To see the other types of publications on this topic, follow the link: Computer System Implementation.

Journal articles on the topic 'Computer System Implementation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer System Implementation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Golański, Piotr, and Marek Szczekała. "The voice interface implementation in the prototype of a mobile computer-aided aircraft technical support system." Zeszyty Naukowe Akademii Marynarki Wojennej, no. 2 (June 30, 2017): 31–37. http://dx.doi.org/10.5604/01.3001.0010.4064.

Full text
Abstract:
The article concerns the use of computer support systems for technical support in the difficult conditions. The term difficult conditions should be understood as such conditions, in which an operation is carried out in a specific location, impeding or preventing the use of the computer. In such cases, computers integrated with operators’ working clothes (wearable computers) should be used, with which the communication takes place using voice. This article shows the attempt to resolve the problem of voice communications in a portable system to handle aircraft M-28. Implementacja interfejsu głosowego w prototypie przenośnego komputerowego systemu wspomagania obsługi statku powietrznego Streszczenie: Artykuł dotyczy problematyki wykorzystania komputerowych systemów wspomagania obsługi obiektów technicznych w warunkach trudnych. Pod pojęciem warunków trudnych należy rozumieć takie warunki, w których obsługa odbywa się w specyficznej lokalizacji, utrudniającej lub wręcz uniemożliwiającej wykorzystanie komputera. W takich przypadkach należy stosować komputery zintegrowane z odzieżą roboczą operatora, tzw. komputery do noszenia (wearables computers), z którymi komunikacja odbywa się za pomocą głosu. W artykule przedstawiono próbę rozwiązania problemu komunikacji głosowej w przenośnym systemie wspomagania obsługi samolotu M-28. Słowa kluczowe: obsługa statku powietrznego, komputerowe systemy wspomagania, systemy ekspertowe, CLIPS, systemy mobilne, interfejsy VUI
APA, Harvard, Vancouver, ISO, and other styles
2

Jiang, Lan. "A Corporate Computer Network Security System Design and Implementation." Advanced Materials Research 1044-1045 (October 2014): 965–67. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.965.

Full text
Abstract:
With the rapid development of economy and society, the growing prosperous computer network technology has now become one of the indispensable elements in human life. Small to every household personal computer systems, large to computer systems concerned countries, they are incorporated into the scope of computer network security systems. Enterprises are social living cells, with important role of financial intermediation, the mining technology and training personnel. Corporate computer systems is an important part to ensure high-speed operation of enterprises, summarize business information and protect trade secrets, therefore, the more developed computer network technology is, the more important the development and maintenance of corporate computer network security systems is. This article will explore the design and function of enterprise computer network security system implementations based on the characteristics of computer network security and enterprise computer network system.
APA, Harvard, Vancouver, ISO, and other styles
3

Webb, Marcus. "Computer system implementation, batch standards and validation." ISA Transactions 34, no. 4 (1995): 379–85. http://dx.doi.org/10.1016/0019-0578(95)00030-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mohanad Abdulhamid and Adam Olalo. "Implementation of Moving Object Tracker System." Data Science: Journal of Computing and Applied Informatics 5, no. 2 (2021): 102–6. http://dx.doi.org/10.32734/jocai.v5.i2-6450.

Full text
Abstract:
The field of computer vision is increasingly becoming an active area of research with tremendous efforts being put towards giving computers the capability of sight. As human beings we are able to see, distinguish between different objects based on their unique features and even trace their movements if they are within our view. For computers to really see they also need to have the capability of identifying different objects and equally track them. This paper focuses on that aspect of identifying objects which the user chooses; the object chosen is differentiated from other objects by comparison of pixel characteristics. The chosen object is then to be tracked with a bounding box for ease of identification of the object's location. A real time video feed captured by a web camera is to be utilized and it’s from this environment visible within the camera view that an object is to be selected and tracked. The scope of this paper mainly focuses on the development of a software application that will achieve real time object tracking. The software module will allow the user to identify the object of interest someone wishes to track, while the algorithm employed will enable noise and size filtering for ease of tracking of the object.
APA, Harvard, Vancouver, ISO, and other styles
5

Abdulhamid, Mohanad. "Implementation of Moving Object Tracker System." Journal of Siberian Federal University. Engineering & Technologies 14, no. 8 (2021): 986–95. http://dx.doi.org/10.17516/1999-494x-0367.

Full text
Abstract:
The field of computer vision is increasingly becoming an active area of research with tremendous efforts being put towards giving computers the capability of sight. As human beings we are able to see, distinguish between different objects based on their unique features and even trace their movements if they are within our view. For computers to really see they also need to have the capability of identifying different objects and equally track them. This paper focuses on that aspect of identifying objects which the user chooses; the object chosen is differentiated from other objects by comparison of pixel characteristics. The chosen object is then to be tracked with a bounding box for ease of identification of the object's location. A real time video feed captured by a web camera is to be utilized and it's from this environment visible within the camera view that an object is to be selected and tracked. The scope of this paper mainly focuses on the development of a software application that will achieve real time object tracking. The software module will allow the user to identify the object of interest someone wishes to track, while the algorithm employed will enable noise and size filtering for ease of tracking of the object
APA, Harvard, Vancouver, ISO, and other styles
6

Meng, Ling Jun, and Chao Zhang. "Computer Implementation of Hump Checking." Applied Mechanics and Materials 584-586 (July 2014): 1913–16. http://dx.doi.org/10.4028/www.scientific.net/amm.584-586.1913.

Full text
Abstract:
The design of hump profile has great effects on the capacity of marshalling stations. Based on the law of conservation of energy, the paper builds forward inference velocity models and backward inference velocity models by studying on the relationship of work and energy of rolling cars on the hump. Then the algorithm of plotting velocity curves and time curves in different conditions is put forward. Finally, the paper checks the hump profile with the Hump Profile Design and Checking System and proves the practicability of the system.
APA, Harvard, Vancouver, ISO, and other styles
7

A.N., Khimich, Chistyakova T.V., Sydoruk V.A., and Yershov P.S. "Intellectual computer mathematics system inparsolver." Artificial Intelligence 25, no. 4 (2020): 60–71. http://dx.doi.org/10.15407/jai2020.04.060.

Full text
Abstract:
The paper considers the intellectual computer mathematics system InparSolver, which is designed to automatically explore and solve basic classes of computational mathematics problems on multi-core computers with graphics accelerators. The problems of results reliability of solving problems with approximate input data are outlined. The features of the use of existing computer mathematics systems are analyzed, their weaknesses are found. The functionality of InparSolver, some innovative approaches to the implementation of effective solutions to problems in a hybrid architecture are described. Examples of applied usage of InparSolver for processes mathematical modeling in various subject areas are given. Nowadays, new more complex objects and phenomena in many subject areas (nuclear energy, mechanics, chemistry, molecular biology, medicine, etc.) are constantly emerging, which are subject to mathematical research on a computer. This encourages the development of new numerical methods and technologies of mathematical modeling, as well as the creation of more powerful computers for their implementation. With the advent and constant development of supercomputers of various architectures, the problems of their effective use, expansion of tasks range should be solved, ensuring the reliability of computer results and increasing the level of intellectual information support for users ‒ specialists in various fields. Today, the issues of solving these problems are given special attention by many specialists in the fields of information technology and parallel programming. The world's leadingscientists in the field of computer technology see the solution to the problems of efficient usage of modern supercomputers in algorithmic software creation that easily adapts to different computer architectures with different types of memory and coprocessors, supports efficient parallelism on millions of cores etc. In addition, improving the efficiency of high-performance computing on modern supercomputers is provided by their intellectualization, transferring to the computer to perform a significant part of the functions (symbolic languages for computer problem statement, research of mathematical models properties, visualization and analysis of tasks results, etc.). The industry of development and usage of intelligent computer technologies is one of the main directions of science and technology development in modern society
APA, Harvard, Vancouver, ISO, and other styles
8

Sallubier, Tomaž, and Borut Rusjan. "CORRIGENDUM: Computer system validation." Management 26, no. 1 (2021): 1. http://dx.doi.org/10.30924/mjcmi.26.1.1.

Full text
Abstract:
The authors regret that in „Computer system validation: Example of quality management system design and process implementation“ the following co-author was mistakenly missed from the authorship: Tomaž Sallubier, TS4U d.o.o, Kamnik, Slovenia.
APA, Harvard, Vancouver, ISO, and other styles
9

Lee, Wan Chun, Chir Neng Hung, Ming Dar Hwang, Tzu Hua Huang, Yuan Chen Liu, and Chia Che Cheng. "Implementation and Research of a Real-Time Monitoring System for Computer Classroom." Applied Mechanics and Materials 303-306 (February 2013): 2280–83. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.2280.

Full text
Abstract:
In this study, a system is designed using the local network in a computer classroom to monitor students’ learning situation and classroom order in a real-time manner. Teachers can use a network management program to monitor students’ use of computers. A questionnaire on the installation of computer classroom monitoring system is created after a post-test is administered to the experiment group. The result shows that 59.52% say that pay more attention to what teachers teach in the class.
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Yanan, Muhammad Ahsan Binyamin, Adnan Aslam, et al. "An Implementation of Lipschitz Simple Functions in Computer Algebra System Singular." Complexity 2021 (April 1, 2021): 1–5. http://dx.doi.org/10.1155/2021/6695461.

Full text
Abstract:
A complete classification of simple function germs with respect to Lipschitz equivalence over the field of complex numbers ℂ was given by Nguyen et al. The aim of this article is to implement a classifier in terms of easy computable invariants to compute the type of the Lipschitz simple function germs without computing the normal form in the computer algebra system Singular.
APA, Harvard, Vancouver, ISO, and other styles
11

McMaster, Rex, Tharam Dillon, Vicki A. Moritz, and Barrie Mayall. "Selection and implementation of a laboratory computer system." Pathology 27, no. 3 (1995): 260–67. http://dx.doi.org/10.1080/00313029500169083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

A. Abdulkareem, Sabah. "Design and Implementation a Student’s Transcript System." DJES 12, no. 2 (2019): 65–70. http://dx.doi.org/10.24237/djes.2019.12206.

Full text
Abstract:
The importance of information at present has increased the importance of database systems to organize the information we need, and to provide it for use in the appropriate and timely manner. Thus, the science of managing database systems evolved from a subtopic in computer applications to a basic subject and a major component of modern computer science, thus, database systems have become a key part of the Platform for Computer Science.
 This paper presents the design and Implementation of a Transcript System for college of engineering, University of Diyala, this system releases transcript by retrieving student’s data from database which later stored in Microsoft access database with user interfaces designed by using the tools of Microsoft Visual Studio 2010 (.Net). This system solves most of the problems which happen by using manual methods such as delay in the delivery student’s transcript, mistakes in the student data in the transcript (name, average...).
 The system provides sufficient capacity to facilitate the work of the registration staff with respect to data entry and validation and increases efficient service delivery and benefits both registration staff and students.
APA, Harvard, Vancouver, ISO, and other styles
13

Xilong, Qu, Liu Shengzong, Fu Sha, He Hong, Hu Ying, and Xiao Leyi. "Design and Implementation of Wireless Environment Monitoring System Based on STM32." Scientific Programming 2021 (October 28, 2021): 1–15. http://dx.doi.org/10.1155/2021/6070664.

