Academic literature on the topic 'Computer'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer"

1

AKL, SELIM G. "THREE COUNTEREXAMPLES TO DISPEL THE MYTH OF THE UNIVERSAL COMPUTER." Parallel Processing Letters 16, no. 03 (September 2006): 381–403. http://dx.doi.org/10.1142/s012962640600271x.

Full text
Abstract:
It is shown that the concept of a Universal Computer cannot be realized. Specifically, instances of a computable function [Formula: see text] are exhibited that cannot be computed on any machine [Formula: see text] that is capable of only a finite and fixed number of operations per step. This remains true even if the machine [Formula: see text] is endowed with an infinite memory and the ability to communicate with the outside world while it is attempting to compute [Formula: see text]. It also remains true if, in addition, [Formula: see text] is given an indefinite amount of time to compute [Formula: see text]. This result applies not only to idealized models of computation, such as the Turing Machine and the like, but also to all known general-purpose computers, including existing conventional computers (both sequential and parallel), as well as contemplated unconventional ones such as biological and quantum computers. Even accelerating machines (that is, machines that increase their speed at every step) cannot be universal.
APA, Harvard, Vancouver, ISO, and other styles
2

Zheng, Lei, Ying Huang, Dong Liu, and Wei Yan Xing. "A Reliability Simulation Method for On-Board Computer." Applied Mechanics and Materials 380-384 (August 2013): 3350–53. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.3350.

Full text
Abstract:
As high reliable equipment, on-board computer often has difficulties to evaluate its reliability. The paper put forward a simulation method to compute on-board computers reliability. The method uses a forced transition (FT) based reliability simulation model to deal with the on-board computers that have complex structure and diversiform characteristic parameters. The model is particularly suitable for the on-board computers which are composed of the components whose failure processes obey tub life curve. As an example, a prototype on-board computer was put forward and simulated using the model. The presented reliability simulation model can be adopted for the on-board computer probability risk assessment where analytic methods or exact solutions cannot be easily reached.
APA, Harvard, Vancouver, ISO, and other styles
3

Budi Suyanto, Ahmad Taufiq Akbar, and M. Rafid Zufar. "PELATIHAN PERAKITAN KOMPUTER PADA MA IBNU SINA KUTONTEGALTIRTO BERBAH SLEMAN YOGYAKARTA." Jurnal Padamu Negeri 1, no. 4 (October 31, 2024): 38–43. https://doi.org/10.69714/44gyrc19.

Full text
Abstract:
Computers come from the word computer (to compute) which means to calculate. However, in accordance with the development of the times, computers have experienced many improvements, computers do not only function to calculate, but have been used to do various jobs and human activities, such as research, banking, and even education. With the help of computers and other supporting devices such as operating systems and applications, all types of work can be carried out quickly, precisely, and accurately. In completing these tasks, the computer does it automatically based on the instructions given to it. Computer assembly focuses on the introduction and assembly of hardware, to the installation of the operating system. Computer assembly training at MA IBNU SINA Kuton Berbah Sleman Yogyakarta is a community service activity carried out to help students learn more about computer maintenance and use.
APA, Harvard, Vancouver, ISO, and other styles
4

Nwaokolo, Martin Afam, Reuben Iortyer Gweryina, and Nissy Ufedo Ogohi. "A DYNAMICAL MODEL OF COMPUTER VIRUS WITH INFECTIVE EXTERNAL STORAGE DEVICE." FUDMA JOURNAL OF SCIENCES 8, no. 4 (August 7, 2024): 105–19. http://dx.doi.org/10.33003/fjs-2024-0804-2284.

Full text
Abstract:
A computer virus is a type of malicious software program (“Malware”) that, when executed, replicates itself by modifying other computer programs and inserting its own code. Most of our computer systems, media devices and storages are victims of computer virus. Due to the continuous infections of computer systems, several studies and works are being done on the transmission, dynamics and epidemiology of computer virus. It is a major source of concern due to the importance and necessity of the computer system and the usefulness of the internet. Based on the menace caused by the virus to computers, the researcher decided to carry out this work so as to to investigate the propagation effects of computer viruses with infective external storage media on computer systems. In this work, a mathematical model of a dynamical system of computer virus with an infected external storage media on viral spread is formulated, by extending a four-compartment model proposed by Peng et al, (2013) to five compartments. We computed the reproduction potential, the local and global stability analysis of. Numerical simulation shows that when there is no repair for the exposed computers, the infection rate is high (), but when exposed computers are being repaired, there is reduction in the number of exposed and infected computers).
APA, Harvard, Vancouver, ISO, and other styles
5

