Journal articles on the topic 'Computer terminals'

To see the other types of publications on this topic, follow the link: Computer terminals.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer terminals.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wilson, Karen S., and Thomas R. Callaghan. "Handheld Computer Terminals: Starting off Right the First Time." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 38, no. 5 (October 1994): 355–59. http://dx.doi.org/10.1177/154193129403800501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Advances in miniaturization and wireless communications are providing the computer industry with the impetus to design handheld, portable computer terminals. Until enough research and experience evolves from handheld terminals to build a literature on design factors and to develop design guidelines and standards that would provide starting points for product design, the human factors community must rely on its user-centered design approach of designing, prototyping, and testing to ensure a safe and usable form factor for such terminals. The methodology that was used in establishing the design criteria for such a terminal included literature research, focus groups with potential users, contextual field research, expert testimony, and primary laboratory research, including a grasp analysis and screen viewability, data entry, signature capture, and holsterability testing. The user-centered design process described here provided the information required to establish the basic design criteria that would assure user safety and task efficiency. It also revealed informational needs for the human factors community involved in the development of handheld computer terminals.
2

Pugliese, Gina, and Martin S. Favero. "MRSA Contamination of Computer Terminals." Infection Control & Hospital Epidemiology 22, no. 7 (July 2001): 467. http://dx.doi.org/10.1017/s0195941700056964.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Oltedal, Leif, Svein Harald Mørkve, Margaret Lin Veruki, and Espen Hartveit. "Patch-Clamp Investigations and Compartmental Modeling of Rod Bipolar Axon Terminals in an In Vitro Thin-Slice Preparation of the Mammalian Retina." Journal of Neurophysiology 97, no. 2 (February 2007): 1171–87. http://dx.doi.org/10.1152/jn.01010.2006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
To extend the usefulness of rod bipolar cells for studies of chemical synaptic transmission, we have performed electrophysiological recordings from rod bipolar axon terminals in an in vitro slice preparation of the rat retina. Whole cell recordings from axon terminals and cell bodies were used to investigate the passive membrane properties of rod bipolar cells and analyzed with a two-compartment equivalent electrical circuit model developed by Mennerick et al. For both terminal- and soma-end recordings, capacitive current decays were well fitted by biexponential functions. Computer simulations of simplified models of rod bipolar cells demonstrated that estimates of the capacitance of the axon terminal compartment can depend critically on the recording location, with terminal-end recordings giving the best estimates. Computer simulations and whole cell recordings demonstrated that terminal-end recordings can yield more accurate estimates of the peak amplitude and kinetic properties of postsynaptic currents generated at the axon terminals due to increased electrotonic filtering of these currents when recorded at the soma. Finally, we present whole cell and outside-out patch recordings from axon terminals with responses evoked by GABA and glycine, spontaneous inhibitory postsynaptic currents, voltage-gated Ca2+ currents, and depolarization-evoked reciprocal synaptic responses, verifying that the recorded axon terminals are involved in normal pre- and postsynaptic relationships. These results demonstrate that axon terminals of rod bipolar cells are directly accessible to whole cell and outside-out patch recordings, extending the usefulness of this preparation for detailed studies of pre- and postsynaptic mechanisms of synaptic transmission in the CNS.
4

MERKOURIS, A. V. "Computer-based documentation and bedside terminals." Journal of Nursing Management 3, no. 2 (March 1995): 81–85. http://dx.doi.org/10.1111/j.1365-2834.1995.tb00085.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Comerford, R. "X, as in expediency (computer terminals)." IEEE Spectrum 30, no. 5 (May 1993): 60–61. http://dx.doi.org/10.1109/6.275067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sazonov, Konstantin, Maxim Tatarka, Andrey Tsyganov, and Vitaliy Bessolcev. "Identification of Subscriber Terminals of Infocommunication Networks based on the Model of Forming Images in Modern Computer Systems." SPIIRAS Proceedings 19, no. 2 (April 23, 2020): 446–74. http://dx.doi.org/10.15622/sp.2020.19.2.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
One of the important tasks of such theories as theories of pattern recognition and the theory of information security, is the task of identifying terminals of information and telecommunication networks. The relevance of the topic is due to the need to study methods for identifying computer network terminals and build information security systems based on the knowledge gained. The main parameters that allow uniquely identifying subscriber terminals in the network are address-switching information, as well as a number of parameters characterizing the software and hardware of the computer system. Based on the obtained parameters, digital fingerprints of subscriber terminals are generated. The using anonymous networks by users of subscriber terminals and blocking of the methods of generating and collecting digital fingerprint parameters, does not allow to achieve the required degree of identification reliability in some cases. Based on the peculiarities of digital image formation in modern computer systems, many transformation parameters make impact on the output graphic primitive, thereby forming a digital fingerprint of the subscriber terminal, which depends on the placement of samples in a pixel, the algorithms used to calculate the degree of pixels influence, and also the procedures used of smoothing images in the graphics subsystem. In this paper an original model of image formation by means of a subscriber terminal web browser that allows to increase the degree of reliability of identification under conditions of anonymization of users of information and telecommunication networks is propesed. Features of the digital images formation in the graphic subsystems of modern computer systems are substantiated. These features allow identification under a priori uncertainty regarding the modes and parameters of information transfer.
7

Casey, M. A. "Computer-assisted morphometry of synaptic terminal density in the aging brain." Proceedings, annual meeting, Electron Microscopy Society of America 46 (1988): 430–31. http://dx.doi.org/10.1017/s0424820100104212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In studying the circuitry of a given region of the brain, some knowledge of the density of synaptic terminals is useful. Such data is especially valuable when studying the brain under pathological or experimental conditions. The methods outlined in this paper have been used to detect axosomatic synaptic terminal loss in the aging rat brain, but they would be applicable to other experimental paradigms.The methods in the present paper have been described elsewhere, and were recently used in our study of the lateral superior olivary nucleus (LSO), a well-characterized cell group in the rat superior olivary complex, and a key component of the rat lower auditory pathway. Virtually all synaptic terminals ending on the cell bodies of LSO principal cells originate in the medial nucleus of the trapezoid body (MTB), which undergoes a significant loss of neurons with age in rats. Thus, we wanted to determine whether loss of MTB cells resulted in a significant loss of axosomatic terminals in the LSO.
8

Refaee, Eshrag A., and Ali Ahmad. "A Study of Hexagon Star Network with Vertex-Edge-Based Topological Descriptors." Complexity 2021 (April 26, 2021): 1–7. http://dx.doi.org/10.1155/2021/9911308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
There are many network topology designs that have emerged to fulfill the growing need for networks to provide a robust platform for a wide range of applications like running businesses and managing emergencies. Amongst the most famous network topology designs are star network, mesh network, hexagonal network, honeycomb network, etc. In a star network, a central computer is linked with various terminals and other computers over point-to-point lines. The other computers and terminals are directly connected to the central computer but not to one another. As such, any failure in the central computer will result in a failure of the entire network and computers in star network will not be able to communicate. The star topology design can be represented by a graph where vertices represent the computer nodes and edges represent the links between the computer nodes. In this paper, we study the vertex-edge-based topological descriptor for a newly designed hexagon star network.
9

Zhang, Yue Feng, Jun Wang, and Chong Jun Wang. "All is MVC: Design and Implementation of a Thick Terminal for Telemedicine." Applied Mechanics and Materials 330 (June 2013): 500–503. http://dx.doi.org/10.4028/www.scientific.net/amm.330.500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
As the development of medical technology, computer technology and communication technology, telemedicine needs more powerful medical terminals to satisfy expanding user needs. In this paper we brought up that the new terminal should be a thick one to face the challenge, and then discussed the computing migration, a new trend as terminals becoming thick. We designed and implemented a thick terminal prototype for telemedicine, with the software using the MVC architecture and hardware using MVC-like architecture. This terminal achieved our expectation in actual use.
10

Liu, Yan, and Gan Zhou Liao. "Study on Portable Tracking and Monitoring System." Applied Mechanics and Materials 329 (June 2013): 448–51. http://dx.doi.org/10.4028/www.scientific.net/amm.329.448.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In this study, in combination with mobile communication technology, sensor technology and computer technology, a tracking and monitoring system solution for preventing children and the elderly from getting lost is proposed. With the purpose of realizing monitoring and exerting no effect on the normal activities of the monitored objects, a mobile wireless terminal is applied in this system. Through using embedded microcontroller controller as control core, data acquisition, storage, and distance detection are realized. Through using embedded GPS positioning technology and GSM technology, the instant positions of the monitored children and the elderly are detected. When the monitored objects need to move in a fixed place (kindergarten or nursing home), portable terminals can communicate with computer control terminals and will automatically send a signal for providing warnings and informing computers and guardians when the monitored objects exceed the warning scope, so that it becomes easier for guardians to take corresponding measures in time. Besides, the system can effectively prevent children and the elderly from getting lost, or the emergence of other dangers.
11

Segev, I. "Computer study of presynaptic inhibition controlling the spread of action potentials into axonal terminals." Journal of Neurophysiology 63, no. 5 (May 1, 1990): 987–98. http://dx.doi.org/10.1152/jn.1990.63.5.987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
1. The effect of presynaptic, axoaxonal inhibition, that exerts its action by producing a local conductance increase, on the behavior of action potentials at postsynaptic axon terminals is analyzed computationally. The significance of the location and strength of the presynaptic inhibition, as well as the morphology and membrane properties of the axonal terminals, are considered. 2. Keeping the specific properties of terminal membrane and axoplasm constant, the critical "silent" steady-state conductance change (gcrit) that blocks propagation is linearly scaled with the terminal diameter raised to the 3/2 power. At the midpoint of a 5 lambda long, 1 micron diameter axon that has the standard Hodgkin and Huxley (1952) kinetics at 18 degrees C (and an input conductance of 8.7 nS), gcrit is 72 nS. At 0 degrees C, gcrit = 200 nS, whereas at 30 degrees C gcrit = 30 nS. 3. The critical conductance change that blocks propagation depends steeply on the density of excitable channels (gNa) at the terminal. For a geometrically uniform terminal at 18 degrees C, the action potential can not be blocked by a local shunt when gNa greater than 600 mS/cm2. 4. An axoaxonal synapse in the proximity of the postsynaptic release site has graded control over the spike amplitude (and, therefore, over the postsynaptic output) at that site. Presynaptic inhibition located remotely from the release site has an all-or-none effect at the release site. 5. Inhibition is more effective in attenuating the spike at the terminal when it impinges onto a passive terminal rather than on an excitable one. 6. The detectability of the conductance increase as well as the change in action potential amplitude associated with the presynaptic inhibition is poor at only a short distance from the axoaxonal synapse. The presence of bottlenecks and varicosities at some axonal terminals enhances this decoupling effect even more. Thus presynaptic inhibition may reduce the potential near the output site of the affected axon significantly, without producing any noticeable conductance or voltage change at a distance of only several tens of micrometers (a few tenths of a space constant) away from it. 7. Varicosities and bottlenecks typically found along axonal terminals are the optimal loci for presynaptic inhibition to be most effective in attenuating the action potential at the terminal. Even with high density of excitable channels, propagation with such terminal geometry is insecure, and one, or few, quanta of inhibitory transmitter (a conductance change of several nanosiemens) can block propagation there.(ABSTRACT TRUNCATED AT 400 WORDS)
12

Man, G. S., M. Olapoju, M. V. Chadwick, P. Vuddamalay, A. V. Hall, A. Edwards, and J. R. Kerr. "Bacterial contamination of ward-based computer terminals." Journal of Hospital Infection 52, no. 4 (December 2002): 314–15. http://dx.doi.org/10.1053/jhin.2002.1302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Naumov, Vitalii, Igor Taran, Yana Litvinova, and Marek Bauer. "Optimizing Resources of Multimodal Transport Terminal for Material Flow Service." Sustainability 12, no. 16 (August 13, 2020): 6545. http://dx.doi.org/10.3390/su12166545.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Multimodal transport terminals are the elements of transport systems that ensure the interaction of enterprises of various modes of transport. The effective functioning of transport terminals significantly affects the efficiency of the material flow servicing in a supply chain and the sustainability of the whole transport system. The paper proposes an approach to determine the optimal parameters of production resources in multimodal transport terminals, based on numerical computer simulations of technological operations in a transport terminal for the given parameters of incoming and outgoing material flows. The practical use of the proposed approach is shown on the example of the Amur Harbor cargo area of the Dnipro River Port.
14

Han, Liang, and Yan Song Li. "Design of Data Acquisition System Based on Ethernet and Virtual Instrument Technology." Applied Mechanics and Materials 742 (March 2015): 203–7. http://dx.doi.org/10.4028/www.scientific.net/amm.742.203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Ethernet based on TCP/IP is a standard open network, which promotes the development of data acquisition in the direction of network. Data acquisition and processing systems connected by Ethernet make the data acquisition terminals (lower computer) and processing control center (upper computer) from integrated to discrete. Separate data acquisition terminals can realize miniaturization and modularization and increase the flexibility of the application. A new type, low cost, high precision data acquisition terminal based on ARM processor was designed for solving the problem of complicated structure, big volume and high cost of traditional data acquisition system. Combined with the technologies of network communication, a data acquisition PC system based on virtual instrument technology was designed by LabVIEW.
15

Thorning, L. "Introduction of new computing facilities at the Geological Survey of Greenland." Rapport Grønlands Geologiske Undersøgelse 140 (December 31, 1988): 7–9. http://dx.doi.org/10.34194/rapggu.v140.8023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
From a cautious start in the use of computers in the early 1970s, the Geological Survey of Greenland has developed complex and varied uses of modern computer facilities for both scientific and administrative tasks. GGU's first computer installation, a noisy TTY connected to the Computing Centre of Copenhagen University by a 110 baud telephone modem, was a selfservice facility which was not easy to use. Over the years, first with use of a PDP-10 with just one Tektronix 4014 graphic terminal and later a succession of increasingly powerful PDP-11s with many terminals, GGU's in-house facilities just kept ahead of the ever increasing demand for computer services. At the same time a number of programs for special tasks were developed on external facilities, because they required larger computers or special facilities. In the 1980s the demands on the computer facilitiesrequiring many different types of programs, including word processing, had grown so large that GGU's in-house system could no longer handle them satisfactorily. A major reorganisation was required, and consequently activities were divided between personal computers (PCs; mainly administrative) and a new central computer (mainly scientific). This development took place in late 1986 with the purchase of 17 new personal computers and a new central computer with accessory peripheral equipment. This has allowed an increasing integration of computer methods into GGU's activities. A brief summary is given below.
16

Chang, Daofang, Ting Fang, Junliang He, and Danping Lin. "Defining Scheduling Problems for Key Resources in Energy-Efficient Port Service Systems." Scientific Programming 2016 (2016): 1–8. http://dx.doi.org/10.1155/2016/7053962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This paper addresses the problem of key resource scheduling of container terminals for energy-efficient operation. A combination of key resource scheduling and energy-efficient operation in container terminals is firstly described. An energy-efficient evaluation model of the key resource scheduling is then proposed. The objective set, decision variable set, and constraint set of key resource scheduling of a container terminal for energy-efficient operation are established in this paper. At the same time, their mapping relationship is carefully analyzed and the system structure of the key resource scheduling for energy-efficient operation of a container terminal is finally proposed.
17

Li, Wang, Zhu Xiaoning, and Xie Zhengyu. "Efficient container stacking approach to improve handling: efficiency in Chinese rail–truck transshipment terminals." SIMULATION 96, no. 1 (April 16, 2019): 3–15. http://dx.doi.org/10.1177/0037549719843347.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
An efficient container stacking approach is vital to the handling efficiency of container transshipment terminals. In this paper, by considering container allocation preferences and operation distance, the container stacking problem in rail–truck transshipment terminals has been formulated as a multi-objective optimization model to minimize container overlapping amounts and crane moving distance. A simulation-based algorithm implementing process has been developed to stack containers to the optimum positions. Computational experiments on data from a rail–truck transshipment terminal in China are conducted to test the efficiency of the proposed approach. Experimental results demonstrate that the container stacking approach is efficient and significant for improving handling efficiency in rail–truck transshipment terminals.
18

