To see the other types of publications on this topic, follow the link: IBM Personal Computer AT.

Dissertations / Theses on the topic 'IBM Personal Computer AT'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'IBM Personal Computer AT.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Ju, Szewei 1960. "A real time multitasking kernel for the IBM personal computer." Thesis, The University of Arizona, 1988. http://hdl.handle.net/10150/276851.

Full text
Abstract:
The purpose of this study is to design a simple, efficient, single-user multitasking kernel for real-time applications on the IBM Personal Computer. Since real-time application consists of many tasks and their order of execution cannot be predetermined, it is almost impossible to write a monolithic block of code that can meet the response time of all the tasks. By using multitasking, each task is assigned a priority based on the urgency of its response time. The kernel uses a priority-based preemptive scheduling strategy to select a new task to run, so the highest-priority task can always get to run when it is ready. The Basic Input/Output System of the PC is rewritten to be reentrant so that it can be shared by multiple tasks.
APA, Harvard, Vancouver, ISO, and other styles
2

Al-Zariey, Mohamed 1950. "An interactive program for elliptic filters using an IBM personal computer." Thesis, The University of Arizona, 1987. http://hdl.handle.net/10150/276565.

Full text
Abstract:
The purpose of this thesis is to present a mathematical model in which we describe the theoretical approximation of the elliptic filters. From this theoretical treatment, the transfer function and its magnitude, as well as its poles and zeros, were programmed in Turbo Pascal for AT&T and IBM (PC/XT/AT) personal computers and their compatibles. The program, PC-ELLIP, also calculates the element values for double terminated two-port networks. Source code is included.
APA, Harvard, Vancouver, ISO, and other styles
3

Wallace, John Glenn. "Speech synthesis using a digital modulation scheme on the IBM personal computer." Diss., Rolla, Mo. : School of Mines and Metallurgy of the University of Missouri, 1989. http://scholarsmine.mst.edu/thesis/pdf/Wallace_09007dcc805dc178.pdf.

Full text
Abstract:
Thesis (M.S.)--University of Missouri--Rolla, 1989.<br>Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed January 9, 2009) Includes bibliographical references (p. 39-40).
APA, Harvard, Vancouver, ISO, and other styles
4

梁國昌 and Kwok-cheong Denis Leung. "Microcomputer automation of the chemical laboratory: data acquisition with the IBM PC/XT/AT family." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1991. http://hub.hku.hk/bib/B31209853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Morley, Deborah G. "Design and adaptation of a general purpose, user friendly statistical software package for the IBM personal computer and IBM PC compatibles (PC VSTAT)." Ohio : Ohio University, 1986. http://www.ohiolink.edu/etd/view.cgi?ohiou1183141969.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Datta, Diptish. "Interfacing the IBM PC with the STD bus for multiprocessing." Thesis, Virginia Tech, 1985. http://hdl.handle.net/10919/45647.

Full text
Abstract:
<p>The advent of the Personal Computer into the technical world has, at an extremely reasonable expense and trouble, made available to us, considerable computational power. But, as it was with computers, the next logical step is to have multiple units running in concert, or, in other words, sharing the load. This leads to the concept of Multiprocessing in order to attain an enhancement in operation speed and superior efficiency. The IBM PC is a versatile and market proven personal computer with a very large volume of software support and the STD Bus is a standard that has been developed to cope with a variable support, i.e. different processors and different I/O capabilities. Together, they combine the user interface - the display and keyboard · of the PC, the processing capabilities of the PC, the I/O capabilities of the STD Bus and the support processing possible on the STD Bus. The resulting system is powerful, easy to use and it has a lot of scope for development.</p><br>Master of Science
APA, Harvard, Vancouver, ISO, and other styles
7

Midgley, Christian G. "Design and implementation of a simulator for a local area network utilizing an IBM PC/AT or compatible computer /." Online version of thesis, 1988. http://hdl.handle.net/1850/11659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ghabra, Fawwaz I. "Processor and postprocessor for a plane frame analysis program on the IBM PC." Thesis, Virginia Tech, 1985. http://hdl.handle.net/10919/45725.

Full text
Abstract:
In this thesis, a PROCESSOR and a POSTPROCESSOR are developed for a plane frame analysis computer program on the IBM PC. The PROCESSOR reads the data prepared by a PREPROCESSOR and solves for the unknown joint displacement using the matrix displacement method. The POSTPROCESSOR uses the results of the PROCESSOR to obtain the required responses of the structure. A chapter on testing procedures is also provided.<br>Master of Science
APA, Harvard, Vancouver, ISO, and other styles
9

Srinivasan, Krishnaswami. "A software shell for visually impaired applications." Thesis, Virginia Polytechnic Institute and State University, 1986. http://hdl.handle.net/10919/91105.

Full text
Abstract:
An approach to introduce the visually impaired to personal computers is presented in this thesis. The PC used for this work was an IBM PC Portable. Use of the resident software developed in conjunction with a Votrax Voice Unit can greatly simplify PC applications for the visually impaired. Further, a method to communicate with a mainframe is also presented. Almost all of the commonly used DOS application software are supported by the software presented in this thesis. Two modes of operation are possible. The advantages and differences between these two modes are considered. A detailed discussion on the software implementation is also presented. A method to develop resident programs that need to trap PC BIOS vectors is presented. It should be noted that the shell concept presents a shell of user invoked resident applications and not a group of subprograms which can be used by other applications.<br>M.S.
APA, Harvard, Vancouver, ISO, and other styles
10

Enany, Ahmed. "Achieving Security in Messaging and Personal Content in Symbian Phones." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5635.

Full text
Abstract:
This thesis describes two proposed schemes that could be used to secure mobile messaging (SMS/MMS) as well as one scheme that could be used to secure mobile content. The security services we considered in securing the mobile messages are confidentiality, authentication, non-repudiation and integrity. We used Identity Based Cryptography in order to secure the mobile messaging and Blowfish algorithm to secure the mobile content. Due to some of the disadvantages imposed by the Identity Based Cryptography, we recommended using it along with the RSA algorithm. The proposed schemes were implemented in java and tested on an actual device, Nokia N70. In addition, we measured the time required by each of the algorithms we used to encrypt/decrypt a certain number of bytes. We found that the time taken by RSA and Blowfish algorithms will not be noticeable by the user. However, since the implementation of the Identity Based Cryptography we used was not meant to run on mobile devices, we encountered a noticeable delay whenever encrypting/decrypting the data using this algorithm. Securing the SMS messages will make it to be considered as one of the proposed means that could be used to conduct m-commerce. In addition, securing the MMS messages and the mobile content will increase the usability and the reliability of the mobile phones especially to the users on the move.<br>Phone: +46735731360
APA, Harvard, Vancouver, ISO, and other styles
11

Bettermann, Stephan. "Implementing a fault-tolerant C-Linda in OS/2." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1998. https://ro.ecu.edu.au/theses/1006.

Full text
Abstract:
The parallel paradigm is accepted by computer scientists as playing a role of increasing importance in their discipline area. To enable operation in the parallel paradigm, Linda may be used to extend existing and well understood programming languages such as C, Eiffel, Prolog, and Lisp. Linda is not a complete programming language in its own right, but rather a coordination language which is injected into a host programming language thereby creating a parallel dialect of that host language. The behaviour of every component, whether hardware or software, may be defined by a service specification. Thus, a failure may be defined as occurring when a component behaves in a manner not consistent with its service specification. The ability of a system to tolerate failures of any of its components is called fault-tolerance. The probability of failure occurring is higher in parallel systems and distributed systems than in single-processor systems due to increased hardware and software complexity. Furthermore, as many computations on such systems are long lived, the ability to tolerate failures is particularly important. Personal Computers represent an abundant computing resource. Connecting multiple Personal Computers via a Local Area Network, a common practice in medium to large scale organisations, results in a computing resource which is typically idle, but which is readily useable in the parallel paradigm. By exploiting this idle resource a fault-tolerant Linda may be implemented. Such a Linda implementation achieves low-cost fault-tolerance by distributing and replicating a tuple space in a ring arrangement over the Local Area Network. This thesis describes the development of a fault-tolerant Linda injected into the ANSI C programming language running on a Local Area Network of Personal Computers, each one running under OS/2. The Local Area Network is accessed using NetBIOS, as provided by OS/2's Communication Manager.
APA, Harvard, Vancouver, ISO, and other styles
12

Wu, Ai. "Etudes comparatives des architectures des reseaux locaux et implementation du protocole x. 25 sur ibm pc." Paris, ENST, 1987. http://www.theses.fr/1987ENST0017.

Full text
Abstract:
Ce travail est compose de deux parties: 1) etude comparative des architectures des reseaux locaux. Les problemes lies a la modelisation de protocoles et a l'evaluation de performances d'un systeme de communication sont analyses. 2) l'implementation du protocole x. 25 sur ibm-pc a pour objectif de connecter cette importante famille des ordinateurs personnels sur les reseaux x. 25. La conception du systeme et la realisation du logiciel sont presentees. Une serie de mesures de performance a ete realisee en utilisant une application de transfert de fichier. Les resultats sont analyses
APA, Harvard, Vancouver, ISO, and other styles
13

Jones, Julia E. "Microcomputer programming package for the assessment of multiattribute value functions." Thesis, Virginia Polytechnic Institute and State University, 1985. http://hdl.handle.net/10919/51893.

Full text
Abstract:
Research into multiattribute utility theory far outweighs current attempts to apply findings, while the need for usable decision techniques continues to increase. Current decision maker - analyst procedures involving decision making sessions and numerous manual calculations are considered to be overly time-consuming, except for the most important of complex decisions. The purpose of this thesis was to design and develop a microcomputer package utilizing recent improvements in decision theory to increase the efficiency of the decision making process. Algorithms for independence testing and parameter estimation have been developed for both continuous attributes and discrete attributes. Two separate packages, an additive value function package (DECISION) and a SMART technique package (SMART), are developed based on these algorithms and their validity tested by means of a case study. Both packages are written for use on a standard (256K) IBM PC microcomputer.<br>Master of Science
APA, Harvard, Vancouver, ISO, and other styles
14

Coelho, Leandro dos Santos. "Metodologias da inteligencia computacional em identificação e controle de processos : abordagem nebulosa evolutiva e neural." reponame:Repositório Institucional da UFSC, 1997. http://repositorio.ufsc.br/xmlui/handle/123456789/77062.

