To see the other types of publications on this topic, follow the link: Operating systems (Computers).

Journal articles on the topic 'Operating systems (Computers)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Operating systems (Computers).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kočíš, Tomáš, and Vilém Srovnal. "Operating Systems for Embedded Computers." IFAC Proceedings Volumes 36, no. 1 (February 2003): 359–64. http://dx.doi.org/10.1016/s1474-6670(17)33774-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Al-Hasnawi, Haider, and Nawal Abbas Abdel. "THE IMPACT OF USING INTERNAL CONTROL UNDER THE ELECTRONIC OPERATING SYSTEM." International journal of business and management sciences 04, no. 05 (May 9, 2024): 119–40. http://dx.doi.org/10.55640/ijbms-04-05-11.

Full text
Abstract:
Internal control tools constitute one of the modern frameworks approved by the Committee of Sponsoring Organizations (COSO). "And the one which takes into account setting the objectives first, then estimating the possibility of those objectives being exposed to threats, then internal control procedures are designed that reduce the risks, and at the same time provide reasonable guarantees for achieving the organization's objectives and introducing all modern developments into the system. The contemporary trend of internal control focuses on the integration between managing the risks to which the organization is exposed and the internal control frameworks (Enterprise Risk Management- Integrated Framework) and its abbreviation (ERM), which provides the organization Management in conditions of uncertainty related to risks and their probabilities to be able to create and preserve value. The continuous developments in internal control systems, on the one hand, and competition between economic units, on the other hand, have led to many challenges through the use of modern technology and the innovation of new methods of development, which required the development of all sub-systems of control, including internal control systems, and then review the internal control structure and the extent of its acceptance of this computer-based technology and the effectiveness of its devices in providing information that supports the system's ability to adopt it. Based on this, the research topic was divided into five sections. The first section dealt with the research methodology, the second section dealt with the theoretical framework of the internal control system, and the third section dealt with the problems and limits of using electronic computers. The fourth section was devoted to studying the impact of using computers. The electronic section focuses on the components of the internal control system, while the fifth section is dedicated to stating the most important conclusions and recommendations.
APA, Harvard, Vancouver, ISO, and other styles
3

Vdovjak, Krešimir, Josip Balen, and Krešimir Nenadić. "Experimental Evaluation of Desktop Operating Systems Networking Performance." International journal of electrical and computer engineering systems 11, no. 2 (June 24, 2020): 67–76. http://dx.doi.org/10.32985/ijeces.11.2.2.

Full text
Abstract:
The rapid advancement of network, communication and Internet technology resulted with always-on, always-connected, device-independent and remote online working, business, education and entertainment environment. Consequently, users are searching for solutions and technologies that enable fast and reliable wide area network connection and the typical solution is through using personal computers connected with ethernet cable to network equipment and infrastructure that supports gigabit ethernet connection. Besides the complex network infrastructure that can influence performance, the bottleneck can also be caused by insufficient hardware, operating system and software resources on clients’ machines. Therefore, in this paper a networking performance evaluation of three globally most common and most used versions of Windows operating systems; namely Windows 7TM, Windows 8.1TM and Windows 10TM, on two identical computer systems, is conducted. Networking performance measurements are performed with three different benchmarks: namely iPerf, D-ITG and NetStress. Performance evaluation results showed that a newer versions of an operating system bring certain networking performance improvements but by sacrificing other performances.
APA, Harvard, Vancouver, ISO, and other styles
4

Kendysh, I. V. "Automated system for deploying operating systems using LAN (PXE SERVER)." Litiyo i Metallurgiya (FOUNDRY PRODUCTION AND METALLURGY), no. 1 (March 12, 2022): 82–85. http://dx.doi.org/10.21122/1683-6065-2022-1-82-85.

Full text
Abstract:
PXE is an environment for booting computers using a network card without using hard drives, CDs and other devices used while booting operating systems. By choosing a network boot in the BIOS, it is possible to install the OS / rid of viruses /recover disks /test RAM from the PXE Boot server. Such a tool is irreplaceable in the case of a large number of computers
APA, Harvard, Vancouver, ISO, and other styles
5

Ochilov, Nizomiddin. "Creating Secure File Systems in Open-Source Operating Systems." WSEAS TRANSACTIONS ON SYSTEMS 21 (November 24, 2022): 221–32. http://dx.doi.org/10.37394/23202.2022.21.24.

Full text
Abstract:
The relevance of this study is determined by insecure data storage on personal computers, as it is the main operating system that performs authentication and file access control. Bypassing these security rules is possible in case of using another open-source operating system on the same personal computer. The aim of this work is the research and development of file encryptors, disk encryptors and file system encryptors. Each of them has its shortcomings which manifest themselves during development. Combining the advantages of file encryptors and file system encryptors helped to overcome those shortcomings. The userspace filesystem library was used for this purpose. The study involved the methods aimed at designing and developing the Udev daemon file system for Linux using the OpenSSL library. The file system design was mathematically modelled and formally verified through a test parser. The file system also has its own authentication and authorization procedures to provide uniform access across multiple operating systems. The Udev daemon file system is the result of this work. Each file is encrypted with a separate key to protect against cryptanalysis. This key is encrypted with the owner’s private key, thereby enabling him/her to change the ownership. The passphrase is used to decrypt the user’s private key. The developed file system has passed authentication and access control testing successfully. The file system shows best performance with file sizes 1 KB to 256 MB. Encryption-caused performance degradation was also measured and found to be within acceptable limits. This Udev daemon stackable file system is available for all Unix clones with OpenSSL libraries. The prospects for further work are the development of a file system using several combined methods from a list of existing design and development methods for file systems.
APA, Harvard, Vancouver, ISO, and other styles
6

Craig, John S. "Managing Computer-Related Anxiety and Stress within Organizations." Journal of Educational Technology Systems 22, no. 4 (June 1994): 309–25. http://dx.doi.org/10.2190/mv5d-mykd-blla-06jl.

Full text
Abstract:
Computer-related anxiety and stress affects everyone who uses a computer and is aggravated by poor management, faulty system design, inadequate training, misunderstandings by users of what computers can do, and substandard documentation. Research has shown that computer users, no matter how experienced they are, can experience anxiety and stress that negatively affect their job performance. The problem is so pervasive that no single management strategy, ergonomic plan, training model, or system design can resolve the dilemma. Physical and psychological problems that afflict computer users can be reduced only by a united effort of all people involved with designing systems, training, and operating computers within organizations. This article reviews research in the field, and outlines how management, system designers, and technical communicators can help users relieve stress and anxiety when using and learning how to operate computers. When managers, designers, and technical communicators work together, factors that create computer stress and anxiety can be identified and reduced when computer systems and training are properly designed and managed.
APA, Harvard, Vancouver, ISO, and other styles
7

Dalimunthe, Ruri Ashari, Riki Andri Yusda, and William Ramdhan. "INSTALASI SISTEM OPERASI BERBASIS WINDOWS 10 PADA SEKOLAH MAN KISARAN." Jurdimas (Jurnal Pengabdian Kepada Masyarakat) Royal 3, no. 2 (July 14, 2020): 163–68. http://dx.doi.org/10.33330/jurdimas.v3i2.499.

