Results 81 to 90 of about 4,424,276 (196)

Computer program analyzes generalized environmental control and life support systems [PDF]

open access: yes, 1967
Versatile computer program analyzes environmental control and life support systems. The program permits changes of system component arrangements, component design details, and operating modes.
Vaughan, R. L.
core   +1 more source

THE USE OF MODERN INFORMATION TECHNOLOGIES DURING AERIAL RECONNAISSANCE

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2015
Nowadays, using aerial reconnaissance, as a component of an armed forces intelligence system, become the undeniable factor that allows to promptly obtain an information about the enemy location and its possible actions.
Olexander Slusarchuk
doaj  

EDUCATIONAL OBJECTIVES IN INTELLIGENT TUTORS FOR COMMUNICATION SKILLS [PDF]

open access: yesAnnals of the University of Petrosani: Economics, 2015
Intelligent Tutoring Systems have been successfully used to simulate human tutoring in various fields such as mathematics, physics or computer programming.
CIPRIAN CUCU
doaj  

Non-developmental item computer systems and the malicious software threat [PDF]

open access: yes
The following subject areas are covered: a DOD development system - the Army Secure Operating System; non-development commercial computer systems; security, integrity, and assurance of service (SI and A); post delivery SI and A and malicious software ...
Bown, Rodney L.
core   +1 more source

TASK OPTIMISATION IN MULTIPROCESSOR EMBEDDED SYSTEMS

open access: yesКомпютерні системи та інформаційні технології
In this work, a task execution optimization method using replication in a multiprocessor system has been developed. This method effectively minimizes the overall execution time, ensures load balancing, and reduces communication delays.
Дмитро МАРТИНЮК   +3 more
doaj   +1 more source

Construction of Structure of Indicators of Efficiency of Counteraction to Threats of Information Safety in Interests of the Estimation of Security of Information Processes in Computer Systems

open access: yesБезопасность информационных технологий, 2010
The theorem of system of indicators for an estimation of the security of information processes in the computer systems is formulated and proved. A number of the signs is proved, allowing to consider set of the indicators of efficiency of counteraction to
A. P. Kurilo   +3 more
doaj  

Motivation, Design, and Ubiquity: A Discussion of Research Ethics and Computer Science

open access: yes, 2006
Modern society is permeated with computers, and the software that controls them can have latent, long-term, and immediate effects that reach far beyond the actual users of these systems.
Wright, David R.
core   +1 more source

Diseño e implementación robótica de un sistema de atención en cuidados en niños a propósito de la disfagia

open access: yesENE. Revista de Enfermería
La aplicación de las tecnologías a diversas disciplinas ha abierto campos de investigación interdisciplinar. Ejemplo de ello es el actual eHealth entre Enfermería y Tecnología.
Blanca Gonzalo de Diego   +1 more
doaj  

Home - About - Disclaimer - Privacy