The Transition from Desktop Computers to Tablets: A Model for Increasing Resource Efficiency?

Author(s):  
Roland Hischier ◽  
Patrick A. Wäger
1982 ◽  
Vol 21 (04) ◽  
pp. 181-186 ◽  
Author(s):  
M. A. A. Moussa

A drug information system (DARIS) has been created for handling reports on suspected drug reactions. The system is suitable for being run on desktop computers with a minimum of hardware requirements: 187 K read/write memory, flexible or hard disc drive and a thermal printer. The data base (DRUG) uses the QUERY and IMAGE programming capabilities for data entry and search. The data base to statistics link program (DBSTAT) enables data transfer from the data base into a file for statistical analysis and signalling suspected adverse drug reactions.The operational, medical and statistical aspects of the general population voluntary adverse drug reaction monitoring programme—recently initiated in the State of Kuwait—are described.


TAPPI Journal ◽  
2014 ◽  
Vol 13 (11) ◽  
pp. 37-43 ◽  
Author(s):  
LIISA KOTANEN ◽  
MIKA KÖRKKÖ ◽  
ARI ÄMMÄLÄ ◽  
JOUKO NIINIMÄKI

The use of recovered paper as a raw material for paper production is by far the most economical and ecological strategy for the disposal of waste paper. However, paper production from recovered paper furnish generates a great amount of residues, and the higher the demand requirements for the end product, the higher the amount of rejected material. The reason for this is that the selectivity of the deinking process is limited; therefore, some valuable components are also lost in reject streams. The rejection of usable components affects the economics of recycled paper production. As the cost of waste disposal continues to increase, this issue is becoming more and more severe. This paper summarizes the current state of the resource efficiency in recycled pulp production and provides information on the volumes of rejected streams and the usable material within them. Various means to use these reject streams are also discussed, including the main findings of a recent thesis by the main author. This review summarizes current internal and external use of reject streams generated in the deinking operations.


Author(s):  
Marie-Pascale Chagny ◽  
John A. Naoum

Abstract Over the years, failures induced by an electrostatic discharge (ESD) have become a major concern for semiconductor manufacturers and electronic equipment makers. The ESD events that cause destructive failures have been studied extensively [1, 2]. However, not all ESD events cause permanent damage. Some events lead to recoverable failures that disrupt system functionality only temporarily (e.g. reboot, lockup, and loss of data). These recoverable failures are not as well understood as the ones causing permanent damage and tend to be ignored in the ESD literature [3, 4]. This paper analyzes and characterizes how these recoverable failures affect computer systems. An experimental methodology is developed to characterize the sensitivity of motherboards to ESD by simulating the systemlevel ESD events induced by computer users. The manuscript presents a case study where this methodology was used to evaluate the robustness of desktop computers to ESD. The method helped isolate several weak nets contributing to the failures and identified a design improvement. The result was that the robustness of the systems improved by a factor of 2.


Author(s):  
Michael D. Franzen ◽  
Matthew J. L. Page

There has been an explosion in the development of electronic methods for psychological assessment. These include use of handheld devices, desktop computers, and platform-based Internet methods. This development has occurred separately in the commercial environment and in the research environment. This development of new methods presents great promise to improve the accuracy, ecological validity, and range of constructs in psychological assessment. However there are also many problems involved in the development of these electronic methods, including the need to train clinicians in their use, the need to develop safeguards for privacy, and the need to develop methods to ensure the integrity of the data collected. This chapter outlines some of the main considerations in moving forward.


Endeavour ◽  
1993 ◽  
Vol 17 (4) ◽  
pp. 200
Author(s):  
David Nicholson-Cole
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document