Full text
Abstract:
Abstract: Community service activities entitled "Installation of Operating Systems Based on Windows 10" aims to provide information to students from MAN Asahan about Installing Windows Operating Systems. The method used in this activity is a direct observation of the MAN Asahan school by watching and analyzing the problems or troubleshooting that occurs at the Computer Lab at MAN Asahan. In addition, information on problems in the computer Labs of the school was also carried out by a team of lecturers as the perpetrators of this community service by way of direct interviews with the Teachers and employees who served in the Computer Lab of the MAN Asahan school. The end result of this dedication is how students can repair computers, as well as troubleshooting that occurs on school computers and computers at home, can be overcome alone without having to use computer repair services.Keywords: installation; operating system; Windows 10 Abstrak: Kegiatan pengabdian kepada masyarakat yang diberi judul “Instalasi Sistem Operasi Berbasis Windows 10” bertujuan untuk memberikan informasi kepada siswa dan siswi MAN Asahan tentang Instalasi Sistem Operasi Windows. Metode yang digunakan dalam kegiatan ini adalah observasi langsung ke sekolah MAN Asahan dengan melihat serta menganalisa permasalahan ataupun troubleshooting yang terjadi pada Laboratorium Komputer disekolah MAN Asahan. Selain itu, Informasi permasalahan pada komputer Lab sekolah juga dilakukan tim dosen selaku pelaku kegiatan pengabdian ini dengan cara wawancara langsung kepada Guru dan pegawai yang bertugas di Lab Komputer sekolah MAN Asahan. Hasil akhir dari pengabdian ini adalah bagaimana siswa dan siswi dapat memperbaiki komputer serta troubleshooting yang terjadi pada komputer sekolah maupun komputer dirumah dapat teratasi sendiri tanpa harus memakai jasa perbaikan komputer. Kata kunci: instalasi; sistem operasi; windows 10
APA, Harvard, Vancouver, ISO, and other styles
8

Saiedian, Hossein, and Munib Siddiqi. "A framework for the assessment of operating systems for small computers." ACM SIGICE Bulletin 21, no. 4 (April 1996): 2–27. http://dx.doi.org/10.1145/1059966.1059967.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Colling, J. A., and H. S. von Harrach. "A control and imaging system for dedicated STEM." Proceedings, annual meeting, Electron Microscopy Society of America 50, no. 2 (August 1992): 968–69. http://dx.doi.org/10.1017/s0424820100129474.

Full text
Abstract:
A new digital control system has been developed for the HB600 series of cold field-emission STEM’S manufactured by VG Microscopes. The philosophy behind this control scheme has been to develop a system which is both user-friendly for non-experts in STEM/TEM operation as well as offering access to all functions for unusual modes of operation.The control scheme, as shown in Fig.1, is based on two computers; one for instrument control, using a multi-tasking, real-time operating system (OS/2) with a graphical user interface (Presentation Manager), the other for control of image acquisition and display.The instrument control computer controls the high voltage power supply, column and stepper motor electronics via opto-isolated serial lines (RS232). The system is interrupt driven and therefore minimises the computer traffic which has the potential for causing interference in highly stable systems. An Ethernet link connects the two computers and a link to an external computer can also be implemented.
APA, Harvard, Vancouver, ISO, and other styles
10

MORIARTY, K. J. M., and T. TRAPPENBERG. "PROGRAMMING TOOLS FOR PARALLEL COMPUTERS." International Journal of Modern Physics C 04, no. 06 (December 1993): 1285–94. http://dx.doi.org/10.1142/s0129183193001002.

Full text
Abstract:
Although software tools already have a place on serial and vector computers they are becoming increasingly important for parallel computing. Message passing libraries, parallel operating systems and high level parallel languages are the basic software tools necessary to implement a parallel processing program. These tools up to now have been specific to each parallel computer system and a short survey will be given. The aim of another class of software tools for parallel computers is to help in writing or rewriting application programs. Because automatic parallelization tools are not very successful, an interactive component has to be incorporated. We will concentrate here on the discussion of SPEFY, a parallel program development facility.
APA, Harvard, Vancouver, ISO, and other styles
11

Murtaza, Hudabia, Hafiz Abdullah Tanweer, Muhammad Ahmad, Mannan Ahmad Rasheed, and Mansoor Ahmad Rasheed. "Efficient Application Protection against Untrusted Operating Systems." VFAST Transactions on Software Engineering 10, no. 4 (December 31, 2022): 123–30. http://dx.doi.org/10.21015/vtse.v10i4.1197.

Full text
Abstract:
Commodity monolithic systems are enormous, having lots of unprotection that leads to attacks. In this era of increasing technology, relying on mobile devices and other electronic devices increases the threat from adversaries as they have the potential to obtain physical access to many computers through breaching and security theft. It is still challenging to secure data as our operating systems are less trustworthy than we expected. When the operating system (OS) is destabilized, the application data and implementation are at the attacker's mercy. Other operating systems are less trustworthy than we imagined. Therefore when the OS is unstable, data and application implementation are vulnerable to attackers. Our protective application strategy includes a secure network platform, equipment modification, and efficiency expenditure. Existing protecting application scheme has different drawbacks, such as a vast trusted computing base, hardware refinement, and high-performance overhead. To overcome these drawbacks, we present the scheme of AppShield, which has a bare-metal hypervisor-based technique in which we safely protect the data of critical applications and their execution by application localization. Due to this, we protect only critical applications, and due to this, our operating system can run without performance loss.
APA, Harvard, Vancouver, ISO, and other styles
12

Liu, Honghai, Xianghua Hou, Minmin Miao, and Yong Zhang. "The Comparison of Teaching Achievement Evaluation of Operating System Course." Advances in Social Development and Education Research 1, no. 2 (April 11, 2024): 15. http://dx.doi.org/10.61935/asder.2.1.2024.p15.

Full text
Abstract:
Operating system is the basic program for managing and controlling software and hardware system such as computers. It is the most basic system software that runs directly on the bare metal. Since its birth in the last century, it has been widely used in personal computers, servers, smartphones and other fields playing a vital role in our lives, work, and entertainment. Many universities in different countries offer operating system course, which provides a relatively complete introduction to the key functional modules of operating systems, from the history of operating systems to the implementation of core principles. This paper takes the operating system course of a foreign university as an example, and evaluates the teaching result of the operating system course from the aspects of the basic introduction, student training goals, performance evaluation standards and student feedback improvement measures, etc., analyzing and comparing with the actual teaching situation of this course in China.
APA, Harvard, Vancouver, ISO, and other styles
13

Divyasheesh, Viplove, and Rakesh Jain. "Feasibility of Quantum Computers in Cryogenic Systems." International Journal of Engineering and Computer Science 9, no. 01 (January 21, 2020): 24919–20. http://dx.doi.org/10.18535/ijecs/v9i01.4412.

Full text
Abstract:
Quantum computers consist of a quantum processor – sets of quantum bits or qubits operating at an extremely low temperature – and a classical electronic controller to read out and control the processor. The machines utilize the unusual properties of matter at extremely small scales – the fact that a qubit, can represent “1” and “0” at the same time, a phenomenon known as superposition. (In traditional digital computing, transistors in silicon chips can exist in one of two states represented in binary by a 1 or 0 not both). Under the right conditions, computations carried out with qubits are equivalent to numerous classical computations performed in parallel, thus greatly enhancing computing power compared to today’s powerful supercomputers and the ability to solve complex problems without the sort of experiments necessary to generate quantum phenomena. this technology is unstable and needs to be stored in a cool environment for faster and more secure operation.In this paper, we discuss the possibility of integrating quantum computers with electronics at deep cryogenic temperatures.
APA, Harvard, Vancouver, ISO, and other styles
14

Sari, Renny Puspita, and Fiqri Syah Redha. "Sistem Pendukung Keputusan Pemilihan Distro Linux Menggunakan Metode Simple Additive Weighting (SAW)." Jurnal Sistem Komputer dan Informatika (JSON) 2, no. 3 (May 30, 2021): 348. http://dx.doi.org/10.30865/json.v2i3.3039.

