal Computer

    Science.gov (United States)

    Bryan G. Donaldson; James T. Paul

    1990-01-01

    This user's guide is an introductory manual for using the 1988 version (Burgan 1988) of the National Fire-Danger Rating System on an IBM PC or compatible computer. NFDRSPC is a window-oriented, interactive computer program that processes observed and forecast weather with fuels data to produce NFDRS indices. Other program features include user-designed display...

  20. Privacy and legal issues in cloud computing

    CERN Document Server

    Weber, Rolf H

    2015-01-01

    Adopting a multi-disciplinary and comparative approach, this book focuses on emerging and innovative attempts to tackle privacy and legal issues in cloud computing, such as personal data privacy, security and intellectual property protection. Leading international academics and practitioners in the fields of law and computer science examine the specific legal implications of cloud computing pertaining to jurisdiction, biomedical practice and information ownership. This collection offers original and critical responses to the rising challenges posed by cloud computing.

  1. Software Accelerates Computing Time for Complex Math

    Science.gov (United States)

    2014-01-01

    Ames Research Center awarded Newark, Delaware-based EM Photonics Inc. SBIR funding to utilize graphic processing unit (GPU) technology- traditionally used for computer video games-to develop high-computing software called CULA. The software gives users the ability to run complex algorithms on personal computers with greater speed. As a result of the NASA collaboration, the number of employees at the company has increased 10 percent.

  2. Gender stereotypes, aggression, and computer games: an online survey of women.

    Science.gov (United States)

    Norris, Kamala O

    2004-12-01

    Computer games were conceptualized as a potential mode of entry into computer-related employment for women. Computer games contain increasing levels of realism and violence, as well as biased gender portrayals. It has been suggested that aggressive personality characteristics attract people to aggressive video games, and that more women do not play computer games because they are socialized to be non-aggressive. To explore gender identity and aggressive personality in the context of computers, an online survey was conducted on women who played computer games and women who used the computer but did not play computer games. Women who played computer games perceived their online environments as less friendly but experienced less sexual harassment online, were more aggressive themselves, and did not differ in gender identity, degree of sex role stereotyping, or acceptance of sexual violence when compared to women who used the computer but did not play video games. Finally, computer gaming was associated with decreased participation in computer-related employment; however, women with high masculine gender identities were more likely to use computers at work.

  3. Perceptually-Inspired Computing

    Directory of Open Access Journals (Sweden)

    Ming Lin

    2015-08-01

    Full Text Available Human sensory systems allow individuals to see, hear, touch, and interact with the surrounding physical environment. Understanding human perception and its limit enables us to better exploit the psychophysics of human perceptual systems to design more efficient, adaptive algorithms and develop perceptually-inspired computational models. In this talk, I will survey some of recent efforts on perceptually-inspired computing with applications to crowd simulation and multimodal interaction. In particular, I will present data-driven personality modeling based on the results of user studies, example-guided physics-based sound synthesis using auditory perception, as well as perceptually-inspired simplification for multimodal interaction. These perceptually guided principles can be used to accelerating multi-modal interaction and visual computing, thereby creating more natural human-computer interaction and providing more immersive experiences. I will also present their use in interactive applications for entertainment, such as video games, computer animation, and shared social experience. I will conclude by discussing possible future research directions.

  4. Recognition of Deictic Gestures for Wearable Computing

    DEFF Research Database (Denmark)

    Moeslund, Thomas B.; Nørgaard, Lau

    2006-01-01

    In modern society there is an increasing demand to access, record and manipulate large amounts of information. This has inspired a new approach to thinking about and designing personal computers, where the ultimate goal is to produce a truly wearable computer. In this work we present a non...

  5. The social impact of computers

    CERN Document Server

    Rosenberg, Richard S

    1992-01-01

    The Social Impact of Computers should be read as a guide to the social implications of current and future applications of computers. Among the basic themes presented are the following: the changing nature of work in response to technological innovation as well as the threat to jobs; personal freedom in the machine age as manifested by challenges to privacy, dignity, and work; the relationship between advances in computer and communications technology and the possibility of increased centralization of authority; and the emergence and influence of artificial intelligence and its role in decision

  6. Developing a multimodal biometric authentication system using soft computing methods.

    Science.gov (United States)

    Malcangi, Mario

    2015-01-01

    Robust personal authentication is becoming ever more important in computer-based applications. Among a variety of methods, biometric offers several advantages, mainly in embedded system applications. Hard and soft multi-biometric, combined with hard and soft computing methods, can be applied to improve the personal authentication process and to generalize the applicability. This chapter describes the embedded implementation of a multi-biometric (voiceprint and fingerprint) multimodal identification system based on hard computing methods (DSP) for feature extraction and matching, an artificial neural network (ANN) for soft feature pattern matching, and a fuzzy logic engine (FLE) for data fusion and decision.

  7. An experimental study of UWB device-free person detection and ranging

    NARCIS (Netherlands)

    Kilic, Y.; Wymeersch, Henk; Meijerink, Arjan; Bentum, Marinus Jan; Scanlon, W.G.

    2013-01-01

    Passive person detection and localization is an emerging area in UWB localization systems, whereby people are not required to carry any UWB ranging device. Based on experimental data, we propose a novel method to detect static persons in the absence of template waveforms, and to compute distances to

  8. Risk factors for persistent elbow, forearm and hand pain among computer workers

    DEFF Research Database (Denmark)

    Lassen, C. F.; Mikkelsen, S.; Kryger, Ann Isabel

    2005-01-01

    to elbow, forearm, or wrist-hand pain during the 12 months preceding the baseline questionnaire. Pain status (recovery versus persistence) at follow-up was examined in relation to computer work aspects and ergonomic, psychosocial, and personal factors by questionnaire. In addition, data on objectively......, and type-A behavior, the prognosis seemed independent of psychosocial workplace factors and personal factors. A few cases with severe pain were affected at a level which could be compared to clinical pain conditions. CONCLUSIONS: Our results do not support the hypothesis that computer work activity......OBJECTIVES: This study examined the influence of work-related and personal factors on the prognosis of "severe" elbow, forearm, and wrist-hand pain among computer users. METHODS: In a 1-year follow-up study of 6943 computer users, 673 (10%) participants reported "quite a lot" or more trouble due...

  9. Emotion Expression of Robot with Personality

    Directory of Open Access Journals (Sweden)

    Xue Hu

    2013-01-01

    Full Text Available A robot emotional expression model based on Hidden Markov Model (HMM is built to enable robots which have different personalities to response in a more satisfactory emotional level. Gross emotion regulation theory and Five Factors Model (FFM which are the theoretical basis are firstly described. And then the importance of the personality effect on the emotion expression process is proposed, and how to make the effect quantization is discussed. After that, the algorithm of HMM is used to describe the process of emotional state transition and expression, and the performance transferring probability affected by personality is calculated. At last, the algorithm model is simulated and applied in a robot platform. The results prove that the emotional expression model can acquire humanlike expressions and improve the human-computer interaction.

  10. Automated personal dosimetry monitoring system for NPP

    International Nuclear Information System (INIS)

    Chanyshev, E.; Chechyotkin, N.; Kondratev, A.; Plyshevskaya, D.

    2006-01-01

    personal dosimeters (albedo dosimeters). Operational and emergency monitoring of external radiation exposure: - Gamma radiation dose and dose rate measurement using direct reading personal dosimeters. - Gamma radiation dose measurement using radio-photoluminescent personal dosimeters. Monitoring of internal radiation exposure: - Measurement of activity of incorporated radionuclides using whole body counters. Hardware of A.P.D.M.S. represents a complex of automated workplaces based on industrial computers and measuring equipment; all workplaces are connected to one local computational network. Client software installed on automated workplaces processes the results of dosimetry monitoring (spectrum processing, computation of personal dose, report generation, etc.) and provides data exchange with data base of A.P.D.M.S. in the remote server. Communication with A.P.D.M.S. server is organized via the local computational network Ethernet. (authors)

  11. The Personality Trait of Intolerance to Uncertainty Affects Behavior in a Novel Computer-Based Conditioned Place Preference Task

    Directory of Open Access Journals (Sweden)

    Milen Radell

    2016-08-01

    Full Text Available Recent work has found that personality factors that confer vulnerability to addiction can also affect learning and economic decision making. One personality trait which has been implicated in vulnerability to addiction is intolerance to uncertainty (IU, i.e. a preference for familiar over unknown (possible better options. In animals, the motivation to obtain drugs is often assessed through conditioned place preference (CPP, which compares preference for contexts where drug reward was previously received. It is an open question whether participants with high IU also show heightened preference for previously-rewarded contexts. To address this question, we developed a novel computer-based CPP task for humans in which participants guide an avatar through a paradigm in which one room contains frequent reward and one contains less frequent reward. Following exposure to both contexts, subjects are assessed for preference to enter the previously-rich and previously-poor room. Individuals with low IU showed little bias to enter the previously-rich room first, and instead entered both rooms at about the same rate. By contrast, those with high IU showed a strong bias to enter the previously-rich room first. This suggests an increased tendency to chase reward in the intolerant group, consistent with previously observed behavior in opioid-addicted individuals. Thus, high IU may represent a pre-existing cognitive bias that provides a mechanism to promote decision-making processes that increase vulnerability to addiction.

  12. Computer applications in radiation protection

    International Nuclear Information System (INIS)

    Cole, P.R.; Moores, B.M.

    1995-01-01

    Computer applications in general and diagnostic radiology in particular are becoming more widespread. Their application to the field of radiation protection in medical imaging, including quality control initiatives, is similarly becoming more widespread. Advances in computer technology have enabled departments of diagnostic radiology to have access to powerful yet affordable personal computers. The application of databases, expert systems and computer-based learning is under way. The executive information systems for the management of dose and QA data that are under way at IRS are discussed. An important consideration in developing these pragmatic software tools has been the range of computer literacy within the end user group. Using interfaces have been specifically designed to reflect the requirements of many end users who will have little or no computer knowledge. (Author)

  13. Retrieval of articles in personal computer

    International Nuclear Information System (INIS)

    Choi, Byung Gil; Park, Seog Hee; Kim, Sung Hoon; Shinn, Kyung Sub

    1994-01-01

    Although many useful articles appear in the journals published in Korea, they are not always cited by researchers mainly due to absence of efficient searching system. The authors made a program with 6 predefined filtering forms to detect published articles rapidly and accurately. The programs was coded using database management system CA-Clipper Version 5.2 (Computer Associates International, Inc.) through preliminary work for 1 year. We used 486 DX II (8 Mbyte RAM, VGA, 200 Mbyte Hard Disk). Ink-jet Printer (Hewlett Packard Company), and MS-DOS Version 5.0 (Microsoft Co). We inputted total of 1986 articles published in the Journal of Korea Radiological Society from 1981 to 1993. The searching time was 10 to 15 seconds for each use. We had very flexible user interfaces and simplified searching methods, but more complicated filtering could also be performed. Although the previous version have had some bugs, this upgrade version resolved the problems and fitted in searching articles. The program would be valuable for radiologist in searching articles published not only in the Journal of the Korean Radiological Society, but also in the Journal of the Korean Society of Medicine Ultrasound and the Korean Journal of Nuclear Medicine

  14. East-West paths to unconventional computing.

    Science.gov (United States)

    Adamatzky, Andrew; Akl, Selim; Burgin, Mark; Calude, Cristian S; Costa, José Félix; Dehshibi, Mohammad Mahdi; Gunji, Yukio-Pegio; Konkoli, Zoran; MacLennan, Bruce; Marchal, Bruno; Margenstern, Maurice; Martínez, Genaro J; Mayne, Richard; Morita, Kenichi; Schumann, Andrew; Sergeyev, Yaroslav D; Sirakoulis, Georgios Ch; Stepney, Susan; Svozil, Karl; Zenil, Hector

    2017-12-01

    Unconventional computing is about breaking boundaries in thinking, acting and computing. Typical topics of this non-typical field include, but are not limited to physics of computation, non-classical logics, new complexity measures, novel hardware, mechanical, chemical and quantum computing. Unconventional computing encourages a new style of thinking while practical applications are obtained from uncovering and exploiting principles and mechanisms of information processing in and functional properties of, physical, chemical and living systems; in particular, efficient algorithms are developed, (almost) optimal architectures are designed and working prototypes of future computing devices are manufactured. This article includes idiosyncratic accounts of 'unconventional computing' scientists reflecting on their personal experiences, what attracted them to the field, their inspirations and discoveries. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  16. A New Approach to Personalization: Integrating E-Learning and M-Learning

    Science.gov (United States)

    Nedungadi, Prema; Raman, Raghu

    2012-01-01

    Most personalized learning systems are designed for either personal computers (e-learning) or mobile devices (m-learning). Our research has resulted in a cloud-based adaptive learning system that incorporates mobile devices into a classroom setting. This system is fully integrated into the formative assessment process and, most importantly,…

  17. First-Person Shooters

    DEFF Research Database (Denmark)

    Grimshaw, Mark Nicholas; Charlton, John P.; Jagger, Richard

    2011-01-01

    "First-Person Shooter computer games are designed to be immersive experiences yet the phenomenon of immersion is little understood. This article surveys theories of immersion in virtual worlds and examines FPS game elements that might contribute to the state. The roles of attention and positive...... feedback in facilitating player immersion in FPS games is explored. In particular, the role of selective attention is highlighted before the article finishes with a discussion on the design of immersion in FPS games using the principles presented here."...

