scispace - formally typeset
Search or ask a question

Showing papers on "Personal computer published in 2022"


Journal ArticleDOI
TL;DR: In this paper, a proper orthogonal decomposition with interpolation (PODI) method was proposed for real-time simulation of indenter contact problems, where the indentation depth and contact location are respectively used to interpolate POD basis vectors and POD coefficients by Lagrange interpolation with a congruence transformation and radial basis function interpolation.

4 citations


DOI
01 Jan 2022
TL;DR: In this paper, the authors study the various blockchain implementation frameworks for electronic medical record management in general and electronic medical records management of healthcare in particular, and propose a blockchain-based approach for the management of medical records.
Abstract: The last decade has seen the rise of innovations such as smart computers, wearable devices, smartphones, digital cameras, robots, social media networks, and ICT advancements in day-to-day life, leading to the digitization of numerous activities. Advances in trending technologies have contributed to their adaptation in every part of human’s daily routine. Almost all healthcare-associated domains are now adapting to eHealth. Health professionals have been able to collect medical records, exchange medical data through a network of professionals and patients, provide healthcare through digital media, and track various health-related events, diseases, and disease outbreaks through a range of technologies, such as social media sites, applications, smartphones, and smart objects. This has resulted in an ample amount of knowledge related to patients that is created and needs to be handled effectively for better results. Although big data is the obvious option to handle this vast data collection, data protection and security for public health data is a prime concern. A blockchain is known as a record database located in a distributed personal computer network called nodes. In particular, it is a mutual, permanent record of peer-to-peer transactions constructed from linked blocks of transactions and stored in a digital ledger. No single person owns it, i.e., it is decentralized. The healthcare sector is one of the sectors looking to embrace the blockchain. This chapter aims to reflect the numerous facts leading to the introduction of blockchain technology in general and electronic medical record management of healthcare in particular. The chapter will study the various blockchain implementation frameworks.

3 citations


Journal ArticleDOI
TL;DR: This paper explores the possibility of running scientific and engineering programs on personal computers and compares the obtained power efficiency on these systems with that of mainframe computers and even supercomputers.
Abstract: The demand for electricity related to Information and Communications Technologies is constantly growing and significantly contributes to the increase in global greenhouse gas emissions. To reduce this harmful growth, it is necessary to address this problem from different perspectives. Among these is changing the computing scale, such as migrating, if possible, algorithms and processes to the most energy efficient resources. In this context, this paper explores the possibility of running scientific and engineering programs on personal computers and compares the obtained power efficiency on these systems with that of mainframe computers and even supercomputers. Anecdotally, this paper also shows how the power efficiency obtained for the same workloads on personal computers is similar to that obtained on supercomputers included in the Green500 ranking.

3 citations


Book ChapterDOI
01 Jan 2022
TL;DR: A virtual keyboard model is designed, which is based on image processing using an inbuilt camera, which can be modified to serve various types of augmented reality (AR), paper, and air keyboard purposes.
Abstract: Today, with this fast-changing world, portability is one of the critical factors for consumers when choosing a personal computer (PC). Still, the conventional hardware keyboard is a significant limitation in desktops and notebooks. Virtual keyboard prototype solves hardware limitations of the keyboard by presenting an easy and economical alternative using minimum external hardware. In this paper, we have tried to design a virtual keyboard model, which is based on image processing using an inbuilt camera. After that, the basic framework of this can be modified to serve various types of augmented reality (AR), paper, and air keyboard purposes.

3 citations


Journal ArticleDOI
TL;DR: In this paper , a review examined how to assess the clinical benefit of brain-computer interfaces for the control of a personal computer and found that a variety of different patient-reported outcome measures can be used to evaluate improvements in how a patient feels, and some considerations that should guide instrument selection.
Abstract: Brain-computer interfaces (BCIs) enabling the control of a personal computer could provide myriad benefits to individuals with disabilities including paralysis. However, to realize this potential, these BCIs must gain regulatory approval and be made clinically available beyond research participation. Therefore, a transition from engineering-oriented to clinically oriented outcome measures will be required in the evaluation of BCIs. This review examined how to assess the clinical benefit of BCIs for the control of a personal computer. We report that: (a) a variety of different patient-reported outcome measures can be used to evaluate improvements in how a patient feels, and we offer some considerations that should guide instrument selection. (b) Activities of daily living can be assessed to demonstrate improvements in how a patient functions, however, new instruments that are sensitive to increases in functional independence via the ability to perform digital tasks may be needed. (c) Benefits to how a patient survives has not previously been evaluated but establishing patient-initiated communication channels using BCIs might facilitate quantifiable improvements in health outcomes.

