Academic literature on the topic 'MOPI (Computer system)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'MOPI (Computer system).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "MOPI (Computer system)"

1

E. Motorina, Lubov, and Veronica M. Sytnik. "Existential, Instrumental and Cyber Spaces as Ontological Modi of Human Being." Nova prisutnost XVIII, no. 3 (2020): 485–99. http://dx.doi.org/10.31192/np.18.3.4.

Full text
Abstract:
Context and relevance of the research: the task of developing a general theoretical basis and methodology of ontological problems of interaction and interrelation of the Internet space and the physical world comes forward with the formation of the virtual computer environment determined both by the presence of a human being in computer network and presence of computer network in the life world of the human being. Virtual reality, even in its current state, is already widely recognized and described in academic sources. There are prospects of its application in medicine, education, professional training, space, military, art, automotive industry, shipbuilding, trade, leisure, consulting assistance to population, administration, and other spheres of management. According to academic forecasts, intensive, large-scale, multidirectional development of virtual computer environment will continue in the 21st century. The purpose of the study is to carry out a systematic analysis of the concepts: existential space, instrumental space and cyberspace in their interrelationship and interaction; to propose the author’s definition of existential space as a methodological construction for the study of its ontological modi: instrumental space and cyberspace; to define the ontological characteristics of instrumental space and cyberspace, their common features (connection) and distinction; to reveal features of existential immersion of a person into virtual computer reality – the process of emotional perception of existence in the information field – an artificially created world of ‘people and things,’ as well as subjective-personal effects accompanying this process. The methodology used: M. Heidegger’s Dasein analytics, D. Ihde’s instrumental realism, systems-based approach, comparative analysis. Key findings: the creation of cyberspace and computer virtual reality has unveiled a new stage in the formation of existential experience and project as a system of information technology and socio-psychological competencies. There is a necessity in the system-based elaboration of conceptual and categorical apparatus. The researcher will use it to describe the ontological modi of both existing and a new (computer virtual) reality and their interconnection.
APA, Harvard, Vancouver, ISO, and other styles
2

Custers, Bart, Jan-Jaap Oerlemans, and Ronald Pool. "Laundering the Profits of Ransomware." European Journal of Crime, Criminal Law and Criminal Justice 28, no. 2 (2020): 121–52. http://dx.doi.org/10.1163/15718174-02802002.

Full text
Abstract:
Ransomware is malicious software (malware) that blocks access to someone’s computer system or files on the system and subsequently demands a ransom to be paid for unlocking the computer or files. Ransomware is considered one of the main threats in cybercrime today. Cryptoware is a specific type of ransomware, which encrypts files on computer systems. The ransom is often demanded in bitcoins. Based on desk research, a series of interviews, and the investigation of several police files, this paper investigates the modi operandi in which cybercriminals use ransomware and cryptoware to make profits and how they launder these profits. Two models, based on the payment of the ransom via vouchers and via bitcoins respectively, are identified and described. These methods allow criminals to launder profits in relative anonymity and prevent the seizure of the illegally obtained money.
APA, Harvard, Vancouver, ISO, and other styles
3

MOHAMMED ABDUL, AZEEM. "Designing of Medical processor unit for Intelligent network-based Medical usage." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 3 (2016): 532. http://dx.doi.org/10.11591/ijeecs.v4.i3.pp532-537.

Full text
Abstract:
<span>This medical design conventions of books and deductive method (MPU). the development of research and the success of many already, we have found the cause of architecture MPU. On the unique features of the processor in question it is coded in different areas of medicine (MOPC). working from a very close bilateral processor MPU. Each issue has a special feature code for the hardware supply chain on the steps and produce a special version of the code and the victim (s). Illness, Doctor MOPC mph dismounted and made a series of sub-processes, and to launch the second law of medical devices. If the computer system of a victim and has a specific digital for logic, and victims of medical devices that operate in the blood, tissues, operating theaters, medical staff, medical costs and variables, etc. We follow the process that the patient design of medical networks and overlapping and development computer.</span>
APA, Harvard, Vancouver, ISO, and other styles
4

Bettini, Lorenzo, Betti Venneri, and Viviana Bono. "MOMI: a calculus for mobile mixins." Acta Informatica 42, no. 2-3 (2005): 143–90. http://dx.doi.org/10.1007/s00236-005-0176-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kutsenko, Oleksandr, Svitlana Ilnytska, and Valeriy Konin. "INVESTIGATION OF THE RESIDUAL TROPOSPHERIC ERROR INFLUENCE ON THE COORDINATE DETERMINATION ACCURACY IN A SATELLITE LANDING SYSTEM." Aviation 22, no. 4 (2018): 156–65. http://dx.doi.org/10.3846/aviation.2018.7082.

Full text
Abstract:
This paper presents the results of the investigation of the residual tropospheric error influence on coordinate determination in a GNSS landing system. The ICAO recommended methodology for residual tropospheric error calculation is taken as a basis for the present research. Special attention is paid to the troposphere refractivity index and troposphere scale height, which are derived from the well-known troposphere refraction MOPS model. A computer simulation is performed for them for the whole year and the northern hemisphere latitudes. Hardware in the loop simulation has been performed to complement the computer simulation study and investigate the situation with the residual tropospheric error calculation for the experimental GNSS satellites configuration. The experimental measurement session with a duration of about 9 hours is recorded to obtain the configuration of real navigation satellites The residual tropospheric error in meters is calculated for each navigation satellite visible during the experiment. The authors investigate the residual tropospheric error influence on the accuracy of the coordinates determined in the GNSS landing system.
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Jhin-Fang, Jiun-Yu Wen, and Sheng-Chih Lin. "Multiband notebook computer antenna design by FDTD method for GSM/WCDMA system applications." Microwave and Optical Technology Letters 51, no. 9 (2009): 2212–16. http://dx.doi.org/10.1002/mop.24521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Imran, T., M. Hussain, and G. Figueira. "Computer controlled multi-shot frequency-resolved optical gating diagnostic system for femtosecond optical pulse measurement." Microwave and Optical Technology Letters 59, no. 12 (2017): 3155–60. http://dx.doi.org/10.1002/mop.30894.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tschichold-Gürman, N., S. J. Vestli, and G. Schweitzer. "The service robot MOPS: First operating experiences." Robotics and Autonomous Systems 34, no. 2-3 (2001): 165–73. http://dx.doi.org/10.1016/s0921-8890(00)00120-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Su, Saou-Wen. "Two-Patch-PIFA System with Comparable Polarization Radiation for Tablet-Computer Applications with Complete, Metal Back Cover." Microwave and Optical Technology Letters 55, no. 12 (2013): 2815–21. http://dx.doi.org/10.1002/mop.27996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shang, Junliang, Yiting Li, Yan Sun, Feng Li, Yuanyuan Zhang, and Jin-Xing Liu. "MOPIO: A Multi-Objective Pigeon-Inspired Optimization Algorithm for Community Detection." Symmetry 13, no. 1 (2020): 49. http://dx.doi.org/10.3390/sym13010049.

Full text
Abstract:
Community detection is a hot research direction of network science, which is of great importance to complex system analysis. Therefore, many community detection methods have been developed. Among them, evolutionary computation based ones with a single-objective function are promising in either benchmark or real data sets. However, they also encounter resolution limit problem in several scenarios. In this paper, a Multi-Objective Pigeon-Inspired Optimization (MOPIO) method is proposed for community detection with Negative Ratio Association (NRA) and Ratio Cut (RC) as its objective functions. In MOPIO, the genetic operator is used to redefine the representation and updating of pigeons. In each iteration, NRA and RC are calculated for each pigeon, and Pareto sorting scheme is utilized to judge non-dominated solutions for later crossover. A crossover strategy based on global and personal bests is designed, in which a compensation coefficient is developed to stably complete the work transition between the map and compass operator, and the landmark operator. When termination criteria were met, a leader selection strategy is employed to determine the final result from the optimal solution set. Comparison experiments of MOPIO, with MOPSO, MOGA-Net, Meme-Net and FN, are performed on real-world networks, and results indicate that MOPIO has better performance in terms of Normalized Mutual information and Adjusted Rand Index.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "MOPI (Computer system)"

1

IEEE Computer Society. Technical Committee on Microprocessors and Microcomputers., Institute of Electrical and Electronics Engineers., and IEEE Standards Board, eds. IEEE standard for Microprocessor Operating System Interfaces (MOSI). Institute of Electrical and Electronics Engineers, inc., 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "MOPI (Computer system)"

1

Kapitza, Hartmut. "MOPS – A Morphodynamical Prediction System on Cluster Computers." In High Performance Computing for Computational Science - VECPAR 2008. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-92859-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Musembe, Carolyne Nyaboke, and Stephen M. Mutula. "Cyberspace Security Threats and Attacks on E-Records Management at Moi University, Eldoret, Kenya." In Advances in Library and Information Science. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6618-3.ch020.

Full text
Abstract:
The digital revolution and internet connectivity are the power behind digital-based models in organizations. The broader reach and impact of cyberspace which is accelerating across Moi University seems to be generating complex challenge to address issues of e-records at Moi University. This chapter emanated from a thesis on e-records security management, and therefore investigates cyberspace security threats and attacks on e-records management at Moi University with a view to offering practical and policy interventions to address this challenge. Data was collected from Moi University staff using interviews and questionnaires and was analysed thematically and using Statistical Package for Social Sciences (SPSS) version 24. Findings revealed cyberspace as an e-records security challenge. Cybercriminals (hackers and crackers), when new technologies emerge, concurrently invent and discover new ways to tap in the new technologies with the intention to steal and corrupt e-records for their benefit, thus hurting the veracity of e-records and university's reputation. Cyber-attacks including an attempted attack on the network, viruses, and worms were widely mentioned in the findings as a threat to both the e-records, and the computer system that host them and storage devices. The chapter recommends that the university should set dynamic security strategy and vision, developing and implementing policies and adopting standards, threat analysis and assessment, integrated and intelligent cybersecurity management service, and investing in e-records security awareness campaigns and training for employees, among others.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "MOPI (Computer system)"

1

Chen, Yuekun, and Yousef Sardahi. "Multi-Objective Optimal Design of an Active Aeroelastic Cascade Control System for an Aircraft Wing With a Leading and Trailing Control Surface." In ASME 2020 Dynamic Systems and Control Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/dscc2020-3121.

Full text
Abstract:
Abstract This paper presents a multi-objective optimal design of cascade controllers applied to an aircraft wing with a leading and trailing control surface driven by electromagnetic actuators (EMAs). The design of the control system is decoupled into an inner (slave or secondary) and outer (master or primary) control algorithm. The master control algorithm is applied to the dynamics of the wing and its ailerons while two salve control loops are designed for the two EMAs. Then, a multi-objective and optimal design of the control algorithms is carried out. Three objectives are considered : 1) the speed of response of the slave controlled system must be faster than that of the master one, 2) the controlled system must be robust against external upsets, and 3) optimal energy consumption. The multi-objective optimization problem (MOP) is solved by the non-dominated sorting genetic algorithm (NSGA-II), which is one of the widely algorithms in solving MOPs. The setup parameters of the primary and secondary control algorithms are tuned during the optimization and the design objectives are evaluated. The solution of the MOP is a set of optimal cascade controllers that represent the trade-offs among the design objectives. Computer simulations show that the design objectives are achieved. However, some of the optimal solutions are practically in-feasible because they respond poorly to external disturbances. Presented study may become the basis for multi-objective optimal design of active aeroelastic control systems.
APA, Harvard, Vancouver, ISO, and other styles
2

Lobato, Fran Se´rgio, Edu Barbosa Arruda, Aldemir Ap Cavalini, and Valder Steffen. "Engineering System Design Using Firefly Algorithm and Multi-Objective Optimization." In ASME 2011 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2011. http://dx.doi.org/10.1115/detc2011-47197.

Full text
Abstract:
Modern engineering problems, such as aircraft or automobile design, are often composed by a large number of variables that must be chosen simultaneously for better design performance. Normally, most of these parameters are conflicting, i.e., an improvement in one of them does not lead, necessarily, to better results for the other ones. Thus, many methods to solve multi-objective optimization problems (MOP) have been proposed. The MOP solution, unlike the single objective problems, is a set of non-dominated solutions that form the Pareto Curve, also known as Pareto Optimal. Among the MOP algorithms, we can cite the Firefly Algorithm (FA). FA is a bio-inspired method that mimics the patterns of short and rhythmic flashes emitted by fireflies in order to attract other individuals to their vicinities. For illustration purposes, in the present contribution the FA, associated with the Pareto dominance criterion, is applied to three different design cases. The first one is related to the geometric design of a clamped-free beam. The second one deals with the project of a welded beam and the last one focuses on estimating the characteristic parameters of a rotary dryer pilot plant. The proposed methodology is compared with other evolutionary strategies. The results indicate that the proposed approach characterizes an interesting alternative for multi-objective optimization problems.
APA, Harvard, Vancouver, ISO, and other styles
3

Ismaeel, Ayad Ghany, and Mohammed Qasim Kamal. "Worldwide auto-mobi: Arduino IoT home automation system for IR devices." In 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT). IEEE, 2017. http://dx.doi.org/10.1109/crcsit.2017.7965533.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Xiao, Chunhua, Fangzhu Lin, Xiaoxiang Fu, Ting Wu, Yuanjun Zhu, and Weichen Liu. "Mobi-PMFS: An Efficient and Durable In-Memory File System for Mobile Devices." In 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2020. http://dx.doi.org/10.1109/compsac48688.2020.00286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Meigen, Christof, Mandy Vogel, and Jan Bumberger. "MOPS -- A feasibility Study for working with GPS and sensor data in a medical context." In 2019 Federated Conference on Computer Science and Information Systems. IEEE, 2019. http://dx.doi.org/10.15439/2019f328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nigmatullin, Raoul R. "The “Fractional” Kinetic Equations and General Theory of Dielectric Relaxation." In ASME 2005 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/detc2005-84647.

Full text
Abstract:
Based on the Mori-Zwanzig formalism it becomes possible to suggest a general decoupling procedure, which reduces a wide set of various micromotions distributed over a self-similar structure to a few collective/reduced motions describing the relaxation/exchange behavior of a complex system in the mesoscale region. The frequency dependence of the reduced collective motion contains real and pair of complex-conjugate power-law exponents in the frequency domain and explains naturally the “universal response” (UR) phenomenon discovered by A. Jonscher in a wide class of heterogeneous materials. This strict mathematical result allows in developing a consistent and general theory of dielectric relaxation that can describe wide set of dielectric spectroscopy (DS) data measured in some frequency/temperature range in many heterogeneous materials. Based on this result it becomes possible also to suggest a new set of two-pole elements, which generalizes the conventional RLC-elements and can constitute the basis of new theory of the linear electric circuits.
APA, Harvard, Vancouver, ISO, and other styles
7

Pimsarn, Monsak, and Kazem Kazerounian. "Tooth Profile Modifications for Optimum Dynamic Load in Spur Gears Based on Pseudo-Interference Stiffness Estimation Method." In ASME 2005 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/detc2005-84562.

Full text
Abstract:
A systematic methodology combining optimization, three dimensional analytical rigid body dynamics and a novel method, namely, Pseudo-Interference Stiffness Estimation method (PISE) [1]- [2], is proposed to dramatically reduce gear design time and improve the spur gear system dynamic performance. The main aim of this methodology is to search for the pro les of tooth crowning and shaving that eventually lead to the optimum dynamic tooth load in the gear mesh. An example of the detailed design study is numerically investigated. The results show that the dynamic tooth load can be reduced to up to 50 percent of its original value. However, this reduction is only valid at the operating ranges of the design load and design speed. It is also found that the effect of pro le modi cation on the dynamic response of the gear system was mostly observed to be a reduction in the peak dynamic tooth load at the resonance speed. Later, the investigation of gear tooth durability was conducted to validate an improvement of gear life. The rating factors given in AGMA publication, Hertzian contact stress, bending fatigue stress, ash temperature and PV index are employed in gear durability determination. The results show that, with the reduction of 50 percent in dynamic tooth load, the reductions in PV index, bending fatigue, Hertzian contact stress, and ash temperature can be achieved up to 64, 58, 28 and 39 percent, respectively.
APA, Harvard, Vancouver, ISO, and other styles
8

Nemeth, David, and Troy I. Walda. "The Pipe Inspection Lifecycle." In 2014 10th International Pipeline Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/ipc2014-33594.

Full text
Abstract:
Energy Transfer has implemented a new, comprehensive field-inspection system for the pipe inspection lifecycle that encompasses aerial observations, pipe exposures, foreign line crossings, in-line inspections, anomaly remediation, pipe inspection, and integrity sheet generation. In order to ensure the integrity of the pipe inspection program, the field inspection solution required full audit-trail capabilities, front-side data validation, and full integration with the corporate-wide GIS and Engineering Data Management System. Additionally, to ensure the success of the new inspection program, the inspection solution required a highly intuitive and field user-friendly interface, the ability to work equally well in both connected and disconnected environments, interactive mapping functionality, very high reliability, and a process-driven architecture. Energy Transfer owns and operates approximately 43,000 miles of natural gas, natural gas liquids, refined products, and crude oil pipelines. Due to the size and diversity of Energy Transfer’s assets, the corporate GIS system must be distributed across seven independent instances consisting of server pools and large-scale relational database management systems (RDBMS). Although each system must be functionally independent, the field inspection system and the inspection process must interact with each server and RDBMS instance with equal functionality and be able to report on all pipe inspection activities across the enterprise. The inspection system is used by over 1,200 Energy Transfer employees and contractors, and approximately 15,000 inspections are performed annually. The system supports a variety of devices, such as: laptops, tablet computers, iOS devices (i.e., iPads, iPhones), and Android devices. Whether on foot, in vehicles or aircraft, users can enter information from the platform that best meets the needs of their individual environment. Information collected on any device is available for continuance of the pipe inspection lifecycle on any other device and is available in real time at the corporate offices via a Web portal. The Web portal provides visualization tools for both business and engineering analysis such as progress tracking and remediation planning. These functions are supported through the portal’s integrated mapping, dash boarding, and a reporting functionality that includes advanced search capabilities for both comparative and predictive analysis. In addition to utilization for the pipe inspection lifecycle, the inspection system is being used for a variety of other inspection and regulatory compliance-related activities, including: cathodic protection, incident reporting, corrosion assessment, DOT structure location, MAOP-MOP establishment, shallow cover, unmetered gas loss, and many more right-of-way related activities.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!