Full text
Abstract:
Linux is a kernel whose development has been very active since it was first released to the public. With a large community, Linux development has penetrated into various fields in the world of computerization, including personal computers. Today, Linux can be used on a variety of devices from personal computers to embedded systems. The development is very active thanks to the large community and Linux adopting open source, many developers are making their own version of the Linux-based operating system. Versions and types of Linux-based operating systems are called distros or distributions. The number of versions and types of Linux-based operating systems, of course, confuses users who are trying Linux for the first time or who want to fully switch to Linux from another operating system. Decision support systems can provide alternative solutions for those users who are confused about choosing a Linux distribution. By using the Simple Additive Weighting (SAW) method, the existing criteria can be used as benchmarks in determining the Linux distribution of choice and therefore the accuracy of the system can exceed 90%
APA, Harvard, Vancouver, ISO, and other styles
15

Cho, Moon-Haeng, Chan-Woo Choi, and Cheol-Hoon Lee. "Design and Implementation of eRTOS Real-time Operating Systems for Wearable Computers." Journal of the Korea Contents Association 8, no. 9 (September 28, 2008): 42–54. http://dx.doi.org/10.5392/jkca.2008.8.9.042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Gayvoronskiy, S. A., Tatiana Al Ezangina, and A. V. Sobol. "Control Systems Synthesis of Maximum Robust Stability Degree Based on Vertex Critical Root Diagrams." Mekhatronika, Avtomatizatsiya, Upravlenie 24, no. 10 (October 9, 2023): 519–25. http://dx.doi.org/10.17587/mau.24.519-525.

Full text
Abstract:
The article solves the problem of operative selection of the redundant onboard equipment complex components configuration of the suitable in the current operating conditionаs in the interests of ensuring high fault tolerance of the complex, as well as achieving other operational and technical characteristics. The basis of the redundancy management system of the complex consists of configuration supervisors — as program subjects according to the number of its competitive configurations of heterogeneous and nonuniform equipment worked out in advance. The choice of the preferred configuration is proposed to be carried out by performing multi-level arbitration, which includes two phases of paired arbitration of computers and paired arbitration of configuration. It is proposed to include the means of both types of arbitration in each configuration supervisor, which ensures its self-sufficiency when participating in a competitive selection. The second part of the article is devoted to the computer’s arbitration for the implementation of redundancy management functions. The approach is applicable to a computing environment with many comparable computing devices and contains 2 phases. In the first phase, a preliminary selection of a competing pair of computers — as applicants for the implementation of redundancy management functions in them is carried out. In the break between the phases, the pair computers implement the procedures for pair arbitration of configurations given in the first part of the article. In the second phase, the final choice of the -computer is made, in which the supervisor who won the arbitration will be implemented. In order to achieve the maximum possible centralization of selection procedures and, as a consequence, the exclusion of " bottlenecks" in terms of reliability of places, additionally proposed: the organization of secure data exchange between computers based on distributed registry technology; the procedure of paired arbitration of computers, consisting in mutual cross-validation of dominant supervisors of a pre-allocated pair by comparing preference matrices, including information parcels of arbitration objects. A methodological example that demonstrates the features of the system functioning in the conditions of computers degradation is given. The proposed approach can be used to solve the problems of reconfiguration control of heterogeneous computing facilities of technical objects on-board equipment complexes.
APA, Harvard, Vancouver, ISO, and other styles
17

Zailani, Achmad Udin, Alvino Octaviano, and Sholihin Sholihin. "DESIGN OF COMPUTER REPAIR SERVICES APPLICATION ANDROID-BASED." TEKNOKOM 4, no. 1 (June 10, 2021): 7–15. http://dx.doi.org/10.31943/teknokom.v4i1.58.

Full text
Abstract:
Computers are one form of advances in electronic and informatics technology; the function of the computer itself serves as a tool for writing, drawing, editing images or photographs, or as a means of storage. Android, a Linux-based operating system, is a smart operating system that can compete with operating systems on a computer. Some of the problems identified include user difficulties in overcoming computer damage to determine whether to repair or buy a new unit, difficulty in reaching authorized service providers, risks when deciding to repair at a public service place, and limited access to information and costs repairing computer damage. This research specifically designs an Android application-based computer service application that makes it easier for people to get service services. The above research results formulate computer repair services using an Android-based platform with Android Studio and MySQL as the database for this study. This application is expected to be useful for customers in terms of time and cost.
APA, Harvard, Vancouver, ISO, and other styles
18

Beltman, Willem, Seth Bard, Travis North, Charles Oppenheimer, Paul Waters, Andrew Wiltzius, and Sean Zimmerman. "New ECMA 74 operating conditions for personal computers and workstations." INTER-NOISE and NOISE-CON Congress and Conference Proceedings 263, no. 1 (August 1, 2021): 5019–26. http://dx.doi.org/10.3397/in-2021-2921.

Full text
Abstract:
Annex C in ECMA 74 outlines the operating conditions for personal computers and workstations during acoustic testing. In practice, the way systems are used and designed changes over time. After InterNoise 2018 in Chicago, a special IT industry workgroup was formed with the goal to update this section in Annex C to better reflect current workloads during use. This paper outlines the new operating conditions that were developed by this workgroup. It describes the different operating modes to be measured, and how to set and document power and performance parameters during the acoustic measurements. In addition to the standard idle condition, it includes operating conditions selected from the following usage scenarios: 1) web browsing, 2) office productivity, 3) media content creation, and 4) power user/gaming.
APA, Harvard, Vancouver, ISO, and other styles
19

I nyoman, Edy saputra Edy, IGAP Raka Agung, and Yoga Divayana. "ED-255EK Embeded Education Platform Sebagai Modul Praktikum Embeded System Dengan Robot Arm Module Dan Voice Module." Majalah Ilmiah Teknologi Elektro 18, no. 1 (May 6, 2019): 91. http://dx.doi.org/10.24843/mite.2019.v18i01.p13.

Full text
Abstract:
Abstract— Literally embedded systems are defined as equipment that computes a particular job. Embedded Linux System was also developed as a means of education, one of which is ED-255EK Embedded Education Platform, designed to be very practical and consume very low power. ED-255EK is also equipped with a PXA255 processor that is compatible with ARM version 5TE ISA, so it can be used to carry out various kinds of lab work or experiments on embedded systems. The working principle of this tool begins with the configuration of data communication between Fedora Linux and ED-255EK. When the communication goes well, it is downloaded by the ED-255EK system to a laptop or computer that has been installed with the Fedora 9.0 Linux operating system. To take advantage of the ED-255FPGA module, driver module installation is required first, after which the application program is installed. Laptops or computers that have installed the Fedora 9.0 Linux operating system will act as input and output programs making it easier to monitor each module that is being run. The module used is the ARM 1923 Robot Module and Voice Module ED4321.
APA, Harvard, Vancouver, ISO, and other styles
20

Winzerling, Werner. "Linux und Freie Software." PROKLA. Zeitschrift für kritische Sozialwissenschaft 32, no. 126 (March 1, 2002): 37–55. http://dx.doi.org/10.32387/prokla.v32i126.712.

Full text
Abstract:
Since the great success of the operating system Linux, the development of Free and Open Source Software is broad discussed. This is also seen as the beginning of a new economic development. This paper examines, what makes Linux actually so significant for the computer industry. First Linux is critical evaluated and placed opposite the Microsoft operating systems. Than some substantial new influences on the development and production in the computer industry are worked out. On the one hand this are modifications in the production chain of computers and on the other hand network effects (externalization), which proceed from these products. On the basis of this new economic situation the Linux phenomenon is explained and it is shown from which the great importance of Microsoft in the computer industry results at present.
APA, Harvard, Vancouver, ISO, and other styles
21

Almisreb, Ali, Hana Hadžo Mulalić, Nina Mučibabić, and Refija Numanović. "A review on mobile operating systems and application development platforms." Sustainable Engineering and Innovation 1, no. 1 (June 1, 2019): 49–56. http://dx.doi.org/10.37868/sei.v1i1.94.

