Showing 1 - 20 results of 62 for search '"personal computer"', query time: 0.06s Refine Results
  1. 1
  2. 2

    Safety of electromagnetic factors for the workplace equipped with personal computers in residential premises by Yu. G. Ryabov, N. M. Legkiy, G. V. Lomaev

    Published 2022-04-01
    “…The aim of this paper is to analyze the electromagnetic safety of 50Hz industrial frequency electrical networks in residential buildings when using workplaces equipped with personal computers (PCs), as well as to develop recommendations on reducing the impact of levels of industrial frequency electromagnetic fields on human health in residential premises.Methods. …”
    Get full text
    Article
  3. 3

    «Moral depreciation» of personal computer software as one of factors in reducing labor productivity at enterprise by E. V. Medvedev

    Published 2021-02-01
    “…In this article, the author examines the issue of «moral depreciation» of personal computer software and shows how it can affect the productivity of an organization. …”
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Investigation of Success Levels of Visual Arts Students in Computer-Aided Design Course by Mehmet Remzi Demirel

    Published 2024-06-01
    “…The aim of this research is to examine the design course end-of-semester success levels of undergraduate students studying in the visual arts department of art and design faculty and taking the computer-aided design course in terms of gender, age, having a personal computer, educational status and being employed. …”
    Get full text
    Article
  10. 10

    Agri-business for elderly people through the Internet by Kenji Hashimoto

    Published 2012-10-01
    “…Thirdly, it overcame the difficulty and burden that elderly people felt regarding the use of a personal computer and the Internet. The example of Irodori can be considered as a model case when considering the exploitation of regional resources and strategies for utilizing them through 'informatization'.…”
    Get full text
    Article
  11. 11

    Numérique et humanités : de l’ancillarité à la fécondité grâce à la modélisation computationnelle des connaissances by Yannis Delmas-Rigoutsos

    Published 2023-07-01
    “…From the mid-1970s to the early 2000s, the personal computer and common IT software induce a first phase of growth in the digital humanities: databases, digitisation of texts and publishing tools. …”
    Get full text
    Article
  12. 12

    Research of On-line Detection System of End-face Run-out of Synchronizer Gear Set by Shen Kai, Liu Feifei, Meng Dejiao

    Published 2018-01-01
    “…The whole system is composed of mechanical parts and control parts: the mechanical part automatically completes the detection and stacking of the measured teeth,the control part is controlled by the PLC to the manipulator,the run-out detection and the data processing can be realized by industrial personal computer,and the run-out error is corrected. The results show that the accuracy of the gear set is ± 3 μm. …”
    Get full text
    Article
  13. 13

    An Efficient Algorithm for EM Scattering from Anatomically Realistic Human Head Model Using Parallel CG-FFT Method by Lei Zhao, Gen Chen

    Published 2014-01-01
    “…Using the parallel CG-FFT method, the proposed algorithm is very efficient and can solve very electrically large-scale problems which cannot be solved using the conventional CG-FFT method in a personal computer. The accuracy of the proposed algorithm is verified by comparing numerical results with analytical Mie-series solutions for dielectric spheres. …”
    Get full text
    Article
  14. 14

    Privacy-preserving attribute ticket scheme based on mobile terminal with smart card by Rui SHI, Huamin FENG, Huiqin XIE, Guozhen SHI, Biao LIU, Yang YANG

    Published 2022-10-01
    “…To solve the problem that the existing electronic ticket systems are challenging to deploy in resource-constrained devices and cannot prevent the sharing of tickets among unauthorized devices, a privacy-preserving attribute ticket scheme based on mobile terminal with a smart card was proposed.The smart card was a secure and constrained-yet-trusted core device that holds secret information and performs lightweight operations.The mobile terminal was a powerful helper device that handles key-independent and time-consuming operations.Firstly, the efficient attribute-based ticket scheme deployed on the mobile terminal with a smart card was constructed by combining a pseudorandom function, anonymous ephemeral identities scheme, aggregatable signatures with randomizable tags, and Pointcheval-Sanders signatures.Secondly, the security model of the electronic tickets system was presented, and the proposed scheme was proved to be unlinkable and unforgeable.Finally, the proposed scheme was implemented on a personal computer, a smart card (Aisinochip ACH512), and a smart phone (Huawei Honor 9i), and the comparison and experimental results show that it is efficient.…”
    Get full text
    Article
  15. 15

    H.264 SVC Complexity Reduction Based on Likelihood Mode Decision by L. Balaji, K. K. Thyagharajan

    Published 2015-01-01
    “…SVC executes in different electronics gadgets such as personal computer, HDTV, SDTV, IPTV, and full-HDTV in which user demands various scaling of the same content. …”
    Get full text
    Article
  16. 16

    Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system by Yumei Li, Futai Zhang, Yinxia Sun

    Published 2021-01-01
    “…In addition, it is proved that the scheme is secure, and it was implemented by using the Java Pairing‐Based Cryptography Library (JPBC) on a personal computer (PC). The simulation results illustrate that our scheme is efficient.…”
    Get full text
    Article
  17. 17

    A Novel System for Measuring Optical Properties in Arterial Blood of Man by A. Castañeda-Miranda, L. D. L. Vizcaya

    Published 2006-01-01
    “…The acquisition time is of the order of microseconds, and the system is controlled automatically through accessible software from a personal computer.…”
    Get full text
    Article
  18. 18

    Isotropic Broadband E-Field Probe by Béla Szentpáli, István Réti, Ferenc B. Molnár, János Farkasvölgyi, Károly Kazi, Zoltán Mirk, Aurél Sonkoly, Zoltán Horváth

    Published 2008-01-01
    “…The readout of the field magnitude is carried out by personal computer, which fulfils also the required corrections of the raw data.…”
    Get full text
    Article
  19. 19

    Autonóm repülő robotok alkalmazása vízelvezető csatornák felügyeletére (Using Autonomous Flying Robots to Monitor Canals) by Anita Szabó

    Published 2017-06-01
    “…The controlling device can be a personal computer, a tablet or even a mobile phone. It is planned that the client software be extended with capability to upload video and photos to the cloud for later reference. …”
    Get full text
    Article
  20. 20

    The Critical Survey of Evolution in Common Persian Slang Lexicography “By Emphasizing on Twelve Common Persian Slang Lexicons” by Ghodsie Rezvanian, Siyavash Haghjoo, Leila Darvish Ali Pour Astaneh

    Published 2021-11-01
    “…This essay attempts to survey texts of 12 lexicons, assuming that the use of formal language Lexicography and Personal Computer (PC) Figuration can aid to protect and give scientific credit to this temporary language.…”
    Get full text
    Article