4,548 results on '"ELECTRONIC systems"'
Search Results
2. Smart regulatory inspection in research reactor using balis SMILE software.
- Author
-
Wibowo, Arifin M., Palapa, Rizal, and Mardha, Amil
- Subjects
- *
RESEARCH reactors , *SMILING , *ELECTRONIC systems , *LICENSE system , *COMPUTER software - Abstract
Balis SMILE is a software developed by Bapeten to enhance the inspection system in Research Reactor. Balis SMILE stands for Bapeten Licensing and Inspection System – Inspection Management System and Electronic Reporting which utilizes information technology (IT) in collecting the reactor safety parameters data and the other data sent as participation of the licensee workers. The system is analyzing the data based on the safe operation limit (smart system). The result of analyzing can be used to upgrade the detailed inspection in the research reactor. Each analysis is connecting to the Bapeten safety performance indicator (IKK). Compliance with. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
3. Sistema de georreferenciavción y rescate para aeronaves no tripuladas.
- Author
-
Calderon Vega, Harold Yesid, Castañeda Pabón, Daniel Eduardo, and Camargo Casallas, Esperanza
- Subjects
- *
ALTERNATIVE fuels , *DRONE aircraft , *ELECTRONIC systems , *LIGHT intensity , *COMPUTER software , *TRANSMITTERS (Communication) - Abstract
Introduction--It was developed a device that can be conditioned for unmanned aircraft, this device allows that in case an aircraft falls and is lost in a non-specific area, through it the rescue of the aircraft is achieved by sending the coordinate in which it is. Objective--To develop a georeferencing system for unmanned aircraft by implementing an electronic system which can encode and transmit the data of its current position, in addition to developing a visualization system through a detectable circuit to stroboscopic devices feeding these two parts by means of a prototype. which provides alternative energy, all this within a system against impacts. Methodology--It is a device that sends the coordinate using the plate pi in the sky which has the Radiometrix transmitter module, for these tests were made to a remote base where a computer with a series of programs will decode and show the position of this in time real to subsequently achieve his rescue. Results--The Pi in The Sky board was able to implement the project, which is able to encode the coordinate for its subsequent transmission to the base using the Radiometrix module, reaching transmissions over 11km, checking the robust protocol it uses. It was possible to implement a stroboscopic circuit that meets the requirements of the project, obtaining favorable characteristics such as its light intensity and long duration that is around 72 hours active. Conclusions--With this research work it is concluded that the project achieves transmissions more than 11 km away to a remote base without any mishap and thereby obtaining a data frame (latitude longitude and altitude in meters) to achieve its georeferencing at all times. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
4. Applying case-based reasoning in assembly sequence planning.
- Author
-
Su, Q.
- Subjects
CASE-based reasoning ,PRODUCT life cycle ,GENETIC algorithms ,COMPUTER software ,ELECTRONIC systems ,PRODUCT management ,ARTIFICIAL intelligence - Abstract
Assembly sequence planning (ASP) is the foundation of the assembly process planning which plays a key role in the whole product life cycle. In this paper, a unique ASP reasoning method supported by the artificial intelligent technique of case-based reasoning (CBR) is proposed and developed. First, based on the previous ASP literatures review and the CBR characteristics analysis, the systematic architecture of the CBR based ASP is presented. Then, some key techniques including assembly case modelling, similar case retrieving, case based reasoning, and case base maintenance, etc., are explored thoroughly. To enhance the efficiency and quality of the reasoning process, genetic algorithm (GA) is designed and applied to automatically inferring of the reference assembly sequence. Finally, the corresponding software system with an engineering example is given to demonstrate the effectiveness of the CBR based ASP. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
5. Trust Extension for Commodity Computers.
- Subjects
- *
COMPUTER security , *COMPUTER network security , *ELECTRONIC systems , *COMPUTER software , *ACCESS control , *ELECTRONIC information resources , *INTERNET security - Abstract
The article focuses on trust extensions for commodity computers. Topics include secure systems software development, the creation of trust extension systems through network protocols, and the practice of bootstrapping trust. Information is provided on security features in commodity computers, trusted platform modules (TPMs), and network access during malware breaches and computer security attacks. The article also discusses how to execute code securely without vulnerabilities in computer security systems. INSET: Security Features in Commodity Computers.
- Published
- 2012
- Full Text
- View/download PDF
6. Interactive Marketing Models.
- Author
-
Aake, David A. and Weinberg, Charles B.
- Subjects
INTERACTIVE marketing ,MARKETING models ,MARKETING software ,COMPUTER systems ,DECISION making ,DECISION making in marketing ,PREDICTION models ,COMPUTER software ,ELECTRONIC systems ,MARKETING research ,MARKETING strategy ,INDUSTRIAL costs ,EQUIPMENT & supplies - Abstract
The article reports on the development of interactive marketing models than can be used for decision making. The author focuses on identifying the reasons why interactive models supported by computer systems are practical during the 1970s. Costs related to the instillation and use of interactive computer models, including the cost of interface equipment, telephone line use, and software, are discussed as disadvantage to the system. Strategic marketing models utilized by the Coca-Cola Company are also mentioned.
- Published
- 1975
- Full Text
- View/download PDF
7. DEVELOPER-USER INTERACTION AND USER SATISFACTION IN INTERNAL TECHNOLOGY TRANSFER.
- Author
-
LEONARD-BARTON, DOROTHY and SINHA, DEEPAK K.
- Subjects
TECHNOLOGY transfer ,BUSINESS & education ,ELECTRONIC industries ,TECHNOLOGICAL innovations ,COMPUTER software ,COST effectiveness ,CUSTOMER satisfaction ,COMPETITIVE advantage in business ,ORGANIZATIONAL change ,ELECTRONIC systems ,TECHNOLOGICAL forecasting ,INTEGRATED software - Abstract
Effective internal technology transfer - the implementation of technical systems developed and disseminated to operational subunits within a single organization -depends not only upon the cost, quality, and compatibility of the technology, but also upon two processes of interaction between developers and users. These are user involvement in development and adaptation by the developers and users of both the technical system itself and the workplace. Analyses of data from 34 projects in four large electronics companies provide support for our hypotheses. [ABSTRACT FROM AUTHOR]
- Published
- 1993
- Full Text
- View/download PDF
8. MAINFRAME STATISTICS ON A MICRO?
- Author
-
Collins, Robert H.
