To see the other types of publications on this topic, follow the link: Operating systems (Computer file).

Journal articles on the topic 'Operating systems (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Operating systems (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ochilov, Nizomiddin. "Creating Secure File Systems in Open-Source Operating Systems." WSEAS TRANSACTIONS ON SYSTEMS 21 (November 24, 2022): 221–32. http://dx.doi.org/10.37394/23202.2022.21.24.

Full text
Abstract:
The relevance of this study is determined by insecure data storage on personal computers, as it is the main operating system that performs authentication and file access control. Bypassing these security rules is possible in case of using another open-source operating system on the same personal computer. The aim of this work is the research and development of file encryptors, disk encryptors and file system encryptors. Each of them has its shortcomings which manifest themselves during development. Combining the advantages of file encryptors and file system encryptors helped to overcome those
APA, Harvard, Vancouver, ISO, and other styles
2

Tejaswini, K. "Cross-Platform File Explore with NW.JS." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 500–504. http://dx.doi.org/10.22214/ijraset.2021.34950.

Full text
Abstract:
Our typical desktop file explorer applications are written in high-level programming languages and frameworks. Those apps are depending on the operating system. It can only operate on one operating system at a time. Windows&, for example, has My Computer, Windows 10 has This PC, Ubuntu has Files, and so on. Any web browser will not be able to operate this old file explorer desktop programme. This file explorer is a desktop application written in NW.js that runs on any platform. The application is created using Web-based programming languages. HTML, CSS, and JavaScript are examples of basic
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Hui, Hanxing Xue, and Hui Lu. "A Sensitive File Abnormal Access Detection Method Based on Application Classification." Security and Communication Networks 2021 (March 13, 2021): 1–7. http://dx.doi.org/10.1155/2021/6684456.

Full text
Abstract:
As the access control mode of notepad files cannot meet the requirements of risk control for sensitive file hierarchical access, this paper proposes an application classification-based detection method for abnormal access to sensitive files. The application classification and file classification, access control policy mapping, and basic and preset policy detection are designed. Combining the operating system’s identification control of different applications at runtime, we monitor the abnormal access of sensitive files by hierarchical applications. The cross-access experiment of different leve
APA, Harvard, Vancouver, ISO, and other styles
4

Hijrah Hijriah, Milka Afifah Rahmatillah, and Zaehol Fatah. "TINJAUAN SISTEM OPERASI FUNGSI DAN IMPLEMENTASINYA DALAM KOMPUTER PRIBADI." Jurnal Padamu Negeri 2, no. 3 (2025): 126–30. https://doi.org/10.69714/mcsj5n27.

Full text
Abstract:
An operating system is a core component of a personal computer that acts as a bridge between hardware and software, and allows users to interact with the system efficiently. This article presents a comprehensive overview of the basic functions of an operating system, such as process management, memory management, device management, and file systems, and how these functions are implemented in various types of personal computers. The discussion includes the evolution of operating systems over time, the underlying basic architecture, and a comparison of implementations between popular operating s
APA, Harvard, Vancouver, ISO, and other styles
5

Kusumaningrum, Anggraini. "PENGUJIAN KINERJA JARINGAN SISTEM AKSES FILE BERBASIS CLIENT SERVER MENGGUNAKAN SAMBA SERVER." Conference SENATIK STT Adisutjipto Yogyakarta 2 (November 15, 2016): 129. http://dx.doi.org/10.28989/senatik.v2i0.31.

Full text
Abstract:
Data communication is the process of exchanging data between two or more devices through a transmission medium such as a cable. In order for the data communication can occur, the device must be connected to communicate with each other or be a part of a communication system consisting of hardware (hardware) and software (software). Samba server is a software bridge between the two operating systems that run within a computer network. Samba is able to share files with computers that use operating system linux, unix and windows with a peer to peer system. The time needed on the LAN network access
APA, Harvard, Vancouver, ISO, and other styles
6

Wijaya, Wahyu, Febriyanti Panjaitan, Syahril Rizal, and Maria Ulfa. "Perbandingan Kinerja Sistem Operasi Network Attached Storage: Studi Kasus Truenas dan Xigmanas." Jurnal Indonesia : Manajemen Informatika dan Komunikasi 5, no. 1 (2024): 255–61. http://dx.doi.org/10.35870/jimik.v5i1.468.

Full text
Abstract:
Network Attached Storage (NAS) is a data storage device that operates through a computer network and provides an efficient and cost-effective storage solution due to its open-source foundation. This research compares the performance of TrueNAS and XigmaNAS as NAS operating systems in terms of data transfer speed and resource utilization over a period of 7 days. The tested parameters include file copy, file classification, file duplicate detection, CPU usage, and memory usage. The research results indicate that the average file transfer speed from server to client in TrueNAS is 7.4 Mbps, while
APA, Harvard, Vancouver, ISO, and other styles
7

Han, Sung-Hwa, and Daesung Lee. "Kernel-Based Real-Time File Access Monitoring Structure for Detecting Malware Activity." Electronics 11, no. 12 (2022): 1871. http://dx.doi.org/10.3390/electronics11121871.