  18. Personalized recommendation with corrected similarity

    International Nuclear Information System (INIS)

    Zhu, Xuzhen; Tian, Hui; Cai, Shimin

    2014-01-01

    Personalized recommendation has attracted a surge of interdisciplinary research. Especially, similarity-based methods in applications of real recommendation systems have achieved great success. However, the computations of similarities are overestimated or underestimated, in particular because of the defective strategy of unidirectional similarity estimation. In this paper, we solve this drawback by leveraging mutual correction of forward and backward similarity estimations, and propose a new personalized recommendation index, i.e., corrected similarity based inference (CSI). Through extensive experiments on four benchmark datasets, the results show a greater improvement of CSI in comparison with these mainstream baselines. And a detailed analysis is presented to unveil and understand the origin of such difference between CSI and mainstream indices. (paper)

  19. Principles of Tablet Computing for Educators

    Science.gov (United States)

    Katzan, Harry, Jr.

    2015-01-01

    In the study of modern technology for the 21st century, one of the most popular subjects is tablet computing. Tablet computers are now used in business, government, education, and the personal lives of practically everyone--at least, it seems that way. As of October 2013, Apple has sold 170 million iPads. The success of tablets is enormous and has…

  20. Computer assisted spirometry.

    Science.gov (United States)

    Hansen, D J; Toy, V M; Deininger, R A; Collopy, T K

    1983-06-01

    Three of the most popular microcomputers, the TRS-80 Model I, the APPLE II+, and the IBM Personal Computer were connected to a spirometer for data acquisition and analysis. Simple programs were written which allow the collection, analysis and storage of the data produced during spirometry. Three examples demonstrate the relative ease for automating spirometers.

  1. Using Computers in Fluids Engineering Education

    Science.gov (United States)

    Benson, Thomas J.

    1998-01-01

    Three approaches for using computers to improve basic fluids engineering education are presented. The use of computational fluid dynamics solutions to fundamental flow problems is discussed. The use of interactive, highly graphical software which operates on either a modern workstation or personal computer is highlighted. And finally, the development of 'textbooks' and teaching aids which are used and distributed on the World Wide Web is described. Arguments for and against this technology as applied to undergraduate education are also discussed.

  2. Personal technology use by U.S. military service members and veterans: an update.

    Science.gov (United States)

    Bush, Nigel E; Wheeler, William M

    2015-04-01

    Although personal electronic devices, such as mobile phones, computers, and tablets, increasingly are being leveraged as vehicles for health in the civilian world, almost nothing is known about personal technology use in the U.S. military. In 2012 we conducted a unique survey of personal technologies used by U.S. military service members. However, with the rapidly growing sophistication of personal technology and changes in consumer habits, that knowledge must be continuously updated to be useful. Accordingly, we recently surveyed new samples of active duty service members, National Guard and Reserve, and veterans. We collected data by online surveys in 2013 from 239 active, inactive, and former service members. Online surveys were completed in-person via laptop computers at a large military installation and remotely via Web-based surveys posted on the Army Knowledge Online Web site and on a Defense Center Facebook social media channel. We measured high rates of personal technology use by service members at home across popular electronic media. The most dramatic change since our earlier survey was the tremendous increase in mobile phone use at home for a wide variety of purposes. Participants also reported moderate non-work uses of computers and tablets while on recent deployment to Iraq and Afghanistan, but almost no mobile phone use, ostensibly because of military restrictions in the war zone. These latest results will enable researchers and technology developers target their efforts on the most promising and popular technologies for psychological health in the military.

  3. Stability and change in personality assessment: the revised NEO Personality Inventory in the year 2000.

    Science.gov (United States)

    Costa, P T; McCrae, R R

    1997-02-01

    The Revised NEO Personality Inventory (NEO-PI-R) consists of 30 facet scales that define the broad domains of the Five-Factor Model of personality. No major revisions of the basic model are anticipated in the near future. Despite their popularity, social desirability and inconsistency scales will not be added to the NEO-PI-R because their validity and utility have not yet been demonstrated. Among possible changes are minor modifications in wording and more extensive adaptations for adolescents and for populations with low reading levels. Contextualized (e.g., work-related) versions of the instrument will be further explored. Many changes are more easily implemented on the computer than the print version of the instrument.

  4. Raising Awareness of Conveyed Personality In Social Media Traces

    OpenAIRE

    Xu, Bin; Gou, Liang; Xu, Anbang; Mahmud, Jalal; Cosley, Dan

    2017-01-01

    Users' persistent social media contents like posts on Facebook Timeline are presented as an "exhibition" about the person to others, and managing these exhibitional contents for impression management needs intentional and manual efforts. To raise awareness of and facilitate impression management around past contents, we developed a prototype called PersonalityInsight. The system employs computational psycho-linguistic analysis to help users visualize the way their past text posts might convey...

  5. [The Psychomat computer complex for psychophysiologic studies].

    Science.gov (United States)

    Matveev, E V; Nadezhdin, D S; Shemsudov, A I; Kalinin, A V

    1991-01-01

    The authors analyze the principles of the design of a computed psychophysiological system for universal uses. Show the effectiveness of the use of computed technology as a combination of universal computation and control potentialities of a personal computer equipped with problem-oriented specialized facilities of stimuli presentation and detection of the test subject's reactions. Define the hardware and software configuration of the microcomputer psychophysiological system "Psychomat". Describe its functional possibilities and the basic medico-technical characteristics. Review organizational issues of the maintenance of its full-scale production.

  6. The role of micro size computing clusters for small physics groups

    International Nuclear Information System (INIS)

    Shevel, A Y

    2014-01-01

    A small physics group (3-15 persons) might use a number of computing facilities for the analysis/simulation, developing/testing, teaching. It is discussed different types of computing facilities: collaboration computing facilities, group local computing cluster (including colocation), cloud computing. The author discuss the growing variety of different computing options for small groups and does emphasize the role of the group owned computing cluster of micro size.

  7. Developing a Systematic Education and Training Approach Using Personal Computer Based Simulators for Nuclear Power Programmes. Proceedings of a Technical Meeting

    International Nuclear Information System (INIS)

    2018-01-01

    This publication compiles the output and findings of a technical meeting organized by the IAEA. The use of personal computer (PC) based basic principle simulators in education and training is aimed at enhancing understanding of nuclear technologies through “learning by doing”. This hands-on experiential training is highly suitable for operators, maintenance technicians, suppliers, regulators, students and engineers. Experts from 21 Member States, together with IAEA staff, presented the current status of the PC based basic principle simulators, their applications in education and training and identified relevant gaps and needs for improvements and/or new development. The resultant publication includes summaries of the presentations, follow-up discussions as well as conclusions and recommendations for possible future activities.

  8. Ubiquitous emotion-aware computing

    NARCIS (Netherlands)

    van den Broek, Egon

    Emotions are a crucial element for personal and ubiquitous computing. What to sense and how to sense it, however, remain a challenge. This study explores the rare combination of speech, electrocardiogram, and a revised Self-Assessment Mannequin to assess people’s emotions. 40 people watched 30

  9. New Procedures for the Management of Computer Accounts

    CERN Multimedia

    2006-01-01

    In today's computing environment where there is a permanent threat of computer security incidents, it is vitally important to control who has access to CERN's computing infrastructure. To obtain a computer account people are already required to be registered at CERN but until now the closing of accounts has relied on an annual review carried out by the group administrators. This process is now being automated and linked into the CERN registration database. The account review will run permanently and trigger action both when an account is unused and when a person's contract is soon to end. Advance warning of actions to be taken will be sent to both users and their supervisors: when an account has been unused for 6 months the account will be blocked. A year later, after a second warning, the account will be deleted; when a person's association with CERN comes to an end (based on the 'end date' in the official registration database) their computer accounts will be blocked. For most members of the personnel t...

  10. New Procedures for the Management of Computer Accounts

    CERN Multimedia

    2006-01-01

    In today's computing environment where there is a permanent threat of computer security incidents, it is vitally important to control who has access to CERN's computing infrastructure. To obtain a computer account it is already required that people be registered at CERN but up till now closing of accounts has relied on an annual review carried out by the group administrators. This process is now being automated and linked into the CERN registration database. The account review will run permanently and trigger action both when an account is unused and when a person's contract is soon to end. Advance warning of actions to be taken will be sent to both users and their supervisors: when an account has been unused for 6 months the account will be blocked. A year later, after a second warning, the account will be deleted; when a person's association with CERN comes to an end (based on the 'end date' in the official registration database) their computer accounts will be blocked. For most members of the personnel...

  11. Paradoxical Personality and Academic Achievement in College Students From Buenos Aires

    Directory of Open Access Journals (Sweden)

    Agustín Freiberg Hoffmann

    2015-11-01

    Full Text Available This paper presents a study on paradoxical personality, defined as a distinctive feature in creative persons, developed with 350 college students from Buenos Aires. Goals aimed at describing and analysing possible significant differences of paradoxical traits in students from diverse majors representing seven different fields of study, and examining the relationship between each bipolar trait and academic achievement. The sample was composed of 7 groups (n = 50 by group representing fields of study typically offered in public universities, Biology, Computer Science, Engineering, Law, Nutrition, Psychology, and History of Art. Analyses by career provided descriptive information about students of these majors, concerning their paradoxical personality profiles. Correlational studies verified significant associations between academic achievement and most paradoxical traits in majors such as Computer Science, Nutrition and Psychology. Results are discussed regarding practical outcomes and teaching programs.

  12. Computer Security: When a person leaves - access rights remain!

    CERN Multimedia

    Computer Security Team

    2014-01-01

    We have been contacted recently by an embarrassed project manager who just figured out that a student who left at the end of 2013 still had access rights to read the whole project folder in February 2014: “How can that be?! In any other company, access rights would be purged at the same time as an employment contract terminates." Not so at CERN.   CERN has always been an open site with an open community. Physical access to the site is lightweight and you just need to have your CERN access card at hand. Further restrictions have only been put in place where safety or security really require them, and CERN does not require you to keep your access card on display. The same holds for the digital world. Once registered at CERN - either by contract, via your experiment or through the Users' office - you own a computing account that provides you with access to a wide variety of computing services. For example, last year 9,730 students/technicians/engineers/researchers/sta...

  13. The use of computers for instruction in fluid dynamics

    Science.gov (United States)

    Watson, Val

    1987-01-01

    Applications for computers which improve instruction in fluid dynamics are examined. Computers can be used to illustrate three-dimensional flow fields and simple fluid dynamics mechanisms, to solve fluid dynamics problems, and for electronic sketching. The usefulness of computer applications is limited by computer speed, memory, and software and the clarity and field of view of the projected display. Proposed advances in personal computers which will address these limitations are discussed. Long range applications for computers in education are considered.

  14. Investigating Nigerian Primary School Teachers' Preparedness to Adopt Personal Response System in ESL Classroom

    Science.gov (United States)

    Agbatogun, Alaba Olaoluwakotansibe

    2012-01-01

    This study investigated the extent to which computer literacy dimensions (computer general knowledge, documents and documentations, communication and surfing as well as data inquiry), computer use and academic qualification as independent variables predicted primary school teachers' attitude towards the integration of Personal Response System in…

  15. Computer aided training system development

    International Nuclear Information System (INIS)

    Midkiff, G.N.

    1987-01-01

    The first three phases of Training System Development (TSD) -- job and task analysis, curriculum design, and training material development -- are time consuming and labor intensive. The use of personal computers with a combination of commercial and custom-designed software resulted in a significant reduction in the man-hours required to complete these phases for a Health Physics Technician Training Program at a nuclear power station. This paper reports that each step in the training program project involved the use of personal computers: job survey data were compiled with a statistical package, task analysis was performed with custom software designed to interface with a commercial database management program. Job Performance Measures (tests) were generated by a custom program from data in the task analysis database, and training materials were drafted, edited, and produced using commercial word processing software

  16. STORMSeq: An Open-Source, User-Friendly Pipeline for Processing Personal Genomics Data in the Cloud

    OpenAIRE

    Karczewski, Konrad J.; Fernald, Guy Haskin; Martin, Alicia R.; Snyder, Michael; Tatonetti, Nicholas P.; Dudley, Joel T.

    2014-01-01

    The increasing public availability of personal complete genome sequencing data has ushered in an era of democratized genomics. However, read mapping and variant calling software is constantly improving and individuals with personal genomic data may prefer to customize and update their variant calls. Here, we describe STORMSeq (Scalable Tools for Open-Source Read Mapping), a graphical interface cloud computing solution that does not require a parallel computing environment or extensive technic...

  17. Computer system for nuclear power plant parameter display

    International Nuclear Information System (INIS)

    Stritar, A.; Klobuchar, M.

    1990-01-01

    The computer system for efficient, cheap and simple presentation of data on the screen of the personal computer is described. The display is in alphanumerical or graphical form. The system can be used for the man-machine interface in the process monitoring system of the nuclear power plant. It represents the third level of the new process computer system of the Nuclear Power Plant Krsko. (author)

  18. Design of Computer Fault Diagnosis and Troubleshooting System ...

    African Journals Online (AJOL)

    Detection of personal computer (PC) hardware problems is a complicated process which demands high level of knowledge and skills. Depending on the know-how of the technician, a simple problem could take hours or even days to solve. Our aim is to develop an expert system for troubleshooting and diagnosing personal ...

  19. Beyond Computer Literacy: Technology Integration and Curriculum Transformation

    Science.gov (United States)

    Safar, Ammar H.; AlKhezzi, Fahad A.

    2013-01-01

    Personal computers, the Internet, smartphones, and other forms of information and communication technology (ICT) have changed our world, our job, our personal lives, as well as how we manage our knowledge and time effectively and efficiently. Research findings in the past decades have acknowledged and affirmed that the content the ICT medium…

  20. Prerequisites for Computer-Aided Cognitive Rehabilitation.

    Science.gov (United States)

    Legrand, Colette

    1989-01-01

    This paper describes computer-aided cognitive rehabilitation for mentally deficient persons. It lists motor, cognitive, emotional, and educational prerequisites to such rehabilitation and states advantages and disadvantages in using the prerequisites. (JDD)

  1. Quantitative evaluation of low-cost frame-grabber boards for personal computers.

    Science.gov (United States)

    Kofler, J M; Gray, J E; Fuelberth, J T; Taubel, J P

    1995-11-01

    Nine moderately priced frame-grabber boards for both Macintosh (Apple Computers, Cupertino, CA) and IBM-compatible computers were evaluated using a Society of Motion Pictures and Television Engineers (SMPTE) pattern and a video signal generator for dynamic range, gray-scale reproducibility, and spatial integrity of the captured image. The degradation of the video information ranged from minor to severe. Some boards are of reasonable quality for applications in diagnostic imaging and education. However, price and quality are not necessarily directly related.

  2. ATLAS@Home: Harnessing Volunteer Computing for HEP

    CERN Document Server

    Cameron, David; The ATLAS collaboration

    2015-01-01

    The ATLAS collaboration has setup a volunteer computing project called ATLAS@home. Volunteers running Monte-Carlo simulation on their personal computer provide significant computing resources, but also belong to a community potentially interested in HEP. Four types of contributors have been identified, whose questions range from advanced technical details to the reason why simulation is needed, how Computing is organized and how it relates to society. The creation of relevant outreach material for simulation, event visualization and distributed production will be described, as well as lessons learned while interacting with the BOINC volunteers community.

  3. Inventory management of repairable service parts for personal computers : A case study

    NARCIS (Netherlands)

    Ashayeri, J.; Heuts, R.M.J.; Jansen, A.; Szczerba, B.

    1994-01-01

    Recent years have seen an increase of interest in the field of service parts inventory - particularly in computer industry. The computer industry is a highly competitive industry; products have to be repaired as quickly as possible, since slow repair can lead to loss of future business to

  4. 1987 CERN school of computing

    International Nuclear Information System (INIS)

    Verkerk, C.

    1988-01-01

    These Proceedings contain written versions of most of the lectures delivered at the 1987 CERN School of Computing. Five lecture series treated various aspects of data communications: integrated services networks, standard LANs and optical LANs, open systems networking in practice, and distributed operating systems. Present and future computer architectures were covered and an introduction to vector processing was given, followed by lectures on vectorization of pattern recognition and Monte Carlo code. Aspects of computing in high-energy physics were treated in lectures on data acquisition and analysis at LEP, on data-base systems in high-energy physics experiments, and on Fastbus. The experience gained with personal work stations was also presented. Various other topics were covered: the use of computers in number theory and in astronomy, fractals, and computer security and access control. (orig.)

  5. ePatient Conference Explores Future of Personalized Medicine | NIH MedlinePlus the Magazine

    Science.gov (United States)

    ... page please turn Javascript on. ePatient Conference Explores Future of Personalized Medicine Past Issues / Spring - Summer 2010 Table of Contents ... your healthcare provider communicate better in the digital future? What is personalized medicine? Some of the nation's top health researchers, computer ...

  6. Transnational (Dis)connection in localizing personal computing in the Netherlands, 1975-1990

    NARCIS (Netherlands)

    Veraart, F.C.A.; Alberts, G.; Oldenziel, R.

    2014-01-01

    Examining the diffusion and domestication of computer technologies in Dutch households and schools during the 1980s and 1990s, this chapter shows that the process was not a simple story of adoption of American models. Instead, many Dutch actors adapted computer technologies to their own local needs,

  7. Computer applications in water conservancy and hydropower engineering

    Energy Technology Data Exchange (ETDEWEB)

    Chen, J

    1984-09-20

    The use of computers in China's water conservancy and hydropower construction began in the 1960s for exploration surveys, planning, design, construction, operation, and scientific research. Despite the positive results, and the formation of a 1000-person computer computation contingent, computer development among different professions is not balanced. The weaknesses and disparities in computer applications include an overall low level of application relative to the rest of the world, which is partly due to inadequate hardware and programs. The report suggests five ways to improve applications and popularize microcomputers which emphasize leadership and planning.

  8. Integrating personality structure, personality process, and personality development

    NARCIS (Netherlands)

    Baumert, Anna; Schmitt, Manfred; Perugini, Marco; Johnson, Wendy; Blum, Gabriela; Borkenau, Peter; Costantini, Giulio; Denissen, J.J.A.; Fleeson, William; Grafton, Ben; Jayawickreme, Eranda; Kurzius, Elena; MacLeod, Colin; Miller, Lynn C.; Read, Stephen J.; Robinson, Michael D.; Wood, Dustin; Wrzus, Cornelia

    2017-01-01

    In this target article, we argue that personality processes, personality structure, and personality development have to be understood and investigated in integrated ways in order to provide comprehensive responses to the key questions of personality psychology. The psychological processes and

  9. A personal-computer-based package for interactive assessment of magnetohydrodynamic equilibrium and poloidal field coil design in axisymmetric toroidal geometry

    International Nuclear Information System (INIS)

    Kelleher, W.P.; Steiner, D.

    1989-01-01

    A personal-computer (PC)-based calculational approach assesses magnetohydrodynamic (MHD) equilibrium and poloidal field (PF) coil arrangement in a highly interactive mode, well suited for tokamak scoping studies. The system developed involves a two-step process: the MHD equilibrium is calculated and then a PF coil arrangement, consistent with the equilibrium is determined in an interactive design environment. In this paper the approach is used to examine four distinctly different toroidal configurations: the STARFIRE rector, a spherical torus (ST), the Big Dee, and an elongated tokamak. In these applications the PC-based results are benchmarked against those of a mainframe code for STARFIRE, ST, and Big Dee. The equilibrium and PF coil arrangement calculations obtained with the PC approach agree within a few percent with those obtained with the mainframe code

  10. A personal computer code for seismic evaluations of nuclear power plant facilities

    International Nuclear Information System (INIS)

    Xu, J.; Graves, H.

    1990-01-01

    A wide range of computer programs and modeling approaches are often used to justify the safety of nuclear power plants. It is often difficult to assess the validity and accuracy of the results submitted by various utilities without developing comparable computer solutions. Taken this into consideration, CARES is designed as an integrated computational system which can perform rapid evaluations of structural behavior and examine capability of nuclear power plant facilities, thus CARES may be used by the NRC to determine the validity and accuracy of analysis methodologies employed for structural safety evaluations of nuclear power plants. CARES has been designed to: operate on a PC, have user friendly input/output interface, and have quick turnaround. The CARES program is structured in a modular format. Each module performs a specific type of analysis. The basic modules of the system are associated with capabilities for static, seismic and nonlinear analyses. This paper describes the various features which have been implemented into the Seismic Module of CARES version 1.0. In Section 2 a description of the Seismic Module is provided. The methodologies and computational procedures thus far implemented into the Seismic Module are described in Section 3. Finally, a complete demonstration of the computational capability of CARES in a typical soil-structure interaction analysis is given in Section 4 and conclusions are presented in Section 5. 5 refs., 4 figs

  11. Future Computing Technology (3/3)

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Computing of the future will be affected by a number of fundamental technologies in development today, many of which are already on the way to becoming commercialized. In this series of lectures, we will discuss hardware and software development that will become mainstream in the timeframe of a few years and how they will shape or change the computing landscape - commercial and personal alike. Topics range from processor and memory aspects, programming models and the limits of artificial intelligence, up to end-user interaction with wearables or e-textiles. We discuss the impact of these technologies on the art of programming, the data centres of the future and daily life. On the third day of the Future Computing Technology series, we will touch on societal aspects of the future of computing. Our perception of computers may at time seem passive, but in reality we are a vital chain of the feedback loop. Human-computer interaction, innovative forms of computers, privacy, process automation, threats and medica...

  12. Linear equations and rap battles: how students in a wired classroom utilized the computer as a resource to coordinate personal and mathematical positional identities in hybrid spaces

    Science.gov (United States)

    Langer-Osuna, Jennifer

    2015-03-01

    This paper draws on the constructs of hybridity, figured worlds, and cultural capital to examine how a group of African-American students in a technology-driven, project-based algebra classroom utilized the computer as a resource to coordinate personal and mathematical positional identities during group work. Analyses of several vignettes of small group dynamics highlight how hybridity was established as the students engaged in multiple on-task and off-task computer-based activities, each of which drew on different lived experiences and forms of cultural capital. The paper ends with a discussion on how classrooms that make use of student-led collaborative work, and where students are afforded autonomy, have the potential to support the academic engagement of students from historically marginalized communities.

  13. Bringing together high energy physicist and computer scientist

    International Nuclear Information System (INIS)

    Bock, R.K.

    1989-01-01

    The Oxford Conference on Computing in High Energy Physics approached the physics and computing issues with the question, ''Can computer science help?'' always in mind. This summary is a personal recollection of what I considered to be the highlights of the conference: the parts which contributed to my own learning experience. It can be used as a general introduction to the following papers, or as a brief overview of the current states of computer science within high energy physics. (orig.)

  14. Psychometric Properties of Difficulties of Working with Patients with Personality Disorders and Attitudes Towards Patients with Personality Disorders Scales.

    Science.gov (United States)

    Eren, Nurhan

    2014-12-01

    In this study, we aimed to develop two reliable and valid assessment instruments for investigating the level of difficulties mental health workers experience while working with patients with personality disorders and the attitudes they develop tt the patients. The research was carried out based on the general screening model. The study sample consisted of 332 mental health workers in several mental health clinics of Turkey, with a certain amount of experience in working with personality disorders, who were selected with a random assignment method. In order to collect data, the Personal Information Questionnaire, Difficulty of Working with Personality Disorders Scale (PD-DWS), and Attitudes Towards Patients with Personality Disorders Scale (PD-APS), which are being examined for reliability and validity, were applied. To determine construct validity, the Adjective Check List, Maslach Burnout Inventory, and State and Trait Anxiety Inventory were used. Explanatory factor analysis was used for investigating the structural validity, and Cronbach alpha, Spearman-Brown, Guttman Split-Half reliability analyses were utilized to examine the reliability. Also, item reliability and validity computations were carried out by investigating the corrected item-total correlations and discriminative indexes of the items in the scales. For the PD-DWS KMO test, the value was .946; also, a significant difference was found for the Bartlett sphericity test (pKMO, the value was .925; a significant difference was found in Bartlett sphericity test (p<.001); the computed reliability coefficient based on continuity was .806; and the Cronbach alpha value of the total test score was .913. Analyses on both scales were based on total scores. It was found that PD-DWS and PD-APS have good psychometric properties, measuring the structure that is being investigated, are compatible with other scales, have high levels of internal reliability between their items, and are consistent across time. Therefore

  15. A Novel Personalized Web Search Model

    Institute of Scientific and Technical Information of China (English)

    ZHU Zhengyu; XU Jingqiu; TIAN Yunyan; REN Xiang

    2007-01-01

    A novel personalized Web search model is proposed.The new system, as a middleware between a user and a Web search engine, is set up on the client machine. It can learn a user's preference implicitly and then generate the user profile automatically. When the user inputs query keywords, the system can automatically generate a few personalized expansion words by computing the term-term associations according to the current user profile, and then these words together with the query keywords are submitted to a popular search engine such as Yahoo or Google.These expansion words help to express accurately the user's search intention. The new Web search model can make a common search engine personalized, that is, the search engine can return different search results to different users who input the same keywords. The experimental results show the feasibility and applicability of the presented work.

  16. A roadmap towards personalized immunology

    OpenAIRE

    Delhalle, Sylvie; Bode, Sebastian F. N.; Balling, Rudi; Ollert, Markus; He, Feng Q.

    2018-01-01

    Big data generation and computational processing will enable medicine to evolve from a "one-size-fits-all" approach to precise patient stratification and treatment. Significant achievements using "Omics" data have been made especially in personalized oncology. However, immune cells relative to tumor cells show a much higher degree of complexity in heterogeneity, dynamics, memory-capability, plasticity and "social" interactions. There is still a long way ahead on translating our capability to ...

  17. Ultrafast comparison of personal genomes

    OpenAIRE

    Mauldin, Denise; Hood, Leroy; Robinson, Max; Glusman, Gustavo

    2017-01-01

    We present an ultra-fast method for comparing personal genomes. We transform the standard genome representation (lists of variants relative to a reference) into 'genome fingerprints' that can be readily compared across sequencing technologies and reference versions. Because of their reduced size, computation on the genome fingerprints is fast and requires little memory. This enables scaling up a variety of important genome analyses, including quantifying relatedness, recognizing duplicative s...

  18. Computer based workstation for development of software for high energy physics experiments

    International Nuclear Information System (INIS)

    Ivanchenko, I.M.; Sedykh, Yu.V.

    1987-01-01

    Methodical principles and results of a successful attempt to create on the base of IBM-PC/AT personal computer of effective means for development of programs for high energy physics experiments are analysed. The obtained results permit to combine the best properties and a positive materialized experience accumulated on the existing time sharing collective systems with a high quality of data representation, reliability and convenience of personal computer applications

  19. Computer Security: posting and mis-posting

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    This is what can happen at CERN if you don't lock your computer screen...   “Hi, I am looking for a partner either male or female to attend salsa lessons. I have a great body and enjoy rubbing it against other people on the dance floor. I would consider dinner after with the right person. If you think you can keep up with me and enjoy getting sweaty send me a reply. Stay sexy…” This is the original text of a recent posting on the CERN Market webpage. Some people might find this appealing, some people think this is funny. Personally, I couldn’t care less. But professionally, we had to follow up as this text can be perceived as inappropriate and, thus, in violation of the Terms of Usage of the CERN Market as well as the CERN Computing Rules and its annex on private usage of the CERN computing facilities. We remind you that the CERN Market is a public website that can be used by people within but also outside CERN. All posts are visible world...

  20. Computing for ongoing experiments on high energy physics in LPP, JINR

    International Nuclear Information System (INIS)

    Belosludtsev, D.A.; Zhil'tsov, V.E.; Zinchenko, A.I.; Kekelidze, V.D.; Madigozhin, D.T.; Potrebenikov, Yu.K.; Khabarov, S.V.; Shkarovskij, S.N.; Shchinov, B.G.

    2004-01-01

    The computer infrastructure made at the Laboratory of Particle Physics, JINR, purposed for active participation of JINR experts in ongoing experiments on particle and nuclear physics is presented. The principles of design and construction of the personal computer farm have been given and the used computer and informational services for effective application of distributed computer resources have been described

  1. Computer use exposed : blootstelling aan computergebruik blootgelegd

    NARCIS (Netherlands)

    Richter, J.M.

    2009-01-01

    Ever since the introduction of the personal computer, our daily lives are infl uenced more and more by computers. A day in the life of a PhD-student illustrates this: “At the breakfast table, I check my e-mail to see if the meeting later that day has been confi rmed, and I check the time table of

  2. Computer systems for nuclear installation data control

    International Nuclear Information System (INIS)

    1987-09-01

    The computer programs developed by Divisao de Instalacoes Nucleares (DIN) from Brazilian CNEN for data control on nuclear installations in Brazil are presented. The following computer programs are described: control of registered companies, control of industrial sources, irradiators and monitors; control of liable person; control of industry irregularities; for elaborating credence tests; for shielding analysis; control of waste refuge [pt

  3. Dry eye syndrome among computer users

    Science.gov (United States)

    Gajta, Aurora; Turkoanje, Daniela; Malaescu, Iosif; Marin, Catalin-Nicolae; Koos, Marie-Jeanne; Jelicic, Biljana; Milutinovic, Vuk

    2015-12-01

    Dry eye syndrome is characterized by eye irritation due to changes of the tear film. Symptoms include itching, foreign body sensations, mucous discharge and transitory vision blurring. Less occurring symptoms include photophobia and eye tiredness. Aim of the work was to determine the quality of the tear film and ocular dryness potential risk in persons who spend more than 8 hours using computers and possible correlations between severity of symptoms (dry eyes symptoms anamnesis) and clinical signs assessed by: Schirmer test I, TBUT (Tears break-up time), TFT (Tear ferning test). The results show that subjects using computer have significantly shorter TBUT (less than 5 s for 56 % of subjects and less than 10 s for 37 % of subjects), TFT type II/III in 50 % of subjects and type III 31% of subjects was found when compared to computer non users (TFT type I and II was present in 85,71% of subjects). Visual display terminal use, more than 8 hours daily, has been identified as a significant risk factor for dry eye. It's been advised to all persons who spend substantial time using computers to use artificial tears drops in order to minimize the symptoms of dry eyes syndrome and prevents serious complications.

  4. Games at work: the recreational use of computer games during working hours.

    Science.gov (United States)

    Reinecke, Leonard

    2009-08-01

    The present study investigated the recreational use of video and computer games in the workplace. In an online survey, 833 employed users of online casual games reported on their use of computer games during working hours. The data indicate that playing computer games in the workplace elicits substantial levels of recovery experience. Recovery experience associated with gameplay was the strongest predictor for the use of games in the workplace. Furthermore, individuals with higher levels of work-related fatigue reported stronger recovery experience during gameplay and showed a higher tendency to play games during working hours than did persons with lower levels of work strain. Additionally, the social situation at work was found to have a significant influence on the use of games. Persons receiving less social support from colleagues and supervisors played games at work more frequently than did individuals with higher levels of social support. Furthermore, job control was positively related to the use of games at work. In sum, the results of the present study illustrate that computer games have a significant recovery potential. Implications of these findings for research on personal computer use during work and for games research in general are discussed.

  5. Non-conventional personal dosimetry techniques

    International Nuclear Information System (INIS)

    Regulla, D.F.

    1984-01-01

    Established dosimetry has achieved a high standard in personnel monitoring. This applies particularly to photon dosimetry. Nevertheless, even in photon dosimetry, improvements and changes are being made. The reason may be technological progress, or the introduction of new tasks on the basis of the recommendations of international bodies (e.g. the new ICRU measurement unit) of national legislation. Since we are restricting ourselves here to technical trends the author would like to draw attention to various activities of current interest, e.g. the computation of receptor-related conversion coefficients from personal dose to organ or body doses, taking into account the conditions of exposure with respect to differential energy and angular distribution of the radiation field. Realistic data on exposure geometry are taken from work place analyses. Furthermore, the data banks of central personal dosimetry services are subject to statistical evaluation and radiation protection trend analysis. Technological progress and developments are considered from the point of view of personal dosimetry, partial body or extremity dosimetry and accidental dosimetry

  6. Moby Dick, on the design of a Swiss army knife of computing

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Smit, Gerardus Johannes Maria

    2000-01-01

    Recent advances in wireless networking technology and the exponential development of semiconductor technology have engendered a new paradigm of computing, called personal mobile computing or ubiquitous computing. This offers a vision of the future with a much richer and more exciting set of

  7. Service Interaction Flow Analysis Technique for Service Personalization

    DEFF Research Database (Denmark)

    Korhonen, Olli; Kinnula, Marianne; Syrjanen, Anna-Liisa

    2017-01-01

    Service interaction flows are difficult to capture, analyze, outline, and represent for research and design purposes. We examine how variation of personalized service flows in technology-mediated service interaction can be modeled and analyzed to provide information on how service personalization...... could support interaction. We have analyzed service interaction cases in a context of technology-mediated car rental service. With the analysis technique we propose, inspired by Interaction Analysis method, we were able to capture and model the situational service interaction. Our contribution regarding...... technology-mediated service interaction design is twofold: First, with the increased understanding on the role of personalization in managing variation in technology-mediated service interaction, our study contributes to designing service management information systems and human-computer interfaces...

  8. Reminder: Mandatory Computer Security Course

    CERN Multimedia

    IT Department

    2011-01-01

    Just like any other organization, CERN is permanently under attack – even right now. Consequently it's important to be vigilant about security risks, protecting CERN's reputation - and your work. The availability, integrity and confidentiality of CERN's computing services and the unhindered operation of its accelerators and experiments come down to the combined efforts of the CERN Security Team and you. In order to remain par with the attack trends, the Security Team regularly reminds CERN users about the computer security risks, and about the rules for using CERN’s computing facilities. Therefore, a new dedicated basic computer security course has been designed informing you about the “Do’s” and “Dont’s” when using CERN's computing facilities. This course is mandatory for all person owning a CERN computer account and must be followed once every three years. Users who have never done the course, or whose course needs to be renewe...

  9. Future Computing Technology (2/3)

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Computing of the future will be affected by a number of fundamental technologies in development today, many of which are already on the way to becoming commercialized. In this series of lectures, we will discuss hardware and software development that will become mainstream in the timeframe of a few years and how they will shape or change the computing landscape - commercial and personal alike. Topics range from processor and memory aspects, programming models and the limits of artificial intelligence, up to end-user interaction with wearables or e-textiles. We discuss the impact of these technologies on the art of programming, the data centres of the future and daily life. On the second day of the Future Computing Technology series, we will talk about ubiquitous computing. From smart watches through mobile devices to virtual reality, computing devices surround us, and innovative new technologies are introduces every day. We will briefly explore how this propagation might continue, how computers can take ove...

  10. Consumer attitudes towards computer-assisted self-care of the common cold.

    Science.gov (United States)

    Reis, J; Wrestler, F

    1994-04-01

    Knowledge of colds and flu and attitudes towards use of computers for self-care are compared for 260 young adult users and 194 young adult non-users of computer-assisted self-care for colds and flu. Participants completed a knowledge questionnaire on colds and flu, used a computer program designed to enhance self-care for colds and flu, and then completed a questionnaire on their attitudes towards using a computer for self-care for colds and flu, and then completed a questionnaire on their attitudes towards using a computer for self-care for colds and flu, perceived importance of physician interactions, physician expertise, and patient-physician communication. Compared with users, non-users preferred personal contact with their physicians and felt that computerized health assessments would be limited in vocabulary and range of current medical information. Non-users were also more likely to agree that people could not be trusted to do an accurate computerized health assessment and that the average person was too computer illiterate to use computers for self-care.

