Results 1 to 10 of about 34,460 (180)
A single-stage dual-source inverter using low-power components and microcomputers [PDF]
This paper is an attempt to provide a dual-source inverter, an intelligent inverter topology that links two isolated DC sources to a single three-phase output through single-stage conversion.
Majid Ghani Varzaneh +4 more
doaj +2 more sources
A novel cache based on dynamic mapping against speculative execution attacks [PDF]
The Spectre attacks exploit the speculative execution vulnerabilities to exfiltrate private information by building a leakage channel. Creation of a leakage channel is the basic element for spectre attacks, among which the cache-tag side channel is ...
Wu Dehua +3 more
doaj +1 more source
The current infusion of microcomputer technology into the schools has major implications for the training of special education personnel. Teachers must be adequately prepared to use microcomputers in the classroom, if the potential benefits of the new technology are to be realized.
Scott K. McCann, Eve J. Kelemen
+5 more sources
Publisher Correction: A single-stage dual-source inverter using low-power components and microcomputers [PDF]
Majid Ghani Varzaneh +4 more
doaj +2 more sources
Simulation of mixed bond graphs and block diagrams on personal computers using TUTSIM [PDF]
The TUTSIM simulation program for continuous dynamic systems accepts (nonlinear) block diagrams, bond graphs or a free mix of both. The simulation is “hands on” interactive, providing a direct contact with the model.
Beukeboom, J.J.A.J. +2 more
core +10 more sources
A Personal Microcomputer as an Access Control Management Platform in Road Transport
For many years, the use of new computer systems to control various elements of everyday human life has been observed. Separate systems manage access control; others are used to control blinds and roller shutters; and others manage systems in the garden ...
Przemysław Wójcik, Tomasz Neumann
doaj +1 more source
Verification of serialising instructions for security against transient execution attacks
Transient execution attacks such as Spectre and Meltdown exploit speculative execution in modern microprocessors to leak information via cache side‐channels.
Kushal K. Ponugoti +2 more
doaj +1 more source
The precise number of microcomputers marketed and sold to date is unknown. However, since their advent in the mid 1970's, the combined annual sales by all manufacturers is nearing or exceeds one million units. Without question, microcomputers have been widely accepted in a startlingly short period of time because of their low unit cost, low for both ...
J. J. Brennan, Michael K. Molloy
openaire +2 more sources
25 anos de quimiometria no Brasil
Chemometric activities in Brazil are described according to three phases: before the existence of microcomputers in the 1970s, through the initial stages of microcomputer use in the 1980s and during the years of extensive microcomputer applications of ...
Benício de Barros Neto +2 more
doaj +1 more source
Two perspectives on the language of special needs computing: towards a shared view [PDF]
This paper reviews and examines the language used in literature that describes the educational and therapeutic use of microcomputers with people who have special needs. In the language of special needs computing two perspectives are identified.
Seale, Jane K.
core +1 more source

