To see the other types of publications on this topic, follow the link: Computer systems programs.

Journal articles on the topic 'Computer systems programs'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer systems programs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Venčkauskas, Algimantas, Jevgenijus Toldinas, and Vita Krivickienė. "Kompiuterių ir operacinių sistemų saugos modulio programos sudarymas." Informacijos mokslai 50 (January 1, 2009): 187–93. http://dx.doi.org/10.15388/im.2009.0.3240.

Full text
Abstract:
Informacinės technologijos turi tinkamai atlikti kontrolę, užtikrinančią informacijos saugą nuo įvairių pavojų – nepageidaujamo ar nesankcionuoto informacijos skleidimo, pakeitimo ar netekimo ir panašiai. Tarptautinių ir Lietuvos institucijų, tiriančių kompiuterių saugos incidentus, duomenimis, informacijos saugos pažeidimų skaičius nemažėja. Įvairūs tyrimai, atlikti Lietuvos valstybinių ir nepriklausomų organizacijų, rodo, kad Lietuvoje nėra specialių informacijos saugos specialistų rengimostudijų programų, nors jų poreikis yra akivaizdus. Europos ir JAV universitetuose kompiuterių saugos dalykai dėstomi įvairiais būdais – yra atskiros studijų programos arba saugos moduliai įtraukti į bendrąsias kompiuterių mokslo ar inžinerijos programas. Straipsnyje, išnagrinėjus Vakarų universitetų informacijos saugos studijų programas ir patirtį, siūloma Kompiuterių ir operacinių sistemų saugos modulio programa, apimanti svarbiausius informacijos saugos dalykus.Development of Computer and Operating Systems Security Module CurriculumAlgimantas Venčkauskas, Jevgenijus Toldinas, Vita Krivickienė SummaryThe purpose of Information technologies is to protect an organization’s valuable resources, such as information, from unauthorized publishing, changing or missing. Total number of information security breaches unabated, according to Worldwide and Lithuanian institutions inquiring computer security incidents. In recent years a number of Government and independence Lithuanian organizations have recognized the need for security education in Lithuania (especially in information security), and lack of information security courses. In Europe and USA computer security course modules are taught as separate study programs or they are integrated into existing computer science or engineering programs. In this paper we analyze information security programs curriculums and experiences of west universities in this area. We investigate the Computer and operating systems security module course curriculum where main information security priorities are included.
APA, Harvard, Vancouver, ISO, and other styles
2

Uckan, Yuksel. "Teaching COBOL in computer information systems programs." ACM SIGCSE Bulletin 18, no. 3 (September 1986): 58–64. http://dx.doi.org/10.1145/378905.378945.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dixon, J. R. "Knowledge-Based Systems for Design." Journal of Mechanical Design 117, B (June 1, 1995): 11–16. http://dx.doi.org/10.1115/1.2836444.

Full text
Abstract:
Knowledge-based systems are a special class of computer programs that purport to perform, or to assist humans in performing, specified intellectual tasks. This paper describes how knowledge-based programs are special; that is, how they differ from other computer programs. A structure for understanding the use of knowledge-based programs in engineering design is presented, together with an example. The role of knowledge-based systems in design research is discussed.
APA, Harvard, Vancouver, ISO, and other styles
4

Dixon, J. R. "Knowledge-Based Systems for Design." Journal of Vibration and Acoustics 117, B (June 1, 1995): 11–16. http://dx.doi.org/10.1115/1.2838652.

Full text
Abstract:
Knowledge-based systems are a special class of computer programs that purport to perform, or to assist humans in performing, specified intellectual tasks. This paper describes how knowledge-based programs are special; that is, how they differ from other computer programs. A structure for understanding the use of knowledge-based programs in engineering design is presented, together with an example. The role of knowledge-based systems in design research is discussed.
APA, Harvard, Vancouver, ISO, and other styles
5

Lukyanov, Pavel B. "Computer programs “CORALL”: automation of veterinary measures management." Economy of agricultural and processing enterprises, no. 12 (2021): 50–57. http://dx.doi.org/10.31442/0235-2494-2021-0-11-50-57.

Full text
Abstract:
The article presents the author’s solutions for automating the diagnosis of cattle diseases, discusses approaches to managing the planning and implementation of veterinary measures implemented in the computer programs “CORALL – Diagnosis of cattle diseases” and “CORALL – Cattle farm: Herd management”, estimates the economic efficiency of the introduction and use of automated systems. The development of specialized information systems for livestock enterprises was carried out by two developers – B.V. Lukyanov and P.B. Lukyanov (the author of the article). The presence of personal computers on farms makes it possible to transfer into specialized computer programs a significant part of the routine work on planning, accounting and control of veterinary measures, and when diagnosing animal diseases, computers make it possible to actively use automated diagnostic expert systems. The introduction of modern information technologies into the practice of the zootechnician and veterinarian significantly increases the accuracy and validity of measures to protect animals and prevent diseases, and also allows to achieve more effective management of operational activities with herd animals. The use of the expert system «CORALL – Diagnosis of cattle diseases» is disclosed. This system is focused on two types of users: an Expert who fills in the knowledge base, and a User who uses the system for diagnosing diseases and obtaining certificates. When considering the software package «CORALL – Cattle farm: Herd management», the main attention is paid to the functions of planning, control and registration of veterinary measures both for an individual animal and for a planned group. Practical recommendations are given on the use of CORALL software systems when using them at livestock enterprises.
APA, Harvard, Vancouver, ISO, and other styles
6

