Showing 41 - 60 results of 228 for search '"operating system"', query time: 0.08s Refine Results
  1. 41
  2. 42

    Application research on network security operation automation practice based on RPA technology by ZHOU Ying

    Published 2024-07-01
    Subjects: “…network security operation system…”
    Get full text
    Article
  3. 43

    Exam ref 70-697 : configuring Windows devices / by Bettany, Andrew, Warren, Andrew

    Published 2018
    Subjects:
    View in OPAC
    Book
  4. 44
  5. 45
  6. 46

    Development of Algorithms for Processing Images of Large Volumes by O. N. Vinichuk, V. I. Dravitsa

    Published 2022-09-01
    “…Today it is quite difficult to find an application or a web application with a simple and user-friendly interface, as well as with relatively low characteristics in terms of energy consumption needed to supply the operating system and the device in general. This article presents new algorithms that improve the efficiency of image processing by reducing application loading and processing time, as well as by reducing the load on the operating system.…”
    Get full text
    Article
  7. 47

    Quantitative evaluation of fault propagation in a commercial cloud system by Chao Wang, Zhongchuan Fu

    Published 2020-03-01
    “…However, dependability evaluation studies have often been carried out beyond isolated physical systems, such as processors, sensors, and single boards with or without operating system hosts. These studies have been performed using inaccurate simulations instead of validating complete cloud software stacks (firmware, hypervisor, operating system hosts and workloads) as a whole. …”
    Get full text
    Article
  8. 48

    TPCM-based trusted PXE boot method for servers by Guojie LIU, Jianbiao ZHANG

    Published 2020-12-01
    “…The PXE startup mechanism downloads operating system files through the network and starts the operating system,which is widely used in server network startup.It is widely used in server network startup.The PXE boot process is secured and trusted through trusted computing technology to prevent the PXE boot file from being tampered with maliciously,ensuring the safe and reliable operation of the server.The cyber security classified protection standard requires that the system boot program and system program of the server device be trusted and verified based on the trusted root.A TPCM-based server trusted PXE boot method based on the requirements of classified protection standard was proposed to ensure the security and trust of the server's BIOS firmware,PXE bootfiles,and Linux system files.When the server performs PXE boot,TPCM measured BIOS firmware,BIOS boot environment measured PXE boot files,and PXE boot environment measured Linux system files.Taking TPCM as the root of trust,one level of measurement,one level of trust,and a chain of trust were established to achieve a trusted server operating environment.The proposed method was tested on a domestically-controlled,self-controllable Shenwei server.The experimental results show that the proposed method is feasible.…”
    Get full text
    Article
  9. 49

    Wireless multichannel hybrid data acquisition system for functional rehabilitation of paralyzed limbs by LUO Zhicheng, TIAN Ning, YANG Guang, QIN Feizhou, BAO Xueliang

    Published 2024-06-01
    “…The data acquisition tasks were created based on the FreeRTOS operating system, and the kinematics tasks corresponding to the number of IMU sensors were created, and the mutually exclusive signal volume technique was used to ensure that the data acquired by each task was transmitted to the PC software system via Wi-Fi. …”
    Get full text
    Article
  10. 50

    Medical-Surgical Nursing : assessment and management of clinical problems / by Lewis, Sharon L.

    Published 2011
    View in OPAC
    Software Book
  11. 51

    Managing Risk in the Design of Modular Systems for an Autonomous Shuttle by Thomas H. Drage, Kieran Quirke-Brown, Lemar Haddad, Zhihui Lai, Kai Li Lim, Thomas Braunl

    Published 2024-01-01
    “…Identifying limitations of the Robot Operating System (ROS) framework, we incorporate our own control measures for autonomous, unsupervised operation with enhanced intelligence. …”
    Get full text
    Article
  12. 52

    A novel feature selection technique: Detection and classification of Android malware by Sandeep Sharma, Prachi, Rita Chhikara, Kavita Khanna

    Published 2025-03-01
    “…Android operating system is not just the most commonly employed mobile operating system, but also the most lucrative target for cybercriminals due to its extensive user base. …”
    Get full text
    Article
  13. 53

    Key technologies and application scenario of DC/OS by Jiheng ZHANG, Dazhong LI, Chengyu ZHANG, Jinwu WEI

    Published 2016-12-01
    “…Firstly, critical technologies in data center operating system(DC/OS), including Mesos, Yarn, Kubernetes and Docker were presented. …”
    Get full text
    Article
  14. 54

    R&D practice of service orchestration system for on-demand network by Guangfeng LUO, Yiqun LI, Huiguang CHEN

    Published 2017-12-01
    “…In order to meet the requirements of services quickly on line in the SDN/NFV era,existing network operating system needs to be refactored.Based on the background of the practice of on-demand network services,R&D practice of orchestrator for on-demand network service was introduced,then the orchestrator’s role in software system architecture was explained in detail.…”
    Get full text
    Article
  15. 55

    Research status and outlook of Android security by Sihan QING

    Published 2016-10-01
    “…Currently, Android is the most popular operating system for smartphones. At the same time, its security situation is becoming increasingly serious. …”
    Get full text
    Article
  16. 56

    Control System of Fire Rescue Robot for High-Rise Building Design by Junfang Yu

    Published 2022-01-01
    “…Robot fire detection method involves obtaining the video image of the fire detection area through a high-definition camera, performing image preprocessing on the current frame image of the video in the robot operating system to obtain the image; and performing the flame area segmentation based on the Ohta color space and the Otsu threshold segmentation algorithm on the image, to obtain the segmented image; through the interframe difference method, the preprocessed image of the previous frame is subtracted from the current frame image and the moving area of the image is segmented to obtain the segmented image; the obtained segmented image is combined with the segmented image in the robot operating system and images are intersected to obtain a segmented image with the characteristics of flame motion; based on other characteristics of the flame, flame recognition is performed on the area in the segmented image. …”
    Get full text
    Article
  17. 57

    Conceptual model of reverse logistics management of health resorts by Serhii Voitovych, Liubov Lipych

    Published 2023-03-01
    “…The proposed conceptual model of reverse logistics management of health resorts contains factors, information and resources that form the entrance to the operating system; blocks of implementation, evaluation and transformation for reverse logistics management, which fill the operating management system; a list of effects of the implementation of reverse logistics management, which form the exit from the operating system. …”
    Get full text
    Article
  18. 58

    Analysis on the Trend of Mobile Device Software Development by Baiqing Liang, Yingqi Wei, Xuan Luo

    Published 2013-05-01
    “…The mobile device operating system,application software development status and direction of evolution were summarized and analyzed.…”
    Get full text
    Article
  19. 59

    Design and implementation ofserver security alarm system in campus network by Bin PANG, Hua LI, You-yi WANG, Shuai YAN, Zhi-he YANG

    Published 2014-10-01
    “…A safety test using open source tools was put forward to construct four layer network scan architecture pattern for monitoring server safety,it also can get an automatic analysis report of threaten for the administrators.Through the timing detection mechanism based on process from hardware to software,from the operating system to the service application even to the dynamic page script to build a full range,customizable,flexible combination of multi-level security…”
    Get full text
    Article
  20. 60

    Exploration and thinking of container technology for telecom operators by Gang LU, Xinzhang YANG, Zhenwei HE, Ling ZHANG, Liyun YAN

    Published 2016-08-01
    “…Container is an operating environment which has relatively isolated resources running on top of the operating system kernel,and the development of container technology corresponds to the essential requirements of cloud computing.As a senior player in cloud computing field,the telecom operators must pay more attention to container technology.The technology background of container was briefly introduced,the potential application scenarios for telecom operators were analyzed,the preliminary exploratory cases for telecom operators were summarized,and the possible positive role of container technology in transformation and upgrade for telecom operators was discussed.…”
    Get full text
    Article