Results 21 to 30 of about 34,559 (279)

virus Detection Using Cryptography Algorithm

open access: yesIraqi Journal for Computers and Informatics, 1996
Many papers have been published about manipulating computer viruses; instructions that impact a computer system and after a period of incubation and reproducion, activate and demonstrate their presence.
ALI AL-HANANI, VENUS W. SAMAWI
doaj   +1 more source

Client-server system for monitoring the quality of TV broadcasting in Russia

open access: yesФизика волновых процессов и радиотехнические системы, 2022
The distributed client-server system of broadcast quality monitoring in RF proposed in the paper uses the necessary equipment, including BER bit error sensors based on programmable receivers combined with single-board microcomputers implemented on SoC ...
Vladimir L. Karyakin
doaj   +1 more source

Bugaboo: A Spanish case of circulation and co-production of video games

open access: yesCogent Arts & Humanities, 2016
Melanie Swalwell has discussed how “locality has largely been left out of game history, at least until recently”. Moreover, much of the research and literature about the still young history of video games has been conducted following a cult of celebrity ...
Ignasi Meda-Calvet
doaj   +1 more source

Design and implementation of adaptive inverse control algorithm for a micro-hand control system

open access: yesThe Journal of Engineering, 2014
The Letter proposes an online tuned adaptive inverse position control algorithm for a micro-hand. First, the configuration of the micro-hand is discussed.
Wan-Cheng Wang   +3 more
doaj   +1 more source

The Use of Microcomputers for Demographic Analysis: An Overview of Options for the Novice User

open access: yesIASSIST Quarterly, 1989
The Use of Microcomputers for Demographic Analysis: An Overview of Options for the Novice ...
Diane Crispell
doaj   +1 more source

Realization of the digital to analog converter for model of the voltage in network [PDF]

open access: yesНаучно-технический вестник Брянского государственного университета, 2016
The article discusses the disadvantages of digital measuring instruments. Formulated the task of modeling the measuring device for different waveforms and measurements with the use of microcomputers.
Goncharova O.A.
doaj   +1 more source

“Can Our Kids Hack It With Computers?”: Constructing Youth Hackers in Family Computing Magazines (1983–1987)

open access: yesInternational Journal of Communication, 2014
Building upon existing scholarship on media representation of hackers and the social history of personal computing, this essay positions U.S. families making sense of microcomputers in the mid-1980s as central to the history of hacking.
Meryl Alper
doaj   +2 more sources

Microcomputers in the School Media Center

open access: yesCanadian Journal of Learning and Technology, 1985
None
Leonard Proctor
doaj   +1 more source

The Microcomputer Catalyst [PDF]

open access: yes, 1981
Microcomputer it is a word many of us first heard only a couple of years ago. Yet the technology this word represents holds promise of tremendous change. The changes catalyzed by microcomputing and its associated technologies may alter the fundamental
Fosdick, Howard
core  

The role and implications of mammalian cellular circadian entrainment

open access: yesFEBS Letters, EarlyView.
At their most fundamental level, mammalian circadian rhythms occur inside every individual cell. To tell the correct time, cells must align (or ‘entrain’) their circadian rhythm to the external environment. In this review, we highlight how cells entrain to the major circadian cues of light, feeding and temperature, and the implications this has for our
Priya Crosby
wiley   +1 more source

Home - About - Disclaimer - Privacy