Ilyasova, R. A., A. U. Dauletkulova, and D. Ya Tokhtakhunov. "SYSTEMS OF COMPUTER-ORIENTED PROBLEMS IN THE COURSE OF DIFFERENTIAL EQUATIONS." BULLETIN Series of Physics & Mathematical Sciences 69, no. 1 (March 10, 2020): 351–55. http://dx.doi.org/10.51889/2020-1.1728-7901.62.

Full text
Abstract:
The modern period of development of the information society is characterized by the need to modernize the education system. The training of a future mathematics teacher should be organized in such a way that in addition to basic knowledge, future teachers should master various applications of mathematics, be able to model various processes and phenomena, and use modern information technologies in the process of solving mathematical problems. The use of computers and computer programs in the educational process changes the role of learning tools in teaching. In our study, we consider the computer as one of the components of the entire system of learning tools, which, in addition to the computer, includes traditional learning tools that ensure the teaching of an educational subject. This paper shows some advantages and disadvantages of computer mathematics systems in the course of differential equations. Computer programs that allow us to implement numerical, analytical and graphical methods for solving differential equations are considered.
APA, Harvard, Vancouver, ISO, and other styles
7

Ducharme, Lori J., Hannah K. Knudsen, and Paul M. Roman. "Computer systems in addiction treatment programs: Availability and implications for program evaluation." Evaluation and Program Planning 28, no. 4 (November 2005): 368–78. http://dx.doi.org/10.1016/j.evalprogplan.2005.07.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

WELCH, LONNIE R., GUOHUI YU, BINOY RAVINDRAN, FRANZ KURFESS, JORGE HENRIQUES, MARK WILSON, ANTONIO L. SAMUEL, and MICHAEL W. MASTERS. "REVERSE ENGINEERING OF COMPUTER-BASED CONTROL SYSTEMS." International Journal of Software Engineering and Knowledge Engineering 06, no. 04 (December 1996): 531–47. http://dx.doi.org/10.1142/s0218194096000223.

Full text
Abstract:
This article presents a process for the reengineering of computer-based control systems, and describes tools that automate portions of the process. The intermediate representation (IR) for capturing features of computer-based systems during reverse engineering is presented. A novel feature of the IR is that it incorporates the control system software architecture, a view that enables information to be captured at five levels of granularity: the program level, the task level, the package level, the subprogram level, and the statement level. A reverse engineering toolset that constructs the IR from Ada programs, displays the IR, and computes concurrency, communication and object-orientedness metrics is presented. Also described is the design of hypermedia techniques that enhance the usability of the reverse engineering tools.
APA, Harvard, Vancouver, ISO, and other styles
9

Makarov, V. "Computer programs for eukaryotic gene prediction." Briefings in Bioinformatics 3, no. 2 (January 1, 2002): 195–99. http://dx.doi.org/10.1093/bib/3.2.195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shaft, Teresa M. "Helping programmers understand computer programs." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 26, no. 4 (November 1995): 25–46. http://dx.doi.org/10.1145/223278.223280.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Burgin, Mark. "Triadic Automata and Machines as Information Transformers." Information 11, no. 2 (February 13, 2020): 102. http://dx.doi.org/10.3390/info11020102.

Full text
Abstract:
Algorithms and abstract automata (abstract machines) are used to describe, model, explore and improve computers, cell phones, computer networks, such as the Internet, and processes in them. Traditional models of information processing systems—abstract automata—are aimed at performing transformations of data. These transformations are performed by their hardware (abstract devices) and controlled by their software (programs)—both of which stay unchanged during the whole computational process. However, in physical computers, their software is also changing by special tools such as interpreters, compilers, optimizers and translators. In addition, people change the hardware of their computers by extending the external memory. Moreover, the hardware of computer networks is incessantly altering—new computers and other devices are added while other computers and other devices are disconnected. To better represent these peculiarities of computers and computer networks, we introduce and study a more complete model of computations, which is called a triadic automaton or machine. In contrast to traditional models of computations, triadic automata (machine) perform computational processes transforming not only data but also hardware and programs, which control data transformation. In addition, we further develop taxonomy of classes of automata and machines as well as of individual automata and machines according to information they produce.
APA, Harvard, Vancouver, ISO, and other styles
12

Sheveleva, T. A. "PROGRAMS FOR COMPUTER MODELING OF MECHANISM KINEMATICS." Applied Mathematics and Fundamental Informatics 7, no. 2 (2020): 037–48. http://dx.doi.org/10.25206/2311-4908-2020-7-2-37-48.

