To see the other types of publications on this topic, follow the link: Linux (Computer operating system).

Journal articles on the topic 'Linux (Computer operating system)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Linux (Computer operating system).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sami, Muhammad, and Akram M. Zeki. "Mini-ATX Computer System in Vehicle." Advanced Materials Research 1115 (July 2015): 484–87. http://dx.doi.org/10.4028/www.scientific.net/amr.1115.484.

Full text
Abstract:
The aim of this study is to create and assemble the system with customizing/building Linux kernel and environments to be compatible and efficient on mini-ITX computer. The objective of the study is to create/customizing lightweight operating system using GNU/Linux to be used on computer to be used on vehicle. The system would also optimize the size and functionalities most probably would be implemented on car computer system.Keywords: mini-ATX, CarPC, Linux, Ubuntu, Qt, QML
APA, Harvard, Vancouver, ISO, and other styles
2

Zhao, Huimin. "A Design of Information Teaching Platform Based on Linux Operating System." Journal of Physics: Conference Series 2138, no. 1 (December 1, 2021): 012018. http://dx.doi.org/10.1088/1742-6596/2138/1/012018.

Full text
Abstract:
Abstract Linux operating system provides a good platform for the research on computer science due to its characteristics of open source, stability and efficiency. The teaching platform based on Linux has many advantages over that of Windows operating system. To promote the application of Linux and develop domestic software with independent intellectual property rights, the author studies and analyzes the feasibility of Linux teaching platform which can adapt to the current cross platform teaching of information technology in Colleges and universities and meet the requirements of computer grade examination. The author proposes to build an information technology teaching platform based on Linux operating system, and realize the cross platform of mainstream application software through Wine, and meanwhile use virtual machine to support Windows operating system environment. The author puts forward suggestions and measures in the application process, and verifies the feasibility of platform implementation, and proposes the preliminary scheme of platform construction.
APA, Harvard, Vancouver, ISO, and other styles
3

KOJIMA, MITSUHIRO. "Linux. A Free Operating System for Computer Users." Journal of the Institute of Electrical Engineers of Japan 119, no. 8/9 (1999): 523–26. http://dx.doi.org/10.1541/ieejjournal.119.523.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Winzerling, Werner. "Linux und Freie Software." PROKLA. Zeitschrift für kritische Sozialwissenschaft 32, no. 126 (March 1, 2002): 37–55. http://dx.doi.org/10.32387/prokla.v32i126.712.

Full text
Abstract:
Since the great success of the operating system Linux, the development of Free and Open Source Software is broad discussed. This is also seen as the beginning of a new economic development. This paper examines, what makes Linux actually so significant for the computer industry. First Linux is critical evaluated and placed opposite the Microsoft operating systems. Than some substantial new influences on the development and production in the computer industry are worked out. On the one hand this are modifications in the production chain of computers and on the other hand network effects (externalization), which proceed from these products. On the basis of this new economic situation the Linux phenomenon is explained and it is shown from which the great importance of Microsoft in the computer industry results at present.
APA, Harvard, Vancouver, ISO, and other styles
5

Basorudin, Gunarso, Erni Rouza, Luth Fimawahib, and Asep Supriyanto. "Perancangan dan Implementasi Sistem Operasi Linux Debian untuk Konfigurasi Content Management System (CMS) Wordpress Dengan Winscp." Bulletin of Computer Science Research 3, no. 1 (December 31, 2022): 21–29. http://dx.doi.org/10.47065/bulletincsr.v3i1.188.

Full text
Abstract:
The operating system is one of the vital components in a computer system. The operating system is responsible for managing the use of computer hardware such as processors, memory, I/O devices, storage media, and others.( Wamiliana, At All. 2013). The purpose of making this title is the first as a reference for future researchers in creating websites but using Linux and as a reference for lecturers and teachers especially in the field of computer networks for teaching and for making scientific work related to the same problem but using a different Linux, for example Ubuntu, Mandrake, Caldera and other operating systems. This research has been successfully carried out with the final result in the form of Debian Linux implementation for website creation. In making a Wordpress CMS Website using Linux, you don’t need internet access, but instead create your own server with a text-based Debian Linux operating system, and the result is a Graphic User Interface (GUI) display that can be accessed, modified, added images, added videos, changed background, installed. Plugin, post news like wordpress which is connected to the internet.
APA, Harvard, Vancouver, ISO, and other styles
6

I nyoman, Edy saputra Edy, IGAP Raka Agung, and Yoga Divayana. "ED-255EK Embeded Education Platform Sebagai Modul Praktikum Embeded System Dengan Robot Arm Module Dan Voice Module." Majalah Ilmiah Teknologi Elektro 18, no. 1 (May 6, 2019): 91. http://dx.doi.org/10.24843/mite.2019.v18i01.p13.

Full text
Abstract:
Abstract— Literally embedded systems are defined as equipment that computes a particular job. Embedded Linux System was also developed as a means of education, one of which is ED-255EK Embedded Education Platform, designed to be very practical and consume very low power. ED-255EK is also equipped with a PXA255 processor that is compatible with ARM version 5TE ISA, so it can be used to carry out various kinds of lab work or experiments on embedded systems. The working principle of this tool begins with the configuration of data communication between Fedora Linux and ED-255EK. When the communication goes well, it is downloaded by the ED-255EK system to a laptop or computer that has been installed with the Fedora 9.0 Linux operating system. To take advantage of the ED-255FPGA module, driver module installation is required first, after which the application program is installed. Laptops or computers that have installed the Fedora 9.0 Linux operating system will act as input and output programs making it easier to monitor each module that is being run. The module used is the ARM 1923 Robot Module and Voice Module ED4321.
APA, Harvard, Vancouver, ISO, and other styles
7

Sari, Renny Puspita, and Fiqri Syah Redha. "Sistem Pendukung Keputusan Pemilihan Distro Linux Menggunakan Metode Simple Additive Weighting (SAW)." Jurnal Sistem Komputer dan Informatika (JSON) 2, no. 3 (May 30, 2021): 348. http://dx.doi.org/10.30865/json.v2i3.3039.

Full text
Abstract:
Linux is a kernel whose development has been very active since it was first released to the public. With a large community, Linux development has penetrated into various fields in the world of computerization, including personal computers. Today, Linux can be used on a variety of devices from personal computers to embedded systems. The development is very active thanks to the large community and Linux adopting open source, many developers are making their own version of the Linux-based operating system. Versions and types of Linux-based operating systems are called distros or distributions. The number of versions and types of Linux-based operating systems, of course, confuses users who are trying Linux for the first time or who want to fully switch to Linux from another operating system. Decision support systems can provide alternative solutions for those users who are confused about choosing a Linux distribution. By using the Simple Additive Weighting (SAW) method, the existing criteria can be used as benchmarks in determining the Linux distribution of choice and therefore the accuracy of the system can exceed 90%
APA, Harvard, Vancouver, ISO, and other styles
8

Abdulrahman, Aysar A., and Alaa K. Jumaa. "Exploitnig DNS Server Vulnerabilites Using Linux Operating System." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 9 (June 22, 2016): 7049–59. http://dx.doi.org/10.24297/ijct.v15i9.636.

Full text
Abstract:
Today, the world is using many modern Information Technology (IT) systems to gather, store, and manipulateimportant information. On the other hand, hackers are trying to gain access to any computer or system for viewing, copying, or creating data without the intention of destroying data or maliciously harming the computer. Exploiting domain name system (DNS) vulnerabilities have resulted in a range of high profile disruptions and outages for major internet sites around the world. DNS attack is an exploit in which an attacker takes advantage of vulnerabilities is the (DNS). This paper will present the vulnerabilities and the weak points of the DNS server and how attackers (black hat hakcer) can exploit those vulnerabilities to attack and gain access to the server machine. In conclusion, presenting and implementing this project make users understand the hazard of hackers. Then, will lead to build secure and protected systems and applications.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhen, Xiao Qiong, Zhen Dong Yao, and Wen Bin Wang. "Scheme Design for Communication between Network Port and Serial Port Based on ARM." Advanced Engineering Forum 6-7 (September 2012): 941–47. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.941.

Full text
Abstract:
The data transmission scheme between a transmission control protocol/internet protocol (TCP/IP) network port and a serial port based on an ARM embedded system is introduced in the paper. The data transmission between a personal computer (PC) and remote equipment through an Internet is realized. The structure of a hardware platform is simply introduced, the cutting and transplant of operating system, the communication program design of the network port and the serial port and the cross compiling between the two ports are introduced in detail. The AT91SAM9261 chip of ATMEL Corporation is employed as the embedded board of a kernel processor. The Redhat9 Linux operating system is employed as a software development platform, an ARM-Linux operating system is employed as a program operation platform and the kernel version is Linux-2.6.2. The C program is used and an ARM-Linux-GNU tool chain is used for the cross compiling. The experimental result proves that the real-time, parallel full duplex data transmission between the network port and the serial port is realized by the scheme provided in the paper.
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Xiaowen. "Practical Research on Mixed Teaching Reform of Linux Operating System Course." Contemporary Education and Teaching Research 5, no. 1 (January 19, 2024): 1–6. http://dx.doi.org/10.61360/bonicetr242015560101.

Full text
Abstract:
With the rapid development of technology and the diversification of educational needs, the traditional teaching mode can no longer fully meet the requirements of modern education. Linux is widely used in servers, cloud computing, network infrastructure, embedded systems high-performance computing, etc. As an important part of the field of computer science and information technology, the teaching method of the Linux operating system needs to be constantly innovated and improved to adapt to this change. to adapt to this change. The hybrid teaching mode is a teaching method that combines online and offline teaching resources, which provides new possibilities to improve the teaching quality of Linux courses and the learning effect of students. The purpose of this paper is to discuss the reform practice of Linux operating system courses under the hybrid teaching mode, including the teaching method, course content, evaluation mechanism, and the cultivation of practical application ability.
APA, Harvard, Vancouver, ISO, and other styles
11

Hasibuan, Doli, Fati Gratianus Nafiri Larosa, and Rico V. A. Simanjuntak. "ANALISIS DAN IMPLEMENTASI JARINGAN THIN CLIENT MENGGUNAKAN LINUX TERMINAL SERVER PROJECT PADA JARINGAN LAN." METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi 51, no. 1 (March 10, 2019): 41–45. http://dx.doi.org/10.46880/mtk.v5i1.417.

Full text
Abstract:
The development of computer technology both in software and hardware is very fast. These two aspects are interrelated with each other and cannot be separated. LTSP, Linux Terminal Server Project is a project started by James A McQuillan as a diskless networking project based on the GNU/Linux operating system. Called a diskless network, because the client is not equipped with a hard disk. All application software and operating systems needed by the client computer are served and managed by the server computer. In this design, a laptop with an Intel processor is used as a server and a PC as a client. LTSP will be integrated into the Linux operating system ubuntu 16.04, and as a provider of diskless thin client service platforms is LTSP (Linux Terminal Server Project). With LTSP, the construction of a diskless network is expected to be more efficient. Diskless network technology is one solution that can be applied in dealing with the problem of investing in computer technology hardware with predetermined specifications.
APA, Harvard, Vancouver, ISO, and other styles
12

Rakic, Predrag, Zarko Zivanov, and Miroslav Hajdukovic. "COLIBROS: Educational operating system." Computer Science and Information Systems 7, no. 4 (2010): 705–19. http://dx.doi.org/10.2298/csis070521022r.

Full text
Abstract:
This paper gives an overview of educational operating system called COLIBROS. It is small, object oriented, library operating system, based on micro-kernel concepts, supporting high level concurrency and synchronization primitives. In fact, COLIBROS is simplified operating system kernel accompanied with hardware emulation layer that emulates keyboard, monitor, disk and interrupt mechanism. A concurrent COLIBROS program behaves like stand alone program executing in emulated environment, in our case as plain GNU/Linux process. Encapsulating all critical concepts in host operating system user space makes COLIBROS development and debugging easier and more user friendly.
APA, Harvard, Vancouver, ISO, and other styles
13

Irianto, Irianto, Afrisawati Afrisawati, Sudarmin Sudarmin, and Juna Eska. "IMPLEMENTASI PERAKITAN DAN INSTALASI SISTEM OPERASI WINDOWS DAN LINUX." Jurdimas (Jurnal Pengabdian Kepada Masyarakat) Royal 1, no. 1 (January 19, 2018): 34–43. http://dx.doi.org/10.33330/jurdimas.v1i1.386.

Full text
Abstract:
Abstract: Increased computer users in high school make increasingly also the desire of students / i equal to know the type of computer components. With the many interests of students to know assembling and installation of computers, making their enthusiasm higher in knowing the types of computer applications. Many factors influence for students on computer assembly, such as how component form, type of operating system, type of application, and how to install. Keywords: Computer Components, Operating System, Computer Applications Abstrak: Peningkatan pengguna komputer di sekolah SMA membuat makin meningkat pula keinginan siswa/i sederajat untuk mengetahui jenis komponen komputer. Dengan banyaknya minat siswa/i untuk mengetahui merakit dan instalasi komputer, membuat antusias mereka semakin tinggi dalam mengetahui jenis aplikasi komputer. Banyak faktor yang mempengaruhi bagi siswa/i pada perakitan komputer, seperti bagaimana bentuk komponen, jenis sistem operasi, jenis aplikasi, dan bagaimana cara instalasinya. Kata Kunci : Komponen Komputer, Sistem Operasi, Aplikasi Komputer
APA, Harvard, Vancouver, ISO, and other styles
14

Toresa, Dafwen. "Perbandingan proxy pada linux dan windows untuk mempercepat browsing website." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 8, no. 1 (March 11, 2017): 50–57. http://dx.doi.org/10.31849/digitalzone.v8i1.628.

