Showing 121 - 140 results of 141 for search '"operating systems"', query time: 0.07s Refine Results
  1. 121

    Formal Verification Method for Configuration of Integrated Modular Avionics System Using MARTE by Lisong Wang, Miaofang Chen, Jun Hu

    Published 2018-01-01
    “…The configuration information of Integrated Modular Avionics (IMA) system includes almost all details of whole system architecture, which is used to configure the hardware interfaces, operating system, and interactions among applications to make an IMA system work correctly and reliably. …”
    Get full text
    Article
  2. 122

    Designing and implementing a Web-based real time routing service for crisis management (a case study for district 11 of Tehran) by javad sadidi, seyed hassan hosseini sajedi

    Published 2019-06-01
    “…Open source languages, format, libraries and software such as HTML, CSS, AJAX, GeoJSON, PHP, OpenLayer, PostGIS were also used to design the service and applying online weightings, blocking each piece of routes and re-routing procedure without blocked traffics, implementation of server-side processing and reducing the volume of the client-side’s operations, being under the browser’s surveillance, no need to install any software and the ability to use it on any operating system can be named. According to the obtained results, the path’s length and traffic’s volume variables have the most important role in target function formation (travel cost) therefore the specific path will be selected as the optimal path, with the minimized distance between the destination and the traffic volume. …”
    Get full text
    Article
  3. 123

    Semi-Supervised Machine Learning for Fault Detection and Diagnosis of a Rooftop Unit by Mohammed G. Albayati, Jalal Faraj, Amy Thompson, Prathamesh Patil, Ravi Gorthala, Sanguthevar Rajasekaran

    Published 2023-06-01
    “…In this paper, supervised and semi-supervised machine learning (ML) approaches are applied to datasets collected from an operating system in the field to develop new FDD methods and to help building owners see the value proposition of performing proactive maintenance. …”
    Get full text
    Article
  4. 124

    Aspects of Improvement in Exploitation Process of Passenger Means of Transport by Marian Brzeziński, Magdalena Kijek, Paulina Owczarek, Katarzyna Głodowska, Jarosław Zelkowski, Piotr Bartosiak

    Published 2018-01-01
    “…The applied methods, techniques, and research tools are rarely used in the field of testing of vehicle operation systems. The work has a very practical character and built models can be used in other urban agglomerations in order to improve the operation of passenger transport means.…”
    Get full text
    Article
  5. 125

    An FPGA-Based Omnidirectional Vision Sensor for Motion Detection on Mobile Robots by Jones Y. Mori, Janier Arias-Garcia, Camilo Sánchez-Ferreira, Daniel M. Muñoz, Carlos H. Llanos, J. M. S. T. Motta

    Published 2012-01-01
    “…Synthesis results show that the system can achieve a throughput of 26.6 processed frames per second and the performance analysis pointed out that the overall architecture achieves a speedup factor of 13.78 in comparison with a PC-based solution running on the real-time operating system xPC Target.…”
    Get full text
    Article
  6. 126

    Enhancing Software Distribution and Collaboration in Manufacturing: Developing the IMOS Platform by Antonio Monte Pegado, Andre Dionisio Rocha, Jose Barata

    Published 2025-01-01
    “…The Industry Modular Operating System (IMOS) is presented as a platform supporting software accessibility, execution, and integration, while encouraging partnerships between software developers and industrial site managers. …”
    Get full text
    Article
  7. 127

    Framework to analyze and exploit the smart home IoT firmware by Keshav Kaushik, Akashdeep Bhardwaj, Susheela Dahiya

    Published 2025-02-01
    “…Despite this, the security of the devices is not receiving any more attention. Since operating system (OS) and hardware security have improved recently, researchers and hackers now seek vulnerabilities in other areas, such as firmware. …”
    Get full text
    Article
  8. 128
  9. 129

    تطبیقات الهواتف الذکیة والخصوصیة المعلوماتیة : دراسة تحلیلیة مقارنة by د. حسام الدین محمد رفعت

    Published 2020-09-01
    “…Thestudy focused mainly on Android operating system as it was highly spreadcompared to other systems. …”
    Get full text
    Article
  10. 130

    Enhancing Buck-Boost Converter Efficiency and Dynamic Responses with Sliding Mode Control Technique by Salah Hilo Mohammed Al-Attwani, Mustafa Teke, Ethar Sulaiman Yaseen Yaseen, Enes Bektaş, Nurettin Gökşenli

    Published 2024-06-01
    “…This is crucial in power delivery and portable systems, especially in battery-operated systems. The purpose of the paper is to investigate how the efficiency of Buck-Boost converters improves by using sliding mode control when operating under different conditions. …”
    Get full text
    Article
  11. 131

    Reduced graphene oxide anchored MnCo2S4 for solid state asymmetric capacitor device by Yuttana Mona, Uma Shankar Veerasamy, Vigneshwaran Baskaran, Nakorn Tippayawong, Phrut Sakulchangsatjatai, Niti Kammuang-lue, Pana Suttakul, Ramnarong Wanison

    Published 2025-03-01
    “…The electrochemical evaluation was verified through a three-electrode operating system, it shows the MnCo2S4 and rGO@MnCo2S4 electrodes have 42.72 mAh g-1 and 82.57 mAh g-1 capacity values. …”
    Get full text
    Article
  12. 132

    Smartphone-Based Automated Non-Destructive Testing Devices by V. F. Petryk, A. G. Protasov, R. M. Galagan, A. V. Muraviov, I. I. Lysenko

    Published 2020-12-01
    “…To ensure the operation of the smartphone in the ultrasonic flaw detector mode, the smartphone has software installed that runs in the Android operating system and implements the proposed algorithm of the device, and can serve as a repeater for processing data over a considerable distance (up to hundreds and thousands of kilometers) if it necessary.The experimental data comparative analysis of the developed device with the Einstein-II flaw detector from Modsonic (India) and the TS-2028H+ flaw detector from Tru-Test (New Zealand) showed that the proposed device is not inferior to them in terms of such characteristics as the range of measured thicknesses, the relative error in determining the depth defect and the object thickness. …”
    Get full text
    Article
  13. 133

    Leveraging Cognitive Machine Reasoning and NLP for Automated Intent-Based Networking and e2e Service Orchestration by Muhammad Asif, Talha Ahmed Khan, Wang-Cheol Song

    Published 2025-01-01
    “…A simulated testbed was created to assess the system’s performance using Containernet, a lightweight Container-Based Network Emulator, and Open Networking Operating System (ONOS) Software Defined Networking (SDN) controllers. …”
    Get full text
    Article
  14. 134

    Network Intrusion Detection and Prevention System Using Hybrid Machine Learning with Supervised Ensemble Stacking Model by Godfrey A. Mills, Daniel K. Acquah, Robert A. Sowah

    Published 2024-01-01
    “…Implementing the detection framework as a Java solution makes it possible to deploy it across various operating system platforms without any impact on the detection performance.…”
    Get full text
    Article
  15. 135

    Transformer-based malware detection using process resource utilization metrics by Dimosthenis Natsos, Andreas L. Symeonidis

    Published 2025-03-01
    “…Additionally, we showcase that other tenant processes within the operating system act as indirect indicators of malware presence, providing valuable signals for detection even when the malware process itself is not directly observed. …”
    Get full text
    Article
  16. 136

    Pengaruh Gaya Kepemimpinan Situasional, Motivasi dan Kompensasi Terhadap Produktivitas Kerja Karyawan by Yuni Pratikno, Bambang Nurakhim, Eric Hermawan, Maulana Arief Rachman Hakim

    Published 2024-09-01
    “…Background: The competition in the business world is so tight, but the development of manufacturing companies that are increasingly showing that the positive trend is related to the role of leaders who are figures who regulate the company's operational system. HR work productivity will increase through the implementation of the impact program of leadership style, appropriate compensation. …”
    Get full text
    Article
  17. 137

    Desain Penilaian Risiko Privasi pada Aplikasi Seluler Melalui Model Machine Learning Berbasis Ensemble Learning dan Multiple Application Attributes by R. Ahmad Imanullah Zakariya, Kalamullah Ramli

    Published 2023-08-01
    “…Abstract Since the Android operating system is open-source, many Android-based applications are developed and freely available in app stores. …”
    Get full text
    Article
  18. 138

    FABLDroid: Malware detection based on hybrid analysis with factor analysis and broad learning methods for android applications by Kazım Kılıç, İsmail Atacak, İbrahim Alper Doğru

    Published 2025-02-01
    “…The Android operating system, which is popular on mobile devices, creates concerns for users due to the malware it is exposed to. …”
    Get full text
    Article
  19. 139

    Mobile Toolbox sequences task: development and validation of a remote, smartphone-based working memory test by Jerry Slotkin, Aaron J. Kaat, Stephanie Ruth Young, Elizabeth M. Dworak, Miriam A. Novack, Yusuke Shono, Hubert Adam, Cindy J. Nowinski, Sarah Pila, Zahra Hosseinian, Maria Varela Diaz, Anyelo Almonte-Correa, Keith Alperin, Monica R. Camacho, Monica R. Camacho, Bernard Landavazo, Bernard Landavazo, Rachel L. Nosheny, Rachel L. Nosheny, Michael W. Weiner, Michael W. Weiner, Richard C. Gershon

    Published 2025-01-01
    “…When controlling for age, phone operating system (iOS vs. Android) and sex assigned at birth did not significantly impact performance; however, there was a significant difference between individuals who completed college and those with a high school education or lower.ConclusionThe results support the validity of Sequences as a measure of working memory for remote self-administered use. …”
    Get full text
    Article
  20. 140

    Evaluation of Performance Metrics Required in Proper Selection of SDN Controller for Integrated Satellite-Terrestrial Networks by Oluwatobi A. Ayofe, Mu'azu J. Musa, Zanna M. Abdullahir, Abdoulie M.S. Tekanyi, Aliyu D. Usman, Ezekiel E. Agbon, Emmanuel A. Otsapa, Agburu O. Adikpe, Matthew Iyobhebhe, Paul Thomas Muge

    Published 2024-09-01
    “…Five SDN controllers were subjected to evaluation and they are Open Network Operating System (ONOS), Opendaylight (ODL), Floodlight (FL), Ryu, and Pox. …”
    Get full text
    Article