Full text
Abstract:
The article presents the history of the creation of computer-aided design systems, an overview of special programs and CAD systems for the kinematic study of mechanisms, as well as examples of the use of these programs in computer simulation of the movement of mechanisms. The urgency of this problem is determined by the need to perform synthesis and analysis of mechanisms that have found wide application in modern technology. The use of computer modeling for the kinematic study of mechanisms allows you to reduce the time for designing mechanisms, and with this the cost of the final product.
APA, Harvard, Vancouver, ISO, and other styles
13

Nixon, John E. "Computer Information Systems Programs in British Universities and Polytechnics." Journal of Education for Business 64, no. 1 (October 1988): 40–42. http://dx.doi.org/10.1080/08832323.1988.10772865.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Schulz, Charles A. "Casual management of large computer systems with APL programs." ACM SIGAPL APL Quote Quad 18, no. 2 (December 1987): 283–93. http://dx.doi.org/10.1145/377719.55666.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Kostenko, V. A. "Automatic generation of parallel programs for mimd computer systems." Cybernetics and Systems Analysis 31, no. 5 (September 1995): 772–78. http://dx.doi.org/10.1007/bf02366326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Cannon, Robert, John Gorgone, Tom Ho, and John D. McGregor. "Proposed criteria for accreditation of computer information systems programs." ACM SIGCSE Bulletin 20, no. 1 (February 1988): 88. http://dx.doi.org/10.1145/52965.52986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Varrasi, John. "The Computer Assist." Mechanical Engineering 127, no. 10 (October 1, 2005): 44–46. http://dx.doi.org/10.1115/1.2005-oct-3.

Full text
Abstract:
This article discusses in less than 40 years, a novelty has grown into a mainstay of engineering practice. Only a few forward-looking technology companies invested in computers, primarily mainframe systems. While bringing the benefits of data management and real-time processing to engineering, the mainframes were also a headache. Engineers spent countless hours correcting functional problems and writing programs. The programs, particularly large-scale ones involving difficult computations, were executed in batch processing mode, meaning that the engineer had only one attempt each day to run the programs. The engineering community must advance computer technology to the level where engineers can validate a structure completely using computational tools, without having to develop physical models and prototypes. The next step is cognitive information processing using the computer to actually mimic the attributes of the human brain.
APA, Harvard, Vancouver, ISO, and other styles
18

Bowerman, Chris. "CALL Systems." ReCALL 2, no. 3 (November 1990): 9–16. http://dx.doi.org/10.1017/s0958344000002822.

Full text
Abstract:
The history of computer-aided language learning (CALL) dates back some 40 years. During this period two main types of system have been developed: frame-based and intelligent. These two types of programs are examined in turn below.
APA, Harvard, Vancouver, ISO, and other styles
19

Bardak Denerel, Simge, and Gaye Anil. "Computer Aided Drawing Programs in Interior Architecture Education." Revista Amazonia Investiga 10, no. 39 (May 5, 2021): 28–39. http://dx.doi.org/10.34069/ai/2021.39.03.3.

Full text
Abstract:
Interior architecture education has displayed much variability from the past to the present day. Additionally, computer-aided drawing systems have become an irreplaceable part of interior architecture education, as in all other design disciplines. The contribution of computers in education to the design process has created a process of, Hand drawing – Design – Design in computer environment – Product – Prototype. Currently, traditional drawing methods are used much less. Computer-aided drawing programs in universities display differences in terms of models and content. Additionally, the year and semester in which these lessons are taught are different in every university. In this context, this study deals with computer-aided drawing lessons in a total of 63 programs in 31 interior architecture departments and 32 interior architecture and environmental design departments in Turkey and the Turkish Republic of Northern Cyprus linked to the Council of Higher Education (YÖK) currently. This research was completed with the screening model. Data collection started in October 2020 and was completed at the end of 15 days. Screening was performed to learn which programs are taught in the programs in interior architecture and interior architecture and environmental design departments in different faculties. The software features of these programs were analyzed. The results of the study revealed the similarities of the different programs to each other.
APA, Harvard, Vancouver, ISO, and other styles
20

BILLIARD, S. "COMPUTER PROGRAMS: nessi: a program for numerical estimations in sporophytic self-incompatibility genetic systems." Molecular Ecology Resources 8, no. 2 (June 28, 2008): 295–98. http://dx.doi.org/10.1111/j.1471-8286.2007.01985.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Uncu, Nuşin, and Rızvan Erol. "Capacity Optimization in Dynamically Routing Computer Network Systems." Tehnički glasnik 16, no. 1 (February 4, 2022): 23–32. http://dx.doi.org/10.31803//tg-20201215233216.

Full text
Abstract:
A computer network system is a complex system with a great number of dynamic components. There are many devices in the system, such as computers, routers, lines, hubs, and switches. In addition to these hardware systems, many protocols are integrated to set the rules and provide the way of communication. Due to the nature of the system, it is hard to formulate and solve problems analytically without making any assumptions. One of the prominent problems that occur in computer systems is the line capacity assignment problem. In the previous mathematical models, message routes were predetermined and the dynamic nature of the system was neglected. This study deals with the line capacity assignment problem under a dynamically routing policy. Four different computer network topologies are used and solved by two heuristic algorithms via simulation. A dynamic search approach based on the occupancy rate of lines is used to define the consecutive routes of messages. The performances of harmony search and genetic algorithms via simulation are compared with the results of OptQuest, one of the optimization packet programs embedded in simulation software Arena®.
APA, Harvard, Vancouver, ISO, and other styles
22

Tarkov, M. S. "Mapping parallel programs onto multicore computer systems by Hopfield networks." Optical Memory and Neural Networks 22, no. 3 (July 2013): 148–55. http://dx.doi.org/10.3103/s1060992x13030053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

GARDIKIOTIS, Calina Andreea. "Acquittal Solution. Unauthorized Reproduction of Computer Programs on Computation Systems." Jurnalul de Studii Juridice 14 (December 2, 2019): 105–10. http://dx.doi.org/10.18662/jls/45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Chertkov, N. K., and V. N. Chertkov. "A package of computer programs for tuning automatic control systems." Thermal Engineering 54, no. 9 (September 2007): 734–38. http://dx.doi.org/10.1134/s004060150709011x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Smith, M. R. "Computer programs for designing multipole electron and ion optical systems." Journal of Vacuum Science & Technology B: Microelectronics and Nanometer Structures 5, no. 1 (January 1987): 161. http://dx.doi.org/10.1116/1.583854.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Hofmeister, Alan M., and Joseph M. Ferrara. "Expert Systems and Special Education." Exceptional Children 53, no. 3 (November 1986): 235–39. http://dx.doi.org/10.1177/001440298605300306.

Full text
Abstract:
Expert systems are computer programs designed to replicate human expertise in a variety of areas. This article discusses the characteristics of these programs as well as recently available expert system development tools. The article also suggests potential applications for expert systems within the field of special education. Finally, the article reviews recent efforts to apply expert systems technology to special education problems.
APA, Harvard, Vancouver, ISO, and other styles
27

Wiegand, David A., Robert B. Page, and David S. Channin. "The Surgical Workstation: Surgical Planning Using Generic Software." Otolaryngology–Head and Neck Surgery 109, no. 3 (September 1993): 434–40. http://dx.doi.org/10.1177/019459989310900308.

Full text
Abstract:
Computer software for rendering and display of three-dimensional data is becoming readily available for all types of computers. Such programs typically accept data from any source, compute a three-dimensional volume of data, and display it with a variety of rendering options. Although not specifically designed for medical image processing, these programs can provide very detailed and finely rendered images that are useful for surgical planning. We use one such program to display data from standard computed tomography scans, which gives us a photorealistic three-dimensional view of patient anatomy. This view can be modified to render tissues transparent, translucent, or opaque, and thus allows the surgeon to selectively enhance bony architecture, tumors, or other details. Images can be rotated, sliced, and displayed in the surgical position. Image animation can be added to facilitate the display of complex anatomic relationships. Our experience with this technology suggests that such programs can provide the basis for personal surgical workstations for medical image analysis and surgical planning. Further development of such generic imaging systems should allow this useful technology to become widely available for surgical planning and education. We discuss our experience with a typical generic imaging workstation. (OTOLARYNGOL HEAD NECK SURG 1993;109:434-40.)
APA, Harvard, Vancouver, ISO, and other styles
28

Ptak, Paweł. "SIMULATION PROGRAMS IN DISTANCE LEARNING." SOCIETY. INTEGRATION. EDUCATION. Proceedings of the International Scientific Conference 5 (May 28, 2021): 436–47. http://dx.doi.org/10.17770/sie2021vol5.6305.

Full text
Abstract:
In the era of the development of computer technology, methods were created that enable teaching, not only through direct contact with the student, but also through the computer network and the Internet. In order for this to be possible, programs allowing this type of activity had to be created. They are to model the operating conditions of electronic and measurement systems in virtual space as much as possible. Such programs must reflect the operation of such systems under operating conditions, taking into account disturbing signals. They should also be adapted to remote work via the Internet. In the era of epidemics, when the possibilities of teaching in the classical form are very limited or impossible, simulation programs working in a network environment may make sense. The results of modeling the operation of systems in virtual reality and the created measurement systems can be sent electronically. This allows their verification with the laboratory teacher and joint work on the project by a group of students during the laboratory classes.
APA, Harvard, Vancouver, ISO, and other styles
29

Hawk, Stephen, and Thomas Witt. "Telecommunications Courses in Information Systems Programs." International Journal of Information and Communication Technology Education 2, no. 1 (January 2006): 79–92. http://dx.doi.org/10.4018/jicte.2006010107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

MOZGOVOY, Maxim. "Desktop Tools for Offline Plagiarism Detection in Computer Programs." Informatics in Education 5, no. 1 (April 15, 2006): 97–112. http://dx.doi.org/10.15388/infedu.2006.08.

