networked computers
Recently Published Documents


TOTAL DOCUMENTS

57
(FIVE YEARS 3)

H-INDEX

8
(FIVE YEARS 0)

Electronics ◽  
2021 ◽  
Vol 10 (21) ◽  
pp. 2720
Author(s):  
Yongseok Choi ◽  
Eunji Lim ◽  
Jaekwon Shin ◽  
Cheol-Hoon Lee

Large-scale computational problems that need to be addressed in modern computers, such as deep learning or big data analysis, cannot be solved in a single computer, but can be solved with distributed computer systems. Since most distributed computing systems, consisting of a large number of networked computers, should propagate their computational results to each other, they can suffer the problem of an increasing overhead, resulting in lower computational efficiencies. To solve these problems, we proposed an architecture of a distributed system that used a shared memory that is simultaneously accessible by multiple computers. Our architecture aimed to be implemented in FPGA or ASIC. Using an FPGA board that implemented our architecture, we configured the actual distributed system and showed the feasibility of our system. We compared the results of the deep learning application test using our architecture with that using Google Tensorflow’s parameter server mechanism. We showed improvements in our architecture beyond Google Tensorflow’s parameter server mechanism and we determined the future direction of research by deriving the expected problems.


2021 ◽  
pp. 48-61
Author(s):  
Katherine Thomson-Jones

This chapter takes up the aesthetic implications of images belonging to digital schemes. I consider how the most basic feature of digital scheme types—namely, their inherent replicability—properly conditions appreciation of digital artworks. Returning to the art examples from chapter 1, I show that the inherent replicability of digital imagery does not guarantee the multiple instantiability of digital image-based works. In the digital age artists face a choice as to whether to limit their works to a particular exhibition space, or make their works universally available on the screens of networked computers. I explore the interpretive significance of this choice and the way such significance rests on recognition of the underlying digital structure of an artwork.


Tech-E ◽  
2021 ◽  
Vol 4 (2) ◽  
pp. 30
Author(s):  
Dram Renaldi ◽  
Elza Satrio Aziz

Augmented Reality has entered technology trends in all fields, both marketing and education, Augmented Reality media also requires users to be comfortable when interacting. SMKN 1 Tangerang organizes a distance education system with various methods, in this case the subject which is Basic Computer Networks uses mobile-based learning simulations with Augmented Reality which aims to develop students' abilities in the world of networked computers independently. This system also requires a user experience and user interface development method, namely Luther's Multimedia Development Life Cycle model because it has six stages, namely concept, design, data collection, merging, testing, and distribution, resulting in interactive applications.


2018 ◽  
pp. 209-222
Author(s):  
Rajeshkumar M. Gamit

This research study aims to investigate the usage of electronic information resources by postgraduates‟ students of Gujarat University, Ahmedabad, Gujarat. Using the research is survey method approach, the simple random sampling was used to selected responded from among the postgraduate students from 200 to 500 all types of users that came to use the library within the study period. The research tool used for data collection was a questionnaire tagged ‟Usage of Electronic information resources”. A total of 240 questionnaires were distributed of which 172 were duly filled giving a response rate of 71.66%. The finding revealed that 89.54% of the respondents had use of electronic information resources; with 10.46% respondents are not use of electronic information resources. The main access points were home/hostels; only 19.76% of respondents had used the library to access electronic information resources and 80.24% of them were satisfied with the library electronic information resources. The major electronic information resources are used by postgraduate students were internet search engines, e-lecture notes and e-books and they use it for completing class assignments, to obtain course related materials. Training of postgraduate students in electronic information resources searching skill by the library; the provision of internet and networked computers in department and lecturers giving assignment that require use of electronic information resources would increase the use of electronic information resources among the postgraduate students.


2017 ◽  
Vol 20 (7) ◽  
pp. 2534-2549
Author(s):  
Robert Hassan

The essay argues that a proper ethical foundation for the political processes underlying liberal democracy is unattainable in a globalized society made possible through networked computers – and the transformed relationship with temporality that is generated by them. The essay brings together the computer ethics of Norbert Wiener and the temporal ethics of Hans Jonas to show that both original visions for a better world are unrealizable in the unanticipated context of what is termed ‘network time’. The essay argues further that to develop an ethical basis for liberal democracy, digital logic and its effects must be contrasted with that which they ceaselessly colonize and marginalize today: an irreducibly analogue world, with analogue politics, analogue technologies and analogue humans who conceived and developed liberal democracy as a cornerstone of the project of Enlightenment. Through contrast and critique, the essay reveals the difficulty for any ethico-political project within the digital and argues that the present post-modern relationship with computing, in which ‘market forces’ determine technological forms and applications, is socially destructive and must be brought under a new aegis of democratic and common responsibility.


2016 ◽  
Vol 40 (3) ◽  
pp. 354-358 ◽  
Author(s):  
Christopher D. Johnson ◽  
Laura E. A. Montgomery ◽  
Joe G. Quinn ◽  
Sean M. Roe ◽  
Michael T. Stewart ◽  
...  

This laboratory session provides hands-on experience for students to visualize the beating human heart with ultrasound imaging. Simple views are obtained from which students can directly measure important cardiac dimensions in systole and diastole. This allows students to derive, from first principles, important measures of cardiac function, such as stroke volume, ejection fraction, and cardiac output. By repeating the measurements from a subject after a brief exercise period, an increase in stroke volume and ejection fraction are easily demonstrable, potentially with or without an increase in left ventricular end-diastolic volume (which indicates preload). Thus, factors that affect cardiac performance can readily be discussed. This activity may be performed as a practical demonstration and visualized using an overhead projector or networked computers, concentrating on using the ultrasound images to teach basic physiological principles. This has proved to be highly popular with students, who reported a significant improvement in their understanding of Frank-Starling's law of the heart with ultrasound imaging.


Author(s):  
Judith Donath

The early days of social media saw tremendous optimism about the transformations that connecting people via networked computers would bring. This chapter, the book’s epilogue, analyses the nostalgia that permeates the preceding chapters, in which the pioneers of the field write with nostalgia for creative freedom, the pre-commercial internet and the hopeful time when people believed that computing would change humanity for the better. The world of dial-up modems and floppy disks and ASCII bulletin board systems seems very long ago. But the ideals of that time, in spite of their naiveté, indeed because of it, are very valuable. Untainted by cynicism or corrupted by practicalities, they remind us of what the social net ought to be; they remind of the direction to head in, even if we will not quite get there. By inculcating ideals into mythic origin stories, nostalgia weaves them into a culture: we create the past that we want to live up to.


Cyber Crime ◽  
2013 ◽  
pp. 474-523
Author(s):  
Kunal Sharma ◽  
A.J. Singh

The rising number of networked computers and the evolution of the WWW have witnessed the emergence of an E-World where the users are often referred to as e-people. In the new e-world, the evolution of WWW and Internet applications has become a focal point to the question of sustainable competitive advantage (Brennan & Johnson,2001).The increase in information access terminals along with the growing use of information sensitive applications such as e-commerce, e-learning, e-banking and e-healthcare have generated a real requirement of reliable, easy to use, and generally acceptable control methods for confidential and vital information. On the other hand, the necessity for privacy must be balanced with security requirements for the advantage of the general public. Current global events have shown the significance to provide the police, airport area, and other exposed area, new reliable component security tools such as biometrics. Access to systems that need security from unauthorized access is generally restricted by requesting the user to confirm her identity and to authenticate. Payment systems are undergoing radical changes stirred largely by technical advancement such as distributed network technology, real-time processing and online consumers’ inclination to use e-banking interfaces making the study of biometrics even more important in this new E-World.


2011 ◽  
Vol 7 (3) ◽  
Author(s):  
Jerry Bowskill ◽  
Nick Dyer

The world of telecommunications is being rapidly redefined by the Internet. Longer-term trends show that mobile, networked computers will form the basis of the future of personal communications. Not only is the telephone handset becoming mobile, by defauit, but the boundary between phone and computer is set to disappear. Networks for mobile devices are also changing fast, within the next five years the global mobile network will support megabit rather than the current kilobit connections. In summary most phones are becoming mobile, phones are becoming computers and the underlying network is becoming a fast global TCP/IP network.DOI: 10.1080/0968776990070305 


Sign in / Sign up

Export Citation Format

Share Document