UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 85
21.
  • Protection Tiers and Their ... Protection Tiers and Their Applications for Evaluating Untrusted Code on A Linux-Based Web Server
    Jiang, Zhuhan; Huang, Jiansheng; Akhter, Rezina Journal of communications, 2015, Letnik: 10, Številka: 11
    Journal Article

    Evaluating untrusted computer programs online by executing and testing them real-time has a challenging task of protecting the system integrity and the data confidentiality of the computer host. For ...
Celotno besedilo
22.
  • Acid–base logarithmic diagr... Acid–base logarithmic diagrams with computer algebra systems
    Gambi, Alberto; Toniolo, Rosanna ChemTexts, 06/2016, Letnik: 2, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    The pH of any polyprotic weak and strong acid (or base) can be calculated employing the logarithmic concentration diagram. The aim of this text is to introduce a joint approach of algebraic, as used ...
Celotno besedilo

PDF
23.
  • New Proposal on the Develop... New Proposal on the Development of Machine Protection Functions for ITER Diagnostics Control
    YAMAMOTO, Tsuyoshi; YATSUKA, Eiichi; HATAE, Takaki ... Plasma and Fusion Research, 01/2016, Letnik: 11
    Journal Article
    Recenzirano
    Odprti dostop

    There is a need to develop ITER instrumentation and control (I&C) systems with high reliabilities. Interlock systems that activate machine protection functions are implemented on robust wired-logic ...
Celotno besedilo

PDF
24.
  • Automated Verification of the Program Code in the Development Process According to Team Defined Rules
    Kolesnichenko, Velislav; Nenov, Hristo; Stoyanova, Donika 2023 International Conference Automatics and Informatics (ICAI), 2023-Oct.-5
    Conference Proceeding

    Verification of the structure of program code in the development process is a possible approach for increasing the quality of the software product. Its intent is to provide a systematic and ...
Celotno besedilo
25.
  • Thermal Radiation of Explos... Thermal Radiation of Explosion: Estimations of Risk of Thermal Defeat of People and Occurrence of Fires
    Alhussan, K. Procedia engineering, 2013, 2013-00-00, Letnik: 61
    Journal Article
    Recenzirano
    Odprti dostop

    Physical and hydrodynamic processes, accompanying explosions of condensed explosives and fuel-air mixtures are considered. The physical model, algorithm, and program code for modeling one-dimensional ...
Celotno besedilo

PDF
26.
  • A high-efficient tables mem... A high-efficient tables memory access saving algorithm for CAVLC decoding
    Wang, Jianhua; Cheng, Lianglun; Liu, Jun ... Signal, image and video processing, 11/2015, Letnik: 9, Številka: 8
    Journal Article
    Recenzirano

    Frequent table look-up can result in high memory access, and high memory access can cause increased power consumption in CAVLC decoding. Aiming to solve the problem of high table memory access during ...
Celotno besedilo
27.
  • Combined Use of Equivalent and Non-Equivalent Transformations of FPGA Program Code to Embedding Additional Security Data
    Ivanova, Olena; Drozd, Oleksandr; Zashcholkin, Kostiantyn ... 2021 IEEE East-West Design & Test Symposium (EWDTS), 2021-Sept.-10
    Conference Proceeding

    The paper is devoted to a stenographic approach to storing data in the space of the FPGA chips program code. In this approach, data is covertly embedded in the program code and forms a single whole ...
Celotno besedilo
28.
  • Distributed Information System Software Code Reliability Evaluation
    Tremasova, L. A.; Korovushkina, V. M.; Panteleeva, K. A. ... 2024 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF), 2024-June-3
    Conference Proceeding

    Distributed information systems play a key role in the modern world, therefore it is critically necessary to be able to assess its reliability, for which it is possible to apply an integrated ...
Celotno besedilo
29.
  • Determination of Location in the Wi-Fi Network Using the Taxometric Method of Decision-Making
    Doshchinsky, Ilya V.; Shurygina, Ksenia I.; Kokoreva, Elena V. 2023 IEEE 24th International Conference of Young Professionals in Electron Devices and Materials (EDM), 2023-June-29
    Conference Proceeding

    One of the main goals for developers of local positioning systems is to ensure that their framework can be deployed in any possible place. The challenge is that the indoor network infrastructure ...
Celotno besedilo
30.
  • Electrical Control, Program Code and Experimental Studies of the Gauss Curve in a Specialized Automated Mechatronic System
    Dimitrova, Reneta; Dimitrov, Slav; Totev, Dimitar ... 2023 4th International Conference on Communications, Information, Electronic and Energy Systems (CIEES), 2023-Nov.-23
    Conference Proceeding

    The presented study aims to design an electrical control and program code and perform experimental studies of the "Gauss curve'' in a newly designed specialized automated mechatronic system (SAMS) ...
Celotno besedilo
1 2 3 4 5
zadetkov: 85

Nalaganje filtrov