Vannier, Michael W. "Computers in Computer Axial Tomography." Computers in Physics 2, no. 5 (1988): 39. http://dx.doi.org/10.1063/1.4822775.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Proctor, Romina M., and Paul C. Burnett. "Computer Attitude and Classroom Computers." Computers in the Schools 12, no. 3 (November 22, 1996): 33–41. http://dx.doi.org/10.1300/j025v12n03_05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

SEA, C. "Computer ignorance or ignorant computers?" Annals of Emergency Medicine 15, no. 10 (October 1986): 1238–39. http://dx.doi.org/10.1016/s0196-0644(86)80877-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kirkland, Will. "Computers and Translation: Computer Dictionaries." Translation Review 42-43, no. 1 (September 1993): 61–63. http://dx.doi.org/10.1080/07374836.1993.10523611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Marcoulides, George A. "The Relationship between Computer Anxiety and Computer Achievement." Journal of Educational Computing Research 4, no. 2 (May 1988): 151–58. http://dx.doi.org/10.2190/j5n4-24hk-567v-at6e.

Full text
Abstract:
Computers are rapidly being introduced into virtually every work setting. The ability to use computers, therefore, has become a crucial component in the educational process. Computer anxiety, however, may influence student abilities to master computer skills and consequently affect the degree to which computers can effectively be utilized. This study investigates the possible effects of computer anxiety on student achievement in computer skills. The results suggest that computer anxiety is an important predictor of computer achievement. Educational systems that seek to prepare students in the field of computer applications must, therefore, become particularly concerned with creating less stressful environments.
APA, Harvard, Vancouver, ISO, and other styles
10

Rachappa, Halkar. "Studying the Concept of Quantum Computing and Analysis of Its Components, Benefits and Challenges." International Journal on Recent and Innovation Trends in Computing and Communication 8, no. 11 (November 30, 2020): 17–22. http://dx.doi.org/10.17762/ijritcc.v8i11.5517.

Full text
Abstract:
This paper will discuss about the use of quantum computing in the computer engineering field to make computers reliable and fast to perform various typical computations. It is the process of using concept of quantum theory in computing algorithms and other computations and calculations along with the use of computer systems. The computer system always understands the binary language of bits and bytes or in other words we can say that everything which is computed using computers should be first converted into stream of 0’s and 1’s so that computer can understand and then perform the calculations. This will restrict the scope of certain calculations for the computers. Scientists and engineers have come together to implement the quantum computing along with computers and due to this they are able to make calculations which were not possible before its introduction. The quantum theory uses bits and qubits of quantum theory and allows them to be available in more than one state and make possible various typical calculations easy and fast. The paper will explain various types of quantum computing techniques and how they are useful for the organisations. The benefits and challenges of the quantum computing in the field of computer systems will also be discussed.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer"

1

Webster, Linda D. "Measuring change in computer self-efficacy and computer literacy of undergraduates in an introduction to computers course /." free to MU campus, to others for purchase, 2004. http://wwwlib.umi.com/cr/mo/fullcit?p3164548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Frisk, Henrik. "Improvisation, computers and interaction : rethinking human-computer interaction through music /." Malmö : Malmö Academy of Music, Lund University, 2008. http://www.lu.se/o.o.i.s?id=12588&postid=1239899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lindberg, Björn. "Computer availability within a computer cluster." Thesis, University West, Department of Technology, Mathematics and Computer Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gelius, Henrik. "Computer-supported collaboration using Pick-and-Drop interaction on handheld computers." Thesis, Linköping University, Department of Computer and Information Science, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1737.

