Showing 81 - 100 results of 228 for search '"operating system"', query time: 0.06s Refine Results
  1. 81

    Design of 433 MHz Communication Protocol and Implementation of Gateway in Intelligence Home by Yang Ge, Dagang Li

    Published 2015-09-01
    “…According to the network establishing demands of the internal network of intelligent home, such as low cost, low data rate, short distance communication, a type of 433 MHz RF communication protocol stack based on CC1101 was created and a gateway based upon the embedded operating system called μC/OS-II and micro controller called STM32F407 was implemented. …”
    Get full text
    Article
  2. 82

    Research on the trusted environment of container cloud based on the TPCM by Guojie LIU, Jianbiao ZHANG, Ping YANG, Zheng LI

    Published 2021-08-01
    “…Container technology is a lightweight operating system virtualization technology that is widely used in cloud computing environments and is a research hotspot in the field of cloud computing.The security of container technology has attracted much attention.A method for constructing a trusted environment of container cloud using active immune trusted computing was proposed, and its security meet the requirements of network security level protection standards.First, container cloud servers were measured through the TPCM and a trust chain from the TPCM to the container's operating environment was established.Then, by adding the trusted measurement agent of the container to the TSB, the trusted measurement and trusted remote attestation of the running process of the container were realized.Finally, an experimental prototype based on Docker and Kubernetes and conduct experiments were built.The experimental results show that the proposed method can ensure the credibility of the boot process of the cloud server and the running process of the container and meet the requirements of the network security level protection standard evaluation.…”
    Get full text
    Article
  3. 83

    Port Contention Aware Task Scheduling for SIMD Applications by Shogo Saito, Kei Fujimoto

    Published 2025-01-01
    “…The proposed method features a core allocation policy to avoid port contention, identify SIMD applications, and coordinate with the operating system (OS) scheduler. Through evaluation, we find that the proposed method can reduce the processing time for some tasks in virtual radio access networks was reduced by 13.3%.…”
    Get full text
    Article
  4. 84

    Teleoperation Robot Control of a Hybrid EEG-Based BCI Arm Manipulator Using ROS by Vidya Nandikolla, Daniel A. Medina Portilla

    Published 2022-01-01
    “…To create the environment and user interface, a robot operating system (ROS) is used. Live brain computer interface (BCI) commands from a trained user are successfully harvested and used as an input signal to pick a goal point from 3D point cloud data and calculate the goal position of the robots’ mobile base, placing the goal point in the robot arms workspace. …”
    Get full text
    Article
  5. 85

    Narrowing the semantic gap in virtual machine introspection by Chao-yuan CUI, Yun WU, Ping LI, Xiao-ming ZHANG

    Published 2015-08-01
    “…Virtual machine introspection(VMI)has been widely used in areas such as intrusion detection and malware analysis.However,due to the existence of semantic gap,the generality and the efficiency of VMI were partly influenced while getting internal information of a virtual machine.By analyzing the deficiencies of existing technology of semantic gap restoration,a method called ModSG was proposed to bridge the semantic gap.ModSG was a modularity system,it divided semantic restoration into two parts.One was online phase that interact directly with user to construct semantic views,the other was offline phase that only interact with operating system to parse high-level semantic knowledge.Both were implemented via independent module,and the latter provided the former with necessary kernel information during semantic view construction.Experiments on different virtual machine states and different kernel versions show that the ModSG is accurate and efficient in narrowing semantic gap.The modular design and deployment also make ModSG easily to be extended to other operating systems and virtualization platforms.…”
    Get full text
    Article
  6. 86

    FPGA-Jetson based hardware real-time co-simulation for smart grid by Tong DUAN, Venkata Dinavahi, Tianshi CHENG

    Published 2021-12-01
    “…Smart grid is a power-communication coupled cyber-physical power system (CPPS), where the two-domain coupling features make the real-time simulation difficult.Different from the existing software-based co-simulation methods, a FPGA-Jetson based real-time co-simulation platform for smart grid by leveraging the FPGA’'s programmable computation capability and Jetson’s real-time operating system was designed.The power system simulation was carried out on the FPGA board, the information communication system simulation was completed on Jetson platform, and the two-domain information interaction was simulated through the PCIe channel.By making full use of the computing and data transmission capabilities of each module, the real-time simulation of the combination of power grid and communication network was realized.Finally, the corresponding specific modeling and parameters were designed for the two representative smart grid scenarios: hybrid AC-DC transmission network and micro-grid, the validity and scalability of the proposed real-time co-simulation architecture were verified.…”
    Get full text
    Article
  7. 87

    Dual-verified secure localization method for unmanned intelligent vehicles by GU Xiaodan, XIA Guozheng, SONG Bingchen, YANG Ming, LUO Junzhou

    Published 2024-06-01
    “…Unmanned intelligent vehicles are exposed to high risks of network attack, hardware attack, operating system attack and software attack. They are susceptible to physical or remote security attacks, causing it to deviate from the delivery trajectory and fail the delivery task, or even be manipulated to disrupt normal operation of the factory. …”
    Get full text
    Article
  8. 88

    Integrating humanoid robots with human musicians for synchronized musical performances by MengCheng Lau, John Anderson, Jacky Baltes

    Published 2025-01-01
    “…The technical implementation incorporated essential components such as visual servoing, human-robot interaction, and Robot Operating System (ROS), enabling seamless communication and coordination between the humanoid robots and the human musicians. …”
    Get full text
    Article
  9. 89

    EVALUATION OF DATA COLLECTION TREE ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS by Do Huy Khoi

    Published 2024-12-01
    “…This paper focuses on the simulation and evaluation of data collection routing protocols in WSNs, specifically the Collection Tree Protocol (CTP) in mobile environments using the Contiki operating system and the Cooja simulator. Applications of data collection routing protocols in mobile environments include military surveillance and livestock monitoring. …”
    Get full text
    Article
  10. 90

    TSDSIR: multi-service concurrent message data flow scheduling in robotic systems by DING Nan, JI Chenghui, HU Chuangye, XU Li

    Published 2024-08-01
    “…Aiming at the characteristics of multi-service concurrency and multi-modal message data mixing faced in the robot cloud-edge-end collaboration scenarios, a multi-message dynamic scheduling method oriented to time-sensitive attributes was proposed based on the analysis of the message distribution mechanism in the robot operating system 2 (ROS2). Firstly, scheduling parameters, including message priority and transmission times, were defined based on multi-topic concurrency and real-time network state in ROS2, enabling real-time queue state characterization. …”
    Get full text
    Article
  11. 91

    The Navigation of Home Service Robot Based on Deep Learning and Machine Learning by Yupei Yan, Weimin Ma, Sengfat Wong, Xuemei Yin, Qiang Pan, Zhiwen Liao, Xiaoxin Lin

    Published 2024-01-01
    “…Following, the data come from the robot operating system topics are collected and cleaned, the linear regression, decision tree, and linear SVR algorithms are applied and compared to predict the power consumption of the robot, and a conclusion is obtained that liner movement will consume more power, which provides a reference for the path planning of the robot. …”
    Get full text
    Article
  12. 92

    The role of government in helping SMEs to access finance: An evolutionary game modeling and simulation approach. by Zhu Mei, Jingjing Zhang, QiaoMei Zhou

    Published 2024-01-01
    “…<h4>Purpose</h4>This study aims to delineate the operating system of a strategic game model involving three core financial actors-government, banks, and guarantee institutions, with a focus on their collective impact on system evolution towards sustainable SME financing.…”
    Get full text
    Article
  13. 93

    Validation Indicator Identification and Customer Ranking in Microloans: A Study at Middle East Bank in Iran by Azadeh Ahmadi Kousha, Faegh Ahmadi, Mohammad Hossein Ranjbar, Hamidreza Kordlouie

    Published 2024-06-01
    “…Sixth, the person's score is above 40. Seventh, the operating system of the person's phone is not Android. …”
    Get full text
    Article
  14. 94

    Applying genetic algorithm to extreme learning machine in prediction of tumbler index with principal component analysis for iron ore sintering by Senhui Wang

    Published 2025-02-01
    “…The tumbler index (TI) is one of the most important indices to characterize the quality of sinter, which depends on the raw materials proportion, operating system parameters and the chemical compositions. …”
    Get full text
    Article
  15. 95

    A prototype of a low-cost autonomous mini-vehicle by Gabriel Arthur Vicentini, Luan Gabriel Vidal da Silva, Carlos Dias da Silva Junior, Elias José de Rezende Freitas

    Published 2023-12-01
    “…In addition, we show the first server-client programming using the ROS (Robot Operating System) platform, which allows communication between a central computer and the ESP32 microcontroller. …”
    Get full text
    Article
  16. 96

    Lightweight anomaly detection model for UAV networks based on memory-enhanced autoencoders by HU Tianzhu, SHEN Yulong, REN Baoquan, HE Ji, LIU Chengliang, LI Hongjun

    Published 2024-04-01
    “…The message queue based on the operating system was used for data packet caching to achieve persistent processing of high-speed data streams, which effectively improved the stability and reliability of the model. …”
    Get full text
    Article
  17. 97

    Caractéristiques socio-démographiques et dynamique de la transhumance des bouviers peuls de la Nouhao au Burkina Faso by Sidonie Ouoba-Ima

    Published 2018-09-01
    “…Despite the availability of these pastoral infrastructures and arrangements, farmers have kept their traditional operating system of grazing resources and livestock. One of the traditional system elements is the practice of internal and external mobility to the pastoral zone. …”
    Get full text
    Article
  18. 98

    Pathways for the Improvement of Construction Productivity: A Perspective on the Adoption of Advanced Techniques by Pejman Ghasemi Poor Sabet, Heap-Yih Chong

    Published 2020-01-01
    “…This reinvention refers to not only inventing advanced materials and equipment but also developing new operating systems for construction projects. Inadequate application of advanced techniques impedes the operating system. …”
    Get full text
    Article
  19. 99

    LinRegDroid: Detection of Android Malware Using Multiple Linear Regression Models-Based Classifiers by Durmus Ozkan Sahin, Sedat Akleylek, Erdal Kilic

    Published 2022-01-01
    “…Application permissions, which are one of the most critical building blocks in the security of the Android operating system, are extracted through static analysis, and security analyzes of applications are carried out with machine learning techniques. …”
    Get full text
    Article
  20. 100

    Design and Monitoring Automatization Of Exhaust Fan Through Smartphone at PT Semen Tonasa by Pance Asyik, Eko Hadi Nugroho

    Published 2023-06-01
    “…The results of this study are to use the Microsoft Windows 2000 operating system and RS link to produce images and exhaust fan automation to prevent coal feeder trip pfister due to high temperatures is to monitor via a smartphone to monitor the function of existing tools.…”
    Get full text
    Article