Results 1 to 10 of about 447,234 (333)
Aspects of the ARTCP implementation for the Linux kernel 2.6
The article secifies the ARTCP header format and describes the algorithm of the ARTCP connection establishment. Some aspects of TCP and ARTCP interaction are discussed. Presented a work plan to implement the ARTCP in Linux.
I. V. Alexeev +2 more
doaj +2 more sources
Gentoo Prefix as a Physics Software Manager [PDF]
Gentoo Prefix is explored to manage sophisticated physics software stacks. It will be shown that Gentoo Prefix is an advantageous package management solution for big physics experiments, for its reusability on heterogeneous host environments, its vast ...
Xu Benda +3 more
doaj +1 more source
COMPARISON OF BEAMFORMING ALGORITHMS FOR MICROPHONE ARRAYS IN MATLAB [PDF]
Subject of Research. The paper considers the main quantitative characteristics of microphone arrays in their performance analysis and beamforming algorithms applied for their study. Methods.
Anton A. Glukhov
doaj +1 more source
Predictive Analysis of Mental Health Conditions Using AdaBoost Algorithm
The presented research responds to increased mental illness conditions worldwide and the need for efficient mental health care (MHC) through machine learning (ML) implementations. The datasets employed in this investigation belong to a Kaggle repository
Elizabeth Oluyemisi Ogunseye +4 more
doaj +1 more source
Орієнтований на дані період створює все більше проблем, пов’язаних із безпекою, з якими навіть експерти навряд чи можуть впоратися. Однією з найскладніших загроз є віруси-вимагачі/віруси-шифрувальники, яких дуже важко виявити і ще важче вчасно ...
Danyil Zhuravchak
doaj +1 more source
Evaluation of a Long-Distance IEEE 802.11ah Wireless Technology in Linux Using Docker Containers
Wireless technologies are essential for modern people to maintain uninterrupted connection to the Internet. The most popular standards for wireless technologies are standards of the IEEE 802.11 family. Currently, data transmission rate achievable by IEEE
Daniils Aleksandrovs-Moisejs +3 more
doaj +1 more source
In the scientific field, data acquisition using commercial or self-developed sensors is a necessity for many research activities. Data security and data privacy are important requirements in all types of IoT applications, especially in the medical ...
Stadler Sebastian +3 more
doaj +1 more source
Design and Implementation of a Voice Broadcasting System from a PC to Mobile Devices [PDF]
Mobile technology is rapidly developed, this developing leads the production of the multimedia smartphone that supports wireless LAN (WLAN) that are widely deployed because of its ease of use, flexibility, sharing application and support for multimedia ...
Omar Ibrahim, Omar AL-Saffar
doaj +1 more source
Kernel Code Integrity Protection at the Physical Address Level on RISC-V
An operating system kernel has the highest privilege in most computer systems, making its code integrity critical to the entire system’s security.
Seon Ha +3 more
doaj +1 more source
La historia de la informática, y más en concreto la doméstica, ha tenido un avance espectacular en muy pocos años. Un tiempo en el que hemos pasado de mostruosos ordenadores que nacieron para ejecutar juegos en un principio, de precio astronómico y ...
Jesús Delgado Delgado
doaj +1 more source