Full text
Abstract:
Obfuscation and cryptography technologies are applied to malware to make the detection of malware through intrusion prevention systems (IPSs), intrusion detection systems (IDSs), and antiviruses difficult. To address this problem, the security requirements for post-detection and proper response are presented, with emphasis on the real-time file access monitoring function. However, current operating systems provide only file access control techniques, such as SELinux (version 2.6, Red Hat, Raleigh, NC, USA) and AppArmor (version 2.5, Immunix, Portland, OR, USA), to protect system files and do n
APA, Harvard, Vancouver, ISO, and other styles
8

Buryta, Michał, and Piotr Kopniak. "Comparison of the security mechanisms of popular operating systems for mobile devices." Journal of Computer Sciences Institute 4 (September 30, 2017): 87–91. http://dx.doi.org/10.35784/jcsi.599.

Full text
Abstract:
The article concerns the differences in the mechanisms of securing the three most popular mobile platforms, which are Android, iOS and Windows Phone. Mainly focuses on the differences related to access to user data, installing and running applications, Internet access, network connectivity, cloud services, backup, file encryption capabilities, the use of electronic signatures and connect the device to your computer.
APA, Harvard, Vancouver, ISO, and other styles
9

AL-HANANI, ALI, and VENUS W. SAMAWI. "virus Detection Using Cryptography Algorithm." Iraqi Journal for Computers and Informatics 27, no. 1 (1996): 8–15. http://dx.doi.org/10.25195/ijci.v27i1.220.

Full text
Abstract:
Many papers have been published about manipulating computer viruses; instructions that impact a computer system and after a period of incubation and reproducion, activate and demonstrate their presence. mest Viruses were designed to attack microcomputers, sincce microcomputers are widely used nowadays, and have simple operating systems which result in lack of quality of their security systern. Connecting computers with networks and using copies of programs from unreliable sources such as bullet in board systems will increase the :of viral contact and the spread of viruses. Data Encryption disg
APA, Harvard, Vancouver, ISO, and other styles
10

Abdalla, Rawand Raouf, and Alaa Khalil Jumaa. "Log File Analysis Based on Machine Learning: A Survey." UHD Journal of Science and Technology 6, no. 2 (2022): 77–84. http://dx.doi.org/10.21928/uhdjst.v6n2y2022.pp77-84.

Full text
Abstract:
In the past few years, software monitoring and log analysis become very interesting topics because it supports developers during software developing, identify problems with software systems and solving some of security issues. A log file is a computer-generated data file which provides information on use patterns, activities, and processes occurring within an operating system, application, server, or other devices. The traditional manual log inspection and analysis became impractical and almost impossible due logs’ nature as unstructured, to address this challenge, Machine Learning (ML) is reg
APA, Harvard, Vancouver, ISO, and other styles
11

Kuznetsov, Anton I. "Digital diagnostics: A computer application for lymph node metastases in cervical cancer." Digital Diagnostics 4, no. 1S (2023): 79–80. http://dx.doi.org/10.17816/dd430351.

Full text
Abstract:
BACKGROUND: Since 2020, staging accuracy improvements in cervical cancer (CC) revealed that major errors occur due to missed metastases to regional lymph nodes. The presence or absence of metastases seriously affects the staging of cancer and, consequently, its treatment methods, since metastases make cancer inoperable.
 AIM: To develop an application to help the doctor in predicting metastases to regional lymph nodes in CC, with the ability of installing on any personal computer regardless of the operating system (Windows, Linux, or Mac OS) and saving data about the patients.
 METHO
APA, Harvard, Vancouver, ISO, and other styles
12

Wójtowicz, Bartłomiej, and Norbert Wójcik. "The evolution of Microsoft Windows operating systems after 2001." Journal of Computer Sciences Institute 32 (September 30, 2024): 186–93. http://dx.doi.org/10.35784/jcsi.6244.

Full text
Abstract:
The purpose of this article is to present the most important changes that occurred with the release of successive versions of Windows after 2001 and to compare Windows XP, Windows 7, Windows 10, Windows 11 in terms of performance, resource consumption, speed of file operations and usability of the graphical user interface. For this purpose, research scenarios were prepared to enable for reliable testing, two computer workstations were prepared to install the operating systems under study, and research experiments were conducted. The results of the research were presented graphically and analyz
APA, Harvard, Vancouver, ISO, and other styles
13

Zhang, Lan, Min Yuan, Tao Liu, Li Wang, and Peng Gao. "Research on Program Calling and File Sharing between Windows and Linux." Applied Mechanics and Materials 214 (November 2012): 721–24. http://dx.doi.org/10.4028/www.scientific.net/amm.214.721.

