Results 1 to 10 of about 447,234 (333)

Aspects of the ARTCP implementation for the Linux kernel 2.6

open access: greenМоделирование и анализ информационных систем, 2010
The article secifies the ARTCP header format and describes the algorithm of the ARTCP connection establishment. Some aspects of TCP and ARTCP interaction are discussed. Presented a work plan to implement the ARTCP in Linux.
I. V. Alexeev   +2 more
doaj   +2 more sources

Gentoo Prefix as a Physics Software Manager [PDF]

open access: yesEPJ Web of Conferences, 2020
Gentoo Prefix is explored to manage sophisticated physics software stacks. It will be shown that Gentoo Prefix is an advantageous package management solution for big physics experiments, for its reusability on heterogeneous host environments, its vast ...
Xu Benda   +3 more
doaj   +1 more source

COMPARISON OF BEAMFORMING ALGORITHMS FOR MICROPHONE ARRAYS IN MATLAB [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2020
Subject of Research. The paper considers the main quantitative characteristics of microphone arrays in their performance analysis and beamforming algorithms applied for their study. Methods.
Anton A. Glukhov
doaj   +1 more source

Predictive Analysis of Mental Health Conditions Using AdaBoost Algorithm

open access: yesParadigmPlus, 2022
The presented research responds to increased mental illness conditions worldwide and the need for efficient mental health care (MHC) through machine learning (ML) implementations. The datasets employed in this investigation belong to a Kaggle repository
Elizabeth Oluyemisi Ogunseye   +4 more
doaj   +1 more source

СТВОРЕННЯ СИСТЕМИ ЗАПОБІГАННЯ ПОШИРЕННЯ ВІРУСІВ ВИМАГАЧІВ ЗА ДОПОМОГОЮ МОВИ ПРОГРАМУВАННЯ PYTHON ТА УТИЛІТИ AUDITD НА БАЗІ ОПЕРАЦІЙНОЇ СИСТЕМИ LINUX

open access: yesКібербезпека: освіта, наука, техніка, 2021
Орієнтований на дані період створює все більше проблем, пов’язаних із безпекою, з якими навіть експерти навряд чи можуть впоратися. Однією з найскладніших загроз є віруси-вимагачі/віруси-шифрувальники, яких дуже важко виявити і ще важче вчасно ...
Danyil Zhuravchak
doaj   +1 more source

Evaluation of a Long-Distance IEEE 802.11ah Wireless Technology in Linux Using Docker Containers

open access: yesElektronika ir Elektrotechnika, 2022
Wireless technologies are essential for modern people to maintain uninterrupted connection to the Internet. The most popular standards for wireless technologies are standards of the IEEE 802.11 family. Currently, data transmission rate achievable by IEEE
Daniils Aleksandrovs-Moisejs   +3 more
doaj   +1 more source

Development and Implementation of an OpenSource IoT Platform, Network and Data Warehouse for Privacy-Compliant Applications in Research and Industry

open access: yesCurrent Directions in Biomedical Engineering, 2021
In the scientific field, data acquisition using commercial or self-developed sensors is a necessity for many research activities. Data security and data privacy are important requirements in all types of IoT applications, especially in the medical ...
Stadler Sebastian   +3 more
doaj   +1 more source

Design and Implementation of a Voice Broadcasting System from a PC to Mobile Devices [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2013
Mobile technology is rapidly developed, this developing leads the production of the multimedia smartphone that supports wireless LAN (WLAN) that are widely deployed because of its ease of use, flexibility, sharing application and support for multimedia ...
Omar Ibrahim, Omar AL-Saffar
doaj   +1 more source

Kernel Code Integrity Protection at the Physical Address Level on RISC-V

open access: yesIEEE Access, 2023
An operating system kernel has the highest privilege in most computer systems, making its code integrity critical to the entire system’s security.
Seon Ha   +3 more
doaj   +1 more source

La explosión de un paradigma

open access: yesVivat Academia, 2003
La historia de la informática, y más en concreto la doméstica, ha tenido un avance espectacular en muy pocos años. Un tiempo en el que hemos pasado de mostruosos ordenadores que nacieron para ejecutar juegos en un principio, de precio astronómico y ...
Jesús Delgado Delgado
doaj   +1 more source

Home - About - Disclaimer - Privacy