Search Results - "Shell Scripting"
-
1
Technique for preparation of large data for machine learning algorithms to generate intrusion detection system
ISSN: 2409-5656, 1819-6608Published: 13.09.2023Published in ARPN journal of engineering and applied sciences (13.09.2023)“…Machine Learning has become the norm for creating models that predict and detect security breaches in computer systems. Modelling of machine learning systems…”
Get full text
Journal Article -
2
A Web-Based Docker Image Assistant Generation Tool for User-PC Computing System
ISSN: 2078-2489, 2078-2489Published: Basel MDPI AG 23.05.2023Published in Information (23.05.2023)“…Currently, we are developing the user-PC computing (UPC) system based on the master-worker model as a scalable, low-cost, and high-performance computing…”
Get full text
Journal Article -
3
Analysis of cutting forces in helical ball end milling process using machine learning
ISSN: 2214-7853, 2214-7853Published: Elsevier Ltd 2021Published in Materials today : proceedings (2021)“…In this paper, variation of cutting forces exerted on tool with respect to cutting parameters for ball end milling process is analysed using deep neural…”
Get full text
Journal Article -
4
VISUALIZATION OF THE GEOPHYSICAL SETTINGS IN THE PHILIPPINE SEA MARGINS BY MEANS OF GMT AND ISC DATA
ISSN: 2668-4322, 2668-4322Published: Romanian Geographical Society - Prahova Branch 30.06.2020Published in Central European Journal of Geography and Sustainable Development (30.06.2020)“…The presented research aimed to perform geophysical modelling (gravity and geoid) and to evaluate the spatio-temporal variation of the marine geological data…”
Get full text
Journal Article -
5
Hello Linux! AI and Linux Redefining the Everyday User Experience
Published: IEEE 28.05.2025Published in 2025 IEEE World AI IoT Congress (AIIoT) (28.05.2025)“…The Linux operating system is a powerful, open-source tool that maximizes a computer's potential. It offers advantages over Windows and Mac OS, including…”
Get full text
Conference Proceeding -
6
PDF Malware Analysis
Published: IEEE 03.11.2022Published in 2022 7th International Conference on Computing, Communication and Security (ICCCS) (03.11.2022)“…This document addresses the issue of the actual security level of PDF documents. Two types of detection approaches are utilized to detect dangerous elements…”
Get full text
Conference Proceeding -
7
UNAME Tool: Automatic Generation of Computer Resources Monitoring Scripts
Published: AISTI 23.06.2021Published in 2021 16th Iberian Conference on Information Systems and Technologies (CISTI) (23.06.2021)“…Decision-making regarding performance issues re- quires computer systems monitoring at any level of service provisioning. However, most of the available tools…”
Get full text
Conference Proceeding -
8
Painting by numbers: A GMT primer for merging swath-mapping sonar data of different types and resolutions
ISSN: 0098-3004, 1873-7803Published: Oxford Elsevier Ltd 01.10.2005Published in Computers & geosciences (01.10.2005)“…Swath-mapping sonar systems are used to map the sea floor either by collecting bathymetry or backscatter data. However, the manipulation of such data to…”
Get full text
Journal Article