  11. The Effects of Computer Games on the Achievement of Basic Mathematical Skills

    Science.gov (United States)

    Sayan, Hamiyet

    2015-01-01

    This study aims to analyze the relationship between playing computer games and learning basic mathematics skills. It shows the role computer games play in the learning and achievement of basic mathematical skills by students. Nowadays it is clear that individuals, especially young persons are very fond of computer and computer games. Since…

  12. [Musculoskeletal disorders among university student computer users].

    Science.gov (United States)

    Lorusso, A; Bruno, S; L'Abbate, N

    2009-01-01

    Musculoskeletal disorders are a common problem among computer users. Many epidemiological studies have shown that ergonomic factors and aspects of work organization play an important role in the development of these disorders. We carried out a cross-sectional survey to estimate the prevalence of musculoskeletal symptoms among university students using personal computers and to investigate the features of occupational exposure and the prevalence of symptoms throughout the study course. Another objective was to assess the students' level of knowledge of computer ergonomics and the relevant health risks. A questionnaire was distributed to 183 students attending the lectures for second and fourth year courses of the Faculty of Architecture. Data concerning personal characteristics, ergonomic and organizational aspects of computer use, and the presence of musculoskeletal symptoms in the neck and upper limbs were collected. Exposure to risk factors such as daily duration of computer use, time spent at the computer without breaks, duration of mouse use and poor workstation ergonomics was significantly higher among students of the fourth year course. Neck pain was the most commonly reported symptom (69%), followed by hand/wrist (53%), shoulder (49%) and arm (8%) pain. The prevalence of symptoms in the neck and hand/wrist area was signifcantly higher in the students of the fourth year course. In our survey we found high prevalence of musculoskeletal symptoms among university students using computers for long time periods on a daily basis. Exposure to computer-related ergonomic and organizational risk factors, and the prevalence ofmusculoskeletal symptoms both seem to increase significantly throughout the study course. Furthermore, we found that the level of perception of computer-related health risks among the students was low. Our findings suggest the need for preventive intervention consisting of education in computer ergonomics.

  13. Toward a Computer Vision-based Wayfinding Aid for Blind Persons to Access Unfamiliar Indoor Environments.

    Science.gov (United States)

    Tian, Yingli; Yang, Xiaodong; Yi, Chucai; Arditi, Aries

    2013-04-01

    Independent travel is a well known challenge for blind and visually impaired persons. In this paper, we propose a proof-of-concept computer vision-based wayfinding aid for blind people to independently access unfamiliar indoor environments. In order to find different rooms (e.g. an office, a lab, or a bathroom) and other building amenities (e.g. an exit or an elevator), we incorporate object detection with text recognition. First we develop a robust and efficient algorithm to detect doors, elevators, and cabinets based on their general geometric shape, by combining edges and corners. The algorithm is general enough to handle large intra-class variations of objects with different appearances among different indoor environments, as well as small inter-class differences between different objects such as doors and door-like cabinets. Next, in order to distinguish intra-class objects (e.g. an office door from a bathroom door), we extract and recognize text information associated with the detected objects. For text recognition, we first extract text regions from signs with multiple colors and possibly complex backgrounds, and then apply character localization and topological analysis to filter out background interference. The extracted text is recognized using off-the-shelf optical character recognition (OCR) software products. The object type, orientation, location, and text information are presented to the blind traveler as speech.

  14. Wearable computer technology for dismounted applications

    Science.gov (United States)

    Daniels, Reginald

    2010-04-01

    Small computing devices which rival the compact size of traditional personal digital assistants (PDA) have recently established a market niche. These computing devices are small enough to be considered unobtrusive for humans to wear. The computing devices are also powerful enough to run full multi-tasking general purpose operating systems. This paper will explore the wearable computer information system for dismounted applications recently fielded for ground-based US Air Force use. The environments that the information systems are used in will be reviewed, as well as a description of the net-centric, ground-based warrior. The paper will conclude with a discussion regarding the importance of intuitive, usable, and unobtrusive operator interfaces for dismounted operators.

  15. Atlas2 Cloud: a framework for personal genome analysis in the cloud.

    Science.gov (United States)

    Evani, Uday S; Challis, Danny; Yu, Jin; Jackson, Andrew R; Paithankar, Sameer; Bainbridge, Matthew N; Jakkamsetti, Adinarayana; Pham, Peter; Coarfa, Cristian; Milosavljevic, Aleksandar; Yu, Fuli

    2012-01-01

    Until recently, sequencing has primarily been carried out in large genome centers which have invested heavily in developing the computational infrastructure that enables genomic sequence analysis. The recent advancements in next generation sequencing (NGS) have led to a wide dissemination of sequencing technologies and data, to highly diverse research groups. It is expected that clinical sequencing will become part of diagnostic routines shortly. However, limited accessibility to computational infrastructure and high quality bioinformatic tools, and the demand for personnel skilled in data analysis and interpretation remains a serious bottleneck. To this end, the cloud computing and Software-as-a-Service (SaaS) technologies can help address these issues. We successfully enabled the Atlas2 Cloud pipeline for personal genome analysis on two different cloud service platforms: a community cloud via the Genboree Workbench, and a commercial cloud via the Amazon Web Services using Software-as-a-Service model. We report a case study of personal genome analysis using our Atlas2 Genboree pipeline. We also outline a detailed cost structure for running Atlas2 Amazon on whole exome capture data, providing cost projections in terms of storage, compute and I/O when running Atlas2 Amazon on a large data set. We find that providing a web interface and an optimized pipeline clearly facilitates usage of cloud computing for personal genome analysis, but for it to be routinely used for large scale projects there needs to be a paradigm shift in the way we develop tools, in standard operating procedures, and in funding mechanisms.

  16. Eye Movements During Everyday Behavior Predict Personality Traits.

    Science.gov (United States)

    Hoppe, Sabrina; Loetscher, Tobias; Morey, Stephanie A; Bulling, Andreas

    2018-01-01

    Besides allowing us to perceive our surroundings, eye movements are also a window into our mind and a rich source of information on who we are, how we feel, and what we do. Here we show that eye movements during an everyday task predict aspects of our personality. We tracked eye movements of 42 participants while they ran an errand on a university campus and subsequently assessed their personality traits using well-established questionnaires. Using a state-of-the-art machine learning method and a rich set of features encoding different eye movement characteristics, we were able to reliably predict four of the Big Five personality traits (neuroticism, extraversion, agreeableness, conscientiousness) as well as perceptual curiosity only from eye movements. Further analysis revealed new relations between previously neglected eye movement characteristics and personality. Our findings demonstrate a considerable influence of personality on everyday eye movement control, thereby complementing earlier studies in laboratory settings. Improving automatic recognition and interpretation of human social signals is an important endeavor, enabling innovative design of human-computer systems capable of sensing spontaneous natural user behavior to facilitate efficient interaction and personalization.

  17. Eye Movements During Everyday Behavior Predict Personality Traits

    Directory of Open Access Journals (Sweden)

    Sabrina Hoppe

    2018-04-01

    Full Text Available Besides allowing us to perceive our surroundings, eye movements are also a window into our mind and a rich source of information on who we are, how we feel, and what we do. Here we show that eye movements during an everyday task predict aspects of our personality. We tracked eye movements of 42 participants while they ran an errand on a university campus and subsequently assessed their personality traits using well-established questionnaires. Using a state-of-the-art machine learning method and a rich set of features encoding different eye movement characteristics, we were able to reliably predict four of the Big Five personality traits (neuroticism, extraversion, agreeableness, conscientiousness as well as perceptual curiosity only from eye movements. Further analysis revealed new relations between previously neglected eye movement characteristics and personality. Our findings demonstrate a considerable influence of personality on everyday eye movement control, thereby complementing earlier studies in laboratory settings. Improving automatic recognition and interpretation of human social signals is an important endeavor, enabling innovative design of human–computer systems capable of sensing spontaneous natural user behavior to facilitate efficient interaction and personalization.

  18. Career transitions for persons with severe physical disabilities: integrating technological and psychosocial skills and accommodations.

    Science.gov (United States)

    Lash, M; Licenziato, V

    1995-01-01

    This article describes a vocational training program entitled, 'Careers in Automation for Persons with Severe Physical Disabilities', that was developed by the Department of Physical Medicine and Rehabilitation at Tufts University School of Medicine in collaboration with the Massachusetts Rehabilitation Commission. Its goal is to secure employment for individuals with severe physical impairments by using computers and technology as job related accommodations. Psychosocial, educational, and vocational profiles are presented for 24 clients over 4 years. Three case studies involving persons with traumatic, chronic and developmental disabilities illustrate the importance of matching technological accommodations with employer needs and personal preferences. Discussion of employment outcomes illustrates that the effective use of computers and technology by persons with disabilities is best measured not by the degree of sophistication and engineering of systems and devices, but by employer and employee satisfaction with job performance and productivity.

  19. Computing in an academic radiation therapy department

    International Nuclear Information System (INIS)

    Gottlieb, C.F.; Houdek, P.V.; Fayos, J.V.

    1985-01-01

    The authors conceptualized the different computer functions in radiotherapy as follows: 1) treatment planning and dosimetry, 2) data and word processing, 3) radiotherapy information system (data bank), 4) statistical analysis, 5) data acquisition and equipment control, 6) telecommunication, and 7) financial management. They successfully implemented the concept of distributed computing using multiple mini and personal computers. The authors' computer practice supports data and word processing, graphics, communication, automated data acquisition and control, and portable computing. The computers are linked together into a local computer network which permits sharing of information, peripherals, and unique programs among our systems, while preserving the individual function and identity of each machine. Furthermore, the architecture of our network allows direct access to any other computer network providing them with inexpensive use of the most modern and sophisticated software and hardware resources

  20. Computer-Based Script Training for Aphasia: Emerging Themes from Post-Treatment Interviews

    Science.gov (United States)

    Cherney, Leora R.; Halper, Anita S.; Kaye, Rosalind C.

    2011-01-01

    This study presents results of post-treatment interviews following computer-based script training for persons with chronic aphasia. Each of the 23 participants received 9 weeks of AphasiaScripts training. Post-treatment interviews were conducted with the person with aphasia and/or a significant other person. The 23 interviews yielded 584 coded…

  1. Privacy-preserving computation of participatory noise maps in the cloud

    NARCIS (Netherlands)

    Drosatos, George; Efraimidis, Pavlos S.; Athanasiadis, Ioannis N.; Stevens, Matthias; Hondt, D' Ellie

    2014-01-01

    This paper presents a privacy-preserving system for participatory sensing, which relies on cryptographic techniques and distributed computations in the cloud. Each individual user is represented by a personal software agent, deployed in the cloud, where it collaborates on distributed computations

  2. Affective disorders among patients with borderline personality disorder.

    Science.gov (United States)

    Sjåstad, Hege Nordem; Gråwe, Rolf W; Egeland, Jens

    2012-01-01

    The high co-occurrence between borderline personality disorder and affective disorders has led many to believe that borderline personality disorder should be considered as part of an affective spectrum. The aim of the present study was to examine whether the prevalence of affective disorders are higher for patients with borderline personality disorder than for patients with other personality disorders. In a national cross-sectional study of patients receiving mental health treatment in Norway (N = 36 773), we determined whether psychiatric outpatients with borderline personality disorder (N = 1 043) had a higher prevalence of affective disorder in general, and whether they had an increased prevalence of depression, bipolar disorder or dysthymia specifically. They were compared to patients with paranoid, schizoid, dissocial, histrionic, obsessive-compulsive, avoidant, dependent, or unspecified personality disorder, as well as an aggregated group of patients with personality disorders other than the borderline type (N = 2 636). Odds ratios were computed for the borderline personality disorder group comparing it to the mixed sample of other personality disorders. Diagnostic assessments were conducted in routine clinical practice. More subjects with borderline personality disorder suffered from unipolar than bipolar disorders. Nevertheless, borderline personality disorder had a lower rate of depression and dysthymia than several other personality disorder groups, whereas the rate of bipolar disorder tended to be higher. Odds ratios showed 34% lower risk for unipolar depression, 70% lower risk for dysthymia and 66% higher risk for bipolar disorder in patients with borderline personality disorder compared to the aggregated group of other personality disorders. The results suggest that borderline personality disorder has a stronger association with affective disorders in the bipolar spectrum than disorders in the unipolar spectrum. This association may reflect

  3. Affective disorders among patients with borderline personality disorder.

    Directory of Open Access Journals (Sweden)

    Hege Nordem Sjåstad

    Full Text Available BACKGROUND: The high co-occurrence between borderline personality disorder and affective disorders has led many to believe that borderline personality disorder should be considered as part of an affective spectrum. The aim of the present study was to examine whether the prevalence of affective disorders are higher for patients with borderline personality disorder than for patients with other personality disorders. METHODS: In a national cross-sectional study of patients receiving mental health treatment in Norway (N = 36 773, we determined whether psychiatric outpatients with borderline personality disorder (N = 1 043 had a higher prevalence of affective disorder in general, and whether they had an increased prevalence of depression, bipolar disorder or dysthymia specifically. They were compared to patients with paranoid, schizoid, dissocial, histrionic, obsessive-compulsive, avoidant, dependent, or unspecified personality disorder, as well as an aggregated group of patients with personality disorders other than the borderline type (N = 2 636. Odds ratios were computed for the borderline personality disorder group comparing it to the mixed sample of other personality disorders. Diagnostic assessments were conducted in routine clinical practice. RESULTS: More subjects with borderline personality disorder suffered from unipolar than bipolar disorders. Nevertheless, borderline personality disorder had a lower rate of depression and dysthymia than several other personality disorder groups, whereas the rate of bipolar disorder tended to be higher. Odds ratios showed 34% lower risk for unipolar depression, 70% lower risk for dysthymia and 66% higher risk for bipolar disorder in patients with borderline personality disorder compared to the aggregated group of other personality disorders. CONCLUSIONS: The results suggest that borderline personality disorder has a stronger association with affective disorders in the bipolar spectrum than

  4. Affective Disorders among Patients with Borderline Personality Disorder

    Science.gov (United States)

    Sjåstad, Hege Nordem; Gråwe, Rolf W.; Egeland, Jens

    2012-01-01

    Background The high co-occurrence between borderline personality disorder and affective disorders has led many to believe that borderline personality disorder should be considered as part of an affective spectrum. The aim of the present study was to examine whether the prevalence of affective disorders are higher for patients with borderline personality disorder than for patients with other personality disorders. Methods In a national cross-sectional study of patients receiving mental health treatment in Norway (N = 36 773), we determined whether psychiatric outpatients with borderline personality disorder (N = 1 043) had a higher prevalence of affective disorder in general, and whether they had an increased prevalence of depression, bipolar disorder or dysthymia specifically. They were compared to patients with paranoid, schizoid, dissocial, histrionic, obsessive-compulsive, avoidant, dependent, or unspecified personality disorder, as well as an aggregated group of patients with personality disorders other than the borderline type (N = 2 636). Odds ratios were computed for the borderline personality disorder group comparing it to the mixed sample of other personality disorders. Diagnostic assessments were conducted in routine clinical practice. Results More subjects with borderline personality disorder suffered from unipolar than bipolar disorders. Nevertheless, borderline personality disorder had a lower rate of depression and dysthymia than several other personality disorder groups, whereas the rate of bipolar disorder tended to be higher. Odds ratios showed 34% lower risk for unipolar depression, 70% lower risk for dysthymia and 66% higher risk for bipolar disorder in patients with borderline personality disorder compared to the aggregated group of other personality disorders. Conclusions The results suggest that borderline personality disorder has a stronger association with affective disorders in the bipolar spectrum than disorders in the unipolar

  5. GAMING COMPUTER ENTHUSIASM AS A PREDICTOR OF ADOLESCENT BULLYING

    Directory of Open Access Journals (Sweden)

    A. V. Grishina

    2017-01-01

    Full Text Available Introduction: In the era of intensive computerization of society, the computer becomes an integral part of the life of a modern teenager. The virtual world contributes to the formation and development of those forms of individuality, which are largely designed by computer games developers, which leads to a change in the organization of the teenager's life - the computer player, his communications, the transformation of traditional social ties. According to the results of research, the consequences of enthusiasm for computer games include, among other things, the emergence of cruelty in relations between peers. Of particular concern is the fact that violence is reflected in the interaction of children with classmates, as a result of which is its spread in educational institutions. The problem of studying the relationship between gaming computer enthusiasm and teenage bullying is, in our opinion, an urgent task and requires a multilevel analysis.Results: The article presents an analytical review of research on the problem of enthusiasm for computer games and school bullying in Russia and abroad. Noting the importance of these studies, it should be recognized that the problem of overcoming adolescents' enthusiasm for computer games in the form of reducing and preventing its destructive influence and preventing the formation of deviant behavior requires further analysis and study. Till now it is not enough studied, in what cases the enthusiasm for computer games leads to deviant forms of behavior, which provokes the formation of an associative orientation in adolescents. In this regard, it is relevant to assess the relationship between the enthusiasm for computer games and deviant behavior in adolescents, as well as the search for effective methods and means to prevent computer game enthusiasm, based on a personal-oriented approach to each child.Discussion and Conclusions: At present, there is no single point of view on how the enthusiasm for

  6. Agent-Based Modeling of Consumer Decision making Process Based on Power Distance and Personality

    NARCIS (Netherlands)

    Roozmand, O.; Ghasem-Aghaee, N.; Hofstede, G.J.; Nematbakhsh, M.A.; Baraani, A.; Verwaart, T.

    2011-01-01

    Simulating consumer decision making processes involves different disciplines such as: sociology, social psychology, marketing, and computer science. In this paper, we propose an agent-based conceptual and computational model of consumer decision-making based on culture, personality and human needs.

  7. Personality and Education Mining based Job Advisory System

    Directory of Open Access Journals (Sweden)

    Rajendra S. Choudhary

    2014-09-01

    Full Text Available Every job demands an employee with some specific qualities in addition to the basic educational qualification. For example, an introvert person cannot be a good leader despite of a very good academic qualification. Thinking and logical ability is required for a person to be a successful software engineer. So, the aim of this paper is to present a novel approach for advising an ideal job to the job seeker while considering his personality trait and educational qualification both. Very well-known theories of personality like MBTI indicator and OCEAN theory, are used for personality mining. For education mining, score based system is used. The score based system captures the information from attributes like most scoring subject, dream job etc. After personality mining, the resultant values are coalesced with the information extracted from education mining. And finally, the most suited jobs, in terms of personality and educational qualification are recommended to the job seekers. The experiment is conducted on the students who have earned an engineering degree in the field of computer science, information technology and electronics. Nevertheless, the same architecture can easily be extended to other educational degrees also. To the best of the author’s knowledge, this is a first e-job advisory system that recommends the job best suited as per one’s personality using MBTI and OCEAN theory both.

  8. Recycling of WEEE: Characterization of spent printed circuit boards from mobile phones and computers

    International Nuclear Information System (INIS)

    Yamane, Luciana Harue; Tavares de Moraes, Viviane; Crocce Romano Espinosa, Denise; Soares Tenorio, Jorge Alberto

    2011-01-01

    Highlights: → This paper presents new and important data on characterization of wastes of electric and electronic equipments. → Copper concentration is increasing in mobile phones and remaining constant in personal computers. → Printed circuit boards from mobile phones and computers would not be mixed prior treatment. - Abstract: This paper presents a comparison between printed circuit boards from computers and mobile phones. Since printed circuits boards are becoming more complex and smaller, the amount of materials is constantly changing. The main objective of this work was to characterize spent printed circuit boards from computers and mobile phones applying mineral processing technique to separate the metal, ceramic, and polymer fractions. The processing was performed by comminution in a hammer mill, followed by particle size analysis, and by magnetic and electrostatic separation. Aqua regia leaching, loss-on-ignition and chemical analysis (inductively coupled plasma atomic emission spectroscopy - ICP-OES) were carried out to determine the composition of printed circuit boards and the metal rich fraction. The composition of the studied mobile phones printed circuit boards (PCB-MP) was 63 wt.% metals; 24 wt.% ceramics and 13 wt.% polymers; and of the printed circuit boards from studied personal computers (PCB-PC) was 45 wt.% metals; 27 wt.% polymers and ceramics 28 wt.% ceramics. The chemical analysis showed that copper concentration in printed circuit boards from personal computers was 20 wt.% and in printed circuit boards from mobile phones was 34.5 wt.%. According to the characteristics of each type of printed circuit board, the recovery of precious metals may be the main goal of the recycling process of printed circuit boards from personal computers and the recovery of copper should be the main goal of the recycling process of printed circuit boards from mobile phones. Hence, these printed circuit boards would not be mixed prior treatment. The results

  9. Computer controlled testing of batteries

    NARCIS (Netherlands)

    Kuiper, A.C.J.; Einerhand, R.E.F.; Visscher, W.

    1989-01-01

    A computerized testing device for batteries consists of a power supply, a multiplexer circuit connected to the batteries, a protection circuit, and an IBM Data Aquisition and Control Adapter card, connected to a personal computer. The software is written in Turbo-Pascal and can be easily adapted to

  10. "Beards, Sandals, and Other Signs of Rugged Individualism": Masculine Culture within the Computing Professions.

    Science.gov (United States)

    Ensmenger, Nathan

    2015-01-01

    Over the course of the 1960s and 1970s, male computer experts were able to successfully transform the "routine and mechanical" (and therefore feminized) activity of computer programming into a highly valued, well-paying, and professionally respectable discipline. They did so by constructing for themselves a distinctively masculine identity in which individual artistic genius, personal eccentricity, anti-authoritarian behavior, and a characteristic "dislike of activities involving human interaction" were mobilized as sources of personal and professional authority. This article explores the history of masculine culture and practices in computer programming, with a particular focus on the role of university computer centers as key sites of cultural formation and dissemination.

  11. Traffic information computing platform for big data

    Energy Technology Data Exchange (ETDEWEB)

    Duan, Zongtao, E-mail: ztduan@chd.edu.cn; Li, Ying, E-mail: ztduan@chd.edu.cn; Zheng, Xibin, E-mail: ztduan@chd.edu.cn; Liu, Yan, E-mail: ztduan@chd.edu.cn; Dai, Jiting, E-mail: ztduan@chd.edu.cn; Kang, Jun, E-mail: ztduan@chd.edu.cn [Chang' an University School of Information Engineering, Xi' an, China and Shaanxi Engineering and Technical Research Center for Road and Traffic Detection, Xi' an (China)

    2014-10-06

    Big data environment create data conditions for improving the quality of traffic information service. The target of this article is to construct a traffic information computing platform for big data environment. Through in-depth analysis the connotation and technology characteristics of big data and traffic information service, a distributed traffic atomic information computing platform architecture is proposed. Under the big data environment, this type of traffic atomic information computing architecture helps to guarantee the traffic safety and efficient operation, more intelligent and personalized traffic information service can be used for the traffic information users.

  12. Traffic information computing platform for big data

    International Nuclear Information System (INIS)

    Duan, Zongtao; Li, Ying; Zheng, Xibin; Liu, Yan; Dai, Jiting; Kang, Jun

    2014-01-01

    Big data environment create data conditions for improving the quality of traffic information service. The target of this article is to construct a traffic information computing platform for big data environment. Through in-depth analysis the connotation and technology characteristics of big data and traffic information service, a distributed traffic atomic information computing platform architecture is proposed. Under the big data environment, this type of traffic atomic information computing architecture helps to guarantee the traffic safety and efficient operation, more intelligent and personalized traffic information service can be used for the traffic information users

  13. Personal data disclosure and data breaches: the customer's viewpoint

    OpenAIRE

    D'Acquisto, Giuseppe; Naldi, Maurizio; Italiano, Giuseppe F.

    2012-01-01

    Every time the customer (individual or company) has to release personal information to its service provider (e.g., an online store or a cloud computing provider), it faces a trade-off between the benefits gained (enhanced or cheaper services) and the risks it incurs (identity theft and fraudulent uses). The amount of personal information released is the major decision variable in that trade-off problem, and has a proxy in the maximum loss the customer may incur. We find the conditions for a u...

  14. Computer aided instrumented Charpy test applied dynamic fracture toughness evaluation system

    International Nuclear Information System (INIS)

    Kobayashi, Toshiro; Niinomi, Mitsuo

    1986-01-01

    Micro computer aided data treatment system and personal computer aided data analysis system were applied to the traditional instrumented Charpy impact test system. The analysis of Charpy absorbed energy (E i , E p , E t ) and load (P y , P m ), and the evaluation of dynamic toughness through whole fracture process, i.e. J Id , J R curve and T mat was examined using newly developed computer aided instrumented Charpy impact test system. E i , E p , E t , P y and P m were effectively analyzed using moving average method and printed out automatically by micro computer aided data treatment system. J Id , J R curve and T mat could be measured by stop block test method. Then, J Id , J R curve and T mat were effectively estimated using compliance changing rate method and key curve method on the load-load point displacement curve of single fatigue cracked specimen by personal computer aided data analysis system. (author)

  15. X-ray film digitization using a personal computer and hand-held scanner: a simple technique for storing images

    International Nuclear Information System (INIS)

    Munoz-Nunez, C. F.; Lloret-Alcaniz, A.

    1998-01-01

    To develop a simple, low-cost technique for the digitization of X-ray films for personal use. A 66-MHz 486 PC with 8 MB of RAM, a Logitech ScanMan 256 hand-held scanner and a standard negatoscope with the power source converted to direct current. Although the system was originally designed for the digitization of mammographies, it has also been used with computed tomography, magnetic resonance, digital angiography and ultrasonographic images, as well as plain X-rays. After a minimal training period, the system digitized X-ray films easily and rapidly. Although the scanning values vary depending on the type of image to be digitized, an input spatial resolution of 200 dpi and a contrast resolution of 256 levels of gray are generally adequate. Of the storage formats tested, JPEG presented the best quality/image size ratio. A simple, low-cost technique has been developed for the digitization of X-ray films. This technique enables the storage of images in a digital format, thus facilitating their presentation and transmission. (Author) 9 refs

  16. CARS 2009. Computer assisted radiology and surgery. Proceedings

    International Nuclear Information System (INIS)

    Anon.

    2009-01-01

    The CARS 2009 proceedings include contributions and poster sessions concerning different conferences and workshops: computer assisted radiology, 23rd international congress and exhibition, CARS clinical day, 13th annual conference of the international society for computer aided surgery, 10th CARS/SPIE/EuroPACS joint workshop on surgical PACS and the digital operating, 11th international workshop on computer-aided diagnosis, 15th computed maxillofacial imaging congress, CARS - computer assisted radiology and surgery, 1st EPMA/CARS workshop on personalized medicine and ICT, JICARS - Japanese institutes of CARS, 1st EuroNotes/CTAC/CARS workshop on NOTES: an interdisciplinary challenge, 13th annual conference for computer aided surgery, 27th international EuroPACS meeting.

  17. The evolution of first person vision methods : a survey

    NARCIS (Netherlands)

    Betancourt Arango, A.; Morerio, P.; Regazzoni, C.S.; Rauterberg, G.W.M.

    2015-01-01

    The emergence of new wearable technologies, such as action cameras and smart glasses, has increased the interest of computer vision scientists in the first person perspective. Nowadays, this field is attracting attention and investments of companies aiming to develop commercial devices with first

  18. Personal Information Management (PIM: an Introduction

    Directory of Open Access Journals (Sweden)

    Rasoul Zavaraqi

    2012-10-01

    Full Text Available The aim of this paper was to present detailed texts about necessities of personal information management (PIM and has been written by literature survey. Historical investigation of this new born research area showed PIM is an extension to primary personal information management in offices and other bureaucratic centers. PIM is the result of new ICT developments and its followings as information overload and pollution, which is combination of information retrieval, database management systems (DBMS, information science, human-computer interaction, cognitive psychology, and artificial intelligence. The research area tries to address to old challenges by new mechanisms. The paper introduced the new born research area and discussed about its appearance, definitions, history, benefits, performance and researches which has been done about it.

  19. WORK SYSTEM ANALYSIS OF POWER SUPPLY IN OPTIMIZING ELECTRICITY ON PERSONAL COMPUTER (PC

    Directory of Open Access Journals (Sweden)

    Sudarmaji Sudarmaji

    2017-12-01

    Full Text Available Working Principles DC Power Supply - is an energy source for a computer to operate. The power supply changes the current from AC 110 volts to 60Hz or 220 volts 50Hz to DC + 3.3 volts, +5 volts and + 12 volts. Power Supply must carry a good and stable DC power supply so the system can run well. Tools running on the voltage supplied by the onboard voltage regulator, for example RIMM and RIMM require 2.5 volts while AGP AX and cards require 1.5 volts, both supplied by the onboard regulator of the motherboard. In addition to supplying power, the Power Supply can prevent the computer from starting until a Power Supply voltage exists at a predetermined area. Power Good is a sign of a special test that is sent to the motherboard as an active signal on the computer, usually marked by a green light when the power button is pressed. The current issued by the Power Supply is a direct current (DC, power output is composed of 200 watts, 250 watts, 300 watts, 350 watts, 400 watts to 600 watts. Computers with Intel Pentium 4 processors and above use power of 380 watts to 450 watts. Keywords: Power Supply, Computer, DC, Power Good, and volt

  20. Development and Evaluation of a Web-based Computer-Assisted Personal Interview System (CAPIS) for Open-ended Dietary Assessments among Koreans.

    Science.gov (United States)

    Shin, Sangah; Park, Eunyoung; Sun, Dong Han; You, Tae-Kyoung; Lee, Myung-Joo; Hwang, Soochan; Paik, Hee Young; Joung, Hyojee

    2014-07-01

    The accuracy of dietary assessments has emerged as a major concern in nutritional epidemiology and new dietary assessment tools using computer technology to increase accuracy have been developed in many countries. The purpose of this study was to develop a web-based computer-assisted personal interview system (CAPIS) for conducting dietary assessment and to evaluate its practical utilization among Koreans. The client software was developed using Microsoft's ClickOnce technology, which allows communication with a database system via an http server to add or retrieve data. The system consists of a tracking system for the subject and researcher, a data-input system during the interview, a calculation system for estimating food and nutrient intake, a data-output system for presenting the results, and an evaluation system for assessing the adequacy of nutrient and food intake. Databases of the nutrient composition of common food (n = 3,642), recipes for common dishes (n = 1,886), and photos of serving sizes for food and dishes (n = 4,152) were constructed, and logical processes for data collection, calculation, and output were developed. The functionality, on-site applicability, and efficiency of CAPIS were evaluated in a convenience sample of 181 participants (61 males, 120 females; aged 24 to 85) by comparing with manual 24 hour recall method with paper questionnaire. The CAPIS was functioned adequately in the field survey in terms of completeness of function, security, and compliance of researcher and subjects. Regarding on-site applicability, 23.2%, 32.6%, 35.4%, and 43.7% of subjects reported that CAPIS was easier to recall their diet, to estimate the amount consumed, to communicate with the interviewer, and to concentrate on the interview than the manual method with paper questionnaire, respectively. Although CAPIS required more interview time (9 min 42 sec) compared to the manual method (7 min 30 sec), it saved time and cost for data coding and entry (15 min 35

  1. Time diary and questionnaire assessment of factors associated with academic and personal success among university undergraduates.

    Science.gov (United States)

    George, Darren; Dixon, Sinikka; Stansal, Emory; Gelb, Shannon Lund; Pheri, Tabitha

    2008-01-01

    A sample of 231 students attending a private liberal arts university in central Alberta, Canada, completed a 5-day time diary and a 71-item questionnaire assessing the influence of personal, cognitive, and attitudinal factors on success. The authors used 3 success measures: cumulative grade point average (GPA), Personal Success--each participant's rating of congruence between stated goals and progress toward those goals--and Total Success--a measure that weighted GPA and Personal Success equally. The greatest predictors of GPA were time-management skills, intelligence, time spent studying, computer ownership, less time spent in passive leisure, and a healthy diet. Predictors of Personal Success scores were clearly defined goals, overall health, personal spirituality, and time-management skills. Predictors of Total Success scores were clearly defined goals, time-management skills, less time spent in passive leisure, healthy diet, waking up early, computer ownership, and less time spent sleeping. Results suggest alternatives to traditional predictors of academic success.

  2. Computer graphics visions and challenges: a European perspective.

    Science.gov (United States)

    Encarnação, José L

    2006-01-01

    I have briefly described important visions and challenges in computer graphics. They are a personal and therefore subjective selection. But most of these issues have to be addressed and solved--no matter if we call them visions or challenges or something else--if we want to make and further develop computer graphics into a key enabling technology for our IT-based society.

  3. Task and Interruption Management in Activity-Centric Computing

    DEFF Research Database (Denmark)

    Jeuris, Steven

    to address these not in isolation, but by fundamentally reevaluating the current computing paradigm. To this end, activity-centric computing has been brought forward as an alternative computing paradigm, addressing the increasing strain put on modern-day computing systems. Activity-centric computing follows...... the scalability and intelligibility of current research prototypes. In this dissertation, I postulate that such issues arise due to a lack of support for the full set of practices which make up activity management. Most notably, although task and interruption management are an integral part of personal...... information management, they have thus far been neglected in prior activity-centric computing systems. Advancing the research agenda of activity-centric computing, I (1) implement and evaluate an activity-centric desktop computing system, incorporating support for interruptions and long-term task management...

  4. Astronomy with a home computer

    CERN Document Server

    Monks, Neale

    2005-01-01

    Here is a one-volume guide to just about everything computer-related for amateur astronomers! Today's amateur astronomy is inextricably linked to personal computers. Computer-controlled "go-to" telescopes are inexpensive. CCD and webcam imaging make intensive use of the technology for capturing and processing images. Planetarium software provides information and an easy interface for telescopes. The Internet offers links to other astronomers, information, and software. The list goes on and on. Find out here how to choose the best planetarium program: are commercial versions really better than freeware? Learn how to optimise a go-to telescope, or connect it to a lap-top. Discover how to choose the best webcam and use it with your telescope. Create a mosaic of the Moon, or high-resolution images of the planets... Astronomy with a Home Computer is designed for every amateur astronomer who owns a home computer, whether it is running Microsoft Windows, Mac O/S or Linux. It doesn't matter what kind of telescope you...

  5. Impact of computer use on children's vision.

    Science.gov (United States)

    Kozeis, N

    2009-10-01

    Today, millions of children use computers on a daily basis. Extensive viewing of the computer screen can lead to eye discomfort, fatigue, blurred vision and headaches, dry eyes and other symptoms of eyestrain. These symptoms may be caused by poor lighting, glare, an improper work station set-up, vision problems of which the person was not previously aware, or a combination of these factors. Children can experience many of the same symptoms related to computer use as adults. However, some unique aspects of how children use computers may make them more susceptible than adults to the development of these problems. In this study, the most common eye symptoms related to computer use in childhood, the possible causes and ways to avoid them are reviewed.

  6. Computer and online health information literacy among Belgrade citizens aged 66-89 years.

    Science.gov (United States)

    Gazibara, Tatjana; Kurtagic, Ilma; Kisic-Tepavcevic, Darija; Nurkovic, Selmina; Kovacevic, Nikolina; Gazibara, Teodora; Pekmezovic, Tatjana

    2016-06-01

    Computer users over 65 years of age in Serbia are rare. The purpose of this study was to (i) describe main demographic characteristics of computer users older than 65; (ii) evaluate their online health information literacy and (iii) assess factors associated with computer use in this population. Persons above 65 years of age were recruited at the Community Health Center 'Vračar' in Belgrade from November 2012 to January 2013. Data were collected after medical checkups using a questionnaire. Of 480 persons who were invited to participate 354 (73.7%) agreed to participate, while 346 filled in the questionnaire (72.1%). A total of 70 (20.2%) older persons were computer users (23.4% males vs. 17.7% females). Of those, 23.7% explored health-related web sites. The majority of older persons who do not use computers reported that they do not have a reason to use a computer (76.5%), while every third senior (30.4%) did not own a computer. Predictors of computer use were being younger [odds ratio (OR) = 2.14, 95% confidence interval (CI) 1.30-4.04; p = 0.019], having less members of household (OR = 2.97, 95% CI 1.45-6.08; p = 0.003), being more educated (OR = 3.53, 95% CI 1.88-6.63; p = 0.001), having higher income (OR = 2.31, 95% CI 1.17-4.58; p = 0.016) as well as fewer comorbidities (OR = 0.42, 95% CI 0.23-0.79; p = 0.007). Being male was independent predictor of online health information use at the level of marginal significance (OR = 4.43, 95% CI 1.93-21.00; p = 0.061). Frequency of computer and Internet use among older adults in Belgrade is similar to other populations. Patterns of Internet use as well as non-use demonstrate particular socio-cultural characteristics. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  7. Three-dimensional measurement of temporal bone by using personal computer

    International Nuclear Information System (INIS)

    Kimura, Hiroki; Murata, Kiyotaka; Isono, Michio; Azuma, Hiroji; Itou, Akihiko

    1996-01-01

    Measurement of anatomical indices in human temporal bone has been reported only sporadically using high resolution CT. We developed a method for measuring such indices by computer assisted processing of images obtained by high resolusion CT. Intensive measurement of distances between all anatomical points in the entire temporal bone structure became possible with this method. (author)

  8. Mining Personal Data Using Smartphones and Wearable Devices: A Survey

    Science.gov (United States)

    Rehman, Muhammad Habib ur; Liew, Chee Sun; Wah, Teh Ying; Shuja, Junaid; Daghighi, Babak

    2015-01-01

    The staggering growth in smartphone and wearable device use has led to a massive scale generation of personal (user-specific) data. To explore, analyze, and extract useful information and knowledge from the deluge of personal data, one has to leverage these devices as the data-mining platforms in ubiquitous, pervasive, and big data environments. This study presents the personal ecosystem where all computational resources, communication facilities, storage and knowledge management systems are available in user proximity. An extensive review on recent literature has been conducted and a detailed taxonomy is presented. The performance evaluation metrics and their empirical evidences are sorted out in this paper. Finally, we have highlighted some future research directions and potentially emerging application areas for personal data mining using smartphones and wearable devices. PMID:25688592

  9. Mining Personal Data Using Smartphones and Wearable Devices: A Survey

    Directory of Open Access Journals (Sweden)

    Muhammad Habib ur Rehman

    2015-02-01

    Full Text Available The staggering growth in smartphone and wearable device use has led to a massive scale generation of personal (user-specific data. To explore, analyze, and extract useful information and knowledge from the deluge of personal data, one has to leverage these devices as the data-mining platforms in ubiquitous, pervasive, and big data environments. This study presents the personal ecosystem where all computational resources, communication facilities, storage and knowledge management systems are available in user proximity. An extensive review on recent literature has been conducted and a detailed taxonomy is presented. The performance evaluation metrics and their empirical evidences are sorted out in this paper. Finally, we have highlighted some future research directions and potentially emerging application areas for personal data mining using smartphones and wearable devices.

  10. Comparative study of methods for recognition of an unknown person's action from a video sequence

    Science.gov (United States)

    Hori, Takayuki; Ohya, Jun; Kurumisawa, Jun

    2009-02-01

    This paper proposes a Tensor Decomposition Based method that can recognize an unknown person's action from a video sequence, where the unknown person is not included in the database (tensor) used for the recognition. The tensor consists of persons, actions and time-series image features. For the observed unknown person's action, one of the actions stored in the tensor is assumed. Using the motion signature obtained from the assumption, the unknown person's actions are synthesized. The actions of one of the persons in the tensor are replaced by the synthesized actions. Then, the core tensor for the replaced tensor is computed. This process is repeated for the actions and persons. For each iteration, the difference between the replaced and original core tensors is computed. The assumption that gives the minimal difference is the action recognition result. For the time-series image features to be stored in the tensor and to be extracted from the observed video sequence, the human body silhouette's contour shape based feature is used. To show the validity of our proposed method, our proposed method is experimentally compared with Nearest Neighbor rule and Principal Component analysis based method. Experiments using 33 persons' seven kinds of action show that our proposed method achieves better recognition accuracies for the seven actions than the other methods.

  11. Molecular Dynamics: New Frontier in Personalized Medicine.

    Science.gov (United States)

    Sneha, P; Doss, C George Priya

    2016-01-01

    The field of drug discovery has witnessed infinite development over the last decade with the demand for discovery of novel efficient lead compounds. Although the development of novel compounds in this field has seen large failure, a breakthrough in this area might be the establishment of personalized medicine. The trend of personalized medicine has shown stupendous growth being a hot topic after the successful completion of Human Genome Project and 1000 genomes pilot project. Genomic variant such as SNPs play a vital role with respect to inter individual's disease susceptibility and drug response. Hence, identification of such genetic variants has to be performed before administration of a drug. This process requires high-end techniques to understand the complexity of the molecules which might bring an insight to understand the compounds at their molecular level. To sustenance this, field of bioinformatics plays a crucial role in revealing the molecular mechanism of the mutation and thereby designing a drug for an individual in fast and affordable manner. High-end computational methods, such as molecular dynamics (MD) simulation has proved to be a constitutive approach to detecting the minor changes associated with an SNP for better understanding of the structural and functional relationship. The parameters used in molecular dynamic simulation elucidate different properties of a macromolecule, such as protein stability and flexibility. MD along with docking analysis can reveal the synergetic effect of an SNP in protein-ligand interaction and provides a foundation for designing a particular drug molecule for an individual. This compelling application of computational power and the advent of other technologies have paved a promising way toward personalized medicine. In this in-depth review, we tried to highlight the different wings of MD toward personalized medicine. © 2016 Elsevier Inc. All rights reserved.

  12. PENGEMBANGAN SISTEM EKSPERIMEN VISKOSITAS BERBASIS PERSONAL KOMPUTER DAN MIKROKONTROLER MCS-51

    Directory of Open Access Journals (Sweden)

    Yohandri Yohandri

    2010-06-01

    Full Text Available In this work, viscosity experiment system based on personal computer and microcontroller MCS-51 has been developed. The new model of viscosity experiment system is purposed to perfom the time and viscosity calculation automatically on the personal computer. The graph and statical analysis are used to determine characteristics of LDR sensor and experiment system such as sensitivity, accuracy, and precision. There were four main results of this research as follow : 1. LDR sensor resistance decreased with increasing light intensity and sensitivity of sensor was  -11,55.(I-1,56, 2. The comparator output voltage are two condition depend on light intensity, below 400 lux the output voltage is 4.54 Volt and for above is 0.59 Volt, 3. The accuracy and precision average of system timer was high, each of it was 99.9% and 0.97, 4. Ability of system to determine the value of the liquids viscosity has been tested and obtained three results for glycerin, SAE40 Oil, and cooking oil which the value of each sequence are 1121.99 mPas, 795.08 mPas and 79.78 mPas. Based on repeated measurement in viscosity, the precision of system have been obtained which average 0.994.     Key words: viscosity, personal computer, microcontroller, sensitivity, accuracy, precesion

  13. Can people with Alzheimer's disease improve their day-to-day functioning with a tablet computer?

    Science.gov (United States)

    Imbeault, Hélène; Langlois, Francis; Bocti, Christian; Gagnon, Lise; Bier, Nathalie

    2018-07-01

    New technologies, such as tablet computers, present great potential to support the day-to-day living of persons with Alzheimer's disease (AD). However, whether people with AD can learn how to use a tablet properly in daily life remains to be demonstrated. A single case study was conducted with a 65-year-old woman with AD. A specific and structured intervention tailored to her needs was conceptualised for the use of a calendar application on a tablet computer according to the following learning stages: Acquisition, Application and Adaptation. In spite of her severe episodic memory deficit, she showed progressive learning of the tablet application during the intervention phase. Furthermore, data compiled over 12 months post-use show that she used the tablet successfully in her day-to-day life. She was even able to transfer her newly acquired ability to other available applications designed to monitor regular purchases, consult various recipes and play games. Tablet computers thereby offer a promising avenue for cognitive rehabilitation for persons with AD. This success was mainly achieved through a one-on-one individual programme tailored to this person. The limits and constraints of utilising tablet computers for persons with AD are discussed.

  14. Predicting personality traits related to consumer behavior using SNS analysis

    Science.gov (United States)

    Baik, Jongbum; Lee, Kangbok; Lee, Soowon; Kim, Yongbum; Choi, Jayoung

    2016-07-01

    Modeling a user profile is one of the important factors for devising a personalized recommendation. The traditional approach for modeling a user profile in computer science is to collect and generalize the user's buying behavior or preference history, generated from the user's interactions with recommender systems. According to consumer behavior research, however, internal factors such as personality traits influence a consumer's buying behavior. Existing studies have tried to adapt the Big 5 personality traits to personalized recommendations. However, although studies have shown that these traits can be useful to some extent for personalized recommendation, the causal relationship between the Big 5 personality traits and the buying behaviors of actual consumers has not been validated. In this paper, we propose a novel method for predicting the four personality traits-Extroversion, Public Self-consciousness, Desire for Uniqueness, and Self-esteem-that correlate with buying behaviors. The proposed method automatically constructs a user-personality-traits prediction model for each user by analyzing the user behavior on a social networking service. The experimental results from an analysis of the collected Facebook data show that the proposed method can predict user-personality traits with greater precision than methods that use the variables proposed in previous studies.

  15. Social networks a framework of computational intelligence

    CERN Document Server

    Chen, Shyi-Ming

    2014-01-01

    This volume provides the audience with an updated, in-depth and highly coherent material on the conceptually appealing and practically sound information technology of Computational Intelligence applied to the analysis, synthesis and evaluation of social networks. The volume involves studies devoted to key issues of social networks including community structure detection in networks, online social networks, knowledge growth and evaluation, and diversity of collaboration mechanisms.  The book engages a wealth of methods of Computational Intelligence along with well-known techniques of linear programming, Formal Concept Analysis, machine learning, and agent modeling.  Human-centricity is of paramount relevance and this facet manifests in many ways including personalized semantics, trust metric, and personal knowledge management; just to highlight a few of these aspects. The contributors to this volume report on various essential applications including cyber attacks detection, building enterprise social network...

  16. An affective computing algorithm based on temperament type in E-Learning

    Directory of Open Access Journals (Sweden)

    WANG Biyun

    2013-02-01

    Full Text Available This paper extracts five emotional features according to the emotions that may affect in learning,and introduces psychological theory to generate emotional susceptibility matrix and to draw personalized emotion vector by different learners' temperament type vectors,which all reflect the emotional state of the learners more realistically.This paper also recommends learners of different emotions and emotional intensity to learn the knowledge of different levels of difficulty,making learning more humane.Temperament type is a temperament doctrine evolved based on the Hippocratic humoral theory and can be a good expression of human personality foundation.Temperament type has been introduced into affective computing in the E-Learning in this paper so that computer can be better on the classification of the learner's personality and learning state and realistically be individualized.

  17. Person perception informs understanding of cognition during visual search.

    Science.gov (United States)

    Brennan, Allison A; Watson, Marcus R; Kingstone, Alan; Enns, James T

    2011-08-01

    Does person perception--the impressions we form from watching others--hold clues to the mental states of people engaged in cognitive tasks? We investigated this with a two-phase method: In Phase 1, participants searched on a computer screen (Experiment 1) or in an office (Experiment 2); in Phase 2, other participants rated the searchers' video-recorded behavior. The results showed that blind raters are sensitive to individual differences in search proficiency and search strategy, as well as to environmental factors affecting search difficulty. Also, different behaviors were linked to search success in each setting: Eye movement frequency predicted successful search on a computer screen; head movement frequency predicted search success in an office. In both settings, an active search strategy and positive emotional expressions were linked to search success. These data indicate that person perception informs cognition beyond the scope of performance measures, offering the potential for new measurements of cognition that are both rich and unobtrusive.

  18. Radiation exchange between persons and surfaces for building energy simulations

    DEFF Research Database (Denmark)

    Vorre, Mette Havgaard; Jensen, Rasmus Lund; Dreau, Jerome Le

    2015-01-01

    Thermal radiation within buildings is a significant component of thermal comfort. Typically the methods applied for calculating view factors between a person and its building surfaces requires great computational time. This research developed a view factor calculation method suitable for building...

  19. Information security risk measures for cloud-based personal health records

    CSIR Research Space (South Africa)

    Mxoli, A

    2014-11-01

    Full Text Available Personal Health Records (PHRs) provide a convenient way for individuals to better manage their health. With the advancement in technology, they can be stored via Cloud Computing. These are pay-per-use applications offered as a service over...

  20. QUEST Hanford Site Computer Users - What do they do?

    Energy Technology Data Exchange (ETDEWEB)

    WITHERSPOON, T.T.

    2000-03-02

    The Fluor Hanford Chief Information Office requested that a computer-user survey be conducted to determine the user's dependence on the computer and its importance to their ability to accomplish their work. Daily use trends and future needs of Hanford Site personal computer (PC) users was also to be defined. A primary objective was to use the data to determine how budgets should be focused toward providing those services that are truly needed by the users.