Full text
Abstract:
The previous existing mobile technologies were only limited to voice and short messages, organized between several network operators and service providers. However, recent advancements in technologies, introduction, and development of the smartphones added many features such: high-speed processors, huge memory, multitasking, screens with large-resolution, utile communication hardware, and so on. Mobile devices were evolving into general-purpose computers, which resulted in the development of various technological platforms, operating systems, and platforms for the development of the applications. All these results in the occurrence of various competitive offers on the market. The above-mentioned features, processing speed and applications available on mobile devices are affected by underlying operating systems. In this paper, there will be discussed the mobile operating systems and application development platforms.
APA, Harvard, Vancouver, ISO, and other styles
22

Hartman, Amiel, and Vidya K. Nandikolla. "Human-Machine Interface for a Smart Wheelchair." Journal of Robotics 2019 (January 2, 2019): 1–11. http://dx.doi.org/10.1155/2019/4837058.

Full text
Abstract:
The paper describes the integration of hardware and software with sensor technology and computer processing to develop the next generation intelligent wheelchair. The focus is a computer cluster design to test high performance computing for smart wheelchair operation and human interaction. The LabVIEW cluster is developed for real-time autonomous path planning and sensor data processing. Four small form factor computers are connected over a Gigabit Ethernet local area network to form the computer cluster. Autonomous programs are distributed across the cluster for increased task parallelism to improve processing time performance. The distributed programs operating frequency for path planning and motion control is 50Hz and 12.3Hz for 0.3 megapixel robot vision system. To monitor the operation and control of the distributed LabVIEW code, network automation is integrated into the cluster software along with a performance monitor. A link between the computer motion control program and the wheelchair joystick control of the drive train is developed for the computer control interface. A perception sensor array and control circuitry is integrated with the computer system to detect and respond to the wheelchair environment. Multiple cameras are used for image processing and scanning laser rangefinder sensors for obstacle avoidance in the cluster program. A centralized power system is integrated to power the smart wheelchair along with the cluster and sensor feedback system. The on board computer system is evaluated for cluster processing performance for the smart wheelchair, incorporating camera machine vision and LiDAR perception for terrain obstacle detection, operating in urban scenarios.
APA, Harvard, Vancouver, ISO, and other styles
23

Coşkun, Aysun, and Ümit Bostancı. "Evaluation of the most preferred operating systems on computers in terms of vulnerabilitiesBilgisayarlarda en çok tercih edilen işletim sistemlerinin güvenlik açıklıkları açısından değerlendirilmesi." Journal of Human Sciences 13, no. 3 (November 12, 2016): 4545. http://dx.doi.org/10.14687/jhs.v13i3.4128.

Full text
Abstract:
Because it is one of the most fundamental programsrunning on the computer, operating systems, are known to provide security infrastructure for other programs and services that run on computer. Unless any precautions are taken against vulnerabilities on the operating system, the system becomes eligible to be exploited, it paves the way to achieve the target of attackers. Hence, remediation of vulnerabilities on the operating system is evaluated to be extremely significant. In this study,a new database was created by questioning vulnerabilities existing in the most widely used operating systems on desktop and laptop computers from National Vulnerability Database of the US and CVEDETAILS databases. With regard to these vulnerabilities, CVSS scoring system which is used for scoring them created by FIRST was examined, in the light of the of re-scoring of identified vulnerabilities, the analysis of security of the operating systems was done with quantitative methods. One of the most important element of cyber security, fundementals of vulnerabilities, and role in the exploitation of the vulnerabilities of the computers were explained. In this study recently occured cyber security incidents because of vulnerabilities were also examined, and information about vulnerabilities allowing attack in these events was collected. Consequently, considering hosting the vulnerabilities, it is aimed to assess the availability of the operating systems in terms of security. ÖzetBilgisayar üzerinde çalışan en temel programlardan biri olması sebebiyle işletim sistemlerinin bilgisayar üzerinde çalışan diğer programlara ve servislere güvenlik altyapısı sağladığı bilinmektedir. İşletim sistemi üzerindeki güvenlik açıklıklarına karşı gereken önlemler alınmaz ise, sistem istismar edilmeye uygun hale gelmekte, bu durum saldırganların hedeflerine ulaşması için zemin hazırlamaktadır. Bu sebeple, işletim sistemlerinin üzerindeki güvenlik açıklıklarının kapatılmasının son derece önemli olduğu değerlendirilmektedir. Bu çalışmada bilgisayarlarda en çok kullanılan işletim sistemlerinde var olan güvenlik açıklıkları ABD’nin Ulusal Açıklık Veritabanı ve CVEDETAILS veritabanlarından sorgulanarak yeni bir veritabanı oluşturulmuştur. Toplanan açıklıklarla ilgili olarak FIRST tarafından oluşturulmuş CVSS puanlama sistemiyle yapılan puanlamalar incelenmiş, tespit edilen açıklıkların yeniden puanlamaları yapılarak çıkan sonuçlar ışığında işletim sistemlerinin güvenlik açısından analizi nicel yöntemlerle yapılmıştır. Siber güvenliğin en önemli unsurlarından birisi olan güvenlik açıklıklarıyla ilgili temel hususlar ile açıklıkların bilgisayarların istismar edilmesindeki rolü ortaya konulmuştur. Çalışmada ayrıca; yakın geçmişte açıklıklar kullanılarak gerçekleştirilen siber güvenlik olayları incelenmiş, bu olaylarda saldırıya imkan sağlayan açıklıklarla ilgili bilgiler toplanmıştır. Sonuçta, barındırdığı açıklıklar dikkate alındığında, işletim sistemlerinin kullanılabilirliğinin güvenlik açısından değerlendirmesi hedeflenmektedir.
APA, Harvard, Vancouver, ISO, and other styles
24

Grevisse, Y. R., Albert L. A. T. Raymond, K. M. Clovis, K. K. Chappelle, I. K. ,. Corneille, K. S. David-Jackson, K. S. Elisée, and I. K. Désiré. "Operational approach to kernel system protection under Windows Server 2019: Optimization, QoS and Performance." European Journal of Computer Science and Information Technology 11, no. 2 (February 15, 2023): 70–99. http://dx.doi.org/10.37745/ejcsit.2013/vol11n27099.

Full text
Abstract:
Computer Sciences has become the culmination of all human activity these days, but it is also the worst fear that no epidemic has inspired today. And despite this, everyone concedes that the use of computers (especially through the Internet) now occupies the first place, even essential, in everyday life. Each of us uses a computer to work, to exchange information, to make purchases, etc. Unfortunately, malicious activity targeting computers is steadily increasing and trying to exploit vulnerabilities that are growing in number with ever-increasing complexity. In view of this, the present research has set itself the objective of mending the adequacy (optimization, dynamics and performance) of operating systems to their various deployment environments by emancipating a priori approaches, generally lacking in their capacity. to surpass future needs especially for the correction of security vulnerabilities, focusing on the functionalities of the hardware environment.
APA, Harvard, Vancouver, ISO, and other styles
25

van Delft, Falco C. M. J. M., Giulia Ipolitti, Dan V. Nicolau, Ayyappasamy Sudalaiyadum Perumal, Ondřej Kašpar, Sara Kheireddine, Sebastian Wachsmann-Hogiu, and Dan V. Nicolau. "Something has to give: scaling combinatorial computing by biological agents exploring physical networks encoding NP-complete problems." Interface Focus 8, no. 6 (October 19, 2018): 20180034. http://dx.doi.org/10.1098/rsfs.2018.0034.

Full text
Abstract:
On-chip network-based computation, using biological agents, is a new hardware-embedded approach which attempts to find solutions to combinatorial problems, in principle, in a shorter time than the fast, but sequential electronic computers. This analytical review starts by describing the underlying mathematical principles, presents several types of combinatorial (including NP-complete) problems and shows current implementations of proof of principle developments. Taking the subset sum problem as example for in-depth analysis, the review presents various options of computing agents, and compares several possible operation ‘run modes’ of network-based computer systems. Given the brute force approach of network-based systems for solving a problem of input size C, 2 C solutions must be visited. As this exponentially increasing workload needs to be distributed in space, time, and per computing agent, this review identifies the scaling-related key technological challenges in terms of chip fabrication, readout reliability and energy efficiency. The estimated computing time of massively parallel or combinatorially operating biological agents is then compared to that of electronic computers. Among future developments which could considerably improve network-based computing, labelling agents ‘on the fly’ and the readout of their travel history at network exits could offer promising avenues for finding hardware-embedded solutions to combinatorial problems.
APA, Harvard, Vancouver, ISO, and other styles
26

Budiharto, Widodo. "Implementasi dan Evaluasi Penerapan Globus Toolkit untuk Aplikasi Grid Computing." ComTech: Computer, Mathematics and Engineering Applications 3, no. 1 (June 1, 2012): 695. http://dx.doi.org/10.21512/comtech.v3i1.2469.

Full text
Abstract:
Grid computing is a distributed computing technology that utilizes resources connected through a free computer network, yet coordinated with a specific mechanism. The development of grid computing infrastructure is not easy because it takes skill and experience in the installation and configuration of both Linux-based and open source program. In this study, the author built a grid computing infrastructure based on Debian 4, and used Globus Toolkit 4.1.2 on three computers. The WSRF technology was tried to run as an indication that the grid infrastructure has been successfully built. Based on some experiments in this study, grid computing can run well on the three computers with a user interface of web-based grid system using the UCLA Grid Portal. Overall the system runs fine, but it requires high experiences and comprehensions upon the Linux operating systems as well as computer networks in the installation process.
APA, Harvard, Vancouver, ISO, and other styles
27

Daunys, Einaras, and Sigita Turskienė. "Kompiuterių tinklo gedimų registravimo sistemos modeliavimas." Informacijos mokslai 50 (January 1, 2009): 262–66. http://dx.doi.org/10.15388/im.2009.0.3228.

Full text
Abstract:
Darbe aptariami esamų kompiuterių tinklų registravimo sistemų technologiniai trūkumai, pateikiama gedimų registracijos sistema papildyta nešiojamais įrenginiais, nurodant jų ypatumus. Analizuojamos galimybės sukurti ir įdiegti į praktiką kompiuterių tinklų gedimų registravimo programinį produktą delniniams kompiuteriams. Darbe apžvelgtos delninių kompiuterių operacinės sistemos ir jų ypatybės, parinkta optimali aplikacijos kūrimo platforma. Aplikaciją sudaro dvi dalys: darbui su duomenų bazesukurtos klasės ir vartotojo grafi nės sąsajos klasės. Grafi nė vartotojo sąsaja sukonstruota Java Swing komponentų pagrindu. Sukurtas programinis produktas testuotas keliose operacinėse sistemose pagal kelis kriterijus. Testavimo rezultatai patvirtino siūlomos sistemos mobilumo pranašumus.Modeling of the Computer Networks’ Failure Registration SystemEinaras Daunys, Sigita Turskienė SummaryThis work examines the opportunities to develop and implement the practice of computer networks fault registration software products for handheld computers. The paper outlines the handheld computer operating systems and their characteristics, selected the optimum application development platform. It consists of two parts: work with the database created by the class, and a graphical user interface class. The graphical user interface’s design is based on the Java Swing components. The software product is tested in several operating systems, according to several criteria. Test results confi rmed the proposed system of mobility benefi ts.
APA, Harvard, Vancouver, ISO, and other styles
28

Schevelev, S. S. "Reconfigurable Modular Computing System." Proceedings of the Southwest State University 23, no. 2 (July 9, 2019): 137–52. http://dx.doi.org/10.21869/2223-1560-2019-23-2-137-152.

Full text
Abstract:
Purpose of research. A reconfigurable computer system consists of a computing system and special-purpose computers that are used to solve the tasks of vector and matrix algebra, pattern recognition. There are distinctions between matrix and associative systems, neural networks. Matrix computing systems comprise a set of processor units connected through a switching device with multi-module memory. They are designed to solve vector, matrix and data array problems. Associative systems contain a large number of operating devices that can simultaneously process multiple data streams. Neural networks and neurocomputers have high performance when solving problems of expert systems, pattern recognition due to parallel processing of a neural network.Methods. An information graph of the computational process of a reconfigurable modular system was plotted. Structural and functional schemes, algorithms that implement the construction of specialized modules for performing arithmetic and logical operations, search operations and functions for replacing occurrences in processed words were developed. Software for modelling the operation of the arithmetic-symbol processor, specialized computing modules, and switching systems was developed.Results. A block diagram of a reconfigurable computing modular system was developed. The system consists of compatible functional modules and is capable of static and dynamic reconfiguration, has a parallel connection structure of the processor and computing modules through the use of interface channels. It consists of an arithmeticsymbol processor, specialized computing modules and switching systems; it performs specific tasks of symbolic information processing, arithmetic and logical operations.Conclusion. Systems with a reconfigurable structure are high-performance and highly reliable computing systems that consist of integrated processors in multi-machine and multiprocessor systems. Reconfigurability of the structure provides high system performance due to its adaptation to computational processes and the composition of the processed tasks.
APA, Harvard, Vancouver, ISO, and other styles
29

Stanković, Miloš, and Umit Karabiyik. "Exploratory Study on Kali NetHunter Lite: A Digital Forensics Approach." Journal of Cybersecurity and Privacy 2, no. 3 (September 19, 2022): 750–63. http://dx.doi.org/10.3390/jcp2030038.

Full text
Abstract:
Mobile devices, specifically smartphones, have become a necessity in everyday life, as we perform many essential day-to-day tasks using these devices. With the projected increase in mobile devices to 18.22 billion by 2025, the reliance on smartphones will only grow. This demand for smartphones has allowed various companies to start developing their own devices and custom operating systems, each of which puts its own touch on them. In addition, current smartphones have increased processing power, providing users with a computer experience in their pockets. Software developers have taken this opportunity to bridge the gap between personal computers and smartphones by creating the same software for personal computers and mobile devices. Kali Linux is one of the most popular penetration testing tools for desktop use and has been adapted to operate on mobile devices under the name Kali NetHunter. Kali NetHunter has three different versions on mobile platforms that provide various levels of capabilities. Kali NetHunter is just one example in which an application or an operating system applies to a specific niche of users. Highly customized operating systems or applications do not receive the same attention as field research, leaving them unfamiliar to mobile forensic investigators when used maliciously. In this paper, we conducted an exploratory study on the Kali NetHunter Lite application after it was installed and its embedded tools were utilized. Our results show a detailed analysis of the file system and reveal the data from the tests carried out during various phases. Furthermore, the locations of the folders involved in the process were described.
APA, Harvard, Vancouver, ISO, and other styles
30

Wang, Yingjun, Shaoyang He, and Yiran Wang. "AI-Assisted Dynamic Modelling for Data Management in a Distributed System." International Journal of Information Systems and Supply Chain Management 15, no. 4 (October 1, 2022): 1–18. http://dx.doi.org/10.4018/ijisscm.313623.

Full text
Abstract:
There are many interdependent computers available in distributed networks. In such schemes, overall ownership costs comprise facilities, such as computers, controls, etc.; buying hardware; and running expenses such as wages, electrical charges, etc. Strom use is a large part of operating expenses. AI-assisted dynamic modelling for data management (AI-DM) framework is proposed. The high percentage of power use is connected explicitly to inadequate planning of energy. This research suggests creating a multi-objective method to plan the preparation of multi-criteria software solutions for distributed systems using the fuzzy TOPSIS tool as a comprehensive guide to multi-criteria management. The execution results demonstrate that this strategy could then sacrifice requirements by weight.
APA, Harvard, Vancouver, ISO, and other styles
31

Brenner, Asher. "Use of computers for process design analysis and control: sequencing batch reactor application." Water Science and Technology 35, no. 1 (January 1, 1997): 95–104. http://dx.doi.org/10.2166/wst.1997.0022.