Full text
Abstract:
This paper first designed the overall scheme of a wireless-based intelligent environment monitoring system; this system is comprised of the following four parts: server part, client part, slave computer part, and master computer part. The master computer is equipped with a wireless transmission module and an LCD module. Slave computers are equipped with temperature-humidity sensing modules and wireless transmission modules. The server side has two major interfaces: data display and server establishment. An Android phone as the client can realize the communication between the mobile APP and server through network communication to obtain environmental data in real time. The hardware part of the system consists of wireless transmission module, temperature and humidity module, smoke module, lighting module, flame module, and LCD module. The software implementation part mainly includes the design and implementation of serial communication, the design and implementation of wireless communication, the design and implementation of collection of data acquisition in each sensor module, and the design and implementation of network communication as well as the design and implementation of display unit. With the cooperation of these four parts, we can automatically sense and control the state of the environment to realize human-computer interaction.
APA, Harvard, Vancouver, ISO, and other styles
14

Li, Ping. "College Campus Network Management Information System Research and Implementation." Applied Mechanics and Materials 496-500 (January 2014): 2265–68. http://dx.doi.org/10.4028/www.scientific.net/amm.496-500.2265.

Full text
Abstract:
In this paper, the actual situation of university management and the specific needs of colleges and universities to study and design a set of management information systems. Management information so that the original approach gradually to computers and computer networks as the carrier of the campus electronic information processing and transmission replaced, through the network, the use of multimedia and communication technologies for remote teaching, faculty achieve complementarity. Achieve scientific management, modernization; use of modern means to improve the quality of teaching and management level
APA, Harvard, Vancouver, ISO, and other styles
15

Tiwari, Miss Aakansha P., Prof S. S. Dandge, and Dr M. A. Pund. "Implementation Paper - Eye Movement Recognition based Human Machine Interaction System." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 312–16. http://dx.doi.org/10.22214/ijraset.2022.42190.

Full text
Abstract:
Abstract: A new revolution is occurring recently within the field of human computer access. Since the inception of the desktop, other companies have spent millions, and are still doing so, to develop highly attractive GUIs and state-of-the-art communication systems for the typical user. This eye-catching system may be a system for people with natural disabilities who can operate this method with their own eyes. Where we all feel blessed to be able to operate computers easily with our hands. But within the case of paralyzed patients, whether or not they are doing not have movement and speech The brain and vision are functional, they can not use their intelligence and remain unemployed. Thus, your ophthalmic system helps to resolve this problem. Keywords: Interaction systems, Eye Gaze system, Speech synthesize
APA, Harvard, Vancouver, ISO, and other styles
16

Kotyk, Vladyslav, and Oksana Lashko. "Software Implementation of Gesture Recognition Algorithm Using Computer Vision." Advances in Cyber-Physical Systems 6, no. 1 (2021): 21–26. http://dx.doi.org/10.23939/acps2021.01.021.

Full text
Abstract:
This paper examines the main methods and principles of image formation, display of the sign language recognition algorithm using computer vision to improve communication between people with hearing and speech impairments. This algorithm allows to effectively recognize gestures and display information in the form of labels. A system that includes the main modules for implementing this algorithm has been designed. The modules include the implementation of perception, transformation and image processing, the creation of a neural network using artificial intelligence tools to train a model for predicting input gesture labels. The aim of this work is to create a full-fledged program for implementing a real-time gesture recognition algorithm using computer vision and machine learning.
APA, Harvard, Vancouver, ISO, and other styles
17

Kraskevich, V. E., and Yu Yu Yurchenko. "Software implementation of the enterprise protection system." Mathematical machines and systems 4 (2022): 62–67. http://dx.doi.org/10.34121/1028-9763-2022-4-62-67.

Full text
Abstract:
The article proposes the implementation of a specific information system for ensuring the in-formation security of the enterprise. The peculiarities of the international standard ISO/IEC-15408, which is a methodology of tasks, assessments and a catalog of IT security requirements have been studied and analyzed. The specifics of the application of general security criteria have been defined and the use of Active Directory services has been proposed as an example of the implementation of General Criteria at the enterprise. The advantages of the Active Directory service in comparison with the Workgroup have been determined. Step-by-step construction of a fault-tolerant enterprise data protection system has been offered. A feature of the proposed system is the fault tolerance of the directory service, which is ensured by deploying servers – domain controllers in each domain. The article defines the main tasks of the proposed data pro-tection system, including the comprehensive coverage of management functions, the efficiency of use of computer and telecommunications equipment and software, and the adaptability of the functional and instrumental structure of the system to the features of the managed object. The proposed complex data protection system consists of a number of interconnected components. A mandatory component of setting up a comprehensive protection system is the organization of a backup system for critical databases, which includes planning a backup schedule for various servers. To manage access rights, user groups have been added, taking into account the specifics of the company's work, and setting policies makes it possible to limit access to data on the company's file servers in accordance with different levels of access to information. The imple-mentation of research materials into the practice of solving applied tasks aimed at implement-ing a data protection system at enterprises has been confirmed by acts of practical application at the enterprise Medical Center Consilium Medical LLC.
APA, Harvard, Vancouver, ISO, and other styles
18

Yin, Zhen Xing, Feng Guo, and Liang Wu. "Design and Implementation of a Kind of Redundant Control Computer Based on CPCI Bus." Advanced Materials Research 546-547 (July 2012): 880–85. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.880.

Full text
Abstract:
This paper proposes new approaches to a kind of redundant design method to control computers based on CPCI bus, which discusses the choice of redundancy model and system principle. The reliability design is the key element of the system design, as the requirement for high reliability of general users to control computer system. It introduces in detail the interlocking theory and design method, the switching control circuit design and the data sharing model. In the end we conduct reliability analysis on the redundant control computer system from the aspect of the mean time between failures (MTBF) and availability. The redundant design approach effectively improves the reliability of the control computer system, and test and application prove that the control computer can meet the requirement for reliability.
APA, Harvard, Vancouver, ISO, and other styles
19

SHCHERBAN, Volodymyr, Oksana KOLISKO, Marjana KOLISKO, Anton KIRICHENKO, and Yuryj SHCHERBAN. "COMPUTER IMPLEMENTATION OF RECURRENCE ALGORITHM FOR COMB TENSIONING DEVICE SQUARE MACHINES." Herald of Khmelnytskyi National University. Technical sciences 307, no. 2 (2022): 194–97. http://dx.doi.org/10.31891/2307-5732-2022-307-2-194-197.

Full text
Abstract:
Computer implementation of the recursion algorithm allows at the initial stage to determine the thread tension, which occurs after passing the comb tension device of the hosiery feed system depending on the physical and mechanical properties of raw materials, geometric parameters of structural elements of the hosiery thread feed system. Computer determination of the change in relative tension on stocking machines is based on the use of the dichotomy algorithm in solving transcendental equations. Determining at the initial stage of the tension of the thread feed process on hosiery machines allows to determine the tension after passing the comb tensioning device, which will occur during the interaction of the thread with the structural elements of the cylindrical comb tension device depending on the type of raw material, curvature for bending, deformation in the area of ​​contact with the guide, the feed rate of the thread. The increase in tension after passing the comb tensioning device is due to the increase in friction between the thread and the cylindrical guide. This is due to the increase in the coverage angles of the cylindrical guide rods of the comb tensioning device. The development of a computer program for determining the tension of the thread on stocking machines should be based on the use of object-oriented programming languages. Determining the tension and changes in relative tension in the refueling zones of hosiery machines, taking into account the specifics of the design of the thread feed system of hosiery machines, will reduce thread breakage, optimize thread tension in the working area of ​​hosiery machines. The improvement of the technological process of thread processing on hosiery machines should be based on theoretical and experimental studies of the process of interaction of threads with structural elements of the feed system, including comb tensioning device and guides of large and small curvature. The main element of the structural elements of the feed system of stocking machines is a comb device for tension. Theoretical dependences for determining the tension after the comb device will allow to obtain algorithmic and mathematical software, which is used in computer software to calculate the tension and change the relative tension in the areas of refueling stocking machines. Optimization of tension in the working area will reduce the change in relative tension in the refueling areas of hosiery machines, improve the quality of hosiery.
APA, Harvard, Vancouver, ISO, and other styles
20

HASUI, Hiroshi. "Implementation of Computer Aided Composition System with Composing Model." Journal of Japan Society for Fuzzy Theory and Intelligent Informatics 21, no. 2 (2009): 247–55. http://dx.doi.org/10.3156/jsoft.21.247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

SELIM, GAMAL, and MAHMOUD ASHRY. "COMPUTER BASED IMPLEMENTATION OF AN AUTOMATIC CAR CARBURETOR SYSTEM." International Conference on Electrical Engineering 2, no. 2 (1999): 663–74. http://dx.doi.org/10.21608/iceeng.1999.62587.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

xiaojuan, Ma. "Research and Implementation of Computer Data Security Management System." Procedia Engineering 174 (2017): 1371–79. http://dx.doi.org/10.1016/j.proeng.2017.01.290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Chow, Y. S., S. J. Cheng, O. P. Malik, and G. S. Hope. "Micro-Computer Implementation of an Adaptive Power System Stabilizer." IFAC Proceedings Volumes 19, no. 16 (1986): 235–38. http://dx.doi.org/10.1016/s1474-6670(17)59385-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Zhao, Xiao-shan, An-quan Qin, and Bing-zheng Gong. "The Designing Implementation of Distributed Computer Energy-Managing System." IFAC Proceedings Volumes 22, no. 15 (1989): 35–38. http://dx.doi.org/10.1016/b978-0-08-037870-1.50012-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Gao, Zhen Dong. "Design and Implementation of Computer Grade Examination Registration System." Applied Mechanics and Materials 556-562 (May 2014): 5794–96. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5794.

Full text
Abstract:
At present, as the nationwide examination subject,the computer grade examination has a very great number of candidates. Even in a certain point of registration, registration of candidates tend to reach thousands of scale. The huge amount of work create enormous pressure and risk for the registration work. In order to improve the efficiency of the registration work, reduce the risk of error, the paper proposed a design scheme of computer grade examination system and the realization of the process. After the test of practice, the system is feasible and reliable, which greatly reduces the workload of staffs in registration point to facilitate the majority of candidates, reducing the chances that could go wrong.
APA, Harvard, Vancouver, ISO, and other styles
26

Schriger, David L. "Implementation of Clinical Guidelines Using a Computer Charting System." JAMA 278, no. 19 (1997): 1585. http://dx.doi.org/10.1001/jama.1997.03550190049043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Alghamdi, Abdulrahman Abdullah, Mohammed Ateeq Alanezi, and Faizal Khan. "Design and Implementation of a Computer Aided Intelligent Examination System." International Journal of Emerging Technologies in Learning (iJET) 15, no. 01 (2020): 30. http://dx.doi.org/10.3991/ijet.v15i01.11102.