Full text
Abstract:
Abstrak- Pada saat ini sangat banyak organisasi, baik pendidikan, pemerintahan, maupun perusahaan swasta berusaha membatasi akses para pengguna ke internet dengan alasan bandwidth yang dimiliki mulai terasa lambat ketika para penggunanya mulai banyak yang melakukan browsing ke internet. Mempercepat akses browsing menjadi perhatian utama dengan memanfaatkan teknologi Proxy server. Penggunaan proxy server perlu mempertimbangkan sistem operasi pada server dan tool yang digunakan belum diketahui performansi terbaiknya pada sistem operasi apa. Untuk itu dirasa perlu untuk menganalisis performan Proxy server pada sistem operasi berbeda yaitu Sistem Operasi Linux dengan tools Squid dan Sistem Operasi Windows dengan tool Winroute. Kajian ini dilakukan untuk mengetahui perbandingan kecepatan browsing dari komputer pengguna (client). Browser yang digunakan di komputer pengguna adalah Mozilla Firefox. Penelitian ini menggunakan 2 komputer klien dengan pengujian masing-masingnya 5 kali pengujian pengaksesan/browsing web yang dituju melalui proxy server. Dari hasil pengujian yang dilakukan, diperoleh kesimpulan bahwa penerapan proxy server di sistem operasi linux dengan tools squid lebih cepat browsing dari klien menggunakan web browser yang sama dan komputer klien yang berbeda dari pada proxy server sistem operasi windows dengan tools winroute. Kata kunci: Proxy, Bandwidth, Browsing, Squid, Winroute Abstract- At this time very many organizations, both education, government, and private companies try to limit the access of users to the internet on the grounds that the bandwidth owned began to feel slow when the users began to do a lot of browsing to the internet. Speed up browsing access is a major concern by utilizing Proxy server technology. The use of proxy servers need to consider the operating system on the server and the tool used is not yet known the best performance on what operating system. For that it is necessary to analyze Performance Proxy server on different operating system that is Linux Operating System with Squid tools and Windows Operating System with Winroute tool. This study was conducted to determine the comparison of browsing speed of the user's computer (client). The browser used on the user's computer is Mozilla Firefox. This study uses two client computers with each test 5 times accessing web browsing / destination testing via proxy server. From the results of tests conducted, it can be concluded that the application of proxy server in linux operating system with squid tools faster browsing from client using the same web browser and client computer different from the proxy server windows operating system with winroute tools. Keywords: Proxy Server, Linux, Windows, Squid, Winroute
APA, Harvard, Vancouver, ISO, and other styles
15

Pugin, Konstantin V., Kirill A. Mamrosenko, and Alexander M. Giatsintov. "Software architecture for display controller and operating system interaction." Radioelectronics. Nanosystems. Information Technologies. 13, no. 1 (March 27, 2021): 87–94. http://dx.doi.org/10.17725/rensit.2021.13.087.

Full text
Abstract:
Article describes solutions for developing programs that provide interaction between Linux operating system and multiple display controller hardware blocks (outputs), that use one clock generation IP-block with phase-locked loop (PLL). There is no API for such devices in Linux, thus new software model was developed. This model is based on official Linux GPU developer driver model, but was modified to cover case described earlier. Article describes three models for display controller driver development – monolithic, component and semi-monolithic. These models cannot cover case described earlier, because they assume that one clock generator should be attached to one output. A new model was developed, that is based on component model, but has additional mechanics to prevent race condition that can happen while using one clock generator with multiple outputs. Article also presents modified model for bootloaders graphics drivers. This model has been simplified over developed Linux model, but also has component nature (with less components) and race prevention mechanics (but with weaker conditions). Hardware interaction driver components that are developed using provided software models are interchangeable between Linux and bootloader.
APA, Harvard, Vancouver, ISO, and other styles
16

Ardiansyah, Muhammad Fahri, Tengku Mohd Diansyah, and Risko Liza. "Penggunaan Set top box Bekas untuk Dimanfaatkan sebagai Cloud Server." Blend Sains Jurnal Teknik 1, no. 2 (September 14, 2022): 88–96. http://dx.doi.org/10.56211/blendsains.v1i2.115.

Full text
Abstract:
The utilization of data storage media is currently very necessary to support the progress process in the digital era as it is today. One of the hardware needed to build personal data storage is HDD. But there are times when users need extra storage space using the internet or using the cloud. However, not all users can afford to rent or build an adequate server for securing personal data storage. Not all users need a server infrastructure that has high specifications to meet their needs. set top box is a device in the single-board computer category that is widely circulated in Indonesia. Set top box devices can be obtained at an affordable price, but can be a server. This research develops data storage based on a samba server application on a set top box device. Testing was done to change the default set top box operating system to the Linux operating system, the results showed that used set top box devices can be used as mini servers, the results of all the tests carried out obtained a result, namely a comparison of RAM and storage usage between the Pulpstone operating system and the system. armbian Linux operation has an increase in total RAM usage. Armbian Linux is greater than Pulpstone RAM usage which has an increase of 7.4% of the total RAM usage of the Pulpstone operating system, and data storage of the armbian Linux operating system has an increase of 74.4% from the data storage of the Pulsptone operating system, so Operating system changes can affect the total usage of RAM and data storage on the operating system used on the set top box device.
APA, Harvard, Vancouver, ISO, and other styles
17

Krivov, Maksim, and Irina Kulakova. "RUN ON DEMAND THE SIMULATION SERVER IN THE LINUX OPERATING SYSTEM." Modern Technologies and Scientific and Technological Progress 1, no. 1 (May 17, 2021): 129–30. http://dx.doi.org/10.36629/2686-9896-2021-1-1-129-130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Eka Pratama, I. Putu Agus, and Anak Agung Bagus Arya Wiradarma. "IMPLEMENTASI KATOOLIN SEBAGAI PENETRASI TOOLS KALI LINUX PADA LINUX UBUNTU 16.04 (STUDI KASUS: REVERSE ENGINEERING FILE .APK)." Jurnal RESISTOR (Rekayasa Sistem Komputer) 1, no. 2 (October 28, 2018): 86–93. http://dx.doi.org/10.31598/jurnalresistor.v1i2.278.

Full text
Abstract:
The Linux Operating System is known for its open-source characteristic which means everyone is free to develop Linux with the use of available source code. The result of Linux development is called Linux distribution (Distro). There are various Linux distributions in accordance with their respective uses, one of them is Kali Linux. Kali Linux is a Linux distro that is developed to penetrate the security of computer systems. Kali Linux uses a variety of tools to perform its functions. However, for users who want to use the functionality of Kali Linux without having to change the Linux distro that has been used, the user can use Katoolin. Katoolin can provide the convenience and flexibility for users who want to use Kali Linux as a special Linux distro for the purpose of penetrating computer system security without having to replace the distro that has been used or do a full install of Kali Linux. One case study that can be solved using the Kali Kali Linux based tool on Katoolin is Reverse Engineering. The case study was solved using one of the tools in the Reverse Engineering category named apktool that available on Katoolin.
APA, Harvard, Vancouver, ISO, and other styles
19

Du, Qin Jun, Chao Sun, and Xing Guo Huang. "Motion Control System Design of a Humanoid Robot Based on Stereo Vision." Applied Mechanics and Materials 55-57 (May 2011): 877–80. http://dx.doi.org/10.4028/www.scientific.net/amm.55-57.877.

Full text
Abstract:
Vision is an important means of the humanoid robot to get external environmental information; vision system is an important part of humanoid robot. The system of a humanoid robot with the functions of visual perception and object manipulation is very complex because the body of the humanoid robot possesses many joint units and sensors. Two computers linked by Memolink communication unit is adopted to meet the needs of real time motion control and visual information processing tasks. The motion control system included coordination control computer, the distributed DSP joint controllers, DC motor drivers and sensors. Linux and real-time RT-Linux OS are used as the operating system to achieve the real-time control capability.
APA, Harvard, Vancouver, ISO, and other styles
20

VALLÉE, GEOFFROY, RENAUD LOTTIAUX, LOUIS RILLING, JEAN-YVES BERTHOU, IVAN DUTKA MALHEN, and CHRISTINE MORIN. "A CASE FOR SINGLE SYSTEM IMAGE CLUSTER OPERATING SYSTEMS: THE KERRIGHED APPROACH." Parallel Processing Letters 13, no. 02 (June 2003): 95–122. http://dx.doi.org/10.1142/s0129626403001185.

