Results 1 to 10 of about 34,460 (180)

A single-stage dual-source inverter using low-power components and microcomputers [PDF]

open access: yesScientific Reports
This paper is an attempt to provide a dual-source inverter, an intelligent inverter topology that links two isolated DC sources to a single three-phase output through single-stage conversion.
Majid Ghani Varzaneh   +4 more
doaj   +2 more sources

A novel cache based on dynamic mapping against speculative execution attacks [PDF]

open access: yesMATEC Web of Conferences, 2022
The Spectre attacks exploit the speculative execution vulnerabilities to exfiltrate private information by building a leakage channel. Creation of a leakage channel is the basic element for spectre attacks, among which the cache-tag side channel is ...
Wu Dehua   +3 more
doaj   +1 more source

Microcomputers

open access: yesPublic Library Quarterly, 1984
The current infusion of microcomputer technology into the schools has major implications for the training of special education personnel. Teachers must be adequately prepared to use microcomputers in the classroom, if the potential benefits of the new technology are to be realized.
Scott K. McCann, Eve J. Kelemen
  +5 more sources

Publisher Correction: A single-stage dual-source inverter using low-power components and microcomputers [PDF]

open access: yesScientific Reports
Majid Ghani Varzaneh   +4 more
doaj   +2 more sources

Simulation of mixed bond graphs and block diagrams on personal computers using TUTSIM [PDF]

open access: yes, 1985
The TUTSIM simulation program for continuous dynamic systems accepts (nonlinear) block diagrams, bond graphs or a free mix of both. The simulation is “hands on” interactive, providing a direct contact with the model.
Beukeboom, J.J.A.J.   +2 more
core   +10 more sources

A Personal Microcomputer as an Access Control Management Platform in Road Transport

open access: yesApplied Sciences, 2023
For many years, the use of new computer systems to control various elements of everyday human life has been observed. Separate systems manage access control; others are used to control blinds and roller shutters; and others manage systems in the garden ...
Przemysław Wójcik, Tomasz Neumann
doaj   +1 more source

Verification of serialising instructions for security against transient execution attacks

open access: yesIET Computers & Digital Techniques, 2023
Transient execution attacks such as Spectre and Meltdown exploit speculative execution in modern microprocessors to leak information via cache side‐channels.
Kushal K. Ponugoti   +2 more
doaj   +1 more source

Microcomputers

open access: yesInterfaces, 1983
The precise number of microcomputers marketed and sold to date is unknown. However, since their advent in the mid 1970's, the combined annual sales by all manufacturers is nearing or exceeds one million units. Without question, microcomputers have been widely accepted in a startlingly short period of time because of their low unit cost, low for both ...
J. J. Brennan, Michael K. Molloy
openaire   +2 more sources

25 anos de quimiometria no Brasil

open access: yesQuímica Nova, 2006
Chemometric activities in Brazil are described according to three phases: before the existence of microcomputers in the 1970s, through the initial stages of microcomputer use in the 1980s and during the years of extensive microcomputer applications of ...
Benício de Barros Neto   +2 more
doaj   +1 more source

Two perspectives on the language of special needs computing: towards a shared view [PDF]

open access: yes, 1998
This paper reviews and examines the language used in literature that describes the educational and therapeutic use of microcomputers with people who have special needs. In the language of special needs computing two perspectives are identified.
Seale, Jane K.
core   +1 more source

Home - About - Disclaimer - Privacy