Search Results - "minicomputer"
-
1
Intruder detection
Published 2013“…It been develop using the minicomputer raspberry pi and several alarm hardware such as magnetic switch and movement sensor that been assemble together to form an security system that can be effort by everyone, develop using PHP and python programming user can determine where they want to place the alarm and what kind of message that they will receive if there an intruder in the house thus protecting the user house by giving the user to inform to the authority such as police or the neighbor to check their house.…”
Get full text
Get full text
-
2
A grain detection system for grain-oriented electrical steels
Published 1989“…The magnitudes and directions of the vectors computed from the components detected by a pair of MRHs controlled by a minicomputer were plotted with a high-resolution plotter. …”
Get full text
Get full text
Get full text
-
3
Quantum computers for optimization the performance
Published 2019“…Performance of computer is based on computer architecture, while computer architecture differs in various devices, such as microcomputers, minicomputers, mainframes, laptops, tablets, and mobile phones. …”
Get full text
Get full text
Get full text
-
4
MC68000 microprocessor development board
Published 2007“…The 68000 is considerably more complex than many of the 16-bit minicomputers popular since the 1970s. The main purpose of the MC68000 microprocessor development board is to educate the coming generation of engineers and programmers about the 68000, with the expectation that they will able to learn, understand, and design their own systems that will be using the 68000 microprocessor. …”
Get full text
Get full text
Get full text
Get full text
Get full text
-
5
Hybrid intelligent approach for network intrusion detection
Published 2015“…A lot of sensitive information passes through various kinds of computer devices, ranging from minicomputers to servers and mobile devices. These occurring changes have led to draw the conclusion that the number of attacks on important information over the network systems is increasing with every year. …”
Get full text
Get full text