2 citations


Journal ArticleDOI
TL;DR: In this paper , the authors evaluated young consumers' behavior in personal electronic equipment usage and disposal and highlighted the importance of raising awareness of formal e-waste management routes among university students as well as the general public.
Abstract: Consumer behavior has a significant impact on determining the best approaches for achieving circular economy goals. In this study, young consumers’ behavior in personal electronic equipment usage and disposal was evaluated. In Sri Lanka, 96% of university students have laptop computers and 100% have mobile phones. Meanwhile, mobile phone availability is 1.37 per capita, which is a comparatively higher value according to global statistics. Average possession time, reasons for obsolescence of personal electronic equipment, and awareness of e-waste characteristics are in accordance with global trends. Consumers are aware of the hazardous nature of e-waste, but their awareness of e-waste management schemes available in the country is drastically low. Their participation in formal e-waste management is also low. Stockpiling of end of use personal electronics is common in Sri Lanka; 1.77 ± 1.88 mobile phones and 0.72 ± 0.97 laptop computers per capita are in hibernation, which is a higher value when compared to global levels. More than 75% of the sample declared that they store e-waste at home. Hence, the study emphasizes the importance of raising awareness of formal e-waste management routes among university students as well as the general public. However, it is noteworthy that consumers are concerned about the risk of information recovery from end-of-life personal electronics. As a result, if personal electronics recycling goals are to be met, data destruction must also be ensured.

2 citations


Journal ArticleDOI
TL;DR: In this paper , a developed automated device for the formation of electrocatalytic layers used in electrochemical systems, and the issues of development of the sputtering technology, which allows to obtain the best parameters of the formed active layers.
Abstract: The paper describes the developed automated device for the formation of electrocatalytic layers used in electrochemical systems, and the issues of development of the sputtering technology, which allows to obtain the best parameters of the formed active layers. The general scheme of the automated device includes a system of automatic positioning of the spraying head according to two coordinates, driven by stepper motors controlled by a personal computer, an ultrasonic mini-disperser, a spraying head, ultrasonic generators for the ultrasonic mini-disperser, and the ultrasonic spraying head. Stepper motors were controlled by microprocessor system based on 8-bit Atmel AT90S2313 single-chip microcontroller and standard buffer microcircuits. The key actuating element of the device and the process is the developed atomizing head with an integrated ultrasonic homogenizer that prevents sedimentation of the catalytic composition. The overall automation circuit designed and reproduced to control all electronic devices was described in detail. It differed by application of Attiny2313 microprocessor for the control, availability of communication with personal computer via RS-485 interface that allowed not only to switch the disperser on/off, but also to control its working frequency directly from the personal computer. It was envisaged both manual control of stepper motor controller via control buttons and control from external personal computer, which had the opportunity to control spraying program step by step. In this case all the sequence of steps is contained in the personal computer memory, it is transmitted to the stepper motor controller step-by-step as the program is being executed. Algorithms for moving the spraying head that provide the best drying of catalytic composition in the process of its application have been developed. The effectiveness of the developed automated device has been shown by comparing it with manual application by a specialist according to such criteria as the rate of application of electrocatalytic layers and their quality. The created device, algorithms of its operation, software and scientific and technological advance, in general, can be used for the formation of various coatings both in electrochemical technologies and in other fields.

1 citations


Journal ArticleDOI
TL;DR: In this paper, a frequency-domain (FD) EM response was used as the data for the 3D inversion of a TEM field dataset acquired in the northeastern Qinshui Basin, Shanxi Province, China demonstrated a real-world application.

