Journal articles on the topic 'Computer safety'

To see the other types of publications on this topic, follow the link: Computer safety.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer safety.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

MUKAIDONO, Masao. "Computer Safety and Functional Safety." IEICE ESS FUNDAMENTALS REVIEW 4, no. 2 (2010): 129–35. http://dx.doi.org/10.1587/essfr.4.129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gorodetskii, V. I., I. V. Kotenko, and R. M. Yusupov. "Computer networks safety." Herald of the Russian Academy of Sciences 76, no. 4 (July 2006): 396–98. http://dx.doi.org/10.1134/s1019331606040137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nestler, Simon. "Safety-critical human computer interaction." it - Information Technology 61, no. 1 (February 25, 2019): 67–70. http://dx.doi.org/10.1515/itit-2018-0037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract Dealing with usability issues of safety-critical interactive systems is essential for an efficient, effective and joyful use of these systems. This paper describes a prototypical safety-critical environment and discusses the HCI (human computer interaction) challenges of different interactive systems for safety-critical environments. We designed, developed and evaluated various interactive systems which solve different challenges in so-called mass casualty incidents (MCIs). In summary, we made contributions to three different areas of application: Mobile computing in safety-critical environments, simulation of safety-critical environments and social media in safety-critical environments. Finally, this paper gives further insights how all these research results can to be brought together in the future in order to be able to build usable interactive systems for safety-critical environments.
4

Walczak, Andrzej, and Karol Antczak. "Patient Safety versus Computer Diagnosis." MATEC Web of Conferences 76 (2016): 04006. http://dx.doi.org/10.1051/matecconf/20167604006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zalewski, Janusz. "Safety of Computer Control System." IFAC Proceedings Volumes 34, no. 22 (November 2001): 53. http://dx.doi.org/10.1016/s1474-6670(17)32911-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zalewski, Janusz. "Safety aspects of computer control." Control Engineering Practice 3, no. 3 (March 1995): 439–40. http://dx.doi.org/10.1016/0967-0661(95)90073-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cao, Yuan, Hongkang Lu, and Tao Wen. "A Safety Computer System Based on Multi-Sensor Data Processing." Sensors 19, no. 4 (February 17, 2019): 818. http://dx.doi.org/10.3390/s19040818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The safety computer in the train control system is designed to be the double two-vote-two architecture. If safety-critical multi-input data are inconsistent, this may cause non-strict multi-sensor data problems in the output. These kinds of problems may directly affect the decision making of the safety computer and even pose a serious threat to the safe operation of the train. In this paper, non-strict multi-sensor data problems that exist in traditional safety computers are analyzed. The input data are classified based on data features and safety computer features. Then, the input data that cause non-strict multi-sensor data problems are modeled. Fuzzy theory is used in the safety computer to process multi-sensor data and to avoid the non-strict multi-sensor problems. The fuzzy processing model is added into the onboard double two-vote-two architecture safety computer platform. The fuzzy processing model can be divided into two parts: improved fuzzy decision tree and improved fuzzy weighted fusion. Finally, the model is verified based on two kinds of data. Verification results indicate that the fuzzy processing model can effectively reduce the non-strict identical problems and improve the system efficiency on the premise of ensuring the data reliability.
8

Chen, Li-Shan, Yen-Ming Tseng, and Xiao-Na Lin. "Artificial intelligence in safety system." MATEC Web of Conferences 185 (2018): 00009. http://dx.doi.org/10.1051/matecconf/201818500009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This research aims to study learning environment, and let the learning environment become smart. Swarm intelligence, cloud computing, and active Ultra-High Frequency RFID were used on it. We built friendly human-computer-interface software for users to use as pad phone. The Extensible Markup Language (XML) and C sharp language were used in this research. If the users begin to search, the kernel safety learning system automatically communicates with other RFID readers by agents, and the agents can search the closer camera for users. This study’s result has successfully implemented to Chin-Huo educational organization, and it would be helpful for the paterfamilias to hold all situations about their children at Chin-Huo educational organization. Paterfamilias can understand their children’s learning, going to Chin-Huo and leaving Chin-Huo through personal computers, or notebooks simultaneously or asynchronously by the computer-mediated communication. That will be great help in the grip of whole after-school remedial education, teaching and learning situation.
9

Singh, Lalit Kumar, and Hitesh Rajput. "Ensuring safety in design of safety critical computer based systems." Annals of Nuclear Energy 92 (June 2016): 289–94. http://dx.doi.org/10.1016/j.anucene.2016.02.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Yuzhuo, Chunhua Hong, Yuan Cao, Lianchuan Ma, and Yinghong Wen. "Safety Mechanism Design and Verification of Safety Computer Parallel Program." Chinese Journal of Electronics 27, no. 6 (November 1, 2018): 1163–69. http://dx.doi.org/10.1049/cje.2018.02.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

S, Sathesh. "Computer Vision based Real Time Tracking System to Identify Overtaking Vehicles for Safety Precaution Using Single Board Computer." Journal of Advanced Research in Dynamical and Control Systems 12, SP7 (July 25, 2020): 1551–61. http://dx.doi.org/10.5373/jardcs/v12sp7/20202258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Leveson, Nancy G. "Software safety in embedded computer systems." Communications of the ACM 34, no. 2 (February 1991): 34–46. http://dx.doi.org/10.1145/102792.102799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Weaver, E. Strode. "Do Computer Systems Increase Medication Safety?" Oncology Issues 20, no. 6 (November 2005): 7. http://dx.doi.org/10.1080/10463356.2005.11883266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Cram, Nick. "Computer Safety Testing: Myth & Fact." Journal of Clinical Engineering 25, no. 3 (May 2000): 139–40. http://dx.doi.org/10.1097/00004669-200025030-00006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Udartseva, O., and O. Nikolsky. "Computer Science in Environmental Safety Research." IOP Conference Series: Earth and Environmental Science 459 (April 15, 2020): 042043. http://dx.doi.org/10.1088/1755-1315/459/4/042043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Yang, S. H., and P. W. H. Chung. "Safety considerations of computer-controlled plants." IFAC Proceedings Volumes 32, no. 2 (July 1999): 8769–74. http://dx.doi.org/10.1016/s1474-6670(17)57496-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Hauptmanns, U. "Computer-Aided Valuation of Safety Management." Process Safety and Environmental Protection 76, no. 4 (November 1998): 286–90. http://dx.doi.org/10.1205/095758298529641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Nicholson, Mark. "Computer Safety For Modern Bridge Systems." Journal of Navigation 66, no. 5 (May 29, 2013): 789–97. http://dx.doi.org/10.1017/s0373463313000180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Computer Based Systems (CBS) and Integrated Bridge Systems (IBS) are being introduced. They provide enhanced navigation capabilities and promote ship safety. However, they are highly complex and are becoming the primary source of data/information used to navigate ships. CBS issues have arisen that challenge current safety assurance and certification practices. This paper explores the potential contribution of System Safety Engineering including technical, operational management and crew capability contributions to CBS/IBS safety. A six step roadmap for the production of best practice guidance for the safe development and operation of such systems is presented.
19

Bloomfield, R. E. "Standards for safety related computer systems." Reliability Engineering & System Safety 43, no. 2 (January 1994): 135–42. http://dx.doi.org/10.1016/0951-8320(94)90059-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Badea, Daniel Onuț, Doru Costin Darabont, Dominic Bucerzan, Alina Trifu, Eduard Smîdu, Eugenia Bulboacă, and Vergilică Haralambie. "Occupational safety issues related to computer equipment installation, maintenance and use." MATEC Web of Conferences 354 (2022): 00001. http://dx.doi.org/10.1051/matecconf/202235400001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This paper presents the findings of an ongoing INCDPM project developed in collaborations with BB Computers that addresses the occupational safety issues related to computer equipment installation, maintenance and use, with emphasis on risk identification. The method used was The Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA). Using the chart flow and the list of items of this method, a literature search was conducted in Science Direct Freedom Collection, Elsevier database, Web of Science - Core Collection, Springer Link Journals. Keywords such as occupational risks, computer equipment installation, computer maintenance were used to retrieve relevant studies which explicitly reported on occupational risks related to computer equipment installation, maintenance and use. The literature search yielded 900 references, of which 20 articles were selected for full-text screening as specified by the inclusion criteria, and ultimately 10 were included in this review. It was developed an extensive and comprehensive list of occupational risks related to computer equipment installation, maintenance and use. After a classification of the equipment in calculation and processing equipment, electronic displays, printer, special printers network equipment the main risks identified in all categories mentioned above are as follows: electric shock, stress, high workload, slips and trips.
21

Wang, Pin. "Safety Testing Method Analysis of Computer Software." Applied Mechanics and Materials 299 (February 2013): 135–38. http://dx.doi.org/10.4028/www.scientific.net/amm.299.135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Along with the computer network application becomes more popular, along with our country Internet market becoming stronger, more and more individuals or enterprises to commercial activities into the electronic commerce platform, so the computer software security has become increasingly important. Therefore, to strengthen the security of computer software protection research is very necessary, and guarantee the software safety is one of the effective means of software security hidden trouble detection. This paper will discuss the computer software system in safety detection method. Computer software security testing technology is existing computer software safety based, effective recognition computer software security problems in.
22

M. "A Methodological Framework for Software Safety in Safety Critical Computer Systems." Journal of Computer Science 8, no. 9 (September 1, 2012): 1564–75. http://dx.doi.org/10.3844/jcssp.2012.1564.1575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Goring, C. J. "Safety first—applying computer-based safety systems in the offshore environment." Computing & Control Engineering Journal 4, no. 6 (1993): 245. http://dx.doi.org/10.1049/cce:19930057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

kotti, Jayasri, and Seetharamaiah Panchumarthy. "The Quantitative Safety Assessment and Evaluation for Safety-Critical Computer Systems." ACM SIGSOFT Software Engineering Notes 41, no. 1 (February 22, 2016): 1–8. http://dx.doi.org/10.1145/2853073.2853091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Kuldashov, O. H., A. O. Komilov, and D. A. Abdusamatov. "COMPUTER MODEL OF IONIZER." International Journal of Advance Scientific Research 02, no. 12 (December 1, 2022): 133–39. http://dx.doi.org/10.37547/ijasr-02-12-19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Depending on the field of application and nature of high voltage generation technologies used in various economic sectors, several requirements are imposed, in particular, requirements such as service life, environmental safety, work efficiency and energy efficiency. In this work, a computer model for generating high voltages that are safe for humans using transistors designed to amplify semiconductor electrical signals is described.
26

Yamano, Hidemasa, Yoshiharu Tobita, Satoshi Fujita, Tohru Suzuki, Kenji Kamiyama, Koji Morita, Werner Maschek, and Sylvain Pigny. "ICONE15-10462 SIMMER-III : A COUPLED NEUTRONICS-THERMOHYDRAULICS COMPUTER CODE FOR SAFETY ANALYSIS." Proceedings of the International Conference on Nuclear Engineering (ICONE) 2007.15 (2007): _ICONE1510. http://dx.doi.org/10.1299/jsmeicone.2007.15._icone1510_246.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Yuan, Tangming, and Tim Kelly. "Argument Schemes in Computer System Safety Engineering." Informal Logic 31, no. 2 (July 14, 2011): 89. http://dx.doi.org/10.22329/il.v31i2.2965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Safe Safety arguments are key components in a safety case. Too often, safety arguments are constructed without proper reasoning. To address this, we argue that informal logic argument schemes have important roles to play in safety argument construction and reviewing process. Ten commonly used reasoning schemes in computer system safety domain are proposed. The role of informal logic dialogue games in computer system safety arguments reviewing is also discussed and the intended work in this area is proposed. It is anticipated that this work will contribute toward the development of computer system safety arguments, and help to move forward the interplay between research in informal logic and research in computer system safety engineering.
28

Yoshida, Ruriko, Lillian Paul, and Peter Nesbitt. "Stochastic Safety Radius on UPGMA." Algorithms 15, no. 12 (December 18, 2022): 483. http://dx.doi.org/10.3390/a15120483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Unweighted Pair Group Method with Arithmetic Mean (UPGMA) is one of the most popular distance-based methods to reconstruct an equidistant phylogenetic tree from a distance matrix computed from an alignment of sequences. Since we use equidistant trees as gene trees for phylogenomic analyses under the multi-species coalescent model and since an input distance matrix computed from an alignment of each gene in a genome is estimated via the maximum likelihood estimators, it is important to conduct a robust analysis on UPGMA. Stochastic safety radius, introduced by Steel and Gascuel, provides a lower bound for the probability that a phylogenetic tree reconstruction method returns the true tree topology from a given distance matrix. In this article, we compute the stochastic safety radius of UPGMA for a phylogenetic tree with n leaves. Computational experiments show an improved gap between empirical probabilities estimated from random samples and the true tree topology from UPGMA, increasing confidence in phylogenic results.
29

Maslov, O. N., and D. Ju Panferov. "Electromagnetic radiation safety of portable computer devices." Infokommunikacionnye tehnologii 13, no. 4 (December 2015): 458–64. http://dx.doi.org/10.18469/ikt.2015.13.4.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

&NA;. "GP computer network data confirms loratadine's safety." Reactions Weekly &NA;, no. 424 (October 1992): 4. http://dx.doi.org/10.2165/00128415-199204240-00009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Danilczuk, Wojciech. "Computer aided quantitative methods in machine safety." AUTOBUSY – Technika, Eksploatacja, Systemy Transportowe 19, no. 1-2 (February 28, 2018): 53–57. http://dx.doi.org/10.24136/atest.2018.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The paper present aspect of machine safety in addition to current legal regulations and international standards and computer aided method of risk analysis. Based on literate and international standards paper author presents most common factors and method of safety estimation. Next, based on author industry experience, computer aided risk analysis has been present. To proceed conformity assessment author used SISTEMA software developed by German institute IFA [10]. The example shown shows simplify calculation method of risk analysis and decrees level of mistake during to designee of machine safety component. Another advantages of computer aided method is simplify to scale it to the more complex system.
32

Sayed, Tarek, Karim Ismail, Mohamed H. Zaki, and Jarvis Autey. "Feasibility of Computer Vision-Based Safety Evaluations." Transportation Research Record: Journal of the Transportation Research Board 2280, no. 1 (January 2012): 18–27. http://dx.doi.org/10.3141/2280-03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Stanislaw, Harold. "Computer-Intensive Methods in Traffic Safety Research." International Journal of Occupational Safety and Ergonomics 8, no. 3 (January 2002): 353–63. http://dx.doi.org/10.1080/10803548.2002.11076535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Sowjanya, P. "Computer aided software integrated automated safety system." International Journal of Computer Aided Engineering and Technology 11, no. 4/5 (2019): 561. http://dx.doi.org/10.1504/ijcaet.2019.10020299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Sowjanya, P. "Computer aided software integrated automated safety system." International Journal of Computer Aided Engineering and Technology 11, no. 4/5 (2019): 561. http://dx.doi.org/10.1504/ijcaet.2019.100456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Yang, S. H., O. Stursberg, P. W. H. Chung, and S. Kowalewski. "Automatic safety analysis of computer-controlled plants." Computers & Chemical Engineering 25, no. 4-6 (May 2001): 913–22. http://dx.doi.org/10.1016/s0098-1354(01)00656-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Smith, I. C. "The Maintenance of Computer Based Safety Systems." IFAC Proceedings Volumes 21, no. 18 (November 1988): 27–33. http://dx.doi.org/10.1016/s1474-6670(17)54527-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Abrahamsen, Cathie. "Optimal patient safety a computer chip away?" Nursing Management (Springhouse) 35, no. 3 (March 2004): 47–48. http://dx.doi.org/10.1097/00006247-200403000-00015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Dunn, W. R. "Cover feature - Designing safety-critical computer systems." Computer 36, no. 11 (November 2003): 40–46. http://dx.doi.org/10.1109/mc.2003.1244533.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Graber, Mark. "The Safety of Computer-Based Medication Systems." Archives of Internal Medicine 164, no. 3 (February 9, 2004): 339. http://dx.doi.org/10.1001/archinte.164.3.339-b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Leathley, Bridget A. "Human–computer interaction in safety critical systems." Quality and Reliability Engineering International 11, no. 6 (1995): 429–33. http://dx.doi.org/10.1002/qre.4680110606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Fang, Weili, Lieyun Ding, Peter E. D. Love, Hanbin Luo, Heng Li, Feniosky Peña-Mora, Botao Zhong, and Cheng Zhou. "Computer vision applications in construction safety assurance." Automation in Construction 110 (February 2020): 103013. http://dx.doi.org/10.1016/j.autcon.2019.103013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Ould, M. "Achieving safety and reliability with computer systems." Information and Software Technology 32, no. 6 (July 1990): 444. http://dx.doi.org/10.1016/0950-5849(90)90134-d.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Hwang, E., A. J. Park, G. Han, and E. Song. "Human-Computer interaction in analyzing neighborhood safety." Gerontechnology 21, s (October 23, 2022): 1. http://dx.doi.org/10.4017/gt.2022.21.s.689.opp1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Kotti, Jayasri, and Venkataramana Attada. "The Research Framework for Quantitative Safety Assessment for Safety-Critical Computer Systems." Indian Journal of Science and Technology 10, no. 9 (February 1, 2017): 1–8. http://dx.doi.org/10.17485/ijst/2017/v10i9/101298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Braun, Matt. "Safety vs. Safety." Biomedical Instrumentation & Technology 47, no. 5 (September 1, 2013): 440. http://dx.doi.org/10.2345/0899-8205-47.5.440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Naik, Nikhil, Ramesh Raskar, and César A. Hidalgo. "Cities Are Physical Too: Using Computer Vision to Measure the Quality and Impact of Urban Appearance." American Economic Review 106, no. 5 (May 1, 2016): 128–32. http://dx.doi.org/10.1257/aer.p20161030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
For social scientists, developing an empirical connection between the physical appearance of a city and the behavior and health of its inhabitants has proved challenging due to a lack of data on urban appearance. Can we use computers to quantify urban appearance from street-level imagery? We describe Streetscore: a computer vision algorithm that measures the perceived safety of streetscapes. Using Streetscore to evaluate 19 American cities, we find that the average perceived safety has a strong positive correlation with population density and household income; and the variation in perceived safety has a strong positive correlation with income inequality.
48

An, Gang, Yu Li, and Xin Li. "Architecture Design of Aviation Fault-tolerant Computer Based on ARINC659 Bus Technology." MATEC Web of Conferences 179 (2018): 03025. http://dx.doi.org/10.1051/matecconf/201817903025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The ARINC659 backplane bus is suitable for high safety and high reliability requirements of aircraft on-board computer communication systems. This paper analyzes the structure of ARINC 659 serial backplane bus and the bus fault tolerance mechanism. On the basis of backplane bus, a 4 degree of aviation fault-tolerant computer is designed. Moreover, the computer architecture and computer system of the instruction branch and monitoring branch are designed in the computer channel. The fault-tolerant management of the computer is realized by bus fault tolerance, redundancy voting between computers and the monitoring of the instruction and monitoring branches.
49

Hughes, Katie E., Scott M. Lewis, Laurence Katz, and Jonathan Jones. "Safety of Computer Interpretation of Normal Triage Electrocardiograms." Academic Emergency Medicine 24, no. 1 (January 2017): 120–24. http://dx.doi.org/10.1111/acem.13067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Yuan, Tangming, Tim Kelly, and Tianhua Xu. "Computer-assisted safety argument review – a dialectics approach." Argument & Computation 6, no. 2 (June 24, 2014): 130–48. http://dx.doi.org/10.1080/19462166.2014.927921.

Full text
APA, Harvard, Vancouver, ISO, and other styles

To the bibliography