Showing 161 - 180 results of 228 for search '"operating system"', query time: 0.06s Refine Results
  1. 161

    The Impact of Length-Scale Variation When Diagnosing the Standard Deviations of Background Error in a 4D-Var System and Filtering Method Investigation by Xiang Xing, Bainian Liu, Weimin Zhang, Xiaoqun Cao, Hongze Leng

    Published 2020-01-01
    “…To eliminate such sampling noise, the spectral filtering method used widely in the operational system and a modified spatial averaging approach are investigated. …”
    Get full text
    Article
  2. 162

    Accuracy of the SWAY Mobile Cognitive Assessment Application by Heidi A. VanRavenhorst-Bell, Melissa A. Muzeau, Lindsay Luinstra, Jared Goering, Ryan Z. Amick

    Published 2021-08-01
    “… # Methods 88 healthy, young adults, 18 to 48 years (*mean*= 22.09 ± *sd*=4.47 years) completed four, randomized and counter-balanced, reaction time tests (2- SWAY RT, 2- ImPACT QT) using different operating systems (iOS, Android) of 4 randomly assigned mobile devices…”
    Get full text
    Article
  3. 163

    Data-driven automated job shop scheduling optimization considering AGV obstacle avoidance by Qi Tang, Huan Wang

    Published 2025-01-01
    “…In order to improve the collaboration between the production stages and the AGV operation system, a two-layer scheduling optimization model is proposed for simultaneous decision making of batching problems, job sequences and AGV obstacle avoidance. …”
    Get full text
    Article
  4. 164

    Robotic Autonomous Observatories: A Historical Perspective by Alberto Javier Castro-Tirado

    Published 2010-01-01
    “…The author discusses the basic definitions, the differing telescope control operating systems, observatory managers, as well as a few current scientific applications.…”
    Get full text
    Article
  5. 165

    Can a Patient use an App at Home to Measure Knee Range of Motion? Utilizing a Mobile App, Curovate, to Improve Access and Adherence to Knee Range of Motion Measurements by Nirtal Shah, Corey Grunberg, Zahra Hussain

    Published 2022-04-01
    “…The reliability and validity of the Curovate app was tested across mobile devices and operating systems and compare to goniometric knee range of motion measurements. …”
    Get full text
    Article
  6. 166

    Study on Key Technologies of Intelligent IoT Device by Yingqi Wei, Weiping Lin, Ying Li

    Published 2015-08-01
    “…Smart IoT devices go into product stage from hype stage.Sensors are being miniaturized,integrated,intelligent and diversified,turn the reality into digital.IoT device’s intelligent is based on power of processor and advanced operation system,and be enhanced by the cloud computing and big data.As smart phone,the smart IoT devices need to build an active ecosystem that engage developers to innovate.The several key technologies development status and future trends were explored,analyzed,and displayed.…”
    Get full text
    Article
  7. 167

    Some Fixed Point Results for Perov-Ćirić-Prešić Type F-Contractions with Application by Abdolsattar Gholidahneh, Shaban Sedghi, Vahid Parvaneh

    Published 2020-01-01
    “…To support our main result, an example and an application to nonlinear operator systems are presented.…”
    Get full text
    Article
  8. 168

    DIRECTIONS OF IMPROVING THE EFFICIENCY OF OPERATION MANAGEMENT OF MILITARY ENGINEERING OF THE VIETNAMESE PEOPLE'S ARMY by M. C. Nguyen, I. Ivanov

    Published 2017-11-01
    “…The main principles of optimization of the military equipment operation system are presented and the main directions for increasing the effectiveness of the management of the operation of military equipment are recommended, in particular, the application of the method of controlling the technical resource of military equipment in a step-by-step schedule, and also the method of network planning. …”
    Get full text
    Article
  9. 169

    A detection method of Android system vulnerabilities based on matching by iayuan ZHANGJ

    Published 2016-05-01
    “…Android system has occupied the majority share of smart mobile operating systems.However,Android system has worrying security issues.It frequently bursts high-risk vulnerabilities in recent years,which is a big security risk to the majority of Android users.Android system vulnerabilities were studied,and a rapid detection method of Android system vulnerabilities based on matching was proposed.A script-based vulnerability scanning tool was also designed.Through the evaluation of experiments,the tool is running well.…”
    Get full text
    Article
  10. 170

    New Results on Passivity Analysis for Uncertain Neural Networks with Time-Varying Delay by Xueying Shao, Qing Lu, Hamid Reza Karimi, Jin Zhu

    Published 2014-01-01
    “…The main characteristic of this paper is to obtain novel stability and passivity analysis criteria for uncertain neural networks with time-delay in the delta operator system framework. A numerical example is presented to demonstrate the effectiveness of the proposed results.…”
    Get full text
    Article
  11. 171

    Reflection and Analysis on Network Maintenance Transition of Telecommunication Operators by Jun Zhu, Bo Zhao, Xiaofeng Wang, Bo Wang

    Published 2014-07-01
    “…It was described that in order to improve customer perception and enhance the competitiveness of enterprises, how telecommunication operators worked on network maintenance transition, to realize network maintenance, support business refinement management, improve the capability of rapid response of operation system.…”
    Get full text
    Article
  12. 172

    Research and application of remote update technology of IoT terminal by Min WEI, Yi WANG

    Published 2018-10-01
    “…Remote updating of IoT terminal is the basis of supporting its iterative optimization,large-scale deployment and low-cost maintenance.The contradiction between the present status of remote updating of IoT terminals and the requirement of unified management and control was analyzed.Based on LWM2M protocol,a solution of remote updating of IoT terminals was proposed.In this solution,IoT platform provides the unified management and control of IoT terminals with heterogeneous operating systems and multi-model terminals,which helps reducing the impact of terminal scale updating on the network and improving the generality,reliability and stability of remote updating.…”
    Get full text
    Article
  13. 173

    On Max-Plus Algebra and Its Application on Image Steganography by Kiswara Agung Santoso, Fatmawati, Herry Suprajitno

    Published 2018-01-01
    “…The proposed method has been tested on many secret images, and the results are satisfactory which have a high level of strength and a high level of security and can be used in various operating systems.…”
    Get full text
    Article
  14. 174

    Operations on Soft Sets Revisited by Ping Zhu, Qiaoyan Wen

    Published 2013-01-01
    “…We find that the new operation system on soft sets inherits all basic properties of operations on classical sets, which justifies our definitions.…”
    Get full text
    Article
  15. 175

    The SEMAINE API: Towards a Standards-Based Framework for Building Emotion-Oriented Systems by Marc Schröder

    Published 2010-01-01
    “…By providing a Java and C++ wrapper around a message-oriented middleware, the API makes it easy to integrate components running on different operating systems and written in different programming languages. …”
    Get full text
    Article
  16. 176

    Study on Yaw Gearbox Broken Tooth of MW-class Wind Turbine by Wang Fugang, Cheng Linzhi, Su Fengyu, Xie Jinjuan, Tong Shiwei, Li Chengchen, Zhuo Ran, Li Yongkui

    Published 2018-01-01
    “…The comprehensive analysis is carried out on the failure gears,the causes of gear damage,such as tooth fracture,design factor,production factor,factors of assembly and operation,system protection factor,etc. are analyzed one by one,the final positioning between the thrust pad bearing and yaw ring interference is the direct cause. …”
    Get full text
    Article
  17. 177

    Terminals behavior testing research under IPv6 Wi-Fi by Jie ZHANG, Qin ZHAO, Tian-le YANG

    Published 2014-10-01
    “…As lack of essential data,carrier operators are afraid to promote IPv6 in mobile Internet due to they cannot forecast the influence of user experience.The main current mobile terminals behavior under IPv6 Wi-Fi was tested,the key point to impact user experience was analyzed and the practicability of large-scale deployment of IPv6 in mobile Internet was studied.The main steps of establishing the test platform were detailed.Test results show that the operating systems and browsers with big market share supporting for IPv6 are still not perfect.They lead to worse user experience by bad internetworking.It is the main obstacle to promote IPv6 in mobile Internet.…”
    Get full text
    Article
  18. 178

    A Comprehensive Approach to Power Management in Embedded Systems by Antônio Augusto Fröhlich

    Published 2011-03-01
    “…As a result, this paper has its main contribution on the introduction of a comprehensive and systematic way to deal with power management issues in resource-constrained, battery-operated systems.…”
    Get full text
    Article
  19. 179

    Open service platform for IoT by Hao RONG, GLingyun JIAN

    Published 2016-02-01
    “…Currently,there are still some problems with IoT,specifically in:one is that the IoT gives priority to vertical service system;another is the lack of cross-system resource sharing.To solve the above problems,a scalable intelligence service architecture of IoT in which a unified service data model was proposed and a message middleware were built to overcome the multi-source heterogeneous problems in the data structure,data platforms and operating systems. In addition,a usage authorization mechanism was proposed to support security and privacy in the IoT environment, contributing to a scalable,secure and reliable intelligence open service platform for IoT.Finally,a prototype system was designed and concrete system was given to verify the feasibility and superiority of the proposed architecture.…”
    Get full text
    Article
  20. 180

    Dynamic and heterogeneous Byzantine system in cloud by Yang CHEN, Hongchao HU, Wenyan LIU, Shumin HUO, Hao LIANG

    Published 2018-05-01
    “…In order to improve the intrusion tolerance performance of cloud platforms,the Byzantine system model has been widely used.But the current Byzantine system is difficult to prevent a latent attack effectively,which can destroy the Byzantine system by accumulating the number of executive modules which the attacker controls and making it exceed the tolerance upper limit.To solve the problem,a dynamic and heterogeneous Byzantine system was proposed.In which the executive modules were maximized diversified in configurations such as different operating systems and so on.Meanwhile,every executive module was assigned a lifetime based on the attacker’s ability and the vulnerabilities of the module.The novel system can significantly enhance the intrusion tolerance of the cloud service by diverse and dynamic attack surface,which is verified by simulations.…”
    Get full text
    Article