To see the other types of publications on this topic, follow the link: Operating systems (Computers).

Journal articles on the topic 'Operating systems (Computers)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Operating systems (Computers).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kočíš, Tomáš, and Vilém Srovnal. "Operating Systems for Embedded Computers." IFAC Proceedings Volumes 36, no. 1 (February 2003): 359–64. http://dx.doi.org/10.1016/s1474-6670(17)33774-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Al-Hasnawi, Haider, and Nawal Abbas Abdel. "THE IMPACT OF USING INTERNAL CONTROL UNDER THE ELECTRONIC OPERATING SYSTEM." International journal of business and management sciences 04, no. 05 (May 9, 2024): 119–40. http://dx.doi.org/10.55640/ijbms-04-05-11.

Full text
Abstract:
Internal control tools constitute one of the modern frameworks approved by the Committee of Sponsoring Organizations (COSO). "And the one which takes into account setting the objectives first, then estimating the possibility of those objectives being exposed to threats, then internal control procedures are designed that reduce the risks, and at the same time provide reasonable guarantees for achieving the organization's objectives and introducing all modern developments into the system. The contemporary trend of internal control focuses on the integration between managing the risks to which th
APA, Harvard, Vancouver, ISO, and other styles
3

Vdovjak, Krešimir, Josip Balen, and Krešimir Nenadić. "Experimental Evaluation of Desktop Operating Systems Networking Performance." International journal of electrical and computer engineering systems 11, no. 2 (June 24, 2020): 67–76. http://dx.doi.org/10.32985/ijeces.11.2.2.

Full text
Abstract:
The rapid advancement of network, communication and Internet technology resulted with always-on, always-connected, device-independent and remote online working, business, education and entertainment environment. Consequently, users are searching for solutions and technologies that enable fast and reliable wide area network connection and the typical solution is through using personal computers connected with ethernet cable to network equipment and infrastructure that supports gigabit ethernet connection. Besides the complex network infrastructure that can influence performance, the bottleneck
APA, Harvard, Vancouver, ISO, and other styles
4

Kendysh, I. V. "Automated system for deploying operating systems using LAN (PXE SERVER)." Litiyo i Metallurgiya (FOUNDRY PRODUCTION AND METALLURGY), no. 1 (March 12, 2022): 82–85. http://dx.doi.org/10.21122/1683-6065-2022-1-82-85.

Full text
Abstract:
PXE is an environment for booting computers using a network card without using hard drives, CDs and other devices used while booting operating systems. By choosing a network boot in the BIOS, it is possible to install the OS / rid of viruses /recover disks /test RAM from the PXE Boot server. Such a tool is irreplaceable in the case of a large number of computers
APA, Harvard, Vancouver, ISO, and other styles
5

Ochilov, Nizomiddin. "Creating Secure File Systems in Open-Source Operating Systems." WSEAS TRANSACTIONS ON SYSTEMS 21 (November 24, 2022): 221–32. http://dx.doi.org/10.37394/23202.2022.21.24.

Full text
Abstract:
The relevance of this study is determined by insecure data storage on personal computers, as it is the main operating system that performs authentication and file access control. Bypassing these security rules is possible in case of using another open-source operating system on the same personal computer. The aim of this work is the research and development of file encryptors, disk encryptors and file system encryptors. Each of them has its shortcomings which manifest themselves during development. Combining the advantages of file encryptors and file system encryptors helped to overcome those
APA, Harvard, Vancouver, ISO, and other styles
6

Craig, John S. "Managing Computer-Related Anxiety and Stress within Organizations." Journal of Educational Technology Systems 22, no. 4 (June 1994): 309–25. http://dx.doi.org/10.2190/mv5d-mykd-blla-06jl.

Full text
Abstract:
Computer-related anxiety and stress affects everyone who uses a computer and is aggravated by poor management, faulty system design, inadequate training, misunderstandings by users of what computers can do, and substandard documentation. Research has shown that computer users, no matter how experienced they are, can experience anxiety and stress that negatively affect their job performance. The problem is so pervasive that no single management strategy, ergonomic plan, training model, or system design can resolve the dilemma. Physical and psychological problems that afflict computer users can
APA, Harvard, Vancouver, ISO, and other styles
7

Dalimunthe, Ruri Ashari, Riki Andri Yusda, and William Ramdhan. "INSTALASI SISTEM OPERASI BERBASIS WINDOWS 10 PADA SEKOLAH MAN KISARAN." Jurdimas (Jurnal Pengabdian Kepada Masyarakat) Royal 3, no. 2 (July 14, 2020): 163–68. http://dx.doi.org/10.33330/jurdimas.v3i2.499.

Full text
Abstract:
Abstract: Community service activities entitled "Installation of Operating Systems Based on Windows 10" aims to provide information to students from MAN Asahan about Installing Windows Operating Systems. The method used in this activity is a direct observation of the MAN Asahan school by watching and analyzing the problems or troubleshooting that occurs at the Computer Lab at MAN Asahan. In addition, information on problems in the computer Labs of the school was also carried out by a team of lecturers as the perpetrators of this community service by way of direct interviews with the Teachers a
APA, Harvard, Vancouver, ISO, and other styles
8

Saiedian, Hossein, and Munib Siddiqi. "A framework for the assessment of operating systems for small computers." ACM SIGICE Bulletin 21, no. 4 (April 1996): 2–27. http://dx.doi.org/10.1145/1059966.1059967.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Colling, J. A., and H. S. von Harrach. "A control and imaging system for dedicated STEM." Proceedings, annual meeting, Electron Microscopy Society of America 50, no. 2 (August 1992): 968–69. http://dx.doi.org/10.1017/s0424820100129474.

Full text
Abstract:
A new digital control system has been developed for the HB600 series of cold field-emission STEM’S manufactured by VG Microscopes. The philosophy behind this control scheme has been to develop a system which is both user-friendly for non-experts in STEM/TEM operation as well as offering access to all functions for unusual modes of operation.The control scheme, as shown in Fig.1, is based on two computers; one for instrument control, using a multi-tasking, real-time operating system (OS/2) with a graphical user interface (Presentation Manager), the other for control of image acquisition and dis
APA, Harvard, Vancouver, ISO, and other styles
10

MORIARTY, K. J. M., and T. TRAPPENBERG. "PROGRAMMING TOOLS FOR PARALLEL COMPUTERS." International Journal of Modern Physics C 04, no. 06 (December 1993): 1285–94. http://dx.doi.org/10.1142/s0129183193001002.

Full text
Abstract:
Although software tools already have a place on serial and vector computers they are becoming increasingly important for parallel computing. Message passing libraries, parallel operating systems and high level parallel languages are the basic software tools necessary to implement a parallel processing program. These tools up to now have been specific to each parallel computer system and a short survey will be given. The aim of another class of software tools for parallel computers is to help in writing or rewriting application programs. Because automatic parallelization tools are not very succ
APA, Harvard, Vancouver, ISO, and other styles
11

Murtaza, Hudabia, Hafiz Abdullah Tanweer, Muhammad Ahmad, Mannan Ahmad Rasheed, and Mansoor Ahmad Rasheed. "Efficient Application Protection against Untrusted Operating Systems." VFAST Transactions on Software Engineering 10, no. 4 (December 31, 2022): 123–30. http://dx.doi.org/10.21015/vtse.v10i4.1197.

Full text
Abstract:
Commodity monolithic systems are enormous, having lots of unprotection that leads to attacks. In this era of increasing technology, relying on mobile devices and other electronic devices increases the threat from adversaries as they have the potential to obtain physical access to many computers through breaching and security theft. It is still challenging to secure data as our operating systems are less trustworthy than we expected. When the operating system (OS) is destabilized, the application data and implementation are at the attacker's mercy. Other operating systems are less trustworthy t
APA, Harvard, Vancouver, ISO, and other styles
12

Liu, Honghai, Xianghua Hou, Minmin Miao, and Yong Zhang. "The Comparison of Teaching Achievement Evaluation of Operating System Course." Advances in Social Development and Education Research 1, no. 2 (April 11, 2024): 15. http://dx.doi.org/10.61935/asder.2.1.2024.p15.

Full text
Abstract:
Operating system is the basic program for managing and controlling software and hardware system such as computers. It is the most basic system software that runs directly on the bare metal. Since its birth in the last century, it has been widely used in personal computers, servers, smartphones and other fields playing a vital role in our lives, work, and entertainment. Many universities in different countries offer operating system course, which provides a relatively complete introduction to the key functional modules of operating systems, from the history of operating systems to the implement
APA, Harvard, Vancouver, ISO, and other styles
13

Divyasheesh, Viplove, and Rakesh Jain. "Feasibility of Quantum Computers in Cryogenic Systems." International Journal of Engineering and Computer Science 9, no. 01 (January 21, 2020): 24919–20. http://dx.doi.org/10.18535/ijecs/v9i01.4412.

Full text
Abstract:
Quantum computers consist of a quantum processor – sets of quantum bits or qubits operating at an extremely low temperature – and a classical electronic controller to read out and control the processor. The machines utilize the unusual properties of matter at extremely small scales – the fact that a qubit, can represent “1” and “0” at the same time, a phenomenon known as superposition. (In traditional digital computing, transistors in silicon chips can exist in one of two states represented in binary by a 1 or 0 not both).
 Under the right conditions, computations carried out with qubits
APA, Harvard, Vancouver, ISO, and other styles
14

Sari, Renny Puspita, and Fiqri Syah Redha. "Sistem Pendukung Keputusan Pemilihan Distro Linux Menggunakan Metode Simple Additive Weighting (SAW)." Jurnal Sistem Komputer dan Informatika (JSON) 2, no. 3 (May 30, 2021): 348. http://dx.doi.org/10.30865/json.v2i3.3039.

Full text
Abstract:
Linux is a kernel whose development has been very active since it was first released to the public. With a large community, Linux development has penetrated into various fields in the world of computerization, including personal computers. Today, Linux can be used on a variety of devices from personal computers to embedded systems. The development is very active thanks to the large community and Linux adopting open source, many developers are making their own version of the Linux-based operating system. Versions and types of Linux-based operating systems are called distros or distributions. Th
APA, Harvard, Vancouver, ISO, and other styles
15

Cho, Moon-Haeng, Chan-Woo Choi, and Cheol-Hoon Lee. "Design and Implementation of eRTOS Real-time Operating Systems for Wearable Computers." Journal of the Korea Contents Association 8, no. 9 (September 28, 2008): 42–54. http://dx.doi.org/10.5392/jkca.2008.8.9.042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Gayvoronskiy, S. A., Tatiana Al Ezangina, and A. V. Sobol. "Control Systems Synthesis of Maximum Robust Stability Degree Based on Vertex Critical Root Diagrams." Mekhatronika, Avtomatizatsiya, Upravlenie 24, no. 10 (October 9, 2023): 519–25. http://dx.doi.org/10.17587/mau.24.519-525.

Full text
Abstract:
The article solves the problem of operative selection of the redundant onboard equipment complex components configuration of the suitable in the current operating conditionаs in the interests of ensuring high fault tolerance of the complex, as well as achieving other operational and technical characteristics. The basis of the redundancy management system of the complex consists of configuration supervisors — as program subjects according to the number of its competitive configurations of heterogeneous and nonuniform equipment worked out in advance. The choice of the preferred configuration is
APA, Harvard, Vancouver, ISO, and other styles
17

Zailani, Achmad Udin, Alvino Octaviano, and Sholihin Sholihin. "DESIGN OF COMPUTER REPAIR SERVICES APPLICATION ANDROID-BASED." TEKNOKOM 4, no. 1 (June 10, 2021): 7–15. http://dx.doi.org/10.31943/teknokom.v4i1.58.

Full text
Abstract:
Computers are one form of advances in electronic and informatics technology; the function of the computer itself serves as a tool for writing, drawing, editing images or photographs, or as a means of storage. Android, a Linux-based operating system, is a smart operating system that can compete with operating systems on a computer. Some of the problems identified include user difficulties in overcoming computer damage to determine whether to repair or buy a new unit, difficulty in reaching authorized service providers, risks when deciding to repair at a public service place, and limited access
APA, Harvard, Vancouver, ISO, and other styles
18

Beltman, Willem, Seth Bard, Travis North, Charles Oppenheimer, Paul Waters, Andrew Wiltzius, and Sean Zimmerman. "New ECMA 74 operating conditions for personal computers and workstations." INTER-NOISE and NOISE-CON Congress and Conference Proceedings 263, no. 1 (August 1, 2021): 5019–26. http://dx.doi.org/10.3397/in-2021-2921.

Full text
Abstract:
Annex C in ECMA 74 outlines the operating conditions for personal computers and workstations during acoustic testing. In practice, the way systems are used and designed changes over time. After InterNoise 2018 in Chicago, a special IT industry workgroup was formed with the goal to update this section in Annex C to better reflect current workloads during use. This paper outlines the new operating conditions that were developed by this workgroup. It describes the different operating modes to be measured, and how to set and document power and performance parameters during the acoustic measurement
APA, Harvard, Vancouver, ISO, and other styles
19

I nyoman, Edy saputra Edy, IGAP Raka Agung, and Yoga Divayana. "ED-255EK Embeded Education Platform Sebagai Modul Praktikum Embeded System Dengan Robot Arm Module Dan Voice Module." Majalah Ilmiah Teknologi Elektro 18, no. 1 (May 6, 2019): 91. http://dx.doi.org/10.24843/mite.2019.v18i01.p13.

Full text
Abstract:
Abstract— Literally embedded systems are defined as equipment that computes a particular job. Embedded Linux System was also developed as a means of education, one of which is ED-255EK Embedded Education Platform, designed to be very practical and consume very low power. ED-255EK is also equipped with a PXA255 processor that is compatible with ARM version 5TE ISA, so it can be used to carry out various kinds of lab work or experiments on embedded systems. The working principle of this tool begins with the configuration of data communication between Fedora Linux and ED-255EK. When the communica
APA, Harvard, Vancouver, ISO, and other styles
20

Winzerling, Werner. "Linux und Freie Software." PROKLA. Zeitschrift für kritische Sozialwissenschaft 32, no. 126 (March 1, 2002): 37–55. http://dx.doi.org/10.32387/prokla.v32i126.712.

Full text
Abstract:
Since the great success of the operating system Linux, the development of Free and Open Source Software is broad discussed. This is also seen as the beginning of a new economic development. This paper examines, what makes Linux actually so significant for the computer industry. First Linux is critical evaluated and placed opposite the Microsoft operating systems. Than some substantial new influences on the development and production in the computer industry are worked out. On the one hand this are modifications in the production chain of computers and on the other hand network effects (externa
APA, Harvard, Vancouver, ISO, and other styles
21

Almisreb, Ali, Hana Hadžo Mulalić, Nina Mučibabić, and Refija Numanović. "A review on mobile operating systems and application development platforms." Sustainable Engineering and Innovation 1, no. 1 (June 1, 2019): 49–56. http://dx.doi.org/10.37868/sei.v1i1.94.

Full text
Abstract:

 
 
 
 The previous existing mobile technologies were only limited to voice and short messages, organized between several network operators and service providers. However, recent advancements in technologies, introduction, and development of the smartphones added many features such: high-speed processors, huge memory, multitasking, screens with large-resolution, utile communication hardware, and so on. Mobile devices were evolving into general-purpose computers, which resulted in the development of various technological platforms, operating systems, and platforms for the d
APA, Harvard, Vancouver, ISO, and other styles
22

Hartman, Amiel, and Vidya K. Nandikolla. "Human-Machine Interface for a Smart Wheelchair." Journal of Robotics 2019 (January 2, 2019): 1–11. http://dx.doi.org/10.1155/2019/4837058.

Full text
Abstract:
The paper describes the integration of hardware and software with sensor technology and computer processing to develop the next generation intelligent wheelchair. The focus is a computer cluster design to test high performance computing for smart wheelchair operation and human interaction. The LabVIEW cluster is developed for real-time autonomous path planning and sensor data processing. Four small form factor computers are connected over a Gigabit Ethernet local area network to form the computer cluster. Autonomous programs are distributed across the cluster for increased task parallelism to
APA, Harvard, Vancouver, ISO, and other styles
23

Coşkun, Aysun, and Ümit Bostancı. "Evaluation of the most preferred operating systems on computers in terms of vulnerabilitiesBilgisayarlarda en çok tercih edilen işletim sistemlerinin güvenlik açıklıkları açısından değerlendirilmesi." Journal of Human Sciences 13, no. 3 (November 12, 2016): 4545. http://dx.doi.org/10.14687/jhs.v13i3.4128.

Full text
Abstract:
Because it is one of the most fundamental programsrunning on the computer, operating systems, are known to provide security infrastructure for other programs and services that run on computer. Unless any precautions are taken against vulnerabilities on the operating system, the system becomes eligible to be exploited, it paves the way to achieve the target of attackers. Hence, remediation of vulnerabilities on the operating system is evaluated to be extremely significant. In this study,a new database was created by questioning vulnerabilities existing in the most widely used operating systems
APA, Harvard, Vancouver, ISO, and other styles
24

Grevisse, Y. R., Albert L. A. T. Raymond, K. M. Clovis, K. K. Chappelle, I. K. ,. Corneille, K. S. David-Jackson, K. S. Elisée, and I. K. Désiré. "Operational approach to kernel system protection under Windows Server 2019: Optimization, QoS and Performance." European Journal of Computer Science and Information Technology 11, no. 2 (February 15, 2023): 70–99. http://dx.doi.org/10.37745/ejcsit.2013/vol11n27099.

Full text
Abstract:
Computer Sciences has become the culmination of all human activity these days, but it is also the worst fear that no epidemic has inspired today. And despite this, everyone concedes that the use of computers (especially through the Internet) now occupies the first place, even essential, in everyday life. Each of us uses a computer to work, to exchange information, to make purchases, etc. Unfortunately, malicious activity targeting computers is steadily increasing and trying to exploit vulnerabilities that are growing in number with ever-increasing complexity. In view of this, the present resea
APA, Harvard, Vancouver, ISO, and other styles
25

van Delft, Falco C. M. J. M., Giulia Ipolitti, Dan V. Nicolau, Ayyappasamy Sudalaiyadum Perumal, Ondřej Kašpar, Sara Kheireddine, Sebastian Wachsmann-Hogiu, and Dan V. Nicolau. "Something has to give: scaling combinatorial computing by biological agents exploring physical networks encoding NP-complete problems." Interface Focus 8, no. 6 (October 19, 2018): 20180034. http://dx.doi.org/10.1098/rsfs.2018.0034.

Full text
Abstract:
On-chip network-based computation, using biological agents, is a new hardware-embedded approach which attempts to find solutions to combinatorial problems, in principle, in a shorter time than the fast, but sequential electronic computers. This analytical review starts by describing the underlying mathematical principles, presents several types of combinatorial (including NP-complete) problems and shows current implementations of proof of principle developments. Taking the subset sum problem as example for in-depth analysis, the review presents various options of computing agents, and compares
APA, Harvard, Vancouver, ISO, and other styles
26

Budiharto, Widodo. "Implementasi dan Evaluasi Penerapan Globus Toolkit untuk Aplikasi Grid Computing." ComTech: Computer, Mathematics and Engineering Applications 3, no. 1 (June 1, 2012): 695. http://dx.doi.org/10.21512/comtech.v3i1.2469.

Full text
Abstract:
Grid computing is a distributed computing technology that utilizes resources connected through a free computer network, yet coordinated with a specific mechanism. The development of grid computing infrastructure is not easy because it takes skill and experience in the installation and configuration of both Linux-based and open source program. In this study, the author built a grid computing infrastructure based on Debian 4, and used Globus Toolkit 4.1.2 on three computers. The WSRF technology was tried to run as an indication that the grid infrastructure has been successfully built. Based on s
APA, Harvard, Vancouver, ISO, and other styles
27

Daunys, Einaras, and Sigita Turskienė. "Kompiuterių tinklo gedimų registravimo sistemos modeliavimas." Informacijos mokslai 50 (January 1, 2009): 262–66. http://dx.doi.org/10.15388/im.2009.0.3228.

Full text
Abstract:
Darbe aptariami esamų kompiuterių tinklų registravimo sistemų technologiniai trūkumai, pateikiama gedimų registracijos sistema papildyta nešiojamais įrenginiais, nurodant jų ypatumus. Analizuojamos galimybės sukurti ir įdiegti į praktiką kompiuterių tinklų gedimų registravimo programinį produktą delniniams kompiuteriams. Darbe apžvelgtos delninių kompiuterių operacinės sistemos ir jų ypatybės, parinkta optimali aplikacijos kūrimo platforma. Aplikaciją sudaro dvi dalys: darbui su duomenų bazesukurtos klasės ir vartotojo grafi nės sąsajos klasės. Grafi nė vartotojo sąsaja sukonstruota Java Swing
APA, Harvard, Vancouver, ISO, and other styles
28

Schevelev, S. S. "Reconfigurable Modular Computing System." Proceedings of the Southwest State University 23, no. 2 (July 9, 2019): 137–52. http://dx.doi.org/10.21869/2223-1560-2019-23-2-137-152.

Full text
Abstract:
Purpose of research. A reconfigurable computer system consists of a computing system and special-purpose computers that are used to solve the tasks of vector and matrix algebra, pattern recognition. There are distinctions between matrix and associative systems, neural networks. Matrix computing systems comprise a set of processor units connected through a switching device with multi-module memory. They are designed to solve vector, matrix and data array problems. Associative systems contain a large number of operating devices that can simultaneously process multiple data streams. Neural networ
APA, Harvard, Vancouver, ISO, and other styles
29

Stanković, Miloš, and Umit Karabiyik. "Exploratory Study on Kali NetHunter Lite: A Digital Forensics Approach." Journal of Cybersecurity and Privacy 2, no. 3 (September 19, 2022): 750–63. http://dx.doi.org/10.3390/jcp2030038.

Full text
Abstract:
Mobile devices, specifically smartphones, have become a necessity in everyday life, as we perform many essential day-to-day tasks using these devices. With the projected increase in mobile devices to 18.22 billion by 2025, the reliance on smartphones will only grow. This demand for smartphones has allowed various companies to start developing their own devices and custom operating systems, each of which puts its own touch on them. In addition, current smartphones have increased processing power, providing users with a computer experience in their pockets. Software developers have taken this op
APA, Harvard, Vancouver, ISO, and other styles
30

Wang, Yingjun, Shaoyang He, and Yiran Wang. "AI-Assisted Dynamic Modelling for Data Management in a Distributed System." International Journal of Information Systems and Supply Chain Management 15, no. 4 (October 1, 2022): 1–18. http://dx.doi.org/10.4018/ijisscm.313623.

Full text
Abstract:
There are many interdependent computers available in distributed networks. In such schemes, overall ownership costs comprise facilities, such as computers, controls, etc.; buying hardware; and running expenses such as wages, electrical charges, etc. Strom use is a large part of operating expenses. AI-assisted dynamic modelling for data management (AI-DM) framework is proposed. The high percentage of power use is connected explicitly to inadequate planning of energy. This research suggests creating a multi-objective method to plan the preparation of multi-criteria software solutions for distrib
APA, Harvard, Vancouver, ISO, and other styles
31

Brenner, Asher. "Use of computers for process design analysis and control: sequencing batch reactor application." Water Science and Technology 35, no. 1 (January 1, 1997): 95–104. http://dx.doi.org/10.2166/wst.1997.0022.

Full text
Abstract:
Computers have become a vital part of every modern wastewater treatment plant. They can be used for design, analysis, and control of the treatment process. Mathematical modelling and simulation of various process configurations, load conditions, and operational strategies lead to better understanding and improved design and operation. Computer assisted analysis of process performance and automatic control of plant units aid reduce expenses related to energy, chemicals, and man power. Stringent disposal constraints imposed in most modern countries require application of sophisticated computeriz
APA, Harvard, Vancouver, ISO, and other styles
32

Turčáni, Milan, and Zoltan Balogh. "MODERN TEACHING OF COMPUTER SUBJECTS TO SUPPORT WEB 2.0 TECHNOLOGIES." Problems of Education in the 21st Century 46, no. 1 (October 1, 2012): 138–45. http://dx.doi.org/10.33225/pec/12.46.138.

Full text
Abstract:
The subject of our interest is an educational process, which is a dynamic process, changing in time, and can be examined from various viewpoints. We can focus on participants of this process, i.e. on students and lecturers, and observe their mutual relations and interactions. Educational process understood as a dynamic system is an insofar extensive sphere that it provides almost limitless opportunities of observation, modelling and simulation. In this contribution we shall focus mainly on the special part of educational processes – on teaching of subjects focusing on technical and system issu
APA, Harvard, Vancouver, ISO, and other styles
33

Makwana, Yasin, Dereje Agonafer, and Dan Manole. "Impact of TXV and Compressor in the Stability of a High-End Computer Refrigeration System." Journal of Electronic Packaging 126, no. 4 (December 1, 2004): 554–59. http://dx.doi.org/10.1115/1.1827272.

Full text
Abstract:
The combination of increased power dissipation and increased packaging density has led to substantial increases in chip and module heat flux in high-end computers. The challenge is to limit the rise in chip temperature above the ambient. In the past, virtually all commercial computers were designed to operate at temperatures above the ambient. However, researchers have identified the advantages of operating electronics at low temperatures. Until recently, large-scale scientific computers used direct immersion cooling of single-chip modules. The current research focuses on mainframes (computer
APA, Harvard, Vancouver, ISO, and other styles
34

Hidayat, Muh Adrian Juniarta, and Hadian Mandala Putra. "Sistem Keamanan Server Linux CentOS Dengan Metode Port Knock dan RST Cookies." Infotek : Jurnal Informatika dan Teknologi 6, no. 2 (July 20, 2023): 411–20. http://dx.doi.org/10.29408/jit.v6i2.17500.

Full text
Abstract:
The increase in online-based services makes a security system for server computers increasingly needed. A server computer is a device that must always be available to be accessed anytime and anywhere. Some of the security systems needed for server computers include security for ssh port access for remote server access needs and a security system to protect servers from Denial of Service (DoS) attacks which can make the server down and completely inaccessible. In this study, a security system is proposed for a server computer with the Linux CentOS operating system on a port 22 secure shell(ssh)
APA, Harvard, Vancouver, ISO, and other styles
35

Alexa, Vasile, Sorin Ratiu, and Imre Kiss. "Laboratory assembly for analysis of fuel injection systems in the modern internal combustion engines." Analecta Technica Szegedinensia 8, no. 1 (January 11, 2014): 54–58. http://dx.doi.org/10.14232/analecta.2014.1.54-58.

Full text
Abstract:
The complexity of the processes taking place in a system of fuel injection management for an internal combustion engine requires extra effort for a proper understanding of the operating principles. This paper is intended to be an intuitive practical application able to simulate the complex electronic control of injection, through a PC and specialized software. The application provides an intuitive and friendly analysis of the processes occurring during the operation of an injection computer. Moreover, the system allows the determination of the gasoline amount injected by the various types of f
APA, Harvard, Vancouver, ISO, and other styles
36

GARCIA RODRIGUEZ, CARLOS ALBERTO, PEDRO QUINTO DIEZ, JOSE ALFREDO JIMENEZ BERNAL, and IGNACIO CARVAJAL MARISCAL. "ELECTRICAL POWER GENERATED FROM AN OPERATING DESKTOP COMPUTER THROUGH WASTE HEAT RECOVERY." DYNA 96, no. 4 (July 1, 2021): 345. http://dx.doi.org/10.6036/10150.

Full text
Abstract:
Use of heat recovery systems applied to different industries as a technology to increase energy efficiency [1] is becoming more and more common, one third of the total energy consumption is related to the industrial sector, and of this, about fifty percent is wasted as heat [2]. Increasing use of different types of computers forces us to rethink the possibility of improving their energy efficiency and consequently reducing their energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
37

BRODIE, MICHAEL L., and STEFANO CERI. "ON INTELLIGENT AND COOPERATIVE INFORMATION SYSTEMS: A WORKSHOP SUMMARY." International Journal of Cooperative Information Systems 01, no. 02 (June 1992): 249–89. http://dx.doi.org/10.1142/s0218215792000209.

Full text
Abstract:
Future information systems will involve large numbers of heterogeneous, intelligent agents distributed over large computer/communication networks. Agents may be humans, humans interacting with computers, humans working with computer support, and computer systems performing tasks without human intervention. We call such systems Intelligent and Cooperative Information Systems (ICISs). Although we can imagine extensions of capabilities of current ISs and of individual contributing core technologies, such as databases, artificial intelligence, operating systems, and programming languages, we canno
APA, Harvard, Vancouver, ISO, and other styles
38

AL-HANANI, ALI, and VENUS W. SAMAWI. "virus Detection Using Cryptography Algorithm." Iraqi Journal for Computers and Informatics 27, no. 1 (June 30, 1996): 8–15. http://dx.doi.org/10.25195/ijci.v27i1.220.

Full text
Abstract:
Many papers have been published about manipulating computer viruses; instructions that impact a computer system and after a period of incubation and reproducion, activate and demonstrate their presence. mest Viruses were designed to attack microcomputers, sincce microcomputers are widely used nowadays, and have simple operating systems which result in lack of quality of their security systern. Connecting computers with networks and using copies of programs from unreliable sources such as bullet in board systems will increase the :of viral contact and the spread of viruses. Data Encryption disg
APA, Harvard, Vancouver, ISO, and other styles
39

Manapa, Esther Sanda, Eliyah Acantha M. Sampetoding, Tommy Wijaya Sagala, and Hoxy Ryner Taluay. "Ulasan Penelitian Sistem Operasi Waktu Nyata di Indonesia." Journal Dynamic Saint 5, no. 2 (February 5, 2021): 973–79. http://dx.doi.org/10.47178/dynamicsaint.v5i2.1109.

Full text
Abstract:
Over the past 30 years, development of semiconductor manufacturing has resulted in smaller and faster computers. Its presence results in the development of sophisticated devices and processing large amounts of data quickly and reliably. More and more functionality on the system devices, needed effective and efficient resources. In some cases, only real-time operating systems (RTOS) can gather time and resources from these systems.. Whether using the software on an automation device, or middleware level to help communicate between programs, or using the software, it will be useful to know when
APA, Harvard, Vancouver, ISO, and other styles
40

Wang, Jinying, and Jing Yang. "Multi-Threaded Data Communication in Java for Advanced Computing Environments." Scalable Computing: Practice and Experience 24, no. 4 (November 17, 2023): 1087–96. http://dx.doi.org/10.12694/scpe.v24i4.2383.

Full text
Abstract:
The performance of operating systems like computers requires the proper functioning of the computer language interpreter. This interpreter follows various types of programming languages that make the performing of computer programming easy and effective. The application of the programming language of Java helps in processing multiple tasks at once. This research analyzes the novelty of Java-based data communication models in advanced computing services. This performance makes the saving of the resources used for the development of the programming language. All these development includes the pe
APA, Harvard, Vancouver, ISO, and other styles
41

Oyelude, Adetoun A. "Open source software for library systems – 2." Library Hi Tech News 33, no. 9 (November 7, 2016): 10–13. http://dx.doi.org/10.1108/lhtn-09-2016-0044.

Full text
Abstract:
Purpose This paper aims to concentrate on reviewing articles on open source software (OSS), found on the internet, that were published in the year 2016. Design/methodology/approach A critical look is taken at OSS generally as found in the literature and also on the commonly used OSS in libraries and information science work or research work. Findings It is hoped that this review will assist in pointing out the trends and aid in informed decision-making, as it concerns OSS. Social implications Akintomide (2016) described OSS as a part of human existence which is exhibited in mobile devices that
APA, Harvard, Vancouver, ISO, and other styles
42

Shishmanov, Krasimir, and Kremena M. Marinova. "SPECIFICS IN THE FUNCTIONING OF A DIGITAL ENTERPRISE." Innovative economics and management 10, no. 3 (November 29, 2023): 111–23. http://dx.doi.org/10.46361/2449-2604.10.3.2023.111-123.

Full text
Abstract:
Krasimir Shishmanov 
 E-mail: k.shishmanov@uni-svishtov.bg 
 PhD, Professor, D. A. Tsenov Academy of Economics. 
 Svishtov, Bulgaria
 https://orcid.org/0000-0001-9874-2149 
 
 Kremena M. Marinova 
 E-mail: k.marinova@uni-svishtov.bg 
 PhD, Head assistant professor, D. A. Tsenov Academy of Economics 
 Svishtov, Bulgaria
 https://orcid.org/0000-0001-8035-7891 
 
 Abstract: The Digital Enterprise is an organization that uses information technology (IT) to gain a competitive advantage in all aspects of its operations, including production
APA, Harvard, Vancouver, ISO, and other styles
43

D., Iorgulescu. "Analysis of using and operating conditions of the naval power equipment according to the waveinduced ship load." Scientific Bulletin of Naval Academy XIX, no. 1 (July 15, 2018): 247–55. http://dx.doi.org/10.21279/1454-864x-18-i1-038.

Full text
Abstract:
This article analyzes the conditions of operation and exploitation of the ship's power equipment using the meteorological conditions and the type of ship. Based on the naval power systems and new shipbuilding technologies,we are looking for optimization and increased reliability of shipboard automation and navigation systems that are on board. The article analyzes and presents solutions about the complex problems that arise in the work of the engineer that is on board. It is demonstrated the importance of the quality indicators of the naval power system for improving the operating conditions o
APA, Harvard, Vancouver, ISO, and other styles
44

Bernard, Paweł, Paweł Broś, and Anna Migdał-Mikuli. "E-ASSESSMENT OF STUDENTS BASED ON PERSONAL RESPONSE SYSTEM." Problems of Education in the 21st Century 35, no. 1 (November 25, 2011): 11–16. http://dx.doi.org/10.33225/pec/11.35.11.

Full text
Abstract:
Tools for electronic assessment are being developed mainly with growth of distance learning platforms. However, the possibility of electronic testing seems to be valuable also in the classroom, which is not usually equipped with computers. For this purpose, systems of remote controllers have been in development for over ten years. The first versions of controllers were operating in infrared technology which significantly limited the amount of data that could be transferred from remote controls to computers. That allowed only using simple multiple-choice and single number questions. Those limit
APA, Harvard, Vancouver, ISO, and other styles
45

Wagner, Judith L. "Cost Containment and Computerized Medical Imaging." International Journal of Technology Assessment in Health Care 3, no. 3 (July 1987): 343–53. http://dx.doi.org/10.1017/s0266462300001161.

Full text
Abstract:
AbstractToday, computers are used in several important and fast-growing medical imaging modalities, such as digital subtraction angiography, positron emission tomography, magnetic resonance imaging, nuclear medicine, and diagnostic ultrasound. The ultimate test for the computer in medical imaging will be its ability to replace traditional film-based radiography as the mechanism for displaying, communicating, and storing imaging information. This transition will require radiologists and other imagers to accept information in digital form. The speed of that acceptance depends on the economic inc
APA, Harvard, Vancouver, ISO, and other styles
46

Cheng, Yao, You Min Hu, Bo Wu, Jian Ping Xuan, and Guang Fei Jia. "Signal Analysis Module of NC Machine Tool Based on C Language." Applied Mechanics and Materials 184-185 (June 2012): 1628–32. http://dx.doi.org/10.4028/www.scientific.net/amm.184-185.1628.

Full text
Abstract:
In the monitoring of a NC machine tool (NCMT), signal analysis is one of the most important considerations. In order to process multi-information in a comprehensive way and integrate with NC systems in a stable way, a signal analysis module (SAM) with various feature parameters programmed in C language is proposed. Experiments are carried out in Huazhong NCMT to verify the validity of the presented SAM. The work described in this paper can be applied to almost all NC systems and industrial computers with different operating systems (OSs).
APA, Harvard, Vancouver, ISO, and other styles
47

Tedyyana, Agus, and Supria Supria. "Perancangan Sistem Pendeteksi Dan Pencegahan Penyebaran Malware Melalui SMS Gateway." INOVTEK Polbeng - Seri Informatika 3, no. 1 (June 3, 2018): 34. http://dx.doi.org/10.35314/isi.v3i1.340.

Full text
Abstract:
Internet network is a media or technology that is very useful at this time. Almost everyone who uses electronics using internet network. With this internet network, humans can access the virtual world with ease, either in browsing, streaming, social media access and others. On the other hand there is a lack of Internet network technology. With the internet, computers can connect with other computers, so many cases of malware attacks through the internet network. Recently there has been a very dangerous malware attack. The malware is known as wannacry ransomware. Wannacry can attack computers t
APA, Harvard, Vancouver, ISO, and other styles
48

Flint, David. "Just Who Is Responsible for This Snafus?" Business Law Review 43, Issue 2 (April 1, 2022): 92–93. http://dx.doi.org/10.54648/bula2022013.

Full text
Abstract:
As some of you who know me will be aware, in addition to Competition Law, IP and Privacy, one of my long-term interests has been in computer technology. From my earliest experiences with the products of Sir Clive Sinclair, through programming IBM mainframes with Fortran 4, DEC machines with cp/m, RSTS-E and, latterly, SCO-Unix, to the modern operating systems of Windows and iOS, I have always had an interest in computers and the law surrounding them. Increasingly, I have become frustrated at the many issues which innocent and unsophisticated users seem to be having and the apparent lack of rec
APA, Harvard, Vancouver, ISO, and other styles
49

Kulkarni, Mr Ashish Dhananjay. "Bharat Operating System Solution: A Step towards Secure India." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 4102–5. http://dx.doi.org/10.22214/ijraset.2021.35887.

Full text
Abstract:
Now a days we see the cyber attacks on government servers .The cyberspace is highly vulnerable to attacks, and is a major concern for national security. The government is conscious of the shortcomings in its cyberspace. Hence, it's performing on its own OS for advanced protection of networks and private computers. In the recent past, there have been several severe attacks by Chinese hackers on key government websites, which exposed important government data. These websites are needed fully secure network for the protection . BOSS is based on codes that are unique to its system, which makes it
APA, Harvard, Vancouver, ISO, and other styles
50

Samoilova, M. E., and A. A. Zubrilin. "AN EXTRACURRICULAR EVENT “HISTORY OF INFORMATICS IN DATES." Informatics in school, no. 5 (June 23, 2019): 7–13. http://dx.doi.org/10.32517/2221-1993-2019-18-5-7-13.

Full text
Abstract:
The article presents an extracurricular event “History of informatics in dates”, conducted using infographics. The article justifies why infographics will allow us to memorize historical events associated with the development of informatics. The dates and information from the history of the development of the Internet, computers, microprocessors and operating systems are given. The work with dates is carried out in a game form.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!