-
41
A Practical Cache Partitioning Method for Multi-Core Processor on a Commercial Safety-Critical Partitioned RTOS
Published 2025-01-01Subjects: “…Avionics real-time operating systems…”
Get full text
Article -
42
Application research on network security operation automation practice based on RPA technology
Published 2024-07-01Subjects: “…network security operation system…”
Get full text
Article -
43
-
44
-
45
-
46
Development of Algorithms for Processing Images of Large Volumes
Published 2022-09-01“…Today it is quite difficult to find an application or a web application with a simple and user-friendly interface, as well as with relatively low characteristics in terms of energy consumption needed to supply the operating system and the device in general. This article presents new algorithms that improve the efficiency of image processing by reducing application loading and processing time, as well as by reducing the load on the operating system.…”
Get full text
Article -
47
Quantitative evaluation of fault propagation in a commercial cloud system
Published 2020-03-01“…However, dependability evaluation studies have often been carried out beyond isolated physical systems, such as processors, sensors, and single boards with or without operating system hosts. These studies have been performed using inaccurate simulations instead of validating complete cloud software stacks (firmware, hypervisor, operating system hosts and workloads) as a whole. …”
Get full text
Article -
48
TPCM-based trusted PXE boot method for servers
Published 2020-12-01“…The PXE startup mechanism downloads operating system files through the network and starts the operating system,which is widely used in server network startup.It is widely used in server network startup.The PXE boot process is secured and trusted through trusted computing technology to prevent the PXE boot file from being tampered with maliciously,ensuring the safe and reliable operation of the server.The cyber security classified protection standard requires that the system boot program and system program of the server device be trusted and verified based on the trusted root.A TPCM-based server trusted PXE boot method based on the requirements of classified protection standard was proposed to ensure the security and trust of the server's BIOS firmware,PXE bootfiles,and Linux system files.When the server performs PXE boot,TPCM measured BIOS firmware,BIOS boot environment measured PXE boot files,and PXE boot environment measured Linux system files.Taking TPCM as the root of trust,one level of measurement,one level of trust,and a chain of trust were established to achieve a trusted server operating environment.The proposed method was tested on a domestically-controlled,self-controllable Shenwei server.The experimental results show that the proposed method is feasible.…”
Get full text
Article -
49
Wireless multichannel hybrid data acquisition system for functional rehabilitation of paralyzed limbs
Published 2024-06-01“…The data acquisition tasks were created based on the FreeRTOS operating system, and the kinematics tasks corresponding to the number of IMU sensors were created, and the mutually exclusive signal volume technique was used to ensure that the data acquired by each task was transmitted to the PC software system via Wi-Fi. …”
Get full text
Article -
50
Medical-Surgical Nursing : assessment and management of clinical problems /
Published 2011View in OPAC
Software Book -
51
Managing Risk in the Design of Modular Systems for an Autonomous Shuttle
Published 2024-01-01“…Identifying limitations of the Robot Operating System (ROS) framework, we incorporate our own control measures for autonomous, unsupervised operation with enhanced intelligence. …”
Get full text
Article -
52
A novel feature selection technique: Detection and classification of Android malware
Published 2025-03-01“…Android operating system is not just the most commonly employed mobile operating system, but also the most lucrative target for cybercriminals due to its extensive user base. …”
Get full text
Article -
53
Key technologies and application scenario of DC/OS
Published 2016-12-01“…Firstly, critical technologies in data center operating system(DC/OS), including Mesos, Yarn, Kubernetes and Docker were presented. …”
Get full text
Article -
54
R&D practice of service orchestration system for on-demand network
Published 2017-12-01“…In order to meet the requirements of services quickly on line in the SDN/NFV era,existing network operating system needs to be refactored.Based on the background of the practice of on-demand network services,R&D practice of orchestrator for on-demand network service was introduced,then the orchestrator’s role in software system architecture was explained in detail.…”
Get full text
Article -
55
Research status and outlook of Android security
Published 2016-10-01“…Currently, Android is the most popular operating system for smartphones. At the same time, its security situation is becoming increasingly serious. …”
Get full text
Article -
56
Control System of Fire Rescue Robot for High-Rise Building Design
Published 2022-01-01“…Robot fire detection method involves obtaining the video image of the fire detection area through a high-definition camera, performing image preprocessing on the current frame image of the video in the robot operating system to obtain the image; and performing the flame area segmentation based on the Ohta color space and the Otsu threshold segmentation algorithm on the image, to obtain the segmented image; through the interframe difference method, the preprocessed image of the previous frame is subtracted from the current frame image and the moving area of the image is segmented to obtain the segmented image; the obtained segmented image is combined with the segmented image in the robot operating system and images are intersected to obtain a segmented image with the characteristics of flame motion; based on other characteristics of the flame, flame recognition is performed on the area in the segmented image. …”
Get full text
Article -
57
Conceptual model of reverse logistics management of health resorts
Published 2023-03-01“…The proposed conceptual model of reverse logistics management of health resorts contains factors, information and resources that form the entrance to the operating system; blocks of implementation, evaluation and transformation for reverse logistics management, which fill the operating management system; a list of effects of the implementation of reverse logistics management, which form the exit from the operating system. …”
Get full text
Article -
58
Analysis on the Trend of Mobile Device Software Development
Published 2013-05-01“…The mobile device operating system,application software development status and direction of evolution were summarized and analyzed.…”
Get full text
Article -
59
Design and implementation ofserver security alarm system in campus network
Published 2014-10-01“…A safety test using open source tools was put forward to construct four layer network scan architecture pattern for monitoring server safety,it also can get an automatic analysis report of threaten for the administrators.Through the timing detection mechanism based on process from hardware to software,from the operating system to the service application even to the dynamic page script to build a full range,customizable,flexible combination of multi-level security…”
Get full text
Article -
60
Exploration and thinking of container technology for telecom operators
Published 2016-08-01“…Container is an operating environment which has relatively isolated resources running on top of the operating system kernel,and the development of container technology corresponds to the essential requirements of cloud computing.As a senior player in cloud computing field,the telecom operators must pay more attention to container technology.The technology background of container was briefly introduced,the potential application scenarios for telecom operators were analyzed,the preliminary exploratory cases for telecom operators were summarized,and the possible positive role of container technology in transformation and upgrade for telecom operators was discussed.…”
Get full text
Article