Academic literature on the topic 'Operating systems - mac users'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Operating systems - mac users.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Operating systems - mac users"

1

Hovden, Robert. "Running Digital Micrograph on Linux and Mac OSX." Microscopy Today 20, no. 2 (February 28, 2012): 24–27. http://dx.doi.org/10.1017/s155192951200003x.

Full text
Abstract:
Gatan Digital Micrograph (DM) software is considered an industry standard among microscopists. The offline DM application is freely available from Gatan. Unfortunately, DM software has been designed to run only on Microsoft Windows operating systems, thus distancing the microscopy community from popular Unix-based systems, such as Linux or Mac OSX. An ad hoc solution to this problem has required a virtualized Windows operating system running on top of the user's native operating system. This is not only slow, having to emulate each processor instruction, but also requires installation and licensing of Windows and the virtualization software. However, with the aid of open-source resources, it is possible to run DM natively on Linux and Mac OSX (Figure 1). This article was written as a guide with easy-to-follow installation instructions to liberate users from the Windows emulation pidgeonhole and enable them to freely analyze data on Unix-based systems.
APA, Harvard, Vancouver, ISO, and other styles
2

Sum, Chin-Sean, Gabriel Porto Villardi, Zhou Lan, Chen Sun, Yohannes Alemseged, Ha Nguyen Tran, Junyi Wang, and Hiroshi Harada. "Enabling Technologies for a Practical Wireless Communication System Operating in TV White Space." ISRN Communications and Networking 2011 (June 28, 2011): 1–12. http://dx.doi.org/10.5402/2011/147089.

Full text
Abstract:
This paper proposes the design of enabling technologies for practical wireless communication systems operating in the TV white space (TVWS). The main objective of this paper is to cover a macro perspective on the system design blocks including: (a) targeted use case applications and governing regulations, (b) channelization, physical (PHY) layer and medium access control (MAC) layer designs, and (c) achievable throughput and range. It is the intention of this paper to serve as a general guideline for designing wireless communication systems operating in TVWS. The core system design addresses both PHY and MAC layer issues with realistic system considerations. In the PHY layer, a channelization design that fits into the area-specific TV channels and a transceiver that enables data exchange in the TV bands are designed. In the MAC layer, a cognitive engine that manages access to vacant TV channels and MAC functionalities that facilitate effective medium access are also proposed. As a result, the system is capable of supporting up to a typical throughput of 80 Mbps, and a maximum number of 40 users, assuming all users performing the most bandwidth-hungry application in the use case scenario. The corresponding operating range is found reach up to 400 m.
APA, Harvard, Vancouver, ISO, and other styles
3

Fenske, Ellis, Dane Brown, Jeremy Martin, Travis Mayberry, Peter Ryan, and Erik Rye. "Three Years Later: A Study of MAC Address Randomization In Mobile Devices And When It Succeeds." Proceedings on Privacy Enhancing Technologies 2021, no. 3 (April 27, 2021): 164–81. http://dx.doi.org/10.2478/popets-2021-0042.

Full text
Abstract:
Abstract Mobile device manufacturers and operating system developers increasingly deploy MAC address randomization to protect user privacy and prevent adversaries from tracking persistent hardware identifiers. Early MAC address randomization implementations suffered from logic bugs and information leakages that defeated the privacy benefits realized by using temporary, random addresses, allowing devices and users to be tracked in the wild. Recent work either assumes these implementation flaws continue to exist in modern MAC address randomization implementations, or considers only dated software or small numbers of devices. In this work, we revisit MAC address randomization by performing a cross-sectional study of 160 models of mobile phones, including modern devices released subsequent to previous studies. We tested each of these phones in a lab setting to determine whether it uses randomization, under what conditions it randomizes its MAC address, and whether it mitigates known tracking vulnerabilities. Our results show that, although very new phones with updated operating systems generally provide a high degree of privacy to their users, there are still many phones in wide use today that do not effectively prevent tracking.
APA, Harvard, Vancouver, ISO, and other styles
4

Shiakallis, Odysseas, Constandinos X. Mavromoustakis, George Mastorakis, Athina Bourdena, and Evangelos Pallis. "Traffic-Based S-MAC." International Journal of Wireless Networks and Broadband Technologies 4, no. 1 (January 2015): 62–80. http://dx.doi.org/10.4018/ijwnbt.2015010105.

Full text
Abstract:
Mobile Peer-to-Peer (MP2P) is a networking paradigm that will be exploited in the future to support technological advances and systems for the efficient provision of multiple services to mobile users. In a general context, the mobile community seeks to invest in on-the-fly services, by minimizing the effort and the increasing mobile users' performance. In this framework, the mobile Ad-Hoc Networks provide mobile nodes the flexibility of operating as flexible networking points, without the use of a centralized entity, where issues such as the energy consumption and the data packets transmission failure arise along with many more. Towards minimizing the factors that contribute to the increased consumption of the energy and the resources, as well as the loss of data, a Traffic-based S-MAC protocol is proposed in this paper to increase the data exchange and preserve the energy conservation, among the nodes in mobile Ad-Hoc Networks. The performance of the proposed protocol was thoroughly evaluated, by conducting multiple experimental results. The results verify the efficient performance of the protocol and indicate fields for further research and experimentation.
APA, Harvard, Vancouver, ISO, and other styles
5

Ridwan and Adhi Susano. "APLIKASI EMAIL CLIENT MULTI-PLATFORM DENGAN ENKRIPSI DATA BERBASIS JAVA." Jurnal Indonesia : Manajemen Informatika dan Komunikasi 4, no. 1 (January 10, 2023): 279–90. http://dx.doi.org/10.35870/jimik.v4i1.177.

Full text
Abstract:
Client is an application that is used to send and receive e-mails through your computer without a browser. Simply by running the e-mail client application, the e-mail will automatically be downloaded to your computer. The more varied operating systems used by Users also sometimes make Users have to change email clients when moving operating systems, for example Windows Users who are used to Outlook have to use evolution on Linux, whereas when using Mac OS they have to use the Mail program. This is of course inconvenient for the User. Not to mention the security of the clinet email itself. In this research, software has been created to reduce existing problems. The method used in the design and manufacture of this software is the Guidelines for Rapid Application Engineering (Grapple) method. This software was created using Netbeans 7.0. This multi-platform email client application program with base64 encoding on a desktop base can run on three operating systems, namely Windows, Linux and Macinthos. This application can also encode with the base64 algorithm the contents of the message so as to maintain the confidentiality of the contents of the message in the email client itself.
APA, Harvard, Vancouver, ISO, and other styles
6

Prestridge, Eddie B. "Unix-based workstations for digital image processing and analysis." Proceedings, annual meeting, Electron Microscopy Society of America 54 (August 11, 1996): 610–11. http://dx.doi.org/10.1017/s0424820100165513.

Full text
Abstract:
The modern workstation, with its inherent high speed and massive memory, allows the use of complicated image analysis and processing algorithms and artificial intelligence programs not available to current PCs and mini-computers.There is no single feature that differentiates the UNIX based workstation from a PC. Rather, it is its fundamental design that gives the workstation superior performance. This superiority in no small part is the result of the UNIX operating system. UNIX is a word that sometimes strikes fear into the hearts of mortal men! There is no reason to fear, however. Users of UNIX-based systems have no more interaction with the operating system than say users of WordPerfect running on a MS-DOS or MAC OS machine.UNIX is the only operating system that runs on a wide range of systems from laptops to mainframes. It is unique in at least five areas: 1) massive data sets handling, 2) multitasking, 3) multi-user, 4) security, and 5) networking. Let me give you what I think are usable descriptions for these five areas.
APA, Harvard, Vancouver, ISO, and other styles
7

Bhurtel, Manish, and Danda B. Rawat. "Unveiling the Landscape of Operating System Vulnerabilities." Future Internet 15, no. 7 (July 24, 2023): 248. http://dx.doi.org/10.3390/fi15070248.

