Science topic

System Software - Science topic

Explore the latest publications in System Software, and find System Software experts.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to System Software (10,000)
Sorted by most recent
Poster
Full-text available
𝐂𝐀𝐋𝐋 𝐅𝐎𝐑 𝐁𝐎𝐎𝐊 𝐂𝐇𝐀𝐏𝐓𝐄𝐑 - "𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬 𝐁𝐨𝐨𝐤" 𝐒𝐮𝐛𝐦𝐢𝐬𝐬𝐢𝐨𝐧 𝐃𝐞𝐚𝐝𝐥𝐢𝐧𝐞 : January 30, 𝟐𝟎𝟐𝟐. It is our pleasure to invite you to submit a chapter for inclusion in the “𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬” book to be published by Springer. The submission deadline is January 30. The submitted chapter should have 12-20 pages single-space single-column an...
Research Proposal
Full-text available
The impacts of advances in innovative technologies (artificial intelligence, sensors, mechanical systems, software, etc.) on humans and robots have become obvious. Among the emerging issues is the interaction between robots and humans. Initially, Human-Robot Interaction (HRI) has been mainly invested in service robotics. However, recently, the mode...
Article
Full-text available
Today's increasingly mature and progressive information technology has greatly changed the way people live and work. Big data technology has also brought new development opportunities to traditional financial management. Nowadays, financial intelligent management has become the main development trend of financial management. With the support of inf...
Article
Full-text available
Today's increasingly mature and progressive information technology has greatly changed the way people live and work. Big data technology has also brought new development opportunities to traditional financial management. Currently, intelligent financial management has become the main development trend of financial management. With the support of in...
Article
Full-text available
Quantum computing promises to be the next disruptive technology, with numerous possible applications and implications for organizations and markets. Quantum computers exploit principles of quantum mechanics, such as superposition and entanglement, to represent data and perform operations on them. Both of these principles enable quantum computers to...
Preprint
Full-text available
This work exploits vulnerabilities in an outdated version of Pandora FMS software through penetration testing (pentest) to demonstrate the relevance of updating systems, software, and applications to avoid cyber attacks. The practical approach is based on a pentest black box in an environment with an outdated version of the Pandora FMS. The SQL inj...
Article
Full-text available
Background: Facial pores, visible topographic change of skin representing enlarged openings of pilosebaceous follicles, are common aesthetic concern. Aim: To examine the efficacy of polycaprolactone (PCL) filler on enlarged facial pores and skin texture improvement. Patients and methods: A total of seven participants with enlarged facial pores...
Article
Full-text available
A number of studies focus on Low-Density Parity-Check (LDPC) codes to ensure reliable data communications. This study proposes an algebraic algorithm to generate strongly connected Ramanujan graphs able to provide highly symmetric LDPC codes with minimized error floor. Several Ramanujan graphs are created using GAP system software to generate a ran...
Article
Full-text available
Greenery are the parks in the urban areas and it becomes progressively most significant as cities grow more crowded. In the end, urban parks contribute to the population’s healthiness and welfare by providing opportunities intended for physical and social activity, leisure, and relaxation. In order to construct “Digital Land,” computer and system s...
Technical Report
Full-text available
This project report consists of Mobile Application Development which is a tending topic in Software Engineering Platform. In order to create apps that can operate on mobile devices, mobile application developers need a network connection to work with remote computing resources. This group project is to develop a mobile application which works in an...
Preprint
Full-text available
The rigid interface of current DRAM chips places the memory controller completely in charge of DRAM control. Even DRAM maintenance operations, which are used to ensure correct operation (e.g., refresh) and combat reliability/security issues of DRAM (e.g., RowHammer), are managed by the memory controller. Thus, implementing new maintenance operation...
Article
Full-text available
In order to accurately predict the security situation of Internet of Things information network, a research method based on machine learning algorithm for security situational awareness of Internet of Things information network is proposed. The perception result is represented by the perception model, the sample data are preprocessed based on the l...
Conference Paper
Full-text available
Code clone is a code portion in one source code that is similar or identical to another source code. Current clone code detection techniques detect, refactor, remove and redirect clones without being archived in the Discoverable Digital Clone Library (DDCL). This paper introduces Clone Wrapper Detection Technique (CWDT) that detects and wraps commo...
Article
Full-text available
With the development of the digital age, the hardware equipment and system software of digital painting are becoming more and more popular, and the penetration of digital technology in the field of printmaking is getting deeper and deeper. However, traditional skills are gradually being eroded under the pressure of a homogeneous and efficient moder...
Article
Full-text available
Visual recognition and automatic control technology is an important way to realize robot automatic ball picking. Therefore, a tennis robot motion control method based on ant colony algorithm is evaluated. After the camera position was fixed, the motion control system software was designed, and the optimal path was solved by ant colony algorithm. Th...
Article
Full-text available
Abstrak Penelitian ini bertujuan untuk mengoptimalkan layanan di laboratorium dengan pemanfaatan teknologi informasi dan komunikasi (TIK) untuk semua praktikum yang memerlukan alat menggunakan layanan peminjaman dan pengembalian alat pada perangkat lunak. Metode yang digunakan adalah penelitian dan pengembangan dengan melakukan penelitian percobaan...
Article
Full-text available
The scope of finance is very wide, data also plays a very important role in the financial industry, a small data change, and it may have a great impact on the economy. Therefore, the author proposes data mining optimization software and its application in financial audit data analysis. First, discuss the decision tree method, the main function modu...
Article
Full-text available
Because the instantaneous motion of running training changes rapidly, the acquisition accuracy is low. Therefore, a wearable running training data acquisition system based on intelligent computer technology is designed. In the hardware design of the system, by setting the registers of the main control chip, inertial sensor, and magnetic sensor, the...
Article
Full-text available
Container ships and ports, that have developed in the world since the 1960s, have important roles for the foreign trade of Turkey, as well as for the transportation of cabotage and transit cargoes. Container ports, especially in the Marmara Region, have an important share in the total container handling capacity of Turkey. On the other hand, solar-...
Article
Full-text available
Background The alcohol-attributable burden of disease is high among socially disadvantaged individuals. Interventional efforts intending to have a public health impact should also address the reduction of social inequalities due to alcohol. Objective The aim was to test the moderating role of educational background on the efficacy of a computer-ba...
Preprint
Full-text available
At present, the motion control algorithms of lower limb exoskeleton robots have errors in tracking the desired trajectory of human hip and knee joints, which leads to poor follow-up performance of the human-machine system. Therefore, an iterative learning control algorithm is proposed to track the desired trajectory of human hip and knee joints. In...
Conference Paper
Full-text available
In this research paper the concept of embedded systems, its applications as well as the economic importance in the modern technology was reviewed. Embedded systems are not only one of the most important fields for current computer-based applications; they are also one of the most difficult fields of software engineering: embedded systems must meet...
Article
Full-text available
In order to improve the detection function of wearable intelligent devices in the Internet of things and facilitate people to control a variety of information such as heart rate, exercise state, blood oxygen saturation, and so on, the scientific detection of human physical health based on wearable devices based on Internet of things technology is p...
Article
Full-text available
Background Interpretation of Low Dose CT scans and protocol driven management of findings is a key aspect of lung cancer screening program performance. Reliable and reproducible methods are needed to communicate radiologists’ interpretation to the screening program or clinicians driving management decision. Methods We performed an audit of a subse...
Presentation
Full-text available
A live presentation of AGO-D V4.1, an expert system software for diagnosis a therapy in Traditional Chinese Acupuncture.
Research
Full-text available
In a software system, Software metrics are used to predict the improvement of the productivity and the quality of the software. Among the software metrices, Complexity metrics are used to enhance the reliability and the maintainability of a software. In Object-oriented software development there are different approaches to measure the quality of th...
Article
Full-text available
Objective: To analyse the results of mini anterior incision compared to conventional Kocher's incision in total thyroidectomy. Study design: Observational cohort study. Place and duration of study: Department of General Surgery, Breast, and Endocrine Surgery Clinic, Ankara City Hospital, Turkey, from March 2019 to December 2019. Methodology:...
Article
Full-text available
Racket sports (tennis, pawns, tennis, etc.) are currently very popular sports, and they are a very intense aerobic exercise. The climatic conditions of the competition venue, time difference factors, the size of the competition venue, background, lighting, wind direction, etc. may all have an impact on the performance of the game. In order to fully...
Article
Full-text available
This paper examines threats affecting the wildlife conservation areas, threat reduction and adaptive management strategies that enhance biodiversity conservation. The research was conducted through a survey, and data was collected from August 2018 to April 2019 in Kibale and Queen Elizabeth Conservation Areas using literature review, threat reducti...
Article
Full-text available
This paper presents a headroom-based optimization for the placement of distributed generation (DG) in a distribution substation. The penetration limits of DGs into the existing distribution substations are often expressed as a function of the feeder's hosting capacity (headroom). Therefore, it is important to estimate the reliability of the network...
Article
Full-text available
Component-based software engineering is concerned with the development of software that can satisfy the customer prerequisites through reuse or independent development. Coupling and cohesion measurements are primarily used to analyse the better software design quality, increase the reliability and reduced system software complexity. The complexity...
Article
Full-text available
Objectives This study aimed to assess the capacities and governance of Lebanon’s health system throughout the response to the COVID-19 pandemic until August 2020. Design A qualitative study based on semi-structured interviews. Setting Lebanon, February–August 2020. Participants Selected participants were directly or indirectly involved in the na...
Conference Paper
Full-text available
The article provides the first 3D PIC (Particle in Cell) simulations for Hall thruster-induced spacecraft charging at 1 AU and 0.093 AU using the Spacecraft Plasma Interaction System Software (SPIS). The baseline context is a cross-comparison of the spacecraft charging effects with and without SPT-100 Hall thruster effects, aiming at providing 3D r...
Article
Full-text available
The era of big data (BD) has arrived. How to train models to find correlations in data and help people make decisions has become a major research topic and direction. As an elastic and scalable distributed computing mode (refers to a whole consisting of multiple interconnected computers that cooperate to perform a common or different task in a set...
Article
Full-text available
At the moment, the existing teaching evaluation system cannot be used for wireless data input and reception, limiting the system's application scope and making it less practical. As a result, a new system for evaluating college English teaching is being developed using a mobile terminal. The English teaching quality model is constructed using the I...
Thesis
Full-text available
The Internet of Things (IoT) paradigm is playing a principal role in the advancement of many application scenarios such as healthcare, smart city, transportation, entertainment, and agriculture, which significantly affect the daily life of humans. The smooth execution of these applications requires sufficient computing and storing resources to supp...
Article
Full-text available
Introduction Public space development is important for the socio-economic and ecological conditions of cities. This study evaluated the publicness of riversides as public space development on the Kebena River in Addis Ababa, Ethiopia. The study identified the potentials and challenges of open spaces for public space development along the riversides...
Article
Full-text available
The optimal integration of photovoltaic generation systems is a challenge for distribution utilities since these devices have a direct impact on company finances due to the large amount of investment required at the beginning of the planning project. In this investigation, the problem regarding the optimal siting and sizing of photovoltaic resource...
Article
Full-text available
The tectonically active southwestern part of Turkey is dominated by the Aegean Extensional Province. The primary aim of this study is to evaluate the seismic hazard for the cities in SW Turkey using a probabilistic approach. As part of this research, a new earthquake database based on a unified moment magnitude scale was created, which contains sha...
Conference Paper
Full-text available
We propose a design methodology to facilitate fault tolerance of deep learning models. First, we implement a many-core fault-tolerant neuromorphic hardware design, where neuron and synapse circuitries in each neuromorphic core are enclosed with astrocyte circuitries, the star-shaped glial cells of the brain that facilitate self-repair by restoring...
Article
Full-text available
Water resources in arid and semi-arid regions are limited where the demands of agriculture , drinking and industry are increasing, especially in drought areas. These regions are subjected to climate changes (CC) that affect the watershed duration and water supplies. Estimations of flash flooding (FF) volume and discharge are required for future dev...
Article
Full-text available
In this article, we employed a satellite-enabled Internet of Remote Things (IoRT) network as a promising solution to retrieve data in the most remote areas of interest, where public networks are absent. This article presents a system network based on the satellite-enabled IoRT, a new paradigm that defines a network where each environmental monitori...
Article
Full-text available
Along with the development of social informatization, computer has been widely used in daily teaching and the technical support teaching management system, which can greatly improve the quality of students and teachers’ information sharing and teaching, and is an important part of college information construction. Teachers’ personal information, te...
Article
Full-text available
The minimization of annual operating costs in radial distribution networks with the optimal selection and siting of fixed-step capacitor banks is addressed in this research by means of a two-stage optimization approach. The first stage proposes an approximated mixed-integer quadratic model to select the nodes where the capacitor banks must be insta...
Poster
Full-text available
AIM: The Aim of this study was to evaluate the overall efficacy of tooth movement with Invisalign ® , by comparing the amount of predicted tooth movement of the initial ClinCheck ® (Align Technology, Santa Clara, CA) to the actual tooth movement occurred after treatment. MATERIALS AND METHODS: Seventeen patients were treated with Invisalign ® for t...
Article
Full-text available
In order to study the application of big data in the field of digital economy, data management improves the needs of business model to a certain extent and responds to the pace of rapid development of science and technology and the transformation of business model in special times, so as to promote economic development. Based on the information ext...
Conference Paper
Full-text available
Dependability is an essential part of software engineering in the industry, which is the reason why most companies hire professional quality assurance (QA) engineers. Despite the presence of separate QA engineers, however, software developers are still required to perform basic QA processes by themselves before submitting their new software for pee...
Presentation
Full-text available
Did you know that Cybersecurity applied to embedded systems is a field that focuses on preventing malicious access to and use of embedded systems? Learning Risk assessment techniques and methodologies and using defensive tools for mitigating risk and vulnerabilities. Learn about methods and techniques considering cybersecurity measures in the en...
Article
Full-text available
Refractive diseases often occur in the community. Many people are not aware of the symptoms, some are aware that they are reluctant to consult directly with a doctor for reason that they are afraid of spending a large amount of money just to diagnose refractive disease. Based on some of these problems, a system that can adapt to the ability of an e...
Article
Full-text available
Abstract Background: The risk of Congenital Heart Defects (CHD) is greatly influenced by variants within the genes involved in folate-homocysteine metabolism. Polymorphism in MTHFR (C677T and G1793A) and MS/MTR (A2756G) genes increases the risk of developing CHD risk, but results are controversial. Therefore, we conducted a case–control association...
Article
Full-text available
Context and Aim: Coronary artery disease (CAD) has been recorded as the leading cause of morbidity and mortality worldwide. Studies indicate that patients with CAD show higher degree of pulp calcifications. Localized pulp calcifications are microscopically apparent in more than half of the teeth in young adolescents. However, pulp stones extending...
Article
Full-text available
Background The first and most recent nationwide audit of palliative care services in Uganda was conducted in 2009. Since then, Uganda has made great strides in palliative care development, including policy, education, and services implementation. This study provides an overview of the availability of palliative care services in the country and the...
Article
Full-text available
Due to the presence of solar radiation, each object emits electromagnetic waves at different temperatures. Thermal infrared imaging is to image an object through a thermal infrared CCD, which can reflect the temperature field of the object. The image information is obtained by infrared radiation intensity distribution, and the infrared light invisi...
Article
Full-text available
To address the spatial and temporal limitations of historical museums, a panoramic virtual dynamic display system for digital museums is designed using visual interactive technology. The VM file is generated by using the Digital Museum Design module to obtain a list of available objects, and the VM file is analysed by the Digital Museum View module...
Article
Full-text available
There is an urgent need to combat COVID 19 and to find strategies to minimize the devastating effect that causes in the community. This paper focuses on an automated handwashing system with a dryer that could be deployed in public or private areas. The system uses a single Arduino UNO, ultrasonic sensor, hand dryer(fan blower with heating element),...
Preprint
Full-text available
The end of Moore's Law has ushered in a diversity of hardware not seen in decades. Operating system (and system software) portability is accordingly becoming increasingly critical. Simultaneously, there has been tremendous progress in program synthesis. We set out to explore the feasibility of using modern program synthesis to generate the machine-...
Article
Full-text available
At present, the teaching management system used in colleges cannot classify and store the teaching material information well and also has some problems, such as inaccurate calculation results of resource information weight, long response time, and large data query error. Therefore, this study designs an information college teaching management syste...
Preprint
Full-text available
We propose a design methodology to facilitate fault tolerance of deep learning models. First, we implement a many-core fault-tolerant neuromorphic hardware design, where neuron and synapse circuitries in each neuromorphic core are enclosed with astrocyte circuitries, the star-shaped glial cells of the brain that facilitate self-repair by restoring...
Article
Full-text available
Neutral gas atmosphere bends and delays propagation of microwave signals in satellite-based navigation. Weather prediction models can be used to estimate these effects by providing three-dimensional refraction fields to ray-trace the signal delays. In this study, a global numerical weather prediction model (Open Integrated Forecasting System (OpenI...
Article
Full-text available
Purpose: Massive multi-core architecture is rapidly becoming the standard in digital technology due to its high and parallel computational capability and performance benefits. To fully utilize the technological capabilities of multi-core systems, system software such as compilers should be re-engineered for parallel processing. Several important co...
Article
Full-text available
This paper presents the use of real-time digital simulator (RTDS) and hardware-in-the-loop (HIL) methods for the validation of an energy management system designed for real low-voltage (LV) distribution networks with a high penetration of renewable energy sources. The system is used to address voltage violations and current overloading issues and a...
Article
Full-text available
The Iraqi GNSS network was installed in 2005 with help from the USA and UK. The network consists of seven GNSS stations distributed across Iraq. The network GNSS data have been comprehensively analyzed in this study; this, in turn, allowed us to assess the impact of various geophysical phenomena (e. g., tectonic plate motion and Earthquakes) on its...
Article
Full-text available
In this paper the control and energy management of photovoltaic/wind/battery based hybrid micro grid system is implemented. In this two energy sources are used one is wind and another one is photovoltaic. Grid is connected to the wind and converters for effective communication. By using DC-DC and AC-DC converters the management of energy isolated a...