Full text
Abstract:
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnologico<br>Made available in DSpace on 2012-10-17T00:27:36Z (GMT). No. of bitstreams: 0Bitstream added on 2016-01-08T21:24:04Z : No. of bitstreams: 1 106549.pdf: 11541153 bytes, checksum: 7575f2206b683c6693ce7160231badbb (MD5)<br>Esta dissertação trata da descrição, projeto e implementação de metodologias da inteligência computacional em identificação e controle de processos, em escala laboratorial, com propósito ao tratamento adequado das restrições e dos requisitos exigidos no projeto de sistemas. As metodologias da inteligência computacional utilizados são: lógica nebulosa, computação evolucionária, redes neurais artificiais, "simulated annealing" e sistemas híbridos inteligentes.
APA, Harvard, Vancouver, ISO, and other styles
15

Peña, Selene. "UNIX remote access via IBM S/390 system." [Denver, Colo.] : Regis University, 2006. http://165.236.235.140/lib/SPena2006.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Ellis, Robert A. (Robert Adams). "The computer industry--strategic analysis of DEC and IBM." Thesis, Massachusetts Institute of Technology, 1987. http://hdl.handle.net/1721.1/14831.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Mauck, Linda S. "Conversion of mass storage hierarchy in an IBM computer network." Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25792.

Full text
Abstract:
With the shift from batch applications to online systems supporting the strategic role of information, corporate or institutional goals tie directly to the information management functions. This has been true at the Naval Postgraduate School (NPS). Like many other Government installations, the NPS Computer Center has to meet its objectives with less than state-of-the-art hardware. In the early 1980's, the Center employed IBM's 3850 Mass Storage Subsystem (MSS) for online storage of student and faculty data sets. It was installed in December 1980 and performed well for over six years. Faced with IBM's announcement (in February 1985) of the limited future connectivity and compatibility and the increasing maintenance costs, the decision was made to replace the MSS with hardware/software alternative that would use a more modern and reliable architecture. The objective of this thesis is to define the solution, and data set migration process, and describe the early experience with a multi-level, software-managed, storage system
APA, Harvard, Vancouver, ISO, and other styles
18

Золотова, Світлана Григорівна, Светлана Григорьевна Золотова, Svitlana Hryhorivna Zolotova, and S. O. Chernenko. "Tablet personal computer." Thesis, Вид-во СумДУ, 2011. http://essuir.sumdu.edu.ua/handle/123456789/22212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Jayaraman, Radhakrishnan. "Development of an interactive programming system for IBM 7545 robot." Thesis, Virginia Polytechnic Institute and State University, 1986. http://hdl.handle.net/10919/90945.

Full text
Abstract:
This thesis presents the development of an interactive programming system for the IBM 7545 robot. Various methods of robot programming are discussed, and the reasons for the development of such an interactive programming system are provided. The development of this system was divided into five phases, namely, the development of the pseudo-compiler, development of the "system control" program, integration of ASSEMBLY routines, development of the "motion control" program, and the development of test programs. The approach used for each of these five stages are outlined, and a reference to the use of the system is given. A description of the development of each stage is then given, and the logic associated with all programs are described, and the purpose and operation of all subroutines are also presented. Some assumptions and limitations of the system are explained, and the operational aspects of the system are described. Additional work needed to improve this system is outlined, and the feasibility of using the concept of this system on other robot programming languages on the IBM 7545 robot are also discussed.<br>M.S.
APA, Harvard, Vancouver, ISO, and other styles
20

Zhang, Ying Ping. "A study of architecture and performance of IBM Cyclops64 interconnection network." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 0.37Mb, 66 p, 2005. http://wwwlib.umi.com/dissertations/fullcit/1428258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Besada, Jorge L. "Personal computer security system." FIU Digital Commons, 1993. http://digitalcommons.fiu.edu/etd/1707.

Full text
Abstract:
This work consists on the design and implementation of a complete monitored security system. Two computers make up the basic system: one computer is the transmitter and the other is the receiver. Both computers interconnect by modems. Depending on the status of the input sensors (magnetic contacts, motion detectors and others) the transmitter detects an alarm condition and sends a detailed report of the event via modem to the receiver computer.
APA, Harvard, Vancouver, ISO, and other styles
22

Zetterlund, Rickard. "IBM QRadar SIEM: : Undertitel: Installation, dokumentation och utvärdering." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36558.

Full text
Abstract:
Detta arbete har utförts på uppdrag av ett konsultföretag vars systemkonsult önskar dokumentera grundläggande kunskap gällande IBM Qradar SIEM. Arbetet beskriver vad IBM QRadar SIEM är och vad det kan göra,samt går igenom installation av QRadar Community Edition och information gällande händelser och flöden i en virtuell miljö. Arbetet redovisar även den uppskattade tiden det tar att installera QRadar CE och de applikationer som användes i detta arbete. En dokumentation skapades för systemkonsulten innehållandes denna information. Det tar även upp en etisk diskussion angående SIEM, andra SIEM-lösningar samt olika typerav nätverksattacker.<br>This work has been performed on behalf of a consulting company whose system consultant wishes to document basic knowledge regarding IBM QRadar SIEM. The work describes what IBM QRadar SIEM is and what it can do, as well as reviewing the installation of QRadar Community Edition and information about events and flows in a virtual environment. The work also reports the estimated time it takes to install QRadar CE and the applications used in this work. A documentation was created for the system consultant containing this information.This work has been performed on behalf of a consulting company whose system consultant wishes to document basic knowledge regarding IBM QRadar SIEM. The work describes what IBM QRadar SIEM is and what it can do, as well as reviewing the installation of QRadar Community Edition and information about events and #ows in a virtual environment. The work also reports the estimated time it takes to install QRadar CE and the applications used in this work. A documentation was created for the system consultant containing this information. It also addresses an ethical discussion regarding SIEM, other SIEM solutions and various types of network attacks.
APA, Harvard, Vancouver, ISO, and other styles
23

Eriksson, Patrik, and Philip Wester. "Granskning av examensarbetesrapporter med IBM Watson molntjänster." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232057.

Full text
Abstract:
Cloud services are one of the fast expanding fields of today. Companies such as Amazon, Google, Microsoft and IBM offer these cloud services in various forms. As this field progresses, the natural question occurs ”What can you do with the technology today?”. The technology offers scalability for hardware usage and user demands, that is attractive to developers and companies. This thesis tries to examine the applicability of cloud services, by combining it with the question: ”Is it possible to make an automated thesis examiner?” By narrowing down the services to IBM Watson web services, this thesis main question reads ”Is it possible to make an automated thesis examiner using IBM Watson?”. Hence the goal of this thesis was to create an automated thesis examiner. The project used a modified version of Bunge’s technological research method. Where amongst the first steps, a definition of an software thesis examiner for student theses was created. Then an empirical study of the Watson services, that seemed relevant from the literature study, proceeded. These empirical studies allowed a deeper understanding about the services’ practices and boundaries. From these implications and the definition of a software thesis examiner for student theses, an idea of how to build and implement an automated thesis examiner was created. Most of IBM Watson’s services were thoroughly evaluated, except for the service Machine Learning, that should have been studied further if the time resources would not have been depleted. This project found the Watson web services useful in many cases but did not find a service that was well suited for thesis examination. Although the goal was not reached, this thesis researched the Watson web services and can be used to improve understanding of its applicability, and for future implementations that face the provided definition.<br>Molntjänster är ett av de områden som utvecklas snabbast idag. Företag såsom Amazon, Google, Microsoft och IBM tillhandahåller dessa tjänster i flera former. Allteftersom utvecklingen tar fart, uppstår den naturliga frågan ”Vad kan man göra med den här tekniken idag?”. Tekniken erbjuder en skalbarhet mot använd hårdvara och antalet användare, som är attraktiv för utvecklare och företag. Det här examensarbetet försöker svara på hur molntjänster kan användas genom att kombinera det med frågan ”Är det möjligt att skapa en automatiserad examensarbetesrapportsgranskare?”. Genom att avgränsa undersökningen till IBM Watson molntjänster försöker arbetet huvudsakligen svara på huvudfrågan ”Är det möjligt att skapa en automatiserad examensarbetesrapportsgranskare med Watson molntjänster?”. Därmed var målet med arbetet att skapa en automatiserad examensarbetesrapportsgranskare. Projektet följde en modifierad version av Bunge’s teknologiska undersökningsmetod, där det första steget var att skapa en definition för en mjukvaruexamensarbetesrapportsgranskare följt av en utredning av de Watson molntjänster som ansågs relevanta från litteratur studien. Dessa undersöktes sedan vidare i empirisk studie. Genom de empiriska studierna skapades förståelse för tjänsternas tillämpligheter och begränsningar, för att kunna kartlägga hur de kan användas i en automatiserad examensarbetsrapportsgranskare. De flesta tjänster behandlades grundligt, förutom Machine Learning, som skulle behövt vidare undersökning om inte tidsresurserna tog slut. Projektet visar på att Watson molntjänster är användbara men inte perfekt anpassade för att granska examensarbetesrapporter. Även om inte målet uppnåddes, undersöktes Watson molntjänster, vilket kan ge förståelse för deras användbarhet och framtida implementationer för att möta den skapade definitionen.
APA, Harvard, Vancouver, ISO, and other styles
24

Wang, Jun. "Computer simulations of personal robots." Thesis, University of Ottawa (Canada), 1993. http://hdl.handle.net/10393/6477.

Full text
Abstract:
It has been recognized for some time that persons with severe physical disabilities could benefit greatly if they had a personal robot under their control. Such kind of robots has been available for several years, but the acceptence by disabled persons has been very slow. One of the reasons is a concern for safety. If a robot arm is strong enough to bring food to a person's mouth, then it could do severe personal injury to the eyes or teeth in the event of an electronic or mechanical failure. In this thesis, a new approach of investigating a personal robot will be presented. A three-dimensional computer simulation of a personal robot will be described. It is completely under the control of the user. This simulation system has many advantages over testing an actual model, since it enables almost any type of personal robot and any type of control strategy to be investigated. This system can be used by researchers to investigate control algorithms for a personal robot. It can also be used by disabled persons so that they can get familiar with the robot as well as the control strategy before they use or purchase the actual model. Currently, this simulation is used to investigate a control strategy called "Modified Extended Physiological Proprioception".
APA, Harvard, Vancouver, ISO, and other styles
25

Chong, Henry H. W. 1974. "Toward a personal quantum computer." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42797.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1997.<br>Includes bibliographical references (p. 115-118).<br>by Henry H.W. Chong.<br>M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
26

Fuller, Marvin G. "Technological enhancements for personal computers." Thesis, Monterey, Calif. : Naval Postgraduate School, 1992. http://handle.dtic.mil/100.2/ADA247962.

Full text
Abstract:
Thesis (M.S. in Systems Technology (Command, Control, and Communications))--Naval Postgraduate School, March 1992.<br>Thesis Advisor: Poock, Gary K. "March 1992." Includes bibliographical references (p. 54-55). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
27

Calvo, Adrián. "Using the IBM WatsonTM Dialog Service for Assisting Parallel Programming." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-55734.

Full text
Abstract:
IBM Watson is on the verge of becoming a milestone in computer science as it is using a new technology that relies on cognitive systems. IBM Watson is able to understand questions in natural language and give proper answers. The use of cognitive computing in parallel programming is an open research issue. Therefore, the objective of this project is to investigate how IBM Watson can help in parallel programming by using the Dialog Service. In order to answer our research question an application has been built based on the IBM Watson Dialog Service and a survey has been carried out. The results of our research demonstrate that the developed application offers valuable answers to the questions asked by a programmer and the survey reveals that students would be interested in using it.
APA, Harvard, Vancouver, ISO, and other styles
28

McDonough, James P. Strom Mark W. "Forward observer personal computer simulator 2 /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FMcDonough.pdf.

Full text
Abstract:
Thesis (M.S. in Modeling, Virtual Environment, and Simulation (Movies))--Naval Postgraduate School, September 2005.<br>Thesis Advisor(s): Rudolph P. Darken. Includes bibliographical references (p.65-66). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
29

Gingery, David L. "Pastoral uses of the personal computer." Theological Research Exchange Network (TREN), 1986. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Hutchings, Cédric (Cédric Nils) 1976. "Handheld computer for personal health advice." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/8095.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Aeronautics and Astronautics, 2002.<br>Includes bibliographical references (leaf 58).<br>The overall objectives of the project were to conceive, design, implement and evaluate a portable personal health advisor. The system would integrate data from various sources and handheld computers on a real-time basis to provide "advice" (intelligent and knowledge) anytime and anywhere so that a consumer can take practical and immediate actions to maximize their vitality to enjoy life. The conception phase included the identification of technologies and approach to deliver personal and real-time advice at points of decision. Using this knowledge, I developed a prototype in the context of a person shopping in a pharmacy or market to ensure that foods, medicines or other products do not pose hazards relative to that person's known medical condition. In order to implement a real-life and thus estimate the usability and the user's perception of the system, we chose to focus on Type II diabetics in this first phase. A field test was run at a Research Laboratory of the major project sponsor, Procter & Gamble. The experiment confirmed the great appeal of decision-aiding system for people who have to manage strict or complex diet. It also underlined its design challenges, because even an ubiquitous device that provides "perfect advice" would promote a long-term behavior change only if human factor issues related to trust, privacy and user perception are carefully analyzed. It finally revealed the need for a trusted infrastructure, and some of the difficulties to overcome in order to implement the system in a large scale.<br>by Cédric Hutchings.<br>S.M.
APA, Harvard, Vancouver, ISO, and other styles
31

Antia, Yezdi F. "Personal computer development system software architecture." Thesis, Virginia Polytechnic Institute and State University, 1985. http://hdl.handle.net/10919/104287.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Hellmuth, George F. "Personal computer based home automation system." Master's thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-09192009-040212/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Schmieley, Donald A. "A personal computer based DSS for computer-family based selection." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/30971.

Full text
Abstract:
A decision support system to select a computer-family using an objective evaluation process is developed. A computer-family is defined as a group of computers from microcomputer to mainframe with compatible operating systems and software. Saaty's analytic hierarchy process is applied to the weighing and scoring stages of the computer-family selection methodology presented by Borovits and Zviran. The result is a decision support system incorporating an objective and comprehensive methodology for computer-family selection.
APA, Harvard, Vancouver, ISO, and other styles
34

Cho, Kwan-Sik. "A personal mobile computer : a notebook computer without a keyboard /." Online version of thesis, 1995. http://hdl.handle.net/1850/12092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Zhu, Tong 1971. "Develop real-time multitasking system and client/server based windows protocol for IBM PC/PS2." Thesis, The University of Arizona, 1992. http://hdl.handle.net/10150/278250.

Full text
Abstract:
As Local Area Networks becoming increasingly popular, the need to develop protocols for remote login, client/server based peer to peer connections, and event driven windows protocol for IBM PC/PS2 is ever greater. This thesis is primary devoted to the development of a real-time multitasking system for the IBM PC/PS2, and a client/server, event driven Windows protocol similar to X-Window protocol available in computers based on Unix platform. In addition, features such as interprocess communication queues, virtual windows, heap managers which are necessities in a distributed environment are provided also. Program developer may include this multitasking program in the kernel of the PC network operating system such as Novell Netware, and Microsoft Lan Manager. Consequently, a multitasking kernel is developed to provide dynamic tasking spawning, fast task switching, and MS-DOS independent dynamic memory allocation. In addition, a window manager based on this multitasking kernel is developed to manage dialog windows or tasking windows in a distributed environment. Windows may be sent across the network and be displayed remotely.
APA, Harvard, Vancouver, ISO, and other styles
36

Tsao, Heng-Jui. "Personal Software Process (PSP) Scriber." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2140.

Full text
Abstract:
Personal Software Process (PSP) Scriber is a Web-based software engineering tool designed to implement an automatic system for performing PSP. The basis of this strategy is a set of tools to facilitate collection and analysis of development data. By analyzing the collected data, the developer can make informed, accurate decisions about their individual development effort.
APA, Harvard, Vancouver, ISO, and other styles
37

Frame, Charles E. "Personal computer and workstation operating systems tutorial." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA280132.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, March 1994.<br>Thesis advisor(s): Norman F. Schneidewind. "March 1994." Includes bibliographical references. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
38

Pitts, Bobby Louis. "Medical illustration on the Macintosh personal computer /." Online version of thesis, 1988. http://hdl.handle.net/1850/10416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Lazarou, John. "Serial communications between personal computer and Unix." Virtual Press, 1989. http://liblink.bsu.edu/uhtbin/catkey/722455.

Full text
Abstract:
A system is developed which facilitates communication between a Personal Computer and a Mainframe, and can do both directions, and lets the user execute Unix shell commands while the file transfer is in process. This communication system consists of two programs, one named "Thesis.EXE" that runs on a DOS based machine, and one named named "COMMGREEK" that runs on a Unix based machine.<br>Department of Computer Science
APA, Harvard, Vancouver, ISO, and other styles
40

Villandre, Michael R., and David Brannon. "The forward observer personal computer simulator (FOPCSIM)." Thesis, Monterey, California. Naval Postgraduate School, 2002. http://hdl.handle.net/10945/5409.

Full text
Abstract:
Approved for public release; distribution is unlimited.<br>This joint thesis addresses the need for a task trainer for the artillery forward observer task. In recent years, declining budgets, limitations on artillery ammunition and encroachment into training areas have reduced the opportunity to conduct live fire artillery training. Simulation systems available to operating forces utilize technology that is several years out of date and none have a deployable configuration. The goal was to develop a proof of concept simulator that uses advanced 3D graphics to replicate the artillery call for fire task. The system utilizes Digital Terrain Elevation Data (DTED) to produce accurate 3D geometry that is further enhanced by the use of color satellite imagery as a texture overlay to produce extremely realistic terrain. The procedures utilized in the FOPCSIM are taken directly from a cognitive task analysis and executed through keyboard, mouse or voice recognition interfaces. The accuracy of these procedures was validated through a series of studies involving military personnel trained as forward observers. A wide variety of mission types, munitions, targets, training areas and environmental effects are available to the user and may be set at the beginning of the simulation or changed during the simulation through a Graphical User Interface.
APA, Harvard, Vancouver, ISO, and other styles
41

Brannon, David A. Villandre Michael R. "The forward observer personal computer simulator (FOPCSIM) /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FBrannon.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2002.<br>Thesis advisor(s): Rudolph Darken, Joseph Sullivan. Includes bibliographical references (p. 111-113). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
42

Srivastava, Sameer 1959. "Real time system design using personal computer." Thesis, The University of Arizona, 1988. http://hdl.handle.net/10150/276883.

Full text
Abstract:
This thesis dwells on the issue of using personal computers in real-time control and data acquisition applications. A data acquisition and control system is designed to acquire temperature, humidity, air volume and solar radiation data and control the inside temperature, air volume and maximizes solar radiation inside an ecologically closed test structure. The focus is on an Intel 8088 or 80286 based personal computer. A personal computer is used for development of the software and the final real-time system runs on a PC as well. This eliminates the need of expensive cross compilers and in-circuit emulators. A control and data acquisition task is selected and a solution using an IBM compatible personal computer is demonstrated. Various advantages and disadvantages for selecting the personal computer and development software and environment are discussed. Solutions to various problems encountered are discussed.
APA, Harvard, Vancouver, ISO, and other styles
43

Strauss, Jacob A. (Jacob Alo) 1979. "Device-transparent personal storage." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/62459.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 83-87).<br>Users increasingly store data collections such as digital photographs on multiple personal devices, each of which typically presents the user with a storage management interface isolated from the contents of all other devices. The result is that collections easily become disorganized and drift out of sync. This thesis presents Eyo, a novel personal storage system that provides device transparency: a user can think in terms of "file X", rather than "file X on device Y", and will see the same set of files on all personal devices. Eyo allows a user to view and manage the entire collection of objects from any of their devices, even from disconnected devices and devices with too little storage to hold all the object content. Eyo separates metadata (application-specific attributes of objects) from the content of objects, allowing even storage-limited devices to store all metadata and thus provide device transparency. Fully replicated metadata allows any set of Eyo devices to efficiently synchronize updates. Applications can specify flexible placement rules to guide Eyo's partial replication of object contents across devices. Eyo's application interface provides first-class access to object version history. If multiple disconnected devices update an object concurrently, Eyo preserves each resulting divergent version of that object. Applications can then examine the history and either coalesce the conflicting versions without user direction, or incorporate these versions naturally into their existing user interfaces. Experiments using Eyo for storage in several example applications-media players, a photo editor, podcast manager, and an email interface-show that device transparency can be had with minor application changes, and within the storage and bandwidth capabilities of typical portable devices.<br>by Jacob Alo Strauss.<br>Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
44

Johansson, Oscar, and Max Forsman. "Shared computer systems and groupware development : Escaping the personal computer paradigm." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-75953.

Full text
Abstract:
For the majority of the computers existence, we humans have interacted with them in a similar way, usually with a strict one-to-one relationship between user and machine. This is reflected by the design of most computers, operating systems and user applications on the market today, which are typically intended to only be operated by a single user. When computers are used for teamwork and cooperation, this design philosophy can be restricting and problematic. This paper investigates the development of shared software intended for multiple users and the impact of the single user bias in this context. A prototype software system was developed in order to evaluate different development methods for shared applications and discover potential challenges and limitations with this kind of software. It was found that the development of applications for multiple users can be severely limited by the target operating system and hardware platform. The authors conclude that new platforms are required to develop shared software more efficiently. These platforms should be tailored to provide robust support for multiple concurrent users. This work was carried out together with SAAB Air Traffic Management in Växjö, Sweden and is a bachelor's thesis in computer engineering at Linnaeus University.
APA, Harvard, Vancouver, ISO, and other styles
45

Zhong, Xiaoming 1971. "Factors influencing a personal software process." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=30775.

Full text
Abstract:
Following the development of Personal Software Process (PSP) by Humphrey, a number of efforts have been made to study the impact of PSP on the improvement of software quality and productivity. However, most of such studies have focused on the results of the execution of PSP. Little attention has been paid to the underlying factors that influence the output of the execution of PSP. By investigating which factors influence the output, and how, we would have an improved understanding of PSP, which, in turn, could lead to improvement of the design of PSP and hence of personal software process.<br>In this thesis, we describe an experiment involving 53 subjects carrying out PSP. In particular, we examine the factors underlying a personal software process and analyzed the impact of these factors on the output of PSP execution, namely, the improvement in software quality and productivity. Our study complements previous work on PSP by providing a "white-box" view of PSP in assessing the effectiveness of PSP.
APA, Harvard, Vancouver, ISO, and other styles
46

Layouni, Mohamed. "Privacy-preserving personal information management." Thesis, McGill University, 2010. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=86764.

Full text
Abstract:
The spread of Information and Communication Technologies (ICTs) has transformed the way we deliver services, and has made them in general more efficient and more accessible to users. With these improvements however came new challenges. The extensive use of electronic services in our daily life, and the massive gathering of transactional data have led to serious privacy violations.<br>In this thesis we provide techniques to enhance users' privacy, and to give them greater control over their data. We propose a protocol allowing users to authorize access to their remotely-stored records, according to a self-chosen privacy policy, and without the storage server learning the access pattern to their records, or the index of the queried records. This prevents the storage server from linking the identity of the party retrieving a record to that of the record owner. In many applications, the association between the identity of the record retriever and that of the record owner represents sensitive information, and needs to be kept private. The proposed protocol is called Accredited Symmetrically Private Information Retrieval (ASPIR), and uses Brands's Anonymous Credentials [Bra00] and a Symmetrically Private Information Retrieval (SPIR) scheme by Lipmaa [Lip05], as building blocks.<br>Next, we extend the above ASPIR protocol to a setting where the stored records belong to multiple owners simultaneously. The new protocol, called Multi-Authorizer ASPIR, allows the owners of a record to authorize access to their data according to a self-chosen privacy policy, without the storage server learning the access pattern to their record. We present constructions for settings where the retrieving party has to provide authorizations either from all the owners of the target record, or from a subset of them of size greater that a certain threshold. We also consider the case of a General Access Structure, where the retrieval is allowed only if authorizations from certain pre-defined subsets of the owners are provided. The Multi-authorizer ASPIR protocol is more efficient than ASPIR, and can be built with any SPIR primitive.<br>Finally, we dedicate the last part of the thesis to applying privacy preserving techniques to a real world problem. In particular, we consider the area of e-health, and provide a privacy-preserving protocol for handling prescriptions in the Belgian healthcare system.<br>La prolifération des services électroniques a eu des retombées positives sur nos sociétés. Les technologies de l'information ont révolutionné divers domaines clé de notre vie, notamment les services gouvernementaux, les affaires, la santé, les transports, les communications et l'éducation. Souvent, le passage au numérique, a rendu les services plus accessibles, plus rapides, plus faciles à utiliser et socialement plus inclusifs. Cependant, avec ces améliorations sont apparus aussi de nouveaux problèmes. En effet, l'utilisation des services électroniques au quotidien, et la collecte massives de données transactionnelles sur les utilisateurs, ont conduit à l'établissement de ce qu'on appelle communément les "dossiers électroniques". Un dossier électronique est une compilation de données personnelles récoltées lorsqu'un individu effectue des transactions électroniques ou reçoit des services. Ces dossiers sont de plus en plus utilisés par le gouvernement et les corporations pour prendre des décisions importantes sur les individus, sans que ces derniers ne soient capables d'y participer.<br>Cette thèse présente des techniques pour protéger davantage la vie privée des citoyens et leur donner plus de contrôle sur leurs données. On propose, entre autres, un protocole pour permettre à des utilisateurs d'autoriser l'accès à leurs données, sauvegardées sur un serveur distant, sans que celui-ci n'apprenne d'informations sur la fréquence et la distribution des accès, ou même sur l'indice des données récupérées. Ceci empêche le serveur d'établir des liens entre l'identité d'un propriétaire de données, et celle de l'agent qui a demandé l'accès à ses données. On peut penser à une multitude de scénarios où la divulgation de l'existence d'un tel lien est non souhaitable. Le protocole qu'on propose est nommé ASPIR de l'Anglais (Accredited Symmetrically Private Information Retrieval), et utilise les systèmes de certification de Brands [Bra00], ainsi que le système SPIR de Lipmaa [Lip05].<br>Dans un deuxième temps, on généralise le protocole ASPIR initial à un environnement où les entrées appartiennent à plusieurs parties. Le nouveau protocole, nommé Multi-Authorizer ASPIR, permet aux propriétaires d'autoriser l'accès à leurs données selon une politique qu'ils ont eux même choisie, et sans que le serveur n'apprenne des informations sur la fréquence et la distribution des accès. On présente des constructions pour des scénarios où le demandeur de données doit fournir une autorisation de la part de tous les (respectivement une partie des) propriétaires. Le protocole, Multi-authorizer ASPIR, est plus performant, et peut être implanté avec n'importe quel système SPIR.<br>Enfin, la dernière partie de la thèse est dédiée à l'application des techniques de protection de la vie privée à un exemple concret de la vie courante. L'exemple qu'on traite appartient au domaine de la santé. On présente alors un protocole pour gérer les ordonnances médicales, qui est compatible avec le système de santé Belge. Le protocole proposé préserve la vie privée des patients et des médecins.
APA, Harvard, Vancouver, ISO, and other styles
47

Allwine, Daniel Alan. "Personal computer based data acquisition, sensing and control." Ohio : Ohio University, 1993. http://www.ohiolink.edu/etd/view.cgi?ohiou1174932273.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Genakos, Christos. "Essays on competition in the personal computer industry." Thesis, London Business School (University of London), 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.423139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Lee, Soon Hin. "Animated AGVS simulation package for the personal computer." Ohio University / OhioLINK, 1987. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1183048619.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Strom, Mark W. "The Forward Observer Personal Computer Simulator (FOPCSim) 2." Thesis, Monterey, California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/1970.

Full text
Abstract:
Due to declining budgets and decreases in ammunition allowances, the opportunity to conduct live fire artillery training has been greatly reduced. The available simulation trainers are either outdated, require specialize contractor support, or are not deployable. FOPCSim was developed at no cost, is freely available, takes advantages of modern 3D graphics, eliminates costly contractor support, and will run on laptops in support of deploying units. The simulator provides users with real-time performance feedback based on the Marine Corps Training and Readiness standards and was designed according to a cognitive task analysis of the call for fire procedures. To evaluate how well FOPCSim trains the call for fire procedures, an experiment was conducted at The Basic School in Quantico, Virginia. FOPCSim was used in place of the current simulation: Training Set, Fire Observation (TSFO) to evaluate its training effectiveness. By eliminating the overhead associated with most simulators, FOPCSim allows users to perform the call for fire procedures with a high degree of repetitiveness which is needed to train this type of task.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!