A small operating system for a 8080 micro-computer system

1976 ◽  
Vol 2 (4) ◽  
pp. 54-64 ◽  
Author(s):  
B. Veldstra ◽  
J.M.H. Dassen
2015 ◽  
Vol 1115 ◽  
pp. 484-487 ◽  
Author(s):  
Muhammad Sami ◽  
Akram M. Zeki

The aim of this study is to create and assemble the system with customizing/building Linux kernel and environments to be compatible and efficient on mini-ITX computer. The objective of the study is to create/customizing lightweight operating system using GNU/Linux to be used on computer to be used on vehicle. The system would also optimize the size and functionalities most probably would be implemented on car computer system.Keywords: mini-ATX, CarPC, Linux, Ubuntu, Qt, QML


2021 ◽  
Vol 17 (2) ◽  
Author(s):  
Kisron Kisron ◽  
Bima Sena Bayu Dewantara ◽  
Hary Oktavianto

In a visual-based real detection system using computer vision, the most important thing that must be considered is the computation time. In general, a detection system has a heavy algorithm that puts a strain on the performance of a computer system, especially if the computer has to handle two or more different detection processes. This paper presents an effort to improve the performance of the trash detection system and the target partner detection system of a trash bin robot with social interaction capabilities. The trash detection system uses a combination of the Haar Cascade algorithm, Histogram of Oriented Gradient (HOG) and Gray-Level Coocurrence Matrix (GLCM). Meanwhile, the target partner detection system uses a combination of Depth and Histogram of Oriented Gradient (HOG) algorithms. Robotic Operating System (ROS) is used to make each system in separate modules which aim to utilize all available computer system resources while reducing computation time. As a result, the performance obtained by using the ROS platform is a trash detection system capable of running at a speed of 7.003 fps. Meanwhile, the human target detection system is capable of running at a speed of 8,515 fps. In line with the increase in fps, the accuracy also increases to 77%, precision increases to 87,80%, recall increases to 82,75%, and F1-score increases to 85,20% in trash detection, and the human target detection system has also improved accuracy to 81%, %, precision increases to 91,46%, recall increases to 86,20%, and F1-score increases to 88,42%.


1989 ◽  
Vol 11 (3) ◽  
pp. 119-123 ◽  
Author(s):  
Arthur A. Eggert ◽  
Kenneth A. Emmerich ◽  
Thomas J. Blankenheim ◽  
Gary J. Smulka

Improvements in the performance of a laboratory computer system do not necessarily require the replacement of major portions of the system and may not require the acquisition of any hardware at all. Major bottlenecks may exist in the ways that the operating system manages its resources and the algorithm used for timesharing decisions. Moreover, significant throughput improvements may be attainable by switching to a faster storage device if substantial disk activity is performed. In this study the fractions of time used for each of the types of tasks a laboratory computer system performs (e.g. applications programs, disk transfer, queue cycler) are defined and measured. Methods for reducing the time fractions of the various types of overhead are evaluated by doing before and after studies. The combined results of the three studies indicated that a 50% improvement could be gained through system tuning and faster storage without replacement of the computer itself


2018 ◽  
Vol 1 (2) ◽  
pp. 86-93
Author(s):  
I Putu Agus Eka Pratama ◽  
Anak Agung Bagus Arya Wiradarma

The Linux Operating System is known for its open-source characteristic which means everyone is free to develop Linux with the use of available source code. The result of Linux development is called Linux distribution (Distro). There are various Linux distributions in accordance with their respective uses, one of them is Kali Linux. Kali Linux is a Linux distro that is developed to penetrate the security of computer systems. Kali Linux uses a variety of tools to perform its functions. However, for users who want to use the functionality of Kali Linux without having to change the Linux distro that has been used, the user can use Katoolin. Katoolin can provide the convenience and flexibility for users who want to use Kali Linux as a special Linux distro for the purpose of penetrating computer system security without having to replace the distro that has been used or do a full install of Kali Linux. One case study that can be solved using the Kali Kali Linux based tool on Katoolin is Reverse Engineering. The case study was solved using one of the tools in the Reverse Engineering category named apktool that available on Katoolin.


10.28945/2156 ◽  
2015 ◽  
Author(s):  
Aderonke Peace Akinduro ◽  
Boniface Kayode Alese ◽  
Olufunso Dayo Alowolodu ◽  
Aderonke Favour-Bethy Thompson ◽  
Akintoba Emmanuel Akinwonmi

The most common way of ensuring confidentiality of data or documents by individuals, governments, and institutions such as banks, hospitals, and other commercial enterprises is by consigning their secrets to a computer system. But this has not solved the problems of upholding security, instead they are more compounded due to the fact that secrets sharing is generally desired but only in a tightly controlled manner. This could be resolved by the introduction of a secured shared processing system. Secured shared processing system is a system that comprises of several computers whereby one stands as a secured, trusted system while the other systems are connected to it. The system do not divide up a memory or a clock; the computers only communicate with each other by exchanging messages over a communication channel; and each computer has its own memory and operates on its own operating system. This is achieved with the aid of Cryptographic mechanisms in which EI Gamal model was adopted as a Public-key cryptography scheme which will be applied on a workstation distributed System.


2019 ◽  
Author(s):  
Cosmas Eko Suharyanto

The operating system is a vital part of the computer system. Windows users still occupies the top position in the operating system user statistics. The popular Windows operating system, Windows 7 and Windows 8, they still have loyal users. The issue of information security becomes important with the increasing use of today's technology in various aspects. This study aims to analyze system security in Windows 7 and Windows 8. The results of this study prove the security system of Windows 8 is superior to its predecessor Windows 7. However, the primacy of security system Windows 8 can not be separated from some of notes that should be of concern to the user


Sign in / Sign up

Export Citation Format

Share Document