Results 21 to 30 of about 34,559 (279)
virus Detection Using Cryptography Algorithm
Many papers have been published about manipulating computer viruses; instructions that impact a computer system and after a period of incubation and reproducion, activate and demonstrate their presence.
ALI AL-HANANI, VENUS W. SAMAWI
doaj +1 more source
Client-server system for monitoring the quality of TV broadcasting in Russia
The distributed client-server system of broadcast quality monitoring in RF proposed in the paper uses the necessary equipment, including BER bit error sensors based on programmable receivers combined with single-board microcomputers implemented on SoC ...
Vladimir L. Karyakin
doaj +1 more source
Bugaboo: A Spanish case of circulation and co-production of video games
Melanie Swalwell has discussed how “locality has largely been left out of game history, at least until recently”. Moreover, much of the research and literature about the still young history of video games has been conducted following a cult of celebrity ...
Ignasi Meda-Calvet
doaj +1 more source
Design and implementation of adaptive inverse control algorithm for a micro-hand control system
The Letter proposes an online tuned adaptive inverse position control algorithm for a micro-hand. First, the configuration of the micro-hand is discussed.
Wan-Cheng Wang +3 more
doaj +1 more source
The Use of Microcomputers for Demographic Analysis: An Overview of Options for the Novice User
The Use of Microcomputers for Demographic Analysis: An Overview of Options for the Novice ...
Diane Crispell
doaj +1 more source
Realization of the digital to analog converter for model of the voltage in network [PDF]
The article discusses the disadvantages of digital measuring instruments. Formulated the task of modeling the measuring device for different waveforms and measurements with the use of microcomputers.
Goncharova O.A.
doaj +1 more source
Building upon existing scholarship on media representation of hackers and the social history of personal computing, this essay positions U.S. families making sense of microcomputers in the mid-1980s as central to the history of hacking.
Meryl Alper
doaj +2 more sources
Microcomputers in the School Media Center
None
Leonard Proctor
doaj +1 more source
The Microcomputer Catalyst [PDF]
Microcomputer it is a word many of us first heard only a couple of years ago. Yet the technology this word represents holds promise of tremendous change. The changes catalyzed by microcomputing and its associated technologies may alter the fundamental
Fosdick, Howard
core
The role and implications of mammalian cellular circadian entrainment
At their most fundamental level, mammalian circadian rhythms occur inside every individual cell. To tell the correct time, cells must align (or ‘entrain’) their circadian rhythm to the external environment. In this review, we highlight how cells entrain to the major circadian cues of light, feeding and temperature, and the implications this has for our
Priya Crosby
wiley +1 more source