Full text
Abstract:
<p>This study investigates a new interaction technique for collaboration on handheld computers called Pick-and-Drop. The technique is an extension of the popular Drag-and-Drop method used in many graphical interfaces today, but with Pick-and-Drop on-screen objects can be picked from one screen with a pen and dropped onto another. </p><p>The aim of the study is to answer whether Pick-and-Drop promote collaboration among children by letting them focus more on other users and the task at hand than on the computer interaction. The study also investigates in what way collaborative situations can benefit from Pick-and-Drop. </p><p>A prototype Pick-and-Drop system was implemented on four customized handheld computers equipped with wireless network communication. The prototype allowed spontaneous collaboration using ad-hoc networks and peer-to-peer communication. Radio Frequency Identification (RFID) tags were used to identify the pens when picking and dropping objects from the screen. </p><p>Ten children aged 6-7 years old participated in the study at an after- school recreational centre. They tried Pick-and-Drop by playing a collaborative game of buying and selling apples using golden coins represented as icons on the screen. The test was video filmed for later analysis. </p><p>The study showed that Pick-and-Drop offers effective collaborative interaction based on a mix of turn taking and concurrent interaction. Users do not have to switch focus when using an application or sharing data as the interaction style stays the same. There was an interesting difference in control over the interaction when users shared objects by “giving” or by “taking”. Users stayed in better control when they shared objects through giving.</p>
APA, Harvard, Vancouver, ISO, and other styles
5

Seendani, Ajmal. "TEACHING COMPUTER SCIENCE WITHOUT COMPUTER : Teaching Computer Science in Afghan Secondary Schools." Thesis, Karlstads universitet, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-32350.

Full text
Abstract:
Computers have become so significant in todays’ world, most of the people use such kind of technology for different purposes in their life: such as computing, designing, calculation and so on. This kind of technology can help the teachers and students in learning process, or we can say that they can be used as a facilitator of the learning process. This study circulates on how the teachers teach computer science in Afghan schools grade (10 to 12), although there are no computers in the classrooms and students just have textbooks for learning computer science. The teachers teach computer theoretically. The study was conducted in 30 schools of six provinces of Afghanistan, the study was conducted based on quantitative research method using questionnaire for both teachers and students, because of security and some cultural problems just a few female teachers and students participated in the study and filling the questionnaires . The study found that majority of teachers and more than half of the students believed that computer science is important in all parts of life; majority of the participants has no access to computers in their schools. Because of having no access to computers textbooks of CS are taught through lecture and group work methods. Additionally, teachers believed that textbooks of CS is useful but have some problems and students believed that these textbooks are so useful. Finally, both teachers and students in this study have faced many problems in the field of CS, so MoE should undertake their problems and provide facilities such as computer labs, professional teachers and so on.
APA, Harvard, Vancouver, ISO, and other styles
6

Watson, Jason. "Monitoring computer-based training over computer networks." Thesis, University of Huddersfield, 1999. http://eprints.hud.ac.uk/id/eprint/6910/.

Full text
Abstract:
As time is becoming an ever more precious commodity in today's workplace, effective training is also taking on an increasingly important role, but finding the time to train today's workforce is becoming increasingly difficult. With employees in diverse locations across the country and across the world and some working from home, on the road or "hot-desking" we have to take a new approach to training. Fortunately computer-based training can solve many of the traditional problems such as the need to bring all trainees together in the same location at the same time. With today's sophisticated computer-based training applications motivated employees can train where they want, at home or at work, and when they want, at lunchtime or after work. However, there is also a basic legal and pedagogical requirement to record who has been trained and in what. This is very easy in a traditional training scenario, but much more difficult in today's training environments. This problem is currently the major obstacle to the widespread adoption of computer-based training, and looking for a solution to these problems was the aim of this research. This research began by investigating the processes used by multimedia developers when creating Computer Based Training (CBT) applications, identifying the current methodologies, techniques and tools that they use. Very quickly it was easy to see that developers use a whole range of development tools and that their expertise is primarily in the design of training applications, not in programming. Similarly the students want credit for the training that they undergo but do not want to be distracted by an intrusive monitoring system. The role of the Training Manager is equally important. He or she needs to be able to quickly assess the situation of an individual or a group of students and take remedial action where necessary. Balancing all of these needs in a single generic solution to the monitored training problem was the single biggest challenge. This research has addressed these important problems and has developed a solution that permits the monitoring of student training progress in any location and at any time in a way that is totally transparent to the user. The author integrates this additional functionality into a new or existing training through a drag-and-drop interface which is very easy to use, creating a monitoring experience which is totally transparent to the trainee and the Training Manager receives a summary database of student progress. Specifically the system uses a library of C++ functions that interface to Authorware, Director, Toolbook or a C++ application. The functions permit an author to open a monitoring database at the start of a training session and close it at the end. Whilst the database is open we can record any data that we require regarding student progress and performance. On closing the session the resulting database is sent to a central collation point using FTP. Students are identified automatically through their IP address, from their network login or ask them to logon to the training session manually. The system can write any database format that is required and if the network is unavailable when the session ends the database will be saved locally until the next training session. At the central collation point a specially written application takes the many databases created by individual training sessions and collates them into one large database that can be queried by the training manager. Small trials were initially performed with a prototype system at the collaborating company, CBL Technology Ltd, which in turn led to larger trials at both Cable and Wireless Communication PLC and the University of Huddersfield. In these trials authors of CBT applications found the system extremely easy to integrate into their applications and the training managers and course leaders responsible for training outcomes, found the feedback on student performance, that the system provided, invaluable. This research had demonstrated that it is possible to create a generic monitored training solution that balances the needs of the trainee, the author and the Training Manager. Trainees can train at any time, anywhere in the world, over the Internet or from CDROM and a training manager can monitor their progress provided that at some time they connect to a computer network.
APA, Harvard, Vancouver, ISO, and other styles
7

Andrews, Pierre Y. "Persuasive Computer Dialogue Improving Human-Computer Communication." Thesis, University of York, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.503304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rihan, Jonathan. "Computer vision based interfaces for computer games." Thesis, Oxford Brookes University, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.579554.

Full text
Abstract:
Interacting with a computer game using only a simple web camera has seen a great deal of success in the computer games industry, as demonstrated by the numerous computer vision based games available for the Sony PlayStation 2 and PlayStation 3 game consoles. Computational efficiency is important for these human computer inter- action applications, so for simple interactions a fast background subtraction approach is used that incorporates a new local descriptor which uses a novel temporal coding scheme that is much more robust to noise than the standard formulations. Results are presented that demonstrate the effect of using this method for code label stability. Detecting local image changes is sufficient for basic interactions, but exploiting high-level information about the player's actions, such as detecting the location of the player's head, the player's body, or ideally the player's pose, could be used as a cue to provide more complex interactions. Following an object detection approach to this problem, a combined detection and segmentation approach is explored that uses a face detection algorithm to initialise simple shape priors to demonstrate that good real-time performance can be achieved for face texture segmentation. Ultimately, knowing the player's pose solves many of the problems encountered by simple local image feature based methods, but is a difficult and non-trivial problem. A detection approach is also taken to pose estimation: first as a binary class problem for human detection, and then as a multi-class problem for combined localisation and pose detection. For human detection, a novel formulation of the standard chamfer matching algo- rithm as an SVM classifier is proposed that allows shape template weights to be learnt automatically. This allows templates to be learnt directly from training data even in the presence of background and without the need to pre-process the images to extract their silhouettes. Good results are achieved when compared to a state of the art human detection classifier. For combined pose detection and localisation, a novel and scalable method of ex- ploiting the edge distribution in aligned training images is presented to select the most potentially discriminative locations for local descriptors that allows a much higher space of descriptor configurations to be utilised efficiently. Results are presented that show competitive performance when compared to other combined localisation and pose detection methods.
APA, Harvard, Vancouver, ISO, and other styles
9

Skulkhu, Jaruwan. "Computer Literacy Levels and Attitudes toward Computers of Thai Public University Students." Thesis, University of North Texas, 1989. https://digital.library.unt.edu/ark:/67531/metadc330671/.

Full text
Abstract:
The purpose of this study was to investigate and analyze computer literacy and general attitudes toward computers of students at Thai public unversities. The comparative study of computer literacy levels and attitudes toward computers among Thai students with various demographic classification was performed followed by the study of relationships between the two variables among the samples. A fifty-eight-item questionnaire was adapted from the computer literacy questionnaire developed by the researchers at the Minnesota Educational Computing Consortium. The items were designed to assess knowledge and attitudes relative to computers. The questionnaire was administered to a random sample of 492 students who took at least one computer course from thirteen public universities in Thailand. Statistical tests used to analyze the data included t-test, one-way analysis of variance, and Pearson product moment correlations. Based on the research findings, the following conclusions were drawn: (1) Thai university students exhibited a moderate computer literacy level. (2) While a higher proportion of female students enrolled in computer classes, male and female students reported similar computer literacy levels. (3) Graduate students had higher computer literacy levels than did other students from different educational levels. (4) Academic majors and academic performance (GPAs) were also factors affecting computer literacy levels. Education majors displayed higher computer literacy levels than mathematics majors and science majors. (5) Students with higher GPAs had higher levels of computer literacy than the groups with lower GPAs. (6) Computer literacy was not age dependent. (7) Generally, Thai university students showed positive attitudes toward computers. (8) Males and females both showed positive attitudes toward computers. (9) Graduate students exhibited more positive attitudes toward computers than all other groups. (10) The groups of students with lower GPAs displayed lower positive attitudes toward computers. (11) There was a strong positive relationship between students' knowledge and their attitudes toward computers. It is recommended that computer education should be viewed in relation to its contribution to educational process as a whole. It should be relevant to the local environment, work, individuals and. society needs sis well as development of positive attitude toward manual skills. More research is needed in the areas of teacher education, evaluation techniques to assess students' progress in a new teaching context, and ethical values relative to computers.
APA, Harvard, Vancouver, ISO, and other styles
10

Applebee, Andrelyn C., and n/a. "Attitudes toward computers in the 1990s: a look at gender, age and previous computer experience on computer anxiety, confidence, liking and indifference." University of Canberra. Education, 1994. http://erl.canberra.edu.au./public/adt-AUC20060206.123119.

Full text
Abstract:
The purpose of this study was to investigate the relationship between computer attitudes held by tertiary students and the selected variables of gender, age and previous computer experience. It was hypothesized that no statistically significant differences would be found within the relationships tested. A questionnaire comprising the Computer Attitude Scale (CAS), demographic and other questions was administered to the population enrolled in an introductory computer unit at the University of Canberra, Australian Capital Territory in Semester 1, 1992. The results were subjected to t-test and one-way analysis of variance testing. Statistically significant findings were noted between both gender and computer anxiety, and gender and computer confidence, with female students being more anxious and male students being more confident. Students with previous computer experience were found to be significantly less anxious and more confident with computers. More research on possible causes of these relationships and ways of overcoming computer anxiety is needed before the findings can be fully implemented.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer"

1

Silverman, Gordon. Computers and computer languages. New York: McGraw-Hill, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Silverman, Gordon. Computers and computer languages. Maidenhead: McGraw-Hill, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

David, Turkiew, ed. Computers and Computer Languages. New York: McGraw-Hill, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pamela, Kane, ed. Compute!'s computer security. Greensboro, N.C: Compute! Books, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Throne, Julie. Computers, peripherals, and computer components. Washington, DC: Office of Industries, U.S. International Trade Commission, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Roberts, Ralph, and Ralph Roberts. Computer viruses: A Compute! book. Edited by Stephen Levy. Greensboro, NC: Compute! Books, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Raúl, Rojas, ed. Encyclopedia of computers and computer history. London: Fitzroy Dearborn, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

1955-, Rojas Raúl, ed. Encyclopedia of computers and computer history. Chicago: Fitzroy Dearborn, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Raúl, Rojas, ed. Encyclopedia of computers and computer history. London: Fitzroy Dearborn, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Horn, Carin E. Computer literacy: Problem-solving with computers. 2nd ed. Austin, TX: Sterling Swift Pub. Co., 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer"

1

Ashley, Joseph. "Computers and Computer Programs." In The Patrick Moore Practical Astronomy Series, 151–61. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09831-9_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schwarz, Hans Georg. "Computer Geoteachware for IBM Personal Computers." In Hector, 174–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 1988. http://dx.doi.org/10.1007/978-3-642-73576-9_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Winteler, Ernst-Uwe. "Computer." In An der Zukunft Verdienen, 43–56. Wiesbaden: Gabler Verlag, 1985. http://dx.doi.org/10.1007/978-3-322-83932-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marincek, B., J. L. Marais, and E. Zeller. "Computer." In Oberon, 5–7. Wiesbaden: Vieweg+Teubner Verlag, 1999. http://dx.doi.org/10.1007/978-3-322-89107-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Boles, Dietrich. "Computer." In Programmieren spielend gelernt mit dem Java-Hamster-Modell, 49–58. Wiesbaden: Vieweg+Teubner Verlag, 2002. http://dx.doi.org/10.1007/978-3-322-96757-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Miebach, Bernhard. "Computer." In Digitale Transformation von Wirtschaft und Gesellschaft, 7–29. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-02749-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Oberg, Michael. "Computer." In Computer und Sprache, 21–72. Wiesbaden: Deutscher Universitätsverlag, 2000. http://dx.doi.org/10.1007/978-3-322-95345-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fieger, Ulrich. "Computer." In ALLES was Sie schon immer über Ihre Weiterbildung wissen wollten, 161–87. Wiesbaden: Gabler Verlag, 1995. http://dx.doi.org/10.1007/978-3-322-86511-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Baur, Eva-Maria, Martin Greschner, and Ludwig Schaaf. "Computer." In Praktische Tips für die Medizinische Doktorarbeit, 94–112. Berlin, Heidelberg: Springer Berlin Heidelberg, 1992. http://dx.doi.org/10.1007/978-3-642-97409-0_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Baur, Eva-Maria, Martin Greschner, and Ludwig Schaaf. "Computer." In Praktische Tips für die Medizinische Doktorarbeit, 94–112. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/978-3-642-97626-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer"