Full text
Abstract:
Plagiarism in universities has always been a difficult problem to overcome. Various tools have been developed over the past few years to help teachers detect plagiarism in students' work. By being able to categorize the multitude of plagiarism detection tools, it is possible to estimate their capabilities, advantages and disadvantages. In this article I consider modern plagiarism software solutions, paying attention mostly to desktop systems intended for plagiarism detection in program code. I also estimate the speed and reliability of different plagiarism detection systems that are currently available.
APA, Harvard, Vancouver, ISO, and other styles
31

McGuire, Richard A. "Computer-Based Instrumentation." Language, Speech, and Hearing Services in Schools 26, no. 3 (July 1995): 223–31. http://dx.doi.org/10.1044/0161-1461.2603.223.

Full text
Abstract:
Currently, there are a number of useful computer-based programs available to assist speech-language pathologists in clinical intervention. As clinicians acquire computer-based systems, they must realize that responsible use of these systems is dependent on an understanding of the usefulness and limitations of this type of instrumentation. The purpose of this report is to provide a basic overview of (a) speech signal acquisition, (b) computer processing, and (c) some basic applications related to computer-based manipulation of speech. Although it may not be necessary for the clinician to configure and/or program these systems, a general understanding of the capacities and limitations of this instrumentation will provide a foundation for responsible and creative applications.
APA, Harvard, Vancouver, ISO, and other styles
32

Feng, Yuan, Sanjiang Li, and Mingsheng Ying. "Verification of Distributed Quantum Programs." ACM Transactions on Computational Logic 23, no. 3 (July 31, 2022): 1–40. http://dx.doi.org/10.1145/3517145.

Full text
Abstract:
Distributed quantum systems and especially the Quantum Internet have the ever-increasing potential to fully demonstrate the power of quantum computation. This is particularly true given that developing a general-purpose quantum computer is much more difficult than connecting many small quantum devices. One major challenge of implementing distributed quantum systems is programming them and verifying their correctness. In this paper, we propose a CSP-like distributed programming language to facilitate the specification and verification of such systems. After presenting its operational and denotational semantics, we develop a Hoare-style logic for distributed quantum programs and establish its soundness and (relative) completeness with respect to both partial and total correctness. The effectiveness of the logic is demonstrated by its applications in the verification of quantum teleportation and local implementation of non-local CNOT gates, two important algorithms widely used in distributed quantum systems.
APA, Harvard, Vancouver, ISO, and other styles
33

Mezhennaya, Natalia M., and Oleg V. Pugachev. "ON PERCEPTION OF COMPUTER ALGEBRA SYSTEMS AND MICROSOFT EXCEL BY ENGINEERING STUDENTS." Problems of Education in the 21st Century 77, no. 3 (June 18, 2019): 379–95. http://dx.doi.org/10.33225/pec/19.77.379.

Full text
Abstract:
This research presents the analysis of image of the popular program packages: CAS (Computer Algebra Systems) Matlab, Mathcad, Mathematica, and the spreadsheet ‘Microsoft Excel’ among students of engineering specializations studying in Bauman Moscow State Technical University (BMSTU). The research has explored perception of program packages by all students (N=164), and by male students (N=110) and female students (N=54) separately. Image of the program packages, convenience of their interfaces, usage scenarios, and applicability for solution of tasks of certain types have been explored via questioning the students. Moreover, the students assessed likelihood of using the programs in the future. It was established that all the program packages under consideration can be successfully used in the process of education, but some of them (Matlab and Mathematica) require additional lessons to learn their interface and peculiarities. Gender differences in perception of the program packages do not determine the education outcomes. The differences of perception of the programs are mainly caused by their popularity and the students’ skills of using certain programs. The following gender differences have been detected: in the female students’ sample, the programs Mathcad and Excel are leading, Matlab is performed a little worse; Matlab is associated with the statement “difficult / inconvenient interface”. In the male students’ sample, the three programs Matlab, Mathcad, and Microsoft Excel got nearly equal grades. Female students estimate future usage of Microsoft Excel higher than male students do. The CAS Mathematica takes the lowest places for both samples; as a possible cause of such result, it has been found that Mathematica is not widespread as compared to the other programs under consideration. Keywords: computer algebra system, education statistics, engineering education, mathematical education, Mathcad, Mathematica, Matlab, Microsoft Excel.
APA, Harvard, Vancouver, ISO, and other styles
34

Grigoryev, Andrey, and Dmitry Ulitovsky. "Computer modeling of ship combined propulsion plants." E3S Web of Conferences 244 (2021): 08004. http://dx.doi.org/10.1051/e3sconf/202124408004.

Full text
Abstract:
Combined propulsion plants (CPP) are increasingly being used on modern ships of foreign and domestic construction. A feature of such plants is that the energy for the movement of the vessel is generated in them in two (or more) different types of ship engines - heat and electric ones, working on a common propulsor. Combined plants are complex electromechanical systems designed to provide propulsion in various modes of ship operation and generate electricity in a cruising mode or during a lay-up. CPP combine the advantages of traditional propulsion plant with heat main engines and electric propulsion plants. The study of the physical properties and the principle of operation of CPP without a comprehensive study of the object using the model is impossible. Computer models and computer modeling are widely used to study the properties of complex objects. Nowadays, personal digital computers are widely used for computer modeling. Standard packages and programs are used as programs and packages for computer modeling.
APA, Harvard, Vancouver, ISO, and other styles
35

Dikevych, K. "THE CYBERNETIC MODELING METHOD APPLICATION IN FOREIGN PRACTICE IN WRITING FORENSIC HANDWRITING EXAMINATION." Criminalistics and Forensics, no. 66 (2021): 975–82. http://dx.doi.org/10.33994/kndise.2020.66.72.

Full text
Abstract:
This article examines the experience of foreign practice over the past several decades in the field of creating a scientific basis for forensic examination of handwriting, as well as software and software systems that automate some of the examination processes. Shared with: tools that compute functions and provide visualizations to assist the handwriting researcher; verification methods that ensure the degree of consistency between the questioned and the sample documents; identification methods that narrow the search in the electronic document repository with the authors available in it. Various methods of computer scanning and pattern recognition, which have been developed over the past 40 years, are investigated to the problems of identification of the writer and the authenticity/personality of handwriting. It has been established that the ability to use handwriting to identify a person is of great importance for the justice systems and law enforcement agencies. Over the past 30 years, there has been a limited amount of research on the use of computers to improve and automate the analysis performed by forensic handwriting experts. Based on the study, the need for further research is emphasized to obtain new tools in the form of computer programs for solving identification and diagnostic problems, obtaining new tools in the form of computer programs to identify disguised handwriting, as well as to help restore or decipher damaged or partially destroyed documents
APA, Harvard, Vancouver, ISO, and other styles
36

Hocking, Ralph T. "The Evolution of CAI in an Advanced Finance Course." Journal of Educational Technology Systems 15, no. 4 (June 1987): 375–81. http://dx.doi.org/10.2190/uwe0-dbcn-t96t-de11.

Full text
Abstract:
The field of Finance is neither ill-suited to CAI applications, nor is it automatically oriented toward computers. Because of this unique position of Finance, the historical evolution of CAI for one Advanced Finance course appears to be of interest and will be presented in this article. This evolution begins with the computer literate instructor trying to adapt the noncomputer-oriented text problems for solution by canned programs running on a mainframe. Next comes the early microcomputer with the first spreadsheet solutions, in addition to the canned programs. The latest phase in this evolution has a text with computer-oriented support materials and more computer literate students using currently popular spread sheet systems.
APA, Harvard, Vancouver, ISO, and other styles
37

YUAN, Y., and P. YU. "COMPUTATION OF SIMPLEST NORMAL FORMS OF DIFFERENTIAL EQUATIONS ASSOCIATED WITH A DOUBLE-ZERO EIGENVALUE." International Journal of Bifurcation and Chaos 11, no. 05 (May 2001): 1307–30. http://dx.doi.org/10.1142/s0218127401002742.

Full text
Abstract:
In this paper a method is presented for computing the simplest normal form of differential equations associated with the singularity of a double zero eigenvalue. Based on a conventional normal form of the system, explicit formulae for both generic and nongeneric cases are derived, which can be used to compute the coefficients of the simplest normal form and the associated nonlinear transformation. The recursive algebraic formulae have been implemented on computer systems using Maple. The user-friendly programs can be executed without any interaction. Examples are given to demonstrate the computational efficiency of the method and computer programs.
APA, Harvard, Vancouver, ISO, and other styles
38

Kathleen Heid, M. "How Symbolic Mathematical Systems Could and Should Affect Precollege Mathematics." Mathematics Teacher 82, no. 6 (September 1989): 410–19. http://dx.doi.org/10.5951/mt.82.6.0410.

Full text
Abstract:
Computer programs are now available that perform most of the algebraic and numerical-manipulation procedures on which school mathematics now concentrates. The defining characteristic of these symbolic mathematical systems is that, unlike many of the popular computer languages, they can manipulate variables as well as numbers. They can perform rationalnumber arithmetic, solve equations, produce equivalent expressions of a variety of types, apply trigonometric identities, evaluate limits and sums, compute the algebraic form of derivatives and integrals, perform matrix manipulations, and produce accurate numerical answers-with hundreds of digits if appropriate. In short, they can perform with more dependable accuracy and greater speed most of the algebraic and numerical procedures on which students now spend most of their mathematical careers.
APA, Harvard, Vancouver, ISO, and other styles
39

Leyden, D. E., and D. B. Bilbrey. "Incident and Take-Off Angles for Commercial X-Ray Spectrometers for Use With Fumdamental Parameter Software." Advances in X-ray Analysis 29 (1985): 493–95. http://dx.doi.org/10.1154/s0376030800010624.

Full text
Abstract:
In recent years there has been substantial development of computer programs which permit the computation of elemental concentration in a variety of samples from basic principles of X-ray absorption and emission. These prog rates are generally called "fundamental parameter" programs. For many years these programs required large main frame computers for execution. An example is the well known NRLXRF program. For the past few years, programs have been available for minicomputers such as the PDP/11 OR LSI/11 systems. The XRF-11 program from Criss Software, the SAP3 program from Batelle Pacific Northwest Laboratory. and a variety of programs from the X-ray instrumentation vendors are examples. Some fundamental parameter programs have been available for several years that can be executed on microcomputers or the so-called personal computers. Some programs use an "effective wavelength" approximation of the tube output to simplify computations.
APA, Harvard, Vancouver, ISO, and other styles
40

Ritland, K. "A Series of FORTRAN Computer Programs for Estimating Plant Mating Systems." Journal of Heredity 81, no. 3 (May 1990): 236–37. http://dx.doi.org/10.1093/oxfordjournals.jhered.a110982.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Vaughn, Rayford B., and Julian E. Boggess III. "Integration of computer security into the software engineering and computer science programs." Journal of Systems and Software 49, no. 2-3 (December 1999): 149–53. http://dx.doi.org/10.1016/s0164-1212(99)00088-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

NIgam, Gaurav Kumar. "SOFTWARE AUDIT SYSTEM." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 3 (November 30, 2012): 406–12. http://dx.doi.org/10.24297/ijct.v3i3a.2946.

Full text
Abstract:
To remotely monitor your computer over the internet, you have to install this software on the remote computer (called as server) as well as on your own computer (called as client). When connected , Software Audit System software gives you the full mouse and keyboard control over your computer and you can see the whole screen of the remote PC on your own desktop. As we know that computer networks within companies and organizations become more extensive and more complex, there is a considerable growth in the number of software programs that are installed and used on the computer systems. In order to increase the reliability and efficiency of computer Systems, it is mandatory that we clearly understand and control all the computer programs that are being used. The problem may also arise when people installing unauthorized or copied computer programs on their Desktop PC's. It is necessary that we provide auditing tools that can facilitate audit data either locally or reside on to a central network manager and it gives the information related to the installed and used computer programs
APA, Harvard, Vancouver, ISO, and other styles
43

Nayar, S. R. Prabhakaran, and Rebecca T. Thomas. "Interactive Computer Programs for Teaching Astronomy." International Astronomical Union Colloquium 105 (1990): 178–81. http://dx.doi.org/10.1017/s025292110008667x.

Full text
Abstract:
Astronomy is the most popular and oldest of all sciences and it has had profound influence on human thought. Unfortunately, astronomy does not find an appropriate place in our school-college syllabi. This may be due to the fact that teaching of astronomy encounters a large number of problems with regard to visualization and practical experiments. Popularization of astronomy depends heavily on a large variety of astronomical events, such as the arrival of comets, eclipses, supernovae, etc. Visualization of dynamics in several directions, wide variance of time scales, concepts of space, etc., create problems in teaching/learning processes in astronomy. Our world of human experience is limited to within a narrow frame, whereas in astronomy we speak of size, time, and temperature in gigantic scales. To bring all these parameters onto the human level, one has to think of effective teaching aids and the right type of techniques. We have been using a large number of tools in teaching astronomy, including star charts, globes, models, photographs, slides, etc. Microcomputers act as an effective medium in teaching astronomy. They can even replace most of the above mentioned teaching aids (Hunt, 1986; Marx and Szucs, 1985; Sparkes, 1986). A microcomputer can also act as a textbook, a blackboard, or even a planetarium. The computer acts also as a mediator between the student and the model of some real-life situation. The process of building and using models, called simulation, helps us to investigate systems that would otherwise be inaccessible. We have developed a set of software to teach basic concepts in astronomy, such as the solar system, constellations, and the physics of stars. We have explored the possibilities of making the software interactive, using the observed data so that a real life situation can be experienced by the users, just as for practical experiments.
APA, Harvard, Vancouver, ISO, and other styles
44

CLIFFJ, M., and J. S. WILD. "DEVELOPMENT OF SAS® COMPUTER PROGRAMS FOR SENSORY GRAPHICS1." Journal of Sensory Studies 4, no. 4 (March 1990): 249–60. http://dx.doi.org/10.1111/j.1745-459x.1990.tb00476.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Cheung, Kei Long, Dilara Durusu, Xincheng Sui, and Hein de Vries. "How recommender systems could support and enhance computer-tailored digital health programs: A scoping review." DIGITAL HEALTH 5 (January 2019): 205520761882472. http://dx.doi.org/10.1177/2055207618824727.

Full text
Abstract:
Objective Tailored digital health programs can promote positive health-related lifestyle changes and have been shown to be (cost) effective in trials. However, such programs are used suboptimally. New approaches are needed to optimise the use of these programs. This paper illustrates the potential of recommender systems to support and enhance computer-tailored digital health interventions. The aim is threefold, to explore: (1) how recommender systems provide health recommendations, (2) to what extent recommender systems incorporate theoretical models and (3) how the use of recommender systems may enhance the usage of computer-tailored interventions. Methods A scoping review was conducted, using MEDLINE and ScienceDirect, to identify health recommender systems reported in studies between January 2007 and December 2017. Information was subsequently extracted to understand the potential benefits of recommender systems for computer-tailored digital health programs. Titles and abstracts of 1184 studies were screened for the full-text screening, in which two reviewers independently selected articles and systematically extracted data using a predefined extraction form. Results A total of 26 articles were included for data extraction. General characteristics were reported, with eight studies reporting hybrid filtering. A description of how each recommender system provides a recommendation is described; the majority of recommender systems used messages as recommendation. We identified the potential effects of recommender systems on efficiency, effectiveness, trustworthiness and enjoyment of the digital health program. Conclusions Incorporating a collaborative method with demographic filtering as a second step to knowledge-based filtering could potentially add value to traditional tailoring with regard to enhancing the user experience. This study illustrates how recommender systems, especially hybrid programs, may have the potential to bring tailored digital health forward.
APA, Harvard, Vancouver, ISO, and other styles
46

Christensen, Dawn M. "The Specialist's Role in Computer Training Programs." Journal of Information Systems Management 7, no. 4 (January 1990): 65–69. http://dx.doi.org/10.1080/07399019008968372.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Matveev, A., and E. Martyanova. "Patentability of Computer Program Algorithms in the G20 States." BRICS Law Journal 9, no. 3 (September 12, 2022): 144–73. http://dx.doi.org/10.21684/2412-2343-2022-9-3-144-173.

Full text
Abstract:
Ubiquitous computerization and digitalization are contributing to the unprecedented growth of the software market. Computer programs are protected as subject of copyright law in international law and domestic legal systems. However, copyright law does not protect the interests of the copyright holder from borrowing ideas and algorithms which often have agreat commercial value. This circumstance has prompted the legal science and law enforcement practice of the most developed states to justify the possibility of protecting computer programs and their algorithms. The leading states chosen for in this paper are the G20 states. The relevance of this choice is due to the following: 1) The G20 states account for 86% of global GDP; 2) All world leaders in computer software development are G20 members; 3) All BRICS states are G20 members; 4) The law-and-orders of the G20 states are relevant to all existing traditions of the legal protection of intellectual property in the world. The legal systems of the G20 states follow one of three approaches according to the criterion of patentability of computer programs and their algorithms. We call the first approach “neutral.” It includes States which legislation does not explicitly prohibit the patenting of computer programs, but computer programs themselves are not mentioned among the subject matters of inventions. The second (“positive”) approach includes those states which legislation explicitly classifies computer programs as patentable inventions. On the contrary, the third (“negating”) approach includes states where it is legally established that computer programs as such are unpatentable. The results of the research demonstrate that there is no direct correlation between the way of solving the issue of patentability of computer program algorithms in different legal systems and the state’s place in the global IT market. For example, the United States and China take aneutral approach, Japan takes apositive approach, the EU Member States and India take anegating approach. We believe that the most flexible approach is aneutral approach from the point of view of patent law policy. The most liberal and consistent approach is the positive approach presented by the Japanese legal system. Finally, the negating approach is the most controversial and at the same time widespread among the G20 and BRICS states.
APA, Harvard, Vancouver, ISO, and other styles
48

Kobayashi, Kent D. "COMPUTER SIMULATION PROGRAMS FOR TEACHING CROP MODELING." HortScience 27, no. 6 (June 1992): 671e—671. http://dx.doi.org/10.21273/hortsci.27.6.671e.

Full text
Abstract:
The simulation programs Stella® (High Performance Systems) and Extend™ (Imagine That!) were used on Apple® Macintosh® computers in a graduate course on crop modeling to develop crop simulation models. Students developed models as part of their homework and laboratory assignments and their semester project Stella offered the advantage of building models using a relational diagram displaying state, rate, driving, and auxiliary variables. Arrows connecting the variables showed the relationships among the variables as information or material flows. Stella automatically kept track of differential equations and integration. No complicated programming was required of the students. Extend used the idea of blocks representing the different parts of a system. Lines connected the inputs and outputs to and from the different blocks. Extend was more flexible than Stella by giving the students the opportunity to do their own programming in a language similar to C. Also, with its dialog boxes, Extend more easily allowed the students to run multiple simulations answering “What if” questions. Both programs quickly enabled students to develop crop simulation models without the hindrance of extensive learning of a programming language or delving deeply into the mathematics of modeling.
APA, Harvard, Vancouver, ISO, and other styles
49

Zhang, Hongyu. "Discovering power laws in computer programs." Information Processing & Management 45, no. 4 (July 2009): 477–83. http://dx.doi.org/10.1016/j.ipm.2009.02.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Cheremisinov, D. I. "Synthesis of computer programs that implement finite automata." Automatic Control and Computer Sciences 41, no. 4 (August 2007): 215–23. http://dx.doi.org/10.3103/s0146411607040050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography