desk computer
Recently Published Documents


TOTAL DOCUMENTS

21
(FIVE YEARS 0)

H-INDEX

6
(FIVE YEARS 0)

Author(s):  
A. Amali Mary Bastina ◽  
N. Rama

<div><p>The raise in the recent security incidents of cloud computing and its challenges is to secure the data. To solve this problem, the integration of mobile with cloud computing, Mobile biometric authentication in cloud computing is presented in this paper. To enhance the security, the biometric authentication is being used, since the Mobile cloud computing is popular among the mobile user. This paper examines how the mobile cloud computing (MCC) is used in security issue with finger biometric authentication model. Through this fingerprint biometric, the secret code is generated by entropy value. This enables the person to request for accessing the data in the desk computer. When the person requests the access to the authorized user through Bluetooth in mobile, the Authorized user sends the permit access through fingerprint secret code. Finally this fingerprint is verified with the database in the Desk computer. If it is matched, then the computer can be accessed by the requested person.</p></div>


2008 ◽  
Vol 373-374 ◽  
pp. 400-403 ◽  
Author(s):  
Sheng Zhu ◽  
Fan Jun Meng ◽  
De Ma Ba

A remanufacturing system based on robot MAG surfacing has been developed recently. In this paper, the work principle, functions and composition of this system are introduced. A worn metal part to be remanufactured should be preprocessed firstly, and the defective model of the part gained by reversing engineering technology is compared with normal model of the metal part, then the prototyping path layout is carried out combined with MAG welding process, finally the remanufacturing prototyping is implemented. The remanufacturing system is composed of robotic system (as executing machine), 3D laser scanner (as reversing scanning device), digital pulse MAG welding power source (as prototyping equipment), desk computer (as central control unit) and software modules that support various functions. The functions of the remanufacturing system comprise calibration of system, part reversing measurement, data processing, defective model reconstruction, welding remanufacturing prototyping path layout and etc. It is indicated that the exploitation of the remanufacturing system will provide an effective way for the remanufacturing of metal defective parts.


1993 ◽  
Vol 37 ◽  
pp. 21-25
Author(s):  
Michèle Louër ◽  
Daniel Louër

The determination ab initio of crystal structures from powder diffraction data has been the most striking advance of modern powder crystallography. It is a consequence of the major developments occurred in instrument resolution, powder pattern indexing and Fitting techniques, e.g. the problem of peak overlap resulting from the collapse of the three dimensional pattern into one dimensional powder diffraction data has been circumvented by the advent of the Rietveld method. A structure analysis starting from scratch involves successive stages from the collection of high quality powder diffraction data to the refinement of the atomic coordinates by the Rietveld method. Since the pioneering work by Werner and co-workers a number of crystal structures solved from powder diffraction data, collected with synchrotron and conventional sources have been reported. With the growing development of this important application of the powder method, integrated softwares for solving crystal structures are now of interest, and a number of programs are available for the analysis of the different stages of a structural study. These programs combine computer routines for the treatment of powder diffraction data and routines used in conventional structure determination from single crystal data. Most of these programs have been listed in the Powder Diffraction Program Information 1990 Program List. Owing to the efficiency of modern personal computers, solving a crystal structure ab initio from powder diffraction data can now be carried out with a desk computer.


1988 ◽  
Vol 33 (2) ◽  
pp. 112-117 ◽  
Author(s):  
A.C. Carr ◽  
A. Ghosh ◽  
I.M. Marks

Twenty phobic outpatients were treated by 9 weekly “interviews” at the console of a desk computer. Using a conversational style and multiple choice questions, the computer assessed the symptoms and agreed a hierarchy of self-exposure tasks. Each week the patient was given a diary sheet of tasks to practise daily. At his next visit his progress and motivation were assessed, and if he was succeeding he was encouraged to accept progressively more difficult tasks. This group was compared with a group of 20 patients (matched for age, sex and type of phobia) treated conventionally by a therapist in the preceding year. Progress was measured on standardized scales (both self- and clinician-rated). The two groups showed significant improvement on all the scales, and 75–80% of each group were much improved (scores reduced by 50%). The therapist treated group tended to be more severely ill at entry and to show greater improvement during treatment. Improvement was maintained at 6 month follow-up in both groups.


1985 ◽  
Vol 87 ◽  
pp. 13-20 ◽  
Author(s):  
V. Cerdá ◽  
J.M. Estela ◽  
R. Jara ◽  
J. Lumbiarres

1985 ◽  
Vol 68 (2) ◽  
pp. 201-208 ◽  
Author(s):  
D. Geiseler ◽  
J. D. S. Kay ◽  
V. G. Oberholzer ◽  
J. W. T. Seakins ◽  
M. Hjelm

1. A method is described by which the rate of synthesis of urea can be calculated from the change of plasma concentration of urea after an alanine load. 2. The results can be expressed in terms of f, the maximum increase in the rate of urea synthesis, and t, the time at which urea synthesis reaches its maximum. 3. These parameters are calculated by an algebraic curve-fitting technique which is suitable for a desk computer. 4. The method removes the need for isotopic analysis and urine collections. 5. The effect of various errors and experimental conditions on the calculated synthesis parameters is investigated.


1985 ◽  
Vol 169 ◽  
pp. 397-402 ◽  
Author(s):  
J. Cantallops ◽  
J.M. Estela ◽  
V. Cerdá

1984 ◽  
Vol 26 (1-2) ◽  
pp. 159-165
Author(s):  
F. Gaizer ◽  
Gy. Bazsa ◽  
A. Puskás ◽  
I. Horváth

Sign in / Sign up

Export Citation Format

Share Document