Full text
Abstract:
Developing a computer based system for examinations are the substitute for the current examination system based on paper. In recent days, the e-learning has become more popular because of its adaptability, integrity and user friendliness. In terms of the paper based examinations, major challenge is the proctoring techniques used. In this paper, a novel method to avoid the presence of a proctor throughout the examination is proposed by an intelligent based examination system. This method is proposed to improve the e-learning using intelligent question bank and examination system. The system is designed with different complexity levels among the questions and also it acts as a tool to assessing the understanding of student from the teaching materials. This system can be timesaving and more efficient with an adequate level of security. The proposed methodology can be classified in to two main phases such as the design of question bank along with its database, design of the Artificial Intelligence (AI) based system for examination and its evaluation in order to improve the e-learning. Future works in this system can be the addition of theory-based questions and the integration of biometric based systems for enhancing the level of security.
APA, Harvard, Vancouver, ISO, and other styles
28

Wang, Xu. "Research on Security Management of Library Computer Network System." Applied Mechanics and Materials 687-691 (November 2014): 1720–23. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1720.

Full text
Abstract:
With the rapid development of network science and technology, people are dependent on the network and usage greatly improved, but the network to bring convenience, but it also brings a lot of network security issues, it has become a constraint library computer network construction greatest limiting factor. This paper describes the impact of the library computer network system security management of specific issues, according to the system requirements of practical application, in terms of the system operating environment, hardware systems, software systems, network systems and system data, such as design of the library computer network system security policy and implementation are discussed. Through the library computer network security threats faced by the system proposed safety management, regulations are important to ensure the development and implementation of computer network system security. Proposed library computer network system security management strategies, we hope to enhance the library computer network security have some help.
APA, Harvard, Vancouver, ISO, and other styles
29

Dong, Chun Hua, Li Wang, and Jian Ping Hu. "Design and Implementation of a Virtual Computer Assembly Experimental System." Advanced Materials Research 268-270 (July 2011): 1528–32. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1528.

Full text
Abstract:
In order to resolve the problems about providing optimal learning and training and high price caused by frequent computer-assembly, a virtual computer assembly experimental system is built by virtual reality technology. The architecture of virtual computer assembly system is put forward and the prototype for the virtual computer assembly system is built based on virtual reality. Key technologies such as the scene control and rendering of Vega Prime, collision detection in assembling, computer hardware model real-time editing and model positioning are discussed in detail, and the virtual assembly system is applied to practice which is testified feasibly.
APA, Harvard, Vancouver, ISO, and other styles
30

Monnickcndam, Menachem. "Participative System Implementation for Creating User Oriented Computer Systems in Human Services." Administration in Social Work 24, no. 1 (2000): 57–74. http://dx.doi.org/10.1300/j147v24n01_04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Morsiani, Mauro, and Renzo Davoli. "Learning operating systems structure and implementation through the MPS computer system simulator." ACM SIGCSE Bulletin 31, no. 1 (1999): 63–67. http://dx.doi.org/10.1145/384266.299683.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Zhang, Nai Zhong, Jing Wen, and Wei Li. "Implementation of Hand-Free Head Mouse Control System." Applied Mechanics and Materials 738-739 (March 2015): 999–1002. http://dx.doi.org/10.4028/www.scientific.net/amm.738-739.999.

Full text
Abstract:
As computer vision technology been developing, while camera becomes standard configuration for personal computer (PC) and computer calculating speed becomes faster and faster, Computer vision have been more popular used in people daily life, people can use computer as an eye to see and recognize the real world, In this paper, we will present a novel electronic head mouse control system which is based on human facial feature. Our system firstly detect human face from the input image by using face features in YUV Color model, and then for face candidate, use reversed relationship information between U and V cluster of face feature to detect mouth position. Then in the detected mouth region, mouth lip region gray level is usually lower than other region but V level higher than others, so we can reversal mouth region gray level and use associated threshold method to pick up mouth region pixels. Relationship between mouth position and face region boundary can be used to confirm human head rotation angles correspond to camera, which can be used to control mouse movement in screen. Then throughing analysising mouth shape information, we can confirm mouth motion command for mouse. We have simulated our algorithm on windows XP system to evaluate the effect of our algorithm. The simulation result showed that our algorithm can represent a good effect for head mouse control system.
APA, Harvard, Vancouver, ISO, and other styles
33

Lounici, Mer Wan, and Xiao Ming Luan. "Implementation of Unitary Music Algorithm Using Xilinx System Generator." Advanced Materials Research 748 (August 2013): 629–33. http://dx.doi.org/10.4028/www.scientific.net/amr.748.629.

Full text
Abstract:
The MUltiple SIgnal Classification MUSIC algorithm is a kind of DOA (Direction Of Arrival) estimation technique based on eigenvalue decomposition, which is also called subspace-based method [5]. In addition of its super resolution capability, MUSIC is very suitable for integration on logic circuit devices such as FPGAs (Field Programmable Gate Array).this paper proposes an implementation of unitary MUSIC algorithm using Xilinx System Generator (XSG). The design proposed uses CORDIC (COordinate Rotation DIgital Computer) -based Triangular Systolic Array for QR- decomposition to deal with EVD (eigenvalue decomposition). The MUSIC spectrum is computed with spatial DFT (Discrete Fourier Transform) using FFT block offered by Simulink- Xilinx blockset library. The performance of eight elements antenna array system was obtained and discussed.
APA, Harvard, Vancouver, ISO, and other styles
34

Chinta Sharvani, Vikas Jain, Hemanth Kumar, and Gangadharappa H V. "Implementation of Good Computer System Validation Practices In Pharmaceutical Industry- A Review." International Journal of Research in Pharmaceutical Sciences 12, no. 3 (2021): 1729–39. http://dx.doi.org/10.26452/ijrps.v12i3.4774.

Full text
Abstract:
Computer Systems Validation is a method used to ensure information is generated by a computer-based system that satisfies a set of specified requirements. Compliance with computerized systems is becoming increasingly relevant in the pharmaceutical industry as computer system validations have many benefits, such as enhancing quality control, reducing other validation costs and time, improving compliance with GMP 21 CFR Part 11 Regulation which affects the quality, health, identification or effectiveness of products subject to the GMP Regulations. Both the European Medicines Agency of Europe along with the Food & Drug Administration of the USA has developed CSV practice guidelines. An overview of relevant documents which fulfil the computer system validation along with its best practices implemented is presented below. Official requirements and standards of the USA, Europe, and Switzerland are taken as the main focus. The taken basic GMP guidelines' like Gamp, AVP and PDA implies the same principles and theories. They explain majorly about what to do view point of validation, whereas GAMP describes how to do validation. We strive to define the computer device validation needs of equipment conducted from a pharmaceutical industry perspective. The categorization of a computer system into various frameworks or categories gives the flexible approach for the validation of complex as well as simple computerized systems. The present review article discusses the implementation and various good practices of the pharmaceutical industry to maintain computer system validation. Implementing various good computer system validation activities reduces the re-work and always maintains the quality standards as per the user requirements; as a result of which the future trends will notice merging of various new implemented terminology and techniques as a common practice in mixed sectors.
APA, Harvard, Vancouver, ISO, and other styles
35

Volontyr, Lyudmila, and Oksana Zelinska. "COMPUTER SYSTEMS DESIGN MANAGEMENT." ENGINEERING, ENERGY, TRANSPORT AIC, no. 3(106) (November 29, 2019): 118–23. http://dx.doi.org/10.37128/2520-6168-2019-3-15.

Full text
Abstract:
Solving design problems involves the application of a systematic approach to managing computer systems, requires a separation of the design process and construction of the object with the establishment of real terms for each task, that is, the division of the general problem into elementary tasks and instructions for their implementation to individual specialists. The article deals with the rational structure of computer systems design management, which allows to increase the productivity of specialists with the existing contradiction between the established term of technological control implementation and the quality of project materials, taking into account the nature of work in the changes of internal and external conditions. The purpose of management of the design system is to maintain a rational functioning while performing the tasks with high performance and minimal costs. The systematic approach to design management establishes the composition of the links, defines the hierarchy, external and internal links, which are the basis for building a rational structure of the design management system. The design tasks have been identified and the computer system design management strategy has been identified. A rationally organized design management system allows to develop project materials at a high scientific and technical level with minimal refinements of TU during its implementation.
APA, Harvard, Vancouver, ISO, and other styles
36

Kamiński, Andrzej. "Computer Integrated Enterprise in the MRP/ERP Software Implementation." Foundations of Management 2, no. 2 (2010): 25–36. http://dx.doi.org/10.2478/v10238-012-0026-7.

Full text
Abstract:
Computer Integrated Enterprise in the MRP/ERP Software Implementation The aim of this elaboration is to present selected methodology, application and design issues connected with the process of complex enterprise informatization in the implementation process of an IT system. Role of the integration process in economic information processing and directions of integration activities in the scope of the IT systems of the enterprise are presented in the first part of this elaboration. Afterwards, technical features of an integrated IT system are characterized. Thesis that particular systems are comparable in the scope of functionality of the basic areas of activity of the enterprise, such as: accounting, material and stock planning, sales and invoicing, human resources, wages, can be formulated on the basis of the national portfolio of ERP (Enterprise Recourses Planning) packages. On the other hand, the cost of license purchase as well as the implementation activities, reaches the level from tens of thousands to few million PLN. Differences in the levels of investments are determined with: scope and complexity of the endeavor, functionality and system architecture as well as the cost of extension and modification of provided program modules.
APA, Harvard, Vancouver, ISO, and other styles
37

Shi, Wei Feng, Wei Zhang, Zuo Han Zhou, and Yan Bao. "Implementation of Experimental Platform of Shipboard Power System." Advanced Materials Research 1008-1009 (August 2014): 540–44. http://dx.doi.org/10.4028/www.scientific.net/amr.1008-1009.540.

Full text
Abstract:
This paper presents an integrated experimental platform of Shipboard Power System (SPS) control system. It was established with equipment of three 100KW diesel generator sets, electric power network, 270KW loads of resistance and inductance, 24KW AC motor drive control system and shipboard automatic power station. The power system and generator sets of experimental platform run under controllers of M340 PLC and PPU. The hardware environment of two layers network is formed for experiments and control programs developing. Field bus and Ethernet technologies are applied for the experimental platform. Combining with some relevant developing software of platform, programs of real time control and electric energy management can be developed and realized for generator sets and electric power network and shipboard power station. Data of SPS experiments can be sampled and recorded in Ethernet computer through sensors, PPU, PLC and Field bus facilities. Also, the functions of SPS characteristic analysis and faults alarming can be implemented by Ethernet computers. This physical experimental platform satisfies the requirements of analysis and research for SPS automatic control.
APA, Harvard, Vancouver, ISO, and other styles
38

Cai-sen Chen, Cai-sen Chen, Ying-zhan Kou Cai-sen Chen, and Jia-xing Du Ying-zhan Kou. "Design and Implementation of Cloud-Edge Integrated Security Authentication System." 電腦學刊 32, no. 4 (2021): 179–86. http://dx.doi.org/10.53106/199115992021083204014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Rusjan, Borut. "Computer system validation." Management 25, no. 2 (2020): 1–23. http://dx.doi.org/10.30924/mjcmi.25.2.1.

Full text
Abstract:
The purpose of this paper is to present a Quality Management System (QMS) for computer systems validation and to identify and demonstrate the validation process on a practical case of a pharmaceutical company. Based on the European and the US legal requirements, we define QMS for computer system validation elements. Validation process example based on the use of a general V-model provides a thorough understanding of the actual validation implementation in practice. Computer system validation in a concrete organization can be implemented, based on general and specific standard operating procedures which form the QMS. Planning, Specifying, Development/Building, Verification and Report validation activities are presented through process diagrams based on a practical Supervisory Control and Data Acquisition (SCADA) manufacturing computer-aided system validation example. Empirical part employed two research strategies: a single case study and action research. Presented computer system validation QMS and process can provide a guideline for all companies where computer systems are important. Although the presented QMS and process for the computer system validation are related to a specific pharmaceutical company case and its legal requirements, the experience from this highly regulated industry can be appropriately used in other less regulated industries. For verification of the proposed model, they need to be further tested within the pharmaceutical and other less regulated industries.
APA, Harvard, Vancouver, ISO, and other styles
40

Zarubskiy, V. G. "THE SOLUTION OF THE PROBLEM OF ALGORITHMIC ADAPTATION STRUCTURALLY STABLE CONTROL COMPUTERS OF HIGHLY RELIABLE CONTROL SYSTEMS." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 196 (October 2020): 47–56. http://dx.doi.org/10.14489/vkit.2020.10.pp.047-056.

Full text
Abstract:
One of the solutions to the problem of increasing reliability for control systems of various technological processes, including potentially dangerous ones, can be the development and implementation of structurally stable computers as the basis for control systems, that is, computers capable of restoring their performance through processes emulation, available if it has functional redundancy properties. The implementation of these processes consists in the implementation of the stages of functional diagnostics and functional adaptation. However, their implementation does not guarantee full recovery of the structurally stable computer, and requires the solution of another task - the task of algorithmic adaptation. Algorithmic adaptation is the final stage of the process of adaptation of structurally stable controlling computers and consists in determining the best option for providing the control system with user services available in the new environment. That is, in the redistribution of priorities in the order of execution of control programs of the control object, taking into account the increase in time spent on their operation associated with the implementation of emulation processes when restoring the functionality of the system of commands of the structurally stable controlling computer. The article presents a mathematical formulation of the problem of algorithmic adaptation, and also presents the results of simulation modeling of this process, confirming its efficiency and effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
41

Zarubskiy, V. G. "THE SOLUTION OF THE PROBLEM OF ALGORITHMIC ADAPTATION STRUCTURALLY STABLE CONTROL COMPUTERS OF HIGHLY RELIABLE CONTROL SYSTEMS." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 196 (October 2020): 47–56. http://dx.doi.org/10.14489/vkit.2020.10.pp.047-056.

Full text
Abstract:
One of the solutions to the problem of increasing reliability for control systems of various technological processes, including potentially dangerous ones, can be the development and implementation of structurally stable computers as the basis for control systems, that is, computers capable of restoring their performance through processes emulation, available if it has functional redundancy properties. The implementation of these processes consists in the implementation of the stages of functional diagnostics and functional adaptation. However, their implementation does not guarantee full recovery of the structurally stable computer, and requires the solution of another task - the task of algorithmic adaptation. Algorithmic adaptation is the final stage of the process of adaptation of structurally stable controlling computers and consists in determining the best option for providing the control system with user services available in the new environment. That is, in the redistribution of priorities in the order of execution of control programs of the control object, taking into account the increase in time spent on their operation associated with the implementation of emulation processes when restoring the functionality of the system of commands of the structurally stable controlling computer. The article presents a mathematical formulation of the problem of algorithmic adaptation, and also presents the results of simulation modeling of this process, confirming its efficiency and effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
42

Nunes-Harwitt, Arthur. "Ideas behind Computer Algebra and Their Use in the Classroom." Journal of Educational Technology Systems 34, no. 2 (2005): 177–88. http://dx.doi.org/10.2190/d4ju-k9lr-801c-yaw7.

Full text
Abstract:
Computer algebra systems are being used more and more frequently in mathematics courses of all levels. For instructors to use these systems effectively, they need to have an idea of how the systems work. To illuminate the mechanics, the implementation of a simple computer algebra system will be described. Further, if instructors understand the methods used by computers, they may find the ideas involved useful for human students even without computers. A lesson plan will be described that is aimed at students with little or no algebra background followed by a discussion of the author's experience using this lesson in the classroom.
APA, Harvard, Vancouver, ISO, and other styles
43

Zhang, Yizhong. "Deep Learning Distributed Architecture Design Implementation for Computer Vision." Wireless Communications and Mobile Computing 2022 (July 20, 2022): 1–10. http://dx.doi.org/10.1155/2022/9726286.

Full text
Abstract:
In the era of big data, to achieve an efficient deep learning and computer vision system for big data, developers need to build a computerized deep learning and computer vision system, and the system can simultaneously complete the tasks of deep learning and computer vision and large-scale data processing. The existing training dataset is reused, and the scene information is small, which cannot meet the needs of large-scale machine training, so it is necessary to include large-scale data, distributed computer system to complete the training. How to meet the training accuracy requirements of deep learning models and minimize the resource cost within the constrained time is a major challenge for distributed deep learning systems. Resource and batch size hyperparameter allocation are the main approaches to optimize the training accuracy and resource cost of models. Existing works have independently configured resources and batch size hyperparameters in terms of computational efficiency and training accuracy, respectively. However, the impact of the two types of configurations on model training accuracy and resource cost has complex dependencies, and it is difficult to achieve the goals of satisfying the model training accuracy requirements and minimizing the resource cost simultaneously by the existing independent configuration methods. To address these problems, this paper proposes a collaborative resource-batch size optimization configuration method for distributed deep learning systems. This method was firstly based on the monotonic function relationship between resource allocation and batch size hyperparameter allocation and model training time and training accuracy, and we select the order-preserving regression theoretical tool to build a model prediction model for single-round complete training time and final training accuracy for computer vision target classification and recognition, respectively; then, we use the abovementioned models together to solve the resource and batch size optimal allocation solutions to meet the model training accuracy requirements with the goal of minimizing resource cost. The optimal allocation of resources and batch size to meet the training accuracy requirements of the model is solved. In this paper, we evaluate the performance of the proposed method for computer vision target recognition based on the proposed distributed deep learning system.
APA, Harvard, Vancouver, ISO, and other styles
44

Gwinn, John F., and Loretta F. Beal. "On-Line Computer Testing: Implementation and Endorsement." Journal of Educational Technology Systems 16, no. 3 (1988): 239–52. http://dx.doi.org/10.2190/ub7p-ucpt-44ef-xe1x.

