MIROS: A Hybrid Real-Time Energy-Efficient Operating System for the Resource-Constrained Wireless Sensor Nodes [PDF]
Operating system (OS) technology is significant for the proliferation of the wireless sensor network (WSN). With an outstanding OS; the constrained WSN resources (processor; memory and energy) can be utilized efficiently.
Xing Liu+4 more
doaj +2 more sources
Memory and Energy Optimization Strategies for Multithreaded Operating System on the Resource-Constrained Wireless Sensor Node [PDF]
Memory and energy optimization strategies are essential for the resource-constrained wireless sensor network (WSN) nodes. In this article, a new memory-optimized and energy-optimized multithreaded WSN operating system (OS) LiveOS is designed and ...
Xing Liu+7 more
doaj +2 more sources
Evaluation and Refinement of an Explicit Virtual-Memory Primitive
The general-purpose virtual-memory subsystem of Linux does not scale to the multimillion IOP/s SSDs of today. Further, its implicit write-back and back-fill semantic hinders data-intensive applications, like databases, more than it actually helps.
Yannick Loeck, Christian Dietrich
doaj +1 more source
Cardiovascular disease is now one of the leading causes of morbidity and mortality. Electrocardiogram (ECG) is a reliable tool for monitoring the health of the cardiovascular system.
Taki Hasan Rafi, Young Woong Ko
doaj +1 more source
Assessment of the moderating effects of Nigerian market environment on the relationship between management success determinants and SMEs’ performance [PDF]
A reported eighty-five percentage failure rate of SMEs in Nigeria before five years of operation was ascribed to a lack of knowledge of the market environment.
Olalekan Asikhia, Vannie Naidoo
doaj +1 more source
Operation System Vulnerabilities Analysis Based on Code Clone Detection
Software vulnerability detection based on code clone detection technology is an important direction in the static analysis of software vulnerability. At present, the existing software vulnerability detection tools have deficie-ncies in the vulnerability ...
WANG Zhe, REN Yi, ZHOU Kai, GUAN Jianbo, TAN Yusong
doaj +1 more source
Unveiling the Landscape of Operating System Vulnerabilities
Operating systems play a crucial role in computer systems, serving as the fundamental infrastructure that supports a wide range of applications and services. However, they are also prime targets for malicious actors seeking to exploit vulnerabilities and
Manish Bhurtel, Danda B. Rawat
doaj +1 more source
A Framework for Detecting System Performance Anomalies Using Tracing Data Analysis
Advances in technology and computing power have led to the emergence of complex and large-scale software architectures in recent years. However, they are prone to performance anomalies due to various reasons, including software bugs, hardware failures ...
Iman Kohyarnejadfard+3 more
doaj +1 more source
Methods for Lowering the Power Consumption of OS-Based Adaptive Deep Brain Stimulation Controllers
The identification of a new generation of adaptive strategies for deep brain stimulation (DBS) will require the development of mixed hardware–software systems for testing and implementing such controllers clinically.
Roberto Rodriguez-Zurrunero+2 more
doaj +1 more source
A Technical Review on Development of an Advanced Electromechanical System
Development of an advanced electromechanical system requires a blend of technical expertise and knowledge, from electrical and mechanical engineering to software and system engineering.
Nazita Taghavi+2 more
doaj +1 more source