Computer Science for (Live) Modernism(s)?

2020 ◽  
pp. 113-130
Author(s):  
Louise Kane

This chapter frames little magazines and periodicals as modernist objects which are often preoccupied with their own materiality in a distinct and unprecedented manner. To illustrate this principle, I argue that the little magazine represents the textual equivalent of what is known in the field of Computer Science as a metaobject, a part of a computer system that has the power to modify and update itself via a process known as reflection. While the production of a book—the typesetting, printing, and assemblage or ‘gathering’ of pages tended to take place out of the sight of their writers, the limited economic funds of a little magazine meant that their editors had a direct role in the print process. Drawing on examples from global periodicals including the British Rhythm, the Japanese periodical Shirakaba, the American Crisis and Little Review, I argue that it is periodicals’ status as metaobjects that makes them modernist. Their editors’ material choices and continued self-conscious references to the magazine as object (often with a set object) produce uniquely subjective, live reading experiences which characterize magazines as indelibly modern. Their modernisms—able to be experienced just through reading the magazine – are therefore timeless and can be replayed again and again.

1979 ◽  
Vol 9 (3) ◽  
pp. 239-269 ◽  
Author(s):  
Robert De Beaugrande

The following treatise surveys the issues and approaches for designing a computer system capable of reading, understanding, and writing technical reports. Recent progress in computer science and artificial intelligence research is used to specify the nature of the modules in the system. The processing of a sample text is observed during the phases of reading and writing a report on the origin of sunspots. The author advances some proposals for correlating syntax and semantics of English from a procedural standpoint. The discussion is illustrated with structural diagrams.


2011 ◽  
Vol 271-273 ◽  
pp. 1856-1859
Author(s):  
Ya Juan Zhang ◽  
Quan Lub Zheng ◽  
Quan Lu Zheng

As the application of computer system is becoming more and more popular with the development of computer science and technology, the requirements on students’ systematic capability are also becoming increasingly urgent. This paper presents that students’ systematic capability can be cultivated in Compiling Principles courses according to the analysis on its necessity. Also, several measures are proposed to train students to view, analyze and solve a problem in a systematic way based on the present situation in teaching, so as to enhance their systematic capabilities.


1974 ◽  
Vol 3 (23) ◽  
Author(s):  
Robert F. Rosin

<p>Since the typical so-called microprogrammed system provides only hardware oriented input-output facilities, it is highly desirable to supplement this with a nucleus of software supported I/O routines.</p><p>A proposal is set forth for such a nucleus system to be implemented at the lowest level of a multi-level computer system.</p><p>Although the proposal is of a general nature, specific reference is also made to the Rikke-1 hardware being developed in the Computer Science Department at Aarhus University.</p>


2021 ◽  
Vol 12 ◽  
Author(s):  
Ahmed A. Moustafa ◽  
Abubakar Bello ◽  
Alana Maurushat

Information security has for long time been a field of study in computer science, software engineering, and information communications technology. The term ‘information security’ has recently been replaced with the more generic term cybersecurity. The goal of this paper is to show that, in addition to computer science studies, behavioural sciences focused on user behaviour can provide key techniques to help increase cyber security and mitigate the impact of attackers’ social engineering and cognitive hacking methods (i.e., spreading false information). Accordingly, in this paper, we identify current research on psychological traits and individual differences among computer system users that explain vulnerabilities to cyber security attacks and crimes. Our review shows that computer system users possess different cognitive capabilities which determine their ability to counter information security threats. We identify gaps in the existing research and provide possible psychological methods to help computer system users comply with security policies and thus increase network and information security.


2017 ◽  
Vol 28 (3) ◽  
pp. 11-16 ◽  
Author(s):  
Monika Chuchro ◽  
Anna Franczyk ◽  
Barbara Bukowska-Belniak ◽  
Andrzej Leśniak

AbstractIn order to learn about the phenomena occurring in flood embankment under the influence of external factors, including the increasing water level in the river during floods, a Computer System for Monitoring River Embankment (ISMOP) was developed using an experimental flood embankment. The project was carried out by a consortium consisting of AGH University of Science and Technology departments (Computer Science, Hydrogeology and Engineering Geology, Geoinformatics and Applied Computer Science and two companies (NEOSENTIO and SWECO Hydroprojekt Kraków) in co-operation with the Czernichów Community Council.An experimental flood embankment was built with two parallel sections with a length of 150 m and a height of 4.5 m, connected by a meandering, creating a reservoir that can be filled with water. For the construction of the embankment, different types of soils were used in all the five sections. Inside the flood embankment 1300 sensors are placed, including sensors for temperature, pore pressure, vertical displacements, as well as inclinometers. Also fiber optic strands, capable of measuring the temperature of the flood embankment on the upstream side, are located inside the experimental embankment [ismop.pl].Together with the real experiments, numerical modelling using the Itasca Flac 2D 7.0 was performed in order to describe the impact of water pressing on the flood embankment and the impact of increasing and decreasing reservoir water level on the phenomena that occur within the embankment.The results of modelling compared with the real sensor data allowed the evaluation of the current and future state of the embankment. Based on the data measured by the sensors and data received during the numerical modelling, a group of algorithms that allowed detection of anomaly phenomena was developed.


1979 ◽  
Vol 44 ◽  
pp. 41-47
Author(s):  
Donald A. Landman

This paper describes some recent results of our quiescent prominence spectrometry program at the Mees Solar Observatory on Haleakala. The observations were made with the 25 cm coronagraph/coudé spectrograph system using a silicon vidicon detector. This detector consists of 500 contiguous channels covering approximately 6 or 80 Å, depending on the grating used. The instrument is interfaced to the Observatory’s PDP 11/45 computer system, and has the important advantages of wide spectral response, linearity and signal-averaging with real-time display. Its principal drawback is the relatively small target size. For the present work, the aperture was about 3″ × 5″. Absolute intensity calibrations were made by measuring quiet regions near sun center.


2005 ◽  
Vol 41 ◽  
pp. 15-30 ◽  
Author(s):  
Helen C. Ardley ◽  
Philip A. Robinson

The selectivity of the ubiquitin–26 S proteasome system (UPS) for a particular substrate protein relies on the interaction between a ubiquitin-conjugating enzyme (E2, of which a cell contains relatively few) and a ubiquitin–protein ligase (E3, of which there are possibly hundreds). Post-translational modifications of the protein substrate, such as phosphorylation or hydroxylation, are often required prior to its selection. In this way, the precise spatio-temporal targeting and degradation of a given substrate can be achieved. The E3s are a large, diverse group of proteins, characterized by one of several defining motifs. These include a HECT (homologous to E6-associated protein C-terminus), RING (really interesting new gene) or U-box (a modified RING motif without the full complement of Zn2+-binding ligands) domain. Whereas HECT E3s have a direct role in catalysis during ubiquitination, RING and U-box E3s facilitate protein ubiquitination. These latter two E3 types act as adaptor-like molecules. They bring an E2 and a substrate into sufficiently close proximity to promote the substrate's ubiquitination. Although many RING-type E3s, such as MDM2 (murine double minute clone 2 oncoprotein) and c-Cbl, can apparently act alone, others are found as components of much larger multi-protein complexes, such as the anaphase-promoting complex. Taken together, these multifaceted properties and interactions enable E3s to provide a powerful, and specific, mechanism for protein clearance within all cells of eukaryotic organisms. The importance of E3s is highlighted by the number of normal cellular processes they regulate, and the number of diseases associated with their loss of function or inappropriate targeting.


Sign in / Sign up

Export Citation Format

Share Document