scholarly journals LITHORISK.COM: the novel version of a software for calculating and visualizing the risk of renal stone

Urolithiasis ◽  
2020 ◽  
Author(s):  
Martino Marangella ◽  
Michele Petrarulo ◽  
Corrado Vitale ◽  
Piergiuseppe Daniele ◽  
Silvio Sammartano

AbstractEstimation of state of saturation with stone-forming salt represents a reliable tool to assess the overall risk. The available methods are based on computer-assisted ab initio calculations. Our earlier method URSUS was subsequently substituted by Lithorisk®, a software including visualization of risk profiles. Unfortunately, Lithorisk does not adapt to new versions of Windows® and Macintosh® Apple, neither runs on smartphones or tablets. We propose a novel version of the software which can be directly used online on any device equipped by different operating systems. Upon online connection and after registration, the software is ready for unlimited accesses, in either Italian, English or French. After digiting input variables (urea and creatinine also included) in a fixed dashboard, state of saturation is promptly given. In addition to state of saturation (ß) with calcium oxalate, brushite and uric acid, ß struvite and cystine are available. Both input variables and ß results are graphically depicted as green or red horizontal bars to indicate recommended values. The software was implemented with equations allowing to omit sulphate and ammonium excretion for users with difficult access to these measurements. This simplified version, tested for ßCaOx and ßBsh on 100 urine samples showed close correlation with the full version. The software gives a list of total and free concentrations and soluble complex species distribution. Results can be printed or saved as PDF. So, we propose an easily accessible software to estimate state of saturation usable on any operating system and personal device.

Author(s):  
Adnan Hajar

The use of traditional approaches to teach Operating Systems usually lacks the visual aspect. The following research investigates the novel use of DEVS (Discrete Even Visualization and Simulation) in simulating the operation of an operating system. Cd boost++ was the framework of choice for this project. The simulation successfully mimicked the work of an operating system by simulating multiple cycles of program requests. This simulation is capable of further enhance the explanation of how an operating system works. The cases studied in this work include: 1- two processes running concurrently doing multiple IO’s, 2-four processes running concurrently based on a first come first serve scheduling algorithm, and 3- 20 processes running concurrently using highest priority scheduling algorithm. Output observation of the last case show promising results of successful use of DEVS and cd boost++ as a framework to build an operating system.


2018 ◽  
Vol 2018 ◽  
pp. 1-10 ◽  
Author(s):  
Roberto Rodriguez-Zurrunero ◽  
Ramiro Utrilla ◽  
Elena Romero ◽  
Alvaro Araujo

Wireless Sensor Networks (WSNs) are a growing research area as a large of number portable devices are being developed. This fact makes operating systems (OS) useful to homogenize the development of these devices, to reduce design times, and to provide tools for developing complex applications. This work presents an operating system scheduler for resource-constraint wireless devices, which adapts the tasks scheduling in changing environments. The proposed adaptive scheduler allows dynamically delaying the execution of low priority tasks while maintaining real-time capabilities on high priority ones. Therefore, the scheduler is useful in nodes with rechargeable batteries, as it reduces its energy consumption when battery level is low, by delaying the least critical tasks. The adaptive scheduler has been implemented and tested in real nodes, and the results show that the nodes lifetime could be increased up to 70% in some scenarios at the expense of increasing latency of low priority tasks.


2020 ◽  
Vol 3 (2) ◽  
pp. 163-168
Author(s):  
Ruri Ashari Dalimunthe ◽  
Riki Andri Yusda ◽  
William Ramdhan

Abstract: Community service activities entitled "Installation of Operating Systems Based on Windows 10" aims to provide information to students from MAN Asahan about Installing Windows Operating Systems. The method used in this activity is a direct observation of the MAN Asahan school by watching and analyzing the problems or troubleshooting that occurs at the Computer Lab at MAN Asahan. In addition, information on problems in the computer Labs of the school was also carried out by a team of lecturers as the perpetrators of this community service by way of direct interviews with the Teachers and employees who served in the Computer Lab of the MAN Asahan school. The end result of this dedication is how students can repair computers, as well as troubleshooting that occurs on school computers and computers at home, can be overcome alone without having to use computer repair services.Keywords: installation; operating system; Windows 10 Abstrak: Kegiatan pengabdian kepada masyarakat yang diberi judul “Instalasi Sistem Operasi Berbasis Windows 10” bertujuan untuk memberikan informasi kepada siswa dan siswi MAN Asahan tentang Instalasi Sistem Operasi Windows. Metode yang digunakan dalam kegiatan ini adalah observasi langsung ke sekolah MAN Asahan dengan melihat serta menganalisa permasalahan ataupun troubleshooting yang terjadi pada Laboratorium Komputer disekolah MAN Asahan. Selain itu, Informasi permasalahan pada komputer Lab sekolah juga dilakukan tim dosen selaku pelaku kegiatan pengabdian ini dengan cara wawancara langsung kepada Guru dan pegawai yang bertugas di Lab Komputer sekolah MAN Asahan. Hasil akhir dari pengabdian ini adalah bagaimana siswa dan siswi dapat memperbaiki komputer serta troubleshooting yang terjadi pada komputer sekolah maupun komputer dirumah dapat teratasi sendiri tanpa harus memakai jasa perbaikan komputer. Kata kunci: instalasi; sistem operasi;  windows 10


Author(s):  
Michael Stubbs

Abstract In an influential book on literary linguistics, first published in 1981 and revised in 2007, Geoffrey Leech and his colleague Mick Short discuss linguistic methods of analysing long texts of prose fiction. This article develops their arguments in two ways: (1) by relating them to classic puzzles in the philosophy of science; and (2) by illustrating them with a computer-assisted study of Bram Stoker’s 1897 novel Dracula. This case study shows that software can identify a linguistic feature of the novel which is central to its major themes, but which is unlikely to be consciously noticed by human readers. Quantitative data on the novel show that it contains a large number of negatives. Their function is often to deny something which would normally be expected, and therefore to express the protagonists’ distrust of their own senses in the extraordinary world in which they find themselves.


Author(s):  
Ritu Sharma

Technology is being used and improved by human beings over a long period of time now and Smartphones is one of them. Smart Phones contain touch screen, built in keyboard, high resolution camera, front side camera for video conferencing, etc. They are used for making and receiving calls, sending and receiving messages, accessing the Internet, digital media, incorporating audio/video recording etc. Different smart phones have different operating systems and mobile applications are developed for each operating system in smart phones, tablet or mobile phones, in order to serve the needs of the user. These apps are either preinstalled or downloadable from online app market that can do almost everything. Apps make a mobile be like a portable computer having multi core processors, gigabytes of memory and a real operating system. Originally mobile apps were made available for only calling, messaging and informational purposes like calendar, weather forecast, e- mail, etc. With improvement in technology and increase in user demands, developers started making apps for other purposes like games, banking, video chats etc. Some apps are also used to present data in the same format as on a computer website and also allow you to download content that you can use when there is no Internet. There are many apps available in market today for different Operating Systems in which Android is having the maximum market share these days.


2016 ◽  
Vol 13 (1) ◽  
pp. 204-211
Author(s):  
Baghdad Science Journal

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will be generated by the server. An authentication and key exchange will be based on standard protocol SSL/TLS. Various operating systems from open source and windows will be used. Each operating system uses a different hardware specification. Tools such as tcpdump and jperf will be used to verify and measure the connectivity and performance. OpenVPN in the LAN is based on the type of operating system, portability and straightforward implementation. The bandwidth which is captured in this experiment is influenced by the operating system rather than the memory and capacity of the hard disk. Relationship and interoperability between each peer and server will be discussed. At the same time privacy for the user in the LAN can be introduced with a minimum specification.


Author(s):  
Olivier Piccin ◽  
Pierre Renaud ◽  
Laurent Barbe´ ◽  
Bernard Bayle ◽  
Benjamin Maurin ◽  
...  

In this paper, a new robotized needle insertion device is proposed for computer-assisted percutaneous therapy. The insertion device is integrated in a robotic system dedicated to gesture guidance in a Computed Tomography (CT) scan. The presented design fulfills the stringent requirements of such a medical application: compatibility with a CT-scan and haptic control by the practitioner are ensured as well as safety and sterilization. The novel design of the insertion device is first presented, outlining its main properties, before introducing preliminary experimental results.


2016 ◽  
Vol 4 (1) ◽  
pp. 54-66
Author(s):  
Nguyen Khanh ◽  
Jimin Lee ◽  
Susan Reiser ◽  
Donna Parsons ◽  
Sara Russell ◽  
...  

A Methodology for Appropriate Testing When Data is Heterogeneous was originally published and copy written in the mid-1990s in Turbo Pascal and a 16-bit operating system.  While working on an ergonomic dissertation (Yearout, 1987), the author determined that the perceptual lighting preference data was heterogeneous and not normal.  Drs. Milliken and Johnson, the authors of Analysis of Messy Data Volume I: Designed Experiments (1989), advised that Satterthwaite’s Approximation with Bonferroni’s Adjustment to correct for pairwise error be used to analyze the heterogeneous data. This technique of applying linear combinations with adjusted degrees of freedom allowed the use of t-Table criteria to make group comparisons without using standard nonparametric techniques.  Thus data with unequal variances and unequal sample sizes could be analyzed without losing valuable information.  Variances to the 4th power were so large that they could not be reentered into basic calculators.  The solution was to develop an original software package which was written in Turbo Pascal on a 7 ¼ inch disk 16-bit operating system.  Current operating systems of 32 and 64 bits and more efficient programming languages have made the software obsolete and unusable. Using the old system could result either in many returns being incorrect or the system terminating.  The purpose of this research was to develop a spreadsheet algorithm with multiple interactive EXCEL worksheets that will efficiently apply Satterthwaite’s Approximation with Bonferroni’s Adjustment to solve the messy data problem.  To ensure that the pedagogy is accurate, the resulting package was successfully tested in the classroom with academically diverse students.  A comparison between this technique and EXCEL’s Add-Ins Analysis ToolPak for a t-test Two-Sample Assuming Unequal Variances was conducted using several different data sets.  The results of this comparison were that the EXCEL Add-Ins returned incorrect significant differences.  Engineers, ergonomists, psychologists, and social scientists will find the developed program very useful. A major benefit is that spreadsheets will continue to be current regardless of evolving operating systems’ status.


Author(s):  
Dewi Nusraningrum ◽  
Salmi Mohd. Isa ◽  
Dipa Mulia

The application of industry 4.0 has been doing in many countries in the world today even some developed countries have headed to industry 5.0, nevertheless in Indonesia there are still many companies that have not implemented industry 4.0. This research aims to find out the extent of the implementation of industry 4.0 in Indonesia, especially the industry located on the island of Java.The industry 4.0 aspects as a benchmark of differentiator from previous industrial developments is worth scrutinized to know its application levels in the service and manufacturing industries. Although many industries still combine their operating system between the 4.0 industry and conventional operating systems. The populations are the services and manufacturing companies. The data was obtained by using a questionnaire distributed online to respondents with a purposive sampling method. The data was grouped according to The level of implementation and is centered. The calculation and percentage results demonstrate that the level of implementation of the 4.0 industry with a technology base in service companies and manufacturing companies are at a managed level. It illustrates that the companies being researched have not been fully on the demands of the 4.0 industry.


Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


Sign in / Sign up

Export Citation Format

Share Document