Comparison of search techniques (printed and computerised) with specific reference to the RTECS databank

1985 ◽  
Vol 10 (2) ◽  
pp. 79-86 ◽  
Author(s):  
Anne Costigan ◽  
Frances E. Wood ◽  
David Bawden

A comparative evaluation of three implementations of a large databank, the NIOSH Registry of Toxic Effects of Chem ical Substances, has been carried out. The three implementa tions are: a printed index, a text searching computer system, and a computerised chemical databank system, with substruc ture searching facilities. Seven test queries were used, with the aim of drawing conclusions of general relevance to chemical databank searching. The computer systems were shown to have advantages over printed indexes for several of the queries, including those involving an element of browsing. Substructure search facilities were especially advantageous. Aspects of indexing of data present, and the criteria for inclusion of types of data, were also highlighted.

2020 ◽  
Author(s):  
S Mukhtar Ayubi Simatupang

AbstrakBrainware adalah istilah yang digunakan untuk manusia yang digunakan untuk manusia yang berhubungan dengan sistem komputer. Manusia merupakan suatu elemen dari sistem komputer yang merancang bagaimana suatu mesin dapat bekerja sesuai dengan hasil yang diinginkan. Tingkatan brainware terdiri atas system analyst, programmer, administrator, dan operator. Bagian bagian brainware terdiri atas operator komputer, teknisi, trainer, konsultan, project manager, programmer, grapic designer, spesialis jaringan, database administrator, dan system analitis. Kata Kunci : Brainware (Perangkat Sumber Daya Manusia)AbstractBrainware is a term used for humans that is used for humans related to computer systems. Humans are an element of a computer system that designs how a machine can work in accordance with the desired results. The brainware level consists of system analysts, programmers, administrators, and operators. The brainware section consists of computer operators, technicians, trainers, consultants, project managers, programmers, grapic designers, network specialists, database administrators, and system analytics.Keywords: Brainware (Human Resources Tool)


Author(s):  
Joshua A. Kroll

This chapter addresses the relationship between AI systems and the concept of accountability. To understand accountability in the context of AI systems, one must begin by examining the various ways the term is used and the variety of concepts to which it is meant to refer. Accountability is often associated with transparency, the principle that systems and processes should be accessible to those affected through an understanding of their structure or function. For a computer system, this often means disclosure about the system’s existence, nature, and scope; scrutiny of its underlying data and reasoning approaches; and connection of the operative rules implemented by the system to the governing norms of its context. Transparency is a useful tool in the governance of computer systems, but only insofar as it serves accountability. There are other mechanisms available for building computer systems that support accountability of their creators and operators. Ultimately, accountability requires establishing answerability relationships that serve the interests of those affected by AI systems.


1988 ◽  
Vol 13 (1) ◽  
pp. 25-32 ◽  
Author(s):  
T V Seshadri ◽  
N Kinra

Who, in the organization, buys the computer system? How are various departments involved in the organizational decision process? T V Seshadri and N Kinra analyse the decision processes of 30 organizations that had bought a computer system—mini, mainframe, or macro. Based on a questionnaire study and factor analysis, the authors conclude that the EDP department and Board of Directors are critical in the buying grids of the purchasing organizations. They draw implications of their findings for managers marketing computer systems.


1984 ◽  
Vol 28 (11) ◽  
pp. 963-967 ◽  
Author(s):  
Dana S. Kay ◽  
John B. Black

This study examined the changes in the knowledge representations of text-editing commands as experience increases. Novices appear to organize the commands by their definitions, whereas experts use both command definitions and command sequence configurations to organize the commands. Thus, it appears that declarative knowledge is the first type of knowledge to be acquired in learning text-editing commands. At a more general level, experts and novices both organized their commands along three general dimensions, but the third dimension was different for the two groups. The results of this study, in conjunction with previous computer system studies, suggests an incremental model of the acquisition of computer-related knowledge in which there are changes in both the content and the representation of the knowledge.


2015 ◽  
Vol 07 (02) ◽  
pp. 1550009 ◽  
Author(s):  
Gianluca De Marco ◽  
Evangelos Kranakis

Diagnosing the quality of components in fault-tolerant computer systems often requires numerous tests with limited resources. It is usually the case that repeated tests on a selected, limited number of components are performed and the results are taken into account so as to infer a diagnostic property of the computer system as a whole. In this paper we abstract fault-tolerant testing as the following problem concerning the color of the majority in a set of colored balls. Given a set of balls each colored with one of two colors, the majority problem is to determine whether or not there is a majority in one of the two colors. In case there is such a majority, the aim is to output a ball of the majority color, otherwise to declare that there is no majority. We propose algorithms for solving the majority problem by repeatedly testing only k-tuple queries. Namely, successive answers of an oracle (which accepts as input only k-tuples) to a sequence of k-tuple queries are assembled so as to determine whether or not the majority problem has a solution. An issue is to design an algorithm which minimizes the number of k-tuple queries needed in order to solve the majority problem on any possible input of n balls. In this paper we consider three querying models: Output, Counting, and General, reflecting the amount and type of information provided by the oracle on each test for a k-tuple.


Author(s):  
Franco Gabriel Caballero-Julián ◽  
Maricela Morales-Hernández ◽  
Eric Mario Silva-Cruz ◽  
Diego Gabriel Caballero-Cantarell

Today, there is an innumerable amount of electronic devices and computer systems that are oriented as platforms for the management of information through the network; manipulating data and at the same time, performing tasks using low voltage electronic signals. They can activate, deactivate or control a device or a system using sensors. In this context, the Raspberry Pi platform has an interface composed of a set of pins (GPIO) through which voltage signals can be accessed, and can interact with other electrical and electronic systems for data acquisition and control. This article aims to facilitate access to the Raspberry Pi platform from its installation, configuration, to its programming of the ports through examples and instructions, considering the platform as a computer system. The interest of the authors is to provide the reader with the tools, so that the programming of specific applications is the new challenge.


2019 ◽  
Vol 8 (2) ◽  
pp. 1608-1611 ◽  

Malware are the serious threat to the computer systems. Malware are written for many reasons: for stealing confidential data, for financial gain or to affect the working of the computer system. Ransomware is the most disastrous kind of malware which encrypts the user’s whole data and demands ransom (money) to decrypt the data. The user has to pay ransom for getting the decryption key. This becomes the nuisance of encryption algorithms which are used in ransomware attacks. In this paper, a study of ransomware malware is done with the perspective of encryption algorithms.


1997 ◽  
Vol 43 (5) ◽  
pp. 908-912 ◽  
Author(s):  
Kenneth E Blick

Abstract Areas other than the analytical process should be the focus of concern about quality issues in the laboratory because nearly 95% of errors occur at the nonanalytical front and back ends of the testing process. Until now, computer systems have been designed to handle the more predictable aspects of laboratory testing, necessitating that the infrequent and unpredictable data events be handled by manual systems. The manual systems are termed “workarounds” and indeed, because they occur sporadically, they are frequently not handled predictably. Here, I describe and give examples of an expert laboratory computer system that can be designed to handle both predictable and unpredictable data events without the use of manual workarounds. This expert system works in concert with a dynamic database allowing such data events to be detected in real time and handled predictably, thus providing a tool to address quality assurance issues throughout the testing process. The system performs up to 31 separate actions or tasks based on data events that in the past were handled by human workarounds.


Author(s):  
M. W.M. Jaspers

Daily use of computer systems often has been hampered by poorly designed user interfaces. Since the functionality of a computer system is made available through its user interface, its design has a huge influence on the usability of these systems (Carroll, 2002; Preece, 2002). From the user’s perspective, the user interface is the only visible and, hence, most important part of the computer system; thus, it receives high priority in designing computer systems. A plea for human-oriented design in which the potentials of computer systems are tuned to the intended user in the context of their utilization has been made (Rossen & Carroll, 2002). An analysis of the strategies that humans use in performing tasks that are to be computer-supported is a key issue in human-oriented design of user interfaces. Good interface design thus requires a deep understanding of how humans perform a task that finally will be computer-supported. These insights then may be used to design a user interface that directly refers to their information processing activities. A variety of methodologies and techniques can be applied to analyze end users’ information processing activities in the context of a specific task environment among user-centered design methodologies. More specifically, cognitive engineering techniques are promoted to improve computer systems’ usability (Gerhardt-Powels, 1996; Stary & Peschl, 1998). Cognitive engineering as a field aims at understanding the fundamental principles behind human activities that are relevant in the context of designing a system that supports these activities (Stary & Peschl, 1998). The ultimate goal is to develop end versions of computer systems that support users of these systems to the maximum in performing tasks in such a way that the intended tasks can be accomplished with minimal cognitive effort. Empirical research has indeed shown that cognitively engineered interfaces are considered superior by users in terms of supporting task performance, workload, and satisfaction, compared to non-cognitively engineered interfaces (Gerhardt-Powels, 1996). Methods such as the think aloud method, verbal protocol analysis, or cognitive task analysis are used to analyze in detail the way in which humans perform tasks, mostly in interaction with a prototype computer system.


Sign in / Sign up

Export Citation Format

Share Document