1

Ramesht, M. H., and R. A. Cottis. "A Computer Aided Teaching Course on Corrosion of Concrete Structures." In CORROSION 1996, 1–5. NACE International, 1996. https://doi.org/10.5006/c1996-96365.

Full text
Abstract:
Abstract Computers provide a powerfill opportunity for the development of teaching materials. They provide a rich interactive environment to stimulate and engage the student. The advent of computers with multimedia capabilities allows the constructor of teaching materials to show the student material from many sources; text, chart, audio, video, animal ion, simulation, sound or photographs. When these are combined with interactivity, a powerful learning environment is created [1]. There is currently no CAL(Computer Aided Learning) or CBT(Computer Based Training) material available on the subject of corrosion and corrosion protection in concrete structures for civil engineering students. This paper will describe a Computer Aided Learning package intended to introduce students to the environmental degradation of concrete structures.
APA, Harvard, Vancouver, ISO, and other styles
2

Guthrie, J. E., B. A. Braunstein, M. T. Harrington, and R. D. Merrick. "A Micro Computer Based Corrosion Monitoring System for Refineries and Chemical Plants." In CORROSION 1986, 1–7. NACE International, 1986. https://doi.org/10.5006/c1986-86035.

Full text
Abstract:
Abstract This paper describes a micro computer system that can provide the advantages of automated corrosion monitoring to locations that do not have access to a process control or general purpose computer. The prototype of the system has been successfully operated for two years. It was developed to interface with both process instrumentation and corrosion probes to bring data into the data base. Once in the data base, the process and corrosion data are stored in common format so that it may be displayed, analyzed or transmitted to other computers. An array of displays are available ranging from details of a single point to multi-variable strip chart presentations and live updates of graphic plant schematics. The data can be transmitted to a general purpose computer or discs for long term storage. The system builds upon the novel concept of an earlier version of advanced corrosion monitoring which was the automatic reading of corrosion probes by a "multiplexer" with data capture by the process control computer and transfer to a general purpose computer. A software package, developed for data management on the general purpose computer, provided both corrosion data and the associated process data which could be examined for cause and effect relations. However, this system was not applicable for locations that do not have the necessary computers. Stand alone computers which capture corrosion data are available from the corrosion probe suppliers but they can not capture the coincident process data vital to full analysis corrosion rate changes. The described system economically and effectively fills this void.
APA, Harvard, Vancouver, ISO, and other styles
3

Michniewich, James J. "Field Experience with Corrosion of Computer Equipment." In CORROSION 1985, 1–13. NACE International, 1985. https://doi.org/10.5006/c1985-85324.

Full text
Abstract:
Abstract All electronic computer equipment is affected by water vapor, airborne particulates and parts per billion quantities of corrosive gases. A study of field problems has been made over the last several years by monitoring the actual computer site environments and doing laboratory tests on filters, modules and disk products. This study has revealed how the many environmental variables interact with each other and how they effect certain parts of the computers and disks. Our equipment has had design changes incorporated so that it can survive in marginal contaminated sites. Severely contaminated sites would require the customer to chemically filter or isolate the computer site from the contamination source. The ultimate value of this study was to influence design improvements, specify site environmental limits, to train field personnel to recognize potential corrosive sites, and how to protect computer electronic equipment. This paper will use a small percentage of the field studies to show how the corrosive variables actually effect computer equipment.
APA, Harvard, Vancouver, ISO, and other styles
4

Cignatta, J. V. "Computer Aided Engineering for Design of Ventilation Systems at Industrial Painting Projects." In CORROSION 1997, 1–15. NACE International, 1997. https://doi.org/10.5006/c1997-97538.

Full text
Abstract:
Abstract Computers have now become indispensable in evaluating alternative ventilation system designs employed to protect workers from lead dust at industrial painting projects. As the capabilities of personal computers increased in speed and dynamic memory, off-the-shelf computational fluid dynamic simulation programs could be run. Thus, a desktop computer now can be used to evaluate the complex airflow patterns and lead dust concentrations resulting in a containment when lead paint is dry abrasively blasted off steel bridges, tanks, and other industrial structures. This paper reviews the basics of computer modeling of containment/ventilation systems for construction projects and examples of the results of such minimization studies at sites around the country over the past several years.
APA, Harvard, Vancouver, ISO, and other styles
5

Dieter, William R., and Henry G. Dietz. "Computer Aided Engineering of Cluster Computers." In Software (ISPASS). IEEE, 2008. http://dx.doi.org/10.1109/ispass.2008.4510737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cocorada, Sorin. "COMPUTER ANXIETY, COMPUTER SELF-EFFICACY AND DEMOGRAPHIC VARIABLES." In eLSE 2014. Editura Universitatii Nationale de Aparare "Carol I", 2014. http://dx.doi.org/10.12753/2066-026x-14-294.

Full text
Abstract:
The studies about anxiety are now integrated in a model which describe the computer anxiety as a component of academic anxiety, defined as emotion, behavior and believes which negatively influences learning performance. Some research concerning students or teachers attitudes towards using computers and the Internet has been performed since the eighties in most countries, but there are still few in Romania. This study presents the relationships between computer anxiety and demographic variables. The research participants are the Romanian college and university students, males and females. The employed tools are Computer Anxiety Rating Scale (Heinssen, Glass, &amp; Knight, 1987) and the Computer self-efficacy Scale ( Compeau &amp; Higgins, 1995). The tools employed for measuring the attitude toward computers includes items which directly measure believes about the effects of using the computer for learning. The participants have filed a questionnaire which includes demographic questions. The data has analyzed using different criteria: gender, age, grade, experience with the computer and Internet, marks. Results indicate differences between the anxiety of students according to their program of study, age and gender. Experience in the use of computers is associated with the anxiety level for this type of technology and mediates gender differences. Greater computer anxiety was associated with lower expectations and poorer task performance. High self efficacy is associated with better results in the use of computers, but also with positive beliefs about some benefits of using it. The results can be used by college and university teachers to manage learning situations, especially, in e-environment.
APA, Harvard, Vancouver, ISO, and other styles
7

Karpov, Leonid E., Vera B. Karpova, and Alexander N. Tomilin. "Pioneers of Russian Computers and Computer Graphics." In 2020 Fifth International Conference “History of Computing in the Russia, former Soviet Union and Council for Mutual Economic Assistance countries” (SORUCOM). IEEE, 2020. http://dx.doi.org/10.1109/sorucom51654.2020.9464945.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Matsukata, J. "Computer networking for large computers in Universities." In the ACM workshop. New York, New York, USA: ACM Press, 1988. http://dx.doi.org/10.1145/55482.55492.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Johnson, Robert E. "Micro-computers and Computer Aided Design Instruction." In ACADIA 1986: Architectural Education, Research and Practice in the Next Decade. ACADIA, 1986. http://dx.doi.org/10.52842/conf.acadia.1986.173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Karasik, Y. B. "Introduction to optical-computer graphics." In OSA Annual Meeting. Washington, D.C.: Optica Publishing Group, 1993. http://dx.doi.org/10.1364/oam.1993.wtt.3.

Full text
Abstract:
Computer scientists have paid much attention to developing graphic algorithms for the display devices of conventional electronic computers. However, optical computers have their own graphical devices - spatial light modulators and holographic displays which until today have not attracted the attention of workers in computer science mainly because are unknown to these new devices.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer"

1

Tkachuk, Viktoriia V., Vadym P. Shchokin, and Vitaliy V. Tron. The Model of Use of Mobile Information and Communication Technologies in Learning Computer Sciences to Future Professionals in Engineering Pedagogy. [б. в.], November 2018. http://dx.doi.org/10.31812/123456789/2668.