Full text
Abstract:
In this paper, we present fundamental mechanisms for global process and memory management in an efficient single system image cluster operating system designed to execute workloads composed of high performance sequential and parallel applications. Their implementation in Kerrighed, our proposed distributed operating system, is composed of a set of Linux modules and a patch of less than 200 lines of code to the Linux kernel. Kerrighed is a unique single system image cluster operating system providing the standard Unix interface as well as distributed OS mechanisms such as load balancing on all cluster nodes. Our support for standard Unix interface includes support for multi-threaded applications and a checkpointing facility for both sequential and shared memory parallel applications. We present an experimental evaluation of the Kerrighed system and demonstrate the feasibility of the single system image approach at the kernel level.
APA, Harvard, Vancouver, ISO, and other styles
21

Suryayusra, Suryayusra, and Dedi Irawan. "PERBANDINGAN INTRUSION PREVENTION SYSTEM (IPS) PADA LINUX UBUNTU DAN LINUX CENTOS." Jurnal Teknologi Informasi Mura 12, no. 02 (November 30, 2020): 131–44. http://dx.doi.org/10.32767/jti.v12i02.1023.

Full text
Abstract:
Perkembangan teknologi yang Semakin hari semakin meningkat, kita di tuntut untuk meningkatkan system keamanan jaringan yang kita miliki, karena semakin mudahnya orang bisa mengetahui tentang hacking dan cracking dan juga didukung oleh tools yang mudah didapatkan secara gratis. Dan untuk mencegah hal itu kita harus megamankan jaringan yang kita gunakan, untuk mengamankan jaringan tersebut peneliti menggunakan sebuah metode keamanan yang bernama Intrusion Prevention System (IPS), merupakan media yang banyak digunakan dalam membangun sebuah system keamanan komputer, lalu IPS di gabungkan dengan menggunkan Teknik firewall dan metode Intrusioan Detection System, dalam penelitian ini penulis menggunakan sistem operasi Linux yaitu Ubuntu dan CentOS, karena linux merupakan software yang bersifat free/opensource sehingga untuk memperolehnya dapat diunduh secara gratis. Pada awalnya linux merupakan system operasi yang cocok untuk jaringan tapi sekarang linux sudah berubah menjadi system operasi yang tidak hanya handal dari segi jaringan dan server tapi juga sudah menjelma menjadi sistem operasi yang enak dipakai di lingkungan desktop baik untuk keperluan pribadi atau bahkan untuk perkantoran. Untuk mengamankan jaringan tersebut menggunakan sebuah mtode keamanan yaitu Intrusion Prevention System (IPS), juga dibantu dengan sebuah tools dalam sistem Operasi Linux yang berfungsi sebagai alat untuk melakukan filter (penyaring) terhadap lalulintas data (trafic), yaitu IPTables. Technological developments are increasing day by day, we are required to improve our network security system, because the easier it is for people to find out about hacking and cracking and it is also supported by tools that are easily available for free. And to prevent that we have to secure the network that we use, to secure the network researchers use a security method called the Intrusion Prevention System (IPS), which is a medium that is widely used in building a computer security system, then IPS is combined with using techniques. firewall and Intrusioan Detection System method, in this study the author uses the Linux operating system, namely Ubuntu and CentOS, because Linux is a free / opensource software so that it can be downloaded for free. Initially, linux was an operating system suitable for networking, but now linux has turned into an operating system that is not only reliable in terms of networks and servers but has also been transformed into an operating system that is comfortable to use in a desktop environment for personal use or even for offices. To secure the network using a security method, namely the Intrusion Prevention System (IPS), it is also assisted by a tool in the Linux operating system which functions as a tool for filtering data traffic, namely IPTables
APA, Harvard, Vancouver, ISO, and other styles
22

Reyhandendra, Bhamana Apta, Idris Mustapha Abdullahi, and Garba Zakariya’u. "Revolutionizing Quranic Education for 4th Grade Student Through Customized Open-Source Operating System." Journal of Novel Engineering Science and Technology 2, no. 02 (April 26, 2023): 40–45. http://dx.doi.org/10.56741/jnest.v2i02.308.

Full text
Abstract:
This study aims to develop an open-source and legal operating system for Quranic education that can be used for teaching the Quran to 4th-grade students using a computer. The operating system display is customized using code commands and Gnome Tweak Tool, and includes themes, shells, icons, fonts, OS logos, backgrounds, booting screens, and multimedia. The IQROS Linux distribution was designed to assist teachers in teaching Quranic lessons to elementary school students, and was evaluated using a questionnaire at a particular elementary school in Indonesia. The study found that the majority of respondents agreed that the color and background design were appropriate, and the use of IQROS Linux was suitable for facilitating religious learning. The software was found to help teachers with their work and increase student interest in learning the Quran, demonstrating the potential of IQROS Linux to enhance religious education in elementary schools. The relevant future resreach is to conduct a longitudinal study to assess the long-term impact of using IQROS Linux on students' Quranic learning outcomes. This could involve tracking students' progress over several years to measure their retention of Quranic knowledge and their ability to apply it in their daily lives.
APA, Harvard, Vancouver, ISO, and other styles
23

Mietielov, Volodymyr, Oleksiі Marusenko, and Oleksandr Baskakov. "DEVELOPMENT OF A TEXT EDITOR FOR UNIX OPERATING SYSTEM." Bulletin of the National Technical University «KhPI» Series: New solutions in modern technologies, no. 4(14) (December 28, 2022): 35–40. http://dx.doi.org/10.20998/2413-4295.2022.04.05.

Full text
Abstract:
The task of developing and implementing a software application for creating, editing, displaying on the screen, as well as saving in the form of files of various formats, which in turn will be used in programming in languages such as C, C++, Python, and the Linux system language – Bash, is being considered. The developed software application is designed to enable the user to interact with files of various extensions, edit and save changes, work with the content of files for further development of software code in languages such as C, C++, Python. The software application can be used both as a console application and with the use of a graphical interface on UNIX and MS Windows operating systems. During development, the UNIX operating system was used, namely the Linux – Ubuntu distribution, which made it possible to use the created text editor on such operating systems as Ubuntu, Linux Mint, Kali Linux, Raspberry Pi Ubuntu. A free cross–platform multimedia package of libraries – SFML was also used, which made it possible to use a text editor on the MS Windows platform. The source code of the SFML library is provided under the ZLIB/PNG Free Software Distribution License. During development, a method of processing input information, as well as saving it in a file of a separate format, was defined and implemented. The following programming languages were used: C, C++11, a convenient software application architecture was developed, which allows you to easily maintain and improve the program in the future. The use of a virtual machine was an integral part of the project. By using a virtual machine, many computer resources are utilized, such as: RAM, number of cores, data storage and discrete desktop acceleration in the desired operating system. A friendly graphical interface for user interaction has been implemented.
APA, Harvard, Vancouver, ISO, and other styles
24

Napitupulu, Willy, and Muhammad Salman. "PERKEMBANGAN SERANGAN TERHADAP WINDOWS DEFENDER UNTUK MENGAMBIL PENGOPERASIAN SISTEM TERINTEGRASI DENGAN HID BADUSB." Jurnal Abdi Insani 11, no. 2 (June 29, 2024): 2117–28. http://dx.doi.org/10.29303/abdiinsani.v11i2.1683.

Full text
Abstract:
The Windows operating system is an operating system that is commonly used by many people. Universal Serial Bus (USB) is a mechanism used by many people with practical plug and play functionality, making data transfer fast and easy compared to other hardware. In its use, Windows has a weakness, namely that it is easy for users to experience exploitation of computers/laptops. There is a method called that makes it possible for someone to plant a reverse shell backdoor and exploit files just by connecting a USB to the target computer without being noticed. This research aims to implement and analyze the impact of attacks carried out by BadUSB . Research was carried out to see whether planting a reverse shell backdoor and exploiting files on the target computer using BadUSB could be done or not. The results obtained were that the backdoor reverse shell test using which was carried out on the Windows operating system was successfully carried out. Keywords: BadUSB, reverse shell, Linux, Programming, Python, Computer, Operation System, , HID usb.
APA, Harvard, Vancouver, ISO, and other styles
25

A, Wiedjaja, Handi M, Jonathan L, Benyamin Christian, and Luis Kristofel. "Kajian dan Implementasi Real Time Operating System pada Single Board Computer Berbasis Arm." ComTech: Computer, Mathematics and Engineering Applications 5, no. 1 (June 30, 2014): 91. http://dx.doi.org/10.21512/comtech.v5i1.2591.

Full text
Abstract:
Operating System is an important software in computer system. For personal and office use the operating system is sufficient. However, to critical mission applications such as nuclear power plants and braking system on the car (auto braking system) which need a high level of reliability, it requires operating system which operates in real time. The study aims to assess the implementation of the Linux-based operating system on a Single Board Computer (SBC) ARM-based, namely Pandaboard ES with the Dual-core ARM Cortex-A9, TI OMAP 4460 type. Research was conducted by the method of implementation of the General Purpose OS Ubuntu 12:04 OMAP4-armhf-RTOS and Linux 3.4.0-rt17 + on PandaBoard ES. Then research compared the latency value of each OS on no-load and with full-load condition. The results obtained show the maximum latency value of RTOS on full load condition is at 45 uS, much smaller than the maximum value of GPOS at full-load at 17.712 uS. The lower value of latency demontrates that the RTOS has ability to run the process in a certain period of time much better than the GPOS.
APA, Harvard, Vancouver, ISO, and other styles
26

Xue, Nian, and Li Wei Jia. "Construction and Research of Virtual Network User File System Based on Upnp and FUSE on Linux." Applied Mechanics and Materials 299 (February 2013): 125–29. http://dx.doi.org/10.4028/www.scientific.net/amm.299.125.

Full text
Abstract:
The Development of the computer has been from a single machine to the server, and then server clustering technology, and the emerging "cloud" network, which invariably show the network's role in the computer. Meanwhile, more and more high-end hardware trash or the users may be unbearable of high cost of servers, so the use of existing resources and integration of resources has become increasingly important. This paper will detail a virtual network file system, which based on Upnp (Universal Plug and Play) and FUSE (File system in Usese Space) in Linux operating system. In this study, users can share a computer terminal to collect and use that particular computer terminal on the network to all the resources users are interested in, provided that the shared computer terminals must be installed on a specific Upnp device. In this study, we have successfully implemented single-device-side and single-device-side multithread communication under the Linux or windows operating system.
APA, Harvard, Vancouver, ISO, and other styles
27

Budiharto, Widodo. "Implementasi dan Evaluasi Penerapan Globus Toolkit untuk Aplikasi Grid Computing." ComTech: Computer, Mathematics and Engineering Applications 3, no. 1 (June 1, 2012): 695. http://dx.doi.org/10.21512/comtech.v3i1.2469.

Full text
Abstract:
Grid computing is a distributed computing technology that utilizes resources connected through a free computer network, yet coordinated with a specific mechanism. The development of grid computing infrastructure is not easy because it takes skill and experience in the installation and configuration of both Linux-based and open source program. In this study, the author built a grid computing infrastructure based on Debian 4, and used Globus Toolkit 4.1.2 on three computers. The WSRF technology was tried to run as an indication that the grid infrastructure has been successfully built. Based on some experiments in this study, grid computing can run well on the three computers with a user interface of web-based grid system using the UCLA Grid Portal. Overall the system runs fine, but it requires high experiences and comprehensions upon the Linux operating systems as well as computer networks in the installation process.
APA, Harvard, Vancouver, ISO, and other styles
28

Ariyanto, Yuri, Budi Harijanto, Yan Watequlis S., Awan Setiawan, and Erfan Rohadi. "Use of Virtualization Technology for Linux Firewall Implementation in Teaching Computer Network." International Journal of Engineering & Technology 7, no. 4.44 (December 1, 2018): 237. http://dx.doi.org/10.14419/ijet.v7i4.44.26998.

Full text
Abstract:
This paper describes the use of virtualization technology in the linux network teaching process in linux firewall implementation. The problem that is often faced by teacher and student is the limitation of computer devices in implementing network topology design. The use of virtualization technology can be used as a device to create a virtual network laboratory, which is an implementation of real laboratories and network simulation software that is useful to explain the concept of computer network management. With this in mind, it can provide an overview of project characteristics, especially the implementation of linux networks in the area of virtualization technology. Linux network virtualization implementation to help the teaching process used netkit. Netkit can be used as a linux network simulation, where each virtual machine host has a linux operating system, and can implement a computer network based on the design of a real network topology. The method used to implement the Linux firewall by creating a virtual laboratory, where virtual laboratories are built based on the real network topology design. Testing is done on a virtual laboratory by implementing a network topology design and running based on a test scenario.
APA, Harvard, Vancouver, ISO, and other styles
29

Antoni, Antoni, and Heru Sukoco. "Penerapan Teknik Penarikan Contoh Kuota untuk Penentuan Paket Aplikasi pada Distro IPB Linux Operating System." Jurnal Ilmu Komputer dan Agri-Informatika 2, no. 2 (November 1, 2013): 55. http://dx.doi.org/10.29244/jika.2.2.55-63.

Full text
Abstract:
<p>Penerapan lisensi GNU General Public License (GPL) menyebabkan munculnya berbagai sistem operasi berbasis GNU/Linux. Hal ini dikarenakan banyak perusahaan, masyarakat umum, dan komunitas tertentu yang mengembangkan pemaketan aplikasi (distro) Linux sesuai dengan kebutuhan masing-masing. Distro IPB Linux Operating System (ILOS) 2013 merupakan sistem operasi GNU/Linux yang dikembangkan untuk menunjang kebutuhan perangkat lunak mahasiswa Institut Pertanian Bogor (IPB). ILOS 2013 dibangun menggunakan metode remastering menggunakan distro Ubuntu 12.04.2 LTS sebagai distribusi induk. Mahasiswa IPB memiliki karakteristik yang heterogen dan terdiri atas beberapa kompetensi keilmuan yang berbeda. Oleh karena itu, dalam penelitian ini dilakukan survei dengan metode penarikan contoh kuota. Survei yang dilakukan melibatkan 100 mahasiswa dari semua jurusan di IPB untuk menentukan kebutuhan perangkat lunak bagi mahasiswa IPB. Berdasarkan hasil pengolahan data survei, paket distro ILOS meliputi 38 aplikasi yang terdiri atas 5 aplikasi untuk kebutuhan sains, 7 aplikasi perkantoran, 5 aplikasi pemrograman, 3 aplikasi manajemen basisdata, 2 aplikasi jaringan, 1 aplikasi sistem informasi geografis (SIG), 5 aplikasi computer aided design (CAD) dan desain grafis, 6 aplikasi internet, 3 aplikasi multimedia dan 1 aplikasi utilitas telah dipaketkan pada distro ILOS 2013 untuk memenuhi kebutuhan mahasiswa IPB. Seluruh aplikasi dipaketkan dalam bentuk DVD Installer ILOS 2013.</p><p>Kata kunci: GNU/Linux, ILOS, penarikan contoh kuota, remastering, Ubuntu.</p>
APA, Harvard, Vancouver, ISO, and other styles
30

Zailani, Achmad Udin, Alvino Octaviano, and Sholihin Sholihin. "DESIGN OF COMPUTER REPAIR SERVICES APPLICATION ANDROID-BASED." TEKNOKOM 4, no. 1 (June 10, 2021): 7–15. http://dx.doi.org/10.31943/teknokom.v4i1.58.

Full text
Abstract:
Computers are one form of advances in electronic and informatics technology; the function of the computer itself serves as a tool for writing, drawing, editing images or photographs, or as a means of storage. Android, a Linux-based operating system, is a smart operating system that can compete with operating systems on a computer. Some of the problems identified include user difficulties in overcoming computer damage to determine whether to repair or buy a new unit, difficulty in reaching authorized service providers, risks when deciding to repair at a public service place, and limited access to information and costs repairing computer damage. This research specifically designs an Android application-based computer service application that makes it easier for people to get service services. The above research results formulate computer repair services using an Android-based platform with Android Studio and MySQL as the database for this study. This application is expected to be useful for customers in terms of time and cost.
APA, Harvard, Vancouver, ISO, and other styles
31

Djordjevic-Kajan, S., Dragan Stojanovic, and Aleksandar Stanimirovic. "Advanced System Software curricula." Facta universitatis - series: Electronics and Energetics 18, no. 2 (2005): 309–17. http://dx.doi.org/10.2298/fuee0502309d.

Full text
Abstract:
An advanced System Software curricula at the Faculty of Electronic Engineering in Nis is presented in this paper. The system software track consists of two important themes of Computer Science and Computing in General organized now as two separated courses: Operating Systems course and System Software Development and System Programming course. Both courses offer extensive teaching of foundational concepts and principles of Operating Systems and System Programming along with design and implementation of presented topics in real operating systems and system software, such as Unix, Linux and Windows 2000/XP. Laboratory environments and exercises for both courses offer both examination of main algorithms and structures within operating systems and system software through simulation, and what is more important, hands-on experience with operating system internals and code.
APA, Harvard, Vancouver, ISO, and other styles
32

Phillips, Dave. "Computer Music and the Linux Operating System: A Report from the Front." Computer Music Journal 27, no. 4 (December 2003): 27–42. http://dx.doi.org/10.1162/014892603322730488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Ramos‐Cabrer, Manuel, José Juan Pazos‐Arias, Martín López‐Nores, Alberto Gil‐Solla, and Yolanda Blanco‐Fernández. "Experiences from turning Linux into an instructional operating system." Computer Applications in Engineering Education 28, no. 5 (June 14, 2020): 1128–36. http://dx.doi.org/10.1002/cae.22288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Bhurtel, Manish, and Danda B. Rawat. "Unveiling the Landscape of Operating System Vulnerabilities." Future Internet 15, no. 7 (July 24, 2023): 248. http://dx.doi.org/10.3390/fi15070248.

Full text
Abstract:
Operating systems play a crucial role in computer systems, serving as the fundamental infrastructure that supports a wide range of applications and services. However, they are also prime targets for malicious actors seeking to exploit vulnerabilities and compromise system security. This is a crucial area that requires active research; however, OS vulnerabilities have not been actively studied in recent years. Therefore, we conduct a comprehensive analysis of OS vulnerabilities, aiming to enhance the understanding of their trends, severity, and common weaknesses. Our research methodology encompasses data preparation, sampling of vulnerable OS categories and versions, and an in-depth analysis of trends, severity levels, and types of OS vulnerabilities. We scrape the high-level data from reliable and recognized sources to generate two refined OS vulnerability datasets: one for OS categories and another for OS versions. Our study reveals the susceptibility of popular operating systems such as Windows, Windows Server, Debian Linux, and Mac OS. Specifically, Windows 10, Windows 11, Android (v11.0, v12.0, v13.0), Windows Server 2012, Debian Linux (v10.0, v11.0), Fedora 37, and HarmonyOS 2, are identified as the most vulnerable OS versions in recent years (2021–2022). Notably, these vulnerabilities exhibit a high severity, with maximum CVSS scores falling into the 7–8 and 9–10 range. Common vulnerability types, including CWE-119, CWE-20, CWE-200, and CWE-787, are prevalent in these OSs and require specific attention from OS vendors. The findings on trends, severity, and types of OS vulnerabilities from this research will serve as a valuable resource for vendors, security professionals, and end-users, empowering them to enhance OS security measures, prioritize vulnerability management efforts, and make informed decisions to mitigate risks associated with these vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
35

Riadi, Imam, Rusydi Umar, and Andi Sugandi. "Web Forensic on Container Services Using Grr Rapid Response Framework." Scientific Journal of Informatics 7, no. 1 (June 5, 2020): 33–42. http://dx.doi.org/10.15294/sji.v7i1.18299.

Full text
Abstract:
Cybercrime on Internet that keeps increasing does not only take place in the environment that running web applications traditionally under operating system, but also web applications that are running in more advance environment like container service. Docker is a currently popular container service in Linux operating system needs to be secured and implements incident response mechanisme that will investigate web server that was attacked by DDoS in fast, valid, and comprehesive way. This paper discusses the investigation using Grr Rapid Response framework on web server that was attacked by DDoS running in container service on Linux operating system, and the attacker using Windows oprating system that runs DDos script. This research has succesfully investigated digital evidence in the form of log file from web server running on container service and digital evidence through netstat on Windows computer.
APA, Harvard, Vancouver, ISO, and other styles
36

Hidayat, Muh Adrian Juniarta, and Hadian Mandala Putra. "Sistem Keamanan Server Linux CentOS Dengan Metode Port Knock dan RST Cookies." Infotek : Jurnal Informatika dan Teknologi 6, no. 2 (July 20, 2023): 411–20. http://dx.doi.org/10.29408/jit.v6i2.17500.

Full text
Abstract:
The increase in online-based services makes a security system for server computers increasingly needed. A server computer is a device that must always be available to be accessed anytime and anywhere. Some of the security systems needed for server computers include security for ssh port access for remote server access needs and a security system to protect servers from Denial of Service (DoS) attacks which can make the server down and completely inaccessible. In this study, a security system is proposed for a server computer with the Linux CentOS operating system on a port 22 secure shell(ssh) access system using the port knock method and a security system to prevent Denial of Service (DoS) attacks on server computers using the RST Cookies method. The simulation results from the port 22 Secure Shell (SSH) access experiment for the server computer can work well where port 22 Secure Shell(SSH) will remain closed and cannot be accessed carelessly except by accessing several ports first according to predefined port knocking rules. Likewise, the implementation of a security system with the RST Cookies method works very well to prevent Denial of Service (DoS) attacks and can still keep the server accessible with a good response time of under 1 ms
APA, Harvard, Vancouver, ISO, and other styles
37

Ruff, Matt, and Nicklaus A. Giacobe. "Leveraging Browser-Based Virtual Machines to Teach Operating System Fundamentals." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (March 8, 2022): 7. http://dx.doi.org/10.53735/cisse.v9i1.150.

Full text
Abstract:
In this paper, we identify challenges in delivering cybersecurity labs, including the overhead costs of delivering virtual machines to students. We propose instead to use JavaScript driven Browser-Based Virtual Machines (BBVMs) to overcome the challenges of Type I and II hypervisors, as well as vendor- specific cybersecurity lab ranges. BBVMs deliver configured VMs at lower cost to the student’s web browser and are much easier for students to use. BBVMs require no hardware or infrastructure for students besides an Internet-connected device. As such, labs delivery via BBVMs can be run on mobile phones, tablets, or computers with limited resources. With this in mind, the authors detail BBVM implementation for cybersecurity labs. With very little physical infrastructure, programming, and systems administration, an educational institution at any level may implement a cybersecurity lab in such an environment. Our examples focus on addressing learning the Linux command line, introducing different Linux commands, and deepen student understanding of the Linux operating system itself. We combine BBVMs with previous work to address configuration, repeatability, assessment, academic integrity/cheating, and other similar constraints using our polymorphic configuration methodology called PolyLab. Lastly, we include a step-by-step procedure to implement BBVMs and show use-cases for cybersecurity education.
APA, Harvard, Vancouver, ISO, and other styles
38

Sivaji, Chinnasami, M. Ramachandran, and Chandrasekar Raja. "Preference Analysis of Operating System Using PROMETHEE Method." 1 1, no. 1 (December 1, 2022): 1–8. http://dx.doi.org/10.46632/jeae/1/1/1.

Full text
Abstract:
The operating system is computer software. User communication between the computer and the operating system takes place with the help of Windows, Linux, and Android, which are examples of operating systems that manage all other applications on a computer boot program. Application programs make limited application requests for services through the program interface using the operating system's API. The ROMETHEE method assumes that the weights of the criteria are already known, and this is a rigorous assumption. Furthermore, with the increase in the number of criteria, the complexity of the problem increases exponentially. We used ROMETHEE for ranking the priority of the ranking system for enrichment estimation. The ROMETHEE method is the most ideal solution for short-distance and alternative solutions, but the comparison of these distances does not consider importance. We evaluated Operating system 1, Operating system 2, Operating system 3, Operating system 4, and Operating system 5 based on memory management, process management, storage management, protection and security, and software features. After analyzing the results, it was found that Operating system 4 obtained the first rank, whereas Operating system 1 had the lowest rank.
APA, Harvard, Vancouver, ISO, and other styles
39

CHERUBIN, Szymon, Wojciech KACZMAREK, and Natalia DANIEL. "Autonomous Robot Project Based on the Robot Operating System Platform." Problems of Mechatronics Armament Aviation Safety Engineering 13, no. 4 (December 30, 2022): 85–108. http://dx.doi.org/10.5604/01.3001.0016.1462.

Full text
Abstract:
This article presents the concept of an autonomous mobile robot running on the ROS system and using advanced algorithms for 2D map generation and autonomous navigation. The authors focused on presenting the hardware platform, the Linux-based software and the Robot Operating System (ROS) platform. This article also introduces an algorithm that provides the generation of a 2D map of the surroundings, autonomous robot driving and remote control of the device. Measurements of the temperature of the computer helped in the decision on which cooling system to use.
APA, Harvard, Vancouver, ISO, and other styles
40

Canbaz, Seçkin, and Gökhan Erdemir. "Performance analysis of real-time and general-purpose operating systems for path planning of the multi-robot systems." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 1 (February 1, 2022): 285. http://dx.doi.org/10.11591/ijece.v12i1.pp285-292.

Full text
Abstract:
In general, modern operating systems can be divided into two essential parts, real-time operating systems (RTOS) and general-purpose operating systems (GPOS). The main difference between GPOS and RTOS is the system istime-critical or not. It means that; in GPOS, a high-priority thread cannot preempt a kernel call. But, in RTOS, a low-priority task is preempted by a high-priority task if necessary, even if it’s executing a kernel call. Most Linux distributions can be used as both GPOS and RTOS with kernel modifications. In this study, two Linux distributions, Ubuntu and Pardus, were analyzed and their performances were compared both as GPOS and RTOS for path planning of the multi-robot systems. Robot groups with different numbers of members were used to perform the path tracking tasks using both Ubuntu and Pardus as GPOS and RTOS. In this way, both the performance of two different Linux distributions in robotic applications were observed and compared in two forms, GPOS, and RTOS.
APA, Harvard, Vancouver, ISO, and other styles
41

Fei, Guang Lei, Jian Guo Ning, and Tian Bao Ma. "Study on the Numerical Simulation of Explosion and Impact Processes Using PC Cluster System." Advanced Materials Research 433-440 (January 2012): 2892–98. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.2892.

Full text
Abstract:
Parallel computing has been applied in many fields, and the parallel computing platform system, PC cluster based on MPI (Message Passing Interface) library under Linux operating system is a cost-effectiveness approach to parallel compute. In this paper, the key algorithm of parallel program of explosion and impact is presented. The techniques of solving data dependence and realizing communication between subdomain are proposed. From the test of program, the portability of MMIC-3D parallel program is satisfied, and compared with the single computer, PC cluster can improve the calculation speed and enlarge the scale greatly.
APA, Harvard, Vancouver, ISO, and other styles
42

Arnaudov, Rumen, and Ivo Dochev. "Functional generator controlled by internet." Facta universitatis - series: Electronics and Energetics 16, no. 1 (2003): 93–102. http://dx.doi.org/10.2298/fuee0301093a.

Full text
Abstract:
This paper presents a functional generator controlled by Internet. We describe a computer-system architecture, a block diagram of generator and working algorithms. The remote control is realized by computer networks and using the TCP/IP protocols. For that purpose is used "Customer-Server" architecture. The software algorithms is based on Linux operating system Apache web server, MySql database, HTML and PHP languages.
APA, Harvard, Vancouver, ISO, and other styles
43

Kim, Hee-Woong, Hock Chuan Chan, and So-Hyun Lee. "User Resistance to Software Migration." Journal of Database Management 25, no. 1 (January 2014): 59–79. http://dx.doi.org/10.4018/jdm.2014010103.

Full text
Abstract:
The demand for software has increased rapidly in the global industrial environment. Open source software (OSS) has exerted significant impact on the software industry. Large amounts of resources and effort have been devoted to the development of OSS such as Linux. Based on the technology adoption model (TAM), the development of Linux as the most well-known OSS with a graphical user interface designed for ease of use and a wide range of functionalities is expected to result in high levels of Linux adoption by individual users. Linux, however, currently controls about 1% of the operating system market for personal computers. The resistance of users to switch to a new operating system remains one of the major obstacles to widespread adoption of Linux among individual users. Based on the integration of the equity implementation model and the TAM, this study examines the formation of user resistance, as well as the effects of user resistance, on the migration to Linux for personal computers. This study discusses the role and effect of user resistance based on the equity implementation model in comparison with the two main determinants in the TAM. This study contributes to the advancement of theoretical understanding of Linux migration and user resistance. The findings also offer suggestions for software communities and practitioners, of OSS in particular, to promote the use of new software by individual users.
APA, Harvard, Vancouver, ISO, and other styles
44

SeungJu Jang. "Kernel Hardening by Recovering Kernel Stack Frame in Linux Operating System." International Journal of Advancements in Computing Technology 1, no. 1 (September 30, 2009): 64–69. http://dx.doi.org/10.4156/ijact.vol1.issue1.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Yue, Feng, Junchao Wang, Jinlong Xu, and Xiangli Feng. "Scenario-based design for teaching Linux OS operations and maintenance." Advances in Education, Humanities and Social Science Research 2, no. 1 (September 20, 2022): 202. http://dx.doi.org/10.56028/aehssr.2.1.202.

Full text
Abstract:
Linux operating system operation and maintenance is an important basic course for computer science majors in specialist and vocational education, and basic system administration commands are an important part of the course content. A scenario-based approach to teaching system management commands has been designed to address common problems such as difficulty in remembering, confusion and parameter confusion when students are faced with a large number of commands and parameters. By condensing a number of typical scenarios, students can better remember and differentiate commands and remember parameters through scenarios. The results of the course show that the scenario-based teaching method is easy to understand, rich and interesting, and facilitates students to learn better.
APA, Harvard, Vancouver, ISO, and other styles
46

Yue, Feng, Junchao Wang, Jinlong Xu, and Xiangli Feng. "Scenario-based design for teaching Linux OS operations and maintenance." Advances in Education, Humanities and Social Science Research 1, no. 2 (September 20, 2022): 202. http://dx.doi.org/10.56028/aehssr.1.2.202.

Full text
Abstract:
Linux operating system operation and maintenance is an important basic course for computer science majors in specialist and vocational education, and basic system administration commands are an important part of the course content. A scenario-based approach to teaching system management commands has been designed to address common problems such as difficulty in remembering, confusion and parameter confusion when students are faced with a large number of commands and parameters. By condensing a number of typical scenarios, students can better remember and differentiate commands and remember parameters through scenarios. The results of the course show that the scenario-based teaching method is easy to understand, rich and interesting, and facilitates students to learn better.
APA, Harvard, Vancouver, ISO, and other styles
47

Ben Yehuda, Raz, Michael Kiperberg, and Nezer Jacob Zaidenberg. "Nanovised Control Flow Attestation." Applied Sciences 12, no. 5 (March 4, 2022): 2669. http://dx.doi.org/10.3390/app12052669.

Full text
Abstract:
This paper presents an improvement of control flow attestation (C-FLAT) for Linux. C-FLAT is a control attestation system for embedded devices. It was implemented as a software executing in ARM’s TrustZone on bare-metal devices. We extend the design and implementation of C-FLAT through the use of a type 2 Nanovisor in the Linux operating system. We call our improved system “C-FLAT Linux”. Compared to the original C-FLAT, C-FLAT Linux reduces processing overheads and is able to detect the SlowLoris attack. We describe the architecture of C-FLAT Linux and provide extensive measurements of its performance in benchmarks and real-world scenarios. In addition, we demonstrate the detection of the SlowLoris attack on the Apache web server.
APA, Harvard, Vancouver, ISO, and other styles
48

Shi, Q., LJ Chen, and Z. Qiao. "A Measuring Tool for Interrupt Latency Based on Linux." Journal of Physics: Conference Series 2476, no. 1 (April 1, 2023): 012050. http://dx.doi.org/10.1088/1742-6596/2476/1/012050.

Full text
Abstract:
Abstract Linux has been used more and more in the field of industrial control and robot control, the non-real-time nature of the final human-computer interaction program may cause system performance impact in industrial production. Interrupt response time is an important indicator to measure the real-time performance of real-time operating systems. Accurate test data can be used as an evaluation index for selecting the real-time performance of the operating system. In order to improve the real-time performance of Linux, analyze real-time problems, and solve possible real-time bottlenecks, this paper designs a probe-type tool that can measure the interrupt response time, output the interrupt call stack, and analyze the reasons for high interrupts. By optimizing specific limited and high-latency paths, Linux can still maintain an acceptable range of latency for a long time under various high-load scenarios. After testing, the tool has good measurement accuracy, which provides a basis for developing real-time tasks and solving real-time problems.
APA, Harvard, Vancouver, ISO, and other styles
49

Chyhin, V. "Creation of computer facilities for controlling an autonomous aircraft with the use of remote cloud calculations." Computer systems and network 3, no. 1 (December 10, 2021): 106–13. http://dx.doi.org/10.23939/csn2021.01.106.

Full text
Abstract:
The possibility of creating a computer control system for an unmanned aerial vehicle using remote cloud computing according to predefined scenarios from the user's desktop is investigated. For this, an experimental setup was created, which includes a quadcopter, a personal computer with the Windows operating system, an on-board computer Raspberry-3 with the Linux operating system, a Pi Camera V2 camcorder, and a Pixhawk autopilot. To model the control and transmission of video images the own control programs and photo pursuit on a computer Raspberry-3 in Python are recorded. Based on the obtained results, a model of unmanned aerial vehicle control from the desktop of the user's personal computer via the on-board computer without the use of a standard control panel and operator is proposed.
APA, Harvard, Vancouver, ISO, and other styles
50

Nedyalkov, Ivan. "Study the Level of Network Security and Penetration Tests on Power Electronic Device." Computers 13, no. 3 (March 19, 2024): 81. http://dx.doi.org/10.3390/computers13030081.

Full text
Abstract:
This work demonstrates the feasibility of using Kali Linux in the process of power electronic device research. The novelty in this work is the use of Kali Linux in the process of power electronic device research. This operating system is mainly used for the penetration testing of various communication devices but not for power electronic device research. The aim of this work is to study the level of network security (the type of security vulnerabilities that a power electronic device has) and whether the data exchange between the power electronic device and the monitoring and control center is secure. Additionally, penetration testing has been carried out. Kali Linux was used to implement these tasks. Penetration testing was performed to verify how the studied power electronic device reacted to various TCP DoS attacks—could it be accessed, was it blocked, etc. Kali Linux and some of the tools built into the operating system—Nmap, hping3, Wireshark, Burp Suite Community Edition—were used for this study. During the penetration tests, a characterization of the traffic being processed/generated by the studied power electronic device was carried out to evaluate and analyze what impact each TCP DoS attack had on the device’s performance. In order to conduct the study, an experimental setup was designed. This experimental network was not connected to other networks, so the cyber attacks were controlled and confined within the experimental network. The research carried out validated the use of Kali Linux for the study of power electronic devices. From the obtained results, it is found that the studied power electronic device provides a certain level of network security, but the data exchange is insecure.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography