Results 11 to 20 of about 27,924,758 (382)

Implementasi Metode National Institute of Justice (NIJ) Pada Fitur TRIM SOLID STATE DRIVE (SSD) Dengan Objek Eksperimental Sistem Operasi Windows, Linux dan Macintosh

open access: yesIT Journal Research and Development, 2020
Solid State Drive (SSD) merupakan solusi terkni untuk mempercepat pemrosesan data dari berbagai komputer desktop yang bersifat multiplatform. Fitur TRIM yang ada pada SSD berguna untuk menghilangkan garbage data yang dihapus permanen oleh user, dimana ...
Rizdqi Akbar Ramadhan, Desti Mualfah
doaj   +1 more source

SMS-Phishing on Android Smart Phone [PDF]

open access: yesمجلة التربية والعلم, 2018
Recently, mobile become the most significant device that used almost daily, and one of the most important service that offered by mobile operators is the SMS that used between mobiles, none of the mobile OS is contain a service that encrypt the send SMS ...
MAHMOD S. MAHMOD
doaj   +1 more source

Resource and Process Management With a Decision Model Based on Fuzzy Logic

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2023
The allocation of the resources to be shared in the context of a distributed processing system needs to be coordinated through the mutual exclusion mechanism, which will decide the order in which the shared resources will be allocated to those processes ...
J. T. Fornerón Martínez   +2 more
doaj   +1 more source

Algorithmization for calculating the security assessment of AIS operating systems of internal affairs bodies, developed on the basis of an analysis of security requirements GOST R ISO/IEC 15408 and possible threats

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2023
Objective. The article provides a generalized algorithmization of the processes necessary for developing software for assessing the security of operating systems of automated information systems of internal affairs bodies of the Russian Federation.Method.
A. I. Yangirov   +3 more
doaj   +1 more source

Assessment of the moderating effects of Nigerian market environment on the relationship between management success determinants and SMEs’ performance [PDF]

open access: yesProblems and Perspectives in Management, 2020
A reported eighty-five percentage failure rate of SMEs in Nigeria before five years of operation was ascribed to a lack of knowledge of the market environment.
Olalekan Asikhia, Vannie Naidoo
doaj   +1 more source

A Comprehensive Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems [PDF]

open access: yes, 2007
The capabilities of a sensor network are strongly influenced by the operating system used on the sensor nodes. In general, two different sensor network operating system types are currently considered: event driven and multi-threaded.
Duffy, Cormac   +3 more
core   +6 more sources

Operation System Vulnerabilities Analysis Based on Code Clone Detection

open access: yesJisuanji kexue yu tansuo, 2021
Software vulnerability detection based on code clone detection technology is an important direction in the static analysis of software vulnerability. At present, the existing software vulnerability detection tools have deficie-ncies in the vulnerability ...
WANG Zhe, REN Yi, ZHOU Kai, GUAN Jianbo, TAN Yusong
doaj   +1 more source

Secure deployment strategy of virtual machines based on operating system diversity

open access: yes网络与信息安全学报, 2017
The resource-sharing model for cloud computing raises many security issues,such as co-resident of virtual machines,while greatly improving resource utilization.In particular,when a user adopts a single operating system,an attacker can steal privacy and ...
Miao ZHANG,Xin-sheng JI,Jian-jian AI,Wen-yan LIU,Hong-chao HU,Shu-min HUO
doaj   +3 more sources

You and I are Past Our Dancing Days [PDF]

open access: yes, 1994
Operating systems have grown in size and functionality. Today's many flavours of Unix provide a multi-user environment with protection, address spaces, and attempts to allocate resources fairly to users competing for them, They provide processes and ...
Mullender, Sape J.
core   +3 more sources

Distributed operating systems [PDF]

open access: yesComputer Standards & Interfaces, 1987
In the past five years, distributed operating systems research has gone through a consolidation phase. On a large number of design issues there is now considerable consensus between different research groups. In this paper, an overview of recent research in distributed systems is given.
openaire   +4 more sources

Home - About - Disclaimer - Privacy