Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
356,977 result(s) for "Computer control"
Sort by:
Application of Computer Control System in Electrical Automation
With the improvement of information technology, China has continuously promoted the development of computer control system of electrical engineering and electrical automation in the current development process. In enterprise production, computer technology can be integrated into electrical engineering and electrical automation to realize real-time monitoring of controlled objects. Electrical engineering automation belongs to the field of modern electrical information, which is widely used in military, aerospace and industry. However, due to the late formation of China’s industrial system, there are still some problems in electrical engineering automation, resulting in serious energy consumption problems. In order to improve the application level of electrical automation control system and create greater benefits for enterprises and society, it is necessary to strengthen the application research of electrical engineering and automation computer control system. Based on the application status of computer control system in electrical automation, this paper discusses the application strategy of computer control system in electrical engineering and electrical automation to promote the further development of electrical engineering technology in China.
The case for open computer programs
Scientific reproducibility now very often depends on the computational method being available to duplicate, so here it is argued that all source code should be freely available. The open road for computer programs Most scientific papers published today rely on computer programs for data collection and manipulation. Writing in the Perspective pages in this issue of Nature , Darrel Ince and colleagues argue that the policies of most journals and funding bodies towards the release of computer codes as part of the publication process are obsolete. They say that the full release of actual source code should be the norm for any scientific results dependent on computation, with an agreed list of exceptions applicable only to rare cases. Current policies range from a requirement for release of the relevant computer programs on request to Nature 's less stringent stipulation of a 'natural language' description of computer algorithms. Scientific communication relies on evidence that cannot be entirely included in publications, but the rise of computational science has added a new layer of inaccessibility. Although it is now accepted that data should be made available on request, the current regulations regarding the availability of software are inconsistent. We argue that, with some exceptions, anything less than the release of source programs is intolerable for results that depend on computation. The vagaries of hardware, software and natural language will always ensure that exact reproducibility remains uncertain, but withholding code increases the chances that efforts to reproduce results will fail.
Gray hat C# : a hacker's guide to creating and automating security tools
\"Teaches how to use C#'s set of core libraries to automate tasks like performing vulnerability scans, malware analysis, and incident response. Teaches how to write practical security tools that will run on Mac, Linux, and mobile devices\"-- Provided by publisher.
Practical data acquisition for instrumentation and control systems
* Covers all aspects of the data acquisition system from design and specification to programming, installation and configuration * Gives both the novice and experienced user a solid understanding of interfacing the PC and standalone instruments to real-world signals from the laboratory to the industrial plant * Provides a thorough grasp of PC data.
Collaborative quality assurance in information systems development : the interaction of software development techniques and team cognition
This book examines how and why collaborative quality assurance techniques, particularly pair programming and peer code review, affect group cognition and software quality in agile software development teams. Prior research on these extremely popular but also costly techniques has focused on isolated pairs of developers and ignored the fact that they are typically applied in larger, enduring teams. This book is one of the first studies to investigate how these techniques depend on and influence the joint cognitive accomplishments of entire development teams rather than individuals. It employs theories on transactive memory systems and functional affordances to provide answers based on empirical research. The mixed-methods research presented includes several in-depth case studies and survey results from more than 500 software developers, team leaders, and product managers in 81 software development teams. The book's findings will advance IS research and have explicit implications for developers of code review tools, information systems development teams, and software development managers.
Taming Dr. Frankenstein: Contract-Based Design for Cyber-Physical Systems
Cyber-physical systems combine a cyber side (computing and networking) with a physical side (mechanical, electrical, and chemical processes). In many cases, the cyber component controls the physical side using sensors and actuators that observe the physical system and actuate the controls. Such systems present the biggest challenges as well as the biggest opportunities in several large industries, including electronics, energy, automotive, defense and aerospace, telecommunications, instrumentation, industrial automation. Engineers today do successfully design cyber-physical systems in a variety of industries. Unfortunately, the development of systems is costly, and development schedules are difficult to stick to. The complexity of cyber-physical systems, and particularly the increased performance that is offered from interconnecting what in the past have been separate systems, increases the design and verification challenges. As the complexity of these systems increases, our inability to rigorously model the interactions between the physical and the cyber sides creates serious vulnerabilities. Systems become unsafe, with disastrous inexplicable failures that could not have been predicted. Distributed control of multi-scale complex systems is largely an unsolved problem. A common view that is emerging in research programs in Europe and the US is “enabling contract-based design (CBD),” which formulates a broad and aggressive scope to address urgent needs in the systems industry. We present a design methodology and a few examples in controller design whereby contract-based design can be merged with platform-based design to formulate the design process as a meet-in-the-middle approach, where design requirements are implemented in a subsequent refinement process using as much as possible elements from a library of available components. Contracts are formalizations of the conditions for correctness of element integration (horizontal contracts), for lower level of abstraction to be consistent with the higher ones, and for abstractions of available components to be faithful representations of the actual parts (vertical contracts).
Beyond cybersecurity : protecting your digital business
\"The book's content is based on McKinsey's proprietary research, client experience and interviews with over 200 executives, regulators and security experts. This effort has four main findings: Pervasive digitization, open and inter-connected technology environments and sophisticated attackers make cyber-attacks a critical social and business issue that could materially slow the pace of technology and bushiness innovation with as much as $3 trillion in aggregate impact. There's a high degree of consensus among enterprise technology executives about the nature of a step-change capability improvement required to make their institutions cyber-resilient. While institutions need to start acting to improve their capabilities now, there should be enhanced collaboration across the cyber-security ecosystem to get alignment on a broad range of policy issues. Progress toward cyber-resiliency can only be achieved with active engagement from the most senior business and public leaders\"--Publisher's description.
Research on the Application of Automatic Production Line Based on Computer Control Technology
Information technology and computer technology in every field of society are playing a huge role, in the field of automatic production, computer technology with its strong operation and calculation ability and data processing ability, further promote the centralized control of automatic assembly line. In the future, it is an inevitable trend for computer system to replace human control. The application of computer technology can not only greatly improve the control efficiency, but also save manpower and material resources to a greater extent, and promote the progress of production level as a whole. Computer control technology is a computer-based technology. It is of great significance to analyze the application of computer control technology in automatic production line. Just as technology has changed our lives, it has also changed the way we produce and work. Nowadays, with the development of computer technology, network technology, information technology and other high and new technologies, all fields of the society have undergone earth-shaking changes, including the field of industrial production. Now the industrial production has realized the automatic assembly line production, and in order to better control the automatic assembly line production, in order to ensure its production efficiency, safety and stability, it must be applied to the computer control technology. At the same time, the application of computer control technology also helps to save human and material resources, thus saving the overall production cost and improving the economic efficiency of enterprises.