- Subjects
COMPUTER software ,COMPUTER systems ,ELECTRONIC systems ,COMPUTER networks - Abstract
The article reviews several computer software programs including the SPSS/PC, BMDPC and SAS.
- Published
- 1986
9. Concurrent engineering: decomposition and scheduling of design activities.
- Author
-
Kusiak, Andrew and Park, Kwangho
- Subjects
DECOMPOSITION method ,ELECTRONIC systems ,DESIGN ,PRODUCT management ,CONCURRENT engineering ,SYSTEMS engineering ,SYSTEM analysis ,COMPUTER software ,ORGANIZATION - Abstract
Design of complex products or large scale systems involves hundreds of resources (designers, analysts, computers, software systems, and procedures) and thousands of design activities. In this paper, a methodology is presented for decomposition of the design task into activities and modules. The methodology is based or clustering of design activities into groups that allow effective organization on resources required in the design process. A knowledge-based approach is used for managing design activities. The system performs analysis aiming at exploring concurrency and reducing the design project makespan. [ABSTRACT FROM AUTHOR]
- Published
- 1990
- Full Text
- View/download PDF
10. PRICAPP: A computer assisted process planning system for prismatic components.
- Author
-
Pande, S.S. and Walvekar, M.G.
- Subjects
COMPUTER software ,ELECTRONIC systems ,POWER tools ,PRODUCTION (Economic theory) ,AUTOMATIC machinery ,COMPUTERS ,QUALITY - Abstract
This paper reports on the design and implementation of a Computer Assisted Process Planning System (PRICAPP) for prismatic components used in the batch production of portable electric tools. The software incorporates various modules for component feature representation; automatic machines, toolings and process parameter selection; set-up planning; time calculation and finally report generation. The user friendly software package has been developed on an IBM-PC/XT compatible system. It provides a quick and less costly method for generating consistent process plans. [ABSTRACT FROM AUTHOR]
- Published
- 1990
- Full Text
- View/download PDF
11. A Comparison of Laboratory and Field Research in the Study of Electronic Meeting Systems.
- Author
-
Dennis, Alan R., Nunamaker Jr., Jay F., and Vogel, Douglas R.
- Subjects
DECISION support systems ,DECISION making ,TECHNOLOGY research ,RESEARCH ,ELECTRONIC systems ,MEETINGS ,COMPUTER software - Abstract
Research into the use of Electronic Meeting Systems (EMS) has rapidly increased over the past few years. However, EMS laboratory experiments have often drawn very different conclusions about the effects of EMS use than have EMS field studies--conclusions that at first appear inconsistent. By examining the differences in the design of prior EMS studies, we attempt to better understand the factors that affect the use of EMS technology. It is our contention that these differences in findings are not inconsistent, but rather they reflect different situations that researchers have studied. We identify 24 potentially important differences in organizational contexts, group characteristics, tasks, and EMS environments. In planning future research, EMS researchers need to make explicit design decisions for each of these aspects, and to consider how those choices may affect research results. An analysis of these differences suggests several approaches to enhance the design of future laboratory experiments and field studies. [ABSTRACT FROM AUTHOR]
- Published
- 1990
- Full Text
- View/download PDF
12. Using Two Different Electronic Meeting System Tools for the Same Task: An Experimental Comparison.
- Author
-
Easton, George K., George, Joey F., Nunamaker, Jr., Jay F., and Pendergast, Mark O.
- Subjects
GROUP decision making ,DECISION support systems ,MEETINGS ,ELECTRONIC systems ,COMPUTER software ,BUSINESS communication ,COMPUTER network resources - Abstract
Various aspects of the design and use of Electronic Meeting Systems (EMS) have been investigated in laboratory and field studies, but until now no one has systematically investigated the role of EMS software on group performance. The current study compares two different EMS software tools in a controlled experiment. Dependent variables are decision quality, number of unique alternatives generated, satisfaction, and consensus. The study found that one software tool produced better quality solutions to a combination creativity and intellective task, but the other helped generate more unique alternatives. Each tool worked best on the task for which it was designed. The findings support the authors' premise that there should be a match between the EMS software tool and the task to be performed. The findings have several implications for the design of EMS software. [ABSTRACT FROM AUTHOR]
- Published
- 1990
- Full Text
- View/download PDF
13. Maps on a Micro: Applications in Sales and Marketing Management.
- Author
-
Collins, Robert H., Carey, Regan F., and Mauritson, Rebecca J.
- Subjects
CARTOGRAPHY ,COMPUTER software ,COMPUTER files ,ELECTRONIC systems ,MARKETING ,SALES management - Abstract
The article overviews the components of a mapping system for sales and marketing applications. Mapping of data as an analytical and presentation technique has been around for a long time, but hasn't seen much use in marketing. The reason is simple; producing maps by paper and pencil techniques is tedious, time-consuming, and expensive. They can be difficult to produce and require specialized talents which may not always be available. The base for any mapping system is a computer. Some mapping software packages support more devices than others. All mapping software requires boundary files. Many packages come with a few such files included. These files are not cheap, and they may change. Another component in the mapping system is the specific mapping software package selected. It is this software which merges the boundary file with the data file, compiles and summarizes data into ranges, assigns a color or pattern to each range, and sends the completed computer generated map to the selected output device.
- Published
- 1987
14. Certified Software.
- Author
-
ZHONG SHAO
- Subjects
- *
COMPUTER software , *ELECTRONIC systems , *COMPUTER systems , *PROGRAMMING languages , *ELECTRONIC data processing , *SOFTWARE verification - Abstract
The article discusses difficulties that can exist with computer software. Problems discussed in the article include a lack of metrics to measure software dependability, the dependability of a computer system's software, and software verification problems. Research is being completed on steps that can be taken to make certified software code more dependable. Changes that have been made to programming languages, formal semantics, and program verifications have helped power the advances that have occurred in certified software.
- Published
- 2010
- Full Text
- View/download PDF
15. CVS DISPENSING DRUGS--AND HEALTH REFORM.
- Author
-
Boyle, Matthew
- Subjects
ELECTRONIC health records ,ELECTRONIC systems ,MEDICAL care ,RECORDS management ,HOSPITAL records ,GOVERNMENT policy ,COMPUTER software - Abstract
The article discusses a push by the U.S. government to spend almost $20 billion to digitize medical records. The money is meant to speed the computerization of patient medical data and prescriptions, the article indicates. Commentary is provided by Jeff Goldsmith, author of "Digital Medicine: Implications for Healthcare Leaders."