Full text
Abstract:
Operating systems play a crucial role in computer systems, serving as the fundamental infrastructure that supports a wide range of applications and services. However, they are also prime targets for malicious actors seeking to exploit vulnerabilities and compromise system security. This is a crucial area that requires active research; however, OS vulnerabilities have not been actively studied in recent years. Therefore, we conduct a comprehensive analysis of OS vulnerabilities, aiming to enhance the understanding of their trends, severity, and common weaknesses. Our research methodology encompasses data preparation, sampling of vulnerable OS categories and versions, and an in-depth analysis of trends, severity levels, and types of OS vulnerabilities. We scrape the high-level data from reliable and recognized sources to generate two refined OS vulnerability datasets: one for OS categories and another for OS versions. Our study reveals the susceptibility of popular operating systems such as Windows, Windows Server, Debian Linux, and Mac OS. Specifically, Windows 10, Windows 11, Android (v11.0, v12.0, v13.0), Windows Server 2012, Debian Linux (v10.0, v11.0), Fedora 37, and HarmonyOS 2, are identified as the most vulnerable OS versions in recent years (2021–2022). Notably, these vulnerabilities exhibit a high severity, with maximum CVSS scores falling into the 7–8 and 9–10 range. Common vulnerability types, including CWE-119, CWE-20, CWE-200, and CWE-787, are prevalent in these OSs and require specific attention from OS vendors. The findings on trends, severity, and types of OS vulnerabilities from this research will serve as a valuable resource for vendors, security professionals, and end-users, empowering them to enhance OS security measures, prioritize vulnerability management efforts, and make informed decisions to mitigate risks associated with these vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
8

Adekar, R. H., and A. K. Kureshi. "Performance Analysis of Heterogeneous Systems Ieee 802.11 and Ieee 802.16 Using Spectrum Sharing Mechanism." Advanced Engineering Forum 44 (January 17, 2022): 127–35. http://dx.doi.org/10.4028/www.scientific.net/aef.44.127.

Full text
Abstract:
After the advent of cellular standards for mobile wireless voice telephony and data transfer, IEEE 802.11 and IEEE 802.16 standards evolved for wireless broadband data transfer. The IEEE 802.11 replaced the wired LAN and IEEE 802.16 was to wireless point-to-point provide broadband data transfer. IEEE 802.11 operates in 2.4 GHz and 5 GHz bands whereas IEEE 802.11, which was initially designed to operate on a licensed band, later switched to a 2-11 GHz band. However, both these standards used a 5 GHz unlicensed band for transmission causing the possible overlap of channels. The designed protocols fairly allow the sharing on an ad-hoc basis. IEEE 802.11 operated in distributed coordination mode using Distributed Coordination Function (DCF) and point coordinated mode using a dedicated coordinator node called Point Coordination Function (PCF). However, DCF mode allows spectrum sharing for multiple users. Both standards were not designed for coexistence and thereby they may cause interference to each other, degrading their performance. Mechanisms can be designed at various layers such as MAC or PHY to enable the coexistence with desired QoS. In this paper, a performance analysis of the impact of possible interference between IEEE 802.11 and IEEE 802.16 devices is presented. Therefore, this paper presents the approaches for allowing a reliable operation between IEEE 802.16 and IEEE 802.11 when both are sharing unlicensed spectrum 5GHz. In this paper, we propose advancements to the MAC of IEEE 802.16 Base Station (BS) where IEEE 802.11 frame transmissions are not required by an IEEE 802.16 system. Here, Co-existence between IEEE 802.11 and IEEE 802.16 is permitted without any exchange of data between both standards, and also it provides quality of service for both systems operating at unlicensed spectrum 5GHz.
APA, Harvard, Vancouver, ISO, and other styles
9

Nasser, Hiba Imad, and Mohammed Abdulridha Hussain. "Provably curb man-in-the-middle attack-based ARP spoofing in a local network." Bulletin of Electrical Engineering and Informatics 11, no. 4 (August 1, 2022): 2280–91. http://dx.doi.org/10.11591/eei.v11i4.3810.

Full text
Abstract:
Even today, internet users’ data security remains a significant concern. One problem is ARP poisoning, otherwise referred to as ARP spoofing. Such attacks are intended to exploit the identified ARP protocol vulnerability. Despite no straightforward remedy for ARP spoofing being apparent, certain actions may be taken to maintain one’s safety. The most basic and common defence against a poisoning attack is manually adding MAC and IP addresses to the static ARP cache table. However, this solution is ineffective for large networks where static entries require considerable time and effort to maintain, whether by human input or via special tools and settings for the static entries of network devices. Accordingly, this paper aimed to monitor network packet information and detect the behaviour of ARP poison attacks on operating systems, for instance Windows and Linux. The discovery and defence policy systematically and periodically check the MAC addresses in the ARP table, enabling alerts to be issued if a duplicate entry is detected. This enables the poison-IP address to be blocked before a reply is sent. Finally, the results showed that the superiority was successfully achieved in the detection, prevention and reporting mechanisms in the real-world environment.
APA, Harvard, Vancouver, ISO, and other styles
10

Davis, Janel L., Brian Soetikno, Ki-Hee Song, Yang Zhang, Cheng Sun, and Hao F. Zhang. "RainbowSTORM: an open-source ImageJ plug-in for spectroscopic single-molecule localization microscopy (sSMLM) data analysis and image reconstruction." Bioinformatics 36, no. 19 (July 14, 2020): 4972–74. http://dx.doi.org/10.1093/bioinformatics/btaa635.

Full text
Abstract:
Abstract Summary Spectroscopic single-molecule localization microscopy (sSMLM) simultaneously captures the spatial locations and full spectra of stochastically emitting fluorescent single molecules. It provides an optical platform to develop new multimolecular and functional imaging capabilities. While several open-source software suites provide subdiffraction localization of fluorescent molecules, software suites for spectroscopic analysis of sSMLM data remain unavailable. RainbowSTORM is an open-source ImageJ/FIJI plug-in for end-to-end spectroscopic analysis and visualization for sSMLM images. RainbowSTORM allows users to calibrate, preview and quantitatively analyze emission spectra acquired using different reported sSMLM system designs and fluorescent labels. Availability and implementation RainbowSTORM is a java plug-in for ImageJ (https://imagej.net)/FIJI (http://fiji.sc) freely available through: https://github.com/FOIL-NU/RainbowSTORM. RainbowSTORM has been tested with Windows and Mac operating systems and ImageJ/FIJI version 1.52. Supplementary information Supplementary data are available at Bioinformatics online.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Operating systems - mac users"

1

Webb, Jason N. "The advanced features of Mac OS X and their benefits to the design community /." Online version of thesis, 2003. http://homepage.mac.com/jasonwebb/thesis/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

MORANDI, Valentina. "Linear programming models for a fair and efficient traffic assignment in congested road networks." Doctoral thesis, Università degli studi di Bergamo, 2017. http://hdl.handle.net/10446/77251.

Full text
Abstract:
Solving the road congestion problem is one of the major issues in modern cities since it causes time wasting, pollution, higher industrial costs and huge road maintenance costs. Among possible congestion avoidance methods, traffic assignment is a valuable choice since it does not involve huge investments to expand the road network. Traffic assignments are traditionally devoted to two main perspectives on which the well-known Wardropian principles are inspired : the user equilibrium (user's perspective) and the system optimum (system perspective). User equilibrium is a user-driven traffic assignment in which each user chooses the most convenient path selfishly. It guarantees that fairness among users is respected since, when the equilibrium is reached, all users sharing the same origin and destination will experience the same travel time. The main drawback in a user equilibrium is that the system total travel time is not minimized. On the other hand, the system optimum is a system-wide traffic assignment in which drivers are routed on the network in such a way the total travel time is minimized but users might experience travel times that are higher than the other users travelling from the same origin to the same destination. Thus, there are drawbacks in using one of the two assignments that can be partially overcome by applying users' fairness considerations while minimizing a system-oriented objective. In the last decade, few attempts have been done to present a users' needs and system efficiency trade-off traffic assignment with non-linear programming techniques. In this thesis linear programming models for a fair and efficient traffic assignment in congested road networks are presented.
APA, Harvard, Vancouver, ISO, and other styles
3

Roussel, Kévin. "Évaluation et amélioration des plates-formes logicielles pour réseaux de capteurs sans-fil, pour optimiser la qualité de service et l'énergie." Thesis, Université de Lorraine, 2016. http://www.theses.fr/2016LORR0051/document.

Full text
Abstract:
Dans le domaine des réseaux de capteurs sans-fil (dits « WSN »), les piles réseau spécialisées constituent un domaine de recherche très actif depuis maintenant de nombreuses années. Toutefois, beaucoup de ces études, notamment concernant les couches basses de ces piles réseau, n’ont pas dépassé le stade de la théorie. Leurs implantations n’ont sauf exception pas fait l’objet d’efforts poussés ou systématiques, surtout dans le cadre des systèmes d’exploitation spécialisés. Nous nous proposons donc, dans cette thèse, de nous focaliser sur l’analyse des interactions entre les protocoles des couches basses et les plates-formes logicielles dédiées, et de les optimiser, notamment au niveau de l’implantation. Nous passons d’abord en revue et évaluons les différents systèmes d’exploitation spécialisés, et choisissons celui offrant les fonctionnalités, notamment temps-réel, que nous estimons nécessaires pour implanter des protocoles MAC / RDC novateurs et performants. Nous entreprenons ensuite un effort d’étude, d’amélioration et d’optimisation de ces couches basses des piles spécialisées, et montrons, avec une implantation concrète d’un de nos protocoles MAC / RDC avancés, que nous pouvons amener des progrès notables dans la qualité de service (QdS) des WSN, notamment avec un trafic réseau intense. Nous examinons en outre des inexactitudes inattendues dans les simulations / émulations effectuées par Cooja / MSPSim, et analysons les problèmes de fiabilité posés par l’utilisation de cet outil pour effectuer des évaluations de performances, notamment temporelles, de WSN. Nous proposons enfin de nouvelles pistes pour de futures améliorations et optimisations de ces couches basses des piles réseau spécialisées, afin d’améliorer encore la fiabilité, les performances et la consommation énergétique des WSN
In the field of wireless sensors networks (WSN), specialized network stacks have been a very active research field for many years. However, most of this research, especially on lower layers of the network stacks, did not go beyond theory. Their implementations have generally not been the subject of deep or systematic effort, especially within the framework of dedicated operating systems. We thus propose, in this thesis, to focus on interaction analysis between lower layers’ protocols and dedicated software platforms, and to optimize them, especially at the implementation level. We first review and evaluate the various dedicated operating systems, and choose the one offering the necessary features to implement efficient and innovative MAC/RDC protocols. We then study, improve and optimize these lower layers of specialized stacks, and show, with an actual implementation of one of our advanced MAC/RDC protocols, that we can bring significant improvements in the quality of service (QoS) of WSNs, especially under heavy network traffic. We also report inaccuracies in Cooja/MSPSim simulations/emulations, and analyze the reliability issues caused by the use of this tool for performing evaluations (especially time-related) of WSNs. We finally propose some new leads for future enhancements and optimizations of the lower layers of these specialized network stacks, in order to further improve the liability, performances and energy consumption of WSNs
APA, Harvard, Vancouver, ISO, and other styles
4

Roussel, Kévin. "Évaluation et amélioration des plates-formes logicielles pour réseaux de capteurs sans-fil, pour optimiser la qualité de service et l'énergie." Electronic Thesis or Diss., Université de Lorraine, 2016. http://www.theses.fr/2016LORR0051.

Full text
Abstract:
Dans le domaine des réseaux de capteurs sans-fil (dits « WSN »), les piles réseau spécialisées constituent un domaine de recherche très actif depuis maintenant de nombreuses années. Toutefois, beaucoup de ces études, notamment concernant les couches basses de ces piles réseau, n’ont pas dépassé le stade de la théorie. Leurs implantations n’ont sauf exception pas fait l’objet d’efforts poussés ou systématiques, surtout dans le cadre des systèmes d’exploitation spécialisés. Nous nous proposons donc, dans cette thèse, de nous focaliser sur l’analyse des interactions entre les protocoles des couches basses et les plates-formes logicielles dédiées, et de les optimiser, notamment au niveau de l’implantation. Nous passons d’abord en revue et évaluons les différents systèmes d’exploitation spécialisés, et choisissons celui offrant les fonctionnalités, notamment temps-réel, que nous estimons nécessaires pour implanter des protocoles MAC / RDC novateurs et performants. Nous entreprenons ensuite un effort d’étude, d’amélioration et d’optimisation de ces couches basses des piles spécialisées, et montrons, avec une implantation concrète d’un de nos protocoles MAC / RDC avancés, que nous pouvons amener des progrès notables dans la qualité de service (QdS) des WSN, notamment avec un trafic réseau intense. Nous examinons en outre des inexactitudes inattendues dans les simulations / émulations effectuées par Cooja / MSPSim, et analysons les problèmes de fiabilité posés par l’utilisation de cet outil pour effectuer des évaluations de performances, notamment temporelles, de WSN. Nous proposons enfin de nouvelles pistes pour de futures améliorations et optimisations de ces couches basses des piles réseau spécialisées, afin d’améliorer encore la fiabilité, les performances et la consommation énergétique des WSN
In the field of wireless sensors networks (WSN), specialized network stacks have been a very active research field for many years. However, most of this research, especially on lower layers of the network stacks, did not go beyond theory. Their implementations have generally not been the subject of deep or systematic effort, especially within the framework of dedicated operating systems. We thus propose, in this thesis, to focus on interaction analysis between lower layers’ protocols and dedicated software platforms, and to optimize them, especially at the implementation level. We first review and evaluate the various dedicated operating systems, and choose the one offering the necessary features to implement efficient and innovative MAC/RDC protocols. We then study, improve and optimize these lower layers of specialized stacks, and show, with an actual implementation of one of our advanced MAC/RDC protocols, that we can bring significant improvements in the quality of service (QoS) of WSNs, especially under heavy network traffic. We also report inaccuracies in Cooja/MSPSim simulations/emulations, and analyze the reliability issues caused by the use of this tool for performing evaluations (especially time-related) of WSNs. We finally propose some new leads for future enhancements and optimizations of the lower layers of these specialized network stacks, in order to further improve the liability, performances and energy consumption of WSNs
APA, Harvard, Vancouver, ISO, and other styles
5

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Operating systems - mac users"

1

Baron, Cynthia. Windows for Mac users. Berkeley, Calif: Peachpit Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mac OS X for Windows users: A switchers' guide. Berkeley, Calif: Peachpit, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Peter, Seebach, ed. A practical guide to Unix for Mac OS X users. Upper Saddle River, NJ: Prentice Hall, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Take control of users & accounts in Snow Leopard. Ithaca, N.Y: TidBITS Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bill, Fishman, ed. MAC OS in a nutshell: A power user's quick reference. Sebastopol, CA: O'Reilly, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

John, Ray. Mac OS X Panther unleashed. Indianapolis, Ind: Sams, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Durance, Carl. Waterloo MacJANET: User's guide for Mac OS. 2nd ed. Waterloo, Ont: WATNET Technologies, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Durance, Carl. Waterloo MacJANET: User's guide for Mac OS. Waterloo, Ont: Watnet Technologies, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Francis, Tony. Mac OS 8 revealed. Reading, Mass: Addison-Wesley, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Danuloff, Craig. The Mac OS 8 book: The ultimate Macintosh user's guide. 4th ed. Research Triangle Park, NC: Ventana, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Operating systems - mac users"

1

Meyers, Scott, and Mike Lee. "Working with Microsoft Windows and Other Operating Systems." In Learn Mac OS X Snow Leopard, 627–36. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-1947-7_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Udoh, Ekereuke, and Vladimir Getov. "Layered-MAC: An Energy-Protected and Efficient Protocol for Wireless Sensor Networks." In Mobile Wireless Middleware, Operating Systems and Applications, 45–61. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98671-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pandikumar, S., S. Bharani Sethupandian, B. Arivazhagan, and P. Rajeswari. "Toward Smartphone Energy Optimization Through Users Operating Pattern Discovery." In Advances in Intelligent Systems and Computing, 615–27. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-5443-6_47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Macedo, Mário, Mário Nunes, and António Grilo. "Minimizing Interference in TDMA MAC Protocols for WSN Operating in Shadow-Fading Channels." In Wireless Systems and Mobility in Next Generation Internet, 26–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89183-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Clemente, Patrice, Jonathan Rouzaud-Cornabas, and Christian Toinard. "From a Generic Framework for Expressing Integrity Properties to a Dynamic mac Enforcement for Operating Systems." In Transactions on Computational Science XI, 131–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17697-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

De Donato, Renato, Martina Garofalo, Delfina Malandrino, Maria Angela Pellegrino, Andrea Petta, and Vittorio Scarano. "QueDI: From Knowledge Graph Querying to Data Visualization." In Semantic Systems. In the Era of Knowledge Graphs, 70–86. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59833-4_5.

Full text
Abstract:
Abstract While Open Data (OD) publishers are spur in providing data as Linked Open Data (LOD) to boost innovation and knowledge creation, the complexity of RDF querying languages, such as SPARQL, threatens their exploitation. We aim to help lay users (by focusing on experts in table manipulation, such as OD experts) in querying and exploiting LOD by taking advantage of our target users’ expertise in table manipulation and chart creation. We propose QueDI (Query Data of Interest), a question-answering and visualization tool that implements a scaffold transitional approach to 1) query LOD without being aware of SPARQL and representing results by data tables; 2) once reached our target user comfort zone, users can manipulate and 3) visually represent data by exportable and dynamic visualizations. The main novelty of our approach is the split of the querying phase in SPARQL query building and data table manipulation. In this article, we present the QueDI operating mechanism, its interface supported by a guided use-case over DBpedia, and the evaluation of its accuracy and usability level.
APA, Harvard, Vancouver, ISO, and other styles
7

Bruno, Giovanni di Dio. "Erwhi Hedgehog: A New Learning Platform for Mobile Robotics." In Makers at School, Educational Robotics and Innovative Learning Environments, 243–48. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77040-2_32.

Full text
Abstract:
AbstractErwhi Hedgehog is one of the smallest mobile robots. It enables mapping and vision analysis, and also displays machine learning features. Behaving like a small, curious animal, eager to explore the surroundings, the robot can be used to test navigation, mapping and localization algorithms, thus allowing the prototyping of new hardware and software for robotics. This application is particularly handy for educational robotics, at both high school and university level. On the one hand, the project is fully open source and open hardware under MIT license and available on Github, so everyone can build his/her own Erwhi Hedgehog robot with the aid of a step-by-step guide. On the other hand, students with more advanced knowledge can use it as a prototyping platform for developing new software programs and features. Erwhi uses Intel RealSense, AAEON UP Squared and Myriad X VPU technologies, with software based on the Robotic Operating System (ROS), and implements SLAM algorithms, such as RTAB-Map. The machine learning aspect is based on the OpenVINO framework and a dedicated ROS wrapper was used. The software package includes all the programs needed to create a Gazebo simulation. In terms of hardware, motor control is based on an STM32 microcontroller and the Arduino software, and the robot works on the differential drive unicycle model. Finally, Erwhi is compatible with AWS RoboMaker tools.
APA, Harvard, Vancouver, ISO, and other styles
8

Abdulrazak, Bessam, Suvrojoti Paul, Souhail Maraoui, Amin Rezaei, and Tianqi Xiao. "IoT Architecture with Plug and Play for Fast Deployment and System Reliability: AMI Platform." In Lecture Notes in Computer Science, 43–57. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09593-1_4.

Full text
Abstract:
AbstractThe rapid advancement of the Internet of Things (IoT) has reshaped the industrial system, agricultural system, healthcare systems, and even our daily livelihoods, as the number of IoT applications is surging in these fields. Still, numerous challenges are imposed when putting in place such technology at large scale. In a system of millions of connected devices, operating each one of them manually is impossible, making IoT platforms unmaintainable. In this study, we present our attempt to achieve the autonomy of IoT infrastructure by building a platform that targets a dynamic and quick Plug and Play (PnP) deployment of the system at any given location, using predefined pipelines. The platform also supports real-time data processing, which enables the users to have reliable and real-time data visualization in a dynamic dashboard.
APA, Harvard, Vancouver, ISO, and other styles
9

Majumdar, Subhabrata, and Terry Vogelsang. "Towards Safe LLMs Integration." In Large Language Models in Cybersecurity, 243–47. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54827-7_27.

Full text
Abstract:
AbstractLLMs face a critical vulnerability known as sandbox breakout, where attackers bypass the system designers’ limitations to prevent malicious access to the resources for which the LLM agent is a user interface. Thus, they can access the system and potentially steal data, change the interaction with other users, or inject malicious code or contents into underlying databases. Therefore, it is essential to identify and address vulnerabilities that could be exploited to break out of the sandbox. These vulnerabilities could exist in the sandbox, the operating system, or the LLM’s software dependencies. To mitigate the risk of LLM sandbox breakout, robust security measures, such as regular model updates, automated model red-teaming, testing, and access control policies, must be implemented. In addition, sandboxing should be enforced at multiple levels to reduce the attack surface and prevent attackers from accessing critical systems. By implementing these measures, the risk of LLM sandbox breakout can be significantly reduced, and the security and reliability of LLM-based applications can be improved.
APA, Harvard, Vancouver, ISO, and other styles
10

Lebrun, Stéphanie, Stéphane Kaloustian, Raphaël Rollier, and Colin Barschel. "GNSS Positioning Security: Automatic Anomaly Detection on Reference Stations." In Critical Information Infrastructures Security, 60–76. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93200-8_4.

Full text
Abstract:
AbstractThe dependency of critical infrastructures on Global Navigation Satellite Systems (GNSS) keeps increasing over the years. This over-reliance brings concerns as those systems are vulnerable and consequently prone to human-made perturbations, such as jamming and spoofing attacks. Solutions for detecting such disturbances are therefore crucially needed to raise GNSS users’ awareness and protection. This paper suggests an approach for detecting anomalous events (i.e., potentially an attack attempt) based on measurements recorded by Continuously Operating GNSS Reference Stations (CORS). Precisely, the anomaly detection process first consists in modeling the normal behavior of a given signal thanks to a predictive model which combines the Seasonal and Trend decomposition using LOESS and ARIMA algorithms. This model can then be used to predict the upcoming measurement values. Finally, we compare the predictions to the actual observations with a statistical rule and assess if those are normal or anomalous. While our anomaly detection approach is intended for real-time use, we assess its effectiveness on historical data. For simplicity and independence, we also focus on the Carrier-to-Noise Ratio only, though similar methods could apply to other observables. Our results prove the sensitivity of the proposed detection on a reported case of unintentional disturbance. Other anomalies in the historical data are also uncovered using that methodology and presented in this paper.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Operating systems - mac users"

1

Dinneen, Jesse David, and Ilja Frissen. "Mac Users Do It Differently: the Role of Operating System and Individual Differences in File Management." In CHI '20: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3334480.3382944.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cena, Gianluca, Stefano Scanzio, and Adriano Valenzano. "A software-defined MAC architecture for Wi-Fi operating in user space on conventional PCs." In 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS). IEEE, 2017. http://dx.doi.org/10.1109/wfcs.2017.7991945.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xie, Jingwen, Bei zhang, and Mengxiu Wang. "Color matching research of electronic maps based on deep cognitive judgment." In 5th International Conference on Human Systems Engineering and Design: Future Trends and Applications (IHSED 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1004119.

Full text
Abstract:
At present, people are paying more and more attention to the study of the display effect of electronic maps. It has been proved that the color matching of electronic maps could affect users' search performance. This study is based on the actual user needs, to further explore the influence of electronic map color matching on the user's depth cognitive judgment. This study designed 4 kinds of color matching schemes, using ergonomics experiments to measure the operating time and accuracy rate, to study the impact of map color schemes on user perception and judgment. The experiment result shows that the electronic map color matching has an impact on the user's deep cognitive judgment, the result can provide reference and basis for the color design of electronic maps.
APA, Harvard, Vancouver, ISO, and other styles
4

Komoriya, Kazuki, Munehiro Takimoto, and Yasushi Kambayashi. "An Improved Body Operations Mitigating VR Sickness through Stepping Gaming Mat." In Intelligent Human Systems Integration (IHSI 2023) Integrating People and Intelligent Systems. AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1002825.

Full text
Abstract:
Devices related to VR technology and applications using them are quite popular recently. The VR technology allows the users to perform various moving operations in the virtual space. Usually, the users use some controller devices to move in the virtual space. Since the field of vision is not linked to the physical movements of the user, only the scenes around the user changes without body movements. This mental gap between sights and bodies in the real world is said to lead VR sickness. In the previous study, we have implemented a user interface using to mitigate the VR sickness. The interface consists of a fitness device, which slides both feet to the left and right, provides moving feeling of up and down in the virtual space according to the user’s movements. In order to move forward, the users swing their arms back and forth with VR controller in both hands as if they were walking. To change direction, they swing only one arm. We have observed that this method reduces VR sickness while enhancing their immersive feeling. On the other hand, since the users’ operations are limited to gestures by legs and arms, the users cannot perform their moving operations as quick as operations using the buttons and sticks of controllers. In addition, it is hard to perform complex operations due to the nature of the fitness equipment and the acceleration of the controller held in their hands as input data. We have designed and implemented a new system that solves those problems while keeping a certain degree of immersive feeling by using a music game mat instead of fitness equipment. We have tried to extract more information from the foot movements. On the music game mat, arrows and symbols are drawn, and when the users perform stamping and apply certain pressure patterns, they can convey their wills to the system. For example, when the users want to move forward in the virtual space, they just perform stamping their right and left foot alternately on the forward-arrow symbols. The users can adjust their moving speed in the virtual space through changing the stamping frequency. If the users stamp right or left turn marks, they can change the moving directions. If the users stamp right and left initial position marks simultaneously by their feet and then release their feet after a few seconds, they can jump a certain height proportional to the stamped period. Thus, by inputting certain stamping patterns on the gaming mat, the users can perform various moving operations according to the patterns. To demonstrate the feasibility of our method, we have conducted numerical experiments on both our method and conventional methods in the same conditions. As preliminary experimental results, our method gives users more immersive feeling than conventional methods and equally excellent immersive feeling of our previous method, and to improves the response time greatly and to contribute the reduction of VR sickness as well.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Xiaoli, and Wei Zhang. "Accurate Range Estimation Using Terrain Preview for Power Wheelchairs." In ASME 2012 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/detc2012-70920.

Full text
Abstract:
Battery-powered wheelchairs require accurate and reliable range prediction to offer the maximum visibility of the current battery state to users, and to help them schedule future trip plans as well as fulfill the maximum battery economy potential. It is also one of the most critical parameters of wheelchairs to ensure the safety of users. However, range prediction is a very complicated issue by the fact that batteries are subject to current profiles, external influences, history of battery use, and aging. The prediction is even more challenging with unknown future driving conditions. The aim of this paper is to use a preview of a 3-D map, geographic information systems, and global positioning systems to develop an accurate range estimation system for battery-powered wheelchairs. This allows range prediction based on previewed driving road conditions. The nonlinearity of Li-ion batteries is also taken into consideration by using a circuit based battery model. Altogether, this methodology offers robustness and accuracy under varying operating conditions. Simulation results are presented to validate the proposed estimation method.
APA, Harvard, Vancouver, ISO, and other styles
6

Eckardt, Robert, and Leif Goldhahn. "Virtual training for the maintenance of machine tools." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1005367.

Full text
Abstract:
In the course of digital change, systems and processes are increasingly being planned, adapted and tested using computers. Innovative technical aids are needed to guide staff and relieve them physically and mentally in order to cope with flexibly changing work tasks such as the maintenance of machine tools.Virtual reality (VR) offers attractive opportunities for employee training and enables the practical acquisition of knowledge. The use of VR is based on the idea that experiences are sustainable and do not have to be learned in the abstract.The interaction between man and machine plays a decisive role in the operation and maintenance of machines. Efficient interaction is necessary to minimize errors and maximize efficiency. Traditional training methods reach their limits here, as they are often not realistic enough and employees find it difficult to apply what they have learned in practice.A virtual learning environment, which virtualizes a real work area, uses integrated, didactically prepared scenarios to clearly convey methodical knowledge and practical skills to increase operating safety on production systems. The virtual training thus enables employees to practice specific technical sequences of actions and sub-actions or hand movements in a realistic manner and to learn them in a sustainable way for later practical use. The focus is on typical operating actions such as deliberate, sequential actuation or disassembly for the maintenance of add-on parts on machine tools.In order to ensure the desired learning success (error-free, safe execution of the real work task) and employee acceptance, the correct structure of the operating sequences and an exact representation of the graphic interfaces are conducive to learning and acceptance.The advantages of using virtual learning environments were demonstrated using the example of the virtual commissioning of a machine tool. For example, after successfully completing the virtual learning scenario, the test subjects felt much more confident when carrying it out on the real machine.However, it also became clear that VR-based learning environments with complex virtual learning scenarios also require further development. For example, the use of VR hardware (VR glasses and controllers) and software has potential for improvement in terms of user-friendliness. Tests with users showed that handling the VR hardware was problematic at the beginning. The virtual learning scenarios often could not be completed because the virtual, user-induced movement and implementation of operating actions was not possible for the user in the scenario. For example, employees were asked to use the controller to perform various operating actions, such as virtually switching the machine tool on and off, which very often failed. Eight out of ten test subjects were unable to cope with the controls and navigation within the virtual learning environment, which meant that the actual training was not carried out at the user's request. This conflicts with the fact that the prerequisite for the acceptance of a virtual learning scenario is, on the one hand, the existence of a high recognition value between the virtual learning environment and the real environment and, on the other hand, the success of the training must be ensured in every case.Based on the findings described for the virtual commissioning of a machine tool, the article presents the methodical development of a virtual learning scenario that focuses on maintenance tasks for a lathe. This includes the initial development and two stages of improvement.The usability of virtual training in the field of maintenance is to be evaluated and improved using this learning scenario as an example. The article therefore describes the technical tests carried out on the feasibility, improvement and acceptance of the test subjects and discusses questions of usability and learning success.
APA, Harvard, Vancouver, ISO, and other styles
7

Liang-Yuan, Che, and Chien-Hsiung Chen. "User Experience and Service Mode of Telecare System with Handheld Devices." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1001693.

Full text
Abstract:
In developed countries, aging, chronic diseases, and preventive health management have been important topics of concern. Many entrepreneurial have entered the start-up market, trying to integrate design concepts related to medical institutions, wearable devices, health services, cloud computing to build a better and more convenient platform. How to realize online medical services of traditional medical institutions through a handheld user interface and provide users with friendly and reassuring medical services is a thorny problem faced by interactive designers. This study focuses on telecare systems' user experience and service mode with handheld devices. The research methodology uses the concepts of co-creation workshops and the discount usability engineering. In this study, six experts with relevant telecare or interaction knowledge were invited to participate in a co-creation workshop. A persona and customer journey map were created after the workshop. Existing applications were then used to integrate typical tasks. Participants would use the think-aloud technique to simultaneously manipulate the tasks and speak their thoughts when conducting heuristic evaluations. Researchers recorded their task operations and conduct brief interviews to help investigate their internal feelings. This stage is to sort out the relationship between the relevant stakeholders in the service process and help summarize the user's in-depth interaction needs in terms of user experience.
APA, Harvard, Vancouver, ISO, and other styles
8

Wu, Yue, Anran Qiu, Liuxuan Ruan, Xuejie Li, Jinhao Huang, and Stephen Jia Wang. "DJaytopia: a hybrid intelligent DJ co-remixing system." In 5th International Conference on Human Systems Engineering and Design: Future Trends and Applications (IHSED 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1004114.

Full text
Abstract:
Nowadays, musical mixing platforms are featured with programmed interventions and digitized information visualization to support DJ's performance (Montano 2010), however, the visualization is always obscure to the average music consumers (Beamish, Maclean, and Fels 2004). Being a well-performed DJ requires the level of expertise and experience that most average music consumers lack (Cliff 2000), as every audience has a completely different taste in music (Schäfer and Sedlmeier 2010). This study aims at developing an AI / ML-based system to lower the bar for novice DJs and even average music consumers to create personalized music remixes.Generally, music can be intelligently composed by analyzing harmonic and melodic features to generate genre-specific compositional elements or to alter the compositional structure of a song (Tan and Li 2021). Despite the technical breakthroughs that have been made, listeners have reacted negatively to this music due to the lack of user data to back it up and the neglect of the user's perception of the piece (Tigre Moura and Maw 2021). In a conventional scenario, DJs can express their attitudes towards music preferences by listening to the music directly, which requires a well understanding of the audience's mind. Following the recent launch and explosion of ChatGPT, which has evidenced that an intelligent system could help users innovate by solving their problems in textual form through conversational interactions (Dis et al. 2023; Dwivedi et al. 2023); also collecting the users' feedback through conversations, observing user reactions, and inviting user reviews. Such AI-enabled systems are able to learn about the user's preferred music style and various DJ mixing techniques. This study adopts a typical human-in-the-loop (HITL) approach to develop a crowd-learning music mixing system implementing AI and Virtual Reality technologies. The proposed HITL-based co-music arrangement system should be able to collect musical data and techniques; a VR environment is built to provide users with a platform to record user-created music and corresponding applied methods as well as audience ratings worldwide. After processing the data, users can try out a compilation of songs assisted by a robotic arm. With the help of the robotic arm, it will be easier and faster for users to create collections with a personal touch and more specific techniques. The essential functions include: a) Providing users with an immersive environment to learn the basic operations of the DJ console. b) Collecting the user's preferences for compilation techniques and the content of different DJ's compositions for use through an “immersive online multiplayer music compilation platform” to generate a personalized library of methods to help the user compile songs; c) Assisting the user in creating their preferred individual compilation style faster as they try out the DJ's operations; d) Indicating to the user where the music needs to be equalized, switched or arranged. Instead of showing the user the digital music signal to assist in creating more efficiently, the system directly operates on the DJ console.User experience experiments were conducted with both novice DJs and experienced DJs to validate whether the proposed system could help humans in creating more engaging music with stronger musicality. Five participants, respectively three novice DJs and two experienced DJs, joined two experiments of half an hour on a virtual DJ and an actual DJ console. They started the experiment by experiencing the virtual DJ console and DJ community in VR. They remixed independently first and then collaborated with the robotic arm together for music production on the actual DJ console. Three different audience also joined the experiment to evaluate the performance of users. The result was that the music produced with the robotic arm had better musicality. The user's attitude towards the whole experience, reflected in whether the music was rhythmic or the system was inspiring was recorded in the feedback. Overall, the users had a satisfying and smooth experience, and the collaborative music remixing had a certain level of musicality, but there is still some room for improvement in terms of user understanding. However, the users expressed that this fresh collaborative approach made them more interested in DJing and motivated their desire to learn and create.
APA, Harvard, Vancouver, ISO, and other styles
9

Su, Dale, and Kuei-Yuan Chan. "Compensating for Operational Uncertainty in Man-Machine Systems: A Case Study on Intelligent Vehicle Parking Assist." In ASME 2014 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/detc2014-34252.

Full text
Abstract:
Successful executions of man-machine systems require consistent human operations and reliable machine performances. Compared with the abundant resources on machine reliability improvements, human-related operational uncertainty that has direct impacts on man-machine systems received little attention. Most studies and formal documentations only provide suggestions to alleviate human uncertainty instead of providing specific methods to ensure operation accuracy in real time. In this paper we present a general framework of a reliable system that compensates for human operating uncertainty in realtime. This system learns the response of an operator, constructs the user’s behavior pattern, and then develop new compensated instructions to ensure the completion of the desired tasks, hereby improve the reliability of the entire man-machine systems. The effectiveness of the proposed framework is demonstrated via the development of an intelligent vehicle parking assist. Existing parking assist systems do not account for drivers’ error; neither do these systems consider realistic urban parking spaces with obstacles. Our proposed system computes a theoretical path once a parking space is identified. Audio commands are then sent to the driver with realtime compensation for a minimal deviations from the path. When an operation is too far away from the desired path to be compensated, new set of instructions will be recomputed with the collected uncertainty. Various real-world urban parking scenarios are used to demonstrate the effectiveness of the proposed method. Our system is able to park a vehicle with a space that is as small as 1.07 times the vehicle length with up to 30% uncertainty. Results also show that the compensation scheme not only allows more diverse operators to achieve a desired goal, but also ensures a higher reliability of meeting such goals.
APA, Harvard, Vancouver, ISO, and other styles
10

Xu, Tianyin, Jiaqi Zhang, Peng Huang, Jing Zheng, Tianwei Sheng, Ding Yuan, Yuanyuan Zhou, and Shankar Pasupathy. "Do not blame users for misconfigurations." In SOSP '13: ACM SIGOPS 24th Symposium on Operating Systems Principles. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2517349.2522727.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Operating systems - mac users"

1

Poerner. PR-015-11211-R01 Mechanical Seal Auxiliary Systems Guideline. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), October 2013. http://dx.doi.org/10.55274/r0010789.

Full text
Abstract:
The reliance on centrifugal pumps the world over implies a heavy reliance on mechanical seals. In order to get the highest level of performance from the seals, auxiliary systems are used either to condition the seal operating environment or monitor the systems and detect failures. Current standards already exist that recommend seal auxiliary systems based on certain pump operating conditions, and are widely accepted in the industry both among seal end-users and vendors. And because of their knowledge on the actual seals, the vendors are the primary source for end-users to receive designs and equipment for the auxiliary systems. All of these systems will rely on a number of components that will be selected based on the seals, the operating conditions, and the requirements of the end-user�s facility. Therefore, accurate details for the range of operating conditions of the pump and the product must be supplied to the vendors; that way the vendors can properly specify the seal and the required auxiliary systems. For example, if the product is expected to have considerable contaminants, a filter/separator may be recommended to prevent the contaminants from depositing on the seal faces. If the product will be considerably high in temperature, the recommendation may be to include a cooler to reduce heat build-up in the seals. However, regardless of how well the seal environment is conditioned, it is still expected that the seals will fail. When this failure does occur, additional components may also be selected that will attempt to reduce the amount of product released. These leak detection components are also considered auxiliary system for the seal. Monitoring components can also be used to detect and possibly predict when this failure might occur, thereby, possibly avoiding the unplanned failure altogether. In the future use of seal auxiliary systems, it is this monitoring and trending of operating data that is becoming more critical. Much of the required technology to perform this trending is already in existence; but it is only slowly being adopted, with some possible advances in technology adding to the accuracy and reliability of the trended predictions and detections.
APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Yu, and Hen-Geul Yeh. Electrical Vehicle Charging Infrastructure Design and Operations. Mineta Transportation Institute, July 2023. http://dx.doi.org/10.31979/mti.2023.2240.

Full text
Abstract:
California aims to achieve five million zero-emission vehicles (ZEVs) on the road by 2030 and 250,000 electrical vehicle (EV) charging stations by 2025. To reduce barriers in this process, the research team developed a simulation-based system for EV charging infrastructure design and operations. The increasing power demand due to the growing EV market requires advanced charging infrastructures and operating strategies. This study will deliver two modules in charging station design and operations, including a vehicle charging schedule and an infrastructure planning module for the solar-powered charging station. The objectives are to increase customers’ satisfaction, reduce the power grid burden, and maximize the profitability of charging stations using state-of-the-art global optimization techniques, machine-learning-based solar power prediction, and model predictive control (MPC). The proposed research has broad societal impacts and significant intellectual merits. First, it meets the demand for green transportation by increasing the number of EV users and reducing the transportation sector’s impacts on climate change. Second, an optimal scheduling tool enables fast charging of EVs and thus improves the mobility of passengers. Third, the designed planning tools enable an optimal design of charging stations equipped with a solar panel and battery energy storage system (BESS) to benefit nationwide transportation system development.
APA, Harvard, Vancouver, ISO, and other styles
3

Yunovich. L52265 User Manual for Electrical Isolation Devices. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), August 2004. http://dx.doi.org/10.55274/r0010183.

Full text
Abstract:
There is no specific guidance available on the use of electrical isolation devices and how to protect against faults. Because of this, the practice of isolation is varied, which at times may lead to a possible loss of pipeline integrity or electrical safety hazards. Electrically isolating devices are common in cathodically protected piping systems. They can be used to electrically isolate the pipeline from terminal facilities and pumping systems, to divide the pipeline into sections for individual CP, or to manage stray current interference. NACE International defines these devices as an Electrical Isolating Joint. This document addresses the conditions when the use of isolating devices is indicated and outlines the conditions when installing an isolating device may either create an adverse condition or require additional measures (such as protective devices) to ensure the proper operation. Installation of electrical isolation (EI) devices may be a requirement for cathodically protected underground pipe. The primary purpose of the isolation is to open an electrical circuit formed by the protected structure and other metallic objects such as terminal facilities, pumping and compressor stations, metering stations, river crossings, etc.
APA, Harvard, Vancouver, ISO, and other styles
4

Bruce and Fiore. L51629 Users Manual-Field Validation of the Low-Frequency Eddy Current Instrument-Software Listings. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), October 1990. http://dx.doi.org/10.55274/r0010602.

Full text
Abstract:
When an eddy current probe is placed near a conductive material, the alternating magnetic field from the probe causes electrical currents to flow in the material. These currents have associated with them their own magnetic field, which opposes the original magnetic field from the coil. The result is that the impedance of the probe is greatly reduced by the presence of the conducting material. If the conductor is also magnetic, as is normal steel, the situation is similar though slightly more complicated. Here, the impedance of the probe may be either increased or decreased depending on the permeability of the material and the frequency of the alternating field. Anything that affects the flow of current in the conductive material will also affect the impedance of the eddy current probe. For example, the electrical currents cannot flow through a crack but must flow around it. The alteration in the currents also changes the magnetic field produced by the currents and, consequently, the impedance of the probe. Normally, the impedance change caused by a defect is much smaller than that caused by the presence of the material in the first place, and measuring this small change requires a bridge circuit much like the balanced bridge used with strain gauges. The balanced bridge allows one to amplify the small changes in impedance caused by defects in the presence of the much larger change caused by the presence of the conductive and magnetic pipeline steel. The LFEC instrument is constructed using an� IBM-AT compatible portable computer. Inside the PAC-386 are two plug-in circuit cards that turn the PAC-386 into an eddy current instrument. The first, also commercially available, is a Spectrum DSP56000 digital signal processing card, while the second is a specially-built interface card for the eddy current probe. The PAC-386 is a standard MS-DOS machine and will operate most MS-DOS software. In the discussion below, it is assumed that the user is familiar with the MSDOS operating system.
APA, Harvard, Vancouver, ISO, and other styles
5

Adeniran, Adedeji, Sixtus C. Onyekwere, Anthony Okon, Julius Atuhurra, Rastee Chaudhry, and Michelle Kaffenberger. Instructional Alignment in Nigeria using the Surveys of Enacted Curriculum. Research on Improving Systems of Education (RISE), September 2023. http://dx.doi.org/10.35489/bsg-rise-wp_2023/143.

Full text
Abstract:
Systematic, quantitative evidence on education system coherence is limited. Prior research has indicated alignment of instructional components, such as curriculum standards, assessments, and teachers’ instruction, is important for children’s learning. This study uses the Surveys of Enacted Curriculum methodology to investigate alignment of instructional components in Nigeria's primary education system. The study analyzes curriculum standards, national exams, and classroom instructional content for mathematics and English language across all six primary-level grades. We find that key foundational mathematics and English language skills are covered by all three components, with some notable omissions on the end-of-cycle English language exams. All three components give high emphasis to the low cognitive demand processes of ‘memorize’ ‘perform’, and ‘demonstrate’, and give very low emphasis to the more demanding cognitive processes of ‘analyze’ and ‘apply to non-routine situations’. Both the curriculum standards and classroom instruction depict a slow pace of content progression across grades, manifested through broad but shallow content coverage. The high alignment suggests the potential for a well-functioning education system, however, low student performance in mathematics and English language exams suggest otherwise. The findings suggest the Nigerian primary education system may be operating in a low-achieving equilibrium in which the system is aligned for low levels of cognitive demand and student mastery.
APA, Harvard, Vancouver, ISO, and other styles
6

Klymenko, Mykola V., and Andrii M. Striuk. Development of software and hardware complex of GPS-tracking. CEUR Workshop Proceedings, March 2021. http://dx.doi.org/10.31812/123456789/4430.

Full text
Abstract:
The paper considers the typical technical features of GPS-tracking systems and their development, as well as an analysis of existing solutions to the problem. Mathematical models for the operation of hardware and software of this complex have been created. An adaptive user interface has been developed that allows you to use this complex from a smartphone or personal computer. Methods for displaying the distance traveled by a moving object on an electronic map have been developed. Atmega162-16PU microcontroller software for GSM module and GPS receiver control has been developed. A method of data transfer from a GPS tracker to a web server has been developed. Two valid experimental samples of GPS-trackers were made and tested in uncertain conditions. The GPS-tracking software and hardware can be used to monitor the movement of moving objects that are within the coverage of GSM cellular networks.
APA, Harvard, Vancouver, ISO, and other styles
7

Desai, Jairaj, Jijo K. Mathew, Woosung Kim, Mingmin Liu, Howell Li, Jeffrey D. Brooks, and Darcy M. Bullock. Dashboards for Real-time Monitoring of Winter Operations Activities and After-action Assessment. Purdue University, 2020. http://dx.doi.org/10.5703/1288284317252.

Full text
Abstract:
The Indiana Department of Transportation (INDOT) operates a fleet of nearly 1100 snowplows and spends up to $60M annually on snow removal and de-icing as part of their winter operation maintenance activities. Systematically allocating resources and optimizing material application rates can potentially save revenue that can be reallocated for other roadway maintenance operations. Modern snowplows are beginning to be equipped with a variety of Mobile Road Weather Information Sensors (MARWIS) which can provide a host of analytical data characterizing on-the-ground conditions during periods of wintry precipitation. Traffic speeds fused with road conditions and precipitation data from weather stations provide a uniquely detailed look at the progression of a winter event and the performance of the fleet. This research uses a combination of traffic speeds, MARWIS and North American Land Data Assimilation System (NLDAS) data to develop real-time dashboards characterizing the impact of precipitation and pavement surface temperature on mobility. Twenty heavy snow events were identified for the state of Indiana from November 2018 through April 2019. Two particular instances, that impacted 182 miles and 231 miles of interstate at their peaks occurred in January and March, respectively, and were used as a case study for this paper. The dashboards proposed in this paper may prove to be particularly useful for agencies in tracking fleet activity through a winter storm, helping in resource allocation and scheduling and forecasting resource needs.
APA, Harvard, Vancouver, ISO, and other styles
8

Lingner, Stefan, Karl Heger, and Claas Faber. MAMS Image Broker. GEOMAR, December 2022. http://dx.doi.org/10.3289/sw_3_2022.

Full text
Abstract:
The GEOMAR Helmhotz Centre for Ocean Research Kiel is operating a Media Asset Management System (MAMS) which manages large amounts image- and video data. Similar systems are operated by the Helmholtz Centre HEREON and by the Alfred Wegener Institute (AWI). Although the MAMS system provides access to data and metadata using an API, it is not possible to directly request image data without prior knowledge of the internal MAMS data structure. The image broker is a web service which brokers between a client (e.g. web-browser) and the MAMS. It allows users to request images by metadata values (e.g. image uuid). The broker uses the [IIIF](https://iiif.io/) standard which allows users to request the images in different formats, scaled copies or only specific parts of the image.
APA, Harvard, Vancouver, ISO, and other styles
9

Basso Sotz, Leonardo Javier, and Hugo E. Silva Montalva. The Efficiency of Urban Transport Policies in Latin-American Cities. Inter-American Development Bank, October 2023. http://dx.doi.org/10.18235/0005195.

Full text
Abstract:
Urban sustainability requires reducing the environmental footprint of urban mobility. To achieve this goal public transport becomes key due to its lower impact on congestion, pollution, accidents and greenhouse gas emissions as compared to private transport. Thus, encouraging public transport use is a frequent goal among city authorities. For this, they often devote an important fraction of their budget to improve the quality of its service. Many cities subsidize not just the infrastructure for public transport, but also its operation based on (some of) the following reasons. 1. As a second-best policy since charging additional fees to automobile drivers to correct negative externalities may be impractical (if the externality is trip specific) or politically unfeasible. 2. Due to the Mohring effect in which the optimal frequency and network density of services grow with the demand. Thus, the waiting and access time drop for every user in the system when the demand grows, implying that the marginal social cost is lower than the average social cost (Mohring, 1972). 3. Following distributional concerns, since often lower income people use public transport more intensively.
APA, Harvard, Vancouver, ISO, and other styles
10

Phillips, Paul. The Adoption of Digital Twins in Integrated Vehicle Health Management. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, October 2023. http://dx.doi.org/10.4271/epr2023024.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">To many, a digital twin offers “functionality,” or the ability to virtually rerun events that have happened on the real system and the ability to simulate future performance. However, this requires models based on the physics of the system to be built into the digital twin, links to data from sensors on the real live system, and sophisticated algorithms incorporating artificial intelligence (AI) and machine learning (ML). All of this can be used for integrated vehicle health management (IVHM) decisions, such as determining future failure, root cause analysis, and optimized energy performance. All of these can be used to make decisions to optimize the operation of an aircraft—these may even extend into safety-based decisions.</div><div class="htmlview paragraph"><b>The Adoption of Digital Twins in Integrated Vehicle Health Management</b>, however, still has a range of unsettled topics that cover technological reliability, data security and ownership, user presentation and interfaces, as well as certification of the digital twin’s system mechanics (i.e., AI, ML) for use in safety-critical applications.</div><div class="htmlview paragraph"><a href="https://www.sae.org/publications/edge-research-reports" target="_blank">Click here to access the full SAE EDGE</a><sup>TM</sup><a href="https://www.sae.org/publications/edge-research-reports" target="_blank"> Research Report portfolio.</a></div></div>
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography