scholarly journals A Portable Lab for the Practical Study of Modern Computer Engineering

Author(s):  
Tiago Dias ◽  
Pedro Sampaio ◽  
Pedro Miguens Matutino

The relevance. The development of technical means for non-destructive testing and remote sensing is an important practical task. This is primarily due to the fact that modern means of non-destructive testing open up ample opportunities for the introduction of new technologies and increase the economic efficiency of measures for the maintenance of various technical and construction objects at a relatively low cost of such work. In this regard, the development of computational algorithms for processing primary data and software products for the subsequent interpretation of the results obtained using computer engineering systems is of great importance. The purpose of the work is to review technical means, signal processing methods and some computer-oriented engineering systems for solving problems of detecting various defects in engineering structures and building structures. Materials and methods. The paper provides a brief overview of methods for processing primary data sets obtained using pulsed GPR. At the next stage, processing is carried out using the GeoVizy program. Finally, the main focus of the work is on the analysis of the capabilities of modern computer engineering tools. Also used the numerical - analytical methods of the modern theory of diffraction and methods of signal analysis in the space-time domain. Results. The results are based not only on scientific articles, but also on the analysis of the capabilities of modern computer modeling systems, as well as some mathematical models obtained by the author. Conclusions. The results presented in the article allow one to talk about a new direction in scientific research. This direction can be defined as combined multi-parametric analysis - CoMPA. The purpose of this direction is to conduct research of various interrelated processes in technical structures by using the methods of mathematical physics, combining not only the analysis of their interaction with fields of different physical nature, but also involving the appropriate models from various areas of mathematical physics. The significance of the results obtained consists not only of new models of data processing and interpretation, but also of the prospects for further progress in the field of technical means of control and diagnostics.


1975 ◽  
Vol 12 (3) ◽  
pp. 235-245
Author(s):  
R. M. Hodgson ◽  
F. W. Stephenson ◽  
D. G. Whitehead

The sophistication of modern computer technology has created a demand for engineers having a new range of skills. The paper discusses the essential ingredients of a course to meet both the above demand and the broader objectives of a university education. The basic philosophy of courses that meet these requirements is considered and, where appropriate, reference is made to our existing scheme.


Author(s):  
Emilian Guțuleac

In order to capture the compartmentation and behaviour of membrane systems for modelling of parallel computing, we introduce the descriptive dynamic rewriting Descriptive Membrane Timed Petri Nets (DM-nets) that can at in run-time modify their own structure by rewriting some of their descriptive expression components. Furthermore, this descriptive approach facilitates the understanding of complex models and their component-based construction as well as the application of modern computer engineering concepts.


1979 ◽  
Vol 18 (04) ◽  
pp. 214-222
Author(s):  
K. Sauter

The problems encountered in achieving data security within computer-supported information systems increased with the development of modern computer systems. The threats are manifold and have to be met by an appropriate set of hardware precautions, organizational procedures and software measures which are the topic of this paper. Design principles and software construction rules are treated first, since the security power of a system is considerably determined by its proper design. A number of software techniques presented may support security mechanisms ranging from user identification and authentication to access control, auditing and threat monitoring. Encryption is a powerful tool for protecting data during physical storage and transmission as well.Since an increasing number of health information systems with information-integrating functions are database-supported, the main issues and terms of database systems and their specific security aspects are summarized in the appendix.


2020 ◽  
pp. 1-12
Author(s):  
Li Dongmei

English text-to-speech conversion is the key content of modern computer technology research. Its difficulty is that there are large errors in the conversion process of text-to-speech feature recognition, and it is difficult to apply the English text-to-speech conversion algorithm to the system. In order to improve the efficiency of the English text-to-speech conversion, based on the machine learning algorithm, after the original voice waveform is labeled with the pitch, this article modifies the rhythm through PSOLA, and uses the C4.5 algorithm to train a decision tree for judging pronunciation of polyphones. In order to evaluate the performance of pronunciation discrimination method based on part-of-speech rules and HMM-based prosody hierarchy prediction in speech synthesis systems, this study constructed a system model. In addition, the waveform stitching method and PSOLA are used to synthesize the sound. For words whose main stress cannot be discriminated by morphological structure, label learning can be done by machine learning methods. Finally, this study evaluates and analyzes the performance of the algorithm through control experiments. The results show that the algorithm proposed in this paper has good performance and has a certain practical effect.