Full text
Abstract:
An interactive computer testing and record keeping system was implemented for a large self-paced anatomy and physiology course. This system including security procedures, is described and results of exploratory research axe presented on student preference for on-line testing, test anxiety, attitude and achievement. This required testing program included immediate feedback, second attempts, and retests. When correlates of achievement, test anxiety, and computer attitudes were investigated, we found that over time there was a slight reduction in realistic computer attitudes and a slight increase in general test anxiety. Students reported more facilitating anxiety with computer administered tests and more debilitating anxiety with paper and pencil tests. Strengths and weaknesses of such testing for faculty and for students is discussed. Suggestions are presented for properly integrating a computer testing program into a course.
APA, Harvard, Vancouver, ISO, and other styles
45

Fu, Gang, Wen Jian Geng, and Ren Long Li. "Design and Implementation of General High-Speed Data Storage System." Advanced Materials Research 989-994 (July 2014): 2414–17. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.2414.

Full text
Abstract:
According to the trend of the development of the computer system bus more, designs the general high-speed data storage system based on computer platform structure.Put forward the "one-way chain" cache structure, to avoid the computer operating system of real-time data transmission, the influence of the multithreaded mode data transmission and storage of parallel processing.According to the basic principle of data storage in a computer system, put forward the standard file operations function replace special instruction set, the method of implementing the SCSI disk array storage at a high speed.Test results show that the data storage system based on computer platform with more generalization method to achieve the high speed of data storage.
APA, Harvard, Vancouver, ISO, and other styles
46

Journal, Baghdad Science. "Implementation of Optical Coherent Communication System between Two Computers." Baghdad Science Journal 7, no. 1 (2010): 41–47. http://dx.doi.org/10.21123/bsj.7.1.41-47.

Full text
Abstract:
This work represents implementation and investigation of optical coherent communication system between two computers. A single mode optical fiber is selected as transmission medium. The data are sent via the RS-232 standard interface with a bit rate of 9.6 kbps from personal computer (PC1) by line receive to convert the data from electrical levels (-12/+12 V) into TTL level (0/5 V). The modulation of this data was accomplished by internal modulation using laser diode type (HFCT-5208M) 1310 nm wavelength. The optical D-coupler was used to combine the optical signal that come from laser source with optical signal of laser local oscillator (OTS-304XI) at 1310/1550 nm wavelength to obtain coherent (homodyne and heterodyne) detection respectively. A PIN photodetector (HFCT-5208M) is used. Calculations of Signal to Noise Ratio (SNR) and Bit Error Rate (BER) for coherent detection were measured at different length of the optical fiber. Result show that high SNR and low BER for heterodyne detection than for homodyne detection.
APA, Harvard, Vancouver, ISO, and other styles
47

Muhammad, Dicky, Gita Indah Hapsari, and Giva Andriana Mutiara. "An Experimental Connectivity Performance of Simple Wireless Mesh Implementation Using Wireless Distribution System (WDS)." IJAIT (International Journal of Applied Information Technology) 1, no. 02 (2017): 18–27. http://dx.doi.org/10.25124/ijait.v1i02.871.

Full text
Abstract:
Today wireless technology grows rapidly, especially in the field of telecommunications and communications. Computer networks now widely utilizes wireless. Wireless Mesh Network is one of the method which is use to communicate computer wirelessly. One important factor in application of wireless network is how to extend wireless signal coverage. Wireless Distribution System is one way to expand the wireless network by mean of wireless interconnection of access point on the network IEEE 8022.11. This study suggests how to build a simple wireless computer network using WDS technology and describes connectivity performance and its signal coverage. The test result of connectivity performance shows that the connectivity between two computers work properly for reliability and multi SSID testing. However, the connectivity was not success in multichannel testing. Furthermore the test result of coverage shows that the range of wireless signal coverage reaches 39 meters with different circumstance room.
APA, Harvard, Vancouver, ISO, and other styles
48

Cui, Jian Tao. "Design and Implementation of Computer Network Monitoring Software." Applied Mechanics and Materials 686 (October 2014): 201–4. http://dx.doi.org/10.4028/www.scientific.net/amm.686.201.

Full text
Abstract:
This paper mainly studies the key technologies of network real-time monitoring system based on Client/Server, and implementation of a real-time monitoring system based on CS/ mode. Using the network communication technology, Winsock technology, TCP/IP protocol, image compression and transmission technology, the process of communication technology and object oriented software technology to realize the main frame module, the system include network monitoring data initialization module, data transmission module, image coding and decoding module, its advantage is to make full use of the existing network resources, the highest price, with real-time information control and real-time control as the center, timely delivery and management of information.
APA, Harvard, Vancouver, ISO, and other styles
49

LI, Xinyou, Tao XU, and Bei LIU. "Design and implementation of configuration automatic system for computer core." Journal of Computer Applications 33, no. 10 (2013): 2858–60. http://dx.doi.org/10.3724/sp.j.1087.2013.02858.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Aziz, Abdul. "Implementation of Computer Assisted Test Selection System in Local Governments." Jurnal Bina Praja 08, no. 01 (2016): 39–48. http://dx.doi.org/10.21787/jbp.08.2016.39-48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography