-
81
Pathway Detection from Protein Interaction Networks and Gene Expression Data Using Color-Coding Methods and A* Search Algorithms
Published 2012-01-01“…On the other hand, our method is more efficient than previous ones and detects the paths of length 10 within 40 seconds using CPU Intel 1.73GHz and 1GB main memory running under windows operating system.…”
Get full text
Article -
82
Characterization of Antibiotics and Antibiotic Resistance Genes on an Ecological Farm System
Published 2015-01-01“…Therefore, continuous monitoring of antibiotics and their corresponding ARGs should be conducted in the agroecosystem near the concentrated animal farming operation systems.…”
Get full text
Article -
83
The Navigation of Home Service Robot Based on Deep Learning and Machine Learning
Published 2024-01-01“…Following, the data come from the robot operating system topics are collected and cleaned, the linear regression, decision tree, and linear SVR algorithms are applied and compared to predict the power consumption of the robot, and a conclusion is obtained that liner movement will consume more power, which provides a reference for the path planning of the robot. …”
Get full text
Article -
84
Implementing Computer Vision in Android Apps and Presenting the Background Technology with Mathematical Demonstrations
Published 2025-01-01“…The mobile app was implemented on the Android operating system. The app has a live video feed of the surroundings. …”
Get full text
Article -
85
Teleoperation Robot Control of a Hybrid EEG-Based BCI Arm Manipulator Using ROS
Published 2022-01-01“…To create the environment and user interface, a robot operating system (ROS) is used. Live brain computer interface (BCI) commands from a trained user are successfully harvested and used as an input signal to pick a goal point from 3D point cloud data and calculate the goal position of the robots’ mobile base, placing the goal point in the robot arms workspace. …”
Get full text
Article -
86
Access to Network Login by Three-Factor Authentication for Effective Information Security
Published 2016-01-01Get full text
Article -
87
THE CONSEQUENCES OF THE INTERNET FOR POLITICS
Published 2013-08-01“…Barack Obama influences global politics as if it were operation system of the computer. Thus the author believes that such problems as determination of the driving forces of the Arab spring and real reasons for the USA refusal to sign new telecommunications treaty at the ITU conference in Dubai deserve special analysis taking into account the role of the information and communication technologies.…”
Get full text
Article -
88
An Adaptive Message Passing MPSoC Framework
Published 2009-01-01“…Each processor of this system is compact and runs a tiny preemptive operating system that monitors various metrics and is entitled to take remapping decisions through code migration techniques. …”
Get full text
Article -
89
Implementation of Static Line Voltage Stability Indices for Improved Static Voltage Stability Margin
Published 2019-01-01“…Nowadays, the changes of economic, environment, and regulations are forcing the electric utilities to operate systems at maximum capacity. Therefore, the operation and control of power system to improve the system stability has been receiving a great deal of attention. …”
Get full text
Article -
90
Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
Published 2022-01-01“…The system can realize the remote acquisition and real-time monitoring of the network access, file system operation, system operation status, and other information of the controlled computer. …”
Get full text
Article -
91
Validation Indicator Identification and Customer Ranking in Microloans: A Study at Middle East Bank in Iran
Published 2024-06-01“…Sixth, the person's score is above 40. Seventh, the operating system of the person's phone is not Android. …”
Get full text
Article -
92
A Resilience-Based Security Assessment Approach for CBTC Systems
Published 2021-01-01“…With the rapid development of urban rail transit systems, large amounts of information technologies are applied to increase efficiency of train control systems, such as general computers, communication protocols, and operation systems. With the continuous exposure of information technology vulnerabilities, security risks are increasing, and information is easy to use by malicious attackers, which can bring huge property and economic losses. …”
Get full text
Article -
93
Comparative evaluation between Java application using JNI and native C/C++ application running on an Android platform.
Published 2025-01-01“… Android is a popular operating system based on the Linux kernel and has a Java-based framework. …”
Get full text
Article -
94
Operational strategy, capabilities, and successfully accomplishing business strategy
Published 2025-01-01“…The results exhibit the challenges posed by rapid market changes, revealing the deficiencies of traditional operational systems focused solely on efficiency and cost. …”
Get full text
Article -
95
Applying genetic algorithm to extreme learning machine in prediction of tumbler index with principal component analysis for iron ore sintering
Published 2025-02-01“…The tumbler index (TI) is one of the most important indices to characterize the quality of sinter, which depends on the raw materials proportion, operating system parameters and the chemical compositions. …”
Get full text
Article -
96
Design and Monitoring Automatization Of Exhaust Fan Through Smartphone at PT Semen Tonasa
Published 2023-06-01“…The results of this study are to use the Microsoft Windows 2000 operating system and RS link to produce images and exhaust fan automation to prevent coal feeder trip pfister due to high temperatures is to monitor via a smartphone to monitor the function of existing tools.…”
Get full text
Article -
97
Designing of 2-Stage CPU Scheduler Using Vague Logic
Published 2014-01-01“…In operating system the CPU scheduler is designed in such a way that all the resources are fully utilized. …”
Get full text
Article -
98
Network Congestion Control Algorithm for Image Transmission—HRI and Visual Light Communications of an Autonomous Underwater Vehicle for Intervention
Published 2025-01-01“…Our approach integrates a Human–Robot Interface (HRI) with a network congestion control algorithm at the application level for conservative transmission of images using the Robot Operating System (ROS) framework. The system was designed to avoid network congestion by adjusting the image compression parameters and the transmission rate depending on the real-time network conditions. …”
Get full text
Article -
99
Research on autonomous navigation of mobile robots based on IA-DWA algorithm
Published 2025-01-01“…Finally, the reliability of the improved algorithm is verified by conducting autonomous navigation experiments using a ROS (Robot Operating System) mobile robot as an experimental platform.…”
Get full text
Article -
100
Channel modeling and testing of wireless transmission for underground in-pipe leak and material loss detection
Published 2017-11-01“…This constitutes one of the timely and challenging issues of battery-operated systems. The purpose of this work is to characterize the radio transmission between underground buried pipes and base station using multi-layer media including both theoretical and experimental approaches by utilizing various modulation schemes. …”
Get full text
Article