To see the other types of publications on this topic, follow the link: Arch Linux (Electronic resource).

Journal articles on the topic 'Arch Linux (Electronic resource)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 22 journal articles for your research on the topic 'Arch Linux (Electronic resource).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Vladislavić, Đani, Darko Huljenić, and Julije Ožegović. "Virtual Network Resource Optimization Model for Network Function Virtualization." Wireless Communications and Mobile Computing 2021 (August 17, 2021): 1–21. http://dx.doi.org/10.1155/2021/9928210.

Full text
Abstract:
Network function virtualization (NFV) is a concept aimed at achieving telecom grade cloud ecosystem for new-generation networks focusing on capital and operational expenditure (CAPEX and OPEX) savings. This study introduces empirical throughput prediction model for the virtual network function (VNF) and network function virtualization infrastructure (NFVI) architectures based on Linux kernel. The model arises from the methodology for performance evaluation and modeling based on execution area (EA) distribution by CPU core pinning. EA is defined as a software execution unit that can run isolate
APA, Harvard, Vancouver, ISO, and other styles
2

Springer, Tom, Erik Linstead, Peiyi Zhao, and Chelsea Parlett-Pelleriti. "Towards QoS-Based Embedded Machine Learning." Electronics 11, no. 19 (2022): 3204. http://dx.doi.org/10.3390/electronics11193204.

Full text
Abstract:
Due to various breakthroughs and advancements in machine learning and computer architectures, machine learning models are beginning to proliferate through embedded platforms. Some of these machine learning models cover a range of applications including computer vision, speech recognition, healthcare efficiency, industrial IoT, robotics and many more. However, there is a critical limitation in implementing ML algorithms efficiently on embedded platforms: the computational and memory expense of many machine learning models can make them unsuitable in resource-constrained environments. Therefore,
APA, Harvard, Vancouver, ISO, and other styles
3

Ocampo, Andres F., Mah-Rukh Fida, Ahmed Elmokashfi, and Haakon Bryhni. "Assessing the Cloud-RAN in the Linux Kernel: Sharing Computing and Network Resources." Sensors 24, no. 7 (2024): 2365. http://dx.doi.org/10.3390/s24072365.

Full text
Abstract:
Cloud-based Radio Access Network (Cloud-RAN) leverages virtualization to enable the coexistence of multiple virtual Base Band Units (vBBUs) with collocated workloads on a single edge computer, aiming for economic and operational efficiency. However, this coexistence can cause performance degradation in vBBUs due to resource contention. In this paper, we conduct an empirical analysis of vBBU performance on a Linux RT-Kernel, highlighting the impact of resource sharing with user-space tasks and Kernel threads. Furthermore, we evaluate CPU management strategies such as CPU affinity and CPU isolat
APA, Harvard, Vancouver, ISO, and other styles
4

Vimal, Kumar V., and C. Abdul Majeed K. "E-resources sharing through Linux based Virtual Private Network (VPN): a case study." Annals of Library and Information Studies 65, no. 3 (2020): 156–59. https://doi.org/10.5281/zenodo.4393149.

Full text
Abstract:
Mahatma Gandhi University Central Library has established an SSH-based VPN (Virtual Private Network) service to share e-resources with off-campus libraries. The VPN service ensures seamless access to e-resources to the academic community at off-campus departments and Study Centre libraries. Extension of e-resources access to off-campus has increased the usage of electronic resources subscribed by the university. The article presents the first-hand experience of establishing Open Source based VPN service in a university environment.
APA, Harvard, Vancouver, ISO, and other styles
5

Hong, Cheol-Ho, Kyungwoon Lee, Minkoo Kang, and Chuck Yoo. "qCon: QoS-Aware Network Resource Management for Fog Computing." Sensors 18, no. 10 (2018): 3444. http://dx.doi.org/10.3390/s18103444.

Full text
Abstract:
Fog computing is a new computing paradigm that employs computation and network resources at the edge of a network to build small clouds, which perform as small data centers. In fog computing, lightweight virtualization (e.g., containers) has been widely used to achieve low overhead for performance-limited fog devices such as WiFi access points (APs) and set-top boxes. Unfortunately, containers have a weakness in the control of network bandwidth for outbound traffic, which poses a challenge to fog computing. Existing solutions for containers fail to achieve desirable network bandwidth control,
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Liu, Sibren Isaacman, and Ulrich Kremer. "An Adaptive Application Framework with Customizable Quality Metrics." ACM Transactions on Design Automation of Electronic Systems 27, no. 2 (2022): 1–33. http://dx.doi.org/10.1145/3477428.

Full text
Abstract:
Many embedded environments require applications to produce outcomes under different, potentially changing, resource constraints. Relaxing application semantics through approximations enables trading off resource usage for outcome quality. Although quality is a highly subjective notion, previous work assumes given, fixed low-level quality metrics that often lack a strong correlation to a user’s higher-level quality experience. Users may also change their minds with respect to their quality expectations depending on the resource budgets they are willing to dedicate to an execution. This motivate
APA, Harvard, Vancouver, ISO, and other styles
7

Zuo, Zheng, Shichun Yang, Bin Ma, et al. "Design of a CANFD to SOME/IP Gateway Considering Security for In-Vehicle Networks." Sensors 21, no. 23 (2021): 7917. http://dx.doi.org/10.3390/s21237917.

Full text
Abstract:
In recent years, Ethernet has been introduced into vehicular networks to cope with the increasing demand for bandwidth and complexity in communication networks. To exchange data between controller area network (CAN) and Ethernet, a gateway system is required to provide a communication interface. Additionally, the existence of networked devices exposes automobiles to cyber security threats. Against this background, a gateway for CAN/CAN with flexible data-rate (CANFD) to scalable service-oriented middleware over IP (SOME/IP) protocol conversion is designed, and security schemes are implemented
APA, Harvard, Vancouver, ISO, and other styles
8

Springer, Tom, Elia Eiroa-Lledo, Elizabeth Stevens, and Erik Linstead. "On-Device Deep Learning Inference for System-on-Chip (SoC) Architectures." Electronics 10, no. 6 (2021): 689. http://dx.doi.org/10.3390/electronics10060689.

Full text
Abstract:
As machine learning becomes ubiquitous, the need to deploy models on real-time, embedded systems will become increasingly critical. This is especially true for deep learning solutions, whose large models pose interesting challenges for target architectures at the “edge” that are resource-constrained. The realization of machine learning, and deep learning, is being driven by the availability of specialized hardware, such as system-on-chip solutions, which provide some alleviation of constraints. Equally important, however, are the operating systems that run on this hardware, and specifically th
APA, Harvard, Vancouver, ISO, and other styles
9

Moila, Ramahlapane Lerato, and Mthulisi Velempini. "A Model to Improve the Effectiveness and Energy Consumption to Address the Routing Problem for Cognitive Radio Ad Hoc Networks by Utilizing an Optimized Cuckoo Search Algorithm." Energies 14, no. 12 (2021): 3464. http://dx.doi.org/10.3390/en14123464.

Full text
Abstract:
A cognitive radio ad hoc network (CRAHN) is a mobile network that can communicate without any form of centralized infrastructure. The nodes can learn about the environment and make routing decisions. Furthermore, distributed computing, spectrum mobility, and the Internet of Things have created large data sets, which require more spectrum for data transmission. Unfortunately, the spectrum is a scarce resource that underutilized by licensed users, while unlicensed users are overcrowding the free spectrum. The CRAHNs technology has emerged as a promising solution to the underutilization of the sp
APA, Harvard, Vancouver, ISO, and other styles
10

Wu, Wenjuan, Dongchu Su, Bo Yuan, and Yong Li. "Intelligent Security Monitoring System Based on RISC-V SoC." Electronics 10, no. 11 (2021): 1366. http://dx.doi.org/10.3390/electronics10111366.

Full text
Abstract:
With the development of the economy and society, the demand for social security and stability increases. However, traditional security systems rely too much on human resources and are affected by uncontrollable community security factors. An intelligent security monitoring system can overcome the limitations of traditional systems and save human resources, contributing to public security. To build this system, a RISC-V SoC is first designed in this paper and implemented on the Nexys-Video Artix-7 FPGA. Then, the Linux operating system is transplanted and successfully run. Meanwhile, the driver
APA, Harvard, Vancouver, ISO, and other styles
11

Krauze, Krzysztof, Kamil Mucha, Tomasz Wydro, et al. "Determining the Stability of a Mobile Manipulator for the Transport and Assembly of Arches in the Yielding Arch Support." Energies 15, no. 9 (2022): 3170. http://dx.doi.org/10.3390/en15093170.

Full text
Abstract:
The yielding arch support is transported and installed in the face with the use of auxiliary machines. These activities in underground mining cause many problems, which have as yet not been solved. Currently, transport and assembly are carried out manually, using the roadheader and suspended rail, or various types of mounting platforms. The analysis of the structure of the existing solutions resulted in the development of an original structure that met the requirements of Polish mines. Developed jointly by FAMA Sp. z o.o. and the AGH University of Science and Technology in Krakow, Poland, the
APA, Harvard, Vancouver, ISO, and other styles
12

Krauze, Krzysztof, Kamil Mucha, Tomasz Wydro, et al. "Determining the Stability of a Mobile Manipulator for the Transport and Assembly of Arches in the Yielding Arch Support." Energies 15, no. 9 (2022): 3170. http://dx.doi.org/10.3390/en15093170.

Full text
Abstract:
The yielding arch support is transported and installed in the face with the use of auxiliary machines. These activities in underground mining cause many problems, which have as yet not been solved. Currently, transport and assembly are carried out manually, using the roadheader and suspended rail, or various types of mounting platforms. The analysis of the structure of the existing solutions resulted in the development of an original structure that met the requirements of Polish mines. Developed jointly by FAMA Sp. z o.o. and the AGH University of Science and Technology in Krakow, Poland, the
APA, Harvard, Vancouver, ISO, and other styles
13

Nedilko, Yaroslav. "FEATURES OF CONDUCTING INDIVIDUAL INVESTIGATORS (SEARCHED) ACTIONS DURING THE INVESTIGATION OF CRIMINAL OFFENSES COMMITTED USING INFORMATION TECHNOLOGIES (CYBERCRIMES) IN A MILITARY CONDITION." Criminalistics and Forensics, no. 67 (August 9, 2022): 292–301. http://dx.doi.org/10.33994/kndise.2022.67.30.

Full text
Abstract:
The article is devoted to the peculiarities of conducting investigative (search) actions during the investigation of criminal offenses committed using information technology (cybercrime) under martial law. The procedural and tactical features of conducting separate investigative (investigative) actions in the investigation of cybercrimes under martial law are considered. The domestic procedural legislation regulating the conduct of investigative (search) actions under martial law is studied. Also, an analysis of certain provisions of Article 615 of the Criminal Procedure Code of Ukraine was ca
APA, Harvard, Vancouver, ISO, and other styles
14

Yang, Peiju, Shurong Zhang, and Xufeng Wang. "Numerical Study on the Characteristics and Control Method of Coal Leakage between Supports in Integrated Mining of Extremely Loose and Soft Coal Seams." Energies 17, no. 5 (2024): 1013. http://dx.doi.org/10.3390/en17051013.

Full text
Abstract:
Extremely loose and soft coal seams, with a Platts coefficient of less than 0.3, are easy to break in the process of integrated mechanized roof coal mining and are prone to spilling and piling up between the hydraulic supports, which is a safety hazard for the movement of equipment. The coal particles must be cleaned up manually, resulting in reduced resource recovery rates and lower mining face efficiency. To effectively mitigate and control the problem of coal spillage accumulation amidst hydraulic supports, this study utilizes discrete element numerical simulation to examine the characteris
APA, Harvard, Vancouver, ISO, and other styles
15

Bussell, Hilary. "Libraries Support First-Generation Students through Services and Spaces, but Can Do More." Evidence Based Library and Information Practice 15, no. 1 (2020): 242–44. http://dx.doi.org/10.18438/eblip29689.

Full text
Abstract:
A Review of:
 Arch, X., & Gilman, I. (2019). First principles: Designing services for first-generation students. College & Research Libraries, 80(7), 996–1012. https://doi.org/10.5860/crl.80.7.996
 Abstract
 Objective – To provide recommendations for academic libraries in supporting first-generation college students, defined by the study’s authors “either as those whose parents have no college experience or did not graduate with a bachelor’s degree” (p. 996).
 Design – Multidisciplinary literature review and two qualitative survey questionnaires.
 Setting – Uni
APA, Harvard, Vancouver, ISO, and other styles
16

Khalid, Asna, Sufyan Ahmed, Syed Muhammad Zaki Mehdi, Ayesha Ilyas, Aimen ., and Tariq Sardar. "A Retrospective Evaluation of the Clinical Outcome of Dental Implants Following Maxillary Sinus Augmentation with and without Bone Grafting." Pakistan Journal of Medical and Health Sciences 17, no. 3 (2023): 562–65. http://dx.doi.org/10.53350/pjmhs2023173562.

Full text
Abstract:
The reintegration of partial edentulism patients is the utmost common treatment performed by dental practitioners in relations of frequency & occurrence, even though the general decline in tooth loss seen in recent times. There is broad agreement among dental professionals that osseointegrated implant-supported prostheses are the preferred method for replacing an edentulous gap caused by one or more lost teeth. These implants have been shown to provide several benefits for both physical and mental health. Objectives: The current retrospective study sought to define and assess the 60 months
APA, Harvard, Vancouver, ISO, and other styles
17

Klenik, Attila, and András Pataricza. "Adding Semantics to Measurements." Acta Cybernetica, September 2, 2022. http://dx.doi.org/10.14232/actacyb.295182.

Full text
Abstract:
The design and operation of modern software systems exhibit a shift towards virtualization, containerization and service-based orchestration. Performance capacity engineering and resource utilization tuning become priority requirements in such environments.
 Measurement-based performance evaluation is the cornerstone of capacity engineering and designing for performance. Moreover, the increasing complexity of systems necessitates rigorous performance analysis approaches. However, empirical performance analysis lacks sophisticated model-based support similar to the functional design of the
APA, Harvard, Vancouver, ISO, and other styles
18

Rapp, Martin, Heba Khdr, Nikita Krohmer, and Jörg Henkel. "NPU-Accelerated Imitation Learningfor Thermal Optimizationof QoS-Constrained Heterogeneous Multi-Cores." ACM Transactions on Design Automation of Electronic Systems, October 5, 2023. http://dx.doi.org/10.1145/3626320.

Full text
Abstract:
Thermal optimization of a heterogeneous clustered multi-core processor under user-defined quality of service (QoS) targets requires application migration and dynamic voltage and frequency scaling (DVFS). However, selecting the core to execute each application and the voltage/frequency (V/f) levels of each cluster is a complex problem because 1) the diverse characteristics and QoS targets of applications require different optimizations, and 2) per-cluster DVFS requires a global optimization considering all running applications. State-of-the-art resource management for power or temperature minim
APA, Harvard, Vancouver, ISO, and other styles
19

Puschmann, Cornelius, and Peter Reimer. "DiPP and eLanguage: Two cooperative models for open access." First Monday, October 1, 2007. http://dx.doi.org/10.5210/fm.v12i10.1969.

Full text
Abstract:
This article describes the development, deployment and ongoing use of two collaborative platforms for the publication of peer–reviewed, open access, academic e–journals and the different organizational environments towards which each system is tailored. The two projects presented here, DiPP [1] and eLanguage [2], are examples of different approaches to electronic publishing: the first being a regional publishing cooperative, the second a disciplinary one [3]. Our description includes the technical specifications of the DiPP platform, which is an extension of the Plone [4] con
APA, Harvard, Vancouver, ISO, and other styles
20

Das, Hemjit, Sandeep Prasad, and Mrityunjoy Gohain. "A STUDY ON PREVALENCE OF IDIOPATHIC FLATFOOT IN ADOLESCENTS OF NORTH EAST INDIA." INDIAN JOURNAL OF APPLIED RESEARCH, April 1, 2023, 47–50. http://dx.doi.org/10.36106/ijar/2001581.

Full text
Abstract:
Introduction: “Pes planus” commonly known as “atfoot” is characterised by sagging of medial longitudinal arch with secondary hind foot valgus, forefoot abduction and supination relative to hind foot. Idiopathic type of atfoot is physiological and there is a lack of clear consensus about the maximum limit of age for its persistence. Assessment of medial longitudinal arch can be done either on clinical grounds or based on radiological evidences. Foot prints can be easily obtained with simple ink print method. They are simple, fast, inexpensive and non-invasive way to assess the arches of foot.
APA, Harvard, Vancouver, ISO, and other styles
21

Paige Hart, Elizabeth, Barbara Matakevich, and Todd Foster. "Is the Weight All We Can See? A Study to Evaluate How BMI and Other Patient Characteristics Impact Incomplete Fetal Anatomy Survey Ultrasounds." North American Proceedings in Gynecology and Obstetrics - Supplemental, February 14, 2025. https://doi.org/10.54053/001c.131723.

Full text
Abstract:
Anatomy ultrasounds are recommended each pregnancy to assess for fetal anomalies with additional ultrasounds indicated based on risk factors. Incomplete anatomy ultrasounds can range from 4% to 35.5% with obesity impacting ability to adequately visualize fetal anatomy. American College of Obstetrics and Gynecology (ACOG) has guidelines for standard anatomy screening. American Institute for Ultrasound Medicine (AIUM) uses ACOG guidelines in addition to other structures for both a screening and detailed ultrasound. This is a retrospective case study with the primary objective to identify the rat
APA, Harvard, Vancouver, ISO, and other styles
22

Hannah, Haylea A., Audrey Brezak, Audrey Hu, et al. "Field-based Evaluation of Malaria Outbreak Detection & Response, Mudzi and Goromonzi." Online Journal of Public Health Informatics 11, no. 1 (2019). http://dx.doi.org/10.5210/ojphi.v11i1.9835.

Full text
Abstract:
ObjectiveTo conduct a field-based assessment of the malaria outbreak surveillance system in Mashonaland East, Zimbabwe.IntroductionInfectious disease outbreaks, such as the Ebola outbreak in West Africa, highlight the need for surveillance systems to quickly detect outbreaks and provide data to prevent future pandemics.1–3 The World Health Organization (WHO) developed the Joint External Evaluation (JEE) tool to conduct country-level assessments of surveillance capacity.4 However, considering that outbreaks begin and are first detected at the local level, national-level evaluations may fail to
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!