Journal articles on the topic 'Operating systems (Computer file)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Operating systems (Computer file).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ochilov, Nizomiddin. "Creating Secure File Systems in Open-Source Operating Systems." WSEAS TRANSACTIONS ON SYSTEMS 21 (November 24, 2022): 221–32. http://dx.doi.org/10.37394/23202.2022.21.24.
Full textTejaswini, K. "Cross-Platform File Explore with NW.JS." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 500–504. http://dx.doi.org/10.22214/ijraset.2021.34950.
Full textLiu, Hui, Hanxing Xue, and Hui Lu. "A Sensitive File Abnormal Access Detection Method Based on Application Classification." Security and Communication Networks 2021 (March 13, 2021): 1–7. http://dx.doi.org/10.1155/2021/6684456.
Full textHijrah Hijriah, Milka Afifah Rahmatillah, and Zaehol Fatah. "TINJAUAN SISTEM OPERASI FUNGSI DAN IMPLEMENTASINYA DALAM KOMPUTER PRIBADI." Jurnal Padamu Negeri 2, no. 3 (2025): 126–30. https://doi.org/10.69714/mcsj5n27.
Full textKusumaningrum, Anggraini. "PENGUJIAN KINERJA JARINGAN SISTEM AKSES FILE BERBASIS CLIENT SERVER MENGGUNAKAN SAMBA SERVER." Conference SENATIK STT Adisutjipto Yogyakarta 2 (November 15, 2016): 129. http://dx.doi.org/10.28989/senatik.v2i0.31.
Full textWijaya, Wahyu, Febriyanti Panjaitan, Syahril Rizal, and Maria Ulfa. "Perbandingan Kinerja Sistem Operasi Network Attached Storage: Studi Kasus Truenas dan Xigmanas." Jurnal Indonesia : Manajemen Informatika dan Komunikasi 5, no. 1 (2024): 255–61. http://dx.doi.org/10.35870/jimik.v5i1.468.
Full textHan, Sung-Hwa, and Daesung Lee. "Kernel-Based Real-Time File Access Monitoring Structure for Detecting Malware Activity." Electronics 11, no. 12 (2022): 1871. http://dx.doi.org/10.3390/electronics11121871.
Full textBuryta, Michał, and Piotr Kopniak. "Comparison of the security mechanisms of popular operating systems for mobile devices." Journal of Computer Sciences Institute 4 (September 30, 2017): 87–91. http://dx.doi.org/10.35784/jcsi.599.
Full textAL-HANANI, ALI, and VENUS W. SAMAWI. "virus Detection Using Cryptography Algorithm." Iraqi Journal for Computers and Informatics 27, no. 1 (1996): 8–15. http://dx.doi.org/10.25195/ijci.v27i1.220.
Full textAbdalla, Rawand Raouf, and Alaa Khalil Jumaa. "Log File Analysis Based on Machine Learning: A Survey." UHD Journal of Science and Technology 6, no. 2 (2022): 77–84. http://dx.doi.org/10.21928/uhdjst.v6n2y2022.pp77-84.
Full textKuznetsov, Anton I. "Digital diagnostics: A computer application for lymph node metastases in cervical cancer." Digital Diagnostics 4, no. 1S (2023): 79–80. http://dx.doi.org/10.17816/dd430351.
Full textWójtowicz, Bartłomiej, and Norbert Wójcik. "The evolution of Microsoft Windows operating systems after 2001." Journal of Computer Sciences Institute 32 (September 30, 2024): 186–93. http://dx.doi.org/10.35784/jcsi.6244.
Full textZhang, Lan, Min Yuan, Tao Liu, Li Wang, and Peng Gao. "Research on Program Calling and File Sharing between Windows and Linux." Applied Mechanics and Materials 214 (November 2012): 721–24. http://dx.doi.org/10.4028/www.scientific.net/amm.214.721.
Full textAdavi, Krishna Akhil Kumar, and Amelia Acker. "What is a File on a Phone? Personal Information Management Practices Amongst WhatsApp Users." Proceedings of the ACM on Human-Computer Interaction 7, CSCW2 (2023): 1–28. http://dx.doi.org/10.1145/3610221.
Full textMeng, Yizhou. "Design of an image processing system for heterogeneous computer architectures." Applied and Computational Engineering 67, no. 1 (2024): 330–47. http://dx.doi.org/10.54254/2755-2721/67/20240623.
Full textJu, Hanji, Jie Wang, Enguo Zhu, Xiaoli Zhang, and Feng Zheng. "Design Scheme of a Docker Container File Isolation against Computer Virus Spreading." Mathematical Problems in Engineering 2022 (March 28, 2022): 1–6. http://dx.doi.org/10.1155/2022/5348370.
Full textKatiyar, Dr Ravindra Nath, and Sadhna Yadav. "Design A Mini Operating System Using Open Source System." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (2022): 1424–34. http://dx.doi.org/10.22214/ijraset.2022.46432.
Full textAr-Razy, Ikhwan, Rinta Kridalukmana, and Eko Didik Widianto. "Implementasi Cloud Storage Menggunakan OwnCloud yang High-Availability." Jurnal Teknologi dan Sistem Komputer 4, no. 2 (2016): 209. http://dx.doi.org/10.14710/jtsiskom.4.2.2016.209-214.
Full textHalim, Abdul, and Hadi Kurniawanto. "IMPLEMENTASI SAMBA PADA LOCAL AREA NETWORK MENGGUNAKAN LINUX MANDRAKE 9.1." Jurnal Ilmiah Sistem Informasi 3, no. 1 (2023): 21–39. http://dx.doi.org/10.46306/sm.v3i1.34.
Full textÜnver, Mahmut, Atilla Ergüzen, and Erdal Erdal. "Design of a DFS to Manage Big Data in Distance Education Environments." JUCS - Journal of Universal Computer Science 28, no. 2 (2022): 202–24. http://dx.doi.org/10.3897/jucs.69069.
Full textVenčkauskas, Algimantas, Vacius Jusas, Kęstutis Paulikas, and Jevgenijus Toldinas. "Investigation of Artifacts Left by BitTorrent Client on the Local Computer Operating under Windows 8.1." Information Technology And Control 44, no. 4 (2015): 451–61. http://dx.doi.org/10.5755/j01.itc.44.4.13082.
Full textProskuryakov, N. E., B. S. Yakovlev, N. N. Arkhangelskaya, and E. V. Trapeznikov. "Dependence of the speed of the process of backing up digitalarchives of printing houses and publishers on theparameters of the operating system." Mathematical structures and modeling, no. 1 (2021): 110–20. http://dx.doi.org/10.24147/2222-8772.2021.1.110-120.
Full textLee, Jung-Hwan, Bum-Su Hyeon, Oc-Yeub Jeon, and Nam In Park. "Analysis of real-time operating systems’ file systems: Built-in cameras from vehicles." Forensic Science International: Digital Investigation 44 (March 2023): 301500. http://dx.doi.org/10.1016/j.fsidi.2023.301500.
Full textMohamed, ALJI, and CHOUGDALI Khalid. "Detection of Suspicious Timestamps in NTFS using Volume Shadow Copies." International Journal of Computer Network and Information Security 13, no. 4 (2021): 62–69. http://dx.doi.org/10.5815/ijcnis.2021.04.06.
Full textMietielov, Volodymyr, Oleksiі Marusenko, and Oleksandr Baskakov. "DEVELOPMENT OF A TEXT EDITOR FOR UNIX OPERATING SYSTEM." Bulletin of the National Technical University «KhPI» Series: New solutions in modern technologies, no. 4(14) (December 28, 2022): 35–40. http://dx.doi.org/10.20998/2413-4295.2022.04.05.
Full textHerdiansyah, M. Izman, and Hasrudi Novendra. "Analisis Pemanfaatan TrueNAS Pada Kanreg VII BKN Palembang." Jurnal Pengembangan Sistem Informasi dan Informatika 5, no. 2 (2024): 11–19. http://dx.doi.org/10.47747/jpsii.v5i2.1693.
Full textCho, Kyungwoon, and Hyokyung Bahn. "A Lightweight File System Design for Unikernel." Applied Sciences 14, no. 8 (2024): 3342. http://dx.doi.org/10.3390/app14083342.
Full textПриходько, Д. И., А. В. Мокряков, and В. В. Горшков. "Scientific Research Institute for Systems Research of the Russian Academy of Sciences." Vestnik of Russian New University. Series «Complex systems: models, analysis, management», no. 3 (October 8, 2023): 202–12. http://dx.doi.org/10.18137/rnu.v9187.23.03.p.202.
Full textLiu Sheng, Olivia R. "Optimization of file migration policies in distributed computer systems." Computers & Operations Research 19, no. 5 (1992): 335–51. http://dx.doi.org/10.1016/0305-0548(92)90065-d.
Full textYui-Wah Lee, Kwong-Sak Leung, and M. Satyanarayanan. "Operation shipping for mobile file systems." IEEE Transactions on Computers 51, no. 12 (2002): 1410–22. http://dx.doi.org/10.1109/tc.2002.1146707.
Full textLYSENKO, S., and R. SCHUKA. "ANALYSIS OF MALWARE DETECTION METHODS IN COMPUTER SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 283, no. 2 (2020): 101–7. https://doi.org/10.31891/2307-5732-2020-283-2-101-107.
Full textRobert, DEMETER*. "CONFIGURATION SOFTWARE FOR WIRELESS COMMUNICATION DEVICES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 12 (2016): 768–73. https://doi.org/10.5281/zenodo.221007.
Full textBoyanov, Petar. "DETECTION AND IMPLEMENTATION OF ALTERNATE DATA STREAMS IN THE COMPUTER AND NETWORK SYSTEMS." Journal Scientific and Applied Research 7, no. 1 (2015): 34–42. http://dx.doi.org/10.46687/jsar.v7i1.163.
Full textLiu Sheng, Olivia R. "Analysis of Optimal File Migration Policies in Distributed Computer Systems." Management Science 38, no. 4 (1992): 459–82. http://dx.doi.org/10.1287/mnsc.38.4.459.
Full textStanković, Miloš, and Umit Karabiyik. "Exploratory Study on Kali NetHunter Lite: A Digital Forensics Approach." Journal of Cybersecurity and Privacy 2, no. 3 (2022): 750–63. http://dx.doi.org/10.3390/jcp2030038.
Full textOktaviani, Anisa, and Melwin Syafrizal. "GandCrab Ransomware Analysis on Windows Using Static Method." Buletin Ilmiah Sarjana Teknik Elektro 3, no. 2 (2021): 163–75. http://dx.doi.org/10.12928/biste.v3i2.4884.
Full textSampetoding, Eliyah Acantha M., Suryani Gumolung, Yulita Sirinti Pongtambing, Esther Sanda Manapa, and Ikbal Tawinseet. "Implementasi File Server dan Sharing Printer Pada Kantor Desa Nunu Kecamatan Rainis Kabupaten Kepulauan Talaud." Bakti Sekawan : Jurnal Pengabdian Masyarakat 2, no. 1 (2022): 27–31. http://dx.doi.org/10.35746/bakwan.v2i1.195.
Full textO.Pandithurai, Et al. "Cloud Storage Systems with Secure Attribute-Based Access Control." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 3 (2023): 327–31. http://dx.doi.org/10.17762/ijritcc.v11i3.9862.
Full textKashtalian, Antonina, Sergii Lysenko, Oleg Savenko, Andrii Nicheporuk, Tomáš Sochor, and Volodymyr Avsiyevych. "Multi-computer malware detection systems with metamorphic functionality." Radioelectronic and Computer Systems 2024, no. 1 (2024): 152–75. http://dx.doi.org/10.32620/reks.2024.1.13.
Full textKrittinatham, W., K. Kaewkhong, and N. Emarat. "Python programming code for stellar photometry in astrophysics teaching on a cloud computing service." Journal of Physics: Conference Series 2431, no. 1 (2023): 012038. http://dx.doi.org/10.1088/1742-6596/2431/1/012038.
Full textHe, Qinlu, Pengze Gao, Fan Zhang, Genqing Bian, Weiqi Zhang, and Zhen Li. "Design and Optimization of a Distributed File System Based on RDMA." Applied Sciences 13, no. 15 (2023): 8670. http://dx.doi.org/10.3390/app13158670.
Full textTzotzis, Anastasios, Athanasios Manavis, Nikolaos Efkolidis, and Panagiotis Kyratsis. "CAD-BASED AUTOMATED G-CODE GENERATION FOR DRILLING OPERATIONS." International Journal of Modern Manufacturing Technologies 13, no. 3 (2021): 177–84. http://dx.doi.org/10.54684/ijmmt.2021.13.3.177.
Full textRamakrishnan, K. K., Lev Vaitzblit, Cary Gray, et al. "Operating system support for a video-on-demand file service." Multimedia Systems 3, no. 2 (1995): 53–65. http://dx.doi.org/10.1007/bf01219801.
Full textSimonov, A., T. Weber, and W. Steurer. "Yell: a computer program for diffuse scattering analysisviathree-dimensional delta pair distribution function refinement." Journal of Applied Crystallography 47, no. 3 (2014): 1146–52. http://dx.doi.org/10.1107/s1600576714008668.
Full textZharkimbekova, Aizhan, Ademi Ospanova, Kakim Sagindykov, and Makhabbat Kokkoz. "Implementation and Commercialization of the Results of the “Multidisciplinary Mobile Computer Classroom Based on Raspberry Pi” Project." International Journal of Emerging Technologies in Learning (iJET) 15, no. 13 (2020): 116. http://dx.doi.org/10.3991/ijet.v15i13.14665.
Full textHeamalatha, Dr I., Sree Keerthi, G. Hema Bindu, B. Nithin, D. Bhuvaneswari, and CH Puja Sree. "Students Attendance Monitoring & Accessing Control Based Raspberry - PI." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 2929–33. http://dx.doi.org/10.22214/ijraset.2023.50783.
Full textMikhailov, A. Yu. "Innovative computing and blockchain technologies in agriculture for accelerating economic integration among Russia, China, and the Republic of Belarus." E-Management 7, no. 4 (2024): 15–26. https://doi.org/10.26425/2658-3445-2024-7-4-15-26.
Full textSousa, Ítalo Freire de, Rafael Henrique dos Santos Neves, and Ícaro Santos Ferreira. "SERVIDOR NAS RESIDENCIAL: PROJETO, IMPLEMENTAÇÃO E BENEFÍCIOS ECONÔMICOS." Revista ft 29, no. 142 (2025): 52–53. https://doi.org/10.69849/revistaft/ar10202501072052.
Full textFakiha, Bandr. "Unlocking Digital Evidence: Recent Challenges and Strategies in Mobile Device Forensic Analysis." Journal of Internet Services and Information Security 14, no. 2 (2024): 68–84. http://dx.doi.org/10.58346/jisis.2024.i2.005.
Full textWang, Zhoukai, Huaijun Wang, Liu He, Yang Lv, Zhaoying Wei, and Xuan Li. "A Storage Optimization Model for Cloud Servers in Integrated Communication, Sensing, and Computation System." Wireless Communications and Mobile Computing 2022 (October 3, 2022): 1–13. http://dx.doi.org/10.1155/2022/3222979.
Full text