Results 1 to 10 of about 366,295 (267)

Minimalist's Linux Cluster [PDF]

open access: yesNuclear Physics B - Proceedings Supplements, 2003
Using barebone PC components and NIC's, we construct a linux cluster which has 2-dimensional mesh structure. This cluster has smaller footprint, is less expensive, and use less power compared to conventional linux cluster.
Chang-Yeong Choi   +3 more
core   +2 more sources

MaxQuant goes Linux [PDF]

open access: yesNature Methods, 2018
Pavel Sinitcyn   +2 more
exaly   +5 more sources

Gentoo Prefix as a Physics Software Manager [PDF]

open access: yesEPJ Web of Conferences, 2020
Gentoo Prefix is explored to manage sophisticated physics software stacks. It will be shown that Gentoo Prefix is an advantageous package management solution for big physics experiments, for its reusability on heterogeneous host environments, its vast ...
Xu Benda   +3 more
doaj   +1 more source

COMPARISON OF BEAMFORMING ALGORITHMS FOR MICROPHONE ARRAYS IN MATLAB [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2020
Subject of Research. The paper considers the main quantitative characteristics of microphone arrays in their performance analysis and beamforming algorithms applied for their study. Methods.
Anton A. Glukhov
doaj   +1 more source

Predictive Analysis of Mental Health Conditions Using AdaBoost Algorithm

open access: yesParadigmPlus, 2022
The presented research responds to increased mental illness conditions worldwide and the need for efficient mental health care (MHC) through machine learning (ML) implementations. The datasets employed in this investigation belong to a Kaggle repository
Elizabeth Oluyemisi Ogunseye   +4 more
doaj   +1 more source

СТВОРЕННЯ СИСТЕМИ ЗАПОБІГАННЯ ПОШИРЕННЯ ВІРУСІВ ВИМАГАЧІВ ЗА ДОПОМОГОЮ МОВИ ПРОГРАМУВАННЯ PYTHON ТА УТИЛІТИ AUDITD НА БАЗІ ОПЕРАЦІЙНОЇ СИСТЕМИ LINUX

open access: yesКібербезпека: освіта, наука, техніка, 2021
Орієнтований на дані період створює все більше проблем, пов’язаних із безпекою, з якими навіть експерти навряд чи можуть впоратися. Однією з найскладніших загроз є віруси-вимагачі/віруси-шифрувальники, яких дуже важко виявити і ще важче вчасно ...
Danyil Zhuravchak
doaj   +1 more source

Evaluation of a Long-Distance IEEE 802.11ah Wireless Technology in Linux Using Docker Containers

open access: yesElektronika ir Elektrotechnika, 2022
Wireless technologies are essential for modern people to maintain uninterrupted connection to the Internet. The most popular standards for wireless technologies are standards of the IEEE 802.11 family. Currently, data transmission rate achievable by IEEE
Daniils Aleksandrovs-Moisejs   +3 more
doaj   +1 more source

Development and Implementation of an OpenSource IoT Platform, Network and Data Warehouse for Privacy-Compliant Applications in Research and Industry

open access: yesCurrent Directions in Biomedical Engineering, 2021
In the scientific field, data acquisition using commercial or self-developed sensors is a necessity for many research activities. Data security and data privacy are important requirements in all types of IoT applications, especially in the medical ...
Stadler Sebastian   +3 more
doaj   +1 more source

Unikernels: the next stage of Linux’s dominance [PDF]

open access: yes, 2019
Unikernels have demonstrated enormous advantages over Linux in many important domains, causing some to propose that the days of Linux's dominance may be coming to an end.
Appavoo, Jonathan   +8 more
core   +1 more source

Home - About - Disclaimer - Privacy