- Published
- 2009
16. Where have all the traders gone?
- Author
-
Matthews, Robert
- Subjects
- *
STOCKS (Finance) , *INVESTMENT software , *ELECTRONIC systems , *STOCK exchanges , *BANKING industry software , *ALGORITHMS , *COMPUTER software - Abstract
This article examines how technology is changing the traditional work paradigm of Wall Street and other financial centers. Computers who analyze and complete stock trades are making inroads. Called algorithmic trading, it is now handling over 70% of foreign currency trades at Deutsche Bank of London.
- Published
- 2007
- Full Text
- View/download PDF
17. PIRACY, COMPUTER CRIME, AND IS MISUSE AT THE UNIVERSITY.
- Author
-
Cronan, Timothy Paul, Foltz, C. Bryan, and Jones, Thomas W.
- Subjects
- *
COLLEGE students , *GUIDELINES , *SOFTWARE piracy , *COMPUTER software , *UNIVERSITIES & colleges , *ELECTRONIC systems , *COMPUTER systems - Abstract
The article focuses on the effectiveness of computer misuse policies among university students. A study of Midwestern college students found that more than a third of business students, (undergraduate and graduate), had misused computer system resources or software in their lifetimes. Paradoxically, the study found that students who had read the computer misuse policy of the university committed more abuse. Greater familiarity with computers was also an indicator of greater levels of computer misuse; in general, undergraduate misuse was lower than graduate student misuse. The study's implications for corporate computer use policies are discussed.
- Published
- 2006
- Full Text
- View/download PDF
18. MAKING VIRTUAL ENVIRONMENTS COMPELLING.
- Author
-
Whitton, Mary C.
- Subjects
- *
VIRTUAL reality , *COMPUTER simulation , *COMPUTER software , *SIMULATION methods & models , *COMPUTER systems , *ELECTRONIC systems - Abstract
The very idea of a virtual environment (VE) is compelling--being able to go places and do and experience things you couldn't or wouldn't in the real world. The wow factor certainly makes people's initial experience with the technology exciting, along with the fact that most people who have experienced VE's have done so in entertainment venues carefully designed to be engaging and fun. It is the user's immersion in the sights and sounds of the virtual world that sets VE applications apart from their conventional counterparts. However, despite VE- system limitations, compelling and successful VE applications do exist. Some are very compelling because of their realism. Other VE's, while not compelling in the sense of personally gripping, are impressive simply because the application wouldn't exist without VE. A compelling VE application depends on a VE system being able to provide high-quality sensory immersion, a well-designed application, and a motivated user. INSET: PRESENCE..
- Published
- 2003
- Full Text
- View/download PDF
19. TAXONOMY OF SECURITY CONSIDERATIONS AND SOFTWARE QUALITY.
- Author
-
Wang, Huaiqing and Chen Wang
- Subjects
- *
COMPUTER software , *ELECTRONIC systems , *COMPUTER operating systems , *SECURITY management , *APPLICATION software , *COMPUTER networks - Abstract
Today's software often has countless intricate interdependencies on modern operating systems, other enterprise applications and the high-speed networking infrastructure. It is within such highly integrated information technology environments that software security is becoming a focal point for designing, developing and deploying software applications. The study outlines various classes of security-related risks and threats that need to be considered during the design phase of the software development process. The universe of software risks and threats is divided into three categories based on their target of attack: Application layer, Platform layer and Network layer. By taking into consideration security risks and threats and their impact on the quality of the target system, software architects and designers need to select protection mechanisms, the application of appropriate security technologies and approaches to provide necessary safeguards. The study provides today's security professionals with an understanding of the context in which their technologies relate to the entire software system and provide for software security design requirements to be fully analyzed.
- Published
- 2003
- Full Text
- View/download PDF
20. AGILITY--THE KEY TO SURVIVAL OF THE FITTEST IN THE SOFTWARE MARKET.
- Author
-
David, Julie Smith, McCarthy, William E., and Sommer, Brian S.
- Subjects
- *
COMPUTER software industry , *COMPUTER software , *INFORMATION technology , *INDEPENDENT software vendor , *ELECTRONIC systems ,COMPETITION - Abstract
This article discusses various issues related to an evolutionary framework to categorize the enterprise software market. The software industry and information technology (IT) departments are facing extreme pressures to provide new applications that add value in today's competitive environment. In response to traditional and emerging markets, software vendors are realizing they must satisfy the needs of a wide range of companies and to develop applications tailored to each niche. Facing these changes involves the daunting task of understanding key differences among software packages and identifying the major players within each market segment. A framework has been developed that organizes software applications similarly to the evolutionary categorization of animals. This framework can help software buyers identify key differences among currently available systems, and can also help software vendors and customers highlight today's trends, with an eye toward guiding organizations toward future software choices. The ideas of Darwinian evolution can be used to describe the tumultuous IT environment in which enterprises compete.
- Published
- 2003
- Full Text
- View/download PDF
21. COMMUNICATION MANAGEMENT EXPERIENCES IN E-COMMERCE.
- Author
-
Valera, Francisco, Vergara, Jorge E. López de, Moreno, José I., Villagraá, Víctor A., and Berrocal, Julio
- Subjects
- *
JAVA programming language , *CORBA (Computer architecture) , *ELECTRONIC commerce , *COMPUTER software , *ELECTRONIC systems , *INTERNET - Abstract
This article focuses on communication management experiences and its effect on e-commerce. Effective e-commerce relies on an efficient and precise information interchange between participating stakeholders, using the existing infrastructure. The Internet and intranet communication facilities are making the amount of available information quite large, and it continues to increase progressively. Experiences using a multi-agent system (MAS)- based intermediation service for e-commerce, implemented with computer software Java and CORBA are described in this article, with emphasis on communication and management system activities. Using Java as the communication medium between modules inside each domain allows higher speed than using CORBA but requires replacing call-back versatility with a more complex implementation code. At the same time, the application environment does not tend to be extremely distributed or heterogeneous, so that CORBA utilization in intradomain communications could be justified.
- Published
- 2001
- Full Text
- View/download PDF
22. ALL I REALLY NEED TO KNOW ABOUT PAIR PROGRAMMING I LEARNED IN KINDERGARTEN.
- Author
-
Williams, Laurie A. and Kessler, Robert R.
- Subjects
- *
COMPUTER algorithms , *COMPUTER programmers , *COMPUTER software , *INTERCOMMUNICATION systems , *ELECTRONIC systems - Abstract
The article highlights the success of pair programming based on a "pair programming survey," in context of Robert L. Fulgham's essay titled "All I Really Need to Know I Learned in Kindergarten." The article reports that when it comes to programming practices, studies show two heads are almost better than one. Pair programming is a practice in which two programmers work side-by-side at one computer, continuously collaborating on the same design, algorithm, code, or test. Anecdotal and initial statistical evidence indicates pair programming is highly beneficial, which is also attributed by Extreme programming. In the case of transition to pair programming from solitary programming, to avoid hesitation and to work successfully, some principles referred to are sharing of the work, sharing of key board typing and continuous analysis, avoiding negative thoughts, leaving ego etc. As a final thought, the article points out that making transition to pair programming involves breaking down some personal barriers. The success lies in hands of them in understanding the value of intercommunication skills, in confidently sharing the work and accepting the ownership of the partner's work. INSET: All I Really Need to Know I Learned in Kindergarten..
- Published
- 2000
- Full Text
- View/download PDF
23. THE ETHICS OF SAFETY-CRITICAL SYSTEMS.
- Author
-
Bowen, Jonathan
- Subjects
- *
SYSTEM safety , *APPLICATION software , *SYSTEMS engineering , *ELECTRONIC systems , *COMPUTER software , *INFORMATION technology - Abstract
This article focuses on the use of software in safety-critical systems. Computers are used in safety- critical applications. Software decisions are often based on economic rather than safety considerations. It is sometimes assumed that software is totally reliable since software does not wear out. Instead, the errors occur in a much more random and unpredictable manner. Software is a digital rather than analog artifact. As such, techniques like interpolation and extrapolation, used by many hardware engineers in calculations, do not apply. Changing a single bit in a computer program can have a very unpredictable effect on its operation or may be completely benign in some circumstances. The complexity of most software is such that it is extremely difficult to reason about its behavior with great certainty. The highest quality of personnel should be employed in the development of safety-critical applications. The engineers involved should be capable of absorbing the required toolkit of knowledge and also accurately comprehending the required operation of computer-based systems. No special qualifications are currently required for personnel developing or maintaining software for safety-critical systems. This contrasts with the more established engineering professions where standards, regulations, certification, and accreditation often apply much more strictly. INSETS: Formal Methods and Formal Specification.;Code of Practice for Engineers and Managers..
- Published
- 2000
- Full Text
- View/download PDF
24. 3D VISUALIZATION OF SOFTWARE ARCHITECTURES.
- Author
-
Feijs, Loe and Jong, Roel De
- Subjects
- *
COMPUTER software , *COMPUTER architecture , *VRML (Computer program language) , *DESIGN , *ELECTRONIC systems - Abstract
This article focuses on three-dimensional (3D) visualization of software architectures. Software architectures refers to the art and science of structuring very large programs and concerns the organization of a system in terms of its components, global control structures, physical distribution, evolution and more. The discipline of software architecture recently received a boost from new technological options for visualizing and analyzing software systems. These options are the result of the virtual reality modeling language (VRML), which is a de facto worldwide standard. There are several reasons why it is worthwhile to investigate and apply the emerging VRML technology to visualizing software designs. The main one is that VRML technology is available today and can help upgrade two-dimensional (2D) approaches to show design information. Moreover, 3D makes it possible to make a layout of the design objects more consistent with the object's intended role than can be done in a single plane. 3D visualization helps identify new design metaphors, fostering new ideas with respect to design principles.
- Published
- 1998
- Full Text
- View/download PDF
25. PRODUCTIVITY.
- Subjects
COMPUTER software ,COMPUTER systems ,ELECTRONIC systems ,COMPUTER industry ,COMPUTER software industry - Abstract
The article evaluates several software including Apple Computer Appleworks 5.0 from Apple Computer, Corel WordPerfect Office 2000 Standard Edition from Corel, and Microsoft Office 98 Macintosh Edition.
- Published
- 1999
26. Afghanistan Digital Library Initiative: Revitalizing an Integrated Library System.
- Author
-
Yan Han and Rawan, Atifa
- Subjects
- *
ELECTRONIC systems , *OPEN source software , *COMPUTER software , *FREEWARE (Computer software) , *INTELLECTUAL cooperation - Abstract
This paper describes an Afghanistan digital library initiative of building an integrated library system (ILS) for Afghanistan universities and colleges based on open-source software. As one of the goals of the Afghan eQuality Digital Libraries Alliance, the authors applied systems analysis approach, evaluated different open-source ILSs, and customized the selected software to accommodate users' needs. Improvements include Arabic and Persian language support, user interface changes, call number label printing, and ISBN-13 support. To our knowledge, this ILS is the first at a large academic library running on open-source software. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
27. Serviceability of large-Scale systems.
- Author
-
Kosztyán, Zsolt T.
- Subjects
- *
COMPUTER networks , *ELECTRONIC systems , *INFORMATION networks , *TELECOMMUNICATION , *COMPUTER software , *COMPUTER network protocols - Abstract
One of the most important research fields of network sciences is the robustness of networks. A recently answered important question was the following: Which network topologies are more resistant to random malfunctions and/or direct attacks? Nevertheless, until now, “which system topology can be maintained and how to manage maintenance more efficiently and effectively” have been open questions. However, these questions are the keys both to designing large-scale systems and to scheduling maintenance tasks. This paper proposes a new means to analyze the maintainability of a large system by combining two kinds of networks, i.e., the reliability diagram of the system (1) and the network of scheduled maintenance tasks (2). This paper shows how to assign maintenance task(s) to a system component to increase the reliability of the system. With the proposed method, the maintainability of large-scale systems can be analyzed. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
28. SLAMM: Visual monocular SLAM with continuous mapping using multiple maps.
- Author
-
Daoud, Hayyan Afeef, Md. Sabri, Aznul Qalid, Loo, Chu Kiong, and Mansoor, Ali Mohammed
- Subjects
- *
COMPUTER systems , *ELECTRONIC systems , *COMPUTER software , *ARTIFICIAL intelligence , *ROBOTICS - Abstract
This paper presents the concept of Simultaneous Localization and Multi-Mapping (SLAMM). It is a system that ensures continuous mapping and information preservation despite failures in tracking due to corrupted frames or sensor’s malfunction; making it suitable for real-world applications. It works with single or multiple robots. In a single robot scenario the algorithm generates a new map at the time of tracking failure, and later it merges maps at the event of loop closure. Similarly, maps generated from multiple robots are merged without prior knowledge of their relative poses; which makes this algorithm flexible. The system works in real time at frame-rate speed. The proposed approach was tested on the KITTI and TUM RGB-D public datasets and it showed superior results compared to the state-of-the-arts in calibrated visual monocular keyframe-based SLAM. The mean tracking time is around 22 milliseconds. The initialization is twice as fast as it is in ORB-SLAM, and the retrieved map can reach up to 90 percent more in terms of information preservation depending on tracking loss and loop closure events. For the benefit of the community, the source code along with a framework to be run with Bebop drone are made available at . [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
29. Service-Oriented Architecture Solution for ECG Signal Processing.
- Author
-
Blažauskas, Tomas, Muliuolis, Alvydas, Bikulčienė, Liepa, and Butkevičiūtė, Eglė
- Subjects
COMPUTER systems ,ELECTRONIC systems ,DATA analysis ,INFORMATION technology ,COMPUTER software - Abstract
Copyright of Information Technology & Control is the property of Kaunas University of Technology and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2017
- Full Text
- View/download PDF
30. An Overview of Motorola's PowerPC Simulator Family.
- Author
-
Anderson, William
- Subjects
- *
RISC microprocessors , *COMPUTER software , *ELECTRONIC systems , *C (Computer program language) , *MICROPROCESSORS - Abstract
The article focuses on the computer architecture. The successful introduction of a new computer architecture into the marketplace requires that both software and hardware be available simultaneously at the time of system introduction. Reduced instruction set computer (RISC) microprocessors team of Motorola Inc. is developing new software tools, including state-of-the-art compilers and simulators. All members of PowerPC simulator family of Motorola Inc. share some common features. This common feature set ensures that support code developed on one simulator will run appropriately on another member of the family. It also lessens the burden of learning a new set of commands for a new simulator. the PowerPC Architectural simulator (PPCArch) family is a set of programs that emulate various PowerPC microprocessors. The PPCArch simulators are based on a type of simulator originally developed for the Motorola M88K RISC microprocessor developed a style of threaded code simulator that used a unique C language.
- Published
- 1994
- Full Text
- View/download PDF
31. PowerPC 603 Microprocessor Power Management.
- Author
-
Suessmith, Brad W. and Paap III., George
- Subjects
- *
POWERPC microprocessors , *ELECTRONIC systems , *INTEGRATED circuits , *COMPUTER software , *SYSTEMS design , *INFORMATION technology - Abstract
The PowerPC 603 allows the system designer to control energy consumption through both hardware and software means as well as providing automatic internal power management. A sophisticated feature of the PowerPC 603 is dynamic power management (DPM), which automatically powers up and down the individual execution units on the chip, based on the contents of the instruction stream. The most unique feature of the 603 is the inclusion of four power states: Full On, Doze, Nap, and Sleep. Software selects these modes by setting one of the three power-saving mode bits. The 603 microprocessor provides a separate interrupt and interrupt vector for power management: the System Management Interrupter (SMI). The 603 also contains a decrement timer that allows it to enter the Nap or Doze mode for a predetermined amount of time and then return to Full On operation through the Decrementer interrupt (DI). The Nap mode disables the PowerPC 603 but still maintains the Phase Locked Loop (PLL) and the decrement timer. The timer can be used to wake up after a programmed amount of time.
- Published
- 1994
- Full Text
- View/download PDF
32. SOFTWARE COMPLEXITY AND MAINTENANCE COSTS.
- Author
-
Banker, Rajiv D., Datar, Srikant M., Kemerer, Chris F., and Zweig, Dani
- Subjects
- *
COMPUTER software , *ELECTRONIC systems , *COMPUTER programming , *SOFTWARE compatibility , *MAINTENANCE costs , *INFORMATION technology - Abstract
The article presents information on software complexity and maintenance costs. While the link between the difficulty in understanding computer software and the cost of maintaining it is appealing, prior empirical evidence linking software complexity to software maintenance costs is relatively weak. Many of the attempts to link software complexity to maintainability are based on experiments involving small pieces of code, or are based on analysis of software written by students. Such evidence is valuable, but several researchers have noted that such results must be applied cautiously to the large-scale commercial application systems that account for most software maintenance expenditures. Further- more, the limited large-scale research that has been undertaken has generated either conflicting results or none at all, as, for example, on the effects of software modularity and software structure. Additionally, none of the previous work develops estimates of the actual cost of complexity, estimates that could be used by software maintenance managers to make the best use of their resources. While research supporting the statistical significance of a factor is, of course, a necessary first step in this process, practitioners must also have an understanding of the practical magnitudes of the effects of complexity if they are to be able to make informed decisions.
- Published
- 1993
- Full Text
- View/download PDF
33. AN IMPROVED INSPECTION TECHNIQUE.
- Author
-
Knight, John C. and Myers, E. Ann
- Subjects
- *
COMPUTER software , *INFORMATION technology , *COMPUTER software development , *COMPUTER programming management , *ELECTRONIC systems , *MULTIPROCESSORS - Abstract
Software reviews are not a new idea. They have been around almost as long as software has. One of the most natural ways to check if something is correct is to look at it. In the 1950s and 1960s, large software projects often included some sort of software review. By the 1970s, various review methods had emerged with different names, software reviews, technical reviews, formal reviews, walkthroughs, structured walkthroughs, and code inspections. Each review method had different forms to fill out, different review team sizes and makeup, and so on, but none suggested any approach for reviewing the software or other work product other than just looking at it and discussing it. One might wonder why reviews are used at all, since most software is tested anyway. There are several reasons for doing something other than testing. Among these reasons are the expense and insufficiency of testing. It is well known that a software system cannot be made reliable by testing. Since independent inspections are routine in many other disciplines, such a financial accounting and building construction, it is surprising that inspection is not a significant element of software development.
- Published
- 1993
- Full Text
- View/download PDF
34. Evaluation of Safety-Critical Software.
- Author
-
Parnas, David L., van Schouwen, A. John, Shu Po Kwan, and Rushby, John
- Subjects
- *
ELECTRONIC systems , *COMPUTER software , *MEDICAL equipment , *ENGINEERING , *SPACE shuttles , *COMPUTER systems - Abstract
This article focuses on the evaluation of safety-critical software. It is increasingly common to use programmable computers in applications where their failure could be life-threatening and could result in extensive damage. For example, computers now have safety-critical functions in both military and civilian aircraft, in nuclear plants. and in medical devices. Within the engineering community software systems have a reputation for being undependable, especially in the first years of their use. The public is aware of a few spectacular stories such as the Space Shuttle flight that was delayed by a software timing problem, or the Venus probe that was lost because of a punctuation error. In the software community, the problem is known to be much more widespread. Generally, many uses and many failures are required before a product is considered reliable. Software products, including those that have become relatively reliable, behave like other products of evolution-like processes; they often fail, even years after they were built, when the operating conditions change.
- Published
- 1990
- Full Text
- View/download PDF
35. Departmentalization in Software Development and Maintenance.
- Author
-
Swanson, E. Burton, Beath, Cynthia Mathis, and Zmud, Robert W.
- Subjects
- *
COMPUTER software development , *INFORMATION resources , *ENGINEERING , *INFORMATION resources management , *ELECTRONIC systems , *COMPUTER software - Abstract
This article focuses on software development and maintenance. Software maintenance, the correction, adaptation, and perfection of operational software that has been a relatively neglected subject in the literature of software engineering and management. The virtues of these techniques are often held to include ease of maintenance on implementation. Systems beget systems; better systems generate more systems, subject data bases, and strategic information systems. The installed software base grows larger and more diversified as end user developed systems, third party developed systems, and purchased packages are added. The allocation of organizational resources to new system development and installed system maintenance has rarely been studied as a joint problem. The mature information systems organization is therefore responsible for a substantial accumulation of installed application systems, which undergoes continuous growth and "evolution" and which must be managed in conjunction with the acquisition and development of those new systems to which the organization also commits itself.
- Published
- 1990
- Full Text
- View/download PDF
36. view point - The Fate of Fortran-8x.
- Author
-
Hunter, Geoffrey, Bailey, David H., Damerla, Srinivasarao, and Brainerd, Walt
- Subjects
- *
FORTRAN , *COMPUTER software , *PROGRAMMING languages , *TURING machines , *COMPUTER systems , *ELECTRONIC systems - Abstract
Presents the views of several authors about Fortran-8x, a new programming language. Discussion about various aspects of Fortran-8x; View that introduction of Fortran-8x would be contrary to the trend in computer systems; Use of Fortran as the lingua franca of scientific and engineering programming; Report that the vast majority of computing tasks are Turing Machine processes; Information about the prospects offered by Fortran-8x.
- Published
- 1990
37. CASE Productivity Perceptions of Software Engineering Professionals.
- Author
-
Sibley, Edgar H., Norman, Ronald J., and Nunamaker Jr., Jay F.
- Subjects
- *
COMPUTER-aided software engineering , *SOFTWARE engineering , *COMPUTER software , *ELECTRONIC systems , *INFORMATION resources management , *ELECTRONIC data processing - Abstract
This article presents information related to the various functional and behavioral aspects of computer-aided software engineering (CASE). Recent CASE advertisements suggest that users are reporting productivity improvements ranging from 30 to 300 percent. Two additional factors which were considered very important during system development were also included along with the CASE product functions. They were communication among project team members and adherence to the enterprise's system development standards. Although the implementation of technological functions may vary in other CASE products, most of the competing CASE products support an equivalent function. Testing of all 17 functions required that 136 paired comparisons be made by the subjects. For the software engineer's preferences, the preferred representation of the 136 similarity rankings was in three dimensions with 88 percent of the total original pairwise ranks accounted for. A study implies that CASE product offerings need not be as robust in functionality as the one used in the study in order to positively affect productivity.
- Published
- 1989
38. A PROPOSED SOLUTION TO THE PROBLEM OF LEVELS IN ERROR-MESSAGE GENERATION.
- Author
-
Efe, Kemal
- Subjects
- *
ERROR messages (Computer science) , *DEBUGGING , *COMPUTER software , *COMPUTER systems , *ERROR-correcting codes , *ELECTRONIC systems - Abstract
This article focuses on the problem of levels in error-message generation in interactive software systems. Most computer users are not familiar with how their systems work beyond a certain level of operations. Consequently, there is often a problem with error-message generation in interactive software systems. Such problems of file creation error often occur at a program execution level unknown to the user. Many computer users have probably experienced these kinds of error messages. The problem with these messages is that, among many other things, they are signaled by a lower level operation that has been invoked by the user command without the user being aware of it. The difficulties in error-message generation in such cases arise because a lower level operation can be invoked by many different user commands that serve radically different user intentions. An error message signaled at any level is designed with the assumption that the receiver is the caller of that operation. There is, of course, nothing wrong with this assumption if the command is activated by the user. The trouble occurs when the user is not the caller of that operation.
- Published
- 1987
- Full Text
- View/download PDF
39. MIS IN SOVIET INDUSTRIAL ENTERPRISES: THE LIMITS OF REFORM FROM ABOVE.
- Author
-
McHenry, William K. and Goodman, Seymour E.
- Subjects
- *
MANAGEMENT information systems , *INFORMATION storage & retrieval systems , *ELECTRONIC systems , *MANUFACTURING industries , *COMPUTER software - Abstract
The article discusses the introduction of Automated Enterprise Management Systems (ASUPs), a management information system, in the industrial enterprises of the U.S.S.R. The Communist party and the government of the Soviet Union have orchestrated an unprecedented program to introduce computer-based information systems from the top down on the scale of an entire country. But the integration of these systems into the general economy of the U.S.S.R. has been fraught with numerous difficulties. The majority of ASUPs were geared toward manufacturing industries. Between 1965 and 1985, about 7500 ASUs were built throughout the Soviet economy. About 3300 are at the enterprise level, a few hundred are ministry-level systems and most of the rest are for process control. The Soviets have built a large computer infrastructure that has succeeded in delivering usable hardware and software to a large number of organizations throughout the economy. The infrastructure had the most success in building hardware, systems and applications software were next, and training a knowledgeable user base was last.
- Published
- 1986
- Full Text
- View/download PDF
40. ADAPTIVE EXACT FIT STORAGE MANAGEMENT.
- Author
-
Oldehoeft, Rodney R. and Allan, Stephen J.
- Subjects
- *
COMPARATIVE studies , *DYNAMIC storage allocation (Computer science) , *MEMORY maps (Computer science) , *COMPUTER operating systems , *COMPUTER software , *SYSTEMS software , *COMPUTER systems , *ELECTRONIC systems , *RESEARCH - Abstract
The article offers a comparative examination of the working-set approach and FIFO method for efficient dynamic storage-allocation mechanisms in run-time software and operating systems. It states that the said approach and method were evaluated according to their performance using three data representing the characteristics of arrival patterns to dynamic allocation software. The results indicate that using the working-set approach will consistently result in higher cache hit ratios than the FIFO method, except for sequential access to enough different sizes, which results in FIFO's performing as well as the working set.
- Published
- 1985
- Full Text
- View/download PDF
41. Calendar of Events.
- Subjects
- *
CONFERENCES & conventions , *COMPUTER software , *ELECTRONIC systems , *FAULT-tolerant computing , *QUALITY control , *SYSTEMS engineering , *MACHINE translating - Abstract
The article presents a calendar of events related to computer science. It includes, International Conference on Machine Translation; Computer Science and Statistics: 16th Symposium on the Interface; Fourth Latin American Conference in Computer Science; Seventh International Conference on Pattern Recognition; Ohio Instructional Computing Conference; Computer Networking Symposium; Third Conference on Foundations of Software Technology and Theoretical Computer Science; Total Systems Reliability Symposium; The Fourth International Conference on Information Systems; Second International Conference on Advanced Automation; Hawaii International Conference on System Sciences; Workshop on Sublanguage Description and Processing; International Symposium on Logic Programming; International Symposium on the Performance of Computer-Communication Systems; Seventh International Conference on Software Engineering; Seventh International Conference on Software Engineering; and International Workshop on Models and Languages for Software Specification and Design.
- Published
- 1983
42. The Future of Programming.
- Author
-
Wasserman, Anthony I. and Gutz, Steven
- Subjects
- *
COMPUTER programming , *COMPUTER software development , *COMPUTER software , *ELECTRONIC systems , *COMPUTER programmers , *ELECTRONIC data processing - Abstract
The nature of programming is changing. These changes will accelerate as improved software development practices and more sophisticated development tools and environments are produced. This paper surveys the most likely changes in the programming task and in the nature of software over the short term, the medium term, and the long term. In the short term, the focus is on gains in programmer productivity through improved tools and integrated development environments. In the medium term, programmers will be able to take advantage of libraries of software components and to make use of packages that generate programs automatically for certain kinds of common systems. Over the longer term, the nature of programming will change even more significantly as programmers become able to describe desired functions in a nonprocedural way, perhaps through a set of rules or formal specification languages. As these changes occur, the job of the application programmer will become increasingly analysis-oriented and software developers will be able to attack a large number of application areas which could not previously be addressed effectively. [ABSTRACT FROM AUTHOR]
- Published
- 1982
- Full Text
- View/download PDF
43. An Experiment in High Level Language Microprogramming and Verification.
- Author
-
Patterson, David A. and Hayes, J. P.
- Subjects
- *
SOFTWARE engineering , *COMPUTER programming , *ELECTRONIC systems , *SOFTWARE verification , *PROGRAMMING languages , *COMPUTER software - Abstract
The STRUM system was created to apply software engineering techniques to microprogramming. It provides the tools that allow the microprogrammer to use high level language, structured programming, and formal program verification to create emulations for a horizontally microprogrammed computer. This system is evaluated in two parts: (1) High level microprogramming language design and its use in structured microprogramming; and (2) Verification of a large microprogram. Both parts of this evaluation include experimental results. Part I includes a comparison of an emulation created using traditional techniques to the same emulation created using the STRUM system. Part II describes the formal verification of a 1700 line program that was immediately subjected to extensive testing. This work provides new results on the efficiency of high level microprogramming languages, the effectiveness of peephole optimization for microcode and the practicality of formal microprogram verification. [ABSTRACT FROM AUTHOR]
- Published
- 1981
- Full Text
- View/download PDF
44. Concepts and Criteria to Assess Acceptability of Simulation Studies: A Frame of Reference.
- Author
-
Adam, N. and Ören, Tuncer I.
- Subjects
- *
SIMULATION methods & models , *COMPUTER software , *ELECTRONIC systems , *SOFTWARE engineering , *COMPUTER systems , *COMPUTER architecture - Abstract
The existing trend of application of computerized simulation studies to large and complex systems necessitates the development of an assessment methodology for simulation studies. The basic concepts and criteria necessary for such an assessment methodology are presented in a systematic way. The proposed framework permits discussion of the concepts and criteria related to the acceptability of the following components of a simulation study: Simulation results, real world and simulated data, parametric model and the values of the model parameters, specification of the experimentation, representation and execution of the computer program, and modeling, experimentation, simulation, and programming methodologies or techniques used. The acceptability of the components of a simulation study are discussed with respect to the goal of the simulation study, the structure and data of the real system, the parametric model, the model parameter set, the specification of the experimentation, and the existing or conceivable norms of modeling methodology, experimentation technique, simulation methodology, and software engineering. [ABSTRACT FROM AUTHOR]
- Published
- 1981
45. Analysis of Locking Policies in Database Management Systems.
- Author
-
Potier, D., Leblanc, Ph., and Schwetman, H. D.
- Subjects
- *
DATABASE management , *COMPUTER software , *COMPUTER networks , *ELECTRONIC data processing , *ELECTRONIC systems , *DATABASES - Abstract
Consistency control has to be enforced in database management systems (DBMS) where several transactions may concurrently access the database. This control is usually achieved by dividing the database into locking units or granules, and by specifying a locking policy which ensures integrity of the information. However, a drawback of integrity enforcement through locking policies is the degradation of the global system performance. This is mainly due to the restriction imposed by the locking policies to the access of transactions to the database, and to the overheads involved with the management of locks. A framework for the quantitative analysis of the impact of these factors on the performance of DBMS is presented in this paper. In a first step, the main factors which determine the behavior of these systems are pointed out and analyzed independently. The results hereby obtained are aggregated in a second step to yield a global performance evaluation. Throughout this hierarchical modeling approach various analytical techniques are used and the results are illustrated by numerical examples. The paper concludes by pointing out the final results' sensitivity to some basic assumptions concerning transaction behavior and the need for more experimental studies in this area. [ABSTRACT FROM AUTHOR]
- Published
- 1980
- Full Text
- View/download PDF
46. Logical Construction of Software.
- Author
-
Chand, Donald R. and Yadav, Surya B.
- Subjects
- *
ELECTRONIC systems , *COMPUTER simulation , *MATHEMATICAL models , *SIMULATION methods & models , *COMPUTER software , *COMPUTER systems - Abstract
The authors contend that it is both possible and necessary to clearly demark and explicitly define the transition between the software design and software implementation phases of the software life cycle. The output of the software design phase is defined to be a logical design of software, and the logical design can be described explicitly if the software is viewed as a system of data sets and data transforms. Logical Construction of Software (LCS) is a software design methodology that guides the designer in defining and describing these software components and their relationships. The methodology is illustrated via a practical application. [ABSTRACT FROM AUTHOR]
- Published
- 1980
- Full Text
- View/download PDF
47. Granting Three Wishes through Performance-Centered Design.
- Author
-
Gery, Gloria
- Subjects
- *
COMPUTER software , *DATA entry , *APPLICATION software , *COMPUTER input-output equipment , *KEYPUNCHES , *ELECTRONIC systems - Abstract
The article focuses on new design possibilities that visual and task focused systems offer. In the 1970s when the infrastructure, methodologies, specifications, architecture and goals for large scale corporate systems were set, the focus of applications software was data processing. The hardware was, of course primitive by today's standards. But hardware aside, the first 10 to 15 years of application development were focused on structuring environments to capture, transform, and report on data-largely transaction data. The first systems author remember were insurance, banking people used to keypunch from when batch systems were the rage. Of course, since the paper forms couldn't be represented well and since display screen real estate was such a priority, these "data entry"screens contained huge numbers of fields with minimalist cryptic labels. Since people weren't doing anything but entering data that existed on source paper forms, the focus was on rapid data entry. And since data transmission was costly, the goal was to have as much on a display as possible before pressing transmit or enter.
- Published
- 1997
- Full Text
- View/download PDF
48. Just in Time Knowledge Delivery.
- Author
-
Cole, Kevin, Fischer, Olivier, and Saltzman, Phyllis
- Subjects
- *
ELECTRONIC systems , *COMPUTER software , *INFORMATION retrieval , *DATABASES , *EMPLOYEE training , *HUMAN-computer interaction - Abstract
The typical business operation has to address a variety of issues, not the least of which are rapidly changing business environments, training employees, satisfying and retaining customers. One of the responses to these challenges is the development of a relatively new type of software called Electronic Performance Support Systems (EPSS), a term that is widely used but has no generally agreed-upon definition. One can characterize an EPSS by its purpose, its design, and its development methodology. Expressions such as "just-in-time knowledge" or "delivering the right knowledge at the right time" are often used to describe EPSS. The immediate purpose of an EPSS is to support and enhance users' performance by providing them with the knowledge required by the task they are performing at the time they are actually performing the task. This knowledge can be explicit, as in the case of information retrieved from a database and delivered to the user. It can also be implicit, such as the knowledge that goes into designing a graphical user interface data entry screen that guides the users efficiently through the task they are performing.
- Published
- 1997
- Full Text
- View/download PDF
49. TOWARD REAL MICROKERNELS.
- Author
-
Liedtke, Jochen
- Subjects
- *
COMPUTER operating systems , *ELECTRONIC systems , *DEVICE drivers (Computer programs) , *COMPUTER software , *TECHNOLOGICAL innovations , *COMPUTER industry - Abstract
The microkernel story is full of good ideas and blind alleys. The story began with enthusiasm about he promised dramatic increase in flexibility, safety and modularity. But over the years, enthusiasm changed to disappointment because the first generation processor microkernels were insufficient and inflexible. Traditionally, the word kernel denotes the mandatory part of the operating system common to all other software. The kernel can use all features of a processor (e.g., programming the memory management unit); software running in user mode cannot execute such safety critical operations. Most early operating systems were implemented by means of large monolithic kernels. Loosely speaking, the complete operating system-scheduling, file system, networking, device drivers, memory management, paging, and more-was packed into a single kernel. In contrast, the microkernel approach involves minimizing the kernel and implementing servers outside the kernel. Ideally, the kernel implements only address spaces, interprocess communication and basic scheduling. INSETS: Frequently Asked Questions on External Pagers;Frequently Asked Questions on User-Level Device Drivers;Frequently Asked Questions on Memory Servers.
- Published
- 1996
- Full Text
- View/download PDF
50. The Promise and the Cost of Object Technology: A Five-Year Forecast.
- Author
-
Pancake, Cherri M.
- Subjects
- *
ELECTRONIC systems , *OBJECT-oriented methods (Computer science) , *COMPUTER software , *SOFTWARE engineering , *SYSTEMS design , *USER interfaces - Abstract
Object-oriented techniques for analysis, design, and construction of software systems have been espoused with fervor in the computing literature. Advocates cite successes in a wide variety of applications, from graphical user interfaces and distributed databases to large-scale financial simulations. Object technology (OT) offers several advantages that map well to recent changes in the industrial marketplace. As priorities shift to emphasize speed and responsiveness to market conditions, traditional software engineering methodologies like the, so-called "water-fall model" fall short. Object orientation (OO), on the other hand, makes it possible to model systems that are very close in structure to their real-world analogues. The objective of OO design is to identify accurately the principal roles in an organization or process, assign responsibilities to each of those roles, and define the circumstances under which roles interact with one another. Each role is encapsulated in the form of an object. INSETS: Glossary of Object Acronyms.;Is Object Technology Still "Emerging"?.
- Published
- 1995
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.