WorldWideScience

Sample records for technology computer applications

  1. Applications of computational intelligence in biomedical technology

    CERN Document Server

    Majernik, Jaroslav; Pancerz, Krzysztof; Zaitseva, Elena

    2016-01-01

    This book presents latest results and selected applications of Computational Intelligence in Biomedical Technologies. Most of contributions deal with problems of Biomedical and Medical Informatics, ranging from theoretical considerations to practical applications. Various aspects of development methods and algorithms in Biomedical and Medical Informatics as well as Algorithms for medical image processing, modeling methods are discussed. Individual contributions also cover medical decision making support, estimation of risks of treatments, reliability of medical systems, problems of practical clinical applications and many other topics  This book is intended for scientists interested in problems of Biomedical Technologies, for researchers and academic staff, for all dealing with Biomedical and Medical Informatics, as well as PhD students. Useful information is offered also to IT companies, developers of equipment and/or software for medicine and medical professionals.  .

  2. On the development trend of computer application technology

    Institute of Scientific and Technical Information of China (English)

    Zhang Zhi

    2014-01-01

    The development of computer application technology for people living and working has a very important significance. Dependent on computers are increasingly high. It put forward the development of computer application technology higher requirements. Only constant reform and renewal can meet the needs of social development. It is the only way to meet the development of the concept of sustainable development, and provide ongoing tech driving force for China's development. Based on this, the development trend of computer technology is discused.

  3. Wearable computer technology for dismounted applications

    Science.gov (United States)

    Daniels, Reginald

    2010-04-01

    Small computing devices which rival the compact size of traditional personal digital assistants (PDA) have recently established a market niche. These computing devices are small enough to be considered unobtrusive for humans to wear. The computing devices are also powerful enough to run full multi-tasking general purpose operating systems. This paper will explore the wearable computer information system for dismounted applications recently fielded for ground-based US Air Force use. The environments that the information systems are used in will be reviewed, as well as a description of the net-centric, ground-based warrior. The paper will conclude with a discussion regarding the importance of intuitive, usable, and unobtrusive operator interfaces for dismounted operators.

  4. Medical imaging technology reviews and computational applications

    CERN Document Server

    Dewi, Dyah

    2015-01-01

    This book presents the latest research findings and reviews in the field of medical imaging technology, covering ultrasound diagnostics approaches for detecting osteoarthritis, breast carcinoma and cardiovascular conditions, image guided biopsy and segmentation techniques for detecting lung cancer, image fusion, and simulating fluid flows for cardiovascular applications. It offers a useful guide for students, lecturers and professional researchers in the fields of biomedical engineering and image processing.

  5. Computed Tomography Technology: Development and Applications for Defence

    Science.gov (United States)

    Baheti, G. L.; Saxena, Nisheet; Tripathi, D. K.; Songara, K. C.; Meghwal, L. R.; Meena, V. L.

    2008-09-01

    Computed Tomography(CT) has revolutionized the field of Non-Destructive Testing and Evaluation (NDT&E). Tomography for industrial applications warrants design and development of customized solutions catering to specific visualization requirements. Present paper highlights Tomography Technology Solutions implemented at Defence Laboratory, Jodhpur (DLJ). Details on the technological developments carried out and their utilization for various Defence applications has been covered.

  6. Computer technology -- 1996: Applications and methodology. PVP-Volume 326

    Energy Technology Data Exchange (ETDEWEB)

    Hulbert, G.M. [ed.] [Univ. of Michigan, Ann Arbor, MI (United States); Hsu, K.H. [ed.] [Babcock and Wilcox, Barberton, OH (United States); Lee, T.W. [ed.] [FMC Corp., Santa Clara, CA (United States); Nicholas, T. [ed.] [USAF Wright Laboratory, Wright-Patterson AFB, OH (United States)

    1996-12-01

    The primary objective of the Computer Technology Committee of the ASME Pressure Vessels and Piping Division is to promote interest and technical exchange in the field of computer technology, related to the design and analysis of pressure vessels and piping. The topics included in this volume are: analysis of bolted joints; nonlinear analysis, applications and methodology; finite element analysis and applications; and behavior of materials. Separate abstracts were prepared for 23 of the papers in this volume.

  7. Restricted access processor - An application of computer security technology

    Science.gov (United States)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  8. Key Technologies and Applications of Secure Multiparty Computation

    Directory of Open Access Journals (Sweden)

    Xiaoqiang Guo

    2013-07-01

    Full Text Available With the advent of the information age, the network security is particularly important. The secure multiparty computation is a very important branch of cryptography. It is a hotspot in the field of information security. It expanded the scope of the traditional distributed computing and information security, provided a new computing model for the network collaborative computing. First we introduced several key technologies of secure multiparty computation: secret sharing and verifiable secret sharing, homomorphic public key cryptosystem, mix network, zero knowledge proof, oblivious transfer, millionaire protocol. Second we discussed the applications of secure multiparty computation in electronic voting, electronic auctions, threshold signature, database queries, data mining, mechanical engineering and other fields.

  9. The Application of Computer Technology in Art Design

    Directory of Open Access Journals (Sweden)

    Tao Xin

    2016-01-01

    Full Text Available After entering the twenty-first Century, computer technology has been greatly developed, applied in various fields gradually, and gained remarkable achievement. Computer technology not only is a project of great importance in China, but also cannot be ignored in the world. It has already attracted attention of numerous people, gradually integrated in daily life and closely related with it. Now how to apply it into more fields has been the main focus of our nation and also the topic we care about all the time. It is also an important project in our country to apply computer technology in art design in order to higher the art design quality. The purpose of this paper is to introduce people problems of the application of computer technology in art design, and find ways to promote cooperation and common development of them.

  10. Field-programmable custom computing technology architectures, tools, and applications

    CERN Document Server

    Luk, Wayne; Pocek, Ken

    2000-01-01

    Field-Programmable Custom Computing Technology: Architectures, Tools, and Applications brings together in one place important contributions and up-to-date research results in this fast-moving area. In seven selected chapters, the book describes the latest advances in architectures, design methods, and applications of field-programmable devices for high-performance reconfigurable systems. The contributors to this work were selected from the leading researchers and practitioners in the field. It will be valuable to anyone working or researching in the field of custom computing technology. It serves as an excellent reference, providing insight into some of the most challenging issues being examined today.

  11. Near threshold computing technology, methods and applications

    CERN Document Server

    Silvano, Cristina

    2016-01-01

    This book explores near-threshold computing (NTC), a design-space using techniques to run digital chips (processors) near the lowest possible voltage.  Readers will be enabled with specific techniques to design chips that are extremely robust; tolerating variability and resilient against errors.  Variability-aware voltage and frequency allocation schemes will be presented that will provide performance guarantees, when moving toward near-threshold manycore chips.  ·         Provides an introduction to near-threshold computing, enabling reader with a variety of tools to face the challenges of the power/utilization wall; ·         Demonstrates how to design efficient voltage regulation, so that each region of the chip can operate at the most efficient voltage and frequency point; ·         Investigates how performance guarantees can be ensured when moving towards NTC manycores through variability-aware voltage and frequency allocation schemes.  .

  12. Application and prospect of computer technology in welding materials field

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper summarizes the application status of computer technology in welding materials field from three aspects: the CAD of welding materials, the date base system for welding materials and the expert system for welding materials .Besides, this paper explores and discusses the existing problems and the developing trend in the future.

  13. Providing Assistive Technology Applications as a Service Through Cloud Computing.

    Science.gov (United States)

    Mulfari, Davide; Celesti, Antonio; Villari, Massimo; Puliafito, Antonio

    2015-01-01

    Users with disabilities interact with Personal Computers (PCs) using Assistive Technology (AT) software solutions. Such applications run on a PC that a person with a disability commonly uses. However the configuration of AT applications is not trivial at all, especially whenever the user needs to work on a PC that does not allow him/her to rely on his / her AT tools (e.g., at work, at university, in an Internet point). In this paper, we discuss how cloud computing provides a valid technological solution to enhance such a scenario.With the emergence of cloud computing, many applications are executed on top of virtual machines (VMs). Virtualization allows us to achieve a software implementation of a real computer able to execute a standard operating system and any kind of application. In this paper we propose to build personalized VMs running AT programs and settings. By using the remote desktop technology, our solution enables users to control their customized virtual desktop environment by means of an HTML5-based web interface running on any computer equipped with a browser, whenever they are.

  14. Computer technology: its potential for industrial energy conservation. A technology applications manual

    Energy Technology Data Exchange (ETDEWEB)

    None

    1979-01-01

    Today, computer technology is within the reach of practically any industrial corporation regardless of product size. This manual highlights a few of the many applications of computers in the process industry and provides the technical reader with a basic understanding of computer technology, terminology, and the interactions among the various elements of a process computer system. The manual has been organized to separate process applications and economics from computer technology. Chapter 1 introduces the present status of process computer technology and describes the four major applications - monitoring, analysis, control, and optimization. The basic components of a process computer system also are defined. Energy-saving applications in the four major categories defined in Chapter 1 are discussed in Chapter 2. The economics of process computer systems is the topic of Chapter 3, where the historical trend of process computer system costs is presented. Evaluating a process for the possible implementation of a computer system requires a basic understanding of computer technology as well as familiarity with the potential applications; Chapter 4 provides enough technical information for an evaluation. Computer and associated peripheral costs and the logical sequence of steps in the development of a microprocessor-based process control system are covered in Chapter 5.

  15. Research on application of computer technologies in jewelry process

    Directory of Open Access Journals (Sweden)

    Junbo Xia

    2017-02-01

    Full Text Available Jewelry production is a process of precious raw materials and low losses in processing. The traditional manual mode is unable to meet the needs of enterprises in reality, while the involvement of computer technology can just solve this practical problem. At present, the problem of restricting the application for computer in jewelry production is mainly a failure to find a production model that can serve the whole industry chain with the computer as the core of production. This paper designs a “synchronous and diversified” production model with “computer aided design technology” and “rapid prototyping technology” as the core, and tests with actual production cases, and achieves certain results, which are forward-looking and advanced.

  16. Neural computation and particle accelerators research, technology and applications

    CERN Document Server

    D'Arras, Horace

    2010-01-01

    This book discusses neural computation, a network or circuit of biological neurons and relatedly, particle accelerators, a scientific instrument which accelerates charged particles such as protons, electrons and deuterons. Accelerators have a very broad range of applications in many industrial fields, from high energy physics to medical isotope production. Nuclear technology is one of the fields discussed in this book. The development that has been reached by particle accelerators in energy and particle intensity has opened the possibility to a wide number of new applications in nuclear technology. This book reviews the applications in the nuclear energy field and the design features of high power neutron sources are explained. Surface treatments of niobium flat samples and superconducting radio frequency cavities by a new technique called gas cluster ion beam are also studied in detail, as well as the process of electropolishing. Furthermore, magnetic devises such as solenoids, dipoles and undulators, which ...

  17. Computer program for distance learning of pesticide application technology.

    Science.gov (United States)

    Maia, Bruno; Cunha, Joao P A R

    2011-12-01

    Distance learning presents great potential for mitigating field problems on pesticide application technology. Thus, due to the lack of teaching material about pesticide spraying technology in the Portuguese language and the increasing availability of distance learning, this study developed and evaluated a computer program for distance learning about the theory of pesticide spraying technology using the tools of information technology. The modules comprising the course, named Pulverizar, were: (1) Basic concepts, (2) Factors that affect application, (3) Equipments, (4) Spraying nozzles, (5) Sprayer calibration, (6) Aerial application, (7) Chemigation, (8) Physical-chemical properties, (9) Formulations, (10) Adjuvants, (11) Water quality, and (12) Adequate use of pesticides. The program was made available to the public on July 1(st), 2008, hosted at the web site www.pulverizar.iciag.ufu.br, and was simple, robust and practical on the complementation of traditional teaching for the education of professionals in Agricultural Sciences. Mastering pesticide spraying technology by people involved in agricultural production can be facilitated by the program Pulverizar, which was well accepted in its initial evaluation.

  18. Computer technology applications in industrial and organizational psychology.

    Science.gov (United States)

    Crespin, Timothy R; Austin, James T

    2002-08-01

    This article reviews computer applications developed and utilized by industrial-organizational (I-O) psychologists, both in practice and in research. A primary emphasis is on applications developed for Internet usage, because this "network of networks" changes the way I-O psychologists work. The review focuses on traditional and emerging topics in I-O psychology. The first topic involves information technology applications in measurement, defined broadly across levels of analysis (persons, groups, organizations) and domains (abilities, personality, attitudes). Discussion then focuses on individual learning at work, both in formal training and in coping with continual automation of work. A section on job analysis follows, illustrating the role of computers and the Internet in studying jobs. Shifting focus to the group level of analysis, we briefly review how information technology is being used to understand and support cooperative work. Finally, special emphasis is given to the emerging "third discipline" in I-O psychology research-computational modeling of behavioral events in organizations. Throughout this review, themes of innovation and dissemination underlie a continuum between research and practice. The review concludes by setting a framework for I-O psychology in a computerized and networked world.

  19. Computer-Based Technologies in Dentistry: Types and Applications

    Directory of Open Access Journals (Sweden)

    Rajaa Mahdi Musawi

    2016-10-01

    Full Text Available During dental education, dental students learn how to examine patients, make diagnosis, plan treatment and perform dental procedures perfectly and efficiently. However, progresses in computer-based technologies including virtual reality (VR simulators, augmented reality (AR and computer aided design/computer aided manufacturing (CAD/CAM systems have resulted in new modalities for instruction and practice of dentistry. Virtual reality dental simulators enable repeated, objective and assessable practice in various controlled situations. Superimposition of three-dimensional (3D virtual images on actual images in AR allows surgeons to simultaneously visualize the surgical site and superimpose informative 3D images of invisible regions on the surgical site to serve as a guide. The use of CAD/CAM systems for designing and manufacturing of dental appliances and prostheses has been well established.This article reviews computer-based technologies, their application in dentistry and their potentials and limitations in promoting dental education, training and practice. Practitioners will be able to choose from a broader spectrum of options in their field of practice by becoming familiar with new modalities of training and practice.Keywords: Virtual Reality Exposure Therapy; Immersion; Computer-Aided Design; Dentistry; Education

  20. Application Specific Performance Technology for Productive Parallel Computing

    Energy Technology Data Exchange (ETDEWEB)

    Malony, Allen D. [Univ. of Oregon, Eugene, OR (United States); Shende, Sameer [Univ. of Oregon, Eugene, OR (United States)

    2008-09-30

    Our accomplishments over the last three years of the DOE project Application- Specific Performance Technology for Productive Parallel Computing (DOE Agreement: DE-FG02-05ER25680) are described below. The project will have met all of its objectives by the time of its completion at the end of September, 2008. Two extensive yearly progress reports were produced in in March 2006 and 2007 and were previously submitted to the DOE Office of Advanced Scientific Computing Research (OASCR). Following an overview of the objectives of the project, we summarize for each of the project areas the achievements in the first two years, and then describe in some more detail the project accomplishments this past year. At the end, we discuss the relationship of the proposed renewal application to the work done on the current project.

  1. Guide to cloud computing for business and technology managers from distributed computing to cloudware applications

    CERN Document Server

    Kale, Vivek

    2014-01-01

    Guide to Cloud Computing for Business and Technology Managers: From Distributed Computing to Cloudware Applications unravels the mystery of cloud computing and explains how it can transform the operating contexts of business enterprises. It provides a clear understanding of what cloud computing really means, what it can do, and when it is practical to use. Addressing the primary management and operation concerns of cloudware, including performance, measurement, monitoring, and security, this pragmatic book:Introduces the enterprise applications integration (EAI) solutions that were a first ste

  2. Social Studies: Application Units. Course II, Teachers. Computer-Oriented Curriculum. REACT (Relevant Educational Applications of Computer Technology).

    Science.gov (United States)

    Tecnica Education Corp., San Carlos, CA.

    This book is one of a series in Course II of the Relevant Educational Applications of Computer Technology (REACT) Project. It is designed to point out to teachers two of the major applications of computers in the social sciences: simulation and data analysis. The first section contains a variety of simulation units organized under the following…

  3. Computer program for distance learning of pesticide application technology

    Directory of Open Access Journals (Sweden)

    Bruno Maia

    2011-12-01

    Full Text Available Distance learning presents great potential for mitigating field problems on pesticide application technology. Thus, due to the lack of teaching material about pesticide spraying technology in the Portuguese language and the increasing availability of distance learning, this study developed and evaluated a computer program for distance learning about the theory of pesticide spraying technology using the tools of information technology. The modules comprising the course, named Pulverizar, were: (1 Basic concepts, (2 Factors that affect application, (3 Equipments, (4 Spraying nozzles, (5 Sprayer calibration, (6 Aerial application, (7 Chemigation, (8 Physical-chemical properties, (9 Formulations, (10 Adjuvants, (11 Water quality, and (12 Adequate use of pesticides. The program was made available to the public on July 1st, 2008, hosted at the web site www.pulverizar.iciag.ufu.br, and was simple, robust and practical on the complementation of traditional teaching for the education of professionals in Agricultural Sciences. Mastering pesticide spraying technology by people involved in agricultural production can be facilitated by the program Pulverizar, which was well accepted in its initial evaluation.O ensino à distância apresenta grande potencial para minorar os problemas ocorridos no campo na área de tecnologia de aplicação de agroquímicos. Dessa forma, diante da escassez de material instrucional na área de tecnologia de aplicação de agroquímicos em Português e do crescimento elevado da educação à distância, o objetivo deste trabalho foi desenvolver e avaliar um programa computacional para o ensino à distância da parte teórica de tecnologia de aplicação de agroquímicos, utilizando as ferramentas de tecnologia da informação. Os módulos que compuseram o curso, intitulado Pulverizar, foram: (1 Conceitos básicos, (2 Fatores que afetam a aplicação, (3 Equipamentos, (4 Pontas de pulverização, (5 Calibração de pulverizadores

  4. Computer-aided Translation Technology and Its Applications

    Institute of Scientific and Technical Information of China (English)

    汪美侠; 何大顺

    2014-01-01

    This article begins with a brief analysis of the significance of translation technology in different spheres of modern life, followed by a distinction between machine translation (MT) and computer-aided translation (CAT). It then describes some trans-lation resources and tools and examines the negative and positive aspects of computer-aided translations. Finally it comes to a conclusion that it would be greatly efficient and productive for the translators to acquire the new skills in the translation work-place.

  5. Cloud Computing Technologies

    Directory of Open Access Journals (Sweden)

    Sean Carlin

    2012-06-01

    Full Text Available This paper outlines the key characteristics that cloud computing technologies possess and illustrates the cloud computing stack containing the three essential services (SaaS, PaaS and IaaS that have come to define the technology and its delivery model. The underlying virtualization technologies that make cloud computing possible are also identified and explained. The various challenges that face cloud computing technologies today are investigated and discussed. The future of cloud computing technologies along with its various applications and trends are also explored, giving a brief outlook of where and how the technology will progress into the future.

  6. The Application of Computer Music Technology to College Students

    Directory of Open Access Journals (Sweden)

    Wang Na

    2016-01-01

    Full Text Available Contemporary music education started late in China on the basis of western teaching theories formed its own unique system, which has a great influence on present computer music technology. This paper explores that contemporary music education is analyzed advantages and disadvantages of the influence on the development of Chinese class music, and the solutions are found out to the existing problems, summed up the reality enlightenment of that the contemporary music on the impact of education.

  7. Application of Computer Integration Technology for Fire Safety Analysis

    Institute of Scientific and Technical Information of China (English)

    SHI Jianyong; LI Yinqing; CHEN Huchuan

    2008-01-01

    With the development of information technology, the fire safety assessment of whole structure or region based on the computer simulation has become a hot topic. However, traditionally, the concemed studies are performed separately for different objectives and difficult to perform an overall evaluation. A new multi-dimensional integration model and methodology for fire safety assessment were presented and two newly developed integrated systems were introduced to demonstrate the function of integration simulation technology in this paper. The first one is the analysis on the fire-resistant behaviors of whole structure under real fire loads. The second one is the study on fire evaluation and emergency rescue of campus based on geography information technology (GIS). Some practical examples are presented to illuminate the advan-tages of computer integration technology on fire safety assessment and emphasize some problems in the simulation. The results show that the multi-dimensional integration model offers a new way and platform for the integrating fire safety assessment of whole structure or region, and the integrated software developed is the useful engineering tools for cost-saving and safe design.

  8. Study of application technology of ultra-high speed computer to the elucidation of complex phenomena

    Energy Technology Data Exchange (ETDEWEB)

    Sekiguchi, Tomotsugu [Electrotechnical Lab., Tsukuba, Ibaraki (Japan)

    1996-06-01

    The basic design of numerical information library in the decentralized computer network was explained at the first step of constructing the application technology of ultra-high speed computer to the elucidation of complex phenomena. Establishment of the system makes possible to construct the efficient application environment of ultra-high speed computer system to be scalable with the different computing systems. We named the system Ninf (Network Information Library for High Performance Computing). The summary of application technology of library was described as follows: the application technology of library under the distributed environment, numeric constants, retrieval of value, library of special functions, computing library, Ninf library interface, Ninf remote library and registration. By the system, user is able to use the program concentrating the analyzing technology of numerical value with high precision, reliability and speed. (S.Y.)

  9. Computing Technologies for Oriented Education: Applications in Biological Sciences

    Directory of Open Access Journals (Sweden)

    Santiago Jaime Reyes

    2005-12-01

    Full Text Available The experience developing modern digital programs with highly qualified profesoors with several years of teaching postgraduate biological sciences matters is described. A small group of selected professors with a minimum knowledged or basic domain in computer software were invited to develop digital programs in the items of their interest,the purpose is to establish the bases for construction of an available digital library. The products to develop are a series of CD-ROM with program source in HTML format. The didactic strategy responds to a personal tutorship, step by step workshop, to build its own project (without programming languages. The workshop begins generating trust in very simple activities. It is designed to learn building and to advance evaluating the progress. It is fulfilled the necessity to put up-to-date the available material that regularly uses to impart the classes (video, slides, pictures, articles, examples etc. The information and computing technologies ICT are a indispensable tool to diffuse the knowledge to a coarser and more diverse public in the topics of their speciality. The obtained products are 8 CD ROM with didactic programs designed with scientific and technological bases.

  10. A study of computer graphics technology in application of communication resource management

    Science.gov (United States)

    Li, Jing; Zhou, Liang; Yang, Fei

    2017-08-01

    With the development of computer technology, computer graphics technology has been widely used. Especially, the success of object-oriented technology and multimedia technology promotes the development of graphics technology in the computer software system. Therefore, the computer graphics theory and application technology have become an important topic in the field of computer, while the computer graphics technology becomes more and more extensive in various fields of application. In recent years, with the development of social economy, especially the rapid development of information technology, the traditional way of communication resource management cannot effectively meet the needs of resource management. In this case, the current communication resource management is still using the original management tools and management methods, resource management equipment management and maintenance, which brought a lot of problems. It is very difficult for non-professionals to understand the equipment and the situation in communication resource management. Resource utilization is relatively low, and managers cannot quickly and accurately understand the resource conditions. Aimed at the above problems, this paper proposes to introduce computer graphics technology into the communication resource management. The introduction of computer graphics not only makes communication resource management more vivid, but also reduces the cost of resource management and improves work efficiency.

  11. The application of computer-aided technologies in automotive styling design

    Science.gov (United States)

    Zheng, Ze-feng; Zhang, Ji; Zheng, Ying

    2012-04-01

    In automotive industry, outline design is its life and creative design is its soul indeed. Computer-aided technology has been widely used in the automotive industry and more and more attention has been paid. This paper chiefly introduce the application of computer-aided technologies including CAD, CAM and CAE, analyses the process of automotive structural design and describe the development tendency of computer-aided design.

  12. Computer Science and Technology: Measurement of Interative Computing: Methodology and Application.

    Science.gov (United States)

    Cotton, Ira W.

    This dissertation reports the development and application of a new methodology for the measurement and evaluation of interactive computing, applied to either the users of an interactive computing system or to the system itself, including the service computer and any communications network through which the service is delivered. The focus is on the…

  13. Research on the application in disaster reduction for using cloud computing technology

    Science.gov (United States)

    Tao, Liang; Fan, Yida; Wang, Xingling

    Cloud Computing technology has been rapidly applied in different domains recently, promotes the progress of the domain's informatization. Based on the analysis of the state of application requirement in disaster reduction and combining the characteristics of Cloud Computing technology, we present the research on the application of Cloud Computing technology in disaster reduction. First of all, we give the architecture of disaster reduction cloud, which consists of disaster reduction infrastructure as a service (IAAS), disaster reduction cloud application platform as a service (PAAS) and disaster reduction software as a service (SAAS). Secondly, we talk about the standard system of disaster reduction in five aspects. Thirdly, we indicate the security system of disaster reduction cloud. Finally, we draw a conclusion the use of cloud computing technology will help us to solve the problems for disaster reduction and promote the development of disaster reduction.

  14. APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN COMPUTER AIDED LANGUAGE LEARNING

    Directory of Open Access Journals (Sweden)

    I. B. Tampel

    2013-01-01

    Full Text Available The article deals with the various ways of application for automatic speech recognition, Text-to-Speech technology, pronunciation and communication skills training, vocabulary check of the taught person, audition skills training in computer aided language learning (CALL-system. In spite of some constraints such technologies application is effective both for education problems simplification and for comfort growth of the system application.

  15. Application of the grid computing technology in electrical energy engineering

    Energy Technology Data Exchange (ETDEWEB)

    Al-Khannak, R. [South Westphalia Univ. of Applied Sciences, Soest (Germany)

    2007-07-01

    The need for reliable, powerful, and clean power generation in power systems is becoming more importance. This need requires geographically-distributed power systems to be integrated as a single entity where among the main features of this integration are large data base and computing intensive. Hence the current power systems are not able to handle this huge datasets required for that integration, Grid Computing is a gateway to virtual storage media and processing power. This paper describes the research work on why grid computing is needed for power systems, what are the major challenges and problem to implement grid computing into power systems, and how grid computing can be utilized to fulfil the requirement for efficient power generation. (orig.)

  16. Application verification research of cloud computing technology in the field of real time aerospace experiment

    Science.gov (United States)

    Wan, Junwei; Chen, Hongyan; Zhao, Jing

    2017-08-01

    According to the requirements of real-time, reliability and safety for aerospace experiment, the single center cloud computing technology application verification platform is constructed. At the IAAS level, the feasibility of the cloud computing technology be applied to the field of aerospace experiment is tested and verified. Based on the analysis of the test results, a preliminary conclusion is obtained: Cloud computing platform can be applied to the aerospace experiment computing intensive business. For I/O intensive business, it is recommended to use the traditional physical machine.

  17. 4th International Conference on Computational Collective Intel- ligence Technologies and Applications (ICCCI 2012)

    CERN Document Server

    Trawiński, Bogdan; Katarzyniak, Radosław; Jo, Geun-Sik; Advanced Methods for Computational Collective Intelligence

    2013-01-01

    The book consists of 35 extended chapters which have been selected and invited from the submissions to the 4th International Conference on Computational Collective Intelligence Technologies and Applications (ICCCI 2012) held on November 28-30, 2012 in Ho Chi Minh City, Vietnam. The book is organized into six parts, which are semantic web and ontologies, social networks and e-learning, agent and multiagent systems, data mining methods and applications, soft computing, and optimization and control, respectively. All chapters in the book discuss theoretical and practical issues connected with computational collective intelligence and related technologies. The editors hope that the book can be useful for graduate and Ph.D. students in Computer Science, in particular participants in courses on Soft Computing, Multiagent Systems, and Data Mining. This book can be also useful for researchers working on the concept of computational collective intelligence in artificial populations. It is the hope of the editors that ...

  18. High End Computing Technologies for Earth Science Applications: Trends, Challenges, and Innovations

    Science.gov (United States)

    Parks, John (Technical Monitor); Biswas, Rupak; Yan, Jerry C.; Brooks, Walter F.; Sterling, Thomas L.

    2003-01-01

    Earth science applications of the future will stress the capabilities of even the highest performance supercomputers in the areas of raw compute power, mass storage management, and software environments. These NASA mission critical problems demand usable multi-petaflops and exabyte-scale systems to fully realize their science goals. With an exciting vision of the technologies needed, NASA has established a comprehensive program of advanced research in computer architecture, software tools, and device technology to ensure that, in partnership with US industry, it can meet these demanding requirements with reliable, cost effective, and usable ultra-scale systems. NASA will exploit, explore, and influence emerging high end computing architectures and technologies to accelerate the next generation of engineering, operations, and discovery processes for NASA Enterprises. This article captures this vision and describes the concepts, accomplishments, and the potential payoff of the key thrusts that will help meet the computational challenges in Earth science applications.

  19. Application of modern computer technology to EPRI (Electric Power Research Institute) nuclear computer programs: Final report

    Energy Technology Data Exchange (ETDEWEB)

    Feinauer, L.R.

    1989-08-01

    Many of the nuclear analysis programs in use today were designed and developed well over a decade ago. Within this time frame, tremendous changes in hardware and software technologies have made it necessary to revise and/or restructure most of the analysis programs to take advantage of these changes. As computer programs mature from the development phase to being production programs, program maintenance and portability become very important issues. The maintenance costs associated with a particular computer program can generally be expected to exceed the total development costs by as much as a factor of two. Many of the problems associated with high maintenance costs can be traced back to either poorly designed coding structure, or ''quick fix'' modifications which do not preserve the original coding structure. The lack of standardization between hardware designs presents an obstacle to the software designer in providing 100% portable coding; however, conformance to certain guidelines can ensure portability between a wide variety of machines and operating systems. This report presents guidelines for upgrading EPRI nuclear computer programs to conform to current programming standards while maintaining flexibility for accommodating future hardware and software design trends. Guidelines for development of new computer programs are also presented. 22 refs., 10 figs.

  20. Computer architecture technology trends

    CERN Document Server

    1991-01-01

    Please note this is a Short Discount publication. This year's edition of Computer Architecture Technology Trends analyses the trends which are taking place in the architecture of computing systems today. Due to the sheer number of different applications to which computers are being applied, there seems no end to the different adoptions which proliferate. There are, however, some underlying trends which appear. Decision makers should be aware of these trends when specifying architectures, particularly for future applications. This report is fully revised and updated and provides insight in

  1. Computational color technology

    CERN Document Server

    Kang, Henry R

    2006-01-01

    Henry Kang provides the fundamental color principles and mathematical tools to prepare the reader for a new era of color reproduction, and for subsequent applications in multispectral imaging, medical imaging, remote sensing, and machine vision. This book is intended to bridge the gap between color science and computational color technology, putting color adaptation, color constancy, color transforms, color display, and color rendition in the domain of vector-matrix representations and theories. Computational Color Technology deals with color digital images on the spectral level using vector-m

  2. Human-computer interaction handbook fundamentals, evolving technologies and emerging applications

    CERN Document Server

    Sears, Andrew

    2007-01-01

    This second edition of The Human-Computer Interaction Handbook provides an updated, comprehensive overview of the most important research in the field, including insights that are directly applicable throughout the process of developing effective interactive information technologies. It features cutting-edge advances to the scientific knowledge base, as well as visionary perspectives and developments that fundamentally transform the way in which researchers and practitioners view the discipline. As the seminal volume of HCI research and practice, The Human-Computer Interaction Handbook feature

  3. [Mobile phone-computer wireless interactive graphics transmission technology and its medical application].

    Science.gov (United States)

    Huang, Shuo; Liu, Jing

    2010-05-01

    Application of clinical digital medical imaging has raised many tough issues to tackle, such as data storage, management, and information sharing. Here we investigated a mobile phone based medical image management system which is capable of achieving personal medical imaging information storage, management and comprehensive health information analysis. The technologies related to the management system spanning the wireless transmission technology, the technical capabilities of phone in mobile health care and management of mobile medical database were discussed. Taking medical infrared images transmission between phone and computer as an example, the working principle of the present system was demonstrated.

  4. Understanding computer and information technology

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Yun Cheol; Han, Tack Don; Im, Sun Beom

    2009-01-15

    This book consists of four parts. The first part describes IT technology and information community understanding of computer system, constitution of software system and information system and application of software. The second part is about computer network, information and communication, application and internet service. The third part contains application and multi media, application of mobile computer, ubiquitous computing and ubiquitous environment and computer and digital life. The last part explains information security and ethics of information-oriented society, information industry and IT venture, digital contents technology and industry and the future and development of information-oriented society.

  5. CLOUD COMPUTING TECHNOLOGY TRENDS

    Directory of Open Access Journals (Sweden)

    Cristian IVANUS

    2014-05-01

    Full Text Available Cloud computing has been a tremendous innovation, through which applications became available online, accessible through an Internet connection and using any computing device (computer, smartphone or tablet. According to one of the most recent studies conducted in 2012 by Everest Group and Cloud Connect, 57% of companies said they already use SaaS application (Software as a Service, and 38% reported using standard tools PaaS (Platform as a Service. However, in the most cases, the users of these solutions highlighted the fact that one of the main obstacles in the development of this technology is the fact that, in cloud, the application is not available without an Internet connection. The new challenge of the cloud system has become now the offline, specifically accessing SaaS applications without being connected to the Internet. This topic is directly related to user productivity within companies as productivity growth is one of the key promises of cloud computing system applications transformation. The aim of this paper is the presentation of some important aspects related to the offline cloud system and regulatory trends in the European Union (EU.

  6. Human-Computer Interaction Handbook Fundamentals, Evolving Technologies, and Emerging Applications

    CERN Document Server

    Jacko, Julie A

    2012-01-01

    The third edition of a groundbreaking reference, The Human--Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications raises the bar for handbooks in this field. It is the largest, most complete compilation of HCI theories, principles, advances, case studies, and more that exist within a single volume. The book captures the current and emerging sub-disciplines within HCI related to research, development, and practice that continue to advance at an astonishing rate. It features cutting-edge advances to the scientific knowledge base as well as visionary perspe

  7. The application of data encryption technology in computer network communication security

    Science.gov (United States)

    Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.

  8. 8th International Conference on Computer Science and its Applications (CSA-16) and the 11st International Conference on Ubiquitous Information Technologies and Applications (CUTE 2016)

    CERN Document Server

    Pan, Yi; Yi, Gangman; Loia, Vincenzo

    2017-01-01

    This book presents the combined proceedings of the 8th International Conference on Computer Science and its Applications (CSA-16) and the 11st International Conference on Ubiquitous Information Technologies and Applications (CUTE 2016), both held in Bangkok, Thailand, December 19 - 21, 2016. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of ubiquitous computing technologies. These proceedings reflect the state-of-the-art in the development of computational methods, involving theory, algorithm, numerical simulation, error and uncertainty analysis and novel application of new processing techniques in engineering, science, and other disciplines related to ubiquitous computing.

  9. Computer-aided Detection of Prostate Cancer with MRI: Technology and Applications.

    Science.gov (United States)

    Liu, Lizhi; Tian, Zhiqiang; Zhang, Zhenfeng; Fei, Baowei

    2016-08-01

    One in six men will develop prostate cancer in his lifetime. Early detection and accurate diagnosis of the disease can improve cancer survival and reduce treatment costs. Recently, imaging of prostate cancer has greatly advanced since the introduction of multiparametric magnetic resonance imaging (mp-MRI). Mp-MRI consists of T2-weighted sequences combined with functional sequences including dynamic contrast-enhanced MRI, diffusion-weighted MRI, and magnetic resonance spectroscopy imaging. Because of the big data and variations in imaging sequences, detection can be affected by multiple factors such as observer variability and visibility and complexity of the lesions. To improve quantitative assessment of the disease, various computer-aided detection systems have been designed to help radiologists in their clinical practice. This review paper presents an overview of literatures on computer-aided detection of prostate cancer with mp-MRI, which include the technology and its applications. The aim of the survey is threefold: an introduction for those new to the field, an overview for those working in the field, and a reference for those searching for literature on a specific application.

  10. GPU computing and applications

    CERN Document Server

    See, Simon

    2015-01-01

    This book presents a collection of state of the art research on GPU Computing and Application. The major part of this book is selected from the work presented at the 2013 Symposium on GPU Computing and Applications held in Nanyang Technological University, Singapore (Oct 9, 2013). Three major domains of GPU application are covered in the book including (1) Engineering design and simulation; (2) Biomedical Sciences; and (3) Interactive & Digital Media. The book also addresses the fundamental issues in GPU computing with a focus on big data processing. Researchers and developers in GPU Computing and Applications will benefit from this book. Training professionals and educators can also benefit from this book to learn the possible application of GPU technology in various areas.

  11. Improved Approach for Utilization of FPGA Technology into DAQ, DSP, and Computing Applications

    Energy Technology Data Exchange (ETDEWEB)

    Isenhower, Larry Donald

    2009-01-28

    Innovation Partners proposed and successfully demonstrated in this SBIR Phase I grant a software/hardware co-design approach to reduce both the difficulty and time to implement Field Programmable Gate Array (FPGA) solutions to data acquisition and specialized computational applications. FPGAs can require excessive time for programming and require specialized knowledge that will be greatly reduced by the company's solution. Not only are FPGAs ideal for DAQ and embedded solutions, they can also be the best solution to specialized signal processing to replace Digital Signal Processors (DSPs). By allowing FPGA programming to be done in C with the equivalent of a simple compilation, algorithm changes and improvements can be implemented decreasing the life-cycle costs and allow subsitution of new FPGA designs staying above the technological details.

  12. A Different Approach to Have Science and Technology Student-Teachers Gain Varied Methods in Laboratory Applications: A Sample of Computer Assisted POE Application

    Science.gov (United States)

    Saka, Arzu

    2012-01-01

    The purpose of this study is to develop a new approach and assess the application for the science and technology student-teachers to gain varied laboratory methods in science and technology teaching. It is also aimed to describe the computer-assisted POE application in the subject of "Photosynthesis-Light" developed in the context of…

  13. [Earth Science Technology Office's Computational Technologies Project

    Science.gov (United States)

    Fischer, James (Technical Monitor); Merkey, Phillip

    2005-01-01

    This grant supported the effort to characterize the problem domain of the Earth Science Technology Office's Computational Technologies Project, to engage the Beowulf Cluster Computing Community as well as the High Performance Computing Research Community so that we can predict the applicability of said technologies to the scientific community represented by the CT project and formulate long term strategies to provide the computational resources necessary to attain the anticipated scientific objectives of the CT project. Specifically, the goal of the evaluation effort is to use the information gathered over the course of the Round-3 investigations to quantify the trends in scientific expectations, the algorithmic requirements and capabilities of high-performance computers to satisfy this anticipated need.

  14. The application of computer assisted technologies (CAT in the rehabilitation of cognitive functions in psychiatric disorders of childhood and adolescence

    Directory of Open Access Journals (Sweden)

    Tomasz Srebnicki

    2016-06-01

    Full Text Available First applications of computer-assisted technologies (CAT in the rehabilitation of cognitive deficits, including child and adolescent psychiatric disorders date back to the 80’s last century. Recent developments in computer technologies, wide access to the Internet and vast expansion of electronic devices resulted in dynamic increase in therapeutic software as well as supporting devices. The aim of computer assisted technologies is the improvement in the comfort and quality of life as well as the rehabilitation of impaired functions. The goal of the article is the presentation of most common computer-assisted technologies used in the therapy of children and adolescents with cognitive deficits as well as the literature review of their effectiveness including the challenges and limitations in regard to the implementation of such interventions.

  15. An application of interactive computer graphics technology to the design of dispersal mechanisms

    Science.gov (United States)

    Richter, B. J.; Welch, B. H.

    1977-01-01

    Interactive computer graphics technology is combined with a general purpose mechanisms computer code to study the operational behavior of three guided bomb dispersal mechanism designs. These studies illustrate the use of computer graphics techniques to discover operational anomalies, to assess the effectiveness of design improvements, to reduce the time and cost of the modeling effort, and to provide the mechanism designer with a visual understanding of the physical operation of such systems.

  16. Cloud computing technologies: perspectives and challengesof business model application in Russia

    OpenAIRE

    Mikhail A. Bashirov

    2013-01-01

    Ñloud computing is treated by most of the experts as one of the main trends of information technologies development for forthcoming years. In present article we focus on general overview of the main aspects of cloud computing services legal regime in Russia. Such aspects include, inter alia, intellectual property and contract law matters, taxation issues, execution of the agreements, warranties and representations under cloud computing agreements and personal data regulations

  17. 计算机移动技术应用探究%Research on Application of computer technology

    Institute of Scientific and Technical Information of China (English)

    李玉梅; 许桂莲

    2014-01-01

    With the rapid development of computer technology and mobile communication technology, computer is widely used in mobile technology more widely,people's study and work under the application of computer of mobile technology,great changes are happening.Based on the analysis of the situation of mobile technology development of computer,focuses on the analysis of the application of computer of mobile technology.%随着计算机技术与移动技术的飞速发展,计算机移动技术的应用范围愈加广泛,人们的学习与工作方式在计算机移动技术的应用之下,正发生着重大变革。本文在分析了计算机移动技术发展概况之下,着重分析计算机移动技术的应用。

  18. Application of Virtual Surgical Planning with Computer Assisted Design and Manufacturing Technology to Cranio-Maxillofacial Surgery

    Directory of Open Access Journals (Sweden)

    Linping Zhao

    2012-07-01

    Full Text Available Computer aided design and manufacturing (CAD/CAM technology today is the standardin manufacturing industry. The application of the CAD/CAM technology, together withthe emerging 3D medical images based virtual surgical planning (VSP technology, tocraniomaxillofacial reconstruction has been gaining increasing attention to reconstructivesurgeons. This article illustrates the components, system and clinical management of theVSP and CAD/CAM technology including: data acquisition, virtual surgical and treatmentplanning, individual implant design and fabrication, and outcome assessment. It focusesprimarily on the technical aspects of the VSP and CAD/CAM system to improve thepredictability of the planning and outcome.

  19. Application of ATM technology to the Systems Management Department Computer Laboratory Network

    OpenAIRE

    Williams, Robert

    1996-01-01

    Approved for public release; distribution is unlimited. Since the appearance of Local Area Networks (LANs), their use and bandwidth consumption have increased considerably. Users are now seeking new technologies to satisfy their bandwidth demand. Many consider ATM as the solution to their needs. Though ATM is fairly new networking technology, it has made several strides, and is now considered a viable technology that is applicable LAN environment. However, migrating from today's shared-med...

  20. 计算全息的设计制作与应用%Computer Generated Hologram's Making Technology and Application

    Institute of Scientific and Technical Information of China (English)

    杨皋

    2001-01-01

    计算全息是建立在计算机科学与光学结合的全息图制作的一种新技术。要比一般光学全息具有更独特的优点。介绍计算全息的设计制作,对开拓其应用范围有重要的参考价值。%Computer generated hologram is a New technology of generatedhologram's making .It is established in the computer science combined with options.Which has more special advantages than other ordinary genertaed holograms.An introduction is given to the computer generated hologram's making technology.It will help deepen the under standing of this technology and broaden its application.

  1. Federal Council on Science, Engineering and Technology: Committee on Computer Research and Applications, Subcommittee on Science and Engineering Computing: The US Supercomputer Industry

    Energy Technology Data Exchange (ETDEWEB)

    1987-12-01

    The Federal Coordinating Council on Science, Engineering, and Technology (FCCSET) Committee on Supercomputing was chartered by the Director of the Office of Science and Technology Policy in 1982 to examine the status of supercomputing in the United States and to recommend a role for the Federal Government in the development of this technology. In this study, the FCCSET Committee (now called the Subcommittee on Science and Engineering Computing of the FCCSET Committee on Computer Research and Applications) reports on the status of the supercomputer industry and addresses changes that have occured since issuance of the 1983 and 1985 reports. The review based upon periodic meetings with and site visits to supercomputer manufacturers and consultation with experts in high performance scientific computing. White papers have been contributed to this report by industry leaders and supercomputer experts.

  2. 网格计算技术及应用综述%A Survey on The Technology & Application of Grid Computing

    Institute of Scientific and Technical Information of China (English)

    洪学海; 许卓群; 丁文魁

    2003-01-01

    Grid computing is a new kind of distributed computing technology and computing environment,and also anattentive hot point of information technology in the world. It launches a space for new generation internal application,due to its supporting the complicated service efficiently and useable resource in the Internet. This paper sums up theresults and applications instance in the grid computing in the world during recent years ,and then analyzes emphaticallythe system architecture ,components ,working principle in the grid computing and some typical grid systems ,and thendiscusses the problems of the large scale science computing and network service in grid computing in China,and alsopoints out the future trends.

  3. Information technology and computational physics

    CERN Document Server

    Kóczy, László; Mesiar, Radko; Kacprzyk, Janusz

    2017-01-01

    A broad spectrum of modern Information Technology (IT) tools, techniques, main developments and still open challenges is presented. Emphasis is on new research directions in various fields of science and technology that are related to data analysis, data mining, knowledge discovery, information retrieval, clustering and classification, decision making and decision support, control, computational mathematics and physics, to name a few. Applications in many relevant fields are presented, notably in telecommunication, social networks, recommender systems, fault detection, robotics, image analysis and recognition, electronics, etc. The methods used by the authors range from high level formal mathematical tools and techniques, through algorithmic and computational tools, to modern metaheuristics.

  4. Research and application of Computer Music Technology%电脑音乐技术的研究与应用

    Institute of Scientific and Technical Information of China (English)

    蔡林霏

    2014-01-01

    目前,电脑音乐技术已将成为一门集音乐艺术与计算机电子科技为一体的具有强烈而鲜明时代潮流感的新兴研究课题。电脑音乐技术的产生和发展意味着音乐艺术走向了一个更高、更广层次的发展空间,其在音乐课堂教学的应用中非常便捷和新潮,不仅增强了学生的学习和创作音乐的兴趣,还有利于提升课堂的教学质量。笔者通过对电脑音乐技术的研讨,分析其在音乐课堂教学中的重要作用和实践应用,为电脑音乐技术的进一步发展提供良好的参考意见。%At present,computer music technology has become a set of music art and computer technology as one of the emerging research topics is strong and distinctive tide flu.Computer music technology to produce and development means that music art to a higher,broader space for development,its application in the music classroom teaching is very convenient and stylish,not only enhance the students learning interest and music,and to improve the classroom teaching quality.Through the research on computer music technology, analyzes its in music classroom teaching is an important role and practical application,provide a good reference for the further development of computer music technology.

  5. Advanced Computed Tomography Inspection System (ACTIS): An overview of the technology and its application

    Science.gov (United States)

    Hediger, Lisa H.

    1991-01-01

    The Advanced Computed Tomography Inspection System (ACTIS) was developed by NASA Marshall to support solid propulsion test programs. ACTIS represents a significant advance in state-of-the-art inspection systems. Its flexibility and superior technical performance have made ACTIS very popular, both within and outside the aerospace community. Through technology utilization efforts, ACTIS has been applied to inspection problems in commercial aerospace, lumber, automotive, and nuclear waste disposal industries. ACTIS has been used to inspect items of historical interest. ACTIS has consistently produced valuable results, providing information which was unattainable through conventional inspection methods. Although many successes have already been shown, the full potential of ACTIS has not yet been realized. It is currently being applied in the commercial aerospace industry by Boeing. Smaller systems, based on ACTIS technology, are becoming increasingly available. This technology has much to offer the small business and industry, especially in identifying design and process problems early in the product development cycle to prevent defects. Several options are available to businesses interested in this technology.

  6. Advanced computed tomography inspection system (ACTIS): an overview of the technology and its applications

    Science.gov (United States)

    Beshears, Ronald D.; Hediger, Lisa H.

    1994-10-01

    The Advanced Computed Tomography Inspection System (ACTIS) was developed by the Marshall Space Flight Center to support in-house solid propulsion test programs. ACTIS represents a significant advance in state-of-the-art inspection systems. Its flexibility and superior technical performance have made ACTIS very popular, both within and outside the aerospace community. Through Technology Utilization efforts, ACTIS has been applied to inspection problems in commercial aerospace, lumber, automotive, and nuclear waste disposal industries. ACTIS has even been used to inspect items of historical interest. ACTIS has consistently produced valuable results, providing information which was unattainable through conventional inspection methods. Although many successes have already been demonstrated, the full potential of ACTIS has not yet been realized. It is currently being applied in the commercial aerospace industry by Boeing Aerospace Company. Smaller systems, based on ACTIS technology are becoming increasingly available. This technology has much to offer small businesses and industry, especially in identifying design and process problems early in the product development cycle to prevent defects. Several options are available to businesses interested in pursuing this technology.

  7. Applications of Computer Science and Technology in Computer Education%计算机科学技术在计算机教育中的应用

    Institute of Scientific and Technical Information of China (English)

    胡成娟

    2011-01-01

    This paper discusses some practical teaching experience of the computer science and technology in computer education. The article introduced the application of computer as a teaching tool in teaching process, i.e. how to conduct the interactive application and how the telecommunications and networking technology play a role in multimedia teaching. At last, forecast computer application in education.%本文论述了计算机科学技术在计算机教育中进行实践教学应用过程中的一些经验.在计算机的教学过程中,分别从计算机如何作为教学工具进行应用,即在多媒体的教学工作中,如何进行交互式的应用,以及远程通信和网络技术在教育中起到了哪些作用,并就计算机在教育中的应用进行展望.

  8. Computer Science and Technology Board

    Energy Technology Data Exchange (ETDEWEB)

    Blumenthal, M.S.

    1990-01-01

    The Computer Science and Technology Board (CSTB) meets three times a year to consider scientific and policy issues in computer science as well as relevant problems in associated technologies. The objectives of the Board include: initiating studies involving computer science and technology as a critical national resource; responding to requests from the government, nonprofit foundations, and industry for advice on computer science and technology; promoting the health of the technology and other fields of pure and applied science and technology; and providing a base of expertise within the NRC in the area of computer science and technology.

  9. Application of seismic isolation technology to computer system in nuclear power stations

    Energy Technology Data Exchange (ETDEWEB)

    Gunyasu, Kenzou; Takamatsu, Naotaka; Fujimoto, Shigeru; Fukui, Hidehiro (Toshiba Corp., Kawasaki, Kanagawa (Japan))

    1994-08-01

    In the current aseismatic design, the rigid structures that withstand earthquakes by own strength have been adopted. However recently, seismically isolated structures were devised, and begin to be applied to buildings and others. It is characterized by that the basic structures as the object of seismic isolation are not changed, and by using special seismic isolators, the structures are made flexible to avoid the resonance with the eminent period of earthquakes and reduce the earthquake force acting on the structures. As the concrete example of seismic isolation, in Japan, seismically isolated floors have been introduced for the computer centers of banks. Also in nuclear power stations, the application of seismic isolation to computer systems has been considered. The function, constitution, structure and the method of increasing the aseismatic capability of computer system are explained. The function required for seismic isolation floors, the seismic isolation structure of rolling type composed of coil springs, dampers and ball bearings, its principle of action, and the vibration test on the seismic isolation floor are reported. (K.I.).

  10. Non invasive Brain-Computer Interface system: towards its application as assistive technology

    Science.gov (United States)

    Cincotti, Febo; Mattia, Donatella; Aloise, Fabio; Bufalari, Simona; Schalk, Gerwin; Oriolo, Giuseppe; Cherubini, Andrea; Marciani, Maria Grazia; Babiloni, Fabio

    2010-01-01

    The quality of life of people suffering from severe motor disabilities can benefit from the use of current assistive technology capable of ameliorating communication, house-environment management and mobility, according to the user's residual motor abilities. Brain Computer Interfaces (BCIs) are systems that can translate brain activity into signals that control external devices. Thus they can represent the only technology for severely paralyzed patients to increase or maintain their communication and control options. Here we report on a pilot study in which a system was implemented and validated to allow disabled persons to improve or recover their mobility (directly or by emulation) and communication within the surrounding environment. The system is based on a software controller that offers to the user a communication interface that is matched with the individual's residual motor abilities. Patients (n=14) with severe motor disabilities due to progressive neurodegenerative disorders were trained to use the system prototype under a rehabilitation program carried out in a house-like furnished space. All users utilized regular assistive control options (e.g., microswitches or head trackers). In addition, four subjects learned to operate the system by means of a non-invasive EEG-based BCI. This system was controlled by the subjects' voluntary modulations of EEG sensorimotor rhythms recorded on the scalp; this skill was learnt even though the subjects have not had control over their limbs for a long time. We conclude that such a prototype system, which integrates several different assistive technologies including a BCI system, can potentially facilitate the translation from pre-clinical demonstrations to a clinical useful BCI. PMID:18394526

  11. Using clinical databases in tertiary nurse education: an innovative application of computer technology.

    Science.gov (United States)

    Cheek, J; Gillham, D; Mills, P

    1998-02-01

    This paper provides an initial report of an educational innovation in nursing that promotes exchange of information and close cooperation between hospitals and a university. Data from a computerized nursing care planning system are used as the basis for the design of the acute care clinical component of the nursing curriculum. The project has been developed with the aim of minimizing the theory-practice gap and making the transition from university to hospital an easier process for students and new graduates. From the very early stages of the project, it was recognized that the introduction of new computer-based innovations or educational technology, in itself, would not necessarily improve teaching and learning. Therefore, strong emphasis was placed on how the database would be used as the basis for sound curriculum development while maintaining the clinical and practical focus required by students. Difficulties associated with the project, ranging from lengthy legal negotiations to the challenge of integrating a curriculum strongly based on critical reflection and problem-solving with a highly prescriptive hospital database are reported. The project not only provides an example of the efficient exchange and use of hospital-based data for teaching purposes but also provides the groundwork for many potential and exciting developments in national and international nursing data exchange.

  12. Building a medical multimedia database system to integrate clinical information: an application of high-performance computing and communications technology.

    Science.gov (United States)

    Lowe, H J; Buchanan, B G; Cooper, G F; Vries, J K

    1995-01-01

    The rapid growth of diagnostic-imaging technologies over the past two decades has dramatically increased the amount of nontextual data generated in clinical medicine. The architecture of traditional, text-oriented, clinical information systems has made the integration of digitized clinical images with the patient record problematic. Systems for the classification, retrieval, and integration of clinical images are in their infancy. Recent advances in high-performance computing, imaging, and networking technology now make it technologically and economically feasible to develop an integrated, multimedia, electronic patient record. As part of The National Library of Medicine's Biomedical Applications of High-Performance Computing and Communications program, we plan to develop Image Engine, a prototype microcomputer-based system for the storage, retrieval, integration, and sharing of a wide range of clinically important digital images. Images stored in the Image Engine database will be indexed and organized using the Unified Medical Language System Metathesaurus and will be dynamically linked to data in a text-based, clinical information system. We will evaluate Image Engine by initially implementing it in three clinical domains (oncology, gastroenterology, and clinical pathology) at the University of Pittsburgh Medical Center.

  13. Computer science and technologies

    Energy Technology Data Exchange (ETDEWEB)

    Kitagawa, T.

    1988-01-01

    This volume aims to provide up-to-date information on recent research and development in computer science and technology in Japan. In view of the rapid developments in these fields and the urgent demand for more detailed information about Japanese activities and achievements, it has been decided to concentrate on only a few selected topics in each volume. The topics covered will change each year so as to obtain adequate coverage of a broad range of activities over a period of a few years. This edition should not only contribute to the international understanding of technical developments in Japan, but also shed light on the cultural background to these theoretical and practical developments.

  14. MUSICAL-COMPUTER TECHNOLOGY: THE LABORATORY

    OpenAIRE

    Gorbunova Irina B.

    2012-01-01

    The article deals with musically-computer technology in the educational system on example of the Educational and Methodical Laboratory Music & Computer Technologies at the Herzen State Pedagogical University of Russia, St. Petersburg. Interdisciplinary field of professional activities relates to the creation and application of specialized music software and hardware tools and the knowledges in music and informatics. A realization of the concept of musical-computer education in preparing music...

  15. Federal Coordinating Council on Science, Engineering and Technology, Committee on Computer Research and Applications, Subcommittee on Science and Engineering Computing: Annual report, 1987

    Energy Technology Data Exchange (ETDEWEB)

    1988-03-01

    In the past year the committee initiated efforts that resulted in the report ''A Research and Development Strategy for High Performance Computing'' and will presently provide a government-wide implementation plan to address the technological opportunities possible with the achievement of significantly enhanced supercomputer capability. The committee met on a regular basis to review government supported programs in research, development and application of new supercomputer technology. The Committee annually visits supercomputer manufacturers to be briefed on their plans for future generation machines. Cray Research and ETA Systems continue to make progress toward developing more advanced supercomputers. The US supercomputer manufacturers remain dependent upon their emerging Japanese competitors for high performance IC'S although progress has been made toward achieving more adequate domestic sourcing. Reports by the Defense Science Board and the National Security Council/Economic Policy Council, which addressed semiconductor issues, were completed during the year with advice and input from the Committee. IBM has re-entered the supercomputer marketplace. The current 3090 series with expandable vector processing capability has achieved a low end position in the supercomputer performance spectrum. Subsequent development and marketing by IBM of more powerful machines would have important and far reaching impact on the domestic and world supercomputer market. Computers with massively parallel architecture--thousands of processors--are entering the market place and are beginning to become more of a factor in the computational productivity scale.

  16. Computer Viruses. Technology Update.

    Science.gov (United States)

    Ponder, Tim, Comp.; Ropog, Marty, Comp.; Keating, Joseph, Comp.

    This document provides general information on computer viruses, how to help protect a computer network from them, measures to take if a computer becomes infected. Highlights include the origins of computer viruses; virus contraction; a description of some common virus types (File Virus, Boot Sector/Partition Table Viruses, Trojan Horses, and…

  17. Application of comptuter technology in fruit science

    Institute of Scientific and Technical Information of China (English)

    Pang Xiaoming; Wan Shuyuan; Hu Chungen

    2003-01-01

    This paper summarized the application of computer technology in fruit science, including crop modelling,expert system, decision support system (DSS), computer vision (CV), the Internet, 3 "S" technology, etc. The existingproblems and prospects are also discussed in the paper.

  18. 科技馆中计算机技术的应用%Application of computer technology in science and technology museum

    Institute of Scientific and Technical Information of China (English)

    林玉霞

    2015-01-01

    Science and technology museum as an important science base, is an important place for young people of scientific knowledge training. In recent years, the construction of China's Science and Technology Museum has achieved rapid development, and computer technology to science and technology museum in the design, production, multimedia, virtual reality, and a wide range of database applications. In the future also need to constantly break the shackles of tradition, strengthen innovation and ease of use, strengthening of networks, the better to attract attention of young people.%科技馆作为重要的科普基地,是对青少年进行科学知识培养的重要场所。近年来我国科技馆的建设取得了较快的发展,而计算机技术也得以在科技馆的设计、制作、多媒体、虚拟真实及数据库中进行广泛的应用。今后还需要不断的突破传统的束缚,强化创新性和易用性,加强网络建设,更好的吸引青少年的视线。

  19. Infinite possibilities: Computational structures technology

    Science.gov (United States)

    Beam, Sherilee F.

    1994-01-01

    Computational Fluid Dynamics (or CFD) methods are very familiar to the research community. Even the general public has had some exposure to CFD images, primarily through the news media. However, very little attention has been paid to CST--Computational Structures Technology. Yet, no important design can be completed without it. During the first half of this century, researchers only dreamed of designing and building structures on a computer. Today their dreams have become practical realities as computational methods are used in all phases of design, fabrication and testing of engineering systems. Increasingly complex structures can now be built in even shorter periods of time. Over the past four decades, computer technology has been developing, and early finite element methods have grown from small in-house programs to numerous commercial software programs. When coupled with advanced computing systems, they help engineers make dramatic leaps in designing and testing concepts. The goals of CST include: predicting how a structure will behave under actual operating conditions; designing and complementing other experiments conducted on a structure; investigating microstructural damage or chaotic, unpredictable behavior; helping material developers in improving material systems; and being a useful tool in design systems optimization and sensitivity techniques. Applying CST to a structure problem requires five steps: (1) observe the specific problem; (2) develop a computational model for numerical simulation; (3) develop and assemble software and hardware for running the codes; (4) post-process and interpret the results; and (5) use the model to analyze and design the actual structure. Researchers in both industry and academia continue to make significant contributions to advance this technology with improvements in software, collaborative computing environments and supercomputing systems. As these environments and systems evolve, computational structures technology will

  20. Application Research of Computer Network Technology in Mining Railway Transport Management System

    Institute of Scientific and Technical Information of China (English)

    余静; 王振军; 才庆祥

    2002-01-01

    This paper discussed the necessity of establishing a computer network in a mining railway transport management system. The network structure and the system security design, associated with the real development condition of a mining area, were brought forward, and the system evaluation was given.

  1. Discussion on the Textbook Construction of Computer Technology Application Professional in Vocational Colleges

    Directory of Open Access Journals (Sweden)

    Ma Wei

    2015-01-01

    Full Text Available After analyzing the actual problems with the textbook construction of computer major in the vocational colleges nowadays, the author puts forward some advice on some aspects. These suggestions can satisfy students’ needs through long-term teaching process, at the same time they have certain significant reference to textbook construction in vocational colleges.

  2. Computer simulation technology in inertial confinement (ICF)

    Energy Technology Data Exchange (ETDEWEB)

    Yabe, Takashi (Gunma Univ., Kiryu (Japan). Faculty of Engineering)

    1994-12-01

    Recent development of computational technologies in inertial confinement fusion (ICF) is reviewed with a special emphasis on hydrodynamic simulations. The CIP method developed for ICF simulations is one of the typical examples that are used in various fields of physics such as variety of computational fluid dynamics, astrophysics, laser applications, geophysics, and so on. (author).

  3. Computer science research and technology volume 3

    CERN Document Server

    Bauer, Janice P

    2011-01-01

    This book presents leading-edge research from across the globe in the field of computer science research, technology and applications. Each contribution has been carefully selected for inclusion based on the significance of the research to this fast-moving and diverse field. Some topics included are: network topology; agile programming; virtualization; and reconfigurable computing.

  4. Infinite possibilities: Computational structures technology

    Science.gov (United States)

    Beam, Sherilee F.

    1994-12-01

    Computational Fluid Dynamics (or CFD) methods are very familiar to the research community. Even the general public has had some exposure to CFD images, primarily through the news media. However, very little attention has been paid to CST--Computational Structures Technology. Yet, no important design can be completed without it. During the first half of this century, researchers only dreamed of designing and building structures on a computer. Today their dreams have become practical realities as computational methods are used in all phases of design, fabrication and testing of engineering systems. Increasingly complex structures can now be built in even shorter periods of time. Over the past four decades, computer technology has been developing, and early finite element methods have grown from small in-house programs to numerous commercial software programs. When coupled with advanced computing systems, they help engineers make dramatic leaps in designing and testing concepts. The goals of CST include: predicting how a structure will behave under actual operating conditions; designing and complementing other experiments conducted on a structure; investigating microstructural damage or chaotic, unpredictable behavior; helping material developers in improving material systems; and being a useful tool in design systems optimization and sensitivity techniques. Applying CST to a structure problem requires five steps: (1) observe the specific problem; (2) develop a computational model for numerical simulation; (3) develop and assemble software and hardware for running the codes; (4) post-process and interpret the results; and (5) use the model to analyze and design the actual structure. Researchers in both industry and academia continue to make significant contributions to advance this technology with improvements in software, collaborative computing environments and supercomputing systems. As these environments and systems evolve, computational structures technology will

  5. The Application of Advancements in Computer Technology to the Control and Safety System of CANDU Reactors

    Energy Technology Data Exchange (ETDEWEB)

    Chan, P. S. W. [AECL CANDU/Sheridan Park Research Community, Ontario (Canada)

    1992-04-15

    The present spatial control algorithm in CANDU reactors is based on flux synthesis from a set of parti-coloured harmonic flux modes. The design of the Rop system is also based on parti-coloured flux shapes, including both normal and abnormal reactor operating conditions. The dependency of the control and safety systems on parti-coloured data was necessitated by the slow CPU and by the scarcity of Ram which were available to the computer systems in the early seventies. Recent advancements in high speed microprocessors and high capacity Ram chips enable the development of the Pmfp computer code, which calculates reactor power distribution on-line, using diffusion theory and in-core self-powered flux detector readings as internal boundary conditions. The Pmfp based control and safety systems do not depend on parti-coloured flux shapes or preconceived reactor operating conditions.

  6. Computer Technology in Construction Project Management

    Institute of Scientific and Technical Information of China (English)

    Zhang Zhi

    2014-01-01

    Today, the network information has become a trend al of the industries have to face. For the construction project management, we must fuly master the use of computer information technology, mining its intrinsic value, so that it can promote the construction industry to meet the requirements of the times. This paper demonstrates the main application of computer technology in construction project management in a brief analysis.

  7. Computer Technology and Nursing Education.

    Science.gov (United States)

    Southern Council on Collegiate Education for Nursing, Atlanta, GA.

    The influences of computer technology on college nursing education programs and health care delivery systems are discussed in eight papers. The use of computers is considered, with attention to clinical care, nursing education and continuing education, administration, and research. Attention is also directed to basic computer terminology, computer…

  8. Methods of resource management and applications in computing systems based on cloud technology

    Directory of Open Access Journals (Sweden)

    Карина Андріївна Мацуєва

    2015-07-01

    Full Text Available This article describes the methods of resource management and applications that are parts of an information system for science research (ISSR. The control model of requests in ISSR is given and results of working real cloud system using the additional module of load distribution programmed in Python are presented 

  9. Computers: Educational Technology Paradox?

    Science.gov (United States)

    Hashim, Hajah Rugayah Hj.; Mustapha, Wan Narita

    2005-01-01

    As we move further into the new millennium, the need to involve and adapt learners with new technology have been the main aim of many institutions of higher learning in Malaysia. The involvement of the government in huge technology-based projects like the Multimedia Super Corridor Highway (MSC) and one of its flagships, the Smart Schools have…

  10. Computer applications in bioprocessing.

    Science.gov (United States)

    Bungay, H R

    2000-01-01

    Biotechnologists have stayed at the forefront for practical applications for computing. As hardware and software for computing have evolved, the latest advances have found eager users in the area of bioprocessing. Accomplishments and their significance can be appreciated by tracing the history and the interplay between the computing tools and the problems that have been solved in bioprocessing.

  11. Application of New Information and Computer Technologies in the Teaching of Foreign Languages

    Directory of Open Access Journals (Sweden)

    Irena Miculevičienė

    2016-06-01

    Full Text Available The paper describes the up-to-date methods of teaching or learning foreign languages, which are conditioned by the integration of information technologies in the teaching process. Internet gives a perfect opportunity to enliven the lectures of foreign languages, to improve their quality and effectiveness. The main advantage of internet is its authentic material in an authentic context. The examples of such authentic material can be Web 2.0 (website of second generation, Wiki, blogs and podcasts. The second advantage of internet is that it helps the learners to cooperate together. The teachers can lead the learners more effectively, consult each learner individually. It diversifies the teaching process, encourages the activity of students, who have learning difficulties.

  12. Forecasting methods for computer technology

    Energy Technology Data Exchange (ETDEWEB)

    Worlton, W.J.

    1978-01-01

    How well the computer site manager avoids future dangers and takes advantage of future opportunities depends to a considerable degree on how much anticipatory information he has available. People who rise in management are expected with each successive promotion to concern themselves with events further in the future. It is the function of technology projection to increase this stock of information about possible future developments in order to put planning and decision making on a more rational basis. Past efforts at computer technology projections have an accuracy that declines exponentially with time. Thus, precisely defined technology projections beyond about three years should be used with considerable caution. This paper reviews both subjective and objective methods of technology projection and gives examples of each. For an integrated view of future prospects in computer technology, a framework for technology projection is proposed.

  13. Forecasting methods for computer technology

    Energy Technology Data Exchange (ETDEWEB)

    Worlton, W.J.

    1978-01-01

    How well the computer site manager avoids future dangers and takes advantage of future opportunities depends to a considerable degree on how much anticipatory information he has available. People who rise in management are expected with each successive promotion to concern themselves with events further in the future. It is the function of technology projection to increase this stock of information about possible future developments in order to put planning and decision making on a more rational basis. Past efforts at computer technology projections have an accuracy that declines exponentially with time. Thus, precisely defined technology projections beyond about three years should be used with considerable caution. This paper reviews both subjective and objective methods of technology projection and gives examples of each. For an integrated view of future prospects in computer technology, a framework for technology projection is proposed.

  14. Computer technology forecast study for general aviation

    Science.gov (United States)

    Seacord, C. L.; Vaughn, D.

    1976-01-01

    A multi-year, multi-faceted program is underway to investigate and develop potential improvements in airframes, engines, and avionics for general aviation aircraft. The objective of this study was to assemble information that will allow the government to assess the trends in computer and computer/operator interface technology that may have application to general aviation in the 1980's and beyond. The current state of the art of computer hardware is assessed, technical developments in computer hardware are predicted, and nonaviation large volume users of computer hardware are identified.

  15. Applications of membrane computing

    CERN Document Server

    Ciobanu, Gabriel; Păun, Gheorghe

    2006-01-01

    Membrane computing is a branch of natural computing which investigates computing models abstracted from the structure and functioning of living cells and from their interactions in tissues or higher-order biological structures. The models considered, called membrane systems (P systems), are parallel, distributed computing models, processing multisets of symbols in cell-like compartmental architectures. In many applications membrane systems have considerable advantages - among these are their inherently discrete nature, parallelism, transparency, scalability and nondeterminism. In dedicated cha

  16. Computational Systems for Multidisciplinary Applications

    Science.gov (United States)

    Soni, Bharat; Haupt, Tomasz; Koomullil, Roy; Luke, Edward; Thompson, David

    2002-01-01

    In this paper, we briefly describe our efforts to develop complex simulation systems. We focus first on four key infrastructure items: enterprise computational services, simulation synthesis, geometry modeling and mesh generation, and a fluid flow solver for arbitrary meshes. We conclude by presenting three diverse applications developed using these technologies.

  17. Research on Key Technologies of Cloud Computing

    Science.gov (United States)

    Zhang, Shufen; Yan, Hongcan; Chen, Xuebin

    With the development of multi-core processors, virtualization, distributed storage, broadband Internet and automatic management, a new type of computing mode named cloud computing is produced. It distributes computation task on the resource pool which consists of massive computers, so the application systems can obtain the computing power, the storage space and software service according to its demand. It can concentrate all the computing resources and manage them automatically by the software without intervene. This makes application offers not to annoy for tedious details and more absorbed in his business. It will be advantageous to innovation and reduce cost. It's the ultimate goal of cloud computing to provide calculation, services and applications as a public facility for the public, So that people can use the computer resources just like using water, electricity, gas and telephone. Currently, the understanding of cloud computing is developing and changing constantly, cloud computing still has no unanimous definition. This paper describes three main service forms of cloud computing: SAAS, PAAS, IAAS, compared the definition of cloud computing which is given by Google, Amazon, IBM and other companies, summarized the basic characteristics of cloud computing, and emphasized on the key technologies such as data storage, data management, virtualization and programming model.

  18. Computer Technology for Industry

    Science.gov (United States)

    1982-01-01

    Shell Oil Company used a COSMIC program, called VISCEL to insure the accuracy of the company's new computer code for analyzing polymers, and chemical compounds. Shell reported that there were no other programs available that could provide the necessary calculations. Shell produces chemicals for plastic products used in the manufacture of automobiles, housewares, appliances, film, textiles, electronic equipment and furniture.

  19. One Main Application Area of Computing Technology Computing Finance%计算技术的重要应用领域--计算金融

    Institute of Scientific and Technical Information of China (English)

    兰蓉; 徐弥榆; 郑守淇; 桂小林

    2003-01-01

    The progress and change in research methodology are the driving force of putting finance science forward.As a new finance research methodology, by using a lot of hardware and software necessary for high-performance com-puting, computational finance makes it possible to model and predict the evolution of some finance problems such asfinance market simulation and security pricing. This paper discusses the composition and connotation of computationalfinance, analyzes the basic characters of high-performance computing, and introduces three exploration and applica-tion in computational finance researches including: security pricing and risk calculations; integrated financial productmanagement; financial innovation and the computer-aided design of financial products.

  20. DIGITAL ERA: UTILIZE OF CLOUD COMPUTING TECHNOLOGY IN DIGITAL LIBRARY

    OpenAIRE

    T. RAGHUNADHA REDDY

    2012-01-01

    With the purpose of applying cloud computing to digital library, the paper initially describes cloud computing and analyzes current status of cloud computing in digital library. Then it proposes the architecture of cloud computing in digital library and summarises the application of cloud computing in digital library. Finally the author brings out the future improvement in digital library using cloud computing technology.

  1. Ubiquitous Computing Technologies in Education

    Science.gov (United States)

    Hwang, Gwo-Jen; Wu, Ting-Ting; Chen, Yen-Jung

    2007-01-01

    The prosperous development of wireless communication and sensor technologies has attracted the attention of researchers from both computer and education fields. Various investigations have been made for applying the new technologies to education purposes, such that more active and adaptive learning activities can be conducted in the real world.…

  2. Computational nanophotonics modeling and applications

    CERN Document Server

    Musa, Sarhan M

    2013-01-01

    This reference offers tools for engineers, scientists, biologists, and others working with the computational techniques of nanophotonics. It introduces the key concepts of computational methods in a manner that is easily digestible for newcomers to the field. The book also examines future applications of nanophotonics in the technical industry and covers new developments and interdisciplinary research in engineering, science, and medicine. It provides an overview of the key computational nanophotonics and describes the technologies with an emphasis on how they work and their key benefits.

  3. Computer Applications in the Design Process.

    Science.gov (United States)

    Winchip, Susan

    Computer Assisted Design (CAD) and Computer Assisted Manufacturing (CAM) are emerging technologies now being used in home economics and interior design applications. A microcomputer in a computer network system is capable of executing computer graphic functions such as three-dimensional modeling, as well as utilizing office automation packages to…

  4. Industrial applications of computed tomography

    DEFF Research Database (Denmark)

    De Chiffre, Leonardo; Carmignato, S.; Kruth, J. -P.

    2014-01-01

    The number of industrial applications of Computed Tomography(CT) is large and rapidly increasing. After a brief market overview, the paper gives a survey of state of the art and upcoming CT technologies, covering types of CT systems, scanning capabilities, and technological advances. The paper...... contains a survey of application examples from the manufacturing industry as well as from other industries, e.g., electrical and electronic devices, inhomogeneous materials, and from the food industry. Challenges as well as major national and international coordinated activities in the field of industrial...

  5. Application of Computer Technology in Communication Field%计算机技术在通讯领域的应用

    Institute of Scientific and Technical Information of China (English)

    刘英晖

    2015-01-01

    基于计算机技术的信息时代的到来,给予我们的生活和工作带来了巨大的影响.而计算机技术在通讯领域中的应用,就是计算机技术效能的重要体现.文章积极从这个角度出发,首先对于计算机信息通信技术的概况进行了分析,由此探究计算机技术在通讯领域中的应用,在此基础上预测未来计算机信息技术在通信领域的应用发展趋势,以供参考.%Based on the arrival of the information age, the computer technology has brought great impact on our life and work. And the application of computer technology in communication field is the important embodiment of computer technical efficiency. From this point of view, the paper analyzes the general situation of the computer information communication technology, and then the ap?plication of computer technology in the field of communication.

  6. MUSICAL-COMPUTER TECHNOLOGY: THE LABORATORY

    Directory of Open Access Journals (Sweden)

    Gorbunova Irina B.

    2012-12-01

    Full Text Available The article deals with musically-computer technology in the educational system on example of the Educational and Methodical Laboratory Music & Computer Technologies at the Herzen State Pedagogical University of Russia, St. Petersburg. Interdisciplinary field of professional activities relates to the creation and application of specialized music software and hardware tools and the knowledges in music and informatics. A realization of the concept of musical-computer education in preparing music teachers is through basic educational programs of vocational training, supplementary education, professional development of teachers and methodical support via Internet. In addition, the laboratory Music & Computer Technologies engaged in scientific activity: it is, above all, specialized researches in the field of pedagogy and international conferences.

  7. Trusted Computing Technologies, Intel Trusted Execution Technology.

    Energy Technology Data Exchange (ETDEWEB)

    Guise, Max Joseph; Wendt, Jeremy Daniel

    2011-01-01

    We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

  8. Application of task driven teaching method in computer application technology%计算机应用技术教学中任务驱动法的应用分析

    Institute of Scientific and Technical Information of China (English)

    周安辉

    2013-01-01

    计算机应用技术的学习已经成为了一种主流的形式,因此在计算机应用技术教学的过程中要实现教学的创新化发展,任务驱动教学方法是计算机应用技术教学的新方法,这种方法有助于提高学生的计算机技术的实际应用,同时能够提高学生自主学习的能力。文章就系统的研究分析计算机应用技术中对于任务驱动教学方法的应用。%The application technology of computer learning has become a mainstream form,so in the process of application of computer technology in teaching to realize the innovation of the development of teaching, task driven teaching method is a new method of computer application technology teaching,this method helps to enhance the practical application of the students of computer technology,and can improve the students' ability of autonomous learning.The system analysis of the computer application technology in the application of task driven teaching method.

  9. Application Technology Research Unit

    Data.gov (United States)

    Federal Laboratory Consortium — To conduct fundamental and developmental research on new and improved application technologies to protect floricultural, nursery, landscape, turf, horticultural, and...

  10. Multimedia database retrieval technology and applications

    CERN Document Server

    Muneesawang, Paisarn; Guan, Ling

    2014-01-01

    This book explores multimedia applications that emerged from computer vision and machine learning technologies. These state-of-the-art applications include MPEG-7, interactive multimedia retrieval, multimodal fusion, annotation, and database re-ranking. The application-oriented approach maximizes reader understanding of this complex field. Established researchers explain the latest developments in multimedia database technology and offer a glimpse of future technologies. The authors emphasize the crucial role of innovation, inspiring users to develop new applications in multimedia technologies

  11. Recent trends in computer application in industrial fields and how to apply its technology to oil drilling field. Tasangyo deno computer riyo no genjo to kussaku sagyo eno oyo no kanosei

    Energy Technology Data Exchange (ETDEWEB)

    Matsuo, Keisuke

    1989-09-01

    This report looks back on the 30 year history of computers and plant automation, and suggests the way to apply computers to the field of drilling. Recent trends are distribution of controls and contrarious integration. This integration is hierarchical integration to the upper level by integrating process instrumentation, electricity and computers. With the development of communication technologies, on-line, real time, and multi-task operations became possible. Furthermore, control technologies including the optimization by simulation were advanced, and breakdown diagnosis and operation support by artificial intelligence technologies were put to practical use. Possible application examples of these technologies to drilling works are a microcomputer which operates measurement controlling equipments according to the information on the drilling rig from mud loggers, a microcomputer which controls handling of equipments, and configuration of LAN including communication stations which can transmit inquiries into the progress of drilling or the way to handle troubles. 12 figs., 3 tabs.

  12. Ultimate computing. Biomolecular consciousness and nano Technology

    Energy Technology Data Exchange (ETDEWEB)

    Hameroff, S.R.

    1987-01-01

    The book advances the premise that the cytoskeleton is the cell's nervous system, the biological controller/computer. If indeed cytoskeletal dynamics in the nanoscale (billionth meter, billionth second) are the texture of intracellular information processing, emerging ''NanoTechnologies'' (scanning tunneling microscopy, Feynman machines, von Neumann replicators, etc.) should enable direct monitoring, decoding and interfacing between biological and technological information devices. This in turn could result in important biomedical applications and perhaps a merger of mind and machine: Ultimate Computing.

  13. 云计算安全中密码技术应用模型研究%Application Model of Cipher Technology in Cloud Computing Security

    Institute of Scientific and Technical Information of China (English)

    尹一桦; 张文科; 王斯梁

    2014-01-01

    Firstly,this paper briefly analyzes the principle of cloud computing and the new security problem brought by cloud computing. Based on this,the security structure of cloud computing is discussed,and the application approaches of cipher technology are presented. Secondly, in view of work flow of security sys-tem, an application model of cipher technology is given in combination with security architecture in cloud computing and encryption theory. Finally, the cipher application and its devlopment in cloud computing security are summarized, this could provide a practicable solution for cipher technology application in cloud computing security.%首先简要分析了云计算的工作原理及可能带来的安全隐患,在此基础上探讨了云计算环境下的安全架构,并给出了密码技术的应用途径。其次,从云计算环境下的安全系统工作流程这个维度,结合密码学理论、云计算安全架构给出了在云计算安全中密码技术的应用模型。最后,归纳出基于该模型的云计算环境中密码应用技术及其发展趋势,为密码技术应用于云计算安全中提供可用的解决思路。

  14. Applications of interval computations

    CERN Document Server

    Kreinovich, Vladik

    1996-01-01

    Primary Audience for the Book • Specialists in numerical computations who are interested in algorithms with automatic result verification. • Engineers, scientists, and practitioners who desire results with automatic verification and who would therefore benefit from the experience of suc­ cessful applications. • Students in applied mathematics and computer science who want to learn these methods. Goal Of the Book This book contains surveys of applications of interval computations, i. e. , appli­ cations of numerical methods with automatic result verification, that were pre­ sented at an international workshop on the subject in EI Paso, Texas, February 23-25, 1995. The purpose of this book is to disseminate detailed and surveyed information about existing and potential applications of this new growing field. Brief Description of the Papers At the most fundamental level, interval arithmetic operations work with sets: The result of a single arithmetic operation is the set of all possible results as the o...

  15. Computer technology and computer programming research and strategies

    CERN Document Server

    Antonakos, James L

    2011-01-01

    Covering a broad range of new topics in computer technology and programming, this volume discusses encryption techniques, SQL generation, Web 2.0 technologies, and visual sensor networks. It also examines reconfigurable computing, video streaming, animation techniques, and more. Readers will learn about an educational tool and game to help students learn computer programming. The book also explores a new medical technology paradigm centered on wireless technology and cloud computing designed to overcome the problems of increasing health technology costs.

  16. Grid computing infrastructure, service, and applications

    CERN Document Server

    Jie, Wei; Chen, Jinjun

    2009-01-01

    Offering a comprehensive discussion of advances in grid computing, this book summarizes the concepts, methods, technologies, and applications. It covers topics such as philosophy, middleware, architecture, services, and applications. It also includes technical details to demonstrate how grid computing works in the real world

  17. Cooling Technology for Electronic Computers

    Science.gov (United States)

    Nakayama, Wataru

    The rapid growth of data processing speed in computers has been sustained by the advances in cooling technology. This article first presents a review of the published data of heat loads in recent Japanese large-scale computers. The survey indicates that, since around 1980, the high-level integration of microelectronic circuits has brought about almost four fold increase in the power dissipation from logic chips. The integration also has invited the evolutions of multichip modules and new schemes of electronic interconnections. Forced convection air-cooling and liquid cooling coupled with thermal connectors are discussed with reference to the designs employed in actual computers. More advanced cooling schemes are also discussed. Finally, the importance of thermal environmental control of computer rooms is emphasized.

  18. Technology Applications Team: Applications of aerospace technology

    Science.gov (United States)

    1993-01-01

    Highlights of the Research Triangle Institute (RTI) Applications Team activities over the past quarter are presented in Section 1.0. The Team's progress in fulfilling the requirements of the contract is summarized in Section 2.0. In addition to our market-driven approach to applications project development, RTI has placed increased effort on activities to commercialize technologies developed at NASA Centers. These Technology Commercialization efforts are summarized in Section 3.0. New problem statements prepared by the Team in the reporting period are presented in Section 4.0. The Team's transfer activities for ongoing projects with the NASA Centers are presented in Section 5.0. Section 6.0 summarizes the status of four add-on tasks. Travel for the reporting period is described in Section 7.0. The RTI Team staff and consultants and their project responsibilities are listed in Appendix A. The authors gratefully acknowledge the contributions of many individuals to the RTI Technology Applications Team program. The time and effort contributed by managers, engineers, and scientists throughout NASA were essential to program success. Most important to the program has been a productive working relationship with the NASA Field Center Technology Utilization (TU) Offices. The RTI Team continues to strive for improved effectiveness as a resource to these offices. Industry managers, technical staff, medical researchers, and clinicians have been cooperative and open in their participation. The RTI Team looks forward to continuing expansion of its interaction with U.S. industry to facilitate the transfer of aerospace technology to the private sector.

  19. Data Recovery Technology Application in Computer Forensics%数据恢复技术在计算机取证方面的应用初探

    Institute of Scientific and Technical Information of China (English)

    邓建萍

    2011-01-01

    With the computer and Internet technology, a variety of computer crime cases also increases.Computer crime will not only cause property damage,but also endanger the state and public security, the dangers of crime is much greater than the traditional,so the computer forensic evidence in the increasingly important position to occupy, computer forensics data recovery is the main link,in this paper, computer forensics data recovery technology in the application for a preliminary exploration.%随着计算机和互联网技术的发展,各种计算机犯罪案件也随之增多。计算机犯罪不仅会造成财产损失,还会危及国家和公共安全,远比传统犯罪的危害性大得多,因此计算机取证在司法鉴定中占据越来越重要的位置,计算机取证的主要环节就是数据恢复,本文就数据恢复技术在计算机取证方面的应用作一个初步的探索。

  20. 计算机多媒体和音像技术的智能应用%The Intelligent Application of Computer Multimedia, Audio and Video Technology

    Institute of Scientific and Technical Information of China (English)

    赵美玉

    2014-01-01

    Since the emergence of computer technology, the content of computer technology has permeated to any field of the social application. Great changes in the development of human in computer multimedia digital era have occurred. We experienced the rapid development of digital technology, audio and video technology, and saw that it was penetrated into all aspects of the society and life with an amazing speed. The digital technology, audio and video technology has been fully penetrated into the broadcast television field, and will bring real change on our industry. To clearly grasp the development trend of digital audio technology has very important significance in promoting the digital process of film and television field. This paper describes the application of computer multimedia and video technology, video audio and video conference system and image compression technology.%自从计算机技术出现后,在社会应用的任何领域无不渗透着计算机技术的内容。计算机多媒体数字化时代对人类的发展产生了巨大的变化,我们亲身经历了数字技术和音像技术的蓬勃发展,目睹了它以惊人的速度,渗透到社会与生活的方方面面。数字化技术和音像技术已全面的进入到广播影视领域,正对我们的行业带来实质性的变革。清楚地把握数字音频技术的发展动向,对正确推进广播影视领域的数字化进程将有极其重要的意义。本文对计算机等多媒体和音像技术的应用、视频音像会议系统、图像压缩技术等进行了一个阐述。

  1. Security in Computer Applications

    CERN Document Server

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  2. Application of Brain -computer Interface Technology in Medical Field%脑-计算机接口技术在医学领域的应用

    Institute of Scientific and Technical Information of China (English)

    赵俊龙; 贾花萍

    2015-01-01

    介绍脑-计算机接口系统的结构、工作原理,重点阐述该技术在医学领域中的应用,包括癫痫自动检测及分类、康复训练、麻醉深度检测等方面,指出脑-计算机接口技术面临的挑战。%The paper introduces the structure and working principle of brain -computer interface system, elaborates the application of the technology in medical field, including automatic detection and classification of epilepsy, rehabilitation training and anesthetic depth monitoring, pointing out the challenges brain -computer interface technology faces.

  3. 探析计算机技术在电子商务中的应用%Application of computer technology in electronic commerce

    Institute of Scientific and Technical Information of China (English)

    钟宇平

    2015-01-01

    电子商务通常是利用电脑技术和网络通讯技术进行的商务活动,在网络环境下,买卖双方可以不见面地进行各种商贸活动,实现消费者的网上购物、网上支付等各种商务活动的一种商业运营模式。随着计算机技术的不断发展,计算机网络技术在商务中的应用越来越广泛,电子商务也迅速发展,因此要不断完善计算机在电子商务中的应用,提高电子商务的安全性,为电子商务的发展提供有力的技术保障。本文通过探析计算机技术在电子商务中的应用,阐述出计算机技术在电子商务中的重要性。%E-commerce is usually using computer technology and network communication technology business activities in the network environment,buyers and sellers can not meet to conduct various business activities to achieve consumer online shopping,an online payment and other business activities business model.With the development of computer technology,computer network technology more widely in commerce, e-commerce has developed rapidly,and therefore continue to improve computer applications in e-commerce to improve the security of e-commerce,e-commerce in development to provide strong technical support.Through the application of computer technology in e-commerce,described the importance of computer technology in e-commerce.

  4. DIGITAL ERA: UTILIZE OF CLOUD COMPUTING TECHNOLOGY IN DIGITAL LIBRARY

    Directory of Open Access Journals (Sweden)

    T. RAGHUNADHA REDDY

    2012-09-01

    Full Text Available With the purpose of applying cloud computing to digital library, the paper initially describes cloud computing and analyzes current status of cloud computing in digital library. Then it proposes the architecture of cloud computing in digital library and summarises the application of cloud computing in digital library. Finally the author brings out the future improvement in digital library using cloud computing technology.

  5. Monte Carlo simulations of molecular gas flow: some applications in accelerator vacuum technology using a versatile personal computer program

    Energy Technology Data Exchange (ETDEWEB)

    Pace, A.; Poncet, A. (European Organization for Nuclear Research, Geneva (Switzerland))

    1990-01-01

    The Monte Carlo technique has been used extensively in the past to solve the problem of molecular flow through vacuum pipes or structures with specific boundary conditions for which analytical or even approximate solutions do not exist. Starting from a specific program written in 1975, the idea germinated over the years to produce handy, rather general, problem solving applications capable of running efficiently on modern microcomputers, mainly for ease of transportability and interactivity. Here, the latest version is described. The capabilities and limitations of these tools are presented through a few practical cases of conductance and pumping speed calculations pertinent to accelerator vacuum technology. (author).

  6. Advances in Computing and Information Technology : Proceedings of the Second International Conference on Advances in Computing and Information Technology

    CERN Document Server

    Nagamalai, Dhinaharan; Chaki, Nabendu

    2013-01-01

    The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, ...

  7. 3rd International Conference on Computer & Communication Technologies

    CERN Document Server

    Bhateja, Vikrant; Raju, K; Janakiramaiah, B

    2017-01-01

    The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource.

  8. Application of Technology Computer Data Recovery%计算机数据恢复技术应用探究

    Institute of Scientific and Technical Information of China (English)

    李军

    2014-01-01

    随着计算机的飞速发展,计算机数据存储给人们的工作和生活带来了很多的便利,但与此同时数据损坏也带来了极大的不利影响,本文从数据存储结构原理出发,对计算机数据损坏及恢复技术进行了详细的分析,并研究了EasyRecovery数据恢复软件的具体应用。%With the rapid development of computers,computer data storage to people's work and life has brought a lot of convenience,but at the same time it also brings a great deal of data corruption adverse effects,the paper starting from the principle of data storage structure for computer data damage and recovery techniques carried out a detailed analysis and study EasyRecovery data Recovery software for specific applications.

  9. THE IMPACT OF THE DEVELOPMENT OF THE QUANTUM COMPUTER ON A NEW INFORMATION TECHNOLOGY PRACTICAL APPLICATIONS FOR STUDENTS

    Directory of Open Access Journals (Sweden)

    STEGĂROIU CARINA-ELENA

    2015-07-01

    Full Text Available Theory and practice blend together to form a product which seems to be the next step in information technology, meaning the quantum computer, first considered a paradox, but later, through using the properties of the quantum world, managed to improve the first transmission systems of simple information units. In this context, the dialogue between universities and the society is a problem that relates to the managerial vision and strategy and which must be taken into consideration by the organizational management. The learning and teaching process is not just a simple theoretical experience, an exercise in abstract knowledge, but also an important step in education, which leads to developing work related abilities for students fresh out of university. The relationship between university and society is a complex and subtle exchange of feedback. The development of the relationship between the higher education and the economic environment, the integration of the students on the labour market is a European priority.

  10. Application of modern computer-aided technologies in the production of individual bone graft: A case report

    Directory of Open Access Journals (Sweden)

    Mirković Siniša

    2015-01-01

    Full Text Available Introduction. An autologous bone (bone derived from the patient himself is considered to be a “golden standard” in the treatment of bone defects and partial atrophic alveolar ridge. However, large defects and bone losses are difficult to restore in this manner, because extraction of large amounts of autologous tissue can cause donor-site problems. Alternatively, data from computed tomographic (CT scan can be used to shape a precise 3D homologous bone block using a computer-aided design-computer-aided manufacturing (CAD-CAM system. Case report. A 63-year old male patient referred to the Clinic of Dentistry of Vojvodina in Novi Sad, because of teeth loss in the right lateral region of the lower jaw. Clinical examination revealed a pronounced resorption of the residual ridge of the lower jaw in the aforementioned region, both horizontal and vertical. After clinical examination, the patient was referred for 3D cone beam (CBCT scan that enables visualization of bony structures and accurate measurement of dimensions of the residual alveolar ridge. Considering the large extent of bone resorption, the required ridge augmentation was more than 3 mm in height and 2 mm in width along the length of some 2 cm, thus the use of granular material was excluded. After consulting prosthodontists and engineers from the Faculty of Technical Sciences in Novi Sad we decided to fabricate an individual (custom bovine-derived bone graft designed according to the obtained 3D CBCT scan. Conclusion. Application of 3D CBCT images, computer-aided systems and software in manufacturing custom bone grafts represents the most recent method of guided bone regeneration. This method substantially reduces time of recovery and carries minimum risk of postoperative complications, yet the results fully satisfy the requirements of both the patient and the therapist.

  11. Application of modern computer-aided technologies in the production of individual bone graft: A case report.

    Science.gov (United States)

    Mirković, Sinisa; Budak, Igor; Puskar, Tatjana; Tadić, Ana; Sokac, Mario; Santosi, Zeljko; Djurdjević-Mirković, Tatjana

    2015-12-01

    An autologous bone (bone derived from the patient himself) is considered to be a "golden standard" in the treatment of bone defects and partial atrophic alveolar ridge. However, large defects and bone losses are difficult to restore in this manner, because extraction of large amounts of autologous tissue can cause donor-site problems. Alternatively, data from computed tomographic (CT) scan can be used to shape a precise 3D homologous bone block using a computer-aided design-computer-aided manufacturing (CAD-CAM) system. A 63-year old male patient referred to the Clinic of Dentistry of Vojvodina in Novi Sad, because of teeth loss in the right lateral region of the lower jaw. Clinical examination revealed a pronounced resorption of the residual ridge of the lower jaw in the aforementioned region, both horizontal and vertical. After clinical examination, the patient was referred for 3D cone beam (CB)CT scan that enables visualization of bony structures and accurate measurement of dimensions of the residual alveolar ridge. Considering the large extent of bone resorption, the required ridge augmentation was more than 3 mm in height and 2 mm in width along the length of some 2 cm, thus the use of granular material was excluded. After consulting prosthodontists and engineers from the Faculty of Technical Sciences in Novi Sad we decided to fabricate an individual (custom) bovine-derived bone graft designed according to the obtained-3D CBCT scan. Application of 3D CBCT images, computer-aided systems and software in manufacturing custom bone grafts represents the most recent method of guided bone regeneration. This method substantially reduces time of recovery and carries minimum risk of postoperative complications, yet the results fully satisfy the requirements of both the patient and the therapist.

  12. Computer Application in Daqing Oilfield

    Institute of Scientific and Technical Information of China (English)

    Li Manfu

    1994-01-01

    @@ Daqing is the first oilfield of CNPC, where computer was the earlist application in China's oil industry. From 1961 to present, it underwent four generations in evolution and application of computer there.

  13. Military engine computational structures technology

    Science.gov (United States)

    Thomson, Daniel E.

    1992-01-01

    Integrated High Performance Turbine Engine Technology Initiative (IHPTET) goals require a strong analytical base. Effective analysis of composite materials is critical to life analysis and structural optimization. Accurate life prediction for all material systems is critical. User friendly systems are also desirable. Post processing of results is very important. The IHPTET goal is to double turbine engine propulsion capability by the year 2003. Fifty percent of the goal will come from advanced materials and structures, the other 50 percent will come from increasing performance. Computer programs are listed.

  14. Reviews of computing technology: Object-oriented technology

    Energy Technology Data Exchange (ETDEWEB)

    Skeen, D.C.

    1993-03-01

    A useful metaphor in introducing object-oriented concepts is the idea of a computer hardware manufacturer assembling products from an existing stock of electronic parts. In this analogy, think of the parts as pieces of computer software and of the finished products as computer applications. Like its counterpart, the object is capable of performing its specific function in a wide variety of different applications. The advantages to assembling hardware using a set of prebuilt parts are obvious. The design process is greatly simplified in this scenario, since the designer needs only to carry the design down to the chip level, rather than to the transistor level. As a result, the designer is free to develop a more reliable and feature rich product. Also, since the component parts are reused in several different products, the parts can be made more robust and subjected to more rigorous testing than would be economically feasible for a part used in only one piece of equipment. Additionally, maintenance on the resulting systems is simplified because of the part-level consistency from one type of equipment to another. The remainder of this document introduces the techniques used to develop objects, the benefits of the technology, outstanding issues that remain with the technology, industry direction for the technology, and the impact that object-oriented technology is likely to have on the organization. While going through this material, the reader will find it useful to remember the parts analogy and to keep in mind that the overall purpose of object-oriented technology is to create software parts and to construct applications using those parts.

  15. Advanced technologies, systems, and applications

    CERN Document Server

    Avdaković, Samir

    2017-01-01

    This volume spans a wide range of technical disciplines and technologies, including complex systems, biomedical engineering, electrical engineering, energy, telecommunications, mechanical engineering, civil engineering, and computer science. The papers included in this volume were presented at the International Symposium on Innovative and Interdisciplinary Applications of Advanced Technologies (IAT), held in Neum, Bosnia and Herzegovina on June 26 and 27, 2016. This highly interdisciplinary volume is devoted to various aspects and types of systems. Systems thinking is crucial for successfully building and understanding man-made, natural, and social systems. .

  16. Safeguards technology and computer security training

    Energy Technology Data Exchange (ETDEWEB)

    Hunteman, W.J.; Zack, N.R.

    1992-01-01

    The Los Alamos National Laboratory Safeguards Systems Group provides a variety of training services to the federal government and its contractors. The US Department of Energy sponsors a Safeguards Technology Training Program at Los Alamos in which seminars are offered concerning materials accounting for nuclear safeguards, measurement control for materials accounting, and variance propagation and systems analysis. These seminars provide guidance and techniques for accounting for nuclear material, developing and quantifying quality nuclear material measurements, and assessing overall accounting system performance. The Safeguards Systems Group also provides training in computer and data security applications; i.e., a workshop and the Los Alamos Vulnerability/Risk Assessment System (LAVA), computer system security officer training, and nuclear material safeguards for managers training, which are available on request. This paper describes the purpose, content, and expected benefits of the training activities that can be applied at nuclear materials facilities or where there are computer and/or data security concerns.

  17. Safeguards technology and computer security training

    Energy Technology Data Exchange (ETDEWEB)

    Hunteman, W.J.; Zack, N.R.

    1992-09-01

    The Los Alamos National Laboratory Safeguards Systems Group provides a variety of training services to the federal government and its contractors. The US Department of Energy sponsors a Safeguards Technology Training Program at Los Alamos in which seminars are offered concerning materials accounting for nuclear safeguards, measurement control for materials accounting, and variance propagation and systems analysis. These seminars provide guidance and techniques for accounting for nuclear material, developing and quantifying quality nuclear material measurements, and assessing overall accounting system performance. The Safeguards Systems Group also provides training in computer and data security applications; i.e., a workshop and the Los Alamos Vulnerability/Risk Assessment System (LAVA), computer system security officer training, and nuclear material safeguards for managers training, which are available on request. This paper describes the purpose, content, and expected benefits of the training activities that can be applied at nuclear materials facilities or where there are computer and/or data security concerns.

  18. 统一计算设备架构技术的应用研究进展%Advances in Application of Compute Unified Device Architecture Technology

    Institute of Scientific and Technical Information of China (English)

    许建平

    2011-01-01

    Compute Unified Device Architecture(CUDA) is the recently released brand new parallel computing frame- work for Graphics Processing Units(GPU) by NVIDIA. By virtue of its C-compatibility and the powerful parallel computing ability of GPU, CUDA has achieved superior acceleration performance in various areas such as image processing, high per- formance computing. Based on summarizing the application of CUDA, this paper especially introduces the acceleration principles with the aid of CUDA technology. MeanwhiIe, the development of CUDA is also discussed.%统一计算设备架构(ComputeUnifiedDeviceArchitecture,CUDA)是NVIDIA公司近年来推出的针对图像处理单元(GraphicsProcessingUnit,GPU)的全新并行计算框架。借助其C语言兼容特性以及GPU的强大并行计算能力,CUDA技术在图像处理、科学计算等领域取得了良好的加速效果。文章在对CUDA技术的应用情况进行回顾和总结的基础上,重点介绍了不同应用中采用CUDA技术进行计算加速的原理,并探讨了CUDA技术今后的发展方向。

  19. Computer-Assisted Technology for the Twice Exceptional

    Science.gov (United States)

    Rizza, Mary

    2006-01-01

    Technology helps students develop coping strategies to deal with various learning differences. Assistive technology is a common intervention provided to students with disabilities and generally varies depending on student need. Within gifted education, the use of computers and technology is concentrated on curricular applications and activities…

  20. 模拟KVM技术在计算机集群管理中的应用%Application of Analog KVM Technology in Management of Computer Cluster

    Institute of Scientific and Technical Information of China (English)

    耿士华; 吴之光; 梁记斌

    2014-01-01

    KVM is an abbreviation of the keyboard, video and mouse. The key idea of KVM technology is that by more efficient management of computer cluster with less keyboard, monitor and mouse, the efficiency of worker improves and the cost of management reduces. The research of the paper is discussed from the superiority of analog KVM technology, the key technology and its application in the computer cluster management.%KVM是键盘(Keyboard)、视频(Video)和鼠标(Mouse)的缩写,KVM技术核心思想是通过少量的键盘、鼠标和显示器配置,实现多主机计算集群系统的高可管理性,提高管理人员工作效率,降低管理成本。本文主要从模拟KVM技术的优越性、关键技术、在计算机集群管理中的应用等方面进行论述。

  1. Color in Computer Vision Fundamentals and Applications

    CERN Document Server

    Gevers, Theo; van de Weijer, Joost; Geusebroek, Jan-Mark

    2012-01-01

    While the field of computer vision drives many of today’s digital technologies and communication networks, the topic of color has emerged only recently in most computer vision applications. One of the most extensive works to date on color in computer vision, this book provides a complete set of tools for working with color in the field of image understanding. Based on the authors’ intense collaboration for more than a decade and drawing on the latest thinking in the field of computer science, the book integrates topics from color science and computer vision, clearly linking theor

  2. Computer vision technology in log volume inspection

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Log volume inspection is very important in forestry research and paper making engineering. This paper proposed a novel approach based on computer vision technology to cope with log volume inspection. The needed hardware system was analyzed and the details of the inspection algorithms were given. A fuzzy entropy based on image enhancement algorithm was presented for enhancing the image of the cross-section of log. In many practical applications the cross-section is often partially invisible, and this is the major obstacle for correct inspection. To solve this problem, a robust Hausdorff distance method was proposed to recover the whole cross-section. Experiment results showed that this method was efficient.

  3. Practical applications of interactive voice technologies: Some accomplishments and prospects

    Science.gov (United States)

    Grady, Michael W.; Hicklin, M. B.; Porter, J. E.

    1977-01-01

    A technology assessment of the application of computers and electronics to complex systems is presented. Three existing systems which utilize voice technology (speech recognition and speech generation) are described. Future directions in voice technology are also described.

  4. Reversible computing fundamentals, quantum computing, and applications

    CERN Document Server

    De Vos, Alexis

    2010-01-01

    Written by one of the few top internationally recognized experts in the field, this book concentrates on those topics that will remain fundamental, such as low power computing, reversible programming languages, and applications in thermodynamics. It describes reversible computing from various points of view: Boolean algebra, group theory, logic circuits, low-power electronics, communication, software, quantum computing. It is this multidisciplinary approach that makes it unique.Backed by numerous examples, this is useful for all levels of the scientific and academic community, from undergr

  5. Applications of Computer Algebra Conference

    CERN Document Server

    Martínez-Moro, Edgar

    2017-01-01

    The Applications of Computer Algebra (ACA) conference covers a wide range of topics from Coding Theory to Differential Algebra to Quantam Computing, focusing on the interactions of these and other areas with the discipline of Computer Algebra. This volume provides the latest developments in the field as well as its applications in various domains, including communications, modelling, and theoretical physics. The book will appeal to researchers and professors of computer algebra, applied mathematics, and computer science, as well as to engineers and computer scientists engaged in research and development.

  6. Use of computer technology by the elderly

    OpenAIRE

    Akkan, Sultan

    1993-01-01

    The information technology that is available now has been developed for other populations, such as the general public, the business community, health care organizations, or the handicapped. However, much of it can be adapted to fit the needs, desires and capabilities of the elderly and computer technology can be much "friendlier" for the elderly in both a technological and a social sense. This study examines the elderly-computer technology interface. State-of -the-art co...

  7. Applications of computer algebra

    CERN Document Server

    1985-01-01

    Today, certain computer software systems exist which surpass the computational ability of researchers when their mathematical techniques are applied to many areas of science and engineering. These computer systems can perform a large portion of the calculations seen in mathematical analysis. Despite this massive power, thousands of people use these systems as a routine resource for everyday calculations. These software programs are commonly called "Computer Algebra" systems. They have names such as MACSYMA, MAPLE, muMATH, REDUCE and SMP. They are receiving credit as a computational aid with in­ creasing regularity in articles in the scientific and engineering literature. When most people think about computers and scientific research these days, they imagine a machine grinding away, processing numbers arithmetically. It is not generally realized that, for a number of years, computers have been performing non-numeric computations. This means, for example, that one inputs an equa­ tion and obtains a closed for...

  8. From HEP Computing to Bio—Medical Research and Vice Versa:Technology Transfer and Application Results

    Institute of Scientific and Technical Information of China (English)

    S.Chauvie; G.Cosmo; 等

    2001-01-01

    We present a series of achievements associated to the transfer of simulation technologies to the bio-medical environment.We show also how the novel collaborative organization built around Geant4 has changed the traditional concept of technology transfer between the HEP domain and the bio-medical environment,configuring a two-way interaction.

  9. Application of Computer Information Technology in the Enterprise Management%计算机信息化在企业管理中的应用

    Institute of Scientific and Technical Information of China (English)

    倪龙成

    2014-01-01

    The development of the world economy globalization brings a great challenge to the global enterprise, for China enter-prises, is facing the double pressure from external and internal reform. The competition between enterprises including product competition, price competition, product competition, service competition, market competition and credit competition etc.. With the continuous economic development, the computer network technology and computer database technology, enterprise infor-mationization has become a brand to achieve sustainable development and improve the market competitiveness of the important safeguards, how to use advanced means to enhance their comprehensive strength, computer technology, network technology and communication technology into the enterprise management, so that enterprises in the survival of the fittest competition to occupy a position, more and more attention. This paper first introduces the concept of enterprise informatization, then introduces the ne-cessity in the enterprise management of computer information, finally introduces the application of computer information tech-nology in the enterprise management, computer information system management enterprise cooperation, improve the office effi-ciency of enterprises, economic efficiency and market competitiveness.%世界经济全球化的发展给全球企业带来了巨大的挑战,对于中国的企业来说,则面临着来自外部和内部改革的双重压力。企业间的竞争包括产品竞争、价格竞争、品种竞争、服务竞争、市场竞争和信誉竞争等等。随着经济不断发展,计算机网络技术及计算机数据库等技术不断进步,企业信息化已成为品牌实现可持续化发展和提高市场竞争力的重要保障,如何利用先进的手段提升自身综合实力,将计算机技术、网络技术和通信技术应用到企业管理中,使企业在优胜劣汰的竞争中占据有得位置,越来越受到关注

  10. Distributed Computing and its Scope in Defence Applications

    Directory of Open Access Journals (Sweden)

    B.V. George

    2005-10-01

    Full Text Available Distributed computing is one of the paradigms in the world of information technology. Middleware is the essential tool for implementing distributed computing for overtaking theheterogeneity of platform and language. DRDO’s intranet, DRONA, has the potential of hosting distributed applications across the network. This paper deals with the essentials of distributed computing, architecture of DRONA network, and the scope of distributed computing in Defence applications. It also suggests a few possible applications of distributed computing.

  11. Computer Information Technology in the Application of Modern Logistics%计算讥信息孜术在现代物琉中应用研究

    Institute of Scientific and Technical Information of China (English)

    高晨光

    2012-01-01

    With the rapid development of computer information technology, information management systems were. used in logistics management, which caused the development of logistics industry rapidly in China, and it became the important impetus for eco- nomic development. This paper combined with the actual development of China's modern logistics, it summaried and analyzed the application of automation equipment technology, logistics equipment tracking and control, logistics dynamic information collection, and it investigated the application and development trends in modern logistics.%随着计算机信息技术的飞速发展,信息管理系统运用于物流管理,引发物流业在我国的迅速发展,并成为国民经济发展的重要推动力。结合我国现代物流发展的实际,对自动化设备技术的应用、物流设备跟踪和控制技术的应用、物流动态信息采集技术的应用进行了总结分析。并探讨其在现代物流中的应用及发展趋势。

  12. Application of the grid computing technology for fault diagnosis%数据网络技术在故障诊断中的应用

    Institute of Scientific and Technical Information of China (English)

    王明赞; 张滋业

    2007-01-01

    Introduced the basic principle and structure of the grid computing technology,as well as the application combined with the fault diagnosis expert systems.Put forward that use grid node to construct integrated fault diagnosis system based on object model,experience rule,neural network model and practice,so that the aptitude and efficiency of the diagnosis system is improved.Researched on the method of applying the grid architecture in fault diagnosis based on OGSA.It also puts forward the method of fault diagnosis in LAN.Server is made up of grid nodes,which are used for spectrum diagnosis and data tendency diagnosis.Using web Service program,can realize accessing and grid calculating between clients and server.Besides,presented the system control flow.

  13. Microencapsulation Technology and Applications

    Directory of Open Access Journals (Sweden)

    Rama Dubey

    2009-01-01

    Full Text Available Microencapsulation technology allows a compound to be encapsulated inside a tiny sphere known as microsphere/microcapsule, having an average diameter as small as 1 mm to several hundred micro meters. Many different active materials like drugs, enzymes, vitamins, pesticides, flavours and catalysts have been successfully encapsulated inside microballoons or microcapsules made from a variety of polymeric and non polymeric materials including poly(ethylene glycols, poly(methacrylates, poly(styrenes, cellulose, poly(lactides, poly(lactide-co-glycolides, gelatin and acacia, etc. These microcapsules release their contents at appropriate time by using different release mechanisms, depending on the end use of encapsulated products. This technology has been used in several fields including pharmaceutical, agriculture, food, printing, cosmetic, textile and defence. In defence sector this technology has introduced the concept of self-healing composites as well as chemical decontaminating fabrics. This review paper highlights the major reasons behind microencapsulation, important techniques of microencapsulation and application of microencapsulated products in different areas of science and technology.Defence Science Journal, 2009, 59(1, pp.82-95, DOI:http://dx.doi.org/10.14429/dsj.59.1489 

  14. Computer Technology-Infused Learning Enhancement

    Science.gov (United States)

    Keengwe, Jared; Anyanwu, Longy O.

    2007-01-01

    The purpose of the study was to determine students' perception of instructional integration of computer technology to improve learning. Two key questions were investigated in this study: (a) What is the students' perception of faculty integration of computer technology into classroom instruction? (b) To what extent does the students' perception of…

  15. College Students' Attitude towards Computer Technology

    Science.gov (United States)

    Njagi, K. O.; Havice, W. L.

    2011-01-01

    Recent advances in the contemporary world, especially in the area of computer technology, have heralded the development and implementation of new and innovative teaching strategies and particularly with the Internet revolution. This study assessed students' attitude towards computer technology. Specifically, the study assessed differences in…

  16. Theory-Guided Technology in Computer Science.

    Science.gov (United States)

    Ben-Ari, Mordechai

    2001-01-01

    Examines the history of major achievements in computer science as portrayed by winners of the prestigious Turing award and identifies a possibly unique activity called Theory-Guided Technology (TGT). Researchers develop TGT by using theoretical results to create practical technology. Discusses reasons why TGT is practical in computer science and…

  17. Advanced Hybrid Computer Systems. Software Technology.

    Science.gov (United States)

    This software technology final report evaluates advances made in Advanced Hybrid Computer System software technology . The report describes what...automatic patching software is available as well as which analog/hybrid programming languages would be most feasible for the Advanced Hybrid Computer...compiler software . The problem of how software would interface with the hybrid system is also presented.

  18. Theory-Guided Technology in Computer Science.

    Science.gov (United States)

    Ben-Ari, Mordechai

    2001-01-01

    Examines the history of major achievements in computer science as portrayed by winners of the prestigious Turing award and identifies a possibly unique activity called Theory-Guided Technology (TGT). Researchers develop TGT by using theoretical results to create practical technology. Discusses reasons why TGT is practical in computer science and…

  19. Course Syllabus: The Social Impact of Computer Information Technology.

    Science.gov (United States)

    Behar, Joseph

    1988-01-01

    This syllabus describes the course background, central themes and issues, texts, resources, and recommended readings. Main topics are the sociology of information technology, computers and social change, telecommunications, computers and human interactions, applications in working, and social issues and political implications. (YP)

  20. THE APPLICABILITY OF EXISTING COMPUTER TECHNOLOGY TO AUTOMATE FUZZY SYNTHESIS OF TRAFFIC LIGHT UAV IN ADVERSE WEATHER CONDITIONS

    Directory of Open Access Journals (Sweden)

    L. N. Lysenko

    2014-01-01

    Full Text Available The results of the analysis of the applicability of known application software systems for automated synthesis of fuzzy control traffic light UAV during its flight in adverse weather conditions. The solution is based on a previously formulated and put into consideration the principle of permissible limited a priori estimation of the uncertainty of aerodynamic characteristics of UAVs.

  1. Cloud manufacturing distributed computing technologies for global and sustainable manufacturing

    CERN Document Server

    Mehnen, Jörn

    2013-01-01

    Global networks, which are the primary pillars of the modern manufacturing industry and supply chains, can only cope with the new challenges, requirements and demands when supported by new computing and Internet-based technologies. Cloud Manufacturing: Distributed Computing Technologies for Global and Sustainable Manufacturing introduces a new paradigm for scalable service-oriented sustainable and globally distributed manufacturing systems.   The eleven chapters in this book provide an updated overview of the latest technological development and applications in relevant research areas.  Following an introduction to the essential features of Cloud Computing, chapters cover a range of methods and applications such as the factors that actually affect adoption of the Cloud Computing technology in manufacturing companies and new geometrical simplification method to stream 3-Dimensional design and manufacturing data via the Internet. This is further supported case studies and real life data for Waste Electrical ...

  2. A Technology Assessment of Personal Computers. Vol. II: Personal Computer Technology, Users, and Uses.

    Science.gov (United States)

    Nilles, Jack M.

    This volume reports on the initial phase of a technology assessment of personal computers. First, technological developments that will influence the rate of diffusion of personal computer technology among the general populace are examined. Then the probable market for personal computers is estimated and analyzed on a functional basis, segregating…

  3. Future Computing Technology (2/3)

    CERN Document Server

    CERN. Geneva

    2015-01-01

    Computing of the future will be affected by a number of fundamental technologies in development today, many of which are already on the way to becoming commercialized. In this series of lectures, we will discuss hardware and software development that will become mainstream in the timeframe of a few years and how they will shape or change the computing landscape - commercial and personal alike. Topics range from processor and memory aspects, programming models and the limits of artificial intelligence, up to end-user interaction with wearables or e-textiles. We discuss the impact of these technologies on the art of programming, the data centres of the future and daily life. On the second day of the Future Computing Technology series, we will talk about ubiquitous computing. From smart watches through mobile devices to virtual reality, computing devices surround us, and innovative new technologies are introduces every day. We will briefly explore how this propagation might continue, how computers can take ove...

  4. Virtual reality technology and applications

    CERN Document Server

    Mihelj, Matjaž; Beguš, Samo

    2014-01-01

    As virtual reality expands from the imaginary worlds of science fiction and pervades every corner of everyday life, it is becoming increasingly important for students and professionals alike to understand the diverse aspects of this technology. This book aims to provide a comprehensive guide to the theoretical and practical elements of virtual reality, from the mathematical and technological foundations of virtual worlds to the human factors and the applications that enrich our lives: in the fields of medicine, entertainment, education and others. After providing a brief introduction to the topic, the book describes the kinematic and dynamic mathematical models of virtual worlds. It explores the many ways a computer can track and interpret human movement, then progresses through the modalities that make up a virtual world: visual, acoustic and haptic. It explores the interaction between the actual and virtual environments, as well as design principles of the latter. The book closes with an examination of diff...

  5. 9th International Conference on Advanced Computing & Communication Technologies

    CERN Document Server

    Mandal, Jyotsna; Auluck, Nitin; Nagarajaram, H

    2016-01-01

    This book highlights a collection of high-quality peer-reviewed research papers presented at the Ninth International Conference on Advanced Computing & Communication Technologies (ICACCT-2015) held at Asia Pacific Institute of Information Technology, Panipat, India during 27–29 November 2015. The book discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. Researchers from academia and industry present their original work and exchange ideas, information, techniques and applications in the field of Advanced Computing and Communication Technology.

  6. Computational social networks tools, perspectives and applications

    CERN Document Server

    Abraham, Ajith

    2012-01-01

    Provides the latest advances in computational social networks, and illustrates how organizations can gain a competitive advantage by applying these ideas in real-world scenarios Presents a specific focus on practical tools and applications Provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology

  7. SLJ Special Section: Computer Technology and Libraries.

    Science.gov (United States)

    School Library Journal, 1984

    1984-01-01

    This 5-article section provides an annotated bibliography of 39 books about computer technology; describes peripheral equipment essential for building computer systems; suggests an approach to software evaluation and selection; describes the implementation of a computer program for elementary/secondary students and teachers; and reviews 34…

  8. 6th International Conference on Computer Science and its Applications

    CERN Document Server

    Stojmenovic, Ivan; Jeong, Hwa; Yi, Gangman

    2015-01-01

    The 6th FTRA International Conference on Computer Science and its Applications (CSA-14) will be held in Guam, USA, Dec. 17 - 19, 2014. CSA-14 presents a comprehensive conference focused on the various aspects of advances in engineering systems in computer science, and applications, including ubiquitous computing, U-Health care system, Big Data, UI/UX for human-centric computing, Computing Service, Bioinformatics and Bio-Inspired Computing and will show recent advances on various aspects of computing technology, Ubiquitous Computing Services and its application.

  9. Artificial immune system applications in computer security

    CERN Document Server

    Tan, Ying

    2016-01-01

    This book provides state-of-the-art information on the use, design, and development of the Artificial Immune System (AIS) and AIS-based solutions to computer security issues. Artificial Immune System: Applications in Computer Security focuses on the technologies and applications of AIS in malware detection proposed in recent years by the Computational Intelligence Laboratory of Peking University (CIL@PKU). It offers a theoretical perspective as well as practical solutions for readers interested in AIS, machine learning, pattern recognition and computer security. The book begins by introducing the basic concepts, typical algorithms, important features, and some applications of AIS. The second chapter introduces malware and its detection methods, especially for immune-based malware detection approaches. Successive chapters present a variety of advanced detection approaches for malware, including Virus Detection System, K-Nearest Neighbour (KNN), RBF networ s, and Support Vector Machines (SVM), Danger theory, ...

  10. Art Therapists and Computer Technology

    Science.gov (United States)

    Peterson, Brent C.; Stovall, Kay; Elkins, David E.; Parker-Bell, Barbara

    2005-01-01

    The purpose of this study was to understand the impact of technology on art therapists by exploring how art therapists own and use technology and to determine barriers to ownership and use. A survey was conducted at the 2002 annual conference of the American Art Therapy Association in Washington, DC. Of the 250 surveys distributed, 195 were…

  11. Application Design for Wearable Computing

    CERN Document Server

    Siewiorek, Dan; Starner, Thad

    2008-01-01

    This lecture describes application design for wearable computing, providing a blend of experience based insights, learning in application development, and guidelines on how to frame problems and address a specific design context, followed by more detailed issues and solution approaches at the next level of the application development. The lecture takes the viewpoint of a potential designer or researcher in this field and aims to present such an integrated material in one place. Designing wearable computer interfaces requires attention to many different factors because of the computer's closene

  12. Lighting Computer Programs in Lighting Technology

    OpenAIRE

    Ekren, Nazmi; Dursun, Bahtiyar; Ercan AYKUT

    2008-01-01

    It is well known that the computer in lighting technology is a vital component for lighting designers. Lighting computer programs are preferred in preparing architectural projects in lighting techniques, especially in lighting calculations. Lighting computer programs, which arise with the aim of helping lighting designers, gain more interest day by day. The most important property of lighting computer programs is the ability to enable the simulation of lighting projects without requiring any ...

  13. Computing, Information and Communications Technology (CICT) Website

    Science.gov (United States)

    Hardman, John; Tu, Eugene (Technical Monitor)

    2002-01-01

    The Computing, Information and Communications Technology Program (CICT) was established in 2001 to ensure NASA's Continuing leadership in emerging technologies. It is a coordinated, Agency-wide effort to develop and deploy key enabling technologies for a broad range of mission-critical tasks. The NASA CICT program is designed to address Agency-specific computing, information, and communications technology requirements beyond the projected capabilities of commercially available solutions. The areas of technical focus have been chosen for their impact on NASA's missions, their national importance, and the technical challenge they provide to the Program. In order to meet its objectives, the CICT Program is organized into the following four technology focused projects: 1) Computing, Networking and Information Systems (CNIS); 2) Intelligent Systems (IS); 3) Space Communications (SC); 4) Information Technology Strategic Research (ITSR).

  14. Ubiquitous Information Technologies and Applications

    CERN Document Server

    Park, Young-Ho; Hsu, Ching-Hsien; Park, James

    2014-01-01

    The theme of CUTE is focused on the various aspects of ubiquitous computing for advances in ubiquitous computing and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of ubiquitous computing. Therefore this book will be include the various theories and practical applications in ubiquitous computing

  15. Computer Applications in Health Science Education.

    Science.gov (United States)

    Juanes, Juan A; Ruisoto, Pablo

    2015-09-01

    In recent years, computer application development has experienced exponential growth, not only in the number of publications but also in the scope or contexts that have benefited from its use. In health science training, and medicine specifically, the gradual incorporation of technological developments has transformed the teaching and learning process, resulting in true "educational technology". The goal of this paper is to review the main features involved in these applications and highlight the main lines of research for the future. The results of peer reviewed literature published recently indicate the following features shared by the key technological developments in the field of health science education: first, development of simulation and visualization systems for a more complete and realistic representation of learning material over traditional paper format; second, portability and versatility of the applications, adapted for an increasing number of devices and operative systems; third, increasing focus on open source applications such as Massive Open Online Course (MOOC).

  16. Characterization of a Reconfigurable Free-Space Optical Channel for Embedded Computer Applications with Experimental Validation Using Rapid Prototyping Technology

    Directory of Open Access Journals (Sweden)

    Rafael Gil-Otero

    2007-02-01

    Full Text Available Free-space optical interconnects (FSOIs are widely seen as a potential solution to current and future bandwidth bottlenecks for parallel processors. In this paper, an FSOI system called optical highway (OH is proposed. The OH uses polarizing beam splitter-liquid crystal plate (PBS/LC assemblies to perform reconfigurable beam combination functions. The properties of the OH make it suitable for embedding complex network topologies such as completed connected mesh or hypercube. This paper proposes the use of rapid prototyping technology for implementing an optomechanical system suitable for studying the reconfigurable characteristics of a free-space optical channel. Additionally, it reports how the limited contrast ratio of the optical components can affect the attenuation of the optical signal and the crosstalk caused by misdirected signals. Different techniques are also proposed in order to increase the optical modulation amplitude (OMA of the system.

  17. Characterization of a Reconfigurable Free-Space Optical Channel for Embedded Computer Applications with Experimental Validation Using Rapid Prototyping Technology

    Directory of Open Access Journals (Sweden)

    Lim Theodore

    2007-01-01

    Full Text Available Free-space optical interconnects (FSOIs are widely seen as a potential solution to current and future bandwidth bottlenecks for parallel processors. In this paper, an FSOI system called optical highway (OH is proposed. The OH uses polarizing beam splitter-liquid crystal plate (PBS/LC assemblies to perform reconfigurable beam combination functions. The properties of the OH make it suitable for embedding complex network topologies such as completed connected mesh or hypercube. This paper proposes the use of rapid prototyping technology for implementing an optomechanical system suitable for studying the reconfigurable characteristics of a free-space optical channel. Additionally, it reports how the limited contrast ratio of the optical components can affect the attenuation of the optical signal and the crosstalk caused by misdirected signals. Different techniques are also proposed in order to increase the optical modulation amplitude (OMA of the system.

  18. (CICT) Computing, Information, and Communications Technology Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The goal of the Computing, Information, and Communications Technology (CICT) program is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communications technologies. This viewgraph presentation includes diagrams of how the political guidance behind CICT is structured. The presentation profiles each part of the NASA Mission in detail, and relates the Mission to the activities of CICT. CICT's Integrated Capability Goal is illustrated, and hypothetical missions which could be enabled by CICT are profiled. CICT technology development is profiled.

  19. Cloud Computing Utility and Applications

    Directory of Open Access Journals (Sweden)

    Pradeep Kumar Tiwari

    2011-12-01

    Full Text Available Cloud Architecture provides services on demand basis via internet (WWW services. Application design in cloud computing environment or the applications which support cloud paradigm are on demand on the basis of user requirement. Those applications provide the support on various hardware, software and other resource requirement on demand. API used in the cloud computing provide the greater advantage to provide industrial strength, where the complex reliability and scalability logic of the underlying services remains implemented and hidden in the cloud environment. Cloud Computing provide the highest utilization in terms of utilization, resource sharing, requirement gathering and utility to the other needful resources. In this paper we discuss several utility and their applications. We provide a broad discussion which is useful for cloud computing research.

  20. A Survey:Computing Technology of Network Big Data and Its Applications%网络大数据计算技术与应用综述

    Institute of Scientific and Technical Information of China (English)

    程学旗; 王元卓; 靳小龙

    2013-01-01

    网络大数据蕴含着丰富的社会信息,可以看作是对真实社会的网络映射。分析网络大数据并发现其中所暗含的线索与规律,可以帮助人们更好地感知现在、预测未来。本文简要介绍了国内外有关网络大数据的战略布局,总结了网络大数据计算技术研究面临的挑战,并从网络大数据计算的架构体系以及网络大数据的感知与表示、内容建模与语义理解等方面分析了研究现状。最后,通过实例对网络大数据将带来的新型应用进行了展望。%Due to the extensive involvement of users into various network applications, network big data contains rich social information and can consequently be viewed as a network mapping of the actual society. Analyzing network big data to find the implicit clues and laws can help us more accurately perceive present and forecast future. This paper briefly reviews the network big data related strategic initiatives all over the world, summarizes the grand challenges confronted by the computing technology study of network big data, and analyzes the research status from different aspects including the architecture of big data computing, the awareness, representation, content modeling, and semantic understanding of network big data, etc. Finally, we look forward to the innovative applications of network big data based on realistic examples.

  1. Cloud computing with e-science applications

    CERN Document Server

    Terzo, Olivier

    2015-01-01

    The amount of data in everyday life has been exploding. This data increase has been especially significant in scientific fields, where substantial amounts of data must be captured, communicated, aggregated, stored, and analyzed. Cloud Computing with e-Science Applications explains how cloud computing can improve data management in data-heavy fields such as bioinformatics, earth science, and computer science. The book begins with an overview of cloud models supplied by the National Institute of Standards and Technology (NIST), and then:Discusses the challenges imposed by big data on scientific

  2. Teaching Psychology Students Computer Applications.

    Science.gov (United States)

    Atnip, Gilbert W.

    This paper describes an undergraduate-level course designed to teach the applications of computers that are most relevant in the social sciences, especially psychology. After an introduction to the basic concepts and terminology of computing, separate units were devoted to word processing, data analysis, data acquisition, artificial intelligence,…

  3. Computational fluid dynamic applications

    Energy Technology Data Exchange (ETDEWEB)

    Chang, S.-L.; Lottes, S. A.; Zhou, C. Q.

    2000-04-03

    The rapid advancement of computational capability including speed and memory size has prompted the wide use of computational fluid dynamics (CFD) codes to simulate complex flow systems. CFD simulations are used to study the operating problems encountered in system, to evaluate the impacts of operation/design parameters on the performance of a system, and to investigate novel design concepts. CFD codes are generally developed based on the conservation laws of mass, momentum, and energy that govern the characteristics of a flow. The governing equations are simplified and discretized for a selected computational grid system. Numerical methods are selected to simplify and calculate approximate flow properties. For turbulent, reacting, and multiphase flow systems the complex processes relating to these aspects of the flow, i.e., turbulent diffusion, combustion kinetics, interfacial drag and heat and mass transfer, etc., are described in mathematical models, based on a combination of fundamental physics and empirical data, that are incorporated into the code. CFD simulation has been applied to a large variety of practical and industrial scale flow systems.

  4. Ubiquitous Information Technologies and Applications CUTE 2012

    CERN Document Server

    Park, Doo-Soon; Jia, Weijia; Yeo, Sang-Soo

    2013-01-01

    This book is for The 7th International Conference on Ubiquitous Information Technologies and Applications (CUTE 2012). Ubiquitous computing will require a new approach to fitting technology to our lives. The advent of new computing devices, and the seamless connectivity between these devices, thanks to diverse wired and wireless networks, are enabling new opportunities for a user to perform his/her operation all the time and everywhere. These seamlessly connected devices are ranging from mobile handset to wearable computers. Also, it is expected that these devices will become so pervasive that they will be embedded in the surrounding physical environment, and transparent and invisible to a user. Such devices, whether carried on by people or embedded into other systems, will constitute a global internetworking infrastructure and likely to provide a new level of openness and dynamics. Ubiquitous computing has as its goal the enhancing computer use by pushing computational services out of conventional desktop in...

  5. Computer Programming Projects in Technology Courses.

    Science.gov (United States)

    Thomas, Charles R.

    1985-01-01

    Discusses programming projects in applied technology courses, examining documentation, formal reports, and implementation. Includes recommendations based on experience with a sophomore machine elements course which provided computers for problem solving exercises. (DH)

  6. Optical technologies for computational intelligence

    Science.gov (United States)

    Pavlov, Alexander V.

    2001-11-01

    Optics has a number of deep analogies with main principles of Computational Intelligence. We can see strong analogies between basic optical phenomena, used in Fourier-holography, and mathematical foundations of Fuzzy Set Theory. Also, analogies between optical holography technique and principles of Neural Networks Paradigm can be seen. Progress in new holographic recording media with self-developing property leads to Evolutionary Computations holographic realization. Based on these analogies we review holographic techniques from two points of view: Fuzzy Logic and Fuzzy relations.

  7. 10th International Conference on Computing and Information Technology

    CERN Document Server

    Unger, Herwig; Meesad, Phayung

    2014-01-01

    Computer and Information Technology (CIT) are now involved in governmental, industrial, and business domains more than ever. Thus, it is important for CIT personnel to continue academic research to improve technology and its adoption to modern applications. The up-to-date research and technologies must be distributed to researchers and CIT community continuously to aid future development. The 10th International Conference on Computing and Information Technology (IC 2 IT2014) organized by King Mongkut's University of Technology North Bangkok (KMUTNB) and partners provides an exchange of the state of the art and future developments in the two key areas of this process: Computer Networking and Data Mining. Behind the background of the foundation of ASEAN, it becomes clear that efficient languages, business principles and communication methods need to be adapted, unified and especially optimized to gain a maximum benefit to the users and customers of future IT systems.

  8. Application of Information and Communication Technology (ICT) in ...

    African Journals Online (AJOL)

    Application of Information and Communication Technology (ICT) in Teaching ... was developed by the researcher, validated by experts and used for data collection. ... assistive technologies, skilled teachers of ICT, computer illiteracy, fear of the ...

  9. Computer applications in clinical psychology

    CERN Document Server

    Zamoşteanu, Alina Oana

    2012-01-01

    The computer-assisted analysis is not currently a novelty, but a necessity in all areas of psychology. A number of studies that examine the limits of the computer assisted and analyzed interpretations, also its advantages. A series of studies aim to assess how the computer assisting programs are able to establish a diagnosis referring to the presence of certain mental disorders. We will present the results of one computer application in clinical psychology regarding the assessment of Theory of Mind capacity by animation.

  10. Computer applications in clinical psychology

    Directory of Open Access Journals (Sweden)

    Alina Oana Zamoşteanu

    2009-01-01

    Full Text Available The computer-assisted analysis is not currently a novelty, but a necessity in all areas of psychology. A number of studies that examine the limits of the computer assisted and analyzed interpretations, also its advantages. A series of studies aim to assess how the computer assisting programs are able to establish a diagnosis referring to the presence of certain mental disorders. We will present the results of one computer application in clinical psychology regarding the assessment of Theory of Mind capacity by animation.

  11. Engineering applications of soft computing

    CERN Document Server

    Díaz-Cortés, Margarita-Arimatea; Rojas, Raúl

    2017-01-01

    This book bridges the gap between Soft Computing techniques and their applications to complex engineering problems. In each chapter we endeavor to explain the basic ideas behind the proposed applications in an accessible format for readers who may not possess a background in some of the fields. Therefore, engineers or practitioners who are not familiar with Soft Computing methods will appreciate that the techniques discussed go beyond simple theoretical tools, since they have been adapted to solve significant problems that commonly arise in such areas. At the same time, the book will show members of the Soft Computing community how engineering problems are now being solved and handled with the help of intelligent approaches. Highlighting new applications and implementations of Soft Computing approaches in various engineering contexts, the book is divided into 12 chapters. Further, it has been structured so that each chapter can be read independently of the others.

  12. Telemedical applications and grid technology

    Science.gov (United States)

    Graschew, Georgi; Roelofs, Theo A.; Rakowsky, Stefan; Schlag, Peter M.; Kaiser, Silvan; Albayrak, Sahin

    2005-11-01

    Due to the experience in the exploitation of previous European telemedicine projects an open Euro-Mediterranean consortium proposes the Virtual Euro-Mediterranean Hospital (VEMH) initiative. The provision of the same advanced technologies to the European and Mediterranean Countries should contribute to their better dialogue for integration. VEMH aims to facilitate the interconnection of various services through real integration which must take into account the social, human and cultural dimensions. VEMH will provide a platform consisting of a satellite and terrestrial link for the application of medical e-learning, real-time telemedicine and medical assistance. The methodologies for the VEMH are medical-needs-driven instead of technology-driven. They supply new management tools for virtual medical communities and allow management of clinical outcomes for implementation of evidence-based medicine. Due to the distributed character of the VEMH Grid technology becomes inevitable for successful deployment of the services. Existing Grid Engines provide basic computing power needed by today's medical analysis tasks but lack other capabilities needed for communication and knowledge sharing services envisioned. When it comes to heterogeneous systems to be shared by different institutions especially the high level system management areas are still unsupported. Therefore a Metagrid Engine is needed that provides a superset of functionalities across different Grid Engines and manages strong privacy and Quality of Service constraints at this comprehensive level.

  13. Philosophy of computing and information technology

    NARCIS (Netherlands)

    Brey, Philip; Soraker, Johnny Hartz

    2009-01-01

    Philosophy has been described as having taken a “computational turn,” referring to the ways in which computers and information technology throw new light upon traditional philosophical issues, provide new tools and concepts for philosophical reasoning, and pose theoretical and practical questions th

  14. Technological Enhancements for Personal Computers

    Science.gov (United States)

    1992-03-01

    scenarios that represent some of what can be accomplished % ith personal computers. 20 D!STRIBUTION/ AVAILABILTY OF ABSTRACT 21 ABSTRACT SECURITY...not just the immediate usages . With few exceptions all of the options discussed here are available under the Desktop III contract. The new Desktop IV...Many users found them to be slow and unwieldy and consequentially they did not get the expected usage nor did they provide the advantages we find in

  15. Emerging memory technologies design, architecture, and applications

    CERN Document Server

    2014-01-01

    This book explores the design implications of emerging, non-volatile memory (NVM) technologies on future computer memory hierarchy architecture designs. Since NVM technologies combine the speed of SRAM, the density of DRAM, and the non-volatility of Flash memory, they are very attractive as the basis for future universal memories. This book provides a holistic perspective on the topic, covering modeling, design, architecture and applications. The practical information included in this book will enable designers to exploit emerging memory technologies to improve significantly the performance/power/reliability of future, mainstream integrated circuits. • Provides a comprehensive reference on designing modern circuits with emerging, non-volatile memory technologies, such as MRAM and PCRAM; • Explores new design opportunities offered by emerging memory technologies, from a holistic perspective; • Describes topics in technology, modeling, architecture and applications; • Enables circuit designers to ex...

  16. 计算机软件开发技术的应用研究%Research on Application of Computer Software Technology

    Institute of Scientific and Technical Information of China (English)

    吴琳

    2015-01-01

    在短短的数十年时间里,软件开发领域依托硬件发展的基础向人们展示了它辉煌的硕果,计算机是由硬件和软件两部分组成。硬件性能、容量、速度、体积的发展给软件的前进提供了可能,为软件运行提供了可行性的物理支持,软件的发展丰富了客户的生活,扩大了客户的生活半径,也是计算机快速发展的动力源泉,是计算机技术的核心组成部分。坚持以用户为本,一切为了用户的软件开发原则,及用户之所及,用户至上,为人们提供功能丰富、优质高效、多元化的服务,进一步服务社会、创新软件应用和提高软件的有效性是计算机软件产业发展方向。%In a short period of several decades,relying on the development of hardware based software development field shows its brilliant achievements to the people,the computer system is composed of two parts of hardware and software.The development of hardware performance,capacity,speed,volume to software forward may be provided,provides feasible physical support for software,software development has enriched the customer's life,expanding the radius of the customer life,power source is the rapid development of computer,computer technology is the core part of the.Adhere to the user oriented,all for the software development principles of the user,and the user can provide the function,the user is supreme,rich,high quality and efficiency,diversification of services to the people,the effectiveness of further social services,innovative software applications and improve software is computer software industry development direction.

  17. Biochips: Technologies and applications

    Energy Technology Data Exchange (ETDEWEB)

    Pasquarelli, Alberto [University of Ulm, Department of Electron Devices and Circuits / Center for DNA-Surface and Micro-Technology, Albert Einstein Allee 45, 89069 Ulm (Germany)], E-mail: alberto.pasquarelli@uni-ulm.de

    2008-05-01

    Progresses in the life sciences during the last decades have been characterized by a continuous improvement in the resolution power of the investigation techniques, allowing a top-down approach, from whole organisms, far beyond the cellular size, down to the single molecule or even the single atom. This ability to characterize biological structures and dynamic processes in real-time at the nanometric level, offers an extremely powerful tool for the comprehension of the elementary phenomena occurring in the single cell. Genomics, Proteomics and Channelomics are young disciplines coping with DNA sequencing, gene expression, immunology, regulation of cell activity and intracellular communication. Although biochips are frequently associated only with DNA-chips, there is a variety of biological and biochemical elements that can be interfaced; as an example whole cells, cell populations or even tissue slices can be investigated on a microelectrodes array (MEA), making it possible, passing to a bottom-up method, to better understand the behaviour of cellular ensembles of increasing complexity. MEA technologies have also delivered fundamental contribution to the development of new implantable prosthetic devices. Thus biochips can be considered more in general as structured and functionalized bio/non-bio interfaces. Inside this scenario, the most relevant application is the screening of new drugs, which is required and regulated by law, to reliably evaluate benefits and risks of pharmaceutical compounds.

  18. Grid computing techniques and applications

    CERN Document Server

    Wilkinson, Barry

    2009-01-01

    ''… the most outstanding aspect of this book is its excellent structure: it is as though we have been given a map to help us move around this technology from the base to the summit … I highly recommend this book …''Jose Lloret, Computing Reviews, March 2010

  19. Technology computer aided design of 29.5% efficient perovskite/interdigitated back contact silicon heterojunction mechanically stacked tandem solar cell for energy-efficient applications

    Science.gov (United States)

    Pandey, Rahul; Chaujar, Rishu

    2017-04-01

    A 29.5% efficient perovskite/SiC passivated interdigitated back contact silicon heterojunction (IBC-SiHJ) mechanically stacked tandem solar cell device has been designed and simulated. This is a substantial improvement of 40% and 15%, respectively, compared to the transparent perovskite solar cell (21.1%) and Si solar cell (25.6%) operated individually. The perovskite solar cell has been used as a top subcell, whereas 250- and 25-μm-thick IBC-SiHJ solar cells have been used as bottom subcells. The realistic technology computer aided design analysis has been performed to understand the physical processes in the device and to make reliable predictions of the behavior. The performance of the top subcell has been obtained for different acceptor densities and hole mobility in Spiro-MeOTAD along with the impact of counter electrode work function. To incorporate the effect of material quality, the influence of carrier lifetimes has also been studied for perovskite top and IBC-SiHJ bottom subcells. The optical and electrical behavior of the devices has been obtained for both standalone as well as tandem configuration. Results reported in this study reveal that the proposed four-terminal tandem device may open a new door for cost-effective and energy-efficient applications.

  20. Computational Linguistics Applications

    CERN Document Server

    Piasecki, Maciej; Jassem, Krzysztof; Fuglewicz, Piotr

    2013-01-01

    The ever-growing popularity of Google over the recent decade has required a specific method of man-machine communication: human query should be short, whereas the machine answer may take a form of a wide range of documents. This type of communication has triggered a rapid development in the domain of Information Extraction, aimed at providing the asker with a  more precise information. The recent success of intelligent personal assistants supporting users in searching or even extracting information and answers from large collections of electronic documents signals the onset of a new era in man-machine communication – we shall soon explain to our small devices what we need to know and expect valuable answers quickly and automatically delivered. The progress of man-machine communication is accompanied by growth in the significance of applied Computational Linguistics – we need machines to understand much more from the language we speak naturally than it is the case of up-to-date search systems. Moreover, w...

  1. Research on the Application of Cloud Computing Technology in Integrated CRM System%云计算技术在集中CRM系统中应用的研究

    Institute of Scientific and Technical Information of China (English)

    林玺磊; 宋齐军; 裴培

    2014-01-01

    It introduces the strategies and suggestions on introducing cloud computing technology to the construction of integrated CRM system, provides specific applied examples for applying cloud computing technology to application layer and data-storage layer.%介绍在电信运营商集中CRM系统建设中采用云计算技术的策略与建议,针对应用层及数据层给出具体的云计算技术应用示例。

  2. AGIS: Integration of new technologies used in ATLAS Distributed Computing

    CERN Document Server

    Anisenkov, Alexey; The ATLAS collaboration; Alandes Pradillo, Maria

    2016-01-01

    AGIS is the information system designed to integrate configuration and status information about resources, services and topology of the computing infrastructure used by ATLAS Distributed Computing (ADC) applications and services. In this note, we describe the evolution and the recent developments of AGIS functionalities, related to integration of new technologies recently become widely used in ATLAS Computing like flexible computing utilization of opportunistic Cloud and HPC resources, ObjectStore services integration for Distributed Data Management (Rucio) and ATLAS workload management (PanDA) systems, unified storage protocols declaration required for PandDA Pilot site movers and others.

  3. Voice Technology Using Personal Computers.

    Science.gov (United States)

    1987-01-01

    PROGRA -.. NDC -A85 -AiSG 743 VOICE TECNOLOGY USING PERSONAL COMPUTE3SI(U) alit FORCE 212 INST OF TECH MRIGJ4T-PATTERSON RFB ON G L TALBOT 1987...Inline( $2E/$C6/$06/ Int24Err $Ol/$50/$89/$F8/$2E/$A2/ Int24ErrCode /$58/$BO/$OO/$89/$EC/$5D/$CF); - 150 - i..r - l. .. { Turbo: PUSH BP save...caller’s stack frame MOV BP,SP Set up this procedure’s stack frame PUSH BP ? Inline: MOV BYTE CS:[INT24Err],I Set INT24Err to True PUSH AX MOV AX,DI Get INT

  4. Apparent Causers for the Academic Declination of Students in University Level Compared with Secondary Level An Application on Computer Science {&} Information Technology-Al Neelain University

    Directory of Open Access Journals (Sweden)

    Dr. Mozamel M. Saeed

    2014-01-01

    Full Text Available The aims of this paper is to study the causes of academic declination of students in universitylevel compared with secondary level, taking the students of Computer Science {&} Information Technology-Al Neelain University (batch 2012 as sample using SPSS and its outputs to help decision makers to determine best resolution for the phenomena.

  5. Computer Applications in Metallurgical Research

    Directory of Open Access Journals (Sweden)

    V. Madhu

    1994-04-01

    Full Text Available This paper outlines the current efforts in computer applications in metallurgical research at the Defence Metallurgical Research Laboratory, Hyderabad. Work being done on armour penetration studies, optimization of armour profiles for fighting vehicles, computer control of multifunction 2000 tonne forge press, drawing of processing mechanism maps, process modelling of titanium sponge production and methods of curve fitting to experimental data, is described and briefly discussed.

  6. Addressing Security Challenges in Pervasive Computing Applications

    Science.gov (United States)

    2010-10-10

    Conference on Engineering of Complex Computer Systems, Auckland, New Zealand, July 2007. 5. Kyriakos Anastasakis, Behzad Bordbar, Geri Georg and...tending Database Technology, Saint-Petersburg, Russia, March 2009. 24. Geri Georg, Indrakshi Ray, Kyriakos Anastasakis, Behzad Bordbar, Manachai...and Behzad Bor- dbar, "Ensuring Spatio-Temporal Access Control for Real-World Applications", Proceed- ings of the 14 th ACM Symposium on Access

  7. Application-driven computational imaging

    Science.gov (United States)

    McCloskey, Scott

    2016-05-01

    This paper addresses how the image processing steps involved in computational imaging can be adapted to specific image-based recognition tasks, and how significant reductions in computational complexity can be achieved by leveraging the recognition algorithm's robustness to defocus, poor exposure, and the like. Unlike aesthetic applications of computational imaging, recognition systems need not produce the best possible image quality, but instead need only satisfy certain quality thresholds that allow for reliable recognition. The paper specifically addresses light field processing for barcode scanning, and presents three optimizations which bring light field processing within the complexity limits of low-powered embedded processors.

  8. Computer Network Security Technology the Application of Information Encryption Application in Oil Production Plant%计算机网络安全应用信息加密技术在采油厂的应用研究

    Institute of Scientific and Technical Information of China (English)

    焦小颜

    2014-01-01

    随着信息时代的到来以及科学技术的迅速发展和广泛应用,信息数据的传输变得更加便捷,并且已经逐渐融入到人们的工作和生活中。计算机技术的应用范围是相当广泛的,近几年来网络已然成为人们生活中的重要组成部分。随着社会经济的不断发展,信息数据传输的速度和数量都有了一定程度的增加,在这种情况下信息数据的安全性问题逐渐受到人们的关注和重视,因而需要采取有效的方式来保证信息数据传输过程中的安全。中国石油长庆油田近几年在石油行业的发展相当迅猛,石油企业也是促使经济发展的重要产业,而保证石油企业的源头,基层采油厂信息数据的安全性不仅影响着油田计算机网络的运行,同时对石油企业的稳步发展有着关键的影响。该文首先对计算机网络安全应用信息加密技术进行简单的介绍,其次是阐述计算机网络安全应用信息加密的重要性,最后则是对计算机网络安全应用信息加密技术在采油厂中的应用进行分析。%With the rapid development of information and the era of science and technology and the widespread application, data transmission information more convenient, and has been gradually integrated into people's work and life. The scope of applica-tion of computer technology is quite broad, in recent years, the network has become an important part of people's life. With the continuous development of social economy, the speed and quantity of information data transmission has increased to some extent, the security problem of information data in this case has attracted more attention and attention, therefore, need to take effective way to guarantee the information data transmission in the process of safety. China petroleum Changqing Oilfield in the oil indus-try development in recent years quite rapidly, an important industry in petroleum enterprises is to promote

  9. Team Viewer Technology for Remote Control of a Computer

    Directory of Open Access Journals (Sweden)

    Cornelia Victoria Anghel Drugarin

    2016-10-01

    Full Text Available Team Viewer software is used to remote control our PC. We can use this remote control technology to desktop sharing, online conferences and for file transfer between computers. Basically, using this software, you can ask for help a friend, or professional software to solve problems from a distance, without it having to be physically go to each client / friend in part. After installed and configured Team Viewer application, is complete, we can remote control the computer.

  10. Future Computing Technology (3/3)

    CERN Document Server

    CERN. Geneva

    2015-01-01

    Computing of the future will be affected by a number of fundamental technologies in development today, many of which are already on the way to becoming commercialized. In this series of lectures, we will discuss hardware and software development that will become mainstream in the timeframe of a few years and how they will shape or change the computing landscape - commercial and personal alike. Topics range from processor and memory aspects, programming models and the limits of artificial intelligence, up to end-user interaction with wearables or e-textiles. We discuss the impact of these technologies on the art of programming, the data centres of the future and daily life. On the third day of the Future Computing Technology series, we will touch on societal aspects of the future of computing. Our perception of computers may at time seem passive, but in reality we are a vital chain of the feedback loop. Human-computer interaction, innovative forms of computers, privacy, process automation, threats and medica...

  11. Towards Empowering Hearing Impaired Students' Skills in Computing and Technology

    Directory of Open Access Journals (Sweden)

    Nihal Esam Abuzinadah

    2017-01-01

    Full Text Available Studies have shown that deaf and hearing-impaired students have many difficulties in learning applied disciplines such as Medicine, Engineering, and Computer Programming. This study aims to investigate the readiness of deaf students to pursue higher education in applied sciences, more specifically in computer science. This involves investigating their capabilities in computer skills and applications. Computer programming is an integral component in the technological field that can facilitate the development of further scientific advances. Devising a manner of teaching the deaf and hearing-impaired population will give them an opportunity to contribute to the technology sector. This would allow these students to join the scientific world when otherwise; they are generally unable to participate because of the limitations they encounter. The study showed that deaf students in Jeddah are eager to continue their higher education and that a large percentage of these students are keen on studying computer science, particularly if they are provided with the right tools.

  12. Applications of Graph Theory in Computer Science

    Directory of Open Access Journals (Sweden)

    U. Sekar

    2013-11-01

    Full Text Available The field of mathematics plays vital role in various fields. One of the important areas in mathematics is graph theory which is used in structural models. This structural arrangements of various objects or technologies lead to new inventions and modifications in the existing environment for enhancement in those fields. The field graph theory started its journey from the problem of Konigsberg Bridge in 1735. This paper gives an overview of the applications of graph theory in heterogeneous fields to some extent but mainly focuses on the computer science applications that uses graph theoretical concepts. Various papers based on graph theory have been studied related to scheduling concepts, computer science applications and an overview has been presented here.Graph theoretical ideas are highly utilized by computer science applications. Especially in research areas of computer science such data mining, image segmentation, clustering, image capturing, networking etc., For example a data structure can be designed in the form of tree which in turn utilized vertices and edges. Similarly modeling of network topologies can be done using graph concepts. In the same way the most important concept of graph coloring is utilized in resource allocation, scheduling. Also, paths, walks and circuits in graph theory are used in tremendous applications say traveling salesman problem, database design concepts, resource networking. This leads to the development of new algorithms and new theorems that can be used in tremendous applications. First section gives the historical background of graph theory and some applications in scheduling. Second section emphasizes how graph theory is utilized in various computer applications.

  13. Computational electromagnetics recent advances and engineering applications

    CERN Document Server

    2014-01-01

    Emerging Topics in Computational Electromagnetics in Computational Electromagnetics presents advances in Computational Electromagnetics. This book is designed to fill the existing gap in current CEM literature that only cover the conventional numerical techniques for solving traditional EM problems. The book examines new algorithms, and applications of these algorithms for solving problems of current interest that are not readily amenable to efficient treatment by using the existing techniques. The authors discuss solution techniques for problems arising in nanotechnology, bioEM, metamaterials, as well as multiscale problems. They present techniques that utilize recent advances in computer technology, such as parallel architectures, and the increasing need to solve large and complex problems in a time efficient manner by using highly scalable algorithms.

  14. Mathematics for engineering, technology and computing science

    CERN Document Server

    Martin, Hedley G

    1970-01-01

    Mathematics for Engineering, Technology and Computing Science is a text on mathematics for courses in engineering, technology, and computing science. It covers linear algebra, ordinary differential equations, and vector analysis, together with line and multiple integrals. This book consists of eight chapters and begins with a discussion on determinants and linear equations, with emphasis on how the value of a determinant is defined and how it may be obtained. Solution of linear equations and the dependence between linear equations are also considered. The next chapter introduces the reader to

  15. Application of cloud computing technologies in information technology of hospitals%云计算技术在医院的信息化建设中的应用研究

    Institute of Scientific and Technical Information of China (English)

    侯佳音; 史淳樵

    2016-01-01

    文中对医院的信息化建设的云计算技术进行了充分论证和研究,提出了云计算在医疗信息领域方面应用的实施方案和风险评估,对应用云计算后的信息管理系统的性能运转情况进行了分析,给出了一定的实现方法和模式,在经过多方论证的基础上,通过医院的具体云存储数据中心的应用,论述了实现方案。同时,本文也对医院信息管理系统经过云计算处理后的不足和困难给出了自己的看法,指出了云计算处理后的应用意义,即高性能、统一的维护和配置管理、高扩展性和开放式的归档设计。%This article on cloud computing technology hospital information management system was adequate demonstration and research, the implementation plan and risk assessment of cloud computing applications in the field of medical information on the performance of the functioning of the application after the cloud information management system was analysis, given the realization of certain methods and models, after a multidisciplinary basis, through the application of specific cloud storage data center hospital, discusses the implementation. Meanwhile, the paper also on the hospital information management system has been treated less cloud and gives his views on the difficulties pointed out the significance of cloud computing application processing, namely high-performance, unified maintenance and configuration management, high scalability and open archiving design.

  16. 面向高校云计算的MPLS VPN技术应用研究%Application of MPLS VPN Technology of Cloud Computing for the University

    Institute of Scientific and Technical Information of China (English)

    陈健; 于俊乐; 史建政

    2015-01-01

    本文对云计算网络典型的大二层技术和云数据中心跨站点二层互联技术进行了分析和研究,提出了MPLS VPN作为高校云计算数据中心大二层扩展重要技术,以及网络架构和实施方案,并完成了相关测试。该方案将MPLS VPN技术整合到现有云计算架构中,目的是实现高校云计算资源的无缝融合,为高校虚拟私有云和公有云的连接奠定基础;为今后研究云计算数据中心虚拟化提供一种新的思路,为解决广域网链路复用提供可行方案。%In this paper, the cloud computing network typical large two layer technology and cloud data center cross site two layers of interconnect technology is analyzed and studied,proposed the MPLS VPN as extension important technology in University cloud computing data center,the network architecture and implementation plan,completed the related test.The program integrated MPLS VPN technology into the existing cloud computing architecture,the purpose is to achieve seamless fusion cloud computing resources in Colleges and Universities,lay the foundation for connecting virtual private and a public cloud in college;to provide a new train of thought for the future research on the virtual data center cloud computing,to provide the feasible solution to the WAN link multiplexing.

  17. Evolutionary Computation and its Application

    Institute of Scientific and Technical Information of China (English)

    Licheng Jiao; Lishan Kang; Zhenya He; Tao Xie

    2006-01-01

    @@ On Mar.23,2006,a project in the Major Program of NSFC-"Evolutionary computation and its application",managed by Prof.Licheng Jiao,Prof.Lishan Kang,Prof.Zhenya He,and Prof.Tao Xie,passed its Final Qualification Process and was evaluated as Excellent.

  18. 2nd International Conference on Computer and Communication Technologies

    CERN Document Server

    Raju, K; Mandal, Jyotsna; Bhateja, Vikrant

    2016-01-01

    The book is about all aspects of computing, communication, general sciences and educational research covered at the Second International Conference on Computer & Communication Technologies held during 24-26 July 2015 at Hyderabad. It hosted by CMR Technical Campus in association with Division – V (Education & Research) CSI, India. After a rigorous review only quality papers are selected and included in this book. The entire book is divided into three volumes. Three volumes cover a variety of topics which include medical imaging, networks, data mining, intelligent computing, software design, image processing, mobile computing, digital signals and speech processing, video surveillance and processing, web mining, wireless sensor networks, circuit analysis, fuzzy systems, antenna and communication systems, biomedical signal processing and applications, cloud computing, embedded systems applications and cyber security and digital forensic. The readers of these volumes will be highly benefited from the te...

  19. International Conference on Computer Science and Information Technology

    CERN Document Server

    Li, Xiaolong

    2014-01-01

    The main objective of CSAIT 2013 is to provide a forum for researchers, educators, engineers and government officials involved in the general areas of Computational Sciences and Information Technology to disseminate their latest research results and exchange views on the future research directions of these fields. A medium like this provides an opportunity to the academicians and industrial professionals to exchange and integrate practice of computer science, application of the academic ideas, improve the academic depth. The in-depth discussions on the subject provide an international communication platform for educational technology and scientific research for the world's universities, engineering field experts, professionals and business executives.

  20. Existential Computer Anxiety and Changes in Computer Technology: What Past Research on Computer Anxiety Has Missed.

    Science.gov (United States)

    Worthington, Valerie L.; Zhao, Yong

    1999-01-01

    Proposes that the existing literature on computer anxiety has neglected to consider two issues: (1) that there is an existential element to computer anxiety, and (2) that computer technology has undergone historical changes that bring with them subsequent changes in the metaphors used to understand computers. (Contains 72 references.) (Author/LRW)

  1. The Mechanism about Key and Credential on Trusted Computing Platform and the Application Study

    Institute of Scientific and Technical Information of China (English)

    SHEN Zhidong; ZHANG Huanguo; ZHANG Miao; YAN Fei; ZHANG Liqiang

    2006-01-01

    Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cryptology. In this paper, we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. We give an example application to illustrate that the TPM enabled key and credential mechanism can improve the security of computer system.

  2. Managing Associated Risks in Cloud Computer Applications Abstract

    African Journals Online (AJOL)

    2012-12-01

    Dec 1, 2012 ... cloud computing as a technology and has chosen the party agent reports of an electoral process as a case ... Business applications are moving to the cloud. ..... activity going on. .... Retrieved from IEEE Xplore Digital Library:.

  3. Extending the horizons advances in computing, optimization, and decision technologies

    CERN Document Server

    Joseph, Anito; Mehrotra, Anuj; Trick, Michael

    2007-01-01

    Computer Science and Operations Research continue to have a synergistic relationship and this book represents the results of cross-fertilization between OR/MS and CS/AI. It is this interface of OR/CS that makes possible advances that could not have been achieved in isolation. Taken collectively, these articles are indicative of the state-of-the-art in the interface between OR/MS and CS/AI and of the high caliber of research being conducted by members of the INFORMS Computing Society. EXTENDING THE HORIZONS: Advances in Computing, Optimization, and Decision Technologies is a volume that presents the latest, leading research in the design and analysis of algorithms, computational optimization, heuristic search and learning, modeling languages, parallel and distributed computing, simulation, computational logic and visualization. This volume also emphasizes a variety of novel applications in the interface of CS, AI, and OR/MS.

  4. The Computer as Doorstop: Technology as Disempowerment.

    Science.gov (United States)

    Callister, Thomas A., Jr.; Dunne, Faith

    1992-01-01

    Efforts to replace teachers with technology have uniformly failed. Machines are only tools. Good classroom tools extend the teacher's power to create a rich learning environment. If the teacher perceives the tool as master or misconstrues its use, its potential will never be realized. Strategies for computer use must focus on purpose and derive…

  5. Competency Index. [Business/Computer Technologies Cluster.

    Science.gov (United States)

    Ohio State Univ., Columbus. Center on Education and Training for Employment.

    This index allows the user to scan the competencies under each title for the 28 subjects appropriate for use in a competency list for the 12 occupations within the business/computer technologies cluster. Titles of the 28 units are as follows: employability skills; professionalism; teamwork; professional and ethical standards; economic and business…

  6. Application of Robust Design and Advanced Computer Aided Engineering Technologies: Cooperative Research and Development Final Report, CRADA Number CRD-04-143

    Energy Technology Data Exchange (ETDEWEB)

    Thornton, M.

    2013-06-01

    Oshkosh Corporation (OSK) is taking an aggressive approach to implementing advanced technologies, including hybrid electric vehicle (HEV) technology, throughout their commercial and military product lines. These technologies have important implications for OSK's commercial and military customers, including fleet fuel efficiency, quiet operational modes, additional on-board electric capabilities, and lower thermal signature operation. However, technical challenges exist with selecting the optimal HEV components and design to work within the performance and packaging constraints of specific vehicle applications. SK desires to use unique expertise developed at the Department of Energy?s (DOE) National Renewable Energy Laboratory (NREL), including HEV modeling and simulation. These tools will be used to overcome technical hurdles to implementing advanced heavy vehicle technology that meet performance requirements while improving fuel efficiency.

  7. Application of MTC Technology

    Institute of Scientific and Technical Information of China (English)

    1997-01-01

    @@ Following four years of development by the Petroleum Drilling Research Institute of the Ministry of Geology and Mineral Resources, mud transformed to cement slurTy (MTC) well cementing technology has been successfully applied to six test wells located in the Chuanxi and Linpan Oilfields of Sichuan and the Huabei oilfield.

  8. Computer technology in oil refining: cost or benefit

    Energy Technology Data Exchange (ETDEWEB)

    Payne, B. (KBC Process Technology (GB))

    1990-04-01

    There is undoubtedly a commitment in the oil refining industry to computerise wherever possible, and to develop advanced mathematical modelling techniques to improved profitability. However, many oil refiners are now asking themselves whether computer solutions are a cost, or are truly a benefit to their organisation. Problems have been caused by distributed computing running out of control in many organisations. This has been partly brought to reign recently, by advanced networking of PCs along with mainframe facilities, and development of management information systems with common data bases for all users to build their applications on. Implementation of information technology strategies helped many refiners to plan the way ahead for the future. The use of computers across the refining sector in the current marketplace is reviewed. The conclusion drawn is that although computer technology is a cost it can also be ranked as a significant benefit and success in the refining industry at present. (author).

  9. 11th International Conference on Computing and Information Technology

    CERN Document Server

    Meesad, Phayung; Boonkrong, Sirapat

    2015-01-01

    This book presents recent research work and results in the area of communication and information technologies. The book includes the main results of the 11th International Conference on Computing and Information Technology (IC2IT) held during July 2nd-3rd, 2015 in Bangkok, Thailand. The book is divided into the two main parts Data Mining and Machine Learning as well as Data Network and Communications. New algorithms and methods of data mining asr discussed as well as innovative applications and state-of-the-art technologies on data mining, machine learning and data networking.

  10. Study on the application of mobile internet cloud computing platform

    Science.gov (United States)

    Gong, Songchun; Fu, Songyin; Chen, Zheng

    2012-04-01

    The innovative development of computer technology promotes the application of the cloud computing platform, which actually is the substitution and exchange of a sort of resource service models and meets the needs of users on the utilization of different resources after changes and adjustments of multiple aspects. "Cloud computing" owns advantages in many aspects which not merely reduce the difficulties to apply the operating system and also make it easy for users to search, acquire and process the resources. In accordance with this point, the author takes the management of digital libraries as the research focus in this paper, and analyzes the key technologies of the mobile internet cloud computing platform in the operation process. The popularization and promotion of computer technology drive people to create the digital library models, and its core idea is to strengthen the optimal management of the library resource information through computers and construct an inquiry and search platform with high performance, allowing the users to access to the necessary information resources at any time. However, the cloud computing is able to promote the computations within the computers to distribute in a large number of distributed computers, and hence implement the connection service of multiple computers. The digital libraries, as a typical representative of the applications of the cloud computing, can be used to carry out an analysis on the key technologies of the cloud computing.

  11. Technology Applications Report

    Science.gov (United States)

    1995-01-01

    Santa Barbara Research Center, or SBRC (Santa Barbara, CA), is selling an infrared (IR) remote sensing device called Smog Dog ™, which " sniffs out" the...MEDICAL TECHNOLOGIES X-Ray Detector For Cancer May Save Lives 66 Pattern Recognition Speeds Detection Of Breast Cancer 67 Lasers Target Blood Clots...For Cancer May Save Lives 66 Pattern Recognition Speeds Detection Of Breast Cancer 67 Lasers Target Blood Clots In New Method 68 Blood Glucose

  12. Microencapsulation Technology and Applications

    OpenAIRE

    Rama Dubey

    2009-01-01

    Microencapsulation technology allows a compound to be encapsulated inside a tiny sphere known as microsphere/microcapsule, having an average diameter as small as 1 mm to several hundred micro meters. Many different active materials like drugs, enzymes, vitamins, pesticides, flavours and catalysts have been successfully encapsulated inside microballoons or microcapsules made from a variety of polymeric and non polymeric materials including poly(ethylene glycol)s, poly(methacrylate)s, poly(styr...

  13. Combinatorial methods with computer applications

    CERN Document Server

    Gross, Jonathan L

    2007-01-01

    Combinatorial Methods with Computer Applications provides in-depth coverage of recurrences, generating functions, partitions, and permutations, along with some of the most interesting graph and network topics, design constructions, and finite geometries. Requiring only a foundation in discrete mathematics, it can serve as the textbook in a combinatorial methods course or in a combined graph theory and combinatorics course.After an introduction to combinatorics, the book explores six systematic approaches within a comprehensive framework: sequences, solving recurrences, evaluating summation exp

  14. New ultraportable display technology and applications

    Science.gov (United States)

    Alvelda, Phillip; Lewis, Nancy D.

    1998-08-01

    MicroDisplay devices are based on a combination of technologies rooted in the extreme integration capability of conventionally fabricated CMOS active-matrix liquid crystal display substrates. Customized diffraction grating and optical distortion correction technology for lens-system compensation allow the elimination of many lenses and systems-level components. The MicroDisplay Corporation's miniature integrated information display technology is rapidly leading to many new defense and commercial applications. There are no moving parts in MicroDisplay substrates, and the fabrication of the color generating gratings, already part of the CMOS circuit fabrication process, is effectively cost and manufacturing process-free. The entire suite of the MicroDisplay Corporation's technologies was devised to create a line of application- specific integrated circuit single-chip display systems with integrated computing, memory, and communication circuitry. Next-generation portable communication, computer, and consumer electronic devices such as truly portable monitor and TV projectors, eyeglass and head mounted displays, pagers and Personal Communication Services hand-sets, and wristwatch-mounted video phones are among the may target commercial markets for MicroDisplay technology. Defense applications range from Maintenance and Repair support, to night-vision systems, to portable projectors for mobile command and control centers.

  15. Proposal for grid computing for nuclear applications

    Energy Technology Data Exchange (ETDEWEB)

    Idris, Faridah Mohamad; Ismail, Saaidi; Haris, Mohd Fauzi B.; Sulaiman, Mohamad Safuan B.; Aslan, Mohd Dzul Aiman Bin.; Samsudin, Nursuliza Bt.; Ibrahim, Maizura Bt.; Ahmad, Megat Harun Al Rashid B. Megat; Yazid, Hafizal B.; Jamro, Rafhayudi B.; Azman, Azraf B.; Rahman, Anwar B. Abdul; Ibrahim, Mohd Rizal B. Mamat; Muhamad, Shalina Bt. Sheik; Hassan, Hasni [Malaysian Nuclear Agency, Bangi, 43000 Kajang, Selangor (Malaysia); Abdullah, Wan Ahmad Tajuddin Wan; Ibrahim, Zainol Abidin; Zolkapli, Zukhaimira; Anuar, Afiq Aizuddin; Norjoharuddeen, Nurfikri [Physics Department, University of Malaya, 56003 Kuala Lumpur (Malaysia); and others

    2014-02-12

    The use of computer clusters for computational sciences including computational physics is vital as it provides computing power to crunch big numbers at a faster rate. In compute intensive applications that requires high resolution such as Monte Carlo simulation, the use of computer clusters in a grid form that supplies computational power to any nodes within the grid that needs computing power, has now become a necessity. In this paper, we described how the clusters running on a specific application could use resources within the grid, to run the applications to speed up the computing process.

  16. Future Computing Technology (1/3)

    CERN Document Server

    CERN. Geneva

    2015-01-01

    Computing of the future will be affected by a number of fundamental technologies in development today, many of which are already on the way to becoming commercialized. In this series of lectures, we will discuss hardware and software development that will become mainstream in the timeframe of a few years and how they will shape or change the computing landscape - commercial and personal alike. Topics range from processor and memory aspects, programming models and the limits of artificial intelligence, up to end-user interaction with wearables or e-textiles. We discuss the impact of these technologies on the art of programming, the data centres of the future and daily life. Lecturer's short bio: Andrzej Nowak has 10 years of experience in computing technologies, primarily from CERN openlab and Intel. At CERN, he managed a research lab collaborating with Intel and was part of the openlab Chief Technology Office. Andrzej also worked closely and initiated projects with the private sector (e.g. HP and Go...

  17. Advanced in Computer Science and its Applications

    CERN Document Server

    Yen, Neil; Park, James; CSA 2013

    2014-01-01

    The theme of CSA is focused on the various aspects of computer science and its applications for advances in computer science and its applications and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of computer science and its applications. Therefore this book will be include the various theories and practical applications in computer science and its applications.

  18. Bioprinting technology and its applications.

    Science.gov (United States)

    Seol, Young-Joon; Kang, Hyun-Wook; Lee, Sang Jin; Atala, Anthony; Yoo, James J

    2014-09-01

    Bioprinting technology has emerged as a powerful tool for building tissue and organ structures in the field of tissue engineering. This technology allows precise placement of cells, biomaterials and biomolecules in spatially predefined locations within confined three-dimensional (3D) structures. Various bioprinting technologies have been developed and utilized for applications in life sciences, ranging from studying cellular mechanisms to constructing tissues and organs for implantation, including heart valve, myocardial tissue, trachea and blood vessels. In this article, we introduce the general principles and limitations of the most widely used bioprinting technologies, including jetting- and extrusion-based systems. Application-based research focused on tissue regeneration is presented, as well as the current challenges that hamper clinical utility of bioprinting technology.

  19. Plasma applications for biochip technology

    Energy Technology Data Exchange (ETDEWEB)

    Ichiki, T.; Sugiyama, Y.; Taura, R.; Koidesawa, T.; Horiike, Y

    2003-07-01

    Biochip technology has emerged from the fusion of biotechnology and micro/nanofabrication technology. Biochips enable us to realize revolutionary new bioanalysis systems that can directly manipulate and analyze the micro/nano-scale world of biomolecules, organelles and cells. This paper describes a few bioanalysis systems and the microfabrication technology being developed as examples of the application of plasma technologies for upcoming nanobiotechnology. Deep dry etching of glass plates has been developed and applied to fabricate microfluidic devices that can manipulate biological cells. Moreover, ultra-high-rate localized etching of silicon wafers has been developed using a microplasma jet apparatus for rapid micromachining.

  20. Analysis of cloud computing technology and its application in the enterprise information work%浅析云计算技术及其在企业信息工作中的应用

    Institute of Scientific and Technical Information of China (English)

    何晓东

    2013-01-01

    企业信息化一方面促进了生产率和管理水平的提高,另一方面也给企业引入了新的成本,云计算技术通过网络统一管理和调度计算资源,进而整合企业信息资源,降低企业运营成本.通过对云计算技术的概念、特点、关键技术的研究,结合油田企业信息系统应用现状分析,提出可利用云计算技术提高企业信息应用管理水平.%Enterprise informatization on the one hand promoted the productivity and the improvement of management level, on the other hand also introduced a new to the enterprise cost, cloud computing technology through the network unified management and scheduling computing resources, and further integrating enterprise information resources, reduce the cost of enterprise operation. This article introduces cloud computing technology' s concept, the characteristic, the key techniques of the research, combining oilfield enterprise information system application situation analysis, proposes the available cloud computing technology to improve enterprise information application management level.

  1. Application of Virtual Technology in Computer Experiment Teaching%虚拟技术在计算机实验教学中的应用

    Institute of Scientific and Technical Information of China (English)

    田玉静; 邵景玲; 王玮

    2011-01-01

    In terms of the problems of lacking resources and rapid renewal of computers in the computer experiment,this paper presents the solution of building the virtual machine platform with the virtual technology.Practice shows that the virtual technology can build an intensive and efficient computer experiment platform.The virtual machine made by VMware Workstationex of VMware company is a forceful complement to the present computer experiment source.It can be renewed at any time and meet the requirement of low carbon and environmental protection.The virtual machine can be used to conduct the computer experiment teaching which is difficult to conduct in traditional experimental environment.%针对当前计算机实验资源缺乏和计算机更新快的问题,提出以虚拟技术构建虚拟机试验平台的解决办法。实践证明,虚拟技术可为实验教学和科研构建一个集约高效的计算机实验平台,以VMware公司的VMware Workstation软件创建的虚拟机是对现有计算机实验资源的有力补充,且可随时更新,符合低碳环保的要求。利用虚拟机可方便开展许多传统实验环境下难以开展的计算机实验教学。

  2. Soft Computing Techniques for Process Control Applications

    Directory of Open Access Journals (Sweden)

    Rahul Malhotra

    2011-09-01

    Full Text Available Technological innovations in soft computing techniques have brought automation capabilities to new levelsof applications. Process control is an important application of any industry for controlling the complexsystem parameters, which can greatly benefit from such advancements. Conventional control theory isbased on mathematical models that describe the dynamic behaviour of process control systems. Due to lackin comprehensibility, conventional controllers are often inferior to the intelligent controllers. Softcomputing techniques provide an ability to make decisions and learning from the reliable data or expert’sexperience. Moreover, soft computing techniques can cope up with a variety of environmental and stabilityrelated uncertainties. This paper explores the different areas of soft computing techniques viz. Fuzzy logic,genetic algorithms and hybridization of two and abridged the results of different process control casestudies. It is inferred from the results that the soft computing controllers provide better control on errorsthan conventional controllers. Further, hybrid fuzzy genetic algorithm controllers have successfullyoptimized the errors than standalone soft computing and conventional techniques.

  3. Ultrasonics: Fundamentals, Technologies, and Applications

    Energy Technology Data Exchange (ETDEWEB)

    Ensminger, Dale; Bond, Leonard J.

    2011-09-17

    This is a new edition of a bestselling industry reference. Discusses the science, technology, and applications of low and high power ultrasonics, including industrial implementations and medical uses. Reviews the basic equations of acoustics, starting from basic wave equations and their applications. New material on property determination, inspection of metals (NDT) and non-metals, imaging, process monitoring and control. Expanded discussion of transducers, transducer wave-fields, scattering, attenuation and measurement systems and models. New material that discusses high power ultrasonics - in particular using mechanical effects and sonochemistry, including applications to nano-materials. Examines diagnosis, therapy, and surgery from a technology and medical physics perspective.

  4. Ultraviolet laser technology and applications

    CERN Document Server

    Elliott, David L

    1995-01-01

    Ultraviolet Laser Technology and Applications is a hands-on reference text that identifies the main areas of UV laser technology; describes how each is applied; offers clearly illustrated examples of UV opticalsystems applications; and includes technical data on optics, lasers, materials, and systems. This book is unique for its comprehensive, in-depth coverage. Each chapter deals with a different aspect of the subject, beginning with UV light itself; moving through the optics, sources, and systems; and concluding with detailed descriptions of applications in various fields.The text enables pr

  5. Innovative Use of Cloud Computing in Smart Phone Technology

    Directory of Open Access Journals (Sweden)

    Vaibhav Rana

    2013-07-01

    Full Text Available This paper elaborates the vital and innovative use of Cloud computing in the field of Smart Phone Technology. In the proposed environment there is a cloud server installed at the central place called as cloud center of mobile computing. The function of cloud computing is to accept the request of the end users and process the required applications accordingly. Henceforth this server is fully equipped with all advance ICT infrastructure, mobile communication utilities and full security measure, so that every feature can be used with full security. All users are having equal priority to get connection with the cloud server and use every application as well as each function equally. Due to use of this modern technology the main advantage is that a single entity is being used by many remote users for various requirements at the same time without occupying much space and infrastructure. The resulting new paradigm of mobile cloud computing is being embraced by researchers, professionals and practitioners as an exciting new way to extend the capabilities of mobile devices and mobile platforms. This has the potential for profound impacts on the business environment and people's daily life. The most salient feature of the system is that by the use of this infrastructure we can perform mobile communication and electronic communication by a single unit and the same communication spectrum. The presented cloud computing technology offers a natural solution for expending the limited capabilities of mobile devices. This process makes the whole communication system cost effective, efficient, transparent, modular system.

  6. Soft Computing in Construction Information Technology

    NARCIS (Netherlands)

    Ciftcioglu, O.; Durmisevic, S.; Sariyildiz, S.

    2001-01-01

    The last decade, civil engineering has exercised a rapidly growing interest in the application of neurally inspired computing techniques. The motive for this interest was the promises of certain information processing characteristics, which are similar to some extend, to those of human brain. The im

  7. Soft Computing in Construction Information Technology

    NARCIS (Netherlands)

    Ciftcioglu, O.; Durmisevic, S.; Sariyildiz, S.

    2001-01-01

    The last decade, civil engineering has exercised a rapidly growing interest in the application of neurally inspired computing techniques. The motive for this interest was the promises of certain information processing characteristics, which are similar to some extend, to those of human brain. The im

  8. 计算机网页制作技术应用及流程管理%Application and Process Management of Computer Webpage Making Technology

    Institute of Scientific and Technical Information of China (English)

    张彦

    2015-01-01

    随着计算机网络技术的飞速发展,网页制作将成为计算机用户必须掌握的一门知识。本文就计算机网页设计中的布局展开论述,从网页设计中的布局的相关概念、计算机设计中网页布局的重要性、常见的网页设计布局以及其特点、如何进行网页设计中的布局等方面进行分析。%With the rapid development of computer network technology, webpage making will become the knowledge of computer user must master. This article launches the layout in computer webpage design and analyzes the related concepts about the layout in webpage design, the importance of webpage layout in computer design, common webpage design layouts and their characteristics, and the ways for webpage layout in webpage design.

  9. Hybrid Nanoelectronics: Future of Computer Technology

    Institute of Scientific and Technical Information of China (English)

    Wei Wang; Ming Liu; Andrew Hsu

    2006-01-01

    Nanotechnology may well prove to be the 21st century's new wave of scientific knowledge that transforms people's lives. Nanotechnology research activities are booming around the globe. This article reviews the recent progresses made on nanoelectronic research in US and China, and introduces several novel hybrid solutions specifically useful for future computer technology. These exciting new directions will lead to many future inventions, and have a huge impact to research communities and industries.

  10. Computer Education and Instructional Technology Teacher Trainees' Opinions about Cloud Computing Technology

    Science.gov (United States)

    Karamete, Aysen

    2015-01-01

    This study aims to show the present conditions about the usage of cloud computing in the department of Computer Education and Instructional Technology (CEIT) amongst teacher trainees in School of Necatibey Education, Balikesir University, Turkey. In this study, a questionnaire with open-ended questions was used. 17 CEIT teacher trainees…

  11. Computer Education and Instructional Technology Teacher Trainees' Opinions about Cloud Computing Technology

    Science.gov (United States)

    Karamete, Aysen

    2015-01-01

    This study aims to show the present conditions about the usage of cloud computing in the department of Computer Education and Instructional Technology (CEIT) amongst teacher trainees in School of Necatibey Education, Balikesir University, Turkey. In this study, a questionnaire with open-ended questions was used. 17 CEIT teacher trainees…

  12. Mastering cloud computing foundations and applications programming

    CERN Document Server

    Buyya, Rajkumar; Selvi, SThamarai

    2013-01-01

    Mastering Cloud Computing is designed for undergraduate students learning to develop cloud computing applications. Tomorrow's applications won't live on a single computer but will be deployed from and reside on a virtual server, accessible anywhere, any time. Tomorrow's application developers need to understand the requirements of building apps for these virtual systems, including concurrent programming, high-performance computing, and data-intensive systems. The book introduces the principles of distributed and parallel computing underlying cloud architectures and specifical

  13. Compiler Technology for Parallel Scientific Computation

    Directory of Open Access Journals (Sweden)

    Can Özturan

    1994-01-01

    Full Text Available There is a need for compiler technology that, given the source program, will generate efficient parallel codes for different architectures with minimal user involvement. Parallel computation is becoming indispensable in solving large-scale problems in science and engineering. Yet, the use of parallel computation is limited by the high costs of developing the needed software. To overcome this difficulty we advocate a comprehensive approach to the development of scalable architecture-independent software for scientific computation based on our experience with equational programming language (EPL. Our approach is based on a program decomposition, parallel code synthesis, and run-time support for parallel scientific computation. The program decomposition is guided by the source program annotations provided by the user. The synthesis of parallel code is based on configurations that describe the overall computation as a set of interacting components. Run-time support is provided by the compiler-generated code that redistributes computation and data during object program execution. The generated parallel code is optimized using techniques of data alignment, operator placement, wavefront determination, and memory optimization. In this article we discuss annotations, configurations, parallel code generation, and run-time support suitable for parallel programs written in the functional parallel programming language EPL and in Fortran.

  14. Mobility management principle, technology and applications

    CERN Document Server

    Chen, Shanzhi; Hu, Bo; Ai, Ming

    2016-01-01

    This is the first book devoted to mobility management, covering the important principles, technologies and applications of mobility management based on years of academic research and industry experiences. The content is organized according to the reference models proposed by the authors, and emphasizes on technical principles rather than protocol details; a systematic and comprehensive introduction is presented yet without losing focuses; the existing technologies in cellular system, mobile Internet and IMS/SIP are also extensively compared. This book can be an indispensable reference for mobile communication engineers, computer network engineers, researchers and anyone else involved in academic, industrial and standardization activities on mobility management.

  15. Technology applications bulletins: Number one

    Energy Technology Data Exchange (ETDEWEB)

    Koncinski, W. Jr. (ed.)

    1989-02-01

    Martin Marietta Energy Systems, Inc. (Energy Systems), operates five facilities for the US Department of Energy (DOE): the Oak Ridge National Laboratory (ORNL), which is a large, multidisciplinary research and development (R and D) center whose primary mission is energy research; the Oak Ridge Y-12 Plant, which engages in defense research, development, and production; and the uranium-enrichment plants at Oak Ridge; Paducah, Kentucky; and Portsmouth, Ohio. Much of the research carried out at these facilities is of interest to industry and to state or local governments. To make information about this research available, the Energy Systems Office of Technology Applications publishes brief descriptions of selected technologies and reports. These technology applications bulletins describe the new technology and inform the reader about how to obtain further information, gain access to technical resources, and initiate direct contact with Energy Systems researchers.

  16. Experiences with distributed computing for meteorological applications: grid computing and cloud computing

    OpenAIRE

    Oesterle, F.; Ostermann, S; R. Prodan; G. J. Mayr

    2015-01-01

    Experiences with three practical meteorological applications with different characteristics are used to highlight the core computer science aspects and applicability of distributed computing to meteorology. Through presenting cloud and grid computing this paper shows use case scenarios fitting a wide range of meteorological applications from operational to research studies. The paper concludes that distributed computing complements and extends existing high performance comput...

  17. SCADA Application for ACTS Technology

    Science.gov (United States)

    Fairbanks, Barry

    1992-01-01

    The results of a system level study done by Hughes Network Systems for NASA are presented. For the supervisory control and data acquisition (SCADA) application, use of Ka-band spot beam satellite technology associated with NASA's Advanced Communication Technology Satellite (ACTS) offers a reduction in Earth station antenna size and transmitter power that may translate into lower system costs. The approaches taken to determine commercial potential of the system are described.

  18. NASA Technology Applications Team: Commercial applications of aerospace technology

    Science.gov (United States)

    1994-01-01

    The Research Triangle Institute (RTI) Team has maintained its focus on helping NASA establish partnerships with U.S. industry for dual use development and technology commercialization. Our emphasis has been on outcomes, such as licenses, industry partnerships and commercialization of technologies, that are important to NASA in its mission of contributing to the improved competitive position of U.S. industry. The RTI Team has been successful in the development of NASA/industry partnerships and commercialization of NASA technologies. RTI ongoing commitment to quality and customer responsiveness has driven our staff to continuously improve our technology transfer methodologies to meet NASA's requirements. For example, RTI has emphasized the following areas: (1) Methodology For Technology Assessment and Marketing: RTI has developed and implemented effective processes for assessing the commercial potential of NASA technologies. These processes resulted from an RTI study of best practices, hands-on experience, and extensive interaction with the NASA Field Centers to adapt to their specific needs. (2) Effective Marketing Strategies: RTI surveyed industry technology managers to determine effective marketing tools and strategies. The Technology Opportunity Announcement format and content were developed as a result of this industry input. For technologies with a dynamic visual impact, RTI has developed a stand-alone demonstration diskette that was successful in developing industry interest in licensing the technology. And (3) Responsiveness to NASA Requirements: RTI listened to our customer (NASA) and designed our processes to conform with the internal procedures and resources at each NASA Field Center and the direction provided by NASA's Agenda for Change. This report covers the activities of the Research Triangle Institute Technology Applications Team for the period 1 October 1993 through 31 December 1994.

  19. NASA technology applications team: Applications of aerospace technology

    Science.gov (United States)

    1993-01-01

    This report covers the activities of the Research Triangle Institute (RTI) Technology Applications Team for the period 1 October 1992 through 30 September 1993. The work reported herein was supported by the National Aeronautics and Space Administration (NASA), Contract No. NASW-4367. Highlights of the RTI Applications Team activities over the past year are presented in Section 1.0. The Team's progress in fulfilling the requirements of the contract is summarized in Section 2.0. In addition to our market-driven approach to applications project development, RTI has placed increased effort on activities to commercialize technologies developed at NASA Centers. These Technology Commercialization efforts are summarized in Section 3.0. New problem statements prepared by the Team in the reporting period are presented in Section 4.0. The Team's transfer activities for ongoing projects with the NASA Centers are presented in Section 5.0. Section 6.0 summarizes the status of four add-on tasks. Travel for the reporting period is described in Section 7.0. The RTI Team staff and consultants and their project responsibilities are listed in Appendix A. Appendix B includes Technology Opportunity Announcements and Spinoff! Sheets prepared by the Team while Appendix C contains a series of technology transfer articles prepared by the Team.

  20. Platforms for Building and Deploying Applications for Cloud Computing

    CERN Document Server

    Buyya, Rajkumar

    2011-01-01

    Cloud computing is rapidly emerging as a new paradigm for delivering IT services as utlity-oriented services on subscription-basis. The rapid development of applications and their deployment in Cloud computing environments in efficient manner is a complex task. In this article, we give a brief introduction to Cloud computing technology and Platform as a Service, we examine the offerings in this category, and provide the basis for helping readers to understand basic application platform opportunities in Cloud by technologies such as Microsoft Azure, Sales Force, Google App, and Aneka for Cloud computing. We demonstrate that Manjrasoft Aneka is a Cloud Application Platform (CAP) leveraging these concepts and allowing an easy development of Cloud ready applications on a Private/Public/Hybrid Cloud. Aneka CAP offers facilities for quickly developing Cloud applications and a modular platform where additional services can be easily integrated to extend the system capabilities, thus being at pace with the rapidly ev...

  1. Advances in Computing and Information Technology : Proceedings of the Second International

    CERN Document Server

    Nagamalai, Dhinaharan; Chaki, Nabendu

    2012-01-01

    The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, ...

  2. International Conference on Frontiers of Intelligent Computing : Theory and Applications

    CERN Document Server

    Udgata, Siba; Biswal, Bhabendra

    2014-01-01

    This volume contains the papers presented at the Second International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA-2013) held during 14-16 November 2013 organized by Bhubaneswar Engineering College (BEC), Bhubaneswar, Odisha, India. It contains 63 papers focusing on application of intelligent techniques which includes evolutionary computation techniques like genetic algorithm, particle swarm optimization techniques, teaching-learning based optimization etc  for various engineering applications such as data mining, Fuzzy systems, Machine Intelligence and ANN, Web technologies and Multimedia applications and Intelligent computing and Networking etc.

  3. 计算流体力学技术在粮食储藏中的应用%Application of Computational Fluid Dynamics Technology in Grain Storage Systems

    Institute of Scientific and Technical Information of China (English)

    王远成; 张忠杰; 吴子丹; 丁德强; 王双凤

    2012-01-01

    Computational Fluid Dynamics(CFD)is a simulation tool,which uses powerful computer and applied mathematics to model fluid flow situations for the prediction of heat, mass, momentum transfer and optimal design in industrial processes. This paper reviews the application of CFD in grain storage systems including cooling ventilation, drying ventilation,ecosystems in ventilation,natural convection heat and moisture transfer without aeration. The advantages of using CFD are discussed and the future of CFD applications is also outlined.%计算流体动力学(computationalFluidDynamics,简称CFD)是通过计算机数值计算和图像显示,对包含有流体流动、热量和质量传递等相关物理现象所做的分析、计算和优化的数值模拟工具.通过CFD技术在储粮通风工程中的应用实例,对CFD技术进行了介绍,并对采用CFD技术模拟储粮中的通风过程中流动、热湿传递过程和生态系统的研究现状进行了综述,探讨了采用CFD对储粮中的流动、传热传质过程进行数值模拟的优势以及未来发展趋势.

  4. Soft computing application in bioinformatics

    Institute of Scientific and Technical Information of China (English)

    MITRA Sushmita

    2008-01-01

    This article provides an outline on a recent application of soft computing for the mining of microarray gene expres-sions. We describe investigations with an evolutionary-rough feature selection algorithm for feature selection and classifica-tion on cancer data. Rough set theory is employed to generate reducts, which represent the minimal sets of non-redundant eatures capable of discerning between all objects, in a multi-objective framework. The experimental results demonstrate the ffectiveness of the methodology on three cancer datasets.

  5. Research and Application of Security Evaluation Technology Model about Cloud Computing Service%云计算服务安全评估技术模型研究及应用

    Institute of Scientific and Technical Information of China (English)

    朱圣才

    2015-01-01

    cloud computing service is one of the hot topic in the IT industry at present, in the face of the growing popularity of cloud computing services, how to correctly and objectively make safety evaluation to cloud computing service, is now more concerned about the topic, this paper presents a technology assessment model of cloud computing services based on the infrastructure of cloud computing services, the model is more comprehensive, hierarchical on cloud computing were divided, good universality, and finally through the concrete application confirms the applicability and scientific of the model.%云计算服务是目前IT产业中比较热门的话题之一,面对日益普及的云计算服务,如何正确、客观的对云计算服务的安全性做出评价,是现今比较关注的课题,文章提出了一种基于云计算基础模型之上的云计算服务技术评估模型,该模型比较全面、层次化的对云计算进行了划分,具有较好的普适性,最后通过具体的应用证实了该模型的适用性、科学性。

  6. 刍议计算机“虚拟现实”技术在高校体育训练中的应用%The application of computer technology in the"virtual reality"in sports training

    Institute of Scientific and Technical Information of China (English)

    孙萌

    2013-01-01

    With the development of economy,the role of computer technology in the field of education gradually,especially the application of computer technology greatly represented by multimedia promotes the teaching quality.Virtual reality technology provides a new means of teaching for the college physical education,to promote the college physical education teaching level.However,some problems still exist in the practical application of virtual reality technology in the process,in order to improve the efficiency of college physical training,and promote the level of application of virtual reality technology,based on the virtual reality technology is discussed.%随着经济的发展,计算机技术在教育领域的作用逐渐凸显,尤其是以多媒体技术为代表的计算机应用技术极大程度的推动了教学质量。计算机虚拟现实技术也为高校体育教学提供了新的教学手段,促进了高校体育教学水平的提高。然而在实际应用虚拟现实技术过程中还存在着一些问题,为提高高校体育训练的效率,促进虚拟现实技术应用水平,本文以虚拟现实技术特点为基础展开论述。

  7. Multimedia Instructional Tools and Student Learning in Computer Applications Courses

    Science.gov (United States)

    Chapman, Debra Laier

    2013-01-01

    Advances in technology and changes in educational strategies have resulted in the integration of technology into the classroom. Multimedia instructional tools (MMIT) have been identified as a way to provide student-centered active-learning instructional material to students. MMITs are common in introductory computer applications courses based on…

  8. Cloud computing and digital media fundamentals, techniques, and applications

    CERN Document Server

    Li, Kuan-Ching; Shih, Timothy K

    2014-01-01

    Cloud Computing and Digital Media: Fundamentals, Techniques, and Applications presents the fundamentals of cloud and media infrastructure, novel technologies that integrate digital media with cloud computing, and real-world applications that exemplify the potential of cloud computing for next-generation digital media. It brings together technologies for media/data communication, elastic media/data storage, security, authentication, cross-network media/data fusion, interdevice media interaction/reaction, data centers, PaaS, SaaS, and more.The book covers resource optimization for multimedia clo

  9. DECHEMA annual meetings `96. Summaries. Vol. 2. Plenary papers, technical meeting on safety technology, technical meeting on computer applications in the chemical industry, technical meeting on membranes in process technology, technical meeting on dispersions, technical meeting on reaction technology, information day on sonochemistry; DECHEMA-Jahrestagungen `96. Kurzfassungen. Bd. 2. Plenarvortraege - Fachtreffen Sicherheitstechnik - Fachtreffen Computeranwendung in der Chemischen Industrie - Fachtreffen Membranen in der Prozesstechnik - Fachtreffen Dispersionen - Fachtreffen Reaktionstechnik - Informationstag Sonochemie

    Energy Technology Data Exchange (ETDEWEB)

    Kreysa, G. [ed.

    1996-08-01

    This volume comprises the programme of the annual meeting and the summaries of the lectures given. The following subjects were discussed: Safety technology, computer applications in the chemical industry, membranes in process technology, dispersions, reaction technology, sonochemistry. (SR) [Deutsch] Dieser Band enthaelt das Programm der Jahrestagung und die Kurzfassungen der Vortraege. Folgende Gebiete werden behandelt: Sicherheitstechnik, Computeranwendungen in der Chemischen Industrie, Membranen in der Prozesstechnik, Dispersionen, Reaktionstechnik, Sonochemie. (SR)

  10. 计算机技术在人类工效学当中的应用%Application of Computer Technology in Ergonomics

    Institute of Scientific and Technical Information of China (English)

    束奇; 秦臻

    2012-01-01

    Taking two kinds of industrial software of computer as examples, based on the trends of human-computer interface design, from improving operational efficiency, operational reliability, the article makes a study and optimization for man-machine interface design case. At last, based on the analysis of the software design process, a new idea about man-machine optimization design by using computer technology is put forward.%本文以计算机平台上两种工业软件为例,在人机界面设计发展趋势的基础上,从提高操作效率、操作可靠性的角度,对操作平台人机界面设计方案进行了研究与优化,最终通过对两个软件设计过程的综述得到一条利用计算机技术来进行人机优化设计的新思路.

  11. Terascale Computing in Accelerator Science and Technology

    Energy Technology Data Exchange (ETDEWEB)

    Ko, Kwok

    2002-08-21

    We have entered the age of ''terascale'' scientific computing. Processors and system architecture both continue to evolve; hundred-teraFLOP computers are expected in the next few years, and petaFLOP computers toward the end of this decade are conceivable. This ever-increasing power to solve previously intractable numerical problems benefits almost every field of science and engineering and is revolutionizing some of them, notably including accelerator physics and technology. At existing accelerators, it will help us optimize performance, expand operational parameter envelopes, and increase reliability. Design decisions for next-generation machines will be informed by unprecedented comprehensive and accurate modeling, as well as computer-aided engineering; all this will increase the likelihood that even their most advanced subsystems can be commissioned on time, within budget, and up to specifications. Advanced computing is also vital to developing new means of acceleration and exploring the behavior of beams under extreme conditions. With continued progress it will someday become reasonable to speak of a complete numerical model of all phenomena important to a particular accelerator.

  12. Lattice engineering technology and applications

    CERN Document Server

    Wang, Shumin

    2012-01-01

    This book contains comprehensive reviews of different technologies to harness lattice mismatch in semiconductor heterostructures and their applications in electronic and optoelectronic devices. While the book is a bit focused on metamorphic epitaxial growth, it also includes other methods like compliant substrate, selective area growth, wafer bonding and heterostructure nanowires etc. Basic knowledge on dislocations in semiconductors and innovative methods to eliminate threading dislocations are provided, and successful device applications are reviewed. It covers a variety of important semicon

  13. Genetic Algorithm Modeling with GPU Parallel Computing Technology

    CERN Document Server

    Cavuoti, Stefano; Brescia, Massimo; Pescapé, Antonio; Longo, Giuseppe; Ventre, Giorgio

    2012-01-01

    We present a multi-purpose genetic algorithm, designed and implemented with GPGPU / CUDA parallel computing technology. The model was derived from a multi-core CPU serial implementation, named GAME, already scientifically successfully tested and validated on astrophysical massive data classification problems, through a web application resource (DAMEWARE), specialized in data mining based on Machine Learning paradigms. Since genetic algorithms are inherently parallel, the GPGPU computing paradigm has provided an exploit of the internal training features of the model, permitting a strong optimization in terms of processing performances and scalability.

  14. Creating the Environment for the Prosperity of Cloud Computing Technology

    Directory of Open Access Journals (Sweden)

    Wen-Hsing Lai

    2012-08-01

    Full Text Available The key point for the success of clouding computing technology in terms of application is whether such operation can produce the sense of trustworthiness to its users. Technical measurement has always been the fundamental preventive precaution, no matter what kind of aspect in dealing with producing the sense of trustworthiness.  Except technical measurement, there are two developing issues surrounding the central idea worth notice, which are the protection of information privacy and the jurisdictional issue. The main purpose of this article is to focus on the issue of protecting information privacy and jurisdictional problem through the newly developed cloud computing technology. This article will first introduce the characteristics of cloud computing technology in order to pave the way for further discussion. Then the issue of protecting information privacy and jurisdictional problem will be discussed through disparity of legal protection of information privacy and principles for asserting jurisdiction within Internet. The personal observation and suggestion will be made at the end of this article for a future possible adjustment of infrastructure for the protection of information privacy and jurisdictional decision within cyberspace in order to promote the sense of trustworthiness of the cloud computing technology user.

  15. Lunar Applications in Reconfigurable Computing

    Science.gov (United States)

    Somervill, Kevin

    2008-01-01

    NASA s Constellation Program is developing a lunar surface outpost in which reconfigurable computing will play a significant role. Reconfigurable systems provide a number of benefits over conventional software-based implementations including performance and power efficiency, while the use of standardized reconfigurable hardware provides opportunities to reduce logistical overhead. The current vision for the lunar surface architecture includes habitation, mobility, and communications systems, each of which greatly benefit from reconfigurable hardware in applications including video processing, natural feature recognition, data formatting, IP offload processing, and embedded control systems. In deploying reprogrammable hardware, considerations similar to those of software systems must be managed. There needs to be a mechanism for discovery enabling applications to locate and utilize the available resources. Also, application interfaces are needed to provide for both configuring the resources as well as transferring data between the application and the reconfigurable hardware. Each of these topics are explored in the context of deploying reconfigurable resources as an integral aspect of the lunar exploration architecture.

  16. Quantum technology and its applications

    Energy Technology Data Exchange (ETDEWEB)

    Boshier, Malcolm [Los Alamos National Laboratory; Berkeland, Dana [USG; Govindan, Tr [ARO; Abo - Shaeer, Jamil [DARPA

    2010-12-10

    Quantum states of matter can be exploited as high performance sensors for measuring time, gravity, rotation, and electromagnetic fields, and quantum states of light provide powerful new tools for imaging and communication. Much attention is being paid to the ultimate limits of this quantum technology. For example, it has already been shown that exotic quantum states can be used to measure or image with higher precision or higher resolution or lower radiated power than any conventional technologies, and proof-of-principle experiments demonstrating measurement precision below the standard quantum limit (shot noise) are just starting to appear. However, quantum technologies have another powerful advantage beyond pure sensing performance that may turn out to be more important in practical applications: the potential for building devices with lower size/weight/power (SWaP) and cost requirements than existing instruments. The organizers of Quantum Technology Applications Workshop (QTAW) have several goals: (1) Bring together sponsors, researchers, engineers and end users to help build a stronger quantum technology community; (2) Identify how quantum systems might improve the performance of practical devices in the near- to mid-term; and (3) Identify applications for which more long term investment is necessary to realize improved performance for realistic applications. To realize these goals, the QTAW II workshop included fifty scientists, engineers, managers and sponsors from academia, national laboratories, government and the private-sector. The agenda included twelve presentations, a panel discussion, several breaks for informal exchanges, and a written survey of participants. Topics included photon sources, optics and detectors, squeezed light, matter waves, atomic clocks and atom magnetometry. Corresponding applications included communication, imaging, optical interferometry, navigation, gravimetry, geodesy, biomagnetism, and explosives detection. Participants

  17. Computational intelligence for technology enhanced learning

    Energy Technology Data Exchange (ETDEWEB)

    Xhafa, Fatos [Polytechnic Univ. of Catalonia, Barcelona (Spain). Dept. of Languages and Informatics Systems; Caballe, Santi; Daradoumis, Thanasis [Open Univ. of Catalonia, Barcelona (Spain). Dept. of Computer Sciences Multimedia and Telecommunications; Abraham, Ajith [Machine Intelligence Research Labs (MIR Labs), Auburn, WA (United States). Scientific Network for Innovation and Research Excellence; Juan Perez, Angel Alejandro (eds.) [Open Univ. of Catalonia, Barcelona (Spain). Dept. of Information Sciences

    2010-07-01

    E-Learning has become one of the most wide spread ways of distance teaching and learning. Technologies such as Web, Grid, and Mobile and Wireless networks are pushing teaching and learning communities to find new and intelligent ways of using these technologies to enhance teaching and learning activities. Indeed, these new technologies can play an important role in increasing the support to teachers and learners, to shorten the time to learning and teaching; yet, it is necessary to use intelligent techniques to take advantage of these new technologies to achieve the desired support to teachers and learners and enhance learners' performance in distributed learning environments. The chapters of this volume bring advances in using intelligent techniques for technology enhanced learning as well as development of e-Learning applications based on such techniques and supported by technology. Such intelligent techniques include clustering and classification for personalization of learning, intelligent context-aware techniques, adaptive learning, data mining techniques and ontologies in e-Learning systems, among others. Academics, scientists, software developers, teachers and tutors and students interested in e-Learning will find this book useful for their academic, research and practice activity. (orig.)

  18. Distributed Computing Framework for Synthetic Radar Application

    Science.gov (United States)

    Gurrola, Eric M.; Rosen, Paul A.; Aivazis, Michael

    2006-01-01

    We are developing an extensible software framework, in response to Air Force and NASA needs for distributed computing facilities for a variety of radar applications. The objective of this work is to develop a Python based software framework, that is the framework elements of the middleware that allows developers to control processing flow on a grid in a distributed computing environment. Framework architectures to date allow developers to connect processing functions together as interchangeable objects, thereby allowing a data flow graph to be devised for a specific problem to be solved. The Pyre framework, developed at the California Institute of Technology (Caltech), and now being used as the basis for next-generation radar processing at JPL, is a Python-based software framework. We have extended the Pyre framework to include new facilities to deploy processing components as services, including components that monitor and assess the state of the distributed network for eventual real-time control of grid resources.

  19. 4th International Conference on Applied Computing and Information Technology

    CERN Document Server

    2017-01-01

    This edited book presents scientific results of the 4th International Conference on Applied Computing and Information Technology (ACIT 2016) which was held on December 12–14, 2016 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. The aim of this conference was also to bring out the research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the Program Committee, and underwent further rigorous rounds of review. Th...

  20. Enabling Computational Technologies for Terascale Scientific Simulations

    Energy Technology Data Exchange (ETDEWEB)

    Ashby, S.F.

    2000-08-24

    We develop scalable algorithms and object-oriented code frameworks for terascale scientific simulations on massively parallel processors (MPPs). Our research in multigrid-based linear solvers and adaptive mesh refinement enables Laboratory programs to use MPPs to explore important physical phenomena. For example, our research aids stockpile stewardship by making practical detailed 3D simulations of radiation transport. The need to solve large linear systems arises in many applications, including radiation transport, structural dynamics, combustion, and flow in porous media. These systems result from discretizations of partial differential equations on computational meshes. Our first research objective is to develop multigrid preconditioned iterative methods for such problems and to demonstrate their scalability on MPPs. Scalability describes how total computational work grows with problem size; it measures how effectively additional resources can help solve increasingly larger problems. Many factors contribute to scalability: computer architecture, parallel implementation, and choice of algorithm. Scalable algorithms have been shown to decrease simulation times by several orders of magnitude.

  1. Computer, Informatics, Cybernetics and Applications : Proceedings of the CICA 2011

    CERN Document Server

    Hua, Ertian; Lin, Yun; Liu, Xiaozhu

    2012-01-01

    Computer Informatics Cybernetics and Applications offers 91 papers chosen for publication from among 184 papers accepted for presentation to the International Conference on Computer, Informatics, Cybernetics and Applications 2011 (CICA 2011), held in Hangzhou, China, September 13-16, 2011. The CICA 2011 conference provided a forum for engineers and scientists in academia, industry, and government to address the most innovative research and development including technical challenges and social, legal, political, and economic issues, and to present and discuss their ideas, results, work in progress and experience on all aspects of Computer, Informatics, Cybernetics and Applications. Reflecting the broad scope of the conference, the contents are organized in these topical categories: Communication Technologies and Applications Intelligence and Biometrics Technologies Networks Systems and Web Technologies Data Modeling and Programming Languages Digital Image Processing Optimization and Scheduling Education and In...

  2. Mobile Cloud Computing: A Comparison of Application Models

    CERN Document Server

    Kovachev, Dejan; Klamma, Ralf

    2011-01-01

    Cloud computing is an emerging concept combining many fields of computing. The foundation of cloud computing is the delivery of services, software and processing capacity over the Internet, reducing cost, increasing storage, automating systems, decoupling of service delivery from underlying technology, and providing flexibility and mobility of information. However, the actual realization of these benefits is far from being achieved for mobile applications and open many new research questions. In order to better understand how to facilitate the building of mobile cloud-based applications, we have surveyed existing work in mobile computing through the prism of cloud computing principles. We give a definition of mobile cloud coputing and provide an overview of the results from this review, in particular, models of mobile cloud applications. We also highlight research challenges in the area of mobile cloud computing. We conclude with recommendations for how this better understanding of mobile cloud computing can ...

  3. The Application Research of Cloud Computing Technology in the Electronic Data Investigation and Evidence Collection%云计算技术在电子数据调查与取证中的应用研究

    Institute of Scientific and Technical Information of China (English)

    黄云峰

    2014-01-01

    With the development of cloud computing technology, it has been widely used in many fields. The low storage amount, unseasonal analysis and some other defects that exist in traditional computer forensics can be solved through the cloud computing. The characteristics of efficient computing, virtualization operation of cloud computing technology can expand the storage of evidence, improve the equipment utilization, and shorten the time of evidence and so on. This paper introduces the characteristics of cloud computing and the connotation of electronic data evidence, analyzes the significance of cloud computing to electronic data evidence, and further carries on the analysis and research on the application of cloud computing in electronic data evidence.%随着云计算技术的发展,其已经在许多领域得到广泛的应用。通过云计算技术可以解决传统计算机取证所存在的存储量不足、分析不及时等一些缺陷,因为云计算技术具有高效计算、虚拟化运行等特点,基于这些特点可以扩大证据的储存、提高设备的利用率以及缩短取证时间等等。文章介绍了云计算的特点及电子数据取证的内涵,分析了云计算对电子数据取证的意义,并进一步对云计算在电子数据取证中的应用进行了分析与研究。

  4. Soft Computing Applications : Proceedings of the 5th International Workshop Soft Computing Applications

    CERN Document Server

    Fodor, János; Várkonyi-Kóczy, Annamária; Dombi, Joszef; Jain, Lakhmi

    2013-01-01

                    This volume contains the Proceedings of the 5thInternational Workshop on Soft Computing Applications (SOFA 2012).                                The book covers a broad spectrum of soft computing techniques, theoretical and practical applications employing knowledge and intelligence to find solutions for world industrial, economic and medical problems. The combination of such intelligent systems tools and a large number of applications introduce a need for a synergy of scientific and technological disciplines in order to show the great potential of Soft Computing in all domains.                   The conference papers included in these proceedings, published post conference, were grouped into the following area of research: ·         Soft Computing and Fusion Algorithms in Biometrics, ·         Fuzzy Theory, Control andApplications, ·         Modelling and Control Applications, ·         Steps towa...

  5. Outlook for digital computing and its applications, 1976--1995

    Energy Technology Data Exchange (ETDEWEB)

    Chin, H. W.; Lau, H.; McWilliams, T.; Weisberg, A.; Widdoes, L. C.; Wood, L.

    1976-08-20

    The current status of digital computing technology and its applications are briefly reviewed. A surprise-free (invention-precluding) scenario for predicting the advance of this technology and its applications for the next two decades is developed, and employed to set lower bounds on the performance of digital computing systems and their potential applications. Progress-pacing features are identified, and are seen to be primarily of hardware origin in the near term, and due to software limitations in the longer term. 5 figures, 2 tables.

  6. Microwave mixer technology and applications

    CERN Document Server

    Henderson, Bert

    2013-01-01

    Although microwave mixers play a critical role in wireless communication and other microwave applications employing frequency conversion circuits, engineers find that most books on this subject emphasize theoretical aspects, rather than practical applications. That's about to change with the forthcoming release of Microwave Mixer Technology and Applications. Based on a review of over one thousand patents on mixers and frequency conversion, authors Bert Henderson and Edmar Camargo have written a comprehensive book for mixer designers who want solid ideas for solving their own design challenges.

  7. Industrial Applications of Accelerator Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jaesang; Park, Jaewon; Lee, Chanyoung; and others

    2013-02-15

    PEFP(Proton Engineering Frontier Project) put its aim on development of high power linear proton accelerator and its beam applications. So, it has, since late 1990's, accumulated accelerator and ion source technologies, supplied beam utilization service to related industry. As of now, right after 10 year long project(PEFP), many of its low energy beam technologies seem to be successfully utilized for industrial purpose to meet the market needs, especially in improvement of production process and manufacturing performance, new substance development, etc. In this context, it is high time to carry out in-depth industrialization development on PEFP's retained ion beam technology prowess: To help them diffused profitable markets as soon as possible. So, in this work, through verification on the industrialization feasibility by experiments, it is going to get it started, with cooperation of participatory company, to enter into markets with developed technology and products.

  8. Energy management programs - computer technology, a tool

    Energy Technology Data Exchange (ETDEWEB)

    Perron, G

    1996-08-01

    Energy management systems were defined and reviewed, focusing on how the development in computer technology has impacted on the development of energy management systems. It was shown that the rise of micro-computer systems made it possible to create a tool that is well adapted to the urgent need for optimizing electromechanical systems to meet energy reduction criteria while still maintaining occupant comfort. Two case studies were cited to show the kind of savings realized by the different energy management systems installed. Besides managing energy, energy management systems can also help in detecting certain operating failures or irregularities in equipment configurations, monitoring and measuring energy consumption, as well as performing such peripherally related functions as gathering data about operating and space temperatures.

  9. Development of posture-specific computational phantoms using motion capture technology and application to radiation dose-reconstruction for the 1999 Tokai-Mura nuclear criticality accident

    Science.gov (United States)

    Vazquez, Justin A.; Caracappa, Peter F.; Xu, X. George

    2014-09-01

    The majority of existing computational phantoms are designed to represent workers in typical standing anatomical postures with fixed arm and leg positions. However, workers found in accident-related scenarios often assume varied postures. This paper describes the development and application of two phantoms with adjusted postures specified by data acquired from a motion capture system to simulate unique human postures found in a 1999 criticality accident that took place at a JCO facility in Tokai-Mura, Japan. In the course of this accident, two workers were fatally exposed to extremely high levels of radiation. Implementation of the emergent techniques discussed produced more accurate and more detailed dose estimates for the two workers than were reported in previous studies. A total-body dose of 6.43 and 26.38 Gy was estimated for the two workers, who assumed a crouching and a standing posture, respectively. Additionally, organ-specific dose estimates were determined, including a 7.93 Gy dose to the thyroid and 6.11 Gy dose to the stomach for the crouching worker and a 41.71 Gy dose to the liver and a 37.26 Gy dose to the stomach for the standing worker. Implications for the medical prognosis of the workers are discussed, and the results of this study were found to correlate better with the patient outcome than previous estimates, suggesting potential future applications of such methods for improved epidemiological studies involving next-generation computational phantom tools.

  10. Improving student retention in computer engineering technology

    Science.gov (United States)

    Pierozinski, Russell Ivan

    The purpose of this research project was to improve student retention in the Computer Engineering Technology program at the Northern Alberta Institute of Technology by reducing the number of dropouts and increasing the graduation rate. This action research project utilized a mixed methods approach of a survey and face-to-face interviews. The participants were male and female, with a large majority ranging from 18 to 21 years of age. The research found that participants recognized their skills and capability, but their capacity to remain in the program was dependent on understanding and meeting the demanding pace and rigour of the program. The participants recognized that curriculum delivery along with instructor-student interaction had an impact on student retention. To be successful in the program, students required support in four domains: academic, learning management, career, and social.

  11. Computer Education and Instructional Technology Prospective Teachers’ Perceptions of Technology

    Directory of Open Access Journals (Sweden)

    Ümmü Gülsüm DURUKAN

    2016-04-01

    Full Text Available The purpose of this study is to determine the “technology” perception of prospective computer and instructional technologies (CEIT teachers by metaphors. For this purpose the study was carried out with 53 first-year prospective teachers studying in the Department of CEIT in a public university in the fall term of 2014-2015 academic year. The forms consisting of the statement “Technology is like ……………because ………” written few times were used as a data collection tool. Phenomenography design was used in the study and the data were analyzed by content analysis. According to the study's findings, it was found that out of 118 valid metaphors developed by the prospective teachers, 103 of them were included in positive category, 7 were in negative category and 8 were in the neutral category.

  12. 计算机在化学教学中的应用%The Application of Computer Technology in High School Chemistry Teaching

    Institute of Scientific and Technical Information of China (English)

    秦慧娟

    2013-01-01

    Computer-assisted teaching is the primary tool of high school multi-media teachings. Multi-media animation can stim-ulate students' interests in learning chemistry. Using multimedia 3D production technology, microscopic chemistry world can be displayed as observable macroscopic world with the aid of graph-ic images. Computer-assisted teaching is an effective way to break through the teaching difficulties and further improves the efficiency of classroom teaching.%  计算机辅助教学,是中学多媒体教学应用的主要形式。在化学教学中,运用多媒体动态模拟功能,可激发学生的学习兴趣;运用多媒体三维制作技术,通过图形、图像,把微观世界变成宏观世界,可突破教学难点,进一步提高课堂教学效率。

  13. Virtual Technology Applications Research of University Computer Lab%高校计算机实验中虚拟技术的应用研究

    Institute of Scientific and Technical Information of China (English)

    姜伟

    2011-01-01

    Virtualization technology,the advanced experiment teaching platform can be set up very economically.The experiment platform based on virtual technology can simulate a variety of IT environments to support the experiment teaching of various computer scienc%虚拟技术可以以极低成本构建先进的高校计算机实验教学平台。利用虚拟技术实现的实验平台可以模拟计算机学科需要的IT教学环境,符合计算机实验教学的发展趋势。本文在探讨虚拟化技术的基础上,结合高校计算机实验室建设,给出了具有实用价值的、基于虚拟化的实验教学平台解决方案。

  14. Evaluating Computer Technology Integration in a Centralized School System

    Science.gov (United States)

    Eteokleous, N.

    2008-01-01

    The study evaluated the current situation in Cyprus elementary classrooms regarding computer technology integration in an attempt to identify ways of expanding teachers' and students' experiences with computer technology. It examined how Cypriot elementary teachers use computers, and the factors that influence computer integration in their…

  15. International Conference on Computers and Advanced Technology in Education

    CERN Document Server

    Advanced Information Technology in Education

    2012-01-01

    The volume includes a set of selected papers extended and revised from the 2011 International Conference on Computers and Advanced Technology in Education. With the development of computers and advanced technology, the human social activities are changing basically. Education, especially the education reforms in different countries, has been experiencing the great help from the computers and advanced technology. Generally speaking, education is a field which needs more information, while the computers, advanced technology and internet are a good information provider. Also, with the aid of the computer and advanced technology, persons can make the education an effective combination. Therefore, computers and advanced technology should be regarded as an important media in the modern education. Volume Advanced Information Technology in Education is to provide a forum for researchers, educators, engineers, and government officials involved in the general areas of computers and advanced technology in education to d...

  16. Medical imaging technology and applications

    CERN Document Server

    Iniewski, Krzysztof

    2014-01-01

    The book has two intentions. First, it assembles the latest research in the field of medical imaging technology in one place. Detailed descriptions of current state-of-the-art medical imaging systems (comprised of x-ray CT, MRI, ultrasound, and nuclear medicine) and data processing techniques are discussed. Information is provided that will give interested engineers and scientists a solid foundation from which to build with additional resources. Secondly, it exposes the reader to myriad applications that medical imaging technology has enabled.

  17. Information-Based Computing Technology in Grid%网格中的信息计算技术

    Institute of Scientific and Technical Information of China (English)

    王意洁; 卢锡城

    2003-01-01

    In the view of application requirement ,the concept and framework of information-based computing technology in grid are discussed. The key technologies--metadata catalog and storage resource broker are studied,and the application of information-based computing technology to biology is analyzed.

  18. On the application of computer network technology in electronic information engineering%论电子信息工程中计算机网络技术的应用

    Institute of Scientific and Technical Information of China (English)

    王亚林; 桑伟; 白殿达

    2016-01-01

    Electronic information engineering is influenced by computer network technology,which can effectively realize the efficient use of resources and high-speed transmission of information.The scientific application of computer network technology can promote the further development of electronic information engineering,and promote social progress.This paper mainly discusses the information transmission,security issues and technology application in electronic information engineering.%电子信息工程受到计算机网络技术的影响,有效实现了资源的高效利用与信息的高速传递。计算机网络技术的科学应用可促进电子信息工程的进一步发展,推动社会进步。本文主要对电子信息工程中的信息传递、安全问题以及技术应用进行了探究。

  19. Advances in parallel computer technology for desktop atmospheric dispersion models

    Energy Technology Data Exchange (ETDEWEB)

    Bian, X.; Ionescu-Niscov, S.; Fast, J.D. [Pacific Northwest National Lab., Richland, WA (United States); Allwine, K.J. [Allwine Enviornmental Serv., Richland, WA (United States)

    1996-12-31

    Desktop models are those models used by analysts with varied backgrounds, for performing, for example, air quality assessment and emergency response activities. These models must be robust, well documented, have minimal and well controlled user inputs, and have clear outputs. Existing coarse-grained parallel computers can provide significant increases in computation speed in desktop atmospheric dispersion modeling without considerable increases in hardware cost. This increased speed will allow for significant improvements to be made in the scientific foundations of these applied models, in the form of more advanced diffusion schemes and better representation of the wind and turbulence fields. This is especially attractive for emergency response applications where speed and accuracy are of utmost importance. This paper describes one particular application of coarse-grained parallel computer technology to a desktop complex terrain atmospheric dispersion modeling system. By comparing performance characteristics of the coarse-grained parallel version of the model with the single-processor version, we will demonstrate that applying coarse-grained parallel computer technology to desktop atmospheric dispersion modeling systems will allow us to address critical issues facing future requirements of this class of dispersion models.

  20. A virtual computer lab for distance biomedical technology education

    Science.gov (United States)

    Locatis, Craig; Vega, Anibal; Bhagwat, Medha; Liu, Wei-Li; Conde, Jose

    2008-01-01

    Background The National Library of Medicine's National Center for Biotechnology Information offers mini-courses which entail applying concepts in biochemistry and genetics to search genomics databases and other information sources. They are highly interactive and involve use of 3D molecular visualization software that can be computationally taxing. Methods Methods were devised to offer the courses at a distance so as to provide as much functionality of a computer lab as possible, the venue where they are normally taught. The methods, which can be employed with varied videoconferencing technology and desktop sharing software, were used to deliver mini-courses at a distance in pilot applications where students could see demonstrations by the instructor and the instructor could observe and interact with students working at their remote desktops. Results Student ratings of the learning experience and comments to open ended questions were similar to those when the courses are offered face to face. The real time interaction and the instructor's ability to access student desktops from a distance in order to provide individual assistance and feedback were considered invaluable. Conclusion The technologies and methods mimic much of the functionality of computer labs and may be usefully applied in any context where content changes frequently, training needs to be offered on complex computer applications at a distance in real time, and where it is necessary for the instructor to monitor students as they work. PMID:18366629

  1. Architecture Design & Network Application of Cloud Computing

    Directory of Open Access Journals (Sweden)

    Mehzabul Hoque Nahid

    2015-08-01

    Full Text Available “Cloud” computing a comparatively term, stands on decades of research & analysis in virtualization, analytical distributed computing, utility computing, and more recently computer networking, web technology and software services. Cloud computing represents a shift away from computing as a product that is purchased, to computing as a service that is delivered to consumers over the internet from large-scale data centers – or “clouds”. Whilst cloud computing is obtaining growing popularity in the IT industry, academic appeared to be lagging behind the developments in this field. It also implies a service oriented designed architecture, reduced information technology overhead for the end-user, good flexibility, reduced total cost of private ownership, on-demand services and many other things. This paper discusses the concept of “cloud” computing, some of the issues it tries to address, related research topics, and a “cloud” implementation available today

  2. Proceedings: 1989 conference on advanced computer technology for the power industry

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, B. (ed.)

    1990-07-01

    An EPRI conference to address advanced computer technology was hosted by Arizona Public Service in Scottsdale, Arizona, December 4--6, 1989. Participants represented US and foreign utilities, major electric and computer industry vendors, R D contractors, and consulting firms. These proceedings contain the text of the technical presentations and summaries of the panel discussions. The conference objectives were: to assess modern computer technologies and how they will affect utility operations; to share US and foreign utility experiences in developing computer-based technical products; and to discuss research conducted by EPRI in advanced computer technology on behalf of its utility members. Technical presentations addressed a broad range of computer-related topics: computer-based training; engineering workshops; hypermeida and other advanced user interfaces; networks and communications; expert systems and other decision-support methodologies; intelligent database management; supercomputing architectures and applications; real-time data processing; computerized technology and information transfer; and neural networks and other emerging technologies.

  3. 2nd International Conference on Intelligent Computing and Applications

    CERN Document Server

    Dash, Subhransu; Das, Swagatam; Panigrahi, Bijaya

    2017-01-01

    Second International Conference on Intelligent Computing and Applications was the annual research conference aimed to bring together researchers around the world to exchange research results and address open issues in all aspects of Intelligent Computing and Applications. The main objective of the second edition of the conference for the scientists, scholars, engineers and students from the academia and the industry is to present ongoing research activities and hence to foster research relations between the Universities and the Industry. The theme of the conference unified the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in computational intelligence and bridges theoretical research concepts with applications. The conference covered vital issues ranging from intelligent computing, soft computing, and communication to machine learning, industrial automation, process technology and robotics. This conference also provided variety of opportunities for ...

  4. Wafer bonding applications and technology

    CERN Document Server

    Gösele, Ulrich

    2004-01-01

    During the past decade direct wafer bonding has developed into a mature materials integration technology. This book presents state-of-the-art reviews of the most important applications of wafer bonding written by experts from industry and academia. The topics include bonding-based fabrication methods of silicon-on-insulator, photonic crystals, VCSELs, SiGe-based FETs, MEMS together with hybrid integration and laser lift-off. The non-specialist will learn about the basics of wafer bonding and its various application areas, while the researcher in the field will find up-to-date information about this fast-moving area, including relevant patent information.

  5. Proteomics: technology development and applications.

    Science.gov (United States)

    Walton, S Patrick; Jayaraman, Arul

    2009-02-01

    Technology development in, and the application of, proteomics are emerging areas among chemical engineers and others who presented at the 2008 American Institute of Chemical Engineers (AIChE) Annual Meeting. Overall, the centennial meeting offered a broad current perspective on the discipline of chemical engineering as it enters its second century. Biomedical and biochemical engineering continue to grow as important facets of the discipline. Within these, the value and applicability of proteomics were demonstrated in a number of interesting presentations. This year, as in the recent past, the AIChE Annual Meeting was held in conjunction with the American Electrophoresis Society Annual Meeting. American Electrophoresis Society presenters offered further academic and industrial viewpoints on the still-developing role of proteomics and proteomic technologies in biological and clinical analyses.

  6. Clinical applications of wearable technology.

    Science.gov (United States)

    Bonato, Paolo

    2009-01-01

    An important factor contributing to the process involved in choosing a rehabilitation intervention is the assessment of its impact on the real life of patients. Therapists and physicians have to infer the effectiveness of rehabilitation approaches from observations performed in the clinical setting and from patients' feedback. Recent advances in wearable technology have provided means to supplement the information gathered using tools based on patient's direct observation as well as interviews and questionnaires. A new generation of wearable sensors and systems has recently become available thus providing clinical personnel with a "window of observation" in the home and community settings. These tools allow one to capture patients' activity level and exercise compliance, facilitate titration of medications in chronic patients, and provide means to assess the ability of patients to perform specific motor activities. In this paper, we review recent advances in the field of wearable technology and provide examples of application of this technology in rehabilitation.

  7. Application of Computer Wireless Network Technology in Mining Area%计算机无线网络技术在矿区的应用

    Institute of Scientific and Technical Information of China (English)

    于红梅

    2013-01-01

    提高煤矿企业的市场竞争能力,是适应现代企业制度与加入国际贸易组织的市场竞争过程客观需求的重要保障。现代矿区网络传输普遍运用光纤传输,但是煤矿区通常地势不平坦,并且随着开采逐渐转移了开采区,新时期引入计算机无线网络是一种灵活而经济的布线模式。文章对计算机无线网络特征及在矿区应用进行研究。%To guarantee of the objective needs to adapt to the modern enterprise system with the market competition in the process of accession to the International Trade Organization. Modern mining area network transmission generally the use of fiber-optic transmission, but the coal mining areas are usually uneven terrain gradual transfer of the mining area, and with the mining, new era introduced a wireless computer network is a flexible and economical wiring mode. In this paper, the computer's wireless network characteristics and applications in the mining area.

  8. BMDO Technologies for Biomedical Applications.

    Science.gov (United States)

    2007-11-02

    biofilm . Even bacteria that are normally eradicable by antibiotics can avoid harm by col- onizing implants in this manner. In addition, rough surfaces on... dental applications 86, 87 Users, carbon dioxide 86, 87 Users, radiofrcquency-direct current 86, 87 Lens implant , photochemical treatment 82, 83...Nanophosphors 56 Optical Biopsy 58 Sagebrush Gimbal for Needle Biopsy 60 CHAPTER 3 - INTERVENTION TECHNOLOGIES Section A - Implants MEMS Sensor for

  9. Proceedings of the 2011 2nd International Congress on Computer Applications and Computational Science

    CERN Document Server

    Nguyen, Quang

    2012-01-01

    The latest inventions in computer technology influence most of human daily activities. In the near future, there is tendency that all of aspect of human life will be dependent on computer applications. In manufacturing, robotics and automation have become vital for high quality products. In education, the model of teaching and learning is focusing more on electronic media than traditional ones. Issues related to energy savings and environment is becoming critical.   Computational Science should enhance the quality of human life,  not only solve their problems. Computational Science should help humans to make wise decisions by presenting choices and their possible consequences. Computational Science should help us make sense of observations, understand natural language, plan and reason with extensive background knowledge. Intelligence with wisdom is perhaps an ultimate goal for human-oriented science.   This book is a compilation of some recent research findings in computer application and computational sci...

  10. Proceedings of the 2011 2nd International Congress on Computer Applications and Computational Science

    CERN Document Server

    Nguyen, Quang

    2012-01-01

    The latest inventions in computer technology influence most of human daily activities. In the near future, there is tendency that all of aspect of human life will be dependent on computer applications. In manufacturing, robotics and automation have become vital for high quality products. In education, the model of teaching and learning is focusing more on electronic media than traditional ones. Issues related to energy savings and environment is becoming critical.   Computational Science should enhance the quality of human life,  not only solve their problems. Computational Science should help humans to make wise decisions by presenting choices and their possible consequences. Computational Science should help us make sense of observations, understand natural language, plan and reason with extensive background knowledge. Intelligence with wisdom is perhaps an ultimate goal for human-oriented science.   This book is a compilation of some recent research findings in computer application and computational sci...

  11. Cloud Computing and Its Applications in GIS

    Science.gov (United States)

    Kang, Cao

    2011-12-01

    Cloud computing is a novel computing paradigm that offers highly scalable and highly available distributed computing services. The objectives of this research are to: 1. analyze and understand cloud computing and its potential for GIS; 2. discover the feasibilities of migrating truly spatial GIS algorithms to distributed computing infrastructures; 3. explore a solution to host and serve large volumes of raster GIS data efficiently and speedily. These objectives thus form the basis for three professional articles. The first article is entitled "Cloud Computing and Its Applications in GIS". This paper introduces the concept, structure, and features of cloud computing. Features of cloud computing such as scalability, parallelization, and high availability make it a very capable computing paradigm. Unlike High Performance Computing (HPC), cloud computing uses inexpensive commodity computers. The uniform administration systems in cloud computing make it easier to use than GRID computing. Potential advantages of cloud-based GIS systems such as lower barrier to entry are consequently presented. Three cloud-based GIS system architectures are proposed: public cloud- based GIS systems, private cloud-based GIS systems and hybrid cloud-based GIS systems. Public cloud-based GIS systems provide the lowest entry barriers for users among these three architectures, but their advantages are offset by data security and privacy related issues. Private cloud-based GIS systems provide the best data protection, though they have the highest entry barriers. Hybrid cloud-based GIS systems provide a compromise between these extremes. The second article is entitled "A cloud computing algorithm for the calculation of Euclidian distance for raster GIS". Euclidean distance is a truly spatial GIS algorithm. Classical algorithms such as the pushbroom and growth ring techniques require computational propagation through the entire raster image, which makes it incompatible with the distributed nature

  12. EXPLORATIONS IN QUANTUM COMPUTING FOR FINANCIAL APPLICATIONS

    OpenAIRE

    Gare, Jesse

    2010-01-01

    Quantum computers have the potential to increase the solution speed for many computational problems. This paper is a first step into possible applications for quantum computing in the context of computational finance. The fundamental ideas of quantum computing are introduced, followed by an exposition of the algorithms of Deutsch and Grover. Improved mean and median estimation are shown as results of Grover?s generalized framework. The algorithm for mean estimation is refined to an improved M...

  13. Computer vision research with new imaging technology

    Science.gov (United States)

    Hou, Guangqi; Liu, Fei; Sun, Zhenan

    2015-12-01

    Light field imaging is capable of capturing dense multi-view 2D images in one snapshot, which record both intensity values and directions of rays simultaneously. As an emerging 3D device, the light field camera has been widely used in digital refocusing, depth estimation, stereoscopic display, etc. Traditional multi-view stereo (MVS) methods only perform well on strongly texture surfaces, but the depth map contains numerous holes and large ambiguities on textureless or low-textured regions. In this paper, we exploit the light field imaging technology on 3D face modeling in computer vision. Based on a 3D morphable model, we estimate the pose parameters from facial feature points. Then the depth map is estimated through the epipolar plane images (EPIs) method. At last, the high quality 3D face model is exactly recovered via the fusing strategy. We evaluate the effectiveness and robustness on face images captured by a light field camera with different poses.

  14. 云计算技术在网络教学平台设计中的应用和实现%Application of cloud computing technology in the design of network teaching

    Institute of Scientific and Technical Information of China (English)

    刘静

    2014-01-01

    Cloud computing, as a new computer technology, has important research value in the realization of large capacity digital network teaching. According to the characteristics of cloud computing and network teaching, the connotation of cloud computing is studied, the application status and the advantages of cloud computing is also analyzed in the network teaching, a network teaching framework model based on cloud computing is put forward. The model is divided into application layer,management layer and service layer, each layer contains a number of sub system, so as to achieve specific learning function.The establishment of this model bring a new thought for the teaching network.%云计算作为一种最新的计算机技术,在实现大容量数字化网络教学领域具有重要研究价值。结合云计算与网络教学的特点,研究了云计算的内涵,分析了云计算在网络教学中的应用现状及优势,提出基于云计算的高校网络教学架构模型。该模型分为应用层、管理层和服务层,每一个层次包含若干子系统,从而实现特定的学习功能,本模型的建立,为促进高校网络教学资源的共建共享提供了一个新思路。

  15. Computer-aided design and computer science technology

    Science.gov (United States)

    Fulton, R. E.; Voigt, S. J.

    1976-01-01

    A description is presented of computer-aided design requirements and the resulting computer science advances needed to support aerospace design. The aerospace design environment is examined, taking into account problems of data handling and aspects of computer hardware and software. The interactive terminal is normally the primary interface between the computer system and the engineering designer. Attention is given to user aids, interactive design, interactive computations, the characteristics of design information, data management requirements, hardware advancements, and computer science developments.

  16. Application of Analytic Hierarchy Process in the computer network technology%层次分析法在计算机网络技术中的应用探讨

    Institute of Scientific and Technical Information of China (English)

    王加梁

    2013-01-01

      本文从常用的网络构建出发分析了层次分析法在计算机网络组网过程中的应用,包括网络安全性能分析、网络安全体系构建、网络安全防护技术以及基于网络层次的各种故障检测、排除技术等重点技术的应用研究。%This article from the network to build the departure of Analytic Hierarchy Process in the process of networking of computer network applications,including network security performance analysis,network security system construction,and network security technology based on network-level fault detection to excludetechnology and other key technologies.

  17. Brain-Computer Interfaces : Beyond Medical Applications

    NARCIS (Netherlands)

    Erp, J.B.F. van; Lotte, F.; Tangermann, M.

    2012-01-01

    Brain-computer interaction has already moved from assistive care to applications such as gaming. Improvements in usability, hardware, signal processing, and system integration should yield applications in other nonmedical areas.

  18. Brain-Computer Interfaces : Beyond Medical Applications

    NARCIS (Netherlands)

    Erp, J.B.F. van; Lotte, F.; Tangermann, M.

    2012-01-01

    Brain-computer interaction has already moved from assistive care to applications such as gaming. Improvements in usability, hardware, signal processing, and system integration should yield applications in other nonmedical areas.

  19. Beam damage detection using computer vision technology

    Science.gov (United States)

    Shi, Jing; Xu, Xiangjun; Wang, Jialai; Li, Gong

    2010-09-01

    In this paper, a new approach for efficient damage detection in engineering structures is introduced. The key concept is to use the mature computer vision technology to capture the static deformation profile of a structure, and then employ profile analysis methods to detect the locations of the damages. By combining with wireless communication techniques, the proposed approach can provide an effective and economical solution for remote monitoring of structure health. Moreover, a preliminary experiment is conducted to verify the proposed concept. A commercial computer vision camera is used to capture the static deformation profiles of cracked cantilever beams under loading. The profiles are then processed to reveal the existence and location of the irregularities on the deformation profiles by applying fractal dimension, wavelet transform and roughness methods, respectively. The proposed concept is validated on both one-crack and two-crack cantilever beam-type specimens. It is also shown that all three methods can produce satisfactory results based on the profiles provided by the vision camera. In addition, the profile quality is the determining factor for the noise level in resultant detection signal.

  20. The Invisible Barrier to Integrating Computer Technology in Education

    Science.gov (United States)

    Aflalo, Ester

    2014-01-01

    The article explores contradictions in teachers' perceptions regarding the place of computer technologies in education. The research population included 47 teachers who have incorporated computers in the classroom for several years. The teachers expressed positive attitudes regarding the decisive importance of computer technologies in furthering…

  1. Computer Science and Technology Publications. NBS Publications List 84.

    Science.gov (United States)

    National Bureau of Standards (DOC), Washington, DC. Inst. for Computer Sciences and Technology.

    This bibliography lists publications of the Institute for Computer Sciences and Technology of the National Bureau of Standards. Publications are listed by subject in the areas of computer security, computer networking, and automation technology. Sections list publications of: (1) current Federal Information Processing Standards; (2) computer…

  2. Computing, Information, and Communications Technology (CICT) Program Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The Computing, Information and Communications Technology (CICT) Program's goal is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communication technologies

  3. Some Issues on Computer Networks: Architecture and Key Technologies

    Institute of Scientific and Technical Information of China (English)

    Guan-Qun Gu; Jun-Zhou Luo

    2006-01-01

    The evolution of computer networks has experienced several major steps, and research focus of each step has been kept changing and evolving, from ARPANET to OSI/RM, then HSN (high speed network) and HPN (high performance network). During the evolution, computer networks represented by Internet have made great progress and gained unprecedented success. However, with the appearance and intensification of tussle, along with the three difficult problems (service customizing, resource control and user management) of modern network, it is found that traditional Internet and its architecture no longer meet the requirements of next generation network. Therefore, it is the next generation network that current Internet must evolve to. With the mindset of achieving valuable guidance for research on next generation network, this paper firstly analyzes some dilemmas facing current Internet and its architecture, and then surveys some recent influential research work and progresses in computer networks and related areas, including new generation network architecture, network resource control technologies, network management and security, distributed computing and middleware,wireless/mobile network, new generation network services and applications, and foundational theories on network modeling.Finally, this paper concludes that within the research on next generation network, more attention should be paid to the high availability network and corresponding architecture, key theories and supporting technologies.

  4. MEMS for medical technology applications

    Science.gov (United States)

    Frisk, Thomas; Roxhed, Niclas; Stemme, Göran

    2007-01-01

    This paper gives an in-depth description of two recent projects at the Royal Institute of Technology (KTH) which utilize MEMS and microsystem technology for realization of components intended for specific applications in medical technology and diagnostic instrumentation. By novel use of the DRIE fabrication technology we have developed side-opened out-of-plane silicon microneedles intended for use in transdermal drug delivery applications. The side opening reduces clogging probability during penetration into the skin and increases the up-take area of the liquid in the tissue. These microneedles offer about 200µm deep and pain-free skin penetration. We have been able to combine the microneedle chip with an electrically and heat controlled liquid actuator device where expandable microspheres are used to push doses of drug liquids into the skin. The entire unit is made of low cost materials in the form of a square one cm-sized patch. Finally, the design, fabrication and evaluation of an integrated miniaturized Quartz Crystal Microbalance (QCM) based "electronic nose" microsystem for detection of narcotics is described. The work integrates a novel environment-to-chip sample interface with the sensor element. The choice of multifunctional materials and the geometric features of a four-component microsystem allow a functional integration of a QCM crystal, electrical contacts, fluidic contacts and a sample interface in a single system with minimal assembly effort, a potential for low-cost manufacturing, and a few orders of magnitude reduced in system size (12*12*4 mm 3) and weight compared to commercially available instruments. The sensor chip was successfully used it for the detection of 200 ng of narcotics sample.

  5. Application of computer technology for control system in distribution network; Haiden keito un`yo seigyo eno denshi gijutsu no tenkai

    Energy Technology Data Exchange (ETDEWEB)

    Sugiyama, H. [Chubu Electric Power Co. Inc., Nagoya (Japan)

    1996-09-20

    This paper describes the course of history and the future trend in a transmission line automation system. A system to remotely control section switches was begun installation around 1985. The system was intended to reduce number of personnel and amount of time required for works at sites, perform immediate system operation, acquire a real-time site information for a distribution network operation instructor, and have the instructor make quick, proper and accurate determination by using the acquired information. This system remotely monitors and controls section switches in distribution lines, and consists of a `parent station equipment` installed in a sales office, a `child station equipment` installed in combination with the section switches, and a `communications transmission path`. The parent station equipment is a computer system. The child station equipment is installed at every section switch to link the parent station equipment with the section switches. Pair cables are used in signal transmission. A map information indication and automatic execution system of wide area operation handling type has now begun operation. The system is expected of wider use in the future as a system applicable to urban areas where distribution networks are congested. 6 refs., 8 figs.

  6. 计算机技术在病案封面中的应用%The application of computer technology for oases cover in the medical record

    Institute of Scientific and Technical Information of China (English)

    郑美成; 罗以娟; 邱秀梅; 黄国雄

    2009-01-01

    Objective In order to take place the manual manipulation to the print of cases cover.Methods We have designed a small procedurds,the direct usr of medical record information database,extract the names of cases and patients,print to the designated location on the small,detached print cases and patients have the names of the small block sticky paste to cover the planned location of cases.Results The cover of the medical record come ture to the computer printout.Connclustions Payattentionto this technology, the key is the name of hospital and patients in the medical record the location of the cover of the space partition structured to avoid the use of hand-built hospital when its vover a mistake ,cover leakage,vague and copid down the wrong name of patient,when the phenomenon,the number of copiees of entry Print the number of medical records on hospital and patient names,to avoid binding in the same patient in a medical history.%目的 病案封面的住院号及病人姓名以打印的方式代替落后的手工操作.法运用SQL、PB技术巧妙地在广东省统一使用的病案统计软件数据库中提取数据.果实现病案封面计算机打印.论打印方式科学、简便,使病案封面更加整洁,避免盖错住院号和抄写姓名时抄错的现象并有核对录入份数的功能,避免不同病人装订在同一份病历中.

  7. 媒体资源云化关键技术研究%System Design for Media Server Based on Cloud Computing Technology and the Application Analysis

    Institute of Scientific and Technical Information of China (English)

    李青; 唐哲红; 宋阿芳; 王发光

    2013-01-01

    A media resource pool of multi-tenant cloud-based resource scheduling,load balancing implementation techniques and processes were proposed.Cloud media in the IMS service platform application solutions,cloud technology,media resources test situation were introduced,and cloud media business model was presented.In order to promote cloud media server hardware and software for the local manufacturers and related industry chain development provides a new idea.%提出一种媒体资源池云化中的多租户资源调度、负载均衡实现技术及流程,介绍了云媒体在IMS业务平台中的应用方案、云媒体资源技术的实验情况,并对云媒体商业模式等进行了阐述,为推动本土软硬件云媒体服务器生产商及相关产业链发展提供了新思路.

  8. Ubiquitous Commerce: Theories, Technologies, and Applications

    Directory of Open Access Journals (Sweden)

    Liyi Zhang

    2009-06-01

    Full Text Available With the rapid development of ubiquitous computing and mobile communication technologies, the traditional business model will change drastically. As a logical extension of e-commerce and m-commerce, ubiquitous commerce (u-commerce research and application are currently under transition with a history of numerous tried and failed solutions, and a future of promising but yet uncertain possibilities with potential new technology innovations. At this point of the development, we propose a suitable framework and organize the u-commerce research under the proposed classification scheme. The current situation outlined by the scheme has been addressed by exploratory and early phase studies. We hope the findings of this research will provide useful insights for anyone who is interested in u-commerce. The paper also provides some future directions for research.

  9. Development of training support system based on three-dimensional computer graphics technology

    Energy Technology Data Exchange (ETDEWEB)

    Kude, Akizumi; Hanafusa, Hidemitsu; Matsuoka, Yoshinori; Shirute, Ikuo [Institute of Nuclear Safety System Inc., Seika, Kyoto (Japan); Ogura, Kazuhide

    1998-09-01

    Recently, Virtual Reality (VR) technology has developed quickly, together with research conducted on various elemental and related technologies and research in various fields of its application. In particular, the development of computer graphics (CG) technology at the same pace as the progress in computer performance is remarkable. We have developed a new type of training support system using three-dimensional (3D) CG technology. It is the training support system for disassembling and assembling a motor-operated gate valve. The training support system proposed is based on a personal computer and can be used easily by anyone. The system configuration is outlined herein. (author)

  10. Cryptographic Applications using FPGA Technology

    Directory of Open Access Journals (Sweden)

    Alexandru Coman

    2011-03-01

    Full Text Available Cryptographic systems have become a part of our daily life through the need of security of many common activities such as communication, payments, data transfers etc. The best support in design and implementation of cryptographic applications is offered by embedded systems such as ASICs and FPGAs. In the past few years, the increase in performance of FPGAs has made them key components in implementing cryptographic systems. One of the most important parts of the cryptographic systems is the random number generator used. Combinations of PRNG and TRNG are commonly used. A good and efficient TRNG implementation is very important and can be achieved through FPGA technology.

  11. Codesign Analysis of a Computer Graphics Application

    DEFF Research Database (Denmark)

    Madsen, Jan; Brage, Jens P.

    1996-01-01

    This paper describes a codesign case study where a computer graphics application is examined with the intention to speed up its execution. The application is specified as a C program, and is characterized by the lack of a simple compute-intensive kernel. The hardware/software partitioning is based...

  12. Practical applications of soft computing in engineering

    CERN Document Server

    2001-01-01

    Soft computing has been presented not only with the theoretical developments but also with a large variety of realistic applications to consumer products and industrial systems. Application of soft computing has provided the opportunity to integrate human-like vagueness and real-life uncertainty into an otherwise hard computer program. This book highlights some of the recent developments in practical applications of soft computing in engineering problems. All the chapters have been sophisticatedly designed and revised by international experts to achieve wide but in-depth coverage. Contents: Au

  13. Managing Associated Risks in Cloud Computer Applications ...

    African Journals Online (AJOL)

    West African Journal of Industrial and Academic Research ... This paper focuses on an overview of cloud computing as a technology and has chosen ... Java programming language and Google App engine were the tools used to develop and ...

  14. Sinusoids theory and technological applications

    CERN Document Server

    Kythe, Prem K

    2014-01-01

    A Complete Treatment of Current Research Topics in Fourier Transforms and Sinusoids Sinusoids: Theory and Technological Applications explains how sinusoids and Fourier transforms are used in a variety of application areas, including signal processing, GPS, optics, x-ray crystallography, radioastronomy, poetry and music as sound waves, and the medical sciences. With more than 200 illustrations, the book discusses electromagnetic force and sychrotron radiation comprising all kinds of waves, including gamma rays, x-rays, UV rays, visible light rays, infrared, microwaves, and radio waves. It also covers topics of common interest, such as quasars, pulsars, the Big Bang theory, Olbers' paradox, black holes, Mars mission, and SETI.The book begins by describing sinusoids-which are periodic sine or cosine functions-using well-known examples from wave theory, including traveling and standing waves, continuous musical rhythms, and the human liver. It next discusses the Fourier series and transform in both continuous and...

  15. Mobile Cloud Computing and Applications

    Institute of Scientific and Technical Information of China (English)

    Chengzhong Xu

    2011-01-01

    @@ In 2010, cloud computing gained momentum.Cloud computing is a model for real-time, on-demand, pay-for-use network access to a shared pool of configurable computing and storage resources.It has matured from a promising business concept to a working reality in both the private and public IT sectors.The U.S.government, for example, has requested all its agencies to evaluate cloud computing alternatives as part of their budget submissions for new IT investment.

  16. Workshop and conference on Grand Challenges applications and software technology

    Energy Technology Data Exchange (ETDEWEB)

    1993-12-31

    On May 4--7, 1993, nine federal agencies sponsored a four-day meeting on Grand Challenge applications and software technology. The objective was to bring High-Performance Computing and Communications (HPCC) Grand Challenge applications research groups supported under the federal HPCC program together with HPCC software technologists to: discuss multidisciplinary computational science research issues and approaches, identify major technology challenges facing users and providers, and refine software technology requirements for Grand Challenge applications research. The first day and a half focused on applications. Presentations were given by speakers from universities, national laboratories, and government agencies actively involved in Grand Challenge research. Five areas of research were covered: environmental and earth sciences; computational physics; computational biology, chemistry, and materials sciences; computational fluid and plasma dynamics; and applications of artificial intelligence. The next day and a half was spent in working groups in which the applications researchers were joined by software technologists. Nine breakout sessions took place: I/0, Data, and File Systems; Parallel Programming Paradigms; Performance Characterization and Evaluation of Massively Parallel Processing Applications; Program Development Tools; Building Multidisciplinary Applications; Algorithm and Libraries I; Algorithms and Libraries II; Graphics and Visualization; and National HPCC Infrastructure.

  17. Relationships between Computer Self-Efficacy, Technology, Attitudes and Anxiety: Development of the Computer Technology Use Scale (CTUS)

    Science.gov (United States)

    Conrad, Agatha M.; Munro, Don

    2008-01-01

    Two studies are reported which describe the development and evaluation of a new instrument, the Computer Technology Use Scale (CTUS), comprising three domains: computer self-efficacy, attitudes to technology, and technology related anxiety. Study 1 describes the development of the instrument and explores its factor structure. Study 2 used…

  18. Integrated Applications with Laser Technology

    Directory of Open Access Journals (Sweden)

    Octavian DOSPINESCU

    2013-01-01

    Full Text Available The introduction of new materials as Power Point presentations are the most convenient way of teaching a course or to display a scientific paper. In order to support this function, most schools, universities, institutions, are equipped with projectors and computers. For controlling the presentation of the materials, the persons that are in charge with the presentation use, in most cases, both the keyboard of the computer as well as the mouse for the slides, thing that burdens, in a way, the direct communication (face to face with the audience. Of course, the invention of the wireless mouse allowed a sort of freedom in controlling from the distance the digital materials. Although there seems to appear a certain impediment: in order to be used, the mouse requires to be placed on a flat surface. This article aims at creating a new application prototype that will manipulate, only through the means of a light-beam instrument (laser fascicle, both the actions of the mouse as well as some of the elements offered by the keyboard on a certain application or presentation. The light fascicle will be „connected” to a calculus system only through the images that were captured by a simple webcam.

  19. Integer programming theory, applications, and computations

    CERN Document Server

    Taha, Hamdy A

    1975-01-01

    Integer Programming: Theory, Applications, and Computations provides information pertinent to the theory, applications, and computations of integer programming. This book presents the computational advantages of the various techniques of integer programming.Organized into eight chapters, this book begins with an overview of the general categorization of integer applications and explains the three fundamental techniques of integer programming. This text then explores the concept of implicit enumeration, which is general in a sense that it is applicable to any well-defined binary program. Other

  20. Spin-transfer torque magnetoresistive random-access memory technologies for normally off computing (invited)

    Energy Technology Data Exchange (ETDEWEB)

    Ando, K., E-mail: ando-koji@aist.go.jp; Yuasa, S. [National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba 305-8568 (Japan); Fujita, S.; Ito, J.; Yoda, H. [Toshiba Corporation, Kawasaki 212-8582 (Japan); Suzuki, Y. [Graduate School of Engineering Science, Osaka University, Toyonaka 560-8531 (Japan); Nakatani, Y. [Department of Communication Engineering and Informatics, University of Electro-Communication, Chofu 182-8585 (Japan); Miyazaki, T. [WPI-AIMR, Tohoku University, Sendai 980-8577 (Japan)

    2014-05-07

    Most parts of present computer systems are made of volatile devices, and the power to supply them to avoid information loss causes huge energy losses. We can eliminate this meaningless energy loss by utilizing the non-volatile function of advanced spin-transfer torque magnetoresistive random-access memory (STT-MRAM) technology and create a new type of computer, i.e., normally off computers. Critical tasks to achieve normally off computers are implementations of STT-MRAM technologies in the main memory and low-level cache memories. STT-MRAM technology for applications to the main memory has been successfully developed by using perpendicular STT-MRAMs, and faster STT-MRAM technologies for applications to the cache memory are now being developed. The present status of STT-MRAMs and challenges that remain for normally off computers are discussed.

  1. Intelligent Computational Systems. Opening Remarks: CFD Application Process Workshop

    Science.gov (United States)

    VanDalsem, William R.

    1994-01-01

    This discussion will include a short review of the challenges that must be overcome if computational physics technology is to have a larger impact on the design cycles of U.S. aerospace companies. Some of the potential solutions to these challenges may come from the information sciences fields. A few examples of potential computational physics/information sciences synergy will be presented, as motivation and inspiration for the Improving The CFD Applications Process Workshop.

  2. Computational Science Applications in Manufacturing (CSAM) workshop evaluation report

    Energy Technology Data Exchange (ETDEWEB)

    Bradford, J.; Dixon, L.; Rutherford, W.

    1994-09-01

    The Computational Science Applications in Manufacturing (CSAM) workshop is a program designed to expose and train high school students in the techniques used in computational science as they pertain to manufacturing. This effort was sponsored by the AlliedSignal Inc., Kansas City Division (KCD) in cooperation with the Department of Energy (DOE) and their initiative to support education with respect to the advances in technology.

  3. A Financial Technology Entrepreneurship Program for Computer Science Students

    Science.gov (United States)

    Lawler, James P.; Joseph, Anthony

    2011-01-01

    Education in entrepreneurship is becoming a critical area of curricula for computer science students. Few schools of computer science have a concentration in entrepreneurship in the computing curricula. The paper presents Technology Entrepreneurship in the curricula at a leading school of computer science and information systems, in which students…

  4. Computational intelligence and neuromorphic computing potential for cybersecurity applications

    Science.gov (United States)

    Pino, Robinson E.; Shevenell, Michael J.; Cam, Hasan; Mouallem, Pierre; Shumaker, Justin L.; Edwards, Arthur H.

    2013-05-01

    In today's highly mobile, networked, and interconnected internet world, the flow and volume of information is overwhelming and continuously increasing. Therefore, it is believed that the next frontier in technological evolution and development will rely in our ability to develop intelligent systems that can help us process, analyze, and make-sense of information autonomously just as a well-trained and educated human expert. In computational intelligence, neuromorphic computing promises to allow for the development of computing systems able to imitate natural neurobiological processes and form the foundation for intelligent system architectures.

  5. Digital signature technology for health care applications.

    Science.gov (United States)

    Wang, H A; Wang, Y Z; Wang, S

    2001-03-01

    The personal computer and the Internet have provided many useful services to both health care professionals and the general public. However, security remains a key factor that could limit their further growth potential. We reviewed and assessed the potential use of the cryptographic technique to resolve security issues. We also analyzed services available in the current market environment and determined their viability in supporting health care applications. While the cryptographic application has a great potential in protecting security of health care information transmitted over the Internet, a nationwide security infrastructure is needed to support deployment of the technology. Although desirable, it could be cost prohibitive to build a national system to be dedicated for the health care purpose. A hybrid approach that involves the government's development of a dedicated security infrastructure for health care providers and the use of commercial off-the-shelf products and services by the general public offers the most cost-effective and viable approach.

  6. Intelligent decision support systems for sustainable computing paradigms and applications

    CERN Document Server

    Abraham, Ajith; Siarry, Patrick; Sheng, Michael

    2017-01-01

    This unique book dicusses the latest research, innovative ideas, challenges and computational intelligence (CI) solutions in sustainable computing. It presents novel, in-depth fundamental research on achieving a sustainable lifestyle for society, either from a methodological or from an application perspective. Sustainable computing has expanded to become a significant research area covering the fields of computer science and engineering, electrical engineering and other engineering disciplines, and there has been an increase in the amount of literature on aspects sustainable computing such as energy efficiency and natural resources conservation that emphasizes the role of ICT (information and communications technology) in achieving system design and operation objectives. The energy impact/design of more efficient IT infrastructures is a key challenge in realizing new computing paradigms. The book explores the uses of computational intelligence (CI) techniques for intelligent decision support that can be explo...

  7. 云计算分布式缓存技术及其在物联网中的应用%Distributed Cache of Cloud Computing Technology and Its Application in the Internet of Things

    Institute of Scientific and Technical Information of China (English)

    高洪; 董振江

    2011-01-01

    The Internet of Things (loTI is the product of information technology, and the cloud computing platform is the basis of loT applications. This paper discusses the deployment, functional architecture and key technology of cloud computing distributed cache, which can be used to overcome certain loT shortcomings. This paper focuses on the advantages of distributed cache, including high performance, throughput, reliability, and scalability Cloud computing distributed cache can solve loT application problems that affect data reliability, large shared memory, consistency in multimodule data protection, and linear expansion. These support the bottom layer of cloud architecture in the ioT platform.%物联网是信息技术发展到一定阶段的产物,而云计算平台是物联网应用的基础.文章从当前云计算应用所面临的问题和缺陷出发,介绍了云计算分布式缓存的部署方式、功能架构及关键技术,并说明了分布式缓存高性能、高吞吐、高可靠性、高扩展性等优势和特性.文章解决了物联网应用普遍面临的数据可靠性、大容量内存共享、多模块数据一致保障、线性扩容等难题,为物联网平台云化架构的底层支撑奠定了基础.

  8. Advanced intelligent computational technologies and decision support systems

    CERN Document Server

    Kountchev, Roumen

    2014-01-01

    This book offers a state of the art collection covering themes related to Advanced Intelligent Computational Technologies and Decision Support Systems which can be applied to fields like healthcare assisting the humans in solving problems. The book brings forward a wealth of ideas, algorithms and case studies in themes like: intelligent predictive diagnosis; intelligent analyzing of medical images; new format for coding of single and sequences of medical images; Medical Decision Support Systems; diagnosis of Down’s syndrome; computational perspectives for electronic fetal monitoring; efficient compression of CT Images; adaptive interpolation and halftoning for medical images; applications of artificial neural networks for real-life problems solving; present and perspectives for Electronic Healthcare Record Systems; adaptive approaches for noise reduction in sequences of CT images etc.

  9. Cloud Computing. Technology Briefing. Number 1

    Science.gov (United States)

    Alberta Education, 2013

    2013-01-01

    Cloud computing is Internet-based computing in which shared resources, software and information are delivered as a service that computers or mobile devices can access on demand. Cloud computing is already used extensively in education. Free or low-cost cloud-based services are used daily by learners and educators to support learning, social…

  10. Computational Fluid Dynamics (CFD) Technology Programme 1995- 1999

    Energy Technology Data Exchange (ETDEWEB)

    Haekkinen, R.J.; Hirsch, C.; Krause, E.; Kytoemaa, H.K. [eds.

    1997-12-31

    The report is a mid-term evaluation of the Computational Fluid Dynamics (CFD) Technology Programme started by Technology Development Centre Finland (TEKES) in 1995 as a five-year initiative to be concluded in 1999. The main goal of the programme is to increase the know-how and application of CFD in Finnish industry, to coordinate and thus provide a better basis for co-operation between national CFD activities and encouraging research laboratories and industry to establish co-operation with the international CFD community. The projects of the programme focus on the following areas: (1) studies of modeling the physics and dynamics of the behaviour of fluid material, (2) expressing the physical models in a numerical mode and developing a computer codes, (3) evaluating and testing current physical models and developing new ones, (4) developing new numerical algorithms, solvers, and pre- and post-processing software, and (5) applying the new computational tools to problems relevant to their ultimate industrial use. The report consists of two sections. The first considers issues concerning the whole programme and the second reviews each project

  11. Attitudes to Technology, Perceived Computer Self-Efficacy and Computer Anxiety as Predictors of Computer Supported Education

    Science.gov (United States)

    Celik, Vehbi; Yesilyurt, Etem

    2013-01-01

    There is a large body of research regarding computer supported education, perceptions of computer self-efficacy, computer anxiety and the technological attitudes of teachers and teacher candidates. However, no study has been conducted on the correlation between and effect of computer supported education, perceived computer self-efficacy, computer…

  12. Attitudes to Technology, Perceived Computer Self-Efficacy and Computer Anxiety as Predictors of Computer Supported Education

    Science.gov (United States)

    Celik, Vehbi; Yesilyurt, Etem

    2013-01-01

    There is a large body of research regarding computer supported education, perceptions of computer self-efficacy, computer anxiety and the technological attitudes of teachers and teacher candidates. However, no study has been conducted on the correlation between and effect of computer supported education, perceived computer self-efficacy, computer…

  13. 基于云技术的高校计算机仿真教学应用研究%Study on the Application of Computer Simulation in Teaching of Colleges and Universities Based on Cloud Technology

    Institute of Scientific and Technical Information of China (English)

    赵丽霞; 金伟

    2015-01-01

    The computer simulation teaching model based on cloud technology is a kind of new teaching mode can be an effective combination of theory and practice.This paper discusses the construction of computer simulation teaching,the teaching mode of application of cloud technology and its practical significance based on the use of the electronic commerce teaching,practice has proved that this teaching method can effectively improve the quality of teaching in colleges and universities.%基于云技术的高校计算机仿真教学模式是一种能够将理论与实践有效结合的新型教学模式。本文论述了在高校电子商务专业课程教学中使用基于云技术的计算机仿真教学的教学模式构建、应用以及其实际意义,实践证明这种教学方法能够有效提高高校教学质量。

  14. The Design and Implementation of Middleware for Application Development within Honeybee Computing Environment

    Directory of Open Access Journals (Sweden)

    Nur Husna Azizul

    2016-12-01

    Full Text Available Computing technology is now moving from ubiquitous computing into advanced ubiquitous computing environment. An advanced ubiquitous environment is an extension of ubiquitous environment that improve connectivity between devices. This computing environment has five major characteristics, namely: large number of heterogeneous devices; new communication technology; mobile ad hoc network (MANET; peer-to-peer communication; and Internet of Things. Honeybee computing is a concept based on advanced ubiquitous computing technology to support Smart City Smart Village (SCSV initiatives, which is a project initiated within Digital Malaysia. This paper describes the design and implementation of a middleware to support application development within Honeybee computing environment.

  15. Implementing and developing cloud computing applications

    CERN Document Server

    Sarna, David E Y

    2010-01-01

    From small start-ups to major corporations, companies of all sizes have embraced cloud computing for the scalability, reliability, and cost benefits it can provide. It has even been said that cloud computing may have a greater effect on our lives than the PC and dot-com revolutions combined.Filled with comparative charts and decision trees, Implementing and Developing Cloud Computing Applications explains exactly what it takes to build robust and highly scalable cloud computing applications in any organization. Covering the major commercial offerings available, it provides authoritative guidan

  16. Computer-Aided Analysis of Patents for Product Technology Maturity Forecasting

    Science.gov (United States)

    Liang, Yanhong; Gan, Dequan; Guo, Yingchun; Zhang, Peng

    Product technology maturity foresting is vital for any enterprises to hold the chance for innovation and keep competitive for a long term. The Theory of Invention Problem Solving (TRIZ) is acknowledged both as a systematic methodology for innovation and a powerful tool for technology forecasting. Based on TRIZ, the state -of-the-art on the technology maturity of product and the limits of application are discussed. With the application of text mining and patent analysis technologies, this paper proposes a computer-aided approach for product technology maturity forecasting. It can overcome the shortcomings of the current methods.

  17. Applications of solar reforming technology

    Energy Technology Data Exchange (ETDEWEB)

    Spiewak, I. [Weizmann Inst. of Science, Rehovoth (Israel); Tyner, C.E. [Sandia National Labs., Albuquerque, NM (United States); Langnickel, U. [Deutsche Forschungsanstalt fuer Luft- und Raumfahrt e.V. (DLR), Koeln (Germany)

    1993-11-01

    Research in recent years has demonstrated the efficient use of solar thermal energy for driving endothermic chemical reforming reactions in which hydrocarbons are reacted to form synthesis gas (syngas). Closed-loop reforming/methanation systems can be used for storage and transport of process heat and for short-term storage for peaking power generation. Open-loop systems can be used for direct fuel production; for production of syngas feedstock for further processing to specialty chemicals and plastics and bulk ammonia, hydrogen, and liquid fuels; and directly for industrial processes such as iron ore reduction. In addition, reforming of organic chemical wastes and hazardous materials can be accomplished using the high-efficiency destruction capabilities of steam reforming. To help identify the most promising areas for future development of this technology, we discuss in this paper the economics and market potential of these applications.

  18. Bioinformatics and Computational Core Technology Center

    Data.gov (United States)

    Federal Laboratory Consortium — SERVICES PROVIDED BY THE COMPUTER CORE FACILITYEvaluation, purchase, set up, and maintenance of the computer hardware and network for the 170 users in the research...

  19. Bioinformatics and Computational Core Technology Center

    Data.gov (United States)

    Federal Laboratory Consortium — SERVICES PROVIDED BY THE COMPUTER CORE FACILITY Evaluation, purchase, set up, and maintenance of the computer hardware and network for the 170 users in the research...

  20. COTS technologies for telemedicine applications.

    Science.gov (United States)

    Triunfo, Riccardo; Tumbarello, Roberto; Sulis, Alessandro; Zanetti, Gianluigi; Lianas, Luca; Meloni, Vittorio; Frexia, Francesca

    2010-01-01

    To demonstrate a simple low-cost system for tele-echocardiology, focused on paediatric cardiology applications. The system was realized using open-source software and COTS technologies. It is based on the transmission of two simultaneous video streams, obtained by direct digitization of the output of an ultrasound machine and by a netcam showing the examination that is taking place. These streams are then embedded into a web page so they are accessible, together with basic video controls, via a standard web browser. The system can also record video streams on a server for further use. The system was tested on a small group of neonatal cases with suspected cardiopathies for a preliminary assessment of its features and diagnostic capabilities. Both the clinical and technological results were encouraging and are leading the way for further experimentation. The presented system can transfer clinical images and videos in an efficient way and in real time. It can be used in the same hospital to support internal consultancy requests, in remote areas using Internet connections and for didactic purposes using low cost COTS appliances and simple interfaces for end users. The solution proposed can be extended to control different medical appliances in those remote hospitals.

  1. African Journals Online: Technology, Computer Science ...

    African Journals Online (AJOL)

    Items 1 - 29 of 29 ... The Ethiopian Journal of Science and Technology (EJST) publishes high .... Sciences is an international journal reporting significant new results in all .... general technology rocketry, space and astronomy, earth sciences, ...

  2. Development of superconductor application technology

    Energy Technology Data Exchange (ETDEWEB)

    Hong, G. W.; Kim, C. J.; Lee, H. G.; Lee, H. J.; Kim, K. B.; Won, D. Y.; Jang, K. I.; Kwon, S. C.; Kim, W. J.; Ji, Y. A.; Yang, S. W.; Kim, W. K.; Park, S. D.; Lee, M. H.; Lee, D. M.; Park, H. W.; Yu, J. K.; Lee, I. S.; Kim, J. J.; Choi, H. S.; Chu, Y.; Kim, Y. S.; Kim, D. H.

    1997-09-01

    Fabrication of high Tc bulk superconductor and its application, fabrication of superconducting wire for electric power device and analysis for cryogenic system were carried out for developing superconductor application technologies for electric power system. High quality YBaCuO bulk superconductor was fabricated by controlling initial powder preparation process and prototype flywheel energy storage device was designed basically. The superconducting levitation force measuring device was made to examine the property of prepared superconductor specimen. Systematic studies onthe method of starting powder preparation, mechanical fabrication process, heat treatment condition and analysis of plastic deformation were carried out to increase the stability and reproducibility of superconducting wire. A starting power with good reactivity and fine particle size was obtained by mechanical grinding, control of phase assemblage, and emulsion drying method. Ag/BSCCO tape with good cross sectional shape and Jc of 20,000 A/cm{sup 2} was fabricated by applying CIP packing procedure. Multifilamentary wire with Jc of 10,000 A/cm{sup 2} was fabricated by rolling method using square billet as starting shape. The joining of the multifilamentary wire was done by etching and pressing process and showed 50% of joining efficiency. Analysis on the heat loss in cryostat for high Tc superconducting device was carried out for optimum design of the future cryogenic system. (author). 66 refs., 104 figs.

  3. Computer Vision Technology in Food Quality Testing InResearch and Application%计算机视觉技术在粮食品质检测中的研究应用

    Institute of Scientific and Technical Information of China (English)

    石小凤; 樊超

    2011-01-01

    This paper reviews the computer vision technology in food quality testing methods commonly used in image processing and application, the feature recognition, the main characteristic that from the appearance of food color, shape and texture classification, in order to achieve agricultural classification.%本文综述了计算机视觉技术在粮食品质检测中常用的图像处理方法及应用,在特征识别上,主要从粮食的外观特征即颜色、形态和纹理三个方面来进行特征提取,进而实现对粮食品质的检测与分类,以达到农产品的分类识别。

  4. Soft computing applications: the advent of hybrid systems

    Science.gov (United States)

    Bonissone, Piero P.

    1998-10-01

    Soft computing is a new field of computer sciences that deals with the integration of problem- solving technologies such as fuzzy logic, probabilistic reasoning, neural networks, and genetic algorithms. Each of these technologies provide us with complementary reasoning and searching methods to solve complex, real-world problems. We will analyze some of the most synergistic combinations of self computing technologies, with an emphasis on the development of smart algorithm-controllers, such as the use of FL to control GAs and NNs parameters. We will also discuss the application of GAs to evolve NNs or tune FL controllers; and the implementation of FL controllers as NNs tuned by backpropagation-type algorithms. We will conclude with a detailed description of a GA-tuned fuzzy controller to implement a train handling control.

  5. Third International Conference on Computational Science, Engineering and Information Technology (CCSEIT-2013), v.1

    CERN Document Server

    Kumar, Ashok; Annamalai, Annamalai

    2013-01-01

      This book is the proceedings of Third International Conference on Computational Science, Engineering and Information Technology (CCSEIT-2013) that was held in Konya, Turkey, on June 7-9. CCSEIT-2013 provided an excellent international forum for sharing knowledge and results in theory, methodology and applications of computational science, engineering and information technology. This book contains research results, projects, survey work and industrial experiences representing significant advances in the field. The different contributions collected in this book cover five main areas: algorithms, data structures and applications;  wireless and mobile networks; computer networks and communications; natural language processing and information theory; cryptography and information security.  

  6. CICT Computing, Information, and Communications Technology Program

    Science.gov (United States)

    Laufenberg, Lawrence; Tu, Eugene (Technical Monitor)

    2002-01-01

    The CICT Program is part of the NASA Aerospace Technology Enterprise's fundamental technology thrust to develop tools. processes, and technologies that enable new aerospace system capabilities and missions. The CICT Program's four key objectives are: Provide seamless access to NASA resources- including ground-, air-, and space-based distributed information technology resources-so that NASA scientists and engineers can more easily control missions, make new scientific discoveries, and design the next-generation space vehicles, provide high-data delivery from these assets directly to users for missions, develop goal-oriented human-centered systems, and research, develop and evaluate revolutionary technology.

  7. Real-life applications with membrane computing

    CERN Document Server

    Zhang, Gexiang; Gheorghe, Marian

    2017-01-01

    This book thoroughly investigates the underlying theoretical basis of membrane computing models, and reveals their latest applications. In addition, to date there have been no illustrative case studies or complex real-life applications that capitalize on the full potential of the sophisticated membrane systems computational apparatus; gaps that this book remedies. By studying various complex applications – including engineering optimization, power systems fault diagnosis, mobile robot controller design, and complex biological systems involving data modeling and process interactions – the book also extends the capabilities of membrane systems models with features such as formal verification techniques, evolutionary approaches, and fuzzy reasoning methods. As such, the book offers a comprehensive and up-to-date guide for all researchers, PhDs and undergraduate students in the fields of computer science, engineering and the bio-sciences who are interested in the applications of natural computing models.

  8. Micropower impulse radar technology and applications

    Energy Technology Data Exchange (ETDEWEB)

    Mast, J., LLNL

    1998-04-15

    The LLNL-developed Micropower Impulse Radar (MIR) technology has quickly gone from laboratory concept to embedded circuitry in numerous government and commercial systems in the last few years[l]. The main ideas behind MIR, invented by T. McEwan in the Laser Program, are the generation and detection systems for extremely low- power ultra-wideband pulses in the gigaHertz regime using low-cost components. These ideas, coupled with new antenna systems, timing and radio-frequency (RF) circuitry, computer interfaces, and signal processing, have provided the catalyst for a new generation of compact radar systems. Over the past several years we have concentrated on a number of applications of MIR which address a number of remote-sensing applications relevant to emerging programs in defense, transportation, medical, and environmental research. Some of the past commercial successes have been widely publicized [2] and are only now starting to become available for market. Over 30 patents have been filed and over 15 licenses have been signed on various aspects of the MIR technology. In addition, higher performance systems are under development for specific laboratory programs and government reimbursables. The MIR is an ultra- wideband, range-gated radar system that provides the enabling hardware technology used in the research areas mentioned above. It has numerous performance parameters that can be Selected by careful design to fit the requirements. We have improved the baseline, short- range, MIR system to demonstrate its effectiveness. The radar operates over the hand from approximately I to 4 GHz with pulse repetition frequencies up to 10 MHz. It provides a potential range resolution of I cm at ranges of greater than 20 m. We have developed a suite of algorithms for using MIR for image formation. These algorithms currently support Synthetic aperture and multistate array geometries. This baseline MIR radar imaging system has been used for several programmatic applications.

  9. Evaluation of application effect of tablet computer multimedia technology in preoperative interview%平板电脑多媒体技术在术前访视中应用效果评价

    Institute of Scientific and Technical Information of China (English)

    杨燕

    2016-01-01

    Objective:To explore the application effect of tablet computer multimedia technology in preoperative interview. Methods:200 cases of surgical patients were selected.They were randomly divided into the control group and the experimental group with 100 cases in each group.Patients in the control group were given preoperative interview by the traditional model,while patients in the experimental group were given preoperative interview with tablet computer multimedia technology.We compared the effect between the two groups.Results:In the experimental group,anxiety,blood pressure and heart rate were significantly lower than those in the control group(P<0.05).Conclusion:The application of tablet computer multimedia technology in preoperative interview had changed the monotone,abstract and boring of traditional interview before operation with oral explanation,it fully met the emotional and psychological needs of patients and their families,and enhanced patient confidence,improved the quality of preoperative interview.%目的:探讨平板电脑多媒体技术在术前访视中的应用效果。方法:收治手术患者200例,随机分为对照组和试验组各100例,对照组采用传统模式进行术前访视,试验组采用平板电脑多媒体技术进行术前访视,比较两组的效果。结果:试验组的焦虑值、血压和心率明显低于对照组(P<0.05)。结论:平板电脑应用于术前访视改变了传统术前访视口头讲解的单调、抽象和枯燥乏味,充分满足患者以及家属情感与心理的需求,增强了患者手术信心,提高了术前访视质量。

  10. Computer Applications in Teaching and Learning.

    Science.gov (United States)

    Halley, Fred S.; And Others

    Some examples of the usage of computers in teaching and learning are examination generation, automatic exam grading, student tracking, problem generation, computational examination generators, program packages, simulation, and programing skills for problem solving. These applications are non-trivial and do fulfill the basic assumptions necessary…

  11. Identification of risk factors of computer information technologies in education.

    OpenAIRE

    Hrebniak M.P.; Shchudro S.A.; Yakimova K.O.

    2014-01-01

    The basic direction of development of secondary school and vocational training is computer training of schoolchildren and students, including distance forms of education and widespread usage of world information systems. The purpose of the work is to determine risk factors for schoolchildren and students, when using modern information and computer technologies. Results of researches allowed to establish dynamics of formation of skills using computer information technologies in education and c...

  12. Computational thermodynamics and informational technologies in the field of computer design of materials

    Directory of Open Access Journals (Sweden)

    Udovsky A.L.

    2002-01-01

    Full Text Available Computational thermodynamics and informational technologies in the field of computer desing of materials as well as appliance of CALPHAD method on resolution of thermodynamic problems are presented in this paper.

  13. Monomial ideals, computations and applications

    CERN Document Server

    Gimenez, Philippe; Sáenz-de-Cabezón, Eduardo

    2013-01-01

    This work covers three important aspects of monomials ideals in the three chapters "Stanley decompositions" by Jürgen Herzog, "Edge ideals" by Adam Van Tuyl and "Local cohomology" by Josep Álvarez Montaner. The chapters, written by top experts, include computer tutorials that emphasize the computational aspects of the respective areas. Monomial ideals and algebras are, in a sense, among the simplest structures in commutative algebra and the main objects of combinatorial commutative algebra. Also, they are of major importance for at least three reasons. Firstly, Gröbner basis theory allows us to treat certain problems on general polynomial ideals by means of monomial ideals. Secondly, the combinatorial structure of monomial ideals connects them to other combinatorial structures and allows us to solve problems on both sides of this correspondence using the techniques of each of the respective areas. And thirdly, the combinatorial nature of monomial ideals also makes them particularly well suited to the devel...

  14. Intelligent computing systems emerging application areas

    CERN Document Server

    Virvou, Maria; Jain, Lakhmi

    2016-01-01

    This book at hand explores emerging scientific and technological areas in which Intelligent Computing Systems provide efficient solutions and, thus, may play a role in the years to come. It demonstrates how Intelligent Computing Systems make use of computational methodologies that mimic nature-inspired processes to address real world problems of high complexity for which exact mathematical solutions, based on physical and statistical modelling, are intractable. Common intelligent computational methodologies are presented including artificial neural networks, evolutionary computation, genetic algorithms, artificial immune systems, fuzzy logic, swarm intelligence, artificial life, virtual worlds and hybrid methodologies based on combinations of the previous. The book will be useful to researchers, practitioners and graduate students dealing with mathematically-intractable problems. It is intended for both the expert/researcher in the field of Intelligent Computing Systems, as well as for the general reader in t...

  15. Reviews of computing technology: Fiber distributed data interface

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, A.J.

    1992-04-01

    This technology report describes Fiber Distributed Data Interface (FDDI) as a technology, looks at the applications of this technology, examines the current economics of using it, and describe activities and plans by the Information Resource Management Department to implement this technology at the Savannah River Site.

  16. Reviews of computing technology: Fiber distributed data interface. Revision

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, A.J.

    1992-04-01

    This technology report describes Fiber Distributed Data Interface (FDDI) as a technology, looks at the applications of this technology, examines the current economics of using it, and describe activities and plans by the Information Resource Management Department to implement this technology at the Savannah River Site.

  17. JPRS Report, Science & Technology, USSR: Computers

    Science.gov (United States)

    2007-11-02

    AVTOMATIZATSIYA PROIZVODSTVA, No 1, Jan 87) 69 EDUCATION The Computer Has Come to School (RUSSKIY YAZYK I LITERATURA V KAZAKHSKOY SHKOLE, No 7, Jul 86) 76...avtomatizatsiya proizvodstva", 1987 12770 CSO: 1Ö63/209 75 EDUCATION THE COMPUTER HAS COME TO SCHOOL Alma-Ata RUSSKIY YAZYK I LITERATURA V...and wins over minds and inspires upperclassmen—the avant-garde of computer education. COPYRIGHT: "Russkiy yazyk i literatura v Kazakhskoy shkole

  18. Impact of Computer Technology on Design and Craft Education

    Science.gov (United States)

    Thorsteinsson, Gisli

    2014-01-01

    This research aims to answer the question, "How has the use of computer technology benefited the compulsory education system, focusing on Design and Technology?" In order to reply this question, it was necessary to focus on interactive whiteboards, e-portfolios and digital projectors as the main technology formats. An initial literature…

  19. Technology Foundations for Computational Evaluation of Software Security Attributes

    Science.gov (United States)

    2006-12-01

    Technology Foundations for Computational Evaluation of Software Security Attributes Gwendolyn H. Walton Thomas A. Longstaff Richard C...security attributes to the functional behavior of the software . The emergence of CERT’s new function extraction (FX) technology , unavailable to previous... software meets security requirements if they have been specified in behavioral terms. FX technology prescribes effective means to create and record

  20. On Integrating Computer Technology into Our Curriculum

    Institute of Scientific and Technical Information of China (English)

    Jianhua Bai

    2000-01-01

    @@ 1. Introduction When something new and exciting occurs in technology, some of us foreign language teachers tend to become too excited to notice the limitations of the new technology. It is no exception with the current use of multimedia and intemet technology in our curriculum. It is my belief that,without an adequate understanding of its limitations as well as its advantages, we may find ourselves disappointed as we move ahead in integrating the multimedia technology into our instruction in a meaningful way. Therefore, in this paper, I would like to start with the discussion of the limitation of multimedia technology and then discuss how we can make use of this new technology to improve our teaching and learning of Chinese as a foreign language.

  1. Application of SharePoint Portal Technologies in Public Enterprises

    Directory of Open Access Journals (Sweden)

    Dragan Đokić

    2015-03-01

    Full Text Available Nowadays, systematic reforms are realized acrossmany countries. One of the characteristics of these reforms is necessity for rationalization of expenses in governmental and public enterprises. Rationalization of expenses can be achieved by more extensive application of information and communication technologies based on internet technologies and cloud computing. These systems include huge number of services, applications, resources, users and roles. At the same time, concepts of scalability, availability, ubiquity and pervasiveness need to be applied. This paper deals with application of portal technologies for enhanced content management, document management, and collaboration within public enterprises. The goal is to achieve efficient exchange of information on all hierarchical levels, as well as mechanisms of reporting and performance measurements, such as business intelligence and key performance indicators. The model is based on SharePoint portal technologies. A case study of application within the public enterprise Post of Serbia is described.

  2. Non-Boolean computing with nanomagnets for computer vision applications

    Science.gov (United States)

    Bhanja, Sanjukta; Karunaratne, D. K.; Panchumarthy, Ravi; Rajaram, Srinath; Sarkar, Sudeep

    2016-02-01

    The field of nanomagnetism has recently attracted tremendous attention as it can potentially deliver low-power, high-speed and dense non-volatile memories. It is now possible to engineer the size, shape, spacing, orientation and composition of sub-100 nm magnetic structures. This has spurred the exploration of nanomagnets for unconventional computing paradigms. Here, we harness the energy-minimization nature of nanomagnetic systems to solve the quadratic optimization problems that arise in computer vision applications, which are computationally expensive. By exploiting the magnetization states of nanomagnetic disks as state representations of a vortex and single domain, we develop a magnetic Hamiltonian and implement it in a magnetic system that can identify the salient features of a given image with more than 85% true positive rate. These results show the potential of this alternative computing method to develop a magnetic coprocessor that might solve complex problems in fewer clock cycles than traditional processors.

  3. Internetworking technological foundations and applications

    CERN Document Server

    Meinel, Christoph

    2013-01-01

    This book is supposed to serve as a comprehensive and instructive guide through the new world of digital communication. On the physical layer optical and electrical cabling technology are described as well as wireless communication technologies. On the data link layer local area networks (LANs) are introduced together with the most popular LAN technologies such as Ethernet, Token Ring, FDDI, and ATM as well as wireless LAN technologies including IEEE 802.x, Bluetooth, or ZigBee. A wide range of WAN technologies are covered including contemporary high speed technologies like PDH and SDH up to h

  4. On the use of computation optimization opportunities in computer technologies for applied and computational mathematics problems with prescribed quality characteristics

    Science.gov (United States)

    Babich, M. D.; Zadiraka, V. K.; Lyudvichenko, V. A.; Sergienko, I. V.

    2010-12-01

    The use of various opportunities for computation optimization in computer technologies for applied and computational mathematics problems with prescribed quality characteristics is investigated. More precisely, the choice and determination of computational resources and methods of their efficient use for finding an approximate solution of problems up to prescribed accuracy in a limited amount of processor time are investigated.

  5. Cutting Technology Costs with Refurbished Computers

    Science.gov (United States)

    Dessoff, Alan

    2010-01-01

    Many district administrators are finding that they can save money on computers by buying preowned ones instead of new ones. The practice has other benefits as well: It allows districts to give more computers to more students who need them, and it also promotes good environmental practices by keeping the machines out of landfills, where they…

  6. JPRS Report, Science & Technology, USSR: Computers.

    Science.gov (United States)

    2007-11-02

    3 hours; the Leninabad Silk Combine of the Ministry of Light Industry, 2 hours; the Tadkhik Scientific Research Institute of Scientific and...established sectorial oblast computer centers in Leninabad , Kulyab, and Kurgan-Tyube. Was there a need for this if computer centers of statistical

  7. Collectively loading an application in a parallel computer

    Energy Technology Data Exchange (ETDEWEB)

    Aho, Michael E.; Attinella, John E.; Gooding, Thomas M.; Miller, Samuel J.; Mundy, Michael B.

    2016-01-05

    Collectively loading an application in a parallel computer, the parallel computer comprising a plurality of compute nodes, including: identifying, by a parallel computer control system, a subset of compute nodes in the parallel computer to execute a job; selecting, by the parallel computer control system, one of the subset of compute nodes in the parallel computer as a job leader compute node; retrieving, by the job leader compute node from computer memory, an application for executing the job; and broadcasting, by the job leader to the subset of compute nodes in the parallel computer, the application for executing the job.

  8. New tricks with old sensors: Pervasive Technologies for Novel Applications

    Science.gov (United States)

    Merrett, Geoff

    2013-06-01

    Sensors are interleaved into society, instrumenting considerable aspects of our lives without our comprehension. Sensors such as the MEMS accelerometer have transitioned from their original domains to applications that they were never conceived for: from games controllers to contextually rotating the screen on your smartphone. Further advances in technologies such as pervasive computing and networked embedded sensing are enabling new applications and smart devices which utilise sensors in new ways. In this presentation I will highlight new trends, applications and research in these fields, and show how "simple" sensors are being used in larger connected systems - from assistive technologies to distributed monitoring.

  9. Advances in control system technology for aerospace applications

    CERN Document Server

    2016-01-01

    This book is devoted to Control System Technology applied to aerospace and covers the four disciplines Cognitive Engineering, Computer Science, Operations Research, and Servo-Mechanisms. This edited book follows a workshop held at the Georgia Institute of Technology in June 2012, where the today's most important aerospace challenges, including aerospace autonomy, safety-critical embedded software engineering, and modern air transportation were discussed over the course of two days of intense interactions among leading aerospace engineers and scientists. Its content provide a snapshot of today's aerospace control research and its future, including Autonomy in space applications, Control in space applications, Autonomy in aeronautical applications, Air transportation, and Safety-critical software engineering.

  10. Mistaking Computers for Technology: Technology Literacy and the Digital Divide

    Science.gov (United States)

    Amiel, Tel

    2006-01-01

    No other information and communication technology has swept the globe with greater speed than the Internet, having the potential to promote vast social, economic, and political transformations. As new technologies become available the pattern of adoption and diffusion creates disparities in access and ownership. At the most basic this gap is…

  11. Imaging technologies in oilfield applications

    Institute of Scientific and Technical Information of China (English)

    XIE C.G.; NORTH R.; WILT M.; ZHANG P.; DENACLARA H.; LEVESQUE C.

    2005-01-01

    In this paper, we describe some recent imaging technologies developed by Schlumberger for oilfield downhole multiphase flow production logging (PL) and cross-well electromagnetic (EM) survey applications. FloScan Imager (FSITM) has been introduced as a 3-phase oil/gas/water flow PL tool for deviated and horizontal wells. FSI sensors can map fluid velocity and holdup profiles along a vertical diameter of the wellbore at every survey depth, enabling a robust estimate of the individual phase flow rates in complex flow regimes. The cross-well EM survey is based on cross-borehole induction logging technique and provides resistivity distribution at a reservoir scale. It is a useful tool for reservoir management and is most effective in dynamic fields where fluid saturations are variable in time and space. The tool can be used to identify (water or steam) flooded and bypassed regions. By monitoring changes in the resistivity spatial distribution with time, cross-well EM survey is very effective at mapping inter-well temperature and structure. Some field examples are shown for both FloScan Imager PL tool and cross-well resistivity imaging survey.

  12. Computational materials design for energy applications

    Science.gov (United States)

    Ozolins, Vidvuds

    2013-03-01

    General adoption of sustainable energy technologies depends on the discovery and development of new high-performance materials. For instance, waste heat recovery and electricity generation via the solar thermal route require bulk thermoelectrics with a high figure of merit (ZT) and thermal stability at high-temperatures. Energy recovery applications (e.g., regenerative braking) call for the development of rapidly chargeable systems for electrical energy storage, such as electrochemical supercapacitors. Similarly, use of hydrogen as vehicular fuel depends on the ability to store hydrogen at high volumetric and gravimetric densities, as well as on the ability to extract it at ambient temperatures at sufficiently rapid rates. We will discuss how first-principles computational methods based on quantum mechanics and statistical physics can drive the understanding, improvement and prediction of new energy materials. We will cover prediction and experimental verification of new earth-abundant thermoelectrics, transition metal oxides for electrochemical supercapacitors, and kinetics of mass transport in complex metal hydrides. Research has been supported by the US Department of Energy under grant Nos. DE-SC0001342, DE-SC0001054, DE-FG02-07ER46433, and DE-FC36-08GO18136.

  13. Evolving technologies for Space Station Freedom computer-based workstations

    Science.gov (United States)

    Jensen, Dean G.; Rudisill, Marianne

    1990-01-01

    Viewgraphs on evolving technologies for Space Station Freedom computer-based workstations are presented. The human-computer computer software environment modules are described. The following topics are addressed: command and control workstation concept; cupola workstation concept; Japanese experiment module RMS workstation concept; remote devices controlled from workstations; orbital maneuvering vehicle free flyer; remote manipulator system; Japanese experiment module exposed facility; Japanese experiment module small fine arm; flight telerobotic servicer; human-computer interaction; and workstation/robotics related activities.

  14. Application on Internet of Things Technology Using in Library Management

    Science.gov (United States)

    Liu, Xueqing; Sheng, Wenwen

    Following the computer, Internet and mobile communication network, the Internet of Things (IOT) will bring a new development of information industry, and moreover is a global technology revolution that is bound to have a profound impact on the economic development and social life. This paper analyzes the key technology and working principle of IOT, its development at home and abroad, its application in the library management, and proposes its development direction in the field of library management and promotion programs.

  15. Reviews of computing technology: Software overview

    Energy Technology Data Exchange (ETDEWEB)

    Hartshorn, W.R.; Johnson, A.L.

    1994-01-05

    The Savannah River Site Computing Architecture states that the site computing environment will be standards-based, data-driven, and workstation-oriented. Larger server systems deliver needed information to users in a client-server relationship. Goals of the Architecture include utilizing computing resources effectively, maintaining a high level of data integrity, developing a robust infrastructure, and storing data in such a way as to promote accessibility and usability. This document describes the current storage environment at Savannah River Site (SRS) and presents some of the problems that will be faced and strategies that are planned over the next few years.

  16. Computer image processing: Geologic applications

    Science.gov (United States)

    Abrams, M. J.

    1978-01-01

    Computer image processing of digital data was performed to support several geological studies. The specific goals were to: (1) relate the mineral content to the spectral reflectance of certain geologic materials, (2) determine the influence of environmental factors, such as atmosphere and vegetation, and (3) improve image processing techniques. For detection of spectral differences related to mineralogy, the technique of band ratioing was found to be the most useful. The influence of atmospheric scattering and methods to correct for the scattering were also studied. Two techniques were used to correct for atmospheric effects: (1) dark object subtraction, (2) normalization of use of ground spectral measurements. Of the two, the first technique proved to be the most successful for removing the effects of atmospheric scattering. A digital mosaic was produced from two side-lapping LANDSAT frames. The advantages were that the same enhancement algorithm can be applied to both frames, and there is no seam where the two images are joined.

  17. Audit and Evaluation of Computer Security. Computer Science and Technology.

    Science.gov (United States)

    Ruthberg, Zella G.

    This is a collection of consensus reports, each produced at a session of an invitational workshop sponsored by the National Bureau of Standards. The purpose of the workshop was to explore the state-of-the-art and define appropriate subjects for future research in the audit and evaluation of computer security. Leading experts in the audit and…

  18. Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 & STA 2012

    CERN Document Server

    Kim, Jongsung; Zou, Deqing; Lee, Yang

    2012-01-01

    ITCS 2012 and STA 2012 address the various theories and practical applications of information technology convergence, secure and trust computing, and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of ITCS 2012 & STA 2012. In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.

  19. English language learning activity using spoken language and intelligent computer-assisted technologies

    OpenAIRE

    2011-01-01

    This paper presents work in progress on language technologies applied to secondary school education. The application presented integrates several state-of-the-art technologies related to spoken language and intelligent computer-assisted language learning. We envision to show that the technology has reached a level of maturity that suggests that the time may be right to use it to second language learning. To achieve this objective, an activity was designed to be tested at several Spanish...

  20. International Symposium on Intelligent Systems Technologies and Applications

    CERN Document Server

    Thampi, Sabu; Dasgupta, Soura; Srivastava, Praveen; ISTA

    2016-01-01

    This book contains a selection of refereed and revised papers from three special tracks: Ad-hoc and Wireless Sensor Networks, Intelligent Distributed Computing and, Business Intelligence and Big Data Analytics originally presented at the International Symposium on Intelligent Systems Technologies and Applications (ISTA), August 10-13, 2015, Kochi, India.  .

  1. Computers and Organizational Change Factors That Influence Useful Adoption of Computer Applications

    Science.gov (United States)

    Davis, Howard R.; Salasin, Susan E.

    1982-01-01

    The spread of computer applications and their usefulness in improving patient care and organizational change are impressive. However, an unevenness in the impact has occurred - as can be expected in the diffusion of innovation process, in general. Later-adopting persons and organizations need the attention of researchers and innovation experts in this field. Factors that can be addressed in fostering appropriate change through computer applications are: (1) feeling of the need for the application; (2) clarity on how to employ the technology; (3) degree of fit with the style and values of the host facilities; (4) special local circumstances and timing; (5) resistances, both rational and subtle; (6) anticipation, or direct experience of benefits from computer aplication; and (7) abilities and resources that are required for successful system operation.

  2. Reversible logic synthesis methodologies with application to quantum computing

    CERN Document Server

    Taha, Saleem Mohammed Ridha

    2016-01-01

    This book opens the door to a new interesting and ambitious world of reversible and quantum computing research. It presents the state of the art required to travel around that world safely. Top world universities, companies and government institutions  are in a race of developing new methodologies, algorithms and circuits on reversible logic, quantum logic, reversible and quantum computing and nano-technologies. In this book, twelve reversible logic synthesis methodologies are presented for the first time in a single literature with some new proposals. Also, the sequential reversible logic circuitries are discussed for the first time in a book. Reversible logic plays an important role in quantum computing. Any progress in the domain of reversible logic can be directly applied to quantum logic. One of the goals of this book is to show the application of reversible logic in quantum computing. A new implementation of wavelet and multiwavelet transforms using quantum computing is performed for this purpose. Rese...

  3. The 9th international conference on computing and information technology

    CERN Document Server

    Unger, Herwig; Boonkrong, Sirapat; IC2IT2013

    2013-01-01

    This volume contains the papers of the 9th International Conference on Computing and Information Technology (IC2IT 2013) held at King Mongkut's University of Technology North Bangkok (KMUTNB), Bangkok, Thailand, on May 9th-10th, 2013. Traditionally, the conference is organized in conjunction with the National Conference on Computing and Information Technology, one of the leading Thai national events in the area of Computer Science and Engineering. The conference as well as this volume is structured into 3 main tracks on Data Networks/Communication, Data Mining/Machine Learning, and Human Interfaces/Image processing.  

  4. Soft computing techniques in engineering applications

    CERN Document Server

    Zhong, Baojiang

    2014-01-01

    The Soft Computing techniques, which are based on the information processing of biological systems are now massively used in the area of pattern recognition, making prediction & planning, as well as acting on the environment. Ideally speaking, soft computing is not a subject of homogeneous concepts and techniques; rather, it is an amalgamation of distinct methods that confirms to its guiding principle. At present, the main aim of soft computing is to exploit the tolerance for imprecision and uncertainty to achieve tractability, robustness and low solutions cost. The principal constituents of soft computing techniques are probabilistic reasoning, fuzzy logic, neuro-computing, genetic algorithms, belief networks, chaotic systems, as well as learning theory. This book covers contributions from various authors to demonstrate the use of soft computing techniques in various applications of engineering.  

  5. Computer technology: Silicon chips lighten up

    Science.gov (United States)

    Vivien, Laurent

    2015-12-01

    Microprocessor communications have received a boost from the integration of electronics and photonics in silicon -- a first step towards low power consumption and efficient computing systems. See Letter p.534

  6. Smart Technology Applications in Business Environments

    NARCIS (Netherlands)

    Issa, Tomayess; Kommers, Petrus A.M.; Issa, Theodora; Isaías, Pedro; Issa, Touma B.

    2017-01-01

    Technology continues to make great strides in society by providing opportunities for advancement, inclusion, and global competency. As new systems and tools arise, novel applications are created as well. Smart Technology Applications in Business Environments is an essential reference source for the

  7. Development and Applications of Simulation Technology

    Institute of Scientific and Technical Information of China (English)

    WangZicai

    2004-01-01

    The developing process of simulation technology is discussed in view of its development, maturation and further development.The applications of simulation technology in the fields of national economy are introduced. Finally, the level and status quo of simulation technology home and overseas are analyzed, and its future trend in the new century is presented.

  8. Computational methods in molecular imaging technologies

    CERN Document Server

    Gunjan, Vinit Kumar; Venkatesh, C; Amarnath, M

    2017-01-01

    This book highlights the experimental investigations that have been carried out on magnetic resonance imaging and computed tomography (MRI & CT) images using state-of-the-art Computational Image processing techniques, and tabulates the statistical values wherever necessary. In a very simple and straightforward way, it explains how image processing methods are used to improve the quality of medical images and facilitate analysis. It offers a valuable resource for researchers, engineers, medical doctors and bioinformatics experts alike.

  9. Cloud computing technology framework and reducing risks

    OpenAIRE

    Akrir, Khaled Ali Ahmed

    2015-01-01

    The thesis investigates, in a qualitative way, the vectors that contribute to cloud computing risks in the areas of security, business, and compliance. The focus of this research is on the identification of risk vectors that affect cloud computing and the creation of a framework that can help IT managers in their cloud adoption process. Economic pressures on businesses are creating a demand for an alternative delivery of the model that can provide flexible payments, dramatic cuts in capital i...

  10. Statistical methods and computer applications

    CERN Document Server

    Arora, PN

    2009-01-01

    Some of the exclusive features of the book are: Every concept has been explained with the help of solved examples. Working rules showing the various steps for the applications of formulae have also been given. The diagrams and graphs have been neatly and correctly drawn in such a way that the students have the complete understanding of the problem by simply looking at them. Efforts have been made to make the subject throughly exhaustive and nothing important has been omitted. Answer to all the problems have been throughly checked. It is a user-friendly book containing many, solved problems and

  11. 煤矿计算机监视系统中多媒体技术的应用%Application of Multimedia Technology in Computer Monitoring System of Coal Mine

    Institute of Scientific and Technical Information of China (English)

    李琴

    2013-01-01

    结合了多媒体计算机的相关技术和现有煤矿工业电视监视系统、煤矿计算机监控系统的状况,初步探讨了多媒体技术在煤矿工业电视监视系统和煤矿计算机监控的用途。%Based on the multimedia computer technology and existing coal mine industrial TV monitoring system, coal computer monitoring system status, and explore the use of multimedia technology in coal mine industrial TV monitoring system and coal computer monitoring.

  12. GSAC - Generic Seismic Application Computing

    Science.gov (United States)

    Herrmann, R. B.; Ammon, C. J.; Koper, K. D.

    2004-12-01

    With the success of the IRIS data management center, the use of large data sets in seismological research has become common. Such data sets, and especially the significantly larger data sets expected from EarthScope, present challenges for analysis with existing tools developed over the last 30 years. For much of the community, the primary format for data analysis is the Seismic Analysis Code (SAC) format developed by Lawrence Livermore National Laboratory. Although somewhat restrictive in meta-data storage, the simplicity and stability of the format has established it as an important component of seismological research. Tools for working with SAC files fall into two categories - custom research quality processing codes and shared display - processing tools such as SAC2000, MatSeis,etc., which were developed primarily for the needs of individual seismic research groups. While the current graphics display and platform dependence of SAC2000 may be resolved if the source code is released, the code complexity and the lack of large-data set analysis or even introductory tutorials could preclude code improvements and development of expertise in its use. We believe that there is a place for new, especially open source, tools. The GSAC effort is an approach that focuses on ease of use, computational speed, transportability, rapid addition of new features and openness so that new and advanced students, researchers and instructors can quickly browse and process large data sets. We highlight several approaches toward data processing under this model. gsac - part of the Computer Programs in Seismology 3.30 distribution has much of the functionality of SAC2000 and works on UNIX/LINUX/MacOS-X/Windows (CYGWIN). This is completely programmed in C from scratch, is small, fast, and easy to maintain and extend. It is command line based and is easily included within shell processing scripts. PySAC is a set of Python functions that allow easy access to SAC files and enable efficient

  13. Applications of computational quantum mechanics

    Science.gov (United States)

    Temel, Burcin

    This original research dissertation is composed of a new numerical technique based on Chebyshev polynomials that is applied on scattering problems, a phenomenological kinetics study for CO oxidation on RuO2 surface, and an experimental study on methanol coupling with doped metal oxide catalysts. Minimum Error Method (MEM), a least-squares minimization method, provides an efficient and accurate alternative to solve systems of ordinary differential equations. Existing methods usually utilize matrix methods which are computationally costful. MEM, which is based on the Chebyshev polynomials as a basis set, uses the recursion relationships and fast Chebyshev transforms which scale as O(N). For large basis set calculations this provides an enormous computational efficiency in the calculations. Chebyshev polynomials are also able to represent non-periodic problems very accurately. We applied MEM on elastic and inelastic scattering problems: it is more efficient and accurate than traditionally used Kohn variational principle, and it also provides the wave function in the interaction region. Phenomenological kinetics (PK) is widely used in industry to predict the optimum conditions for a chemical reaction. PK neglects the fluctuations, assumes no lateral interactions, and considers an ideal mix of reactants. The rate equations are tested by fitting the rate constants to the results of the experiments. Unfortunately, there are numerous examples where a fitted mechanism was later shown to be erroneous. We have undertaken a thorough comparison between the phenomenological equations and the results of kinetic Monte Carlo (KMC) simulations performed on the same system. The PK equations are qualitatively consistent with the KMC results but are quantitatively erroneous as a result of interplays between the adsorption and desorption events. The experimental study on methanol coupling with doped metal oxide catalysts demonstrates the doped metal oxides as a new class of catalysts

  14. Advanced Technologies, Embedded and Multimedia for Human-Centric Computing

    CERN Document Server

    Chao, Han-Chieh; Deng, Der-Jiunn; Park, James; HumanCom and EMC 2013

    2014-01-01

    The theme of HumanCom and EMC are focused on the various aspects of human-centric computing for advances in computer science and its applications, embedded and multimedia computing and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of human-centric computing. And the theme of EMC (Advanced in Embedded and Multimedia Computing) is focused on the various aspects of embedded system, smart grid, cloud and multimedia computing, and it provides an opportunity for academic, industry professionals to discuss the latest issues and progress in the area of embedded and multimedia computing. Therefore this book will be include the various theories and practical applications in human-centric computing and embedded and multimedia computing.

  15. Review of Enabling Technologies to Facilitate Secure Compute Customization

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pelfrey, Daniel S [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2014-12-01

    environments. As part of our technology review we analyzed several current virtualization solutions to assess their vulnerabilities. This included a review of common vulnerabilities and exposures (CVEs) for Xen, KVM, LXC and Docker to gauge their susceptibility to different attacks. The complete details are provided in Section 5 on page 33. Based on this review we concluded that system-level virtualization solutions have many more vulnerabilities than OS level virtualization solutions. As such, security mechanisms like sVirt (Section 3.3) should be considered when using system-level virtualization solutions in order to protect the host against exploits. The majority of vulnerabilities related to KVM, LXC, and Docker are in specific regions of the system. Therefore, future "zero day attacks" are likely to be in the same regions, which suggests that protecting these areas can simplify the protection of the host and maintain the isolation between users. The evaluations of virtualization technologies done thus far are discussed in Section 4. This includes experiments with 'user' namespaces in VEs, which provides the ability to isolate user privileges and allow a user to run with different UIDs within the container while mapping them to non-privileged UIDs in the host. We have identified Linux namespaces as a promising mechanism to isolate shared resources, while maintaining good performance. In Section 4.1 we describe our tests with LXC as a non-root user and leveraging namespaces to control UID/GID mappings and support controlled sharing of parallel file-systems. We highlight several of these namespace capabilities in Section 6.2.3. The other evaluations that were performed during this initial phase of work provide baseline performance data for comparing VEs and VMs to purely native execution. In Section 4.2 we performed tests using the High-Performance Computing Conjugate Gradient (HPCCG) benchmark to establish baseline performance for a scientific application when run

  16. Computer applications in railway operation

    Directory of Open Access Journals (Sweden)

    Mohamed Hafez Fahmy Aly

    2016-06-01

    Full Text Available One of the main goals of the railway simulation technique is the formation of a model that can be easily tested for any desired changes and modifications in infrastructure, control system, or in train operations in order to improve the network operation and its productivity. RailSys3.0 is a German railway simulation program that deals with this goal. In this paper, a railway network operation, with different suggested modifications in infrastructure, rolling stocks, and control system, using RailSys3.0, has been studied, optimized, and evaluated. The proposed simulation program (RailSys 3.0 was applied on ABO-KIR railway line in Alexandria city, as a case study, to assess the impact of changing track configuration, operating and control systems on the performance measures, time-table, track capacity and productivity. Simulation input, such as track element, train and operation components of the ABO-KIR railway line, has been entered to the computer program to construct the simulation model. The simulation process has been carried out for the existing operation system to construct a graphical model of the case-study track including line alignment and train movements, as well as to evaluate the existing operation system. To improve the operation system of the railway line, eight different innovative alternatives are generated, analyzed and evaluated. Finally, different track measures to improve the operation system of the ABO-KIR railway line have been introduced.

  17. CT技术在安检领域应用综述%Review of the Application of Computed Tomography Technology in Safety Inspection Domain

    Institute of Scientific and Technical Information of China (English)

    郑金州; 鲁绍栋

    2012-01-01

    Among the various technologies of safety inspection,CT technique has become one of effective technologies.The first generation X-ray CT has high radio of wrong alarm and missing alarm.The new development has solved this problem.Comparing with X-ray security inspector,CT's security inspector have many advantages,because it is fundamental improvement.The fundamental improvement is three-dimensional imaging and determining density and the atomic number,overcoming the problem-double image of the X-ray security inspector.This techology can accomplish comparing physical characteristics with dangerous materials automaticly,reducing influence from human beings.The result is to lighten labor intensity of secruity staffs,also to guarantee the effect of security check.With the terrorism creeping all round the world,there is a large market for CT's security inspector.%在现有的安检技术中,X光CT技术是比较成熟、有效的手段之一。第一代X光CT安检机存在着较高的误报及漏报,CT技术的发展可以有效地解决这一问题。X光CT安检机与普通X射线安检机相比,有很多优点,技术有了本质上的提高,尤其是实现了三维成像和能够测定物体密度及原子序数,有效解决了普通X射线安检机成像的重影问题,能够自动与危险品的物理特征进行比对,减少人为因素的影响,既减轻安检人员的劳动强度,又能保证安检效果。

  18. 计算机应用技术专业教学资源库建设与研究%A study on the construction of teaching resources warehouse for computer application technology

    Institute of Scientific and Technical Information of China (English)

    黄力明

    2014-01-01

    The construction of teaching resources warehouses for computer application specialty is conducive for u-sing excellent teaching resources,enhancing specialty teaching quality and building a good learning environment for independent learning.In order to create good and convenient environments for students and create good course preparation and resources sharing environments for teachers,we have built the specialty teaching resources ware-house in the aspects of teaching resources libraries and teaching system support platform.Practice shows that com-puter application technology professional teaching resources have improved the utilization of teaching resources and better serve teaching.%创建计算机应用技术专业教学资源库有利于优质教学资源的充分利用,能提高计算机应用技术专业教学质量,为学生自主学习创建一个良好的学习环境。以“为学生创造良好、方便的学习环境”“为教师创造良好的备课与资源分享环境”为主要目标,从教学资源库和教学系统支持平台方面建设计算机应用技术专业教学资源库。实践表明:计算机应用技术专业教学资源库的建设提高了教学资源的利用率,促进教学资源更好地为教学服务。

  19. Hybrid soft computing approaches research and applications

    CERN Document Server

    Dutta, Paramartha; Chakraborty, Susanta

    2016-01-01

    The book provides a platform for dealing with the flaws and failings of the soft computing paradigm through different manifestations. The different chapters highlight the necessity of the hybrid soft computing methodology in general with emphasis on several application perspectives in particular. Typical examples include (a) Study of Economic Load Dispatch by Various Hybrid Optimization Techniques, (b) An Application of Color Magnetic Resonance Brain Image Segmentation by ParaOptiMUSIG activation Function, (c) Hybrid Rough-PSO Approach in Remote Sensing Imagery Analysis,  (d) A Study and Analysis of Hybrid Intelligent Techniques for Breast Cancer Detection using Breast Thermograms, and (e) Hybridization of 2D-3D Images for Human Face Recognition. The elaborate findings of the chapters enhance the exhibition of the hybrid soft computing paradigm in the field of intelligent computing.

  20. Theories of Learning and Computer-Mediated Instructional Technologies.

    Science.gov (United States)

    Hung, David

    2001-01-01

    Describes four major models of learning: behaviorism, cognitivism, constructivism, and social constructivism. Discusses situated cognition; differences between learning theories and instructional approaches; and how computer-mediated technologies can be integrated with learning theories. (LRW)

  1. Leveraging mobile computing and communication technologies in education

    DEFF Research Database (Denmark)

    Annan, Nana Kofi

    The emergence of mobile computing and communication technologies has come with it, an unprecedented transformation in digitalising every aspect of human activities. This transformation has brought about a high degree of mobility in the way knowledge is constructed, processed, stored...... and disseminated through the use of portable information and communication technologies (ICTs) such as smart phones, tablets, personal computers and laptop computers. These mobile devices use mobile communication infrastructure to promote the mobility affordances for human activities anywhere and anytime. Although...... education and technology have evolved in tandem over the past years, this dissertation recognises the lapse that there is, in not being able to effectively leverage technology to improve education delivery by most educators. The study appreciates the enormousness of mobile computing and communication...

  2. Theories of Learning and Computer-Mediated Instructional Technologies.

    Science.gov (United States)

    Hung, David

    2001-01-01

    Describes four major models of learning: behaviorism, cognitivism, constructivism, and social constructivism. Discusses situated cognition; differences between learning theories and instructional approaches; and how computer-mediated technologies can be integrated with learning theories. (LRW)

  3. The application of persuasive technology to educational settings

    DEFF Research Database (Denmark)

    Mintz, Joseph; Aagaard, Morten

    2012-01-01

    Persuasive technology is a sub-discipline of Human–Computer Interaction that has emerged within the last 10 years, and which has generated increasing interest in the application of persuasion to systems design. Most applications have to date been developed in commercial contexts, as well...... in the domain of health promotion. We present a mainly theoretical consideration of how persuasive technology could be used in educational contexts, particularly in school settings. We consider how persuasive technology design may need to be modified to meet the needs of complex educational settings. We propose...... four design principles for the use of persuasive technology in instructional design, including credibility and Kairos. We derive these from theoretical considerations, as well as from our experience with the HANDS project, which has developed a mobile persuasive application for positive behaviour...

  4. 2nd International Symposium on Intelligent Systems Technologies and Applications

    CERN Document Server

    Mitra, Sushmita; Thampi, Sabu; El-Alfy, El-Sayed

    2016-01-01

    This book constitutes the thoroughly refereed proceedings of the second International Symposium on Intelligent Systems Technologies and Applications (ISTA’16), held on September 21–24, 2016 in Jaipur, India. The 80 revised papers presented were carefully reviewed and selected from 210 initial submissions and are organized in topical sections on image processing and artificial vision, computer networks and distributed systems, intelligent tools and techniques and applications using intelligent techniques.

  5. Digital Watermarking Technology with Practical Applications

    Directory of Open Access Journals (Sweden)

    Norishige Morimoto

    1999-01-01

    Full Text Available Digital watermarking technology has been actively studied and developed by a number of institutions and companies since mid ‘90s. This area draws more and more attention as one of the key technology elements for content management, copyright protection and copy control of digital contents. This article discusses several different types of digital watermark application, particularly the application of digital watermarks for DVD copy control. This would be the first digital watermark application requiring worldwide standardization.

  6. PREPARING FOR EXASCALE: ORNL Leadership Computing Application Requirements and Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Joubert, Wayne [ORNL; Kothe, Douglas B [ORNL; Nam, Hai Ah [ORNL

    2009-12-01

    In 2009 the Oak Ridge Leadership Computing Facility (OLCF), a U.S. Department of Energy (DOE) facility at the Oak Ridge National Laboratory (ORNL) National Center for Computational Sciences (NCCS), elicited petascale computational science requirements from leading computational scientists in the international science community. This effort targeted science teams whose projects received large computer allocation awards on OLCF systems. A clear finding of this process was that in order to reach their science goals over the next several years, multiple projects will require computational resources in excess of an order of magnitude more powerful than those currently available. Additionally, for the longer term, next-generation science will require computing platforms of exascale capability in order to reach DOE science objectives over the next decade. It is generally recognized that achieving exascale in the proposed time frame will require disruptive changes in computer hardware and software. Processor hardware will become necessarily heterogeneous and will include accelerator technologies. Software must undergo the concomitant changes needed to extract the available performance from this heterogeneous hardware. This disruption portends to be substantial, not unlike the change to the message passing paradigm in the computational science community over 20 years ago. Since technological disruptions take time to assimilate, we must aggressively embark on this course of change now, to insure that science applications and their underlying programming models are mature and ready when exascale computing arrives. This includes initiation of application readiness efforts to adapt existing codes to heterogeneous architectures, support of relevant software tools, and procurement of next-generation hardware testbeds for porting and testing codes. The 2009 OLCF requirements process identified numerous actions necessary to meet this challenge: (1) Hardware capabilities must be

  7. Advanced computational electromagnetic methods and applications

    CERN Document Server

    Li, Wenxing; Elsherbeni, Atef; Rahmat-Samii, Yahya

    2015-01-01

    This new resource covers the latest developments in computational electromagnetic methods, with emphasis on cutting-edge applications. This book is designed to extend existing literature to the latest development in computational electromagnetic methods, which are of interest to readers in both academic and industrial areas. The topics include advanced techniques in MoM, FEM and FDTD, spectral domain method, GPU and Phi hardware acceleration, metamaterials, frequency and time domain integral equations, and statistics methods in bio-electromagnetics.

  8. Computing handbook information systems and information technology

    CERN Document Server

    Topi, Heikki

    2014-01-01

    Disciplinary Foundations and Global ImpactEvolving Discipline of Information Systems Heikki TopiDiscipline of Information Technology Barry M. Lunt and Han ReichgeltInformation Systems as a Practical Discipline Juhani IivariInformation Technology Han Reichgelt, Joseph J. Ekstrom, Art Gowan, and Barry M. LuntSociotechnical Approaches to the Study of Information Systems Steve Sawyer and Mohammad Hossein JarrahiIT and Global Development Erkki SutinenUsing ICT for Development, Societal Transformation, and Beyond Sherif KamelTechnical Foundations of Data and Database ManagementData Models Avi Silber

  9. BMDO Technology Applications in Biomedicine

    Science.gov (United States)

    1996-01-01

    feeling human brain, helping to unlock the mysteries of mental illness. Laser technologies that today are used in health centers to treat vascular and...Grande Medical Technologies, Inc. (page 53) Mr. Tom Fortin 915 Camino de Salud Box 603 Albuquerque, NM 87131-5271 Telephone (505) 277-9145

  10. Cloud computing for data-intensive applications

    CERN Document Server

    Li, Xiaolin

    2014-01-01

    This book presents a range of cloud computing platforms for data-intensive scientific applications. It covers systems that deliver infrastructure as a service, including: HPC as a service; virtual networks as a service; scalable and reliable storage; algorithms that manage vast cloud resources and applications runtime; and programming models that enable pragmatic programming and implementation toolkits for eScience applications. Many scientific applications in clouds are also introduced, such as bioinformatics, biology, weather forecasting and social networks. Most chapters include case studie

  11. New Concepts and Applications in Soft Computing

    CERN Document Server

    Fodor, János; Várkonyi-Kóczy, Annamária

    2013-01-01

                  The book provides a sample of research on the innovative theory and applications of soft computing paradigms.             The idea of Soft Computing was initiated in 1981 when Professor Zadeh published his first paper on soft data analysis and constantly evolved ever since. Professor Zadeh defined Soft Computing as the fusion of the fields of fuzzy logic (FL), neural network theory (NN) and probabilistic reasoning (PR), with the latter subsuming belief networks, evolutionary computing including DNA computing, chaos theory and parts of learning theory into one multidisciplinary system. As Zadeh said the essence of soft computing is that unlike the traditional, hard computing, soft computing is aimed at an accommodation with the pervasive imprecision of the real world. Thus, the guiding principle of soft computing is to exploit the tolerance for imprecision, uncertainty and partial truth to achieve tractability, robustness, low solution cost and better rapport with reality. ...

  12. Technological Imperatives: Using Computers in Academic Debate.

    Science.gov (United States)

    Ticku, Ravinder; Phelps, Greg

    Intended for forensic educators and debate teams, this document details how one university debate team, at the University of Iowa, makes use of computer resources on campus to facilitate storage and retrieval of information useful to debaters. The introduction notes the problem of storing and retrieving the amount of information required by debate…

  13. USSR Report, Cybernetics, Computers and Automation Technology.

    Science.gov (United States)

    2007-11-02

    27 Automating Data Processing on the Rayon and Oblast Levels (A.P. Kolesnik, K.V. Golovin , et al.; FINANSY SSSR, No 5, May 86) 29 Development of...RSFSR Ministry of Finance, K. V. Golovin , division chief, main computer center, USSR Ministry of Finance, and V. Z. Usov, division chief, main

  14. USSR Report, Cybernetics, Computers and Automation Technology

    Science.gov (United States)

    2007-11-02

    algorithm consists in moving along RD to a particular finite node proceeding from successive analysis of characteris- tics (indexes) of the sampling...requirements on devices control system hardware complex. Characteristics of transducers. Characteristics of the computer, USO [entity connection...characteristics of these classes of tasks; these characteris- tics were used as the raw data for calculating the particular effectiveness criteria

  15. CACTUS: Calculator and Computer Technology User Service.

    Science.gov (United States)

    Hyde, Hartley

    1998-01-01

    Presents an activity in which students use computer-based spreadsheets to find out how much grain should be added to a chess board when a grain of rice is put on the first square, the amount is doubled for the next square, and the chess board is covered. (ASK)

  16. Cloud Computing Technologies Facilitate Earth Research

    Science.gov (United States)

    2015-01-01

    Under a Space Act Agreement, NASA partnered with Seattle-based Amazon Web Services to make the agency's climate and Earth science satellite data publicly available on the company's servers. Users can access the data for free, but they can also pay to use Amazon's computing services to analyze and visualize information using the same software available to NASA researchers.

  17. USSR Report: Cybernetics, Computers and Automation Technology

    Science.gov (United States)

    2007-11-02

    Georgian SSR Academy of Sciences: "Ready for Dialogue"] [Text] Computers in schools, auditoria , and educational laboratories are an phenomenon to which we...professional-technical academies and VUZ auditoria . Obviously, the color of the screens and the characters on them is of major importance for people

  18. Advanced Methods and Applications in Computational Intelligence

    CERN Document Server

    Nikodem, Jan; Jacak, Witold; Chaczko, Zenon; ACASE 2012

    2014-01-01

    This book offers an excellent presentation of intelligent engineering and informatics foundations for researchers in this field as well as many examples with industrial application. It contains extended versions of selected papers presented at the inaugural ACASE 2012 Conference dedicated to the Applications of Systems Engineering. This conference was held from the 6th to the 8th of February 2012, at the University of Technology, Sydney, Australia, organized by the University of Technology, Sydney (Australia), Wroclaw University of Technology (Poland) and the University of Applied Sciences in Hagenberg (Austria). The  book is organized into three main parts. Part I contains papers devoted to the heuristic approaches that are applicable in situations where the problem cannot be solved by exact methods, due to various characteristics or  dimensionality problems. Part II covers essential issues of the network management, presents intelligent models of the next generation of networks and distributed systems ...

  19. Proceedings of the workshop on molten salts technology and computer simulation

    Energy Technology Data Exchange (ETDEWEB)

    Hayashi, Hirokazu; Minato, Kazuo (eds.) [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    2001-12-01

    Applications of molten salts technology to separation and synthesis of materials have been studied eagerly, which would develop new fields of materials science. Research Group for Actinides Science, Department of Materials Science, Japan Atomic Energy Research Institute (JAERI), together with Reprocessing and Recycle Technology Division, Atomic Energy Society of Japan, organized the Workshop on Molten Salts Technology and Computer Simulation at Tokai Research Establishment, JAERI on July 18, 2001. In the workshop eleven lectures were made and lively discussions were there on the fundamentals and applications of the molten salts technology that covered the structure and basic properties of molten salts, the pyrochemical reprocessing technology and the relevant computer simulation. The 10 of the presented papers are indexed individually. (J.P.N.)

  20. Application of advanced electronics to a future spacecraft computer design

    Science.gov (United States)

    Carney, P. C.

    1980-01-01

    Advancements in hardware and software technology are summarized with specific emphasis on spacecraft computer capabilities. Available state of the art technology is reviewed and candidate architectures are defined.

  1. Progress and Challenges in High Performance Computer Technology

    Institute of Scientific and Technical Information of China (English)

    Xue-Jun Yang; Yong Dou; Qing-Feng Hu

    2006-01-01

    High performance computers provide strategic computing power in the construction of national economy and defense, and become one of symbols of the country's overall strength. Over 30 years, with the supports of governments, the technology of high performance computers is in the process of rapid development, during which the computing performance increases nearly 3 million times and the processors number expands over 10 hundred thousands times. To solve the critical issues related with parallel efficiency and scalability, scientific researchers pursued extensive theoretical studies and technical innovations. The paper briefly looks back the course of building high performance computer systems both at home and abroad,and summarizes the significant breakthroughs of international high performance computer technology. We also overview the technology progress of China in the area of parallel computer architecture, parallel operating system and resource management,parallel compiler and performance optimization, environment for parallel programming and network computing. Finally, we examine the challenging issues, "memory wall", system scalability and "power wall", and discuss the issues of high productivity computers, which is the trend in building next generation high performance computers.

  2. A New Advance in Intelligent Computing Technology

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    @@ A recent study by Dr. HUANG Deshuang and his colleagues from the CAS Hefei Institute of Intelligent Machines has shed new light on the development of digital image processing technology. Their work was reported as a cover story in the July issue of the Digital Signal Processing: A Review Journal.

  3. Audio Technology and Mobile Human Computer Interaction

    DEFF Research Database (Denmark)

    Chamberlain, Alan; Bødker, Mads; Hazzard, Adrian

    2017-01-01

    Audio-based mobile technology is opening up a range of new interactive possibilities. This paper brings some of those possibilities to light by offering a range of perspectives based in this area. It is not only the technical systems that are developing, but novel approaches to the design...

  4. JPRS Report, Science & Technology, USSR: Computers

    Science.gov (United States)

    2007-11-02

    fast set-up change for manufacturing of new products" (GOST [State All-Union Standart ] 14.001-73 and GOST 26228- 85). A flexible automated...tekhnologicheskoy podgotovki proizvodstva" [Scientific Foundations of Integrated Standart izat ion of Technological Preparation of Production

  5. Advanced sensor-computer technology for urban runoff monitoring

    Science.gov (United States)

    Yu, Byunggu; Behera, Pradeep K.; Ramirez Rochac, Juan F.

    2011-04-01

    The paper presents the project team's advanced sensor-computer sphere technology for real-time and continuous monitoring of wastewater runoff at the sewer discharge outfalls along the receiving water. This research significantly enhances and extends the previously proposed novel sensor-computer technology. This advanced technology offers new computation models for an innovative use of the sensor-computer sphere comprising accelerometer, programmable in-situ computer, solar power, and wireless communication for real-time and online monitoring of runoff quantity. This innovation can enable more effective planning and decision-making in civil infrastructure, natural environment protection, and water pollution related emergencies. The paper presents the following: (i) the sensor-computer sphere technology; (ii) a significant enhancement to the previously proposed discrete runoff quantity model of this technology; (iii) a new continuous runoff quantity model. Our comparative study on the two distinct models is presented. Based on this study, the paper further investigates the following: (1) energy-, memory-, and communication-efficient use of the technology for runoff monitoring; (2) possible sensor extensions for runoff quality monitoring.

  6. Codesign Analysis of a Computer Graphics Application

    DEFF Research Database (Denmark)

    Madsen, Jan; Brage, Jens P.

    1996-01-01

    This paper describes a codesign case study where a computer graphics application is examined with the intention to speed up its execution. The application is specified as a C program, and is characterized by the lack of a simple compute-intensive kernel. The hardware/software partitioning is based...... on information obtained from software profiling and the resulting design is validated through cosimulation. The achieved speed-up is estimated based on an analysis of profiling information from different sets of input data and various architectural options....

  7. Designing Pervasive Computing Technology - In a Nomadic Work Perspective

    DEFF Research Database (Denmark)

    Kristensen, Jannie Friis

    2002-01-01

    In my thesis work I am investigating how the design of pervasive/ubiquitous computing technology, relate to the flexible and individual work practice of nomadic workers. Through empirical studies and with an experimental systems development approach, the work is focused on: a) Supporting...... interpretation and inclusion of implicit and invisible as well as explicit and visible characteristics of artifacts, users and use practices. b) Identifying breakdowns in human-computer interaction situations, with particular emphasis on the computation that happens "behind the scenes" in the pervasive computing...... environment, and how that computational process at a sufficient level is made intelligible, visible, accountable and negotiable to the human participant....

  8. Application of Computer Vision Technology in Tomato Picking under Natural Background%自然背景下计算机视觉技术在西红柿采摘中的应用

    Institute of Scientific and Technical Information of China (English)

    李思广

    2017-01-01

    针对西红柿种植过程中,采摘费时费力的问题,将计算机视觉技术与图像处理和模式识别技术相结合,开发了在自然背景条件下的西红柿自动识别系统。运用双目立体视觉系统来识别红色西红柿,去除原始图像的噪声、转换图像的灰度、对新图像进行分割和目标特征提取,从背景中把西红柿分离出来;同时,针对果实间存在的重叠问题,采用圆形 Hough 变换算法,提取西红柿的圆心坐标和半径特征,通过获取T=Sqrt ( s ×l )图像,恢复被遮挡西红柿。利用该技术,采集了不同条件下的100张西红柿照片,其中99张照片被准确识别,识别率达到99%以上,能够较好地满足西红柿采摘工作的要求。%Computer vision technology is an important branch of computer technology .It has been widely used and devel-oped from the beginning of last century .According to the picking time-consuming problem during tomato planting , the combination of computer vision technology and image processing and pattern recognition technology , developed under nat-ural background condition of tomato automatic identification and picking method .Using binocular stereo vision system to i-dentify the red tomatoes , removal of the original image noise ,image conversion of gray ,the new image of segmentation and target feature extraction , from the background to isolate the tomatoes;and according to the fruit of overlapping problem , using circular Hough transform algorithm , extraction tomatoes of the center coordinates and radius of the characteristics , through T=Sqrt (s x L) image acquisition, the restoration of occlusion tomatoes .Using this technique,100 tomato pic-tures were collected under different conditions , the 99 pictures were identified accurately and the recognition rate reached 99%, which could meet the requirements of the tomato picking .The development and application of this technology can improve

  9. NCBO Technology: Powering semantically aware applications.

    Science.gov (United States)

    Whetzel, Patricia L

    2013-04-15

    As new biomedical technologies are developed, the amount of publically available biomedical data continues to increase. To help manage these vast and disparate data sources, researchers have turned to the Semantic Web. Specifically, ontologies are used in data annotation, natural language processing, information retrieval, clinical decision support, and data integration tasks. The development of software applications to perform these tasks requires the integration of Web services to incorporate the wide variety of ontologies used in the health care and life sciences. The National Center for Biomedical Ontology, a National Center for Biomedical Computing created under the NIH Roadmap, developed BioPortal, which provides access to one of the largest repositories of biomedical ontologies. The NCBO Web services provide programmtic access to these ontologies and can be grouped into four categories; Ontology, Mapping, Annotation, and Data Access. The Ontology Web services provide access to ontologies, their metadata, ontology versions, downloads, navigation of the class hierarchy (parents, children, siblings) and details of each term. The Mapping Web services provide access to the millions of ontology mappings published in BioPortal. The NCBO Annotator Web service "tags" text automatically with terms from ontologies in BioPortal, and the NCBO Resource Index Web services provides access to an ontology-based index of public, online data resources. The NCBO Widgets package the Ontology Web services for use directly in Web sites. The functionality of the NCBO Web services and widgets are incorporated into semantically aware applications for ontology development and visualization, data annotation, and data integration. This overview will describe these classes of applications, discuss a few examples of each type, and which NCBO Web services are used by these applications.

  10. Research status and application prospects of digital technology in orthopaedics.

    Science.gov (United States)

    Chen, Yan-xi; Zhang, Kun; Hao, Yi-ni; Hu, Yong-cheng

    2012-08-01

    In the last 10 years, basic and clinical research in orthopaedics has developed rapidly. Understanding of orthopaedic disorders involves not only routine diagnosis, but also the pursuit of highly efficient and accurate three-dimensional imaging of the intra- and extra-medullary distribution, form and structure of orthopaedic disorders, thus allowing scientific evaluation of the indications for surgery, drawing up of the best surgical plan, minimization of operative trauma and the earliest possible restoration of limb function. Meanwhile, the most important type of basic research, which was previously biomechanical research, has gradually become computational biomechanics based on in vitro cadaver experiments. This review aims to summarize the research status and application prospects of digital technology in orthopaedics, including virtual reality technology, reverse engineering and rapid prototyping techniques, computational biomechanics, computer navigation technology and management of digitization of medical records. © 2012 Tianjin Hospital and Wiley Publishing Asia Pty Ltd.

  11. Design technologies for green and sustainable computing systems

    CERN Document Server

    Ganguly, Amlan; Chakrabarty, Krishnendu

    2013-01-01

    This book provides a comprehensive guide to the design of sustainable and green computing systems (GSC). Coverage includes important breakthroughs in various aspects of GSC, including multi-core architectures, interconnection technology, data centers, high-performance computing (HPC), and sensor networks. The authors address the challenges of power efficiency and sustainability in various contexts, including system design, computer architecture, programming languages, compilers and networking. ·         Offers readers a single-source reference for addressing the challenges of power efficiency and sustainability in embedded computing systems; ·         Provides in-depth coverage of the key underlying design technologies for green and sustainable computing; ·         Covers a wide range of topics, from chip-level design to architectures, computing systems, and networks.

  12. A Discussion of Thin Client Technology for Computer Labs

    CERN Document Server

    Martínez-Mateo, Jesús; Pérez-Rey, David

    2010-01-01

    Computer literacy is not negotiable for any professional in an increasingly computerised environment. Educational institutions should be equipped to provide this new basic training for modern life. Accordingly, computer labs are an essential medium for education in almost any field. Computer labs are one of the most popular IT infrastructures for technical training in primary and secondary schools, universities and other educational institutions all over the world. Unfortunately, a computer lab is expensive, in terms of both initial purchase and annual maintenance costs, and especially when we want to run the latest software. Hence, research efforts addressing computer lab efficiency, performance or cost reduction would have a worldwide repercussion. In response to this concern, this paper presents a survey on thin client technology for computer labs in educational environments. Besides setting out the advantages and drawbacks of this technology, we aim to refute false prejudices against thin clients, identif...

  13. A Technology Assessment of Personal Computers. Vol. I: Summary.

    Science.gov (United States)

    Nilles, Jack M.

    This volume summarizes the results of a 2-year technology assessment of personal computers. The purpose of this study was to explore possible future modes of growth of the personal computer and related industries, to assess the impacts and consequences of that growth, and to present some of the policy issues and options which may arise as a…

  14. Computational Intelligence and Decision Making Trends and Applications

    CERN Document Server

    Madureira, Ana; Marques, Viriato

    2013-01-01

    This book provides a general overview and original analysis of new developments and applications in several areas of Computational Intelligence and Information Systems. Computational Intelligence has become an important tool for engineers to develop and analyze novel techniques to solve problems in basic sciences such as physics, chemistry, biology, engineering, environment and social sciences.   The material contained in this book addresses the foundations and applications of Artificial Intelligence and Decision Support Systems, Complex and Biological Inspired Systems, Simulation and Evolution of Real and Artificial Life Forms, Intelligent Models and Control Systems, Knowledge and Learning Technologies, Web Semantics and Ontologies, Intelligent Tutoring Systems, Intelligent Power Systems, Self-Organized and Distributed Systems, Intelligent Manufacturing Systems and Affective Computing. The contributions have all been written by international experts, who provide current views on the topics discussed and pr...

  15. Using Computer and Video Technologies to Develop Interpersonal Skills.

    Science.gov (United States)

    Campbell, J. Olin; And Others

    1995-01-01

    Two studies investigated ways in which computer and video technology can support expert human coaches in order to reduce instructor time and increase learner-centered environments; the goal was to train undergraduate students to facilitate others' interpersonal problem solving. Results indicate that the technology-supported methods can decrease…

  16. Building Computer Technology Skills in TESOL Teacher Education

    Science.gov (United States)

    DelliCarpini, Margo

    2012-01-01

    This paper reports on an action research study that investigated factors influencing TESOL (teaching English to speakers of other languages) teacher candidates' (TCs) selection and use of technology in the English as a second language (ESL) classroom and the influence of explicit training in context in the use of computer technology for second…

  17. COMPUGIRLS: Stepping Stone to Future Computer-Based Technology Pathways

    Science.gov (United States)

    Lee, Jieun; Husman, Jenefer; Scott, Kimberly A.; Eggum-Wilkens, Natalie D.

    2015-01-01

    The COMPUGIRLS: Culturally relevant technology program for adolescent girls was developed to promote underrepresented girls' future possible selves and career pathways in computer-related technology fields. We hypothesized that the COMPUGIRLS would promote academic possible selves and self-regulation to achieve these possible selves. We compared…

  18. Factors Influencing Cloud-Computing Technology Adoption in Developing Countries

    Science.gov (United States)

    Hailu, Alemayehu

    2012-01-01

    Adoption of new technology has complicating components both from the selection, as well as decision-making criteria and process. Although new technology such as cloud computing provides great benefits especially to the developing countries, it has challenges that may complicate the selection decision and subsequent adoption process. This study…

  19. Beyond Computer Literacy: Supporting Youth's Positive Development through Technology

    Science.gov (United States)

    Bers, Marina Umaschi

    2010-01-01

    In a digital era in which technology plays a role in most aspects of a child's life, having the competence and confidence to use computers might be a necessary step, but not a goal in itself. Developing character traits that will serve children to use technology in a safe way to communicate and connect with others, and providing opportunities for…

  20. Beyond Computer Literacy: Supporting Youth's Positive Development through Technology

    Science.gov (United States)

    Bers, Marina Umaschi

    2010-01-01

    In a digital era in which technology plays a role in most aspects of a child's life, having the competence and confidence to use computers might be a necessary step, but not a goal in itself. Developing character traits that will serve children to use technology in a safe way to communicate and connect with others, and providing opportunities for…

  1. COMPUGIRLS: Stepping Stone to Future Computer-Based Technology Pathways

    Science.gov (United States)

    Lee, Jieun; Husman, Jenefer; Scott, Kimberly A.; Eggum-Wilkens, Natalie D.

    2015-01-01

    The COMPUGIRLS: Culturally relevant technology program for adolescent girls was developed to promote underrepresented girls' future possible selves and career pathways in computer-related technology fields. We hypothesized that the COMPUGIRLS would promote academic possible selves and self-regulation to achieve these possible selves. We compared…

  2. Promoting Technology-Assisted Active Learning in Computer Science Education

    Science.gov (United States)

    Gao, Jinzhu; Hargis, Jace

    2010-01-01

    This paper describes specific active learning strategies for teaching computer science, integrating both instructional technologies and non-technology-based strategies shown to be effective in the literature. The theoretical learning components addressed include an intentional method to help students build metacognitive abilities, as well as…

  3. A Partnership Project: Integrating Computer Technology and Orff-Schulwerk.

    Science.gov (United States)

    Woody, Robert H.; Fredrickson, Julie M.

    2000-01-01

    Describes an alternative approach for general music educators wanting to study new instructional strategies in which a classroom teacher and university educator collaborated to explore the integration of computer technology with Orff-Schulwerk in second- and third-grade music classes. Discusses the project and two of its technology-assisted…

  4. Factors Influencing Cloud-Computing Technology Adoption in Developing Countries

    Science.gov (United States)

    Hailu, Alemayehu

    2012-01-01

    Adoption of new technology has complicating components both from the selection, as well as decision-making criteria and process. Although new technology such as cloud computing provides great benefits especially to the developing countries, it has challenges that may complicate the selection decision and subsequent adoption process. This study…

  5. Terminology of the Newest Technologies and Computering

    Directory of Open Access Journals (Sweden)

    Angelė Kaulakienė

    2011-04-01

    Full Text Available The thirty-five-year period of computer terminology has to be considered the initial stage of its evolution where synonymy and variability are characteristic features, which are usually determined by both extra-linguistic and linguistic factors. The choice of borrowed or Lithuanian terms is often determined by the relationship between borrowed and Lithuanian terms. The first stage of the newest dictionaries of computer terms approbated by the Commission of the Lithuanian Language shows that the terminology of the mentioned field is being systematized and normalized. However, the ratio between Lithuanian and borrowed terms is not fully acceptable yet, and it is partially determined by disagreement among specialists on the status of synonymous terms and the choice of them.

  6. The Application of RFID Technologies in Construction

    Institute of Scientific and Technical Information of China (English)

    LIAN Meng

    2009-01-01

    RFID technologies have advanced greatly and deployed successfully in many industry sectors in recent years. Construction industry could benefit from the applications of RFID technologies but as yet has not found sufficient application areas. This project gives a comprehensive awareness of the RFID technologies, which focus on the investigation on the UK construction industry. The current status of RFID in construction and its potentials are specified in the analysis of questionnaires and case studies. Finally, basing on the investigations, some further tasks in developing RFID technologies are carried, including some recommendations, for the construction industry.

  7. JPRS Report, Science & Technology, USSR: Computers.

    Science.gov (United States)

    2007-11-02

    standpoint of task formulation and performance. These are the recognition of images created by man for Interaction with a computer; the recognition of...systems for visual inspection of the shape of tablets on a pharmaceutical conveyer line or research systems for analyzing the images of three...34 fuzziness " (disorderliness) of the knowledge. 11 It is well known that certain tasks related to image interpretation are accomplished in

  8. USSR Report, Cybernetics, Computers and Automation Technology.

    Science.gov (United States)

    1987-03-02

    quality silage preservative and shampoo from waste fat from the fish-canning industry. One can also name an improved oil shale processing technology...institution section of the CC CP of Estonia , and V. Rayangu, minister of higher and secondary special education of the EsSSR participated in the work of the...name at the Tallinn Polytechnical Institute. This is the first such department in Estonia . In practice it has already become an intersectorial

  9. USSR Report, Cybernetics, Computers and Automation Technology

    Science.gov (United States)

    2007-11-02

    genetic engineering and laser technology. And now there is a new goal, a new highly complex task: elec- tronics. According to available estimates, as...by enterprises of other ministries. More than 100 cities are to be included in this system. FTD /SNAP CSO: 1863/184 11 JPRS-UCC-85-003 23 April...robotiza- tion. FTD /SNAP CSO: 1863/184 58 JPRS-UCC-85-003 23 April 1985 ENHANCED-FLEXIBILITY ROBOT HAND MODULES INVENTED Moscow

  10. Survey of Technologies for Web Application Development

    CERN Document Server

    Doyle, Barry

    2008-01-01

    Web-based application developers face a dizzying array of platforms, languages, frameworks and technical artifacts to choose from. We survey, classify, and compare technologies supporting Web application development. The classification is based on (1) foundational technologies; (2)integration with other information sources; and (3) dynamic content generation. We further survey and classify software engineering techniques and tools that have been adopted from traditional programming into Web programming. We conclude that, although the infrastructure problems of the Web have largely been solved, the cacophony of technologies for Web-based applications reflects the lack of a solid model tailored for this domain.

  11. Nanopositioning technologies fundamentals and applications

    CERN Document Server

    Liu, Xinyu; Sun, Yu

    2016-01-01

    This book covers the state-of-the-art technologies for positioning with nanometer resolutions and accuracies, particularly those based on piezoelectric actuators and MEMS actuators. The latest advances are described, including the design of nanopositioning devices, sensing and actuation technologies, and control methods for nanopositioning. This is an ideal book for mechanical and electrical engineering students and researchers; micro and nanotechnology researchers and graduate students; as well as those working in the precision instrumentation or semiconductor industries.

  12. Japanese technology assessment: Computer science, opto- and microelectronics mechatronics, biotechnology

    Energy Technology Data Exchange (ETDEWEB)

    Brandin, D.; Wieder, H.; Spicer, W.; Nevins, J.; Oxender, D.

    1986-01-01

    The series studies Japanese research and development in four high-technology areas - computer science, opto and microelectronics, mechatronics (a term created by the Japanese to describe the union of mechanical and electronic engineering to produce the next generation of machines, robots, and the like), and biotechnology. The evaluations were conducted by panels of U.S. scientists - chosen from academia, government, and industry - actively involved in research in areas of expertise. The studies were prepared for the purpose of aiding the U.S. response to Japan's technological challenge. The main focus of the assessments is on the current status and long-term direction and emphasis of Japanese research and development. Other aspects covered include evolution of the state of the art; identification of Japanese researchers, R and D organizations, and resources; and comparative U.S. efforts. The general time frame of the studies corresponds to future industrial applications and potential commercial impacts spanning approximately the next two decades.

  13. Art and Technology of Entertainment Computing and Communication

    CERN Document Server

    Cheok, Adrian David

    2010-01-01

    "Art and Technology of Entertainment Computing and Communication" takes a blue sky research perspective on the field of interactive media for entertainment computing. Adrian David Cheok argues that entertainment as an end-product is useful for interactive play, however it is also a powerful tool for learning and communication and it is also a key driver for the development of information technology. This book explores the future of entertainment technologies used for communication and describes quantum step research. It will inform and inspire readers to create their own radical inve

  14. Applications of Computer Graphics in Engineering

    Science.gov (United States)

    1975-01-01

    Various applications of interactive computer graphics to the following areas of science and engineering were described: design and analysis of structures, configuration geometry, animation, flutter analysis, design and manufacturing, aircraft design and integration, wind tunnel data analysis, architecture and construction, flight simulation, hydrodynamics, curve and surface fitting, gas turbine engine design, analysis, and manufacturing, packaging of printed circuit boards, spacecraft design.

  15. A Research Program in Computer Technology

    Science.gov (United States)

    1990-12-31

    systlems. The initial program applications included anl autonomous land vehicle. a pilot’s associate. andl a carrier battle group hattle management system...and Internet connectivity (Telnet). The environment provided by thebe jiodes and server-, conceals the fine-grain detail from outside users; users

  16. Identification of risk factors of computer information technologies in education

    Directory of Open Access Journals (Sweden)

    Hrebniak M.P.

    2014-03-01

    Full Text Available The basic direction of development of secondary school and vocational training is computer training of schoolchildren and students, including distance forms of education and widespread usage of world information systems. The purpose of the work is to determine risk factors for schoolchildren and students, when using modern information and computer technologies. Results of researches allowed to establish dynamics of formation of skills using computer information technologies in education and characteristics of mental ability among schoolchildren and students during training in high school. Common risk factors, while operating CIT, are: intensification and formalization of intellectual activity, adverse ergonomic parameters, unfavorable working posture, excess of hygiene standards by chemical and physical characteristics. The priority preventive directions in applying computer information technology in education are: improvement of optimal visual parameters of activity, rationalization of ergonomic parameters, minimizing of adverse effects of chemical and physical conditions, rationalization of work and rest activity.

  17. HPCC technology awareness program: Improved economic competitiveness through technology awareness, transfer and application. Final report

    Energy Technology Data Exchange (ETDEWEB)

    1994-04-01

    A need has been defined by Congress for the DOE National Laboratories to participate in various dual use and technology transfer programs. This requirement has spawned several technology transfer approaches at the DOE laboratories. These programs are designed to encourage large and small business to bring their problems and needs forward, and to allow the labs to transfer effective high performance computing technology to the commercial marketplace. This IG Technologies grant from the DOE was undertaken to address the issues and problems associated with technology transfer between the DOE National Laboratories and commercial industry. The key focus is to gain an understanding of how DOE and industry independently and collectively view the requirements and the missing elements that could allow DOE to facilitate HPCC technology transfer. At issue is HPCC Technology Transfer for the High Performance Computing industry and its relationship to the DOE National Laboratories. Several observations on this are addressed. The issue of a ``Technology Utilization Gap`` between the National Laboratories and Independent Software Vendors is discussed. This study addressed the HPCC Technology Transfer plans of all six DOE National Labs. Study team members briefed numerous industrial users of HPCC technology as to the feasibility of technology transfer for various applications. Significant findings of the effort are that the resistance to technology transfer is much higher than anticipated for both the National Labs and industry. Also, HPCC Technology Transfer is observed to be a large company`s dominion. Small businesses have a difficult time in addressing the requirements of technology transfer using Cooperative Research and Development Agreements (CRADA`s). Large businesses and the DOE National Labs however, often have requirements and objectives which are at cross purposes, making effective technology transfer difficult.

  18. Summary of researches being performed in the Institute of Mathematics and Computer Science on computer science and information technologies

    Directory of Open Access Journals (Sweden)

    Artiom Alhazov

    2008-07-01

    Full Text Available Evolution of the informatization notion (which assumes automation of majority of human activities applying computers, computer networks, information technologies towards the notion of {\\it Global Information Society} (GIS challenges the determination of new paradigms of society: automation and intellectualization of production, new level of education and teaching, formation of new styles of work, active participation in decision making, etc. To assure transition to GIS for any society, including that from Republic of Moldova, requires both special training and broad application of progressive technologies and information systems. Methodological aspects concerning impact of GIS creation over the citizen, economic unit, national economy in the aggregate demands a profound study. Without systematic approach to these aspects the GIS creation would have confront great difficulties. Collective of researchers from the Institute of Mathematics and Computer Science (IMCS of Academy of Sciences of Moldova, which work in the field of computer science, constitutes the center of advanced researches and activates in those directions of researches of computer science which facilitate technologies and applications without of which the development of GIS cannot be assured.

  19. Application of computer information technology in food quality safety and detection%计算机信息技术在食品质量安全与检测中的应用

    Institute of Scientific and Technical Information of China (English)

    高爱莲; 刘晓慧; 刘增磊; 刘中艳

    2016-01-01

    当今食品安全问题频发,如何保障食品质量安全已愈发成为世界人们所关注的焦点,而随着信息化程度不断提高,计算机信息技术已成为食品质量安全控制的必要手段。计算机信息技术是主要用于管理和处理信息所采用的各种技术的总称,包含信息的获取、加工、表达、交流、管理及评价。本文主要介绍国内外计算机技术在食品质量安全与检测中的应用现状,如利用计算机进行食品科学相关信息的查询与检索、模拟生产过程来有效控制潜在风险因素、快速计算食品生产消费过程中的数据,设计网络平台感官评价代替繁复人工环节、为实现食品生产链全程可追溯创造有利条件等,以期为政府监管部门提供有效监管渠道,并为食品企业建立食品安全追溯体系,提升食品管理的信息化程度,发挥信息技术在食品安全管理中的应有价值和作用。%ABSTRACT:Nowadays, food safety problems have occurred frequently, and how to ensure food quality safety has become the focus of attention of the whole world. While computer information technology has become a necessary means to control food quality safety along with the continuous improvement of information degree. Computer information technology is the general term mainly used for the management and processing of information, including acquisition, processing, expression, communication, management and evaluation of information. In this paper, the application of computer information technology applied in food industry at home and abroad was mainly summarized, including query and retrieval related information of food science, stimulation of the production process to effectively control the potential risk factors, fast calculation in the process of food production and consumption, network platform design of sensory evaluation instead of complex manual work, and realization the whole process of full

  20. Methods of computer experiment in gamma-radiation technologies using new radiation sources

    CERN Document Server

    Bratchenko, M I; Rozhkov, V V

    2001-01-01

    Presented id the methodology of computer modeling application for physical substantiation of new irradiation technologies and irradiators design work flow. Modeling tasks for irradiation technologies are structured along with computerized methods of their solution and appropriate types of software. Comparative analysis of available packages for Monte-Carlo modeling of electromagnetic processes in media is done concerning their application to irradiation technologies problems. The results of codes approbation and preliminary data on gamma-radiation absorbed dose distributions for nuclides of conventional sources and prospective Europium-based gamma-sources are presented.

  1. Wireless power transmission - Applications and technology status

    Science.gov (United States)

    Schupp, Bradford W.; Brown, Alan M.

    The history of wireless power transmission systems is reviewed and current and future applications and technology are discussed. Design constraints for terrestrial systems, airborne platforms, and space systems are presented.

  2. Information and Communication Technology Application in ...

    African Journals Online (AJOL)

    Information and Communication Technology Application in Collection Development ... The library is the heart and life-line of any citadel of learning. ... promotes quick delivery of information materials, enhances communication with publishers ...

  3. Advances in Infrared Technology and Applications: introduction.

    Science.gov (United States)

    Strojnik, Marija; D'Acunto, Mario; Rogalski, Antoni

    2016-12-01

    The special issue of Applied Optics on Advanced Infrared Technology and Applications(AITA) arose out of the biannual conference of the same name, most recently held in Pisa, Italy, 29 September to 2 October, 2015.

  4. [Plasma technology for biomedical material applications].

    Science.gov (United States)

    Liu, Z; Li, X

    2000-03-01

    In this paper is introduced the plasma technology for the applications of several species biomaterial such as ophthalmological material, drug delivery system, tissue culture material, blood anticoagulant material as well as plasma surface clearing and plasma sterilization, and so on.

  5. Magnetic levitation Maglev technology and applications

    CERN Document Server

    Han, Hyung-Suk

    2016-01-01

    This book provides a comprehensive overview of magnetic levitation (Maglev) technologies, from fundamental principles through to the state-of-the-art, and describes applications both realised and under development. It includes a history of Maglev science and technology showing the various milestones in its advancement. The core concepts, operating principles and main challenges of Maglev applications attempted across various fields are introduced and discussed. The principle difficulties encountered when applying Maglev technology to different systems, namely air gap control and stabilization, are addressed in detail. The book describes how major advancements in linear motor and magnet technologies have enabled the development of the linear-motor-powered Maglev train, which has a high speed advantage over conventional wheeled trains and has the potential to reach speed levels achieved by aircraft. However, many expect that Maglev technology to be a green technology that is applied not only in rail transportat...

  6. Printing Technologies for Medical Applications.

    Science.gov (United States)

    Shafiee, Ashkan; Atala, Anthony

    2016-03-01

    Over the past 15 years, printers have been increasingly utilized for biomedical applications in various areas of medicine and tissue engineering. This review discusses the current and future applications of 3D bioprinting. Several 3D printing tools with broad applications from surgical planning to 3D models are being created, such as liver replicas and intermediate splints. Numerous researchers are exploring this technique to pattern cells or fabricate several different tissues and organs, such as blood vessels or cardiac patches. Current investigations in bioprinting applications are yielding further advances. As one of the fastest areas of industry expansion, 3D additive manufacturing will change techniques across biomedical applications, from research and testing models to surgical planning, device manufacturing, and tissue or organ replacement.

  7. Promoting Physical Activity through Hand-Held Computer Technology

    Science.gov (United States)

    King, Abby C.; Ahn, David K.; Oliveira, Brian M.; Atienza, Audie A.; Castro, Cynthia M.; Gardner, Christopher D.

    2009-01-01

    Background Efforts to achieve population-wide increases in walking and similar moderate-intensity physical activities potentially can be enhanced through relevant applications of state-of-the-art interactive communication technologies. Yet few systematic efforts to evaluate the efficacy of hand-held computers and similar devices for enhancing physical activity levels have occurred. The purpose of this first-generation study was to evaluate the efficacy of a hand-held computer (i.e., personal digital assistant [PDA]) for increasing moderate intensity or more vigorous (MOD+) physical activity levels over 8 weeks in mid-life and older adults relative to a standard information control arm. Design Randomized, controlled 8-week experiment. Data were collected in 2005 and analyzed in 2006-2007. Setting/Participants Community-based study of 37 healthy, initially underactive adults aged 50 years and older who were randomized and completed the 8-week study (intervention=19, control=18). Intervention Participants received an instructional session and a PDA programmed to monitor their physical activity levels twice per day and provide daily and weekly individualized feedback, goal setting, and support. Controls received standard, age-appropriate written physical activity educational materials. Main Outcome Measure Physical activity was assessed via the Community Healthy Activities Model Program for Seniors (CHAMPS) questionnaire at baseline and 8 weeks. Results Relative to controls, intervention participants reported significantly greater 8-week mean estimated caloric expenditure levels and minutes per week in MOD+ activity (p<0.04). Satisfaction with the PDA was reasonably high in this largely PDA-naive sample. Conclusions Results from this first-generation study indicate that hand-held computers may be effective tools for increasing initial physical activity levels among underactive adults. PMID:18201644

  8. Advances in computer technology: impact on the practice of medicine.

    Science.gov (United States)

    Groth-Vasselli, B; Singh, K; Farnsworth, P N

    1995-01-01

    Advances in computer technology provide a wide range of applications which are revolutionizing the practice of medicine. The development of new software for the office creates a web of communication among physicians, staff members, health care facilities and associated agencies. This provides the physician with the prospect of a paperless office. At the other end of the spectrum, the development of 3D work stations and software based on computational chemistry permits visualization of protein molecules involved in disease. Computer assisted molecular modeling has been used to construct working 3D models of lens alpha-crystallin. The 3D structure of alpha-crystallin is basic to our understanding of the molecular mechanisms involved in lens fiber cell maturation, stabilization of the inner nuclear region, the maintenance of lens transparency and cataractogenesis. The major component of the high molecular weight aggregates that occur during cataractogenesis is alpha-crystallin subunits. Subunits of alpha-crystallin occur in other tissues of the body. In the central nervous system accumulation of these subunits in the form of dense inclusion bodies occurs in pathological conditions such as Alzheimer's disease, Huntington's disease, multiple sclerosis and toxoplasmosis (Iwaki, Wisniewski et al., 1992), as well as neoplasms of astrocyte origin (Iwaki, Iwaki, et al., 1991). Also cardiac ischemia is associated with an increased alpha B synthesis (Chiesi, Longoni et al., 1990). On a more global level, the molecular structure of alpha-crystallin may provide information pertaining to the function of small heat shock proteins, hsp, in maintaining cell stability under the stress of disease.

  9. Promoting physical activity through hand-held computer technology.

    Science.gov (United States)

    King, Abby C; Ahn, David K; Oliveira, Brian M; Atienza, Audie A; Castro, Cynthia M; Gardner, Christopher D

    2008-02-01

    Efforts to achieve population-wide increases in walking and similar moderate-intensity physical activities potentially can be enhanced through relevant applications of state-of-the-art interactive communication technologies. Yet few systematic efforts to evaluate the efficacy of hand-held computers and similar devices for enhancing physical activity levels have occurred. The purpose of this first-generation study was to evaluate the efficacy of a hand-held computer (i.e., personal digital assistant [PDA]) for increasing moderate intensity or more vigorous (MOD+) physical activity levels over 8 weeks in mid-life and older adults relative to a standard information control arm. Randomized, controlled 8-week experiment. Data were collected in 2005 and analyzed in 2006-2007. Community-based study of 37 healthy, initially underactive adults aged 50 years and older who were randomized and completed the 8-week study (intervention=19, control=18). Participants received an instructional session and a PDA programmed to monitor their physical activity levels twice per day and provide daily and weekly individualized feedback, goal setting, and support. Controls received standard, age-appropriate written physical activity educational materials. Physical activity was assessed via the Community Healthy Activities Model Program for Seniors (CHAMPS) questionnaire at baseline and 8 weeks. Relative to controls, intervention participants reported significantly greater 8-week mean estimated caloric expenditure levels and minutes per week in MOD+ activity (pfirst-generation study indicate that hand-held computers may be effective tools for increasing initial physical activity levels among underactive adults.

  10. 6th International Workshop Soft Computing Applications

    CERN Document Server

    Jain, Lakhmi; Kovačević, Branko

    2016-01-01

    These volumes constitute the Proceedings of the 6th International Workshop on Soft Computing Applications, or SOFA 2014, held on 24-26 July 2014 in Timisoara, Romania. This edition was organized by the University of Belgrade, Serbia in conjunction with Romanian Society of Control Engineering and Technical Informatics (SRAIT) - Arad Section, The General Association of Engineers in Romania - Arad Section, Institute of Computer Science, Iasi Branch of the Romanian Academy and IEEE Romanian Section.                 The Soft Computing concept was introduced by Lotfi Zadeh in 1991 and serves to highlight the emergence of computing methodologies in which the accent is on exploiting the tolerance for imprecision and uncertainty to achieve tractability, robustness and low solution cost. Soft computing facilitates the use of fuzzy logic, neurocomputing, evolutionary computing and probabilistic computing in combination, leading to the concept of hybrid intelligent systems.        The combination of ...

  11. 3rd ACIS International Conference on Applied Computing and Information Technology

    CERN Document Server

    2016-01-01

    This edited book presents scientific results of the 3nd International Conference on Applied Computing and Information Technology (ACIT 2015) which was held on July 12-16, 2015 in Okayama, Japan. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.

  12. APPLICATION OF MICROBIAL TECHNOLOGY TO MINERAL PROCESSING

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    The application of microbial technology to mineral processing has been reviewed with respect to the bioleaching of metals from minerals, the influence of biotreatment on flotation, the biobene ficiation of nonmetallic minerals, and the biotreatment for mine waste reclamation.The application of microbial technology to mineral processing has shown the advantages of high efficiency, low energy and reagent consumption, low capital and operating costs, and low pollution of the environment.

  13. Low temperature plasma technology methods and applications

    CERN Document Server

    Chu, Paul K

    2013-01-01

    Written by a team of pioneering scientists from around the world, Low Temperature Plasma Technology: Methods and Applications brings together recent technological advances and research in the rapidly growing field of low temperature plasmas. The book provides a comprehensive overview of related phenomena such as plasma bullets, plasma penetration into biofilms, discharge-mode transition of atmospheric pressure plasmas, and self-organization of microdischarges. It describes relevant technology and diagnostics, including nanosecond pulsed discharge, cavity ringdown spectroscopy, and laser-induce

  14. Application of SDI technology in space propulsion

    Energy Technology Data Exchange (ETDEWEB)

    Klein, A.J.

    1992-01-01

    Numerous technologies developed by the DOD within the SDI program are now available for adaptation to the requirements of commercial spacecraft; SDI has accordingly organized the Technology Applications Information System data base, which contains nearly 2000 nonproprietary abstracts on SDI technology. Attention is here given to such illustrative systems as hydrogen arcjets, ammonia arcjets, ion engines, SSTO launch vehicles, gel propellants, lateral thrusters, pulsed electrothermal thrusters, laser-powered rockets, and nuclear propulsion.

  15. ADVANCED COMPUTATIONAL METHODS IN DOSE MODELING: APPLICATION OF COMPUTATIONAL BIOPHYSICAL TRANSPORT, COMPUTATIONAL CHEMISTRY, AND COMPUTATIONAL BIOLOGY

    Science.gov (United States)

    Computational toxicology (CompTox) leverages the significant gains in computing power and computational techniques (e.g., numerical approaches, structure-activity relationships, bioinformatics) realized over the last few years, thereby reducing costs and increasing efficiency i...

  16. APPLICATION OF INJECTION TECHNOLOGIES IN METALLURGICAL PRODUCTION

    Directory of Open Access Journals (Sweden)

    S. V. Korneev

    2011-01-01

    Full Text Available Analysis of injection technologies shows that the largest prevalence they got d at application on powerful electric arc furnaces and at out-of-furnace processing of big volumes of metal. at the same time theoretical and experimental basis of using of injection technologies is constantly being replenished with new investigations.

  17. JPL Robotics Technology Applicable to Agriculture

    Science.gov (United States)

    Udomkesmalee, Suraphol Gabriel; Kyte, L.

    2008-01-01

    This slide presentation describes several technologies that are developed for robotics that are applicable for agriculture. The technologies discussed are detection of humans to allow safe operations of autonomous vehicles, and vision guided robotic techniques for shoot selection, separation and transfer to growth media,

  18. Proceedings: 1989 conference on advanced computer technology for the power industry

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, B. (ed.)

    1990-07-01

    An EPRI conference to address advanced computer technology was hosted by Arizona Public Service in Scottsdale, Arizona, December 4--6, 1989. Participants represented US and foreign utilities, major electric and computer industry vendors, R D contractors, and consulting firms. These Proceedings contain the text of the technical presentations and summaries of the panel discussions. The conference objectives were: to asses modern computer technologies and how they will effect utility operations; to share US and foreign utility experiences in developing computer-based technical products; and to discuss research conducted by EPRI in advanced computer technology on behalf of its utility members. Technical presentations addressed a broad range of computer-related topics: Computer-Based Training, Engineering Workstations, Hypermedia and Other Advanced User Interfaces, Networks and Communications, Expert Systems and Other Decision-Support Methodologies, Intelligent Database Management, Supercomputing Architectures and Applications, Real-Time Data Processing, Computerized Technology and Information Transfer, and Neural Networks and Other Emerging Technologies. In addition, two panel sessions were conducted to provide a forum for utilities to discuss past and future directions of EPRI software, and the future role of engineering workstations in utilities. The results of these two panels are summarized in this paper.

  19. The application of CAD / CAM technology in Dentistry

    Science.gov (United States)

    Susic, I.; Travar, M.; Susic, M.

    2017-05-01

    Information and communication technologies have found their application in the healthcare sector, including the frameworks of modern dentistry. CAD / CAM application in dentistry is the process by which is attained finished dental restoration through fine milling process of ready ceramic blocks. CAD / CAM is an acronym of english words Computer-Aided-Design (CAD) / Computer-Aided-Manufacture (CAM), respectively dental computer aided design and computer aided manufacture of inlays, onlays, crowns and bridges. CAD / CAM technology essentially allows you to create a two-dimensional and three-dimensional models and their materialization by numerical controlled machines. In order to operate more efficiently, reduce costs, increase user/patient satisfaction and ultimately achieve profits, many dental offices in the world have their attention focused on implementation of modern IT solutions in everyday practice. In addition to the specialized clinic management software, inventory control, etc., or hardware such as the use of lasers in cosmetic dentistry or intraoral scanning, recently the importance is given to the application of CAD / CAM technology in the field of prosthetic. After the removal of pathologically altered tooth structure, it is necessary to achieve restoration that will be most similar to the anatomy of a natural tooth. Applying CAD / CAM technology on applicable ceramic blocks it can be obtained very quick, but also very accurate restoration, in the forms of inlays, onlays, bridges and crowns. The paper presents the advantages of using this technology as well as satisfaction of the patients and dentists by using systems as: Cercon, Celay, Cerec, Lava, Everest, which represent imperative of modern dentistry in creating fixed dental restorations.

  20. Disclosive Computer Ethics: The Exposure and Evaluation of Embedded Normativity in Computer Technology

    NARCIS (Netherlands)

    Brey, Philip

    2000-01-01

    This essay provides a critique of mainstream computer ethics and argues for the importance of a complementary approach called disclosive computer ethics, which is concerned with the moral deciphering of embedded values and norms in computer systems, applications and practices. Also, four key values