Showing 121 - 140 results of 228 for search '"operating system"', query time: 0.08s Refine Results
  1. 121

    Development of Ground Freezing System for Undisturbed Sampling of Granular Soils by Youngseok Kim, Bumsik Hwang, Wanjei Cho

    Published 2018-01-01
    “…Therefore, in order to obtain undisturbed samples of granular soils, a new local ground freezing equipment and an operating system were developed in this study. The applied coolant was liquid nitrogen and circulated through a double tube inserted in the ground. …”
    Get full text
    Article
  2. 122

    Three-Dimensional Location and Mapping Analysis in Mobile Robotics Based on Visual SLAM Methods by Gustavo A. Acosta-Amaya, Juan M. Cadavid-Jimenez, Jovani A. Jimenez-Builes

    Published 2023-01-01
    “…The experiments were validated with a robotic system designed for this purpose, which is fully compatible with ROS (robot operating system).…”
    Get full text
    Article
  3. 123

    Influence of shortest path algorithms on energy consumption of multi-core processors by A. A. Prihozhy, O. N. Karasik

    Published 2023-10-01
    “…Modern multi-core processors, operating systems and applied software are being designed towards energy efficiency, which significantly reduces energy consumption. …”
    Get full text
    Article
  4. 124

    Network Congestion Control Algorithm for Image Transmission—HRI and Visual Light Communications of an Autonomous Underwater Vehicle for Intervention by Salvador López-Barajas, Pedro J. Sanz, Raúl Marín-Prades, Juan Echagüe, Sebastian Realpe

    Published 2025-01-01
    “…Our approach integrates a Human–Robot Interface (HRI) with a network congestion control algorithm at the application level for conservative transmission of images using the Robot Operating System (ROS) framework. The system was designed to avoid network congestion by adjusting the image compression parameters and the transmission rate depending on the real-time network conditions. …”
    Get full text
    Article
  5. 125

    Automatic generation of AppArmor security policies based on large language models by SHA Yitian, LIU Shaojun, QIAN Xin, WU Yue, CHEN Peng, LIU Xing

    Published 2024-06-01
    “…Operating system (OS) security has been considered as a critical layer within the comprehensive security framework of computer information systems. …”
    Get full text
    Article
  6. 126

    Increasing Trust in Banking and Developing Insurance System for Bank Deposits in Russia by I. V. Dmitriev

    Published 2014-02-01
    “…Taking into account the carried-out analysis and an assessment of operating system of insurance of deposits it is offered: to develop the mechanism of overcoming of "moral" risk; increase of financial literacy of the population, in view of activity of some banks on advance in a segment of private investors of the products which aren't covered by system of guaranteeing; to define introduction of the mechanism of differentiation of contributions to the ASV insurance Fund depending on degree of riskiness of activity of participating bank of system, system modernization risk - the focused supervision as bases of stable functioning of the banking sector and its hotel institutes.…”
    Get full text
    Article
  7. 127

    Consumer Inertia, the New Economy and EU Competition Law by Vladimir Bastidas Venegas

    Published 2018-04-01
    “…As illustrated by the Microsoft I decision (Windows Media Player), it is not self-evident that the bundling of an application with an operating system results in coercion, the pressure to consume the “tied” product, if consumers have a de facto possibility to download competing products for free. …”
    Get full text
    Article
  8. 128

    Research on automated guided vehicle (AGV) path tracking control based on laser simultaneous localization and mapping (SLAM) by W. Wang, Z. Bao, J. Zheng, T. Wang

    Published 2025-01-01
    “…This study aims to improve the effectiveness of AGV path planning and path-tracking control and to design a comprehensive hardware and software system in combination with the Robot Operating System (ROS) to improve the practicality of the system. …”
    Get full text
    Article
  9. 129

    Real-Time Analysis of Event Response Based on RT-Thread by Hui Liu, Wenyin Tao, Zhixin Hong, Lianmin Shi

    Published 2025-01-01
    “…The event response is a crucial feature in the real-time operating system RT-Thread, used for synchronizing threads. …”
    Get full text
    Article
  10. 130

    Formal Verification Method for Configuration of Integrated Modular Avionics System Using MARTE by Lisong Wang, Miaofang Chen, Jun Hu

    Published 2018-01-01
    “…The configuration information of Integrated Modular Avionics (IMA) system includes almost all details of whole system architecture, which is used to configure the hardware interfaces, operating system, and interactions among applications to make an IMA system work correctly and reliably. …”
    Get full text
    Article
  11. 131

    How breastfeeding affects immunity? by Dawid Piecuch, Weronika Sobota, Katarzyna Zemsta, Przemysław Piskorz, Michał Zwoliński, Edyta Hańczyk, Aleksandra Sędek

    Published 2025-01-01
    “…Summary Breastfeeding affects the development and functioning of the baby's operating system. Due to the special composition of breast milk, breastfed children protect against infections and support for additional health. …”
    Get full text
    Article
  12. 132

    Designing and implementing a Web-based real time routing service for crisis management (a case study for district 11 of Tehran) by javad sadidi, seyed hassan hosseini sajedi

    Published 2019-06-01
    “…Open source languages, format, libraries and software such as HTML, CSS, AJAX, GeoJSON, PHP, OpenLayer, PostGIS were also used to design the service and applying online weightings, blocking each piece of routes and re-routing procedure without blocked traffics, implementation of server-side processing and reducing the volume of the client-side’s operations, being under the browser’s surveillance, no need to install any software and the ability to use it on any operating system can be named. According to the obtained results, the path’s length and traffic’s volume variables have the most important role in target function formation (travel cost) therefore the specific path will be selected as the optimal path, with the minimized distance between the destination and the traffic volume. …”
    Get full text
    Article
  13. 133

    An FPGA-Based Omnidirectional Vision Sensor for Motion Detection on Mobile Robots by Jones Y. Mori, Janier Arias-Garcia, Camilo Sánchez-Ferreira, Daniel M. Muñoz, Carlos H. Llanos, J. M. S. T. Motta

    Published 2012-01-01
    “…Synthesis results show that the system can achieve a throughput of 26.6 processed frames per second and the performance analysis pointed out that the overall architecture achieves a speedup factor of 13.78 in comparison with a PC-based solution running on the real-time operating system xPC Target.…”
    Get full text
    Article
  14. 134

    Framework to analyze and exploit the smart home IoT firmware by Keshav Kaushik, Akashdeep Bhardwaj, Susheela Dahiya

    Published 2025-02-01
    “…Despite this, the security of the devices is not receiving any more attention. Since operating system (OS) and hardware security have improved recently, researchers and hackers now seek vulnerabilities in other areas, such as firmware. …”
    Get full text
    Article
  15. 135

    Strategy of container migration and honeypot deployment based on signal game in cloud environment by Lingshu LI, Jiangxing WU, Wei ZENG, Wenyan LIU

    Published 2022-06-01
    “…Multi-tenant coexistence and resource sharing in the SaaS cloud pose serious security risks.On the one hand, soft isolation of logical namespaces is easy to be bypassed or broken.On the other hand, it is easy to be subjected to co-resident attacks due to sharing of the host operating system and underlying physical resources.Therefore it poses a serious threat to data availability, integrity and confidentiality in the container cloud.Given the problem that SaaS cloud services are vulnerable to container escape and side-channel equivalent resident attack, network deception technology increases the uncertainty of the cloud environment and reduces the effectiveness of attack by hiding the business function and characteristic attributes of the executor.Aiming at the security threat caused by the co-resident attack, combining dynamic migration and virtual honeypot security technology, the economical and reasonable network deception method was studied.Specifically, a container migration and honeypot deployment strategy based on the signal game was proposed.According to the security threat analysis, container migration and honeypot were used as defense methods.The former improved the undetectability of the system based on the idea of moving to target defense, while the latter confused attackers by placing decoy containers or providing false services.Furthermore, since network reconnaissance was the pre-step of the network attack chain, the attack and defense process was modeled as a two-person signal game with incomplete information.The sender chose to release a signal according to his type, and the receiver could only obtain the signal released by the sender but could not determine the type.Then, a game tree was constructed for the complete but imperfect information dynamic game, and the costs and benefits of different strategy combinations were set.The optimal deception strategy was determined by equilibrium analysis of attack-defense model.Experimental results show that the proposed strategy can effectively improve system security.Besides, it can also reduce container migration frequency and defense cost.…”
    Get full text
    Article
  16. 136

    Enhancing Software Distribution and Collaboration in Manufacturing: Developing the IMOS Platform by Antonio Monte Pegado, Andre Dionisio Rocha, Jose Barata

    Published 2025-01-01
    “…The Industry Modular Operating System (IMOS) is presented as a platform supporting software accessibility, execution, and integration, while encouraging partnerships between software developers and industrial site managers. …”
    Get full text
    Article
  17. 137

    In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes by Amal Hkiri, Mouna Karmani, Fawaz Hasan Alasmary, Omar Ben Bahri, Ahmed Mohammed Murayr, Mohsen Machhout

    Published 2025-02-01
    “…The Contiki Cooja framework, a comprehensive operating system (OS), development toolkit, and network simulator, was utilized to facilitate these assessments. …”
    Get full text
    Article
  18. 138

    Square Root Unscented Kalman Filter-Based Multiple-Model Fault Diagnosis of PEM Fuel Cells by Abdulrahman Allam, Michael Mangold, Ping Zhang

    Published 2024-12-01
    “…The Bayesian model selection method carries fault indication signals that are interpreted by a derived decision logic to obtain reliable information on the current-operating system regime. The proposed diagnosis scheme is evaluated through simulations using the LA 92 and NEDC driving cycles.…”
    Get full text
    Article
  19. 139

    تطبیقات الهواتف الذکیة والخصوصیة المعلوماتیة : دراسة تحلیلیة مقارنة by د. حسام الدین محمد رفعت

    Published 2020-09-01
    “…Thestudy focused mainly on Android operating system as it was highly spreadcompared to other systems. …”
    Get full text
    Article
  20. 140

    ESX: A Self-Generated Control Policy for Remote Access With SSH Based on eBPF by Yuan Zhong, Pengfei Chen, Huxing Zhang

    Published 2025-01-01
    “…Additionally, ESX presents a lower overhead compared to established security solutions, such as AppArmor, enhancing the overall operating system security.…”
    Get full text
    Article