Bird, Judith. "VDU terminals review." Data Processing 27, no. 6 (July 1985): 25–26. http://dx.doi.org/10.1016/0011-684x(85)90266-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Ge, Qian Qian. "Design and Implementation of Human-Computer Interaction Terminal Shockproof Device Based on LPC2478." Advanced Materials Research 459 (January 2012): 553–56. http://dx.doi.org/10.4028/www.scientific.net/amr.459.553.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the extensive use of embedded mobile terminal in everyday life, embedded terminals are getting more and more powerful,but there is no significant improvement in shock proof and use protection.The paper introduces an implementation method of embedded mobile terminal shockproof device based on LPC2478. The device has wifi communication,multi-channel sampling, real-time measurement for temperature, humidity, horizontal and vertical conditions.It measures the device distances with other objects and triaxial acceleration to achieve parametric statistical analysis and diagnostics. Its characteristics of multipoint direction identification shock proof, wireless self-synchronous firmware upgrade and power management based on users’ action mode identification provide good protection for mobile terminal products, achieving the target of shockproof.
20

Zhao, Guotao, and Jie Ding. "Research on Massive Image Retrieval Method of Mobile Terminal Based on Weighted Aggregation Depth Feature." Wireless Communications and Mobile Computing 2022 (March 8, 2022): 1–7. http://dx.doi.org/10.1155/2022/9366845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Image self-coupling and feature interference lead to poor retrieval performance in massive image retrieval of mobile terminals. This paper proposes a massive image retrieval method of mobile terminals based on weighted aggregation depth features. The pixel big data detection model of massive images of mobile terminals is constructed, the collected pixel information of massive images of mobile terminals is restructured, the edge contour feature parameter set of massive images of mobile terminals is extracted, the feature fusion processing of massive images of mobile terminals is carried out in gradient pixel space by means of feature reconstruction and gray moment invariant feature analysis, the depth feature detection of massive images of mobile terminals is realized by using weighted aggregation method, the gradient value of pixels of massive images of each mobile terminal is calculated, and the optimized retrieval of massive images of mobile terminals is realized according to the fusion result of gradient weighted information. Simulation results show that this method has better feature clustering, stronger image detection and recognition, and anti-interference ability and improves the precision and recall of image retrieval.
21

Asokan, N., Hervé Debar, Michael Steiner, and Michael Waidner. "Authenticating public terminals." Computer Networks 31, no. 8 (April 1999): 861–70. http://dx.doi.org/10.1016/s1389-1286(98)00020-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Davies, Ian, and Alistair McBain. "ISPBXs and terminals." Computer Communications 11, no. 4 (August 1988): 203–7. http://dx.doi.org/10.1016/0140-3664(88)90083-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Shih, Mao-Chang, Hani S. Mahmassani, and M. Hadi Baaj. "Trip Assignment Model for Timed-Transfer Transit Systems." Transportation Research Record: Journal of the Transportation Research Board 1571, no. 1 (January 1997): 24–30. http://dx.doi.org/10.3141/1571-04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
A trip assignment model for timed-transfer transit systems is presented. Previously proposed trip assignment models focused on uncoordinated transit systems only. In timed-transfer transit systems, routes are coordinated and scheduled to arrive at transfer stations within preset time windows. Thus, passengers at coordinated operations terminals may face a choice among simultaneously departing buses serving alternative routes (unlike the case for uncoordinated operations terminals, where passengers generally board the first vehicle to arrive). A general trip assignment model is proposed that applies different assignment rules for three types of transfer terminals: uncoordinated operations terminals, coordinated operations terminals with a common headway for all routes, and coordinated operations terminals with integer-ratio headways for all routes. In addition, the care of missed connections at transfer terminals (due to vehicles arriving behind schedule) is accounted for. The model has been implemented in the LISP computer language, whose “list” data structure is specially suited to handle path search and enumeration. Results from an application to an example network with different combinations of terminal operations and headways indicate the following: ( a) demand tends to be assigned to higher-frequency paths in the uncoordinated transit network; ( b) demand is more concentrated, and tends to be assigned to paths with higher frequency and lower travel costs in the coordinated transit network; and ( c) missed connections have no significant effects on trip assignment.
24

Yi-Qin Bao, Yi-Qin Bao, Qiang Zhao Yi-Qin Bao, Hao Zheng Qiang Zhao, Hong-Tao Zhang Hao Zheng, Wen-Bin Xu Hong-Tao Zhang, and Zheng-Tang Sun Wen-Bin Xu. "Research on Remote Upgrade Method of Distributed Load Balancing for Power Monitoring Terminal." 電腦學刊 32, no. 5 (October 2021): 128–41. http://dx.doi.org/10.53106/199115992021103205010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the increasing application of power monitoring terminal and the increasing demand for its function, it is necessary to upgrade the field embedded software remotely.The existing online upgrade schemes generally deal with the terminals one by one, and there are also distributed upgrade schemes. However, due to the large differences in the communication performance of terminals in different places, there is a problem of load imbalance, resulting in the low efficiency of the whole upgrade. Aiming at the efficiency of remote online upgrade of power monitoring terminal, a distributed load balancing remote upgrade method is proposed. The power monitoring terminal is upgraded at the same time through the cloud platform, and the genetic algorithm is used for load balancing processing, so as to improve the efficiency. The practical results show that this remote upgrade method improves the upgrade efficiency of the terminal by comparing a variety of upgrade schemes, compared with no load balancing method, the average time of upgrading a terminal is reduced by 36%, which achieves good application effect in practical application.
25

Nikishechkin, Petr, Nadezhda Chervonnova, and Anatoly Nikich. "Approach to the construction of specialized portable terminals for monitoring and controlling technological equipment." MATEC Web of Conferences 224 (2018): 01089. http://dx.doi.org/10.1051/matecconf/201822401089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The work deals with the features of construction of human-computer interaction to manage the complex process equipment. The mechanism for creating additional portable terminals for monitoring and controlling complex machine tools is presented. A practical example of using the mechanism for creating additional terminal solutions for monitoring and controlling the Quaser MV184P milling machining center is given.
26

Sundar, S. Shyam. "Loyalty to computer terminals: is it anthropomorphism or consistency?" Behaviour & Information Technology 23, no. 2 (March 2004): 107–18. http://dx.doi.org/10.1080/01449290310001659222.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Parihar, J. K. S., Vaibhav Kumar Jain, Piyush Chaturvedi, Jaya Kaushik, Gunjan Jain, and Ashwini K. S. Parihar. "Computer and visual display terminals (VDT) vision syndrome (CVDTS)." Medical Journal Armed Forces India 72, no. 3 (July 2016): 270–76. http://dx.doi.org/10.1016/j.mjafi.2016.03.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Spennemann, Dirk, David Cornforth, and John Atkinson. "A choice of terminals: spatial patterning in computer laboratories." Campus-Wide Information Systems 24, no. 2 (April 3, 2007): 76–96. http://dx.doi.org/10.1108/10650740710742691.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Gui, Jinsong, Jianglin Liu, and Xinran Zhou. "An Efficient Radio Resource Allocation Scheme considering Terminal Mobility in Dense mmWave Cellular Networks." Wireless Communications and Mobile Computing 2022 (June 23, 2022): 1–20. http://dx.doi.org/10.1155/2022/9558031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In millimeter wave (mmWave) communication systems, beamforming-enabled directional transmission and network densification are commonly used to reduce high path loss and improve signal coverage quality. The combination of the two approaches will pose a challenge to radio resource allocation, which is especially true when terminals move frequently. The existing works presented some effective solutions for resource allocation in dense mmWave cellular networks, but they assumed that terminals move infrequently. So, these works cannot be directly applied to the dense mmWave cellular networks where terminals move frequently. In this paper, based on the results of the existing beamforming training (BFT) information-aided radio resource allocation algorithm, we propose a relay selection method to select a set of reasonable relays to take over the terminals whose performance deteriorates due to movement, which can ensure that each selected relay is as close as possible to the original performance of the corresponding moved terminal. Then, the resource allocation problem between the Device to Device (D2D) links from the selected relays to the corresponding moved terminals is formulated as a potential game model. By designing the utility function reasonably, the resource allocation results on the D2D links can converge to a Nash equilibrium solution. The simulation results show that the proposed scheme adapts to the scenario with frequent terminal movement, restrains the sharp performance decline caused by terminal movement, and outperforms the existing related algorithms in terms of average energy efficiency and throughput per link.
30

Gautam, Pramod Sharma, Uday Chandra Prakash, and Subreena Dangol. "Study on Knowledge and Prevalence of Computer Vision Syndrome among Computer Operators in Nobel Medical College Teaching Hospital, Biratnagar, Nepal." Journal of Nobel Medical College 9, no. 2 (December 14, 2020): 45–49. http://dx.doi.org/10.3126/jonmc.v9i2.33386.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Background: The eye and vision related problems that results from continuous use of computers and other visual display terminals for extended period of time leads to computer vision syndrome. Due to rapid digitalization in human life, the risk of developing it has also increased in many folds. So, with an aim of determining the prevalence and level of awareness of computer vision syndrome among computer users along with their attitude and practices to prevent it, this study was conducted in the office employees who use computer for a considerable period of time. Materials and Methods: A hospital based observational descriptive study was conducted in the out-patient department of Ophthalmology in Nobel Medical College and Teaching Hospital, Biratnagar, where 105 employees working in different work stations of same institution were enrolled. A questionnaire and the clinical findings were used to collect data. Results: About 80% of the employees were using computer for about (8-11) hours per day. Prevalence of computer vision syndrome noted was (92.4%) with low level of knowledge (85.7%) about it. About 45% of them wore glasses for their refractive errors but attitude and practices in work place to prevent the bad effects of using visual display terminals were found to be lacking (53.3%). Burning sensation in the eye, headache, ocular irritation and itching and neck, shoulder or back pain were the common symptoms. Around (60-70)% of the eyes tested positive for dry eye. Conclusion: Lack of awareness of computer vision syndrome and lack of personal protective measures were associated with its high level of prevalence.
31

Pearson, Thomas E., and Sandra K. Strick. "The Physical Design of Computer Assisted Classroom/Laboratories." Hospitality Education and Research Journal 9, no. 2 (May 1985): 46–52. http://dx.doi.org/10.1177/109634808500900205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Interest in the topic of computer assisted instruction (CAI) led the authors to study desirable features for a computer assisted classroom/laboratory. An informal survey was designed using instructors and computer experts as sources of information. Areas of concern included general educational concerns, the layout for student terminals, furniture features, and room layout. It was found that no two facilities were alike. CAI labs were commonly restructed by financial and physical limitations. However, the survey results showed considerable agreement as to desired features in a classroom/laboratory. The primary feature commonly valued was a design under which teacher and student terminals could be interactive. The other desirable features supported this philosophical objective.
32

King, Chris. "Choosing DEC-compatible terminals." Data Processing 27, no. 6 (July 1985): 32–34. http://dx.doi.org/10.1016/0011-684x(85)90269-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

ABBE, BRIAN S., MARTIN J. AGAN, and THOMAS C. JEDREY. "ACTS MOBILE TERMINALS." International Journal of Satellite Communications 14, no. 3 (May 1996): 175–89. http://dx.doi.org/10.1002/(sici)1099-1247(199605)14:3<175::aid-sat550>3.0.co;2-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Willems, Jan. "Terminals and Ports." IEEE Circuits and Systems Magazine 10, no. 4 (2010): 8–26. http://dx.doi.org/10.1109/mcas.2010.938635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Rožić, Tomislav, Božidar Ivanković, Ivona Bajor, and Martin Starčević. "A Network-Based Model for Optimization of Container Location Assignment at Inland Terminals." Applied Sciences 12, no. 12 (June 8, 2022): 5833. http://dx.doi.org/10.3390/app12125833.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The development of inland terminals helps seaports mitigate inevitable storage capacity problems, extending their gravitational field and strengthening their competitive advantage. Optimizing the container storage, efficiency, and productivity of seaports and inland terminals is becoming increasingly important. The present paper develops a network-based mathematical model to optimize the location assignment of inbound containers at inland terminals. The model’s assumptions are based on the analysis of criteria at representative European inland terminals, and the model aims to reduce unproductive manipulations. The present study is one of the few to develop a single model that integrates all important criteria for container location assignment, including a container’s dimensions, its occupancy, cargo type, the container’s owner, and distance to the final user. These criteria are important for the terminal operator so that they can determine container locations in a way that minimizes unproductive manipulations. Data from a single inland terminal were used to validate the model within the FlexSim CT simulation environment. Our results suggest that the model can reduce unproductive manipulations and associated costs at inland terminals.
36

Xue, Nian, and Li Wei Jia. "Construction and Research of Virtual Network User File System Based on Upnp and FUSE on Linux." Applied Mechanics and Materials 299 (February 2013): 125–29. http://dx.doi.org/10.4028/www.scientific.net/amm.299.125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Development of the computer has been from a single machine to the server, and then server clustering technology, and the emerging "cloud" network, which invariably show the network's role in the computer. Meanwhile, more and more high-end hardware trash or the users may be unbearable of high cost of servers, so the use of existing resources and integration of resources has become increasingly important. This paper will detail a virtual network file system, which based on Upnp (Universal Plug and Play) and FUSE (File system in Usese Space) in Linux operating system. In this study, users can share a computer terminal to collect and use that particular computer terminal on the network to all the resources users are interested in, provided that the shared computer terminals must be installed on a specific Upnp device. In this study, we have successfully implemented single-device-side and single-device-side multithread communication under the Linux or windows operating system.
37

You, Huimin. "Safe Operation Management of Urban Smart Grid Based on Deep Learning." Mobile Information Systems 2022 (August 24, 2022): 1–11. http://dx.doi.org/10.1155/2022/4184941.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The smart grid in the twenty-first century is constantly innovated by the big data technology and the Internet of Things (IoT) technology. As the second generation of a power network, the smart grid keeps developing towards automation and intelligence, driving the energy conversion rate, power utilization rate, and energy supply rate to increase. However, in the smart grid, the power terminal has a pivotal role in controlling, monitoring, and regulating the production process of electricity, which is currently facing many security challenges. The most critical aspect of smart grid security management is to ensure the security of power terminals. Existing solutions generally monitor power terminal devices by monitoring power terminal traffic; however, such security policies can only monitor attacks with characterization properties at the traffic level and cannot be used to monitor power terminal devices directly. Based on this, this paper reviewed the literature on intelligent operation and maintenance and deep learning at home and abroad and comprehensively analyzed the research progress of intelligent operation and maintenance, and in the comparative analysis of deep learning methods, because the convolutional neural network has fewer connections and parameters and can control the capacity by controlling its depth and width, it is convenient to establish a model with larger learning capacity, so a convolutional neural network is chosen for data analysis. In this study, we choose to use the convolutional neural network to analyze the data, combine the monitoring, management, and fault location of operation and maintenance work organically through some deep learning algorithms, reduce the number of model layers through a deep learning-based security monitoring technology for electric power terminals to improve the training speed and efficiency, and achieve all-round protection for electric power terminals at the device level and the network level. The management of urban smart grid dispatching operation also requires strict implementation of relevant technical standards to ensure the standardized operation and enhance the safety and stability of grid operation.
38

Zhu, Xiao Li. "Augmented Reality Based on Mobile Terminals." Advanced Materials Research 926-930 (May 2014): 2454–57. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2454.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Through the study, we found computer has powerful ability to analyze management in the colorful painting field.Spread of the mobile terminal augmented reality is a hot field in today's society technology development, composite is a new kind of create immersive virtual scene technology. Introduced the advantages of mobile terminal transmission of augmented reality and real life, the application of augmented reality and the mobile terminal transmission is discussed.
39

Du, Tang, Li, Zou, Ma, Sun, Liu, and Zeng. "Thermal Characteristics of Positive Leaders under Different Electrode Terminals in a Long Air Gap." Energies 12, no. 21 (October 23, 2019): 4024. http://dx.doi.org/10.3390/en12214024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The thermal characteristics of the positive leader discharges occurring under the different electrode terminals in a 1 m rod-plate air gap were studied quantitatively using Mach–Zehnder interferometry and a high-speed video camera. When disturbed by the discharge channel, the interference fringes are distorted because of the change in the refractive index of air, which is related to the gas density. Therefore, the gas temperature and gas density distribution in the leader channel can be retrieved from the offset of the interference fringes. Based on these results, the thermal characteristics of the leader channel were studied under different electrode terminals with a radius of curvature of 2.5 mm and 5 mm for cone electrodes and a diameter of 40 mm for a spherical electrode. The results show that the gas temperature in the leader channel increased while the gas density decreased as the radius of curvature of the electrode terminal decreased. Additionally, a smaller radius of curvature leads to a larger thermal diameter, but the difference in the thermal diameter is not obvious; for the terminals used in this paper, the difference is within 2 mm.
40

Lin, Yi-Kuei, and Cheng-Fu Huang. "Stochastic computer network with multiple terminals under total accuracy rate." Journal of Zhejiang University SCIENCE C 14, no. 2 (February 2013): 75–84. http://dx.doi.org/10.1631/jzus.c1200220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Nikonenko, A. G., A. V. Sheichenko, and G. G. Skibo. "Spatial distribution of synaptic vesicles in presynaptic terminals: Computer simulation." Neurophysiology 31, no. 4 (July 1999): 276–79. http://dx.doi.org/10.1007/bf02515103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Dávila de León, Alan, Eduardo Lalla-Ruiz, and Belén Melián-Batista. "Disruption Management Approaches for Berth Scheduling in Bulk Terminals." Journal of Advanced Transportation 2022 (August 31, 2022): 1–17. http://dx.doi.org/10.1155/2022/8069796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Maritime terminals are complex transportation systems sensitive to several sources of uncertainty. An alteration in the baseline planning, as a consequence of one or more disruptive events, can lead terminals to a lower quality of the service provided. Therefore, in a context where a terminal strives to maintain or increase competitiveness, it is necessary to consider the uncertainty in the planning and define actions capable of efficiently and effectively mitigating disruptive events. This paper addresses berthing operations at bulk terminals, considering the arrival and handling times as stochastic variables. Hybrid approaches (i.e., proactive-reactive) are proposed in order to provide the port terminal with robust planning capable of reducing the impact of disruptive events by defining uncertainty-tolerant schedules and reactive actions capable of restoring the performance of the terminal when disruptive events arise. Finally, the solution approaches are evaluated together with and without the incorporation of buffer-time management. The computational results corroborate the effectiveness of integrating proactive and reactive approaches in order to maximize the performance of the terminal and reduce the penalty costs derived from alterations in the baseline schedule, with the consequent increase in the terminal competitiveness.
43

Song, Guanggang, Bin Li, and Yuqing He. "Container Terminal Logistics Generalized Computing Architecture and Green Initiative Computational Pattern Performance Evaluation." Information 10, no. 12 (December 5, 2019): 383. http://dx.doi.org/10.3390/info10120383.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Container terminals are the typical representatives of complex supply chain logistics hubs with multiple compound attributes and multiple coupling constraints, and their operations are provided with the strong characteristics of dynamicity, nonlinearity, coupling, and complexity (DNCC). From the perspective of computational logistics, we propose the container terminal logistics generalized computing architecture (CTL-GCA) by the migration, integration, and fusion of the abstract hierarchy, design philosophy, execution mechanism, and automatic principles of computer organization, computing architecture, and operating system. The CTL-GCA is supposed to provide the problem-oriented exploration and exploitation elementary frameworks for the abstraction, automation, and analysis of green production at container terminals. The CTL-GCA is intended to construct, evaluate, and improve the solution to planning, scheduling, and decision at container terminals, which all are nondeterministic polynomial hard problems. Subsequently, the logistics generalized computational pattern recognition and performance evaluation of a practical container terminal service case study is launched by the qualitative and quantitative approach from the sustainable perspective of green production. The case study demonstrates the application, utilization, exploitation, and exploration of CTL-GCA preliminarily, and finds the unsustainable patterns of production at the container terminal. From the above, we can draw the following conclusions. For one thing, the CTL-GCA makes a definition of the abstract and automatic running architecture of logistics generalized computation for container terminals (LGC-CT), which provides an original framework for the design and implementation of control and decision mechanism and algorithm. For another, the CTL-GCA can help us to investigate the roots of DNCC thoroughly, and then the CTL-GCA makes for conducting the efficient and sustainable running pattern recognition of LGC-CT. It is supposed to provide a favorable guidance and supplement to define, design, and implement the agile, efficient, sustainable, and robust task scheduling and resource allocation for container terminals by computational logistics whether in the strategy level or the tactical one.
44

Wu, Zheng, Laifu Li, Yubo Yuan, Xiaodong Yuan, Chenyu Zhang, Li Kong, Wei Pei, and Wei Deng. "Research on Additional Control Technology Based on Energy Storage System for Improving Power Transfer Capacity of Multi-Terminal AC/DC System with Low Cost." Energies 13, no. 2 (January 19, 2020): 495. http://dx.doi.org/10.3390/en13020495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The multi-terminal AC/DC system will become one of the important forms of the future power grid. The negative impedance characteristic caused by the constant power load in the DC network will reduce the power transfer capacity between the terminals, especially when a grid fault occurs in AC system at any terminal. Energy storage has played an important role in improving the stability of AC and DC systems. This paper proposes an additional control method based on an energy storage system to improve system power transfer capacity with low cost. The state space model of two-terminal AC/DC system is established, and the feedback laws for additional control are further designed by Lyapunov theory. Furthermore, the additional control strategies based on the energy storage system is built, without changing the existing control system of each control object. Finally, the corresponding system simulation model is established by Matlab/Simulink for analysis and verification. The research results show that the proposed additional control method is effective. The power transfer limitation can be overcome by only adding small damping energy with the stable DC voltages under large disturbances, and the power transfer capacity between the terminals can be significantly improved with low control cost.
45

Wang, Zimeng, Wei Chen, Haifeng Jiang, Shuo Xiao, and Haowen Yang. "A Task Allocation Algorithm for Coal Mine Mobile Crowd Sensing Based on Weighted Undirected Graph." Security and Communication Networks 2021 (June 25, 2021): 1–14. http://dx.doi.org/10.1155/2021/9999798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Existing applications of mining intelligent mobile terminals are all for the sensing of individual terminals, without considering the group attributes of terminal carriers and the cooperation opportunities brought by terminal movement, which is unable to complete large-scale and complex sensing tasks. In this article, mobile crowd sensing and mine safety monitoring are combined to construct the mobile crowd sensing network for coal mine. Aiming at the task allocation problem, a task allocation mechanism based on a weighted undirected graph is proposed. First, considering the similarity of task completion location and time and quality of data collected, the reputation evaluation model of miners is designed. In order to optimize the reputation of miners participating in the task, an emergency task allocation algorithm based on the weighted undirected graph is proposed. Second, based on the fatigue degree of miners and the residual energy of intelligent mobile terminals, the miner status evaluation model is constructed, which is combined with the reputation model to design a nonemergency task allocation algorithm, aiming at further optimizing the task allocation results. The simulation results show that the proposed algorithm has better performance in allocation time for sensing task, task allocation success rate, average reputation, and status value of miners.
46

Pan, Yu, Lijuan Luo, Dan Liu, Li Gao, and Hengyi Rao. "Functional and Symbolic Values of Cloud Terminals: A Study of User Acceptance and Purchasing Behaviors." International Journal of Information Technology & Decision Making 13, no. 03 (May 2014): 603–21. http://dx.doi.org/10.1142/s0219622014500539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The purchasing behavior of cloud terminals is increasingly shaped by the emerging cloud services. Rather than its hardware configuration, performance of cloud intelligent terminals such as the Chromebook is more and more dependent on the cloud service capability. However, it remains unknown what factors will drive user's acceptance and purchase of these cloud terminals. Using the Chromebook and MacBook as two representative products, this study models user's acceptance and purchasing behavior of cloud terminals and examines multiple factors driving the consumer's purchasing decision from the perspective of functional and symbolic values. The results emphasize the importance of symbolic values and cost, and propose that symbolic values of different cloud terminals have different effects on consumers' acceptance and purchase. It has important implications for companies to design and sell cloud terminals based on user's acceptance and purchase intentions.
47

Yee, Yoke Chek, Su Wei Tan, Heng Siong Lim, and Su Fong Chien. "Application of Particle Swarm Optimizer on Load Distribution for Hybrid Network Selection Scheme in Heterogeneous Wireless Networks." ISRN Communications and Networking 2012 (September 5, 2012): 1–7. http://dx.doi.org/10.5402/2012/340720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Mobile terminal with multiradios is getting common nowadays with the presence of heterogeneous wireless networks such as 3G, WiMAX, and WiFi. That Network selection mechanism plays an important role in ensuring mobile terminals are always connected to the most suitable network. In this paper, we introduce and evaluate the performance of load distribution model to facilitate better network selection. We focus on the optimization of network resource utilization using the particle swarm optimizer (PSO) with the objective to distribute the system load according to the various conditions of the heterogeneous networks in order to achieve minimum system cost. Simulation results showed that the proposed approach outperformed the conventional iterative algorithm by a cost improvement of 7.24% for network size of 1000 mobile terminals using 10 particles.
48

Li, Yunhe, Yi Xie, and Qinyu Zhang. "3D Gesture Recognition Based on Handheld Smart Terminals." International Journal of Ambient Computing and Intelligence 9, no. 4 (October 2018): 96–111. http://dx.doi.org/10.4018/ijaci.2018100106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the popularity of smart devices, it has become impossible for traditional human-computer interaction techniques to accommodate people's needs. This article proposes an iOS-based three dimensional (3D) gesture recognition system, gathering users' specific gestures from their handheld smart terminals to judge implications of these gestures, so to control other smart terminals with more natural human-computer interactions. In this article, gestures were recognized by reading data about corresponding 3D gesture data with motion sensors of smart terminals using optimized dynamic time warping (DTW) algorithm. As to this algorithm, curve paths were delimited via slope based on features of mobile devices and dynamic programming. Meanwhile, this algorithm reduced computational load for template matching and costs of gesture recognition by preliminarily storing upper and lower boundaries of delimited areas with linked lists or setting distortion thresholds. In this article, efficiency and precision of recognition schemes were tested and verified on cellphones. The results suggested that the improved algorithm was less time-consuming than classical algorithms, and required less time for computational load for template matching. Furthermore, it was demonstrated that the gesture recognition based on dynamic template matching algorithms, with higher recognition efficiency and precision, could bring better experiences of human-computer interactions.
49

Lin, Yi-Dar, and Antonio A. Trani. "Airport Automated People Mover Systems: Analysis with a Hybrid Computer Simulation Model." Transportation Research Record: Journal of the Transportation Research Board 1703, no. 1 (January 2000): 45–57. http://dx.doi.org/10.3141/1703-07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Automated people movers (APMs) have become an attractive solution to mobility problems associated with large airport terminals. A hybrid computer simulation model (called APMSIM) that has been developed to simplify the operational analysis of airport APM systems is presented. Given an airport passenger demand function, along with various APM vehicle technology and airport terminal characteristics, the model estimates timevarying level-of-service characteristics of the terminal including queues and processing times. The model simulates the movement of individual passengers and APM vehicles in the system network. APMSIM constitutes a design tool for airport planners and designers for determination of the sensitivity of system performance for a range of APM design parameters, examination of the flexibility of an APM system under given operational policy and network configurations, and estimation of APM vehicle energy consumption on the basis of network constraints and system characteristics. The model is a hybrid discrete-event and continuous simulation model developed in EXTEND, a general-purpose simulation software.
50

Terminal Display Systems Ltd. "High-performance terminals." Displays 14, no. 3 (July 1993): 185. http://dx.doi.org/10.1016/0141-9382(93)90045-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

To the bibliography