Full text
Abstract:
There is often more than one kind of operating systems in enterprises’ and organizations’ local area network. Therefore, exchanging visits under different operating systems would be very meaningful and important. Especially in the field of bioinformatics, in order to meet the requirements of researchers from various disciplines, such as mathematics, biology and computer science, we develop a new, intuitive and convenient system for exchanging resources between Windows and Linux.
APA, Harvard, Vancouver, ISO, and other styles
14

Adavi, Krishna Akhil Kumar, and Amelia Acker. "What is a File on a Phone? Personal Information Management Practices Amongst WhatsApp Users." Proceedings of the ACM on Human-Computer Interaction 7, CSCW2 (2023): 1–28. http://dx.doi.org/10.1145/3610221.

Full text
Abstract:
The file, as a means of sharing structured information across time and place, has spanned centuries of ICTs. Despite much CSCW research on file management practices in organizational desktop computing settings, little research has examined how files are managed and shared using mobile devices. Our research asks, how do mobile phones and mobile applications impact the personal information management (PIM) practices involving files for young adults? In this interview and task observation study, we examined the file management practices of mobile phone users (N=25), both Android and iOS owners wh
APA, Harvard, Vancouver, ISO, and other styles
15

Meng, Yizhou. "Design of an image processing system for heterogeneous computer architectures." Applied and Computational Engineering 67, no. 1 (2024): 330–47. http://dx.doi.org/10.54254/2755-2721/67/20240623.

Full text
Abstract:
Embedded real-time image processing systems are widely applied in various fields, enhancing visual experience and making life more convenient. With the development of embedded processors and operating systems, as well as in-depth research into image processing algorithms, the effects and speed of image processing have been significantly improved. This paper proposes an embedded image processing system design based on the current technological developments, centered around the Zybo processor. This includes a collaborative hardware and software design, specific hardware circuit design, and the d
APA, Harvard, Vancouver, ISO, and other styles
16

Ju, Hanji, Jie Wang, Enguo Zhu, Xiaoli Zhang, and Feng Zheng. "Design Scheme of a Docker Container File Isolation against Computer Virus Spreading." Mathematical Problems in Engineering 2022 (March 28, 2022): 1–6. http://dx.doi.org/10.1155/2022/5348370.

Full text
Abstract:
With the spread of computers and Internet of Things, the destructive power of viruses gradually becomes stronger, which threaten the daily life of people. In order to effectively restrain the virus spreading and reduce economic losses, humans need to hold the law and control of the virus distribution. Docker has obtained significant attention as a lightweight virtualization container technology. Compared to traditional virtualization technologies, docker possesses the advantages of fast deployment, low resource consumption, and high migration capability. Given that the differences between vari
APA, Harvard, Vancouver, ISO, and other styles
17

Katiyar, Dr Ravindra Nath, and Sadhna Yadav. "Design A Mini Operating System Using Open Source System." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (2022): 1424–34. http://dx.doi.org/10.22214/ijraset.2022.46432.

Full text
Abstract:
Abstract: COSMOS (C# Open Source Managed Operating System) Paper provides a framework and tool-chain to develop an OS purely in managed code (C# and VB .NET). Cosmos supports integration with Visual Studio, and therefore is much easier to use. However, the framework is not rich, and therefore, there is still a lot of work to be done on OS developer side (E.g., it does not support mouse, file system etc.) In this paper, a microkernel based OS is developed using COSMOS framework for x86 based computer systems. This paper demonstrates device driver (PS/2) pointing device and GUI System. Since Cos
APA, Harvard, Vancouver, ISO, and other styles
18

Ar-Razy, Ikhwan, Rinta Kridalukmana, and Eko Didik Widianto. "Implementasi Cloud Storage Menggunakan OwnCloud yang High-Availability." Jurnal Teknologi dan Sistem Komputer 4, no. 2 (2016): 209. http://dx.doi.org/10.14710/jtsiskom.4.2.2016.209-214.

Full text
Abstract:
Implementation of practicum courses in Department of Computer Engineering Diponegoro University has some drawbacks, one of them is a lot of lab assistant and the practitioner experiencing difficulties in terms of archiving. One solution to solve the problem is implementing a shared file storage system that is easy and can be accessed by both practitioners or lab assistants. The purpose of this research is to build a cloud-based storage systems that are reliable to preventing crash damage hardware and high availability. The purpose of this research is achieved by designing the appropriate metho
APA, Harvard, Vancouver, ISO, and other styles
19

Halim, Abdul, and Hadi Kurniawanto. "IMPLEMENTASI SAMBA PADA LOCAL AREA NETWORK MENGGUNAKAN LINUX MANDRAKE 9.1." Jurnal Ilmiah Sistem Informasi 3, no. 1 (2023): 21–39. http://dx.doi.org/10.46306/sm.v3i1.34.

Full text
Abstract:
Linux as a free, open (Open Source), and stable Operating System, has very high Internet and networking capabilities. This can be proven by the number of companies engaged in Internet services and e-commerce using Linux as the main Operating System on its Server, such as eToys.com, freshmeat.net, Mweb.co.id, Satunet Group, and others. All Linux software can be freely owned under the GNU General Public License. Based on the license, anyone can have a program in both source code (readable by humans) and binary (machine language), so that the program can be learned, changed, distributed, or furth
APA, Harvard, Vancouver, ISO, and other styles
20

Ünver, Mahmut, Atilla Ergüzen, and Erdal Erdal. "Design of a DFS to Manage Big Data in Distance Education Environments." JUCS - Journal of Universal Computer Science 28, no. 2 (2022): 202–24. http://dx.doi.org/10.3897/jucs.69069.

Full text
Abstract:
Information technologies have invaded every aspect of our lives. Distance education was also affected by this phase and became an accepted model of education. The evolution of education into a digital platform has also brought unexpected problems, such as the increase in internet usage, the need for new software and devices that can connect to the Internet. Perhaps the most important of these problems is the management of the large amounts of data generated when all training activities are conducted remotely. Over the past decade, studies have provided important information about the quality o
APA, Harvard, Vancouver, ISO, and other styles
21

Venčkauskas, Algimantas, Vacius Jusas, Kęstutis Paulikas, and Jevgenijus Toldinas. "Investigation of Artifacts Left by BitTorrent Client on the Local Computer Operating under Windows 8.1." Information Technology And Control 44, no. 4 (2015): 451–61. http://dx.doi.org/10.5755/j01.itc.44.4.13082.

Full text
Abstract:
BitTorrent client application is a popular tool to download large files from Internet, but this application is quite frequently used for illegal purposes that are one of the types of cybercrimes. If order to fight against this type of cybercrime we carried out the research, during which we investigated the evidences left by BitTorrent client application in registry under Windows 8.1 operating system. The experiment was carried out in three steps: installation, download, and uninstallation. The snapshots of registry were taken and compared prior and after each step. Changes in Windows registry
APA, Harvard, Vancouver, ISO, and other styles
22

Proskuryakov, N. E., B. S. Yakovlev, N. N. Arkhangelskaya, and E. V. Trapeznikov. "Dependence of the speed of the process of backing up digitalarchives of printing houses and publishers on theparameters of the operating system." Mathematical structures and modeling, no. 1 (2021): 110–20. http://dx.doi.org/10.24147/2222-8772.2021.1.110-120.

Full text
Abstract:
Research has been carried out on the process of backing up digital archivesusing Windows and Linux operating systems. The main parameters were identified that affect the speed of the process of backing up digital archives. As a result of experimental and analytical studies, it has been established that the most significantfactors are the type of operating system and the form of the interface of the service utilities used. The influence of the direction of data copying was found, especially inside hard drives, where the data transfer rate is always lower than in the case ofcopying files to othe
APA, Harvard, Vancouver, ISO, and other styles
23

Lee, Jung-Hwan, Bum-Su Hyeon, Oc-Yeub Jeon, and Nam In Park. "Analysis of real-time operating systems’ file systems: Built-in cameras from vehicles." Forensic Science International: Digital Investigation 44 (March 2023): 301500. http://dx.doi.org/10.1016/j.fsidi.2023.301500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Mohamed, ALJI, and CHOUGDALI Khalid. "Detection of Suspicious Timestamps in NTFS using Volume Shadow Copies." International Journal of Computer Network and Information Security 13, no. 4 (2021): 62–69. http://dx.doi.org/10.5815/ijcnis.2021.04.06.

Full text
Abstract:
When a computer gets involved in a crime, it is the mission of the digital forensic experts to extract the left binary artifacts on that device. Among those artifacts, there may be some volume shadow copy files left on the Windows operating system. Those files are snapshots of the volume recorded by the system in case of a needed restore to a specific past date. Before this study, we did not know if the valuable forensic information hold within those snapshot files can be exploited to locate suspicious timestamps in an NTFS formatted partition. This study provides the reader with an inter-snap
APA, Harvard, Vancouver, ISO, and other styles
25

Mietielov, Volodymyr, Oleksiі Marusenko, and Oleksandr Baskakov. "DEVELOPMENT OF A TEXT EDITOR FOR UNIX OPERATING SYSTEM." Bulletin of the National Technical University «KhPI» Series: New solutions in modern technologies, no. 4(14) (December 28, 2022): 35–40. http://dx.doi.org/10.20998/2413-4295.2022.04.05.

Full text
Abstract:
The task of developing and implementing a software application for creating, editing, displaying on the screen, as well as saving in the form of files of various formats, which in turn will be used in programming in languages such as C, C++, Python, and the Linux system language – Bash, is being considered. The developed software application is designed to enable the user to interact with files of various extensions, edit and save changes, work with the content of files for further development of software code in languages such as C, C++, Python. The software application can be used both as a
APA, Harvard, Vancouver, ISO, and other styles
26

Herdiansyah, M. Izman, and Hasrudi Novendra. "Analisis Pemanfaatan TrueNAS Pada Kanreg VII BKN Palembang." Jurnal Pengembangan Sistem Informasi dan Informatika 5, no. 2 (2024): 11–19. http://dx.doi.org/10.47747/jpsii.v5i2.1693.

Full text
Abstract:
Network Attached Storage (NAS) is a particular file storage device that makes data available continuously. Each computer network has server machines and client machines that are connected, and a specific NAS server device handles file sharing and data storage requests by providing fast service—storage service is safe and efficient. Network Attached Storage (NAS) is a reliable and scalable storage media solution with relatively low costs compared to renting a paid data storage server such as Google Drive. In designing this NAS, we use the open-source NextCloud software to back up or store data
APA, Harvard, Vancouver, ISO, and other styles
27

Cho, Kyungwoon, and Hyokyung Bahn. "A Lightweight File System Design for Unikernel." Applied Sciences 14, no. 8 (2024): 3342. http://dx.doi.org/10.3390/app14083342.

Full text
Abstract:
Unikernels are specialized operating system (OS) kernels optimized for a single application or service, offering advantages such as rapid boot times, high performance, minimal memory usage, and enhanced security compared to general-purpose OS kernels. Unikernel applications must remain compatible with the runtime environment of general-purpose kernels, either through binary or source compatibility. As a result, many Unikernel projects have prioritized system call compatibility over performance enhancements. In this paper, we explore the design principles of Unikernel file systems and introduce
APA, Harvard, Vancouver, ISO, and other styles
28

Приходько, Д. И., А. В. Мокряков, and В. В. Горшков. "Scientific Research Institute for Systems Research of the Russian Academy of Sciences." Vestnik of Russian New University. Series «Complex systems: models, analysis, management», no. 3 (October 8, 2023): 202–12. http://dx.doi.org/10.18137/rnu.v9187.23.03.p.202.

Full text
Abstract:
Рассматривается особый класс приложений для операционной системы, которая предназначена для работы на нескольких режимах микропроцессора, – многоразрядные (мультиразрядные) приложения. Назначение рассматриваемых приложений – способность работать на нескольких режимах микропроцессора, который используется в экстремальных условиях окружающей среды. Указанный эффект в микропроцессоре достигается путем программного отделения поврежденных частей кристалла от целой части. Поэтому микропроцессор, режим работы которого определяется накопленными повреждениями, используется преимущественно в экстремальн
APA, Harvard, Vancouver, ISO, and other styles
29

Liu Sheng, Olivia R. "Optimization of file migration policies in distributed computer systems." Computers & Operations Research 19, no. 5 (1992): 335–51. http://dx.doi.org/10.1016/0305-0548(92)90065-d.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Yui-Wah Lee, Kwong-Sak Leung, and M. Satyanarayanan. "Operation shipping for mobile file systems." IEEE Transactions on Computers 51, no. 12 (2002): 1410–22. http://dx.doi.org/10.1109/tc.2002.1146707.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

LYSENKO, S., and R. SCHUKA. "ANALYSIS OF MALWARE DETECTION METHODS IN COMPUTER SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 283, no. 2 (2020): 101–7. https://doi.org/10.31891/2307-5732-2020-283-2-101-107.

Full text
Abstract:
Malware (malicious software or malware) are programs that are designed to make harm and use the resources of the targeted computer. They are often masked in legal programs, imitate them or just hide in different folders and files in the computer. Moreover, they can get an access to the operating system that allows malware to encrypt files and steal personal information. In some cases malware are distributed by themselves, by e-mail from one computer to another, or through infected files and disks. Fast growing amount of malware makes the computer security researchers invent new methods to prot
APA, Harvard, Vancouver, ISO, and other styles
32

Robert, DEMETER*. "CONFIGURATION SOFTWARE FOR WIRELESS COMMUNICATION DEVICES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 12 (2016): 768–73. https://doi.org/10.5281/zenodo.221007.

Full text
Abstract:
The author will describe an implementation of the web based configuration software concept for Wireless communication devices that uses a custom CGI, developed in C++ programming language, on an embedded Linux operating system. The proposed solution has service oriented architecture, minimizing the memory usage and applying the settings on the fly. The web interface show the current settings, obtained from common Linux commands, writes the new configuration in service’s configuration file and restart the service without reboot the device. The old web based configuration interface can be easily
APA, Harvard, Vancouver, ISO, and other styles
33

Boyanov, Petar. "DETECTION AND IMPLEMENTATION OF ALTERNATE DATA STREAMS IN THE COMPUTER AND NETWORK SYSTEMS." Journal Scientific and Applied Research 7, no. 1 (2015): 34–42. http://dx.doi.org/10.46687/jsar.v7i1.163.

Full text
Abstract:
In this paper a common detectionand implementation of Alternate Data Streams in the operating system Windows Server 2008 R2 is made. Nowadays it is very important each system administrator and security professional to detect and analyze different types of alternate data streams. These steams can hide sensible secret or malicious files that can damage some of the computer and networks resources.
APA, Harvard, Vancouver, ISO, and other styles
34

Liu Sheng, Olivia R. "Analysis of Optimal File Migration Policies in Distributed Computer Systems." Management Science 38, no. 4 (1992): 459–82. http://dx.doi.org/10.1287/mnsc.38.4.459.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Stanković, Miloš, and Umit Karabiyik. "Exploratory Study on Kali NetHunter Lite: A Digital Forensics Approach." Journal of Cybersecurity and Privacy 2, no. 3 (2022): 750–63. http://dx.doi.org/10.3390/jcp2030038.

Full text
Abstract:
Mobile devices, specifically smartphones, have become a necessity in everyday life, as we perform many essential day-to-day tasks using these devices. With the projected increase in mobile devices to 18.22 billion by 2025, the reliance on smartphones will only grow. This demand for smartphones has allowed various companies to start developing their own devices and custom operating systems, each of which puts its own touch on them. In addition, current smartphones have increased processing power, providing users with a computer experience in their pockets. Software developers have taken this op
APA, Harvard, Vancouver, ISO, and other styles
36

Oktaviani, Anisa, and Melwin Syafrizal. "GandCrab Ransomware Analysis on Windows Using Static Method." Buletin Ilmiah Sarjana Teknik Elektro 3, no. 2 (2021): 163–75. http://dx.doi.org/10.12928/biste.v3i2.4884.

Full text
Abstract:
Malware-infected operating systems may experience system damage, files or loss of important data. Ransomware is a type of malware that works by attacking the internet network and then encrypting the victim's computer. So that the victim can access his computer again, the victim is asked to redeem (ransom) with some money in the form of Bitcoin. One of them is GandCrab. Gandcrab is a very powerful ransomware and only the creators of Gandcrab know the description of the encrypted files.Static analysis is done by importing malware samples into Virustotal, Dependency walker, PEStudio, Exeinfo PE,
APA, Harvard, Vancouver, ISO, and other styles
37

Sampetoding, Eliyah Acantha M., Suryani Gumolung, Yulita Sirinti Pongtambing, Esther Sanda Manapa, and Ikbal Tawinseet. "Implementasi File Server dan Sharing Printer Pada Kantor Desa Nunu Kecamatan Rainis Kabupaten Kepulauan Talaud." Bakti Sekawan : Jurnal Pengabdian Masyarakat 2, no. 1 (2022): 27–31. http://dx.doi.org/10.35746/bakwan.v2i1.195.

Full text
Abstract:
The era of globalization is one of the impacts of the development of information technology. The rapid development of technology and communication networks makes it easier for people to get information. Nunu Village is one of the villages in the Talaud Islands Regency on the border area of Indonesia and the Philippines. The research team made observations at the Village Office by conducting interviews with village heads and staff. The results of the observation focus on queuing in using computer or printer access. This happened because the data was stored on a certain computer and the printer
APA, Harvard, Vancouver, ISO, and other styles
38

O.Pandithurai, Et al. "Cloud Storage Systems with Secure Attribute-Based Access Control." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 3 (2023): 327–31. http://dx.doi.org/10.17762/ijritcc.v11i3.9862.

Full text
Abstract:
This research presents a novel approach to safe access procedure in cloud storage structure by addressing the challenges associated with managing and distributing complex secret keys. The proposed procedure utilizes attribute-based access control and incorporates a client process, an authentication terminal process, and a storage terminal process. The client generates a main secret key and public parameters for each user using an attribute password mechanism. The authentication terminal maintains user attribute, file attribute, and attribute secret key databases. Access control is determined b
APA, Harvard, Vancouver, ISO, and other styles
39

Kashtalian, Antonina, Sergii Lysenko, Oleg Savenko, Andrii Nicheporuk, Tomáš Sochor, and Volodymyr Avsiyevych. "Multi-computer malware detection systems with metamorphic functionality." Radioelectronic and Computer Systems 2024, no. 1 (2024): 152–75. http://dx.doi.org/10.32620/reks.2024.1.13.

Full text
Abstract:
The need to develop new systems for detecting and counteracting malware remains relevant. In addition to malware detection methods, the need to develop new systems for detecting and counteracting malware has become increasingly important. The use of various detection systems and the formation of a variable architecture in them significantly improves the effectiveness of detection, since both for attackers in computer attacks and for malware, understanding the system is significantly complicated. In addition, such systems may contain baits, traps, and, accordingly, modifiable operating environm
APA, Harvard, Vancouver, ISO, and other styles
40

Krittinatham, W., K. Kaewkhong, and N. Emarat. "Python programming code for stellar photometry in astrophysics teaching on a cloud computing service." Journal of Physics: Conference Series 2431, no. 1 (2023): 012038. http://dx.doi.org/10.1088/1742-6596/2431/1/012038.

Full text
Abstract:
Abstract Nowadays, there is various software used for both education and astronomy research. For photometry, licensed software and high-performance computer operating systems are required, which is a fund limitation for some schools in Thailand. Thus, in this article, we develop and present the Demonstration Photometry Scripts for Astrophysics Teaching (DPSAT version 1.0). The program is designed to work on cloud computing services via internet browsers to avoid hardware and operation requirement pain points. The DPSAT is programming on flexible, low-cost, on-trend language, Python, and Jupyte
APA, Harvard, Vancouver, ISO, and other styles
41

He, Qinlu, Pengze Gao, Fan Zhang, Genqing Bian, Weiqi Zhang, and Zhen Li. "Design and Optimization of a Distributed File System Based on RDMA." Applied Sciences 13, no. 15 (2023): 8670. http://dx.doi.org/10.3390/app13158670.

Full text
Abstract:
With the rapid development of computer and network technology, to deal with explosively growing mass data correctly, distributed file systems have come into being, and they have been applied in many enterprises. However, in the packet storage process, the traditional TCP/IP transmission protocol has to pass through the operating system and application software layer. It takes up many server resources and memory bus bandwidth, which places a heavy burden on the server’s CPU and memory. In this paper, we analyze the research status of the distributed file system based on analyzing and comparing
APA, Harvard, Vancouver, ISO, and other styles
42

Tzotzis, Anastasios, Athanasios Manavis, Nikolaos Efkolidis, and Panagiotis Kyratsis. "CAD-BASED AUTOMATED G-CODE GENERATION FOR DRILLING OPERATIONS." International Journal of Modern Manufacturing Technologies 13, no. 3 (2021): 177–84. http://dx.doi.org/10.54684/ijmmt.2021.13.3.177.

Full text
Abstract:
The automated generation of G-code for machining processes is a valuable tool at the hands of every engineer and machinist. Nowadays, many software systems exist that provide automated functions related to G-code generation. Most free software require the import of a Drawing Exchange Format (DXF) file and cannot work directly on a 3D part. On the contrast, the equivalent commercially-available software systems are feature-rich and can provide a variety of automated processes, but are usually highly priced. The presented application aims to supplement the existing free Computer Aided Manufactur
APA, Harvard, Vancouver, ISO, and other styles
43

Ramakrishnan, K. K., Lev Vaitzblit, Cary Gray, et al. "Operating system support for a video-on-demand file service." Multimedia Systems 3, no. 2 (1995): 53–65. http://dx.doi.org/10.1007/bf01219801.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Simonov, A., T. Weber, and W. Steurer. "Yell: a computer program for diffuse scattering analysisviathree-dimensional delta pair distribution function refinement." Journal of Applied Crystallography 47, no. 3 (2014): 1146–52. http://dx.doi.org/10.1107/s1600576714008668.

Full text
Abstract:
Yell, a program for routine refinement of disorder models against single-crystal diffuse scattering data, is presented. The analysis is based on the three-dimensional delta pair distribution function (3D-ΔPDF) method, which provides direct access to interatomic correlations in real crystal structures. Substitutional, displacive and size-effect disorder models are covered. The input file format supports flexible usage of arithmetic expressions for constraining dependent parameter values. The program is designed to be run on desktop computers. By using an efficient fast-Fourier-transform-based d
APA, Harvard, Vancouver, ISO, and other styles
45

Zharkimbekova, Aizhan, Ademi Ospanova, Kakim Sagindykov, and Makhabbat Kokkoz. "Implementation and Commercialization of the Results of the “Multidisciplinary Mobile Computer Classroom Based on Raspberry Pi” Project." International Journal of Emerging Technologies in Learning (iJET) 15, no. 13 (2020): 116. http://dx.doi.org/10.3991/ijet.v15i13.14665.

Full text
Abstract:
This paper describes the developed technology for using the Raspberry Pi micro-computer to teach practical skills on computer networks and operating systems. The effectiveness of acquiring skills using the proposed technology is due to the fact that it allows organizing the workshops with personal support with the necessary special tools. The paper presents a largely implemented project on an initiative basis, preceding the work on commercialization of the described results. In the present work a full detailed content of the steps for implementation and subsequent commercialization of the solu
APA, Harvard, Vancouver, ISO, and other styles
46

Heamalatha, Dr I., Sree Keerthi, G. Hema Bindu, B. Nithin, D. Bhuvaneswari, and CH Puja Sree. "Students Attendance Monitoring & Accessing Control Based Raspberry - PI." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 2929–33. http://dx.doi.org/10.22214/ijraset.2023.50783.

Full text
Abstract:
Abstract: This project is "IOT based facial recognition attendance monitoring system". In order to maintain student attendance records, this project focuses on facial detection and radio frequency identification cards for an attendance recorder system. In class databases, student faces are already preserved. If the image from the database and the one taken by the raspberry pi camera match, the student's attendance will be tracked over time. Additionally, RF ID cards are utilized to regulate entry in certain areas. The ARM1176JZF-S core is used by the credit card-sized Raspberry Pi single-board
APA, Harvard, Vancouver, ISO, and other styles
47

Mikhailov, A. Yu. "Innovative computing and blockchain technologies in agriculture for accelerating economic integration among Russia, China, and the Republic of Belarus." E-Management 7, no. 4 (2024): 15–26. https://doi.org/10.26425/2658-3445-2024-7-4-15-26.

Full text
Abstract:
Innovative computing and blockchain technologies in Russia, China, and the Republic of Belarus have been presented. Cloud computing refers to distributed computing technologies that use algorithms for network access to shared computing resources. Using a cloud service for intelligent farming is a promising technology since it can provide huge computing power and storage capacity, high scalability, and flexibility. Cloud infrastructure includes computer networks, servers, data warehouses, and operating systems. Cloud service providers typically provide their services using one of the following
APA, Harvard, Vancouver, ISO, and other styles
48

Sousa, Ítalo Freire de, Rafael Henrique dos Santos Neves, and Ícaro Santos Ferreira. "SERVIDOR NAS RESIDENCIAL: PROJETO, IMPLEMENTAÇÃO E BENEFÍCIOS ECONÔMICOS." Revista ft 29, no. 142 (2025): 52–53. https://doi.org/10.69849/revistaft/ar10202501072052.

Full text
Abstract:
This article demonstrates how to develop a cost-effective and efficient NAS (network attached storage) server, showing the components needed for the system, highlighting the practical benefits for home and corporate use, as it is an affordable data storage solution. Made to be connected to a local network, allowing centralized file sharing and management. A homemade NAS system can be built using hardware typically used for conventional computers, using Windows as the operational system, or specific cards with storage-oriented operating systems, such as TrueNAS.
APA, Harvard, Vancouver, ISO, and other styles
49

Fakiha, Bandr. "Unlocking Digital Evidence: Recent Challenges and Strategies in Mobile Device Forensic Analysis." Journal of Internet Services and Information Security 14, no. 2 (2024): 68–84. http://dx.doi.org/10.58346/jisis.2024.i2.005.

Full text
Abstract:
We live in a digital era where communication has become easier than ever, thanks to the emergence of computer technologies. With the improvement of these technologies over the last few decades, mobile devices have evolved and advanced, offering users fast and affordable ways to interact virtually. Forensic investigators have learned to take advantage of mobile device technologies to unveil digital evidence. This paper delves into the challenges and techniques involved in conducting forensic analysis on mobile devices. It also explores the logical extraction and analysis of data from mobile dev
APA, Harvard, Vancouver, ISO, and other styles
50

Wang, Zhoukai, Huaijun Wang, Liu He, Yang Lv, Zhaoying Wei, and Xuan Li. "A Storage Optimization Model for Cloud Servers in Integrated Communication, Sensing, and Computation System." Wireless Communications and Mobile Computing 2022 (October 3, 2022): 1–13. http://dx.doi.org/10.1155/2022/3222979.

Full text
Abstract:
The massive amount of sensing and communication data that needs to be processed during the production process of complex heavy equipment generates heavy storage pressure on the cloud server-side, thus limiting the convergence of sensing, communication, and computing in intelligent factories. To solve the problem, based on machine learning techniques, a storage optimization model is proposed in this paper for reducing the storage pressure on the cloud server and enhancing the coupling between communication and sensing data. At first, based on the operation rules of the distributed file system o
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!