Full text
Abstract:
Computers have become a vital part of every modern wastewater treatment plant. They can be used for design, analysis, and control of the treatment process. Mathematical modelling and simulation of various process configurations, load conditions, and operational strategies lead to better understanding and improved design and operation. Computer assisted analysis of process performance and automatic control of plant units aid reduce expenses related to energy, chemicals, and man power. Stringent disposal constraints imposed in most modern countries require application of sophisticated computerized control systems to ensure high quality effluents. The sequencing batch reactor system is similar to the conventional activated sludge process in its ability to achieve biological removal of organic carbon and nutrients by a single sludge. However, due to the non-steady-state nature of the process, and to the large substrate and nutrient gradients occurring during the operating cycle, some modifications in the traditional activated sludge waste characterization and process modelling should be considered.
APA, Harvard, Vancouver, ISO, and other styles
32

Turčáni, Milan, and Zoltan Balogh. "MODERN TEACHING OF COMPUTER SUBJECTS TO SUPPORT WEB 2.0 TECHNOLOGIES." Problems of Education in the 21st Century 46, no. 1 (October 1, 2012): 138–45. http://dx.doi.org/10.33225/pec/12.46.138.

Full text
Abstract:
The subject of our interest is an educational process, which is a dynamic process, changing in time, and can be examined from various viewpoints. We can focus on participants of this process, i.e. on students and lecturers, and observe their mutual relations and interactions. Educational process understood as a dynamic system is an insofar extensive sphere that it provides almost limitless opportunities of observation, modelling and simulation. In this contribution we shall focus mainly on the special part of educational processes – on teaching of subjects focusing on technical and system issues (Logical systems, Architecture of computers, Operating systems and Computer networks), which are specific with their focus on adopting the knowledge on principles and functionality of computer systems for the processing and transfer of information within the studies of informatics. Key words: e-learning, learning management system, blended learning, modelling of Petri nets, adaptive hypermedial systems, model of user, information and communication technology.
APA, Harvard, Vancouver, ISO, and other styles
33

Makwana, Yasin, Dereje Agonafer, and Dan Manole. "Impact of TXV and Compressor in the Stability of a High-End Computer Refrigeration System." Journal of Electronic Packaging 126, no. 4 (December 1, 2004): 554–59. http://dx.doi.org/10.1115/1.1827272.

Full text
Abstract:
The combination of increased power dissipation and increased packaging density has led to substantial increases in chip and module heat flux in high-end computers. The challenge is to limit the rise in chip temperature above the ambient. In the past, virtually all commercial computers were designed to operate at temperatures above the ambient. However, researchers have identified the advantages of operating electronics at low temperatures. Until recently, large-scale scientific computers used direct immersion cooling of single-chip modules. The current research focuses on mainframes (computer system), which uses a conventional refrigeration system to maintain chip temperatures below that of comparable air-cooled systems, but well above cryogenic temperatures. Multivariable control of compressor speed along with thermostatic expansion valve (TXV) opening can give better stability and performance. TXV is a mechanical controlling device used in the refrigeration system. The compressor is the only mechanical-working component in the refrigeration cycle that circulates refrigerant through the system continuously. Hence, controlling the compressor is an important aspect. The control objective is defined as improving the transient behavior of the vapor compression cycle for the refrigeration system operating around an evaporator set-point temperature. The system behavior is studied in two cases, TXV being the only control element in the first case, while TXV and a compressor both act as control elements in the other case.
APA, Harvard, Vancouver, ISO, and other styles
34

Hidayat, Muh Adrian Juniarta, and Hadian Mandala Putra. "Sistem Keamanan Server Linux CentOS Dengan Metode Port Knock dan RST Cookies." Infotek : Jurnal Informatika dan Teknologi 6, no. 2 (July 20, 2023): 411–20. http://dx.doi.org/10.29408/jit.v6i2.17500.

Full text
Abstract:
The increase in online-based services makes a security system for server computers increasingly needed. A server computer is a device that must always be available to be accessed anytime and anywhere. Some of the security systems needed for server computers include security for ssh port access for remote server access needs and a security system to protect servers from Denial of Service (DoS) attacks which can make the server down and completely inaccessible. In this study, a security system is proposed for a server computer with the Linux CentOS operating system on a port 22 secure shell(ssh) access system using the port knock method and a security system to prevent Denial of Service (DoS) attacks on server computers using the RST Cookies method. The simulation results from the port 22 Secure Shell (SSH) access experiment for the server computer can work well where port 22 Secure Shell(SSH) will remain closed and cannot be accessed carelessly except by accessing several ports first according to predefined port knocking rules. Likewise, the implementation of a security system with the RST Cookies method works very well to prevent Denial of Service (DoS) attacks and can still keep the server accessible with a good response time of under 1 ms
APA, Harvard, Vancouver, ISO, and other styles
35

Alexa, Vasile, Sorin Ratiu, and Imre Kiss. "Laboratory assembly for analysis of fuel injection systems in the modern internal combustion engines." Analecta Technica Szegedinensia 8, no. 1 (January 11, 2014): 54–58. http://dx.doi.org/10.14232/analecta.2014.1.54-58.

Full text
Abstract:
The complexity of the processes taking place in a system of fuel injection management for an internal combustion engine requires extra effort for a proper understanding of the operating principles. This paper is intended to be an intuitive practical application able to simulate the complex electronic control of injection, through a PC and specialized software. The application provides an intuitive and friendly analysis of the processes occurring during the operation of an injection computer. Moreover, the system allows the determination of the gasoline amount injected by the various types of fuel injectors, in a certain period of time and at different pressures of the fuel, depending on the load, speed and thermal regime of the engine. The laboratory assembly for a fuel injection system is intended as an experimental stand with exclusive didactical applicability. We want to observe the main characteristics of a fuel feeding and injection system, as the identification of components for the control system, data acquisition system and fuel injection system, the analysis of the different types of signals that can be used to actuate the injectors, the establishing the principles of injector operation in accordance with the control electronics, the visualization of the injection cadence and amount injected, depending on the engine speed and load, the programming of injection computers etc.
APA, Harvard, Vancouver, ISO, and other styles
36

GARCIA RODRIGUEZ, CARLOS ALBERTO, PEDRO QUINTO DIEZ, JOSE ALFREDO JIMENEZ BERNAL, and IGNACIO CARVAJAL MARISCAL. "ELECTRICAL POWER GENERATED FROM AN OPERATING DESKTOP COMPUTER THROUGH WASTE HEAT RECOVERY." DYNA 96, no. 4 (July 1, 2021): 345. http://dx.doi.org/10.6036/10150.

Full text
Abstract:
Use of heat recovery systems applied to different industries as a technology to increase energy efficiency [1] is becoming more and more common, one third of the total energy consumption is related to the industrial sector, and of this, about fifty percent is wasted as heat [2]. Increasing use of different types of computers forces us to rethink the possibility of improving their energy efficiency and consequently reducing their energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
37

BRODIE, MICHAEL L., and STEFANO CERI. "ON INTELLIGENT AND COOPERATIVE INFORMATION SYSTEMS: A WORKSHOP SUMMARY." International Journal of Cooperative Information Systems 01, no. 02 (June 1992): 249–89. http://dx.doi.org/10.1142/s0218215792000209.

Full text
Abstract:
Future information systems will involve large numbers of heterogeneous, intelligent agents distributed over large computer/communication networks. Agents may be humans, humans interacting with computers, humans working with computer support, and computer systems performing tasks without human intervention. We call such systems Intelligent and Cooperative Information Systems (ICISs). Although we can imagine extensions of capabilities of current ISs and of individual contributing core technologies, such as databases, artificial intelligence, operating systems, and programming languages, we cannot imagine the capabilities of ICISs which we believe will be based on extensions of these and other technologies. Neither do we know exactly what technologies and capabilities will be required, what challenges will arise, nor how the technologies might be integrated or work together to address the challenges. In this paper, we provide initial definitions for key concepts and terms in this new area, identify potential core contributing technologies, illustrate the ICIS concept with example systems, and pose basic research questions. We also describe the results of discussions on these topics that took place at the Second International Workshop on Intelligent and Cooperative Information Systems held in Como, Italy, October 1991. The workshop focused on core technologies for ICISs. The workshop and the results reflect the multi-disciplinary nature of this omerging area.
APA, Harvard, Vancouver, ISO, and other styles
38

AL-HANANI, ALI, and VENUS W. SAMAWI. "virus Detection Using Cryptography Algorithm." Iraqi Journal for Computers and Informatics 27, no. 1 (June 30, 1996): 8–15. http://dx.doi.org/10.25195/ijci.v27i1.220.

Full text
Abstract:
Many papers have been published about manipulating computer viruses; instructions that impact a computer system and after a period of incubation and reproducion, activate and demonstrate their presence. mest Viruses were designed to attack microcomputers, sincce microcomputers are widely used nowadays, and have simple operating systems which result in lack of quality of their security systern. Connecting computers with networks and using copies of programs from unreliable sources such as bullet in board systems will increase the :of viral contact and the spread of viruses. Data Encryption disguises data flowing through a network so that it is unintelligible to any one monitor the data, Encryption techniques can also be used to detect file modification which may caused either by unithorized users or by viruses. This paper concern in viruses atracking users on system files (.exe and com) in microcomputer sytems, where viruses Types, how they work, and anti-virus streiagies are going o scussed. Finally, a dccction stralegy depending on Encryption techniques built the operating sysiems Suggested to improve PCs Security and preventing unauthorized users from inserting into programas commands that will cause system corruption.
APA, Harvard, Vancouver, ISO, and other styles
39

Manapa, Esther Sanda, Eliyah Acantha M. Sampetoding, Tommy Wijaya Sagala, and Hoxy Ryner Taluay. "Ulasan Penelitian Sistem Operasi Waktu Nyata di Indonesia." Journal Dynamic Saint 5, no. 2 (February 5, 2021): 973–79. http://dx.doi.org/10.47178/dynamicsaint.v5i2.1109.

Full text
Abstract:
Over the past 30 years, development of semiconductor manufacturing has resulted in smaller and faster computers. Its presence results in the development of sophisticated devices and processing large amounts of data quickly and reliably. More and more functionality on the system devices, needed effective and efficient resources. In some cases, only real-time operating systems (RTOS) can gather time and resources from these systems.. Whether using the software on an automation device, or middleware level to help communicate between programs, or using the software, it will be useful to know when RTOS uses the right platform for the application. This paper focus on various RTOS research and development over the past ten years in Indonesia. The main objective is to enable readers to understand the basic concepts of real time operating systems and stimulate further research in Indonesia regarding real time operating systems on automation devices.
APA, Harvard, Vancouver, ISO, and other styles
40

Wang, Jinying, and Jing Yang. "Multi-Threaded Data Communication in Java for Advanced Computing Environments." Scalable Computing: Practice and Experience 24, no. 4 (November 17, 2023): 1087–96. http://dx.doi.org/10.12694/scpe.v24i4.2383.

Full text
Abstract:
The performance of operating systems like computers requires the proper functioning of the computer language interpreter. This interpreter follows various types of programming languages that make the performing of computer programming easy and effective. The application of the programming language of Java helps in processing multiple tasks at once. This research analyzes the novelty of Java-based data communication models in advanced computing services. This performance makes the saving of the resources used for the development of the programming language. All these development includes the performing of the multiple threads communication data processing. These multiple threads help distribute the single processed input in the multi-channel language processing, thus helping the work competition in time. It also reduces the cost of maintaining the programming languages reduced. Thus, the implementing cost of resources required for programming performance is reduced. Therefore, this implementation impacts the programmer to become more indented to use the language transformation process of Java. Moreover, it creates a more effective representation of the audio or visual content represented by a multi-tasking operating system. In this process of development in the language transformation of the operating system, the ability of the operating system for data processing improves. The systematic process of this language transformation helps in systematically transforming multiple programs at once.
APA, Harvard, Vancouver, ISO, and other styles
41

Oyelude, Adetoun A. "Open source software for library systems – 2." Library Hi Tech News 33, no. 9 (November 7, 2016): 10–13. http://dx.doi.org/10.1108/lhtn-09-2016-0044.

Full text
Abstract:
Purpose This paper aims to concentrate on reviewing articles on open source software (OSS), found on the internet, that were published in the year 2016. Design/methodology/approach A critical look is taken at OSS generally as found in the literature and also on the commonly used OSS in libraries and information science work or research work. Findings It is hoped that this review will assist in pointing out the trends and aid in informed decision-making, as it concerns OSS. Social implications Akintomide (2016) described OSS as a part of human existence which is exhibited in mobile devices that run on the android operating system, to computers, laptops and servers that run on the Linux operating system, to other software (Library management software inclusive) that are open access. Originality/value The openness of it makes the users (libraries and scholars) leave documentation that steers how the open software technologies are implemented and by whom. They are free, have used communities, are vetted by users and are constantly in development.
APA, Harvard, Vancouver, ISO, and other styles
42

Shishmanov, Krasimir, and Kremena M. Marinova. "SPECIFICS IN THE FUNCTIONING OF A DIGITAL ENTERPRISE." Innovative economics and management 10, no. 3 (November 29, 2023): 111–23. http://dx.doi.org/10.46361/2449-2604.10.3.2023.111-123.

Full text
Abstract:
Krasimir Shishmanov E-mail: k.shishmanov@uni-svishtov.bg PhD, Professor, D. A. Tsenov Academy of Economics. Svishtov, Bulgaria https://orcid.org/0000-0001-9874-2149 Kremena M. Marinova E-mail: k.marinova@uni-svishtov.bg PhD, Head assistant professor, D. A. Tsenov Academy of Economics Svishtov, Bulgaria https://orcid.org/0000-0001-8035-7891 Abstract: The Digital Enterprise is an organization that uses information technology (IT) to gain a competitive advantage in all aspects of its operations, including production, business processes, marketing, and customer interaction. Many characteristics divide building and operating a digital firm from marketing. Computers incorporated in all devices monitor and control physical processes, influencing production and control systems via a feedback loop. The idea in digital enterprises is not only to create automated systems where computers are integrated or embedded in certain physical devices or systems, but to combine and harmonize more production models with computer ones. The aim of the study is to reveal and analyze characteristics of digital enterprise and to bring out those of them that are specific to it, distinguish it from the traditional enterprise and determine its functioning. To achieve that goal, we determined stages in the development of the infrastructure of the digital enterprise and a key requirement to a universal monitoring system which supports it. Based on our research we can conclude that the main goal of digital enterprise is to mix and harmonize traditional production methods with computerized ones, involving human participation in it. the main problem we distinguished is the complexity of providing the most trustworthy and relevant data, which came from many and heterogeneous sources.
APA, Harvard, Vancouver, ISO, and other styles
43

D., Iorgulescu. "Analysis of using and operating conditions of the naval power equipment according to the waveinduced ship load." Scientific Bulletin of Naval Academy XIX, no. 1 (July 15, 2018): 247–55. http://dx.doi.org/10.21279/1454-864x-18-i1-038.

Full text
Abstract:
This article analyzes the conditions of operation and exploitation of the ship's power equipment using the meteorological conditions and the type of ship. Based on the naval power systems and new shipbuilding technologies,we are looking for optimization and increased reliability of shipboard automation and navigation systems that are on board. The article analyzes and presents solutions about the complex problems that arise in the work of the engineer that is on board. It is demonstrated the importance of the quality indicators of the naval power system for improving the operating conditions of the existing plants and to modernize the ship by providing new equipment and computers whose optimal working is influenced by the quality of the electrical energy that is onboard. In this paper it is followed the ranking of the implemented control, monitoring and protection of the electrical energy system and the propulsion power of the systems, in which the physical and functional integrity is a vital design philosophy. This can be centralized or distributed by the computers. The study of the waves is done in order to estimate the induced demands in the structure of the ship and their influence on the equipments and the devices that are on-board. The analysis is performed using experimental and theoretical values as input data in the analysis with finite elements. For the estimation of structural strength of the ship and on-board equipment it is necessary to determine the extreme values of the wave-induced loads
APA, Harvard, Vancouver, ISO, and other styles
44

Bernard, Paweł, Paweł Broś, and Anna Migdał-Mikuli. "E-ASSESSMENT OF STUDENTS BASED ON PERSONAL RESPONSE SYSTEM." Problems of Education in the 21st Century 35, no. 1 (November 25, 2011): 11–16. http://dx.doi.org/10.33225/pec/11.35.11.

Full text
Abstract:
Tools for electronic assessment are being developed mainly with growth of distance learning platforms. However, the possibility of electronic testing seems to be valuable also in the classroom, which is not usually equipped with computers. For this purpose, systems of remote controllers have been in development for over ten years. The first versions of controllers were operating in infrared technology which significantly limited the amount of data that could be transferred from remote controls to computers. That allowed only using simple multiple-choice and single number questions. Those limitations excluded those systems as an effective assessment tool. In recent years new versions of systems were presented. Modern remote controls are operating in radio technology and possess their own memory that makes it possible to code and send more complex questions. Also, new controllers can operate in asynchronous mode which creates the opportunity for personalization of students’ work. Thanks to new functionality, modern response systems can potentially be used as assessment tools. This fact creates new opportunities and challenges for educators in developing a methodology of use of this tool during various types of courses. Presented results were obtained during the pilot implementation of the Personal Response System - PRS RF during laboratory classes for first year students of Biophysics in years 2009-2011 at Jagiellonian University. Key words: electronic assessment, Personal Response System, interactive learning environment.
APA, Harvard, Vancouver, ISO, and other styles
45

Wagner, Judith L. "Cost Containment and Computerized Medical Imaging." International Journal of Technology Assessment in Health Care 3, no. 3 (July 1987): 343–53. http://dx.doi.org/10.1017/s0266462300001161.

Full text
Abstract:
AbstractToday, computers are used in several important and fast-growing medical imaging modalities, such as digital subtraction angiography, positron emission tomography, magnetic resonance imaging, nuclear medicine, and diagnostic ultrasound. The ultimate test for the computer in medical imaging will be its ability to replace traditional film-based radiography as the mechanism for displaying, communicating, and storing imaging information. This transition will require radiologists and other imagers to accept information in digital form. The speed of that acceptance depends on the economic incentives of the health care system. These are changing as a result of cost containment, which is moving away from fee-for-service toward bundled payment. The increase in capitated health plans will encourage the development of digital radiography systems that realistically trade-off the perceived quality needs of radiologists with the costs of producing and operating such systems.
APA, Harvard, Vancouver, ISO, and other styles
46

Cheng, Yao, You Min Hu, Bo Wu, Jian Ping Xuan, and Guang Fei Jia. "Signal Analysis Module of NC Machine Tool Based on C Language." Applied Mechanics and Materials 184-185 (June 2012): 1628–32. http://dx.doi.org/10.4028/www.scientific.net/amm.184-185.1628.

Full text
Abstract:
In the monitoring of a NC machine tool (NCMT), signal analysis is one of the most important considerations. In order to process multi-information in a comprehensive way and integrate with NC systems in a stable way, a signal analysis module (SAM) with various feature parameters programmed in C language is proposed. Experiments are carried out in Huazhong NCMT to verify the validity of the presented SAM. The work described in this paper can be applied to almost all NC systems and industrial computers with different operating systems (OSs).
APA, Harvard, Vancouver, ISO, and other styles
47

Tedyyana, Agus, and Supria Supria. "Perancangan Sistem Pendeteksi Dan Pencegahan Penyebaran Malware Melalui SMS Gateway." INOVTEK Polbeng - Seri Informatika 3, no. 1 (June 3, 2018): 34. http://dx.doi.org/10.35314/isi.v3i1.340.

Full text
Abstract:
Internet network is a media or technology that is very useful at this time. Almost everyone who uses electronics using internet network. With this internet network, humans can access the virtual world with ease, either in browsing, streaming, social media access and others. On the other hand there is a lack of Internet network technology. With the internet, computers can connect with other computers, so many cases of malware attacks through the internet network. Recently there has been a very dangerous malware attack. The malware is known as wannacry ransomware. Wannacry can attack computers that use windows operating system. Computers that have been infected wannacry will make all existing data in the computer hard drive becomes encrypted, so the user can not open the data that has been infected with the virus.To solve the problem then it is proposed Design of Malware Detection and Prevention System Using Unified Modeling Language (UML). This system is designed using Router, Server, and SMS Gateway. Router is used for network configuration. The server is used for WEB-based storage systems that serve to detect ports. SMS Gateway is used to send SMS to the network admins. With the proposed system is expected to help detect the presence of malware that goes through the router, so that the system will automatically send notification of malware via SMS
APA, Harvard, Vancouver, ISO, and other styles
48

Flint, David. "Just Who Is Responsible for This Snafus?" Business Law Review 43, Issue 2 (April 1, 2022): 92–93. http://dx.doi.org/10.54648/bula2022013.

Full text
Abstract:
As some of you who know me will be aware, in addition to Competition Law, IP and Privacy, one of my long-term interests has been in computer technology. From my earliest experiences with the products of Sir Clive Sinclair, through programming IBM mainframes with Fortran 4, DEC machines with cp/m, RSTS-E and, latterly, SCO-Unix, to the modern operating systems of Windows and iOS, I have always had an interest in computers and the law surrounding them. Increasingly, I have become frustrated at the many issues which innocent and unsophisticated users seem to be having and the apparent lack of recourse which those users have following what are often business-critical issues.
APA, Harvard, Vancouver, ISO, and other styles
49

Kulkarni, Mr Ashish Dhananjay. "Bharat Operating System Solution: A Step towards Secure India." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 4102–5. http://dx.doi.org/10.22214/ijraset.2021.35887.

Full text
Abstract:
Now a days we see the cyber attacks on government servers .The cyberspace is highly vulnerable to attacks, and is a major concern for national security. The government is conscious of the shortcomings in its cyberspace. Hence, it's performing on its own OS for advanced protection of networks and private computers. In the recent past, there have been several severe attacks by Chinese hackers on key government websites, which exposed important government data. These websites are needed fully secure network for the protection . BOSS is based on codes that are unique to its system, which makes it safe and secure .The OS has been said to be developed to replace Microsoft's Windows and other OS’s from government computers and systems in future. If this happens, it will reduce government's dependency on other OS’s .With this OS in use, data surveillance would become much easier for government agencies and bodies, as they may have the access to all or any kinds of content and data that are accessed on this OS. Considering that this OS has been developed under government's guidelines, it'll let the government regulate social networking sites. This is made possible by the development of indigenous projects by various IT giants and government sector. These private and public sectors are investing in FOSS (Free and Open Source Software) projects to fulfill their routine needs by customizing the normal FOSS projects like LINUX to suit their own domestic environment.
APA, Harvard, Vancouver, ISO, and other styles
50

Samoilova, M. E., and A. A. Zubrilin. "AN EXTRACURRICULAR EVENT “HISTORY OF INFORMATICS IN DATES." Informatics in school, no. 5 (June 23, 2019): 7–13. http://dx.doi.org/10.32517/2221-1993-2019-18-5-7-13.

Full text
Abstract:
The article presents an extracurricular event “History of informatics in dates”, conducted using infographics. The article justifies why infographics will allow us to memorize historical events associated with the development of informatics. The dates and information from the history of the development of the Internet, computers, microprocessors and operating systems are given. The work with dates is carried out in a game form.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography