-
1
-
2
Safety of electromagnetic factors for the workplace equipped with personal computers in residential premises
Published 2022-04-01“…The aim of this paper is to analyze the electromagnetic safety of 50Hz industrial frequency electrical networks in residential buildings when using workplaces equipped with personal computers (PCs), as well as to develop recommendations on reducing the impact of levels of industrial frequency electromagnetic fields on human health in residential premises.Methods. …”
Get full text
Article -
3
«Moral depreciation» of personal computer software as one of factors in reducing labor productivity at enterprise
Published 2021-02-01“…In this article, the author examines the issue of «moral depreciation» of personal computer software and shows how it can affect the productivity of an organization. …”
Get full text
Article -
4
Exploring the feasibility of a data center-free cloud computing framework utilizing underutilized personal computers
Published 2023-09-01Subjects: Get full text
Article -
5
A Critical Review of the Handbook of Technology and Second Language Teaching and Learning
Published 2020-10-01Subjects: Get full text
Article -
6
STATISTICAL ANALYSIS OF INFORMATION SOCIETY DEVELOPMENT IN RUSSIAN FEDERATION
Published 2018-09-01Subjects: Get full text
Article -
7
-
8
Digital Twin-Based Real-Time Monitoring System for Safety of Multiple Laptops in Working Environment
Published 2024-01-01Subjects: Get full text
Article -
9
Investigation of Success Levels of Visual Arts Students in Computer-Aided Design Course
Published 2024-06-01“…The aim of this research is to examine the design course end-of-semester success levels of undergraduate students studying in the visual arts department of art and design faculty and taking the computer-aided design course in terms of gender, age, having a personal computer, educational status and being employed. …”
Get full text
Article -
10
Agri-business for elderly people through the Internet
Published 2012-10-01“…Thirdly, it overcame the difficulty and burden that elderly people felt regarding the use of a personal computer and the Internet. The example of Irodori can be considered as a model case when considering the exploitation of regional resources and strategies for utilizing them through 'informatization'.…”
Get full text
Article -
11
Numérique et humanités : de l’ancillarité à la fécondité grâce à la modélisation computationnelle des connaissances
Published 2023-07-01“…From the mid-1970s to the early 2000s, the personal computer and common IT software induce a first phase of growth in the digital humanities: databases, digitisation of texts and publishing tools. …”
Get full text
Article -
12
Research of On-line Detection System of End-face Run-out of Synchronizer Gear Set
Published 2018-01-01“…The whole system is composed of mechanical parts and control parts: the mechanical part automatically completes the detection and stacking of the measured teeth,the control part is controlled by the PLC to the manipulator,the run-out detection and the data processing can be realized by industrial personal computer,and the run-out error is corrected. The results show that the accuracy of the gear set is ± 3 μm. …”
Get full text
Article -
13
An Efficient Algorithm for EM Scattering from Anatomically Realistic Human Head Model Using Parallel CG-FFT Method
Published 2014-01-01“…Using the parallel CG-FFT method, the proposed algorithm is very efficient and can solve very electrically large-scale problems which cannot be solved using the conventional CG-FFT method in a personal computer. The accuracy of the proposed algorithm is verified by comparing numerical results with analytical Mie-series solutions for dielectric spheres. …”
Get full text
Article -
14
Privacy-preserving attribute ticket scheme based on mobile terminal with smart card
Published 2022-10-01“…To solve the problem that the existing electronic ticket systems are challenging to deploy in resource-constrained devices and cannot prevent the sharing of tickets among unauthorized devices, a privacy-preserving attribute ticket scheme based on mobile terminal with a smart card was proposed.The smart card was a secure and constrained-yet-trusted core device that holds secret information and performs lightweight operations.The mobile terminal was a powerful helper device that handles key-independent and time-consuming operations.Firstly, the efficient attribute-based ticket scheme deployed on the mobile terminal with a smart card was constructed by combining a pseudorandom function, anonymous ephemeral identities scheme, aggregatable signatures with randomizable tags, and Pointcheval-Sanders signatures.Secondly, the security model of the electronic tickets system was presented, and the proposed scheme was proved to be unlinkable and unforgeable.Finally, the proposed scheme was implemented on a personal computer, a smart card (Aisinochip ACH512), and a smart phone (Huawei Honor 9i), and the comparison and experimental results show that it is efficient.…”
Get full text
Article -
15
H.264 SVC Complexity Reduction Based on Likelihood Mode Decision
Published 2015-01-01“…SVC executes in different electronics gadgets such as personal computer, HDTV, SDTV, IPTV, and full-HDTV in which user demands various scaling of the same content. …”
Get full text
Article -
16
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system
Published 2021-01-01“…In addition, it is proved that the scheme is secure, and it was implemented by using the Java Pairing‐Based Cryptography Library (JPBC) on a personal computer (PC). The simulation results illustrate that our scheme is efficient.…”
Get full text
Article -
17
A Novel System for Measuring Optical Properties in Arterial Blood of Man
Published 2006-01-01“…The acquisition time is of the order of microseconds, and the system is controlled automatically through accessible software from a personal computer.…”
Get full text
Article -
18
Isotropic Broadband E-Field Probe
Published 2008-01-01“…The readout of the field magnitude is carried out by personal computer, which fulfils also the required corrections of the raw data.…”
Get full text
Article -
19
Autonóm repülő robotok alkalmazása vízelvezető csatornák felügyeletére (Using Autonomous Flying Robots to Monitor Canals)
Published 2017-06-01“…The controlling device can be a personal computer, a tablet or even a mobile phone. It is planned that the client software be extended with capability to upload video and photos to the cloud for later reference. …”
Get full text
Article -
20
The Critical Survey of Evolution in Common Persian Slang Lexicography “By Emphasizing on Twelve Common Persian Slang Lexicons”
Published 2021-11-01“…This essay attempts to survey texts of 12 lexicons, assuming that the use of formal language Lexicography and Personal Computer (PC) Figuration can aid to protect and give scientific credit to this temporary language.…”
Get full text
Article