Full text
Abstract:
Research goal: the research is aimed at developing a model of use of mobile ICT in learning Computer Sciences to future professionals in Engineering Pedagogy. Object of research is the model of use of mobile ICT in learning Computer Sciences to future professionals in Engineering Pedagogy. Results of the research: the developed model of use of mobile ICT as tools of learning Computer Sciences to future professionals in Engineering Pedagogy is based on the competency-based, person-centered and systemic approaches considering principles of vocational education, general didactic principles, principles of Computer Science learning, and principles of mobile learning. It also takes into account current conditions and trends of mobile ICT development. The model comprises four blocks: the purpose-oriented block, the content-technological block, the diagnostic block and the result-oriented block. According to the model, the learning content of Computer Sciences consists of 5 main units: 1) Fundamentals of Computer Science; 2) Architecture of Modern Computers; 3) Fundamentals of Algorithmization and Programming; 4) Software of Computing Systems; 5) Computer Technologies in the Professional Activity of Engineer-pedagogues.
APA, Harvard, Vancouver, ISO, and other styles
2

McGee, Steven, Randi McGee-Tekula, Jennifer Duck, Lucia Dettori, Don Yanek, Andrew M. Rasmussen, Ronald I. Greenberg, and Dale F, Reed. Does Exploring Computer Science Increase Computer Science Enrollment? The Learning Partnership, April 2018. http://dx.doi.org/10.51420/conf.2018.1.

Full text
Abstract:
This study investigated the impact of the Exploring Computer Science (ECS) program on the likelihood that students of all races and gender would pursue further computer science coursework in high school. ECS is designed to foster deep engagement through equitable inquiry around computer science concepts. The results indicate that students who pursued ECS as their first course were more likely to pursue another course relative to taking a traditional course as the first course.
APA, Harvard, Vancouver, ISO, and other styles
3

Murdocca, Miles. Computer-Aided Design Package for Designers of Digital Optical Computers. Fort Belvoir, VA: Defense Technical Information Center, February 1991. http://dx.doi.org/10.21236/ada247612.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Murdocca, Miles. Computer-Aided Design Package for Designers of Digital Optical Computers. Fort Belvoir, VA: Defense Technical Information Center, May 1992. http://dx.doi.org/10.21236/ada255381.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Murdocca, Miles. Computer-Aided Design Package for Designers of Digital Optical Computers. Fort Belvoir, VA: Defense Technical Information Center, August 1992. http://dx.doi.org/10.21236/ada255914.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Murdocca, Miles. Computer-Aided Design Package for Designers of Digital Optical Computers. Fort Belvoir, VA: Defense Technical Information Center, February 1993. http://dx.doi.org/10.21236/ada260757.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Swanson, Marianne, and Elizabeth B. Lennon. Computer security:. Gaithersburg, MD: National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4545.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Elesina, S. I. Computer hardware. OFERNIO, June 2018. http://dx.doi.org/10.12731/ofernio.2018.23687.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Michalopoulos, C. D. PR-175-420-R01 Submarine Pipeline Analysis - Theoretical Manual. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), December 1985. http://dx.doi.org/10.55274/r0012171.

Full text
Abstract:
Describes the computer program SPAN which computes the nonlinear transient response of a submarine pipeline, in contact with the ocean floor, to wave and current excitation. The dynamic response of a pipeline to impact loads, such as loads from trawl gear of fishing vessels, may also be computed. In addition, thermal expansion problems for submarine pipelines may be solved using SPAN. Beam finite element theory is used for spatial discretization of the partial differential equations governing the motion of a submarine pipeline. Large-deflection, small-strain theory is employed. The formulation involves a consistent basis and added mass matrix. Quadratic drag is computed using a nonconventional approach that involves the beam shape functions. Soil-resistance loads are computed using unique pipeline-soil interaction models which take into account coupling of axial and lateral soil forces. The nonlinear governing equations are solved numerically using the Newmark Method. This manual presents the discretized equations of motion, the methods used in determining hydrodynamic and soil-resistance forces, and the solution method.
APA, Harvard, Vancouver, ISO, and other styles
10

Taufer, Michela, Sandeep Patel, and Narayan Ganesan. Computer-Aided Design of Drugs on Emerging Hybrid High Performance Computers. Fort Belvoir, VA: Defense Technical Information Center, September 2013. http://dx.doi.org/10.21236/ada607433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!