Author(s):  
Asroji Asroji

This study was conducted based on the facts about the lack of maximal outcomes of learning English in almost all levels of education, especially in vocational school. Although English has been studied for many years, but the majority of students can not master English well, especially speaking. Many factors cause this phenomenon, and all parties should concern to work together to formulatebetter system and process of English learning at vocational school.The research was conducted at SMK Negeri 1 Pacitan, by taking the students of class XII as subjects research. The sample of this research consists of 94 students of Business Travel and Tourism,Network Computer Engineering, and Engineering Software classes. This research uses descriptive qualitative method. It is used to describe the students’ speaking competence, particularlyin presenting final task report. This research also identifies the internal and external functions to formulate a strategy to improve the students’s speaking competence. The results showed that based on the analysis of English speaking competency of SMK Negeri 1 Pacitan students, it can be concluded as follows: a). Based on the students absorption analysis of presenting final project report, shows that English competency level of students is in the category of “pretty”, with evidence of the studentsvalue average in presenting final project report is more than the passing grade value (7.50),it is 79.5. While the number of student, who passed the presentation test,is 66 students.So it can be obtained the percentage level of mastery learning students on the presentation test of final report is only 70.21%, and it is categorized “less”, because the percentage of students who passed this exam is still under 75%. b). While the analysis of the questionnaire can be scribed that the average overall score of 3.44 speaking competence components are categorized “pretty”, and it can be concluded that the level of competence of English speaking students generally categorized “enough”. Based on the level ofstudents’ English speaking competence , it can be formulated the strategies to increase its competence. They are: a). Maximizing the use of English as a language instruction and reducing the use of Indonesian, especially in the learning process, to improve English language competency, so that students can have the ability to explain the sequence of events and the students can pass the exam well. b). Having more English presentation activitiesin other topics to encourage the students’ bravery and self-confidence in speaking English, so that students have good Englishcompetence as preparation to getjobs or to continue their study at university.c). Having more exercise of using body language to improve the mastery of speech, and smooth attitude, so that students have good English competence,and they are able to compete in the global world in obtaining employment. d). And maximizing the use of school’s facilities by using various methods of learning, and focusing on the students’ center method to improve the studentsEnglish competency so that they are able to compete for educational scholarships in this country and abroad.


Author(s):  
Felicity Amaya Schaeffer

I argue that we are entering an automated era of border control that I label a border-biosecurity industrial complex. Funded in great part by the Department of Homeland Security (DHS), scientific research and automated surveillance technologies promise the state innovative and supposedly unbiased solutions to the challenge of border control and security. This article spotlights a border surveillance technology called AVATAR (Automated Virtual Agent for Truth Assessment in Real-Time). Analyzing this technology, which was funded by the DHS and developed by faculty at the University of Arizona’s National Center for Border Security and Immigration (BORDERS), allows me to assess how the emphasis on novel technologies to detect terrorists unleashes the search for ubiquitous surveillance devices programmed to detect deviant behavioral and physiological movements. I offer a wider view of this technology-in-the-making by analyzing how university research in aerial defense, the psychology of deception, the life sciences, and computer engineering influences the development of surveillance devices and techniques. I explore how, during a posthuman era, automated technologies detect and racialize “suspect life” under the guise of scientific neutrality and supposedly free from human interference. Suspect life refers to the racial bias preprogrammed into algorithms that compute danger or risk into certain human movements and regions such as border zones. As these technologies turn the body into matter, they present biological life as a more scientifically verifiable truth than human verbal testimony, moving border control from the adjudication of law through the subjective interview to the automated body that speaks a truth more powerful than a complex story can tell.


2013 ◽  
Vol 8 (12) ◽  
pp. 105-108
Author(s):  
Gennady Vasilyevich Kovalenko ◽  
◽  
Michail Aleksandrovich Konovalov ◽  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document