Showing 1,481 - 1,500 results of 1,752 for search '"operating systems"', query time: 0.12s Refine Results
  1. 1481

    Kepuasan pelanggan terhadap kualiti perkhidmatan kaunter: kajian perbandingan di jabatan imigresen dan jabatan pendaftaran negara by Bujang, Siti Mariam

    Published 2000
    “…Employee apathy, lacks of knowledge and skill, inadequate service operation systems, inflated customer expectation are some reasons often attributed to poor service. …”
    Thesis
  2. 1482

    Human-Robot Interaction Using ROS Framework for Indoor Mapping Missions by M.S., Hendriyawan Achmad, Mohd Razali, Daud, Saifudin, Razali, Pebrianti, Dwi

    Published 2016
    “…This research examines how humans work with teleoperated unmanned mobile robots to perform interaction in order to explore and build an indoor map by utilizing robotic software framework known as Robot Operating System (ROS). ROS infrastructure tools are involving together from the file system level to the community level,enables independent decisions about development and implementation. …”
    Get full text
    Conference or Workshop Item
  3. 1483

    Bio-Inspired Computational Paradigm for Feature Investigation and Malware Detection: Interactive Analytics by Ahmad, Firdaus, Nor Badrul, Anuar, Mohd Faizal, Ab Razak, Sangaiah, Arun Kumar

    Published 2017
    “…Simultaneously, most of the people prefer devices with Android operating system. As the demand expands, deceitful authors develop malware to compromise Android for private and money purposes. …”
    Get full text
    Get full text
    Article
  4. 1484

    Press Touch Code: A Finger Press based Screen Size Independent Authentication Scheme for Smart Devices by Ranak, M. S. A. Noman, Azad, Saiful, Nur Nadiah Hanim, Mohd Nor, Kamal Z., Zamli

    Published 2017
    “…We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme.…”
    Get full text
    Article
  5. 1485

    A secure authentication scheme using locimetric and press touch code techniques by Noor Elya Afiqah, Che Nordin

    Published 2019
    “…The purpose of this research is to design a secure hybrid authentication scheme using the two techniques mentioned above which is dependent to screen resolution size and test the effectiveness of the proposed authentication scheme on Android based operating system. From the literature review, we will discuss more details on the authentication scheme and the concept of Locimetric and Press Touch Code. …”
    Get full text
    Undergraduates Project Papers
  6. 1486

    Towards control and sensing for an autonomous mobile robotic assistant navigating assembly lines by Boerkoel, James C., Bix, Johannes, Bartscher, Stefan, Unhelkar, Vaibhav Vasant, Perez, Jorge I., Shah, Julie A

    Published 2017
    “…Solutions readily exist for control of wheeled mobile robots on static surfaces; we build on the open-source Robot Operating System (ROS) software architecture and generalize the algorithms for the moving line environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 1487

    Reliable InP-based Geiger-mode Avalanche Photodiode Arrays by Smith, Gary M., McIntosh, K. Alexander, Donnelly, Joseph P., Funk, Joseph E., Mahoney, Leonard J., Verghese, Simon

    Published 2010
    “…These devices have been used by system groups at Lincoln Laboratory and other defense contractors for building operational systems. For these fielded systems the device reliability is a strong concern. …”
    Get full text
    Article
  8. 1488

    Using memory mapping to support cactus stacks in work-stealing runtime systems by Lee, I-Ting Angelina, Boyd-Wickizer, Silas, Huang, Zhiyi, Leiserson, Charles E.

    Published 2011
    “…We have addressed this cactus-stack problem by modifying the Linux operating system kernel to provide support for thread-local memory mapping (TLMM). …”
    Get full text
    Article
  9. 1489

    Super compact mobile robot development: navigation and human operating interface ROS-android application by Li, Bowen

    Published 2022
    “…This project loads Robotics Operating System (ROS) in Jetson Nano, an industrial PC, which publishes topics to control the robot’s movement and its 2 IP cameras that allow live streaming. …”
    Get full text
    Final Year Project (FYP)
  10. 1490

    Real-time avoidance strategy of dynamic obstacles via half model-free detection and tracking with 2D lidar for mobile robots by Dong, Huixu, Weng, Ching-Yen, Guo, Chuangqiang, Yu, Haoyong, Chen, I-Ming

    Published 2022
    “…The existing avoidance strategy based on timed elastic band local planner and cost-map provided by robotics operating system cannot realize the excellent performance when a robot and an obstacle both move. …”
    Get full text
    Journal Article
  11. 1491

    Singapura Dilanggar Todak, an interactive E-book by Nabilah Binte Eddy Razali

    Published 2023
    “…This interactive e-book would run on the Android Operating System. The software used in the development of this mobile application is React Native, an open source UI software network created by Facebook. …”
    Get full text
    Final Year Project (FYP)
  12. 1492

    Mobile application to aid lost item recovery by Bhargav, Venugopal

    Published 2023
    “…The project utilizes the Android Studio integrated development environment (IDE) to develop an android programming interface (API) for users with mobile phones using the android operating system (OS). The programming language of choice was Kotlin and Google’s Firebase services were used for authentication, data storage and cloud functions. …”
    Get full text
    Final Year Project (FYP)
  13. 1493

    Optimal Sizing and Siting of Battery Energy Storage Systems with Retired Battery by Apribowo, Chico Hermanu Brillianto, Sarjiya, Sarjiya, Hadi, Sasongko Pramono, Wijaya, F. Danang

    Published 2022
    “…Battery energy storage system (BESS) can improve reliability with a reduced load of loss and reduce the uncertainty of photovoltaic (PV) to maintain a stable operating system in the power grid. BESS optimization refers to the sizing and siting of BESS, which is becoming more popular among consumers of cost-effectiveness, energy reduction, and demand cost. …”
    Get full text
    Conference or Workshop Item
  14. 1494

    RANCANG BANGUN SISTEM INFORMASI EKSEKUTIF MARKETING (Studi Kasus di PT Tiga Serangkai Pustaka Mandiri Surakarta) by , HERWIN ZAKIYAH, , Ir. P. Insap Santosa, M.Sc., Ph.D.

    Published 2012
    “…Marketing EIS built on Share Point Server 2010 platform with Windows 7X-64 operating system can run well on computers with minimum memory capacity of 16 GB. …”
    Thesis
  15. 1495

    Performance evaluation of AODV, DSR and DYMO routing protocol in MANET / Siti Rahayu Abdul Aziz ... [et al.] by Abdul Aziz, Siti Rahayu, Endut, Nor Adora, Abdullah, Shapina, Mior Daud, Mior Norazman

    Published 2008
    “…This project used Linux as an operating system based platform and discrete event simulator NS-2 as simulation software to compare the three MANET routing protocols. …”
    Get full text
    Article
  16. 1496

    Analysis on the behavior of wireless sensor node through test-bed implementation / Yusnani Mohd Yussoff ... [et al.] by Mohd Yussoff, Yusnani, Zainol Abidin, Husna, Ab Rahman, Ruhani, Yahaya, Faeiza Hanum

    Published 2011
    “…The design of sensor network is influenced by many factors including scalability, operating system, fault tolerance, sensor network topology, hardware constraints, transmission media and power consumption. …”
    Get full text
    Research Reports
  17. 1497

    Bio-inspired computational paradigm for feature investigation and malware detection: interactive analytics by Firdaus, Ahmad, Anuar, Nor Badrul, Razak, Mohd Faizal Ab, Sangaiah, Arun Kumar

    Published 2018
    “…Simultaneously, most of the people prefer devices with Android operating system. As the demand expands, deceitful authors develop malware to compromise Android for private and money purposes. …”
    Article
  18. 1498

    Contiki IEEE 802.15.4 MAC layer protocols: implementation and evaluation of node’s throughput and power consumption by Abdulkarem, Mohammed, Samsudin, Khairulmizam, A. Rasid, Mohd Fadlee, Rokhani, Fakhrul Zaman

    Published 2022
    “…In wireless sensor networks, providing flexibility in the selection of Medium Access Control (MAC) protocols to be implemented in an operating system (OS) becomes critical to best meet the requirements of each certain application. …”
    Article
  19. 1499

    Engine performance characteristics and evaluation of variation in the length of intake plenum by Ithsan, Mohammad Zaki, Abu Bakar, Muhammad Azman, Khalid, Amir, Zainal Abidin, Shaiful Fadzil, Manshoor, Bukhari

    Published 2020
    “…The control panel is being used to perform administrative and management operating system. Besides that, the hydraulic dynamometer was used to measure the power of an engine by using a cell filled with liquid to increase its load. …”
    Get full text
    Book Section
  20. 1500

    An extended access control list for local network protection from insider attacks by Muamer N., Mohammed

    Published 2011
    “…Both programs operate under Microsoft Windows operating system environment. The performance of the new system is computed and the results show that the security aspects have been enhanced with respect to a slight impact in speed (decreased by 1.96 % in download, 2.35% in uploading). …”
    Get full text
    Thesis