1 citations


Journal ArticleDOI
TL;DR: In this article , the main purpose to create a personal finance app is to manage private money, track spendings, and plan out a budget, which is a finance plan that allocates future personal income towards expenses, savings, and debt repayment.
Abstract: Abstract: The main purpose to create a personal finance app is to manage private money, track spendings, and plan out a budget. These apps are also known as Money Saving apps because it enables the app users to borrow, lend, and even invest money. Personal budget management is a finance plan that allocates future personal income towards expenses, savings, and debt repayment. Past spending and personal debts are considered when creating a personal budget. Budgeting is the most basic and effective tool for managing our monthly income. But most people avoid doing it because they think keeping a record of budget or expense is a hectic task Recording monthly expenses on paper are very difficult as modification, removal, and searching are not easy on paper. Similarly using any which run on our computers like MS excel or any other tool is also clumsy. Because we will have to note all expenses on paper then later record them all on the tool installed on a computer. Better solutions use mobile applications to keep a record of every expense easily at any location. In this project, our task is to develop an Android-based application that will be used to manage personal budget Index Terms: Personal Finance Application, Budgeting, Graph, Proposed work, Managing Finance.

Proceedings ArticleDOI
24 Jul 2022
TL;DR: In this paper , the authors found statistically significant differences in the indicator of a low level and a very low level of personal identity according to the φ*-Fischer criterion.
Abstract: Обнаружены статистически достоверные различия по показателю низкого уровня и очень низкого уровня личностной идентичности по критерию φ*-Фишера. В выборке подростков с суицидальными намерениями у большинства отмечается низкие и очень низкие уровни личностной идентичности, чем у подростков без суицидальных попыток. Statistically significant differences were found in the indicator of a low level and a very low level of personal identity according to the φ*-Fischer criterion. In the sample of adolescents with suicidal intentions, the majority have low and very low levels of personal identity than in adolescents without suicidal attempts.

Journal ArticleDOI
TL;DR: In this paper , the authors discuss hardware and software methods of protecting the resources of the personal data information system from unauthorized access by means of "sniffing attacks", the essence of which is to intercept data that is delivered within the observed system in the form of packets.
Abstract: Objective. The article discusses hardware and software methods of protecting the resources of the personal data information system from unauthorized access by means of "sniffing attacks"; the essence of which is to intercept data that is delivered within the observed system in the form of packets.Method. The analysis of the security of resources by the personal data information system regarding unauthorized access to data by means of "sniffing attacks" includes five conditional stages: collecting information in the personal data information system, scanning the personal data information system, gaining access to the personal data information system, securing personal data in the information system, generating a report; at the same time, security analysis it is always associated with unauthorized access to data.Result. To prevent unauthorized access to data by means of "sniffing attacks", the following software and hardware solutions are proposed to minimize the consequences of unauthorized exposure to the personal data information system: the use of the HTTPS protocol, a secure version of the HTTP protocol; the use of a static ARP table generated manually; scanning of the computer network of the personal data information system by the AntiSniff program; encryption of the computer network traffic networks of the personal data information system.Conclusion.The presented hardware and software solutions allow minimizing the consequences of unauthorized impact on personal data information systems.

Book ChapterDOI
01 Jan 2022
TL;DR: The computer network is the core of the infrastructure that facilitates communication between the computers, printers, laptops, and other devices that the company uses as discussed by the authors , and it can be seen as the backbone of the Internet.
Abstract: The computer network is the core of the infrastructure that facilitates communication between the computers, printers, laptops, and other devices that the company uses. When personal computers were first introduced to the office, the network limited communications to the computers that were physically in the office. As time progressed, these networks connected to the internet, allowing communication with other organizations and the outside world. Today, the computer network has much more than just computers on it. The network at a company today could have security cameras, door locks, badge readers, telephones, call center wall boards, cash registers, printers, scanners, customer computer kiosks, and of course employee computers.

Proceedings ArticleDOI
Yang Chen1
24 Oct 2022
TL;DR: In this article , a personal HSM is built over a grid of secure elements, and runs two TLS daemons, one for secure element programming, and another one for service interface.
Abstract: This paper presents experimental results in order to estimate speedup factor for personal HSM. A personal HSM is built over a grid of secure elements, and runs two TLS daemons, one for secure element programming, and another one for service interface. We presents on original personal HSM, working with secure element processors and I 2 C bus, which supports up to 16 secure elements. We perform tests that open simultaneous TLS sessions and compute signatures. The speedup factor is in the range 50 to 100. Finally we try to find an optimal performance/cost balance, and we argue that personal HSMs may have a better price to performance ratio than traditional HSMs in a not so far future.

Posted ContentDOI
04 Jan 2022
TL;DR: In this paper , a learning-curve approach has been employed to study inventiveness in the computer industry and the appearance of new models and new computer manufacturers have been following typical logistic S-curves over the last 26 years of computer history.
Abstract: A learning-curve approach has been employed to study inventiveness in the computer industry. The appearance of new models as well as the appearance of new computer manufacturers have been following typical logistic S-curves over the last 26 years of computer history. Innovation seems to come in S-waves, and even though many of today's major manufacturers are close to exhausting their maximum innovation potential in their present S-wave, the overall computer market is rather “young”. In contrast, the personal computer market is already beyond its maturity phase. Remarkably invariant over the 26 years considered, and through the complete range of computer sizes, remains the fact that for every five new computer models appearing on the market, there is one new computer company emerging also.

Journal ArticleDOI
27 Apr 2022
TL;DR: In this paper , the authors examined nurses' perceptions of personal digital assistants used as a barcode scanner for medication administration, blood transfusions, and blood collection, and found that the drawbacks resulted in delays in nursing workflow for patient care.
Abstract: Personal digital assistants can perform multiple functions such as Internet search, documentation, calculating, and barcode scanning. This study examined nurses' perceptions of personal digital assistants used as a barcode scanner for medication administration, blood transfusions, and blood collection. A total of 236 nurses participated in the survey using the instrument developed by the researchers. The data collected were analyzed using descriptive statistics, one-way analysis of variance, and the Scheffe test. Written responses to the advantages and drawbacks of using personal digital assistants were categorized by meaning. The results showed that the nurses perceived more drawbacks than advantages in using personal digital assistants because of nonworking barcodes, prescription practice requiring additional scanning, poor interfacing between personal digital assistants and the EMR, and frequent Wi-Fi disconnection. The drawbacks resulted in delays in nursing workflow for patient care. Therefore, increasing the availability of barcode scanning for all medications applicable to personal digital assistant use, redesigning the practice of current prescriptions to eliminate additional scanning, and seamless interfacing between personal digital assistants and EMRs should be considered. This enables the nurses to use personal digital assistants more efficiently and effectively for patient care.


Journal ArticleDOI
TL;DR: In this paper , an Analog to Digital Converter in the microcontroller converts these sensor input to digital code and fed to Bluetooth module via Universal asynchronous receiver/transmitter (UART) which triggers the module to transmit the signals to the computer.
Abstract: In this paper there are two parts, Transmitter and Receiver. The transmitter side is designed with Peripheral interface controller (PIC), Bluetooth, limit switches and Micro electro mechanical systems (MEMS). In the receiver side there are Bluetooth and Personal Computer with Visual Basic 6.0. In the transmitter, the signals sensed by the accelerometer and limit switches, then it is given input to the microcontroller. The Analog to Digital Converter in the microcontroller converts these sensor input to digital code and fed to Bluetooth module via Universal asynchronous receiver/transmitter (UART) which triggers the module to transmit the signals to the computer. At the computer, Bluetooth captures these signals. Thus, according to the movement of hand, cursor is moved and according to limit switch press, functions analogous to clicking the button is carried out in Personal Computer with the help of Visual Basic 6.0.

Journal ArticleDOI
TL;DR: The use of a mouthwash from a well-known Russian commercial and industrial company helped to reduce the number of saliva components exposed to electromagnetic radiation from a personal computer.
Abstract: Subject is oral fluid and its changes under the influence of electromagnetic radiation from a personal computer. Purpose of research is to identify changes in the physicochemical parameters of the mixed saliva of users before and after working on the computer; to determine the protective properties of the mouthwash against the impact of computer electromagnetic radiation on the oral fluid. Methodology. The research work involved 20 men aged 20–24 years. The study consists of two blocks. The first block is aimed at identifying changes in the physicochemical parameters of mixed saliva under the influence of electromagnetic radiation from a personal computer. The second block is focused on determining the protective properties of the rinse aid of a well-known Russian brand from the effects of electromagnetic radiation from a personal computer on the oral fluid. The material of the study is oral fluid, which was used for potentiometric determination of pH, acid and alkaline buffer capacities, surface tension, total protein concentration, inorganic phosphorus, ammonium, potassium, sodium, magnesium, calcium, and α-amylase activity. The obtained data were processed in the Statistica 8.0 program. Basic statistics are applied, multiple comparison of fees using the Friedman criterion. Pairwise comparison of collections was carried out using the Wilcoxon test. The result is presented as the median (lower and upper quartiles). Differences were considered significant at p < 0.05. Results. The action of the electromagnetic field of a personal computer caused a decrease in the level of most of the physicochemical parameters of mixed saliva. The use of a mouthwash from a well-known Russian commercial and industrial company helped to reduce the number of saliva components exposed to electromagnetic radiation from a personal computer. Conclusion. The electromagnetic radiation of a personal computer has an adverse effect on the physicochemical parameters of mixed saliva. The rinse aid makes it possible to stabilize the changes in the mixed saliva of a person, caused by the action of the electromagnetic field of a personal computer. This hygienic product can be considered as a way to protect the oral fluid of computer users from the adverse effects of electromagnetic radiation from a personal computer.

Journal ArticleDOI
TL;DR: In this paper , the attitudes of algorithmic consumers toward businesses gathering and using their personal information were analyzed using SPSSAU software, and an empirical study was conducted to find that the overall attitude of consumers toward the use of their personal data by companies is neutral, and there is some correlation between various aspects.
Abstract: A new type of customer, the algorithmic consumer, has evolved as a result of the combination of algorithms and the Internet. Enterprises provide different marketing strategies for algorithmic consumers based on collecting and using their personal information. This paper focuses on the attitudes of algorithmic consumers toward businesses gathering and using their personal information. This study analyzed the questionnaire data using SPSSAU software. The questionnaire was designed based on the ABC attitude model, and an empirical study was conducted to find that the overall attitude of algorithmic consumers toward the use of their personal information by companies is neutral, and there is some correlation between various aspects.

Proceedings ArticleDOI
13 Oct 2022
TL;DR: In this article , the authors demonstrate the possibilities of what can be done with a mobile device and one's own remote personal computer which are within the reach of the internet by using ESP8266 Wi-Fi module, Arduino Leonardo and 3.3V relay switch.
Abstract: This work demonstrates the possibilities of what can be done with a mobile device and one’s own remote personal computer which are within the reach of the internet. The proposed system makes use of both software and hardware to enable an individual to power up his computer remotely from a location, provided there is power supply and internet connection on both sides. This work intends to demonstrate a small application of what can be done with this technology. A computer can be remotely powered up, followed by logging in and instructed to start up the web server software (Xampp) to enable the personal computer to receive client requests over the internet. The website that the personal computer hosts would be a simple upload download website to enable file transfer between one’s mobile and computer over the internet. More features can be added to the website according to the needs. Finally, the user can stop his web server software and shut down his computer. The required devices in this work would be the desktop personal computer and an android smartphone with both sides having an internet connection. The hardware include the ESP8266 Wi-Fi Module, Arduino Leonardo and 3.3V Relay switch. Each of the programmable device is loaded with its corresponding software for proper functioning. The android smartphone has to be installed with the React-Native application built specifically for this work and the computer has to be installed with the web-server software along with the required php files to handle the client HTTP requests. The IP address of the PC must be entered in order to access its website. Through the website, the user can upload and download the files. The Arduino Leonardo does the job of the keyboard. It is programmed in such a way that upon receiving appropriate serial string messages, the Arduino throws out the appropriate keyboard commands to the computer which is connected to it via a USB serial port. The ESP8266 Wi-Fi module (commonly known as Node MCU) is programmed to connect to Wi-Fi followed by being available to accept client requests and to perform the operations according to the client’s request. The Node MCU is responsible for majority of the tasks as it is connected to the Relay Switch which is to power up the computer. It is also connected to the Arduino Leonardo and serially communicates to it to throw appropriate keyboard commands to the personal computer on occurrence of certain events. The Node MCU is sort of like the external miniature PC/Web Server to power up the actual personal computer.


Journal ArticleDOI
TL;DR: In this article , a compact pocketable CO2-measuring device is built on a small printed circuit board (PCB) with the dimensions of ca. 8.5 × 3 cm.

Journal ArticleDOI
TL;DR: In this article , the authors developed a linear mathematical model and conducted a survey of the model of protection of personal data from a set of specific network parameters and the intensity of data transmission in social networks.
Abstract: In Ukraine, the right to protection of personal data is a constitutional guarantee, and the protection of personal data is one of the areas in which such a guarantee should be implemented. The subject of our research will not be objects in general, but dynamic systems of information protection in social networks in the mathematical sense of the term. The study developed a linear mathematical model and conducted a survey of the model of protection of personal data from a set of specific network parameters and the intensity of data transmission in social networks. Dependencies are considered: the amount of information flow in the social network from the components of information protection, personal data, and data flow rate; security of the system from the size of the system and from the amount of personal data; information security threats from a set of specific network parameters.A system of linear equations is obtained, which consists of the equation: rate of change of information flow from social network security and coefficients that reflect the impact of security measures, amount of personal data, leakage rate, changes in information protection from a set of specific network parameters, its size, personal data protection As a result of solving the system of differential equations, mathematical and graphical dependences of the indicator of personal data protection in the social network on various components are obtained. Considering three options for solving the equation near the steady-state of the system, we can conclude that, based on the conditions of the ratio of dissipation and natural frequency, the attenuation of the latter to a specific value is carried out periodically, with attenuation: amplitude, or exponentially fading law. A more visual analysis of the system behavior is performed, moving from the differential form of equations to the discrete one and modeling some interval of the system's existence. Mathematical and graphical dependences of the frequency of natural oscillations of the system, the period of oscillations, and the attenuation coefficient are presented. Simulation modeling for values with deviation from the stationary position of the system is performed. As a result of the simulation, it is proved that the social network protection system is nonlinear.

Journal ArticleDOI
TL;DR: In this paper , a 32-bit ARM microcontroller programmed with the open source Mecrisp dialect of the Forth interpreter language is used to set the frequency, and read the data from the analog-to-digital converter.


Journal ArticleDOI
TL;DR: In this paper , the photon energy and angle response of the radiophotoluminescence (RPL) personal dosimetry system used at the Paul Scherrer Institute (PSI) in terms of the operational quantities for external radiation exposure personal dose, Hp, and personal absorbed dose in local skin, Dlocal skin, defined in the Report 95 of the International Commission on Radiation Measurements and Units (ICRU).

Journal ArticleDOI
TL;DR: In this article , the authors present a brief background of the personal computer boom in Lagos, including the early history of computing and the rise of technology entrepreneurship in Nigeria, and discuss the impact of Nigeria's structural adjustment program on the expansion of the local computing industry.
Abstract: This article presents a brief background of the personal computer boom in Lagos, including the early history of computing and the rise of technology entrepreneurship in Nigeria. I then discuss the impact of Nigeria's structural adjustment program on the expansion of the local computing industry. Next, I detail the landscape of Nigerian personal computer boom in late 1980s and 1990s and discuss how innovative technologists drove the industrial and societal expansion of computer use in Nigeria by responding to the demands of global capital and state economic policies. Finally, I explore the reasons behind the eventual decline of the personal computer boom and examine its impact on Nigerian information technology, particularly focusing on relationships between the political and socioeconomic environment and broader industry changes.