• Nenhum resultado encontrado

[PDF] Top 20 Using a Cluster for Securing Embedded Systems

Has 10000 "Using a Cluster for Securing Embedded Systems" found on our website. Below are the top 20 most common "Using a Cluster for Securing Embedded Systems".

Using a Cluster for Securing Embedded Systems

Using a Cluster for Securing Embedded Systems

... for securing embedded systems from viruses, worms, attacks, ...a cluster to allow tasks to be parallelly ...secure embedded systems by using a cluster of ... See full document

5

Parallelization Of Traveling Salesman Problem Using Rocks Cluster

Parallelization Of Traveling Salesman Problem Using Rocks Cluster

... It is known to the mathematical and computing community that TSP is a time consuming algorithm in getting to the shortest path for few to enormous vertices. The aims of this paper are to produce a parallel algorithm of ... See full document

4

ADAPTIVE CLUSTER SAMPLING USING AUXILIARY VARIABLE

ADAPTIVE CLUSTER SAMPLING USING AUXILIARY VARIABLE

... Sometimes other variables are related to the variable of interest y. We can obtain additional information for estimating the population mean. Use of an auxiliary variable is a common method to improve the precision of ... See full document

7

Performance Evaluation of Distributed Database on PC Cluster Computers using MySQL Cluster

Performance Evaluation of Distributed Database on PC Cluster Computers using MySQL Cluster

... We evaluated the system using Benchw benchmark tool. We had tested four of query types by increasing the number of storage nodes from two to eight nodes. The results represented that when we increased the number ... See full document

4

Human protein cluster analysis using amino acid frequencies.

Human protein cluster analysis using amino acid frequencies.

... hierarchical cluster protein analysis was performed using this table as input for Fastcluster R package ...called cluster, so that each subset contains similar objects, and the objects in separate ... See full document

5

A cluster method for finding node sets / sub-networks based on between- node similarity in sets of adjacency nodes: with application in finding sub-networks in tumor pathways

A cluster method for finding node sets / sub-networks based on between- node similarity in sets of adjacency nodes: with application in finding sub-networks in tumor pathways

... Both network and sub-network are relative concepts. A network is usually a sub-network of a macro-network, which forms a hierarchical structure of network. Finding node sets / sub-networks from a network is useful for ... See full document

11

A Cluster based Technique for Securing Routing Protocol AODV against Black-hole Attack in MANET

A Cluster based Technique for Securing Routing Protocol AODV against Black-hole Attack in MANET

... Authentication Using Threshold Cryptography in Mobile Ad Hoc Networks”International Journal of Computer Science and Security ISSN 1985-1553 volume :6;Issue:3;Start page:188;Date:2012 [4] ...Detection Using ... See full document

6

Application of Rhetorical Relations Between Sentences to Cluster-Based Text Summarization

Application of Rhetorical Relations Between Sentences to Cluster-Based Text Summarization

... theme cluster are considered more salient than the sentences in a trivial theme ...are Cluster-based Conditional Markov Random Walk Model (Cluster-based CMRW) and Cluster-based HITS Model ... See full document

20

Petri net based development of globally-asynchronous locally-synchronous distributed embedded systems

Petri net based development of globally-asynchronous locally-synchronous distributed embedded systems

... implementation using design-automation ...platforms using several types of communication networks, to obtain the desired requirements, namely performance, power consumption, EMI, and/or platform ...GALS-DES ... See full document

162

Internal Behavioral Modeling of Embedded Systems through State Box Structures

Internal Behavioral Modeling of Embedded Systems through State Box Structures

... Dr JKR Sastry is presently working as Professor of Computer Science and Engineering at K L University, Vaddeswaram and has 35 years of experience in the field of Information Technology. Has served the IT industry for 29 ... See full document

13

Model Based System Engineering Approach of a Lightweight Embedded TCP/IP

Model Based System Engineering Approach of a Lightweight Embedded TCP/IP

... Model based approach has been standard practice in electrical and mechanical design and other disciplines for many years. Mechanical engineering transitioned from the drawing board to increasingly more sophisticated ... See full document

17

Functional brain network modularity captures inter- and intra-individual variation in working memory capacity.

Functional brain network modularity captures inter- and intra-individual variation in working memory capacity.

... obtained using a sagittal magnetization-prepared rapid gradient echo (MP-RAGE) three-dimensional T1-weighted sequence (TR = ...obtained using a gradient-echo, echo-planar sequence sensitive to blood oxygen ... See full document

10

EMBEDDED WEB SERVER & GPRS BASED ADVANCED INDUSTRIAL AUTOMATION USING LINUX RTOS

EMBEDDED WEB SERVER & GPRS BASED ADVANCED INDUSTRIAL AUTOMATION USING LINUX RTOS

... of embedded ARM processor for single chip method to realize data acquisition and control (DACS) for Industrial ...the embedded web server mode requires less resource usage, high reliability, security, ... See full document

8

OPTIMIZING THE USE OF AN SPI FLASH PROM IN MICROBLAZE-BASED EMBEDDED SYSTEMS

OPTIMIZING THE USE OF AN SPI FLASH PROM IN MICROBLAZE-BASED EMBEDDED SYSTEMS

... incorporate Embedded Software Systems using a soft core ...by using one SPI (Serial Peripheral Interface) Flash PROM for FPGA configuration data, software code (Processor applications), and ... See full document

6

Secured UAV based on multi-agent systems and embedded Intrusion Detection and Prevention Systems

Secured UAV based on multi-agent systems and embedded Intrusion Detection and Prevention Systems

... While many work have been done to secure various kinds of wireless based communication like sensor networks (WSN) [6]-[7]-[15] and mobile ad-hoc networks [8], these models cannot be useful to secure usual UAVs. Modeling ... See full document

5

Bandwidth Enhancement of a U-Slot Patch Antenna Using Embedded HIS Structure

Bandwidth Enhancement of a U-Slot Patch Antenna Using Embedded HIS Structure

... This paper proposes a new generation of antenna that applies metamaterial as a base construction. With the use of dual band high impedance surface (HIS) structures, the bandwidth, return loss, and gain of U-slot patch ... See full document

4

Braz. J. Phys.  vol.29 número1

Braz. J. Phys. vol.29 número1

... The chemical bonding of metal porphyrins, por- phyrazines, and phthalocyanines is of importance in understanding biophysical and catalytic processes. The crystalline materials like copper phthalocyanine (CuPc) form ... See full document

16

Selection Of High Performing Geometry In Flexure Bearings For Linear Compressor Applications Using Fea.

Selection Of High Performing Geometry In Flexure Bearings For Linear Compressor Applications Using Fea.

... [2] Saurabh Malpani, Yogesh Yenarkar, Dr. Suhas Deshmukh, S P Tak, D.V. Bhope ―Design OF Flexure Bearing For Linear Compressor by Optimization Procedure Using FEA‖, International Journal of Engineering Science and ... See full document

4

Project-Based Learning and Agile Methodologies in Electronic Courses: Effect of Student Population and Open Issues

Project-Based Learning and Agile Methodologies in Electronic Courses: Effect of Student Population and Open Issues

... complex systems, the project is developed by a group of students, between 7 and ...complex systems and more manpower means more complexity in the project ... See full document

7

A framework for the development of parallel and distributed real-time embedded systems

A framework for the development of parallel and distributed real-time embedded systems

... Sorted multi-dimensional array containing the switch delays SDx when a message crosses a switch on the network Subset of jobs that participated to the WCRT of a thread θi, j,k , includin[r] ... See full document

180

Show all 10000 documents...