Search Results - "minicomputer"

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Intruder detection by Muhamad Haffiz, Muhamad Adlin

    Published 2013
    “…It been develop using the minicomputer raspberry pi and several alarm hardware such as magnetic switch and movement sensor that been assemble together to form an security system that can be effort by everyone, develop using PHP and python programming user can determine where they want to place the alarm and what kind of message that they will receive if there an intruder in the house thus protecting the user house by giving the user to inform to the authority such as police or the neighbor to check their house.…”
    Get full text
    Get full text
  2. 2

    A grain detection system for grain-oriented electrical steels by Mohd Ali, Borhanuddin, Moses, Anthony John

    Published 1989
    “…The magnitudes and directions of the vectors computed from the components detected by a pair of MRHs controlled by a minicomputer were plotted with a high-resolution plotter. …”
    Get full text
    Get full text
    Get full text
  3. 3

    Quantum computers for optimization the performance by Mohamed Abdullah, Radhwan, Basher, Radhwan, Alwan Aljuboori, Ali Amer, Abualkishik, Abedallah Zaid

    Published 2019
    “…Performance of computer is based on computer architecture, while computer architecture differs in various devices, such as microcomputers, minicomputers, mainframes, laptops, tablets, and mobile phones. …”
    Get full text
    Get full text
    Get full text
  4. 4

    MC68000 microprocessor development board by Cheong, Kee Loan

    Published 2007
    “…The 68000 is considerably more complex than many of the 16-bit minicomputers popular since the 1970s. The main purpose of the MC68000 microprocessor development board is to educate the coming generation of engineers and programmers about the 68000, with the expectation that they will able to learn, understand, and design their own systems that will be using the 68000 microprocessor. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
  5. 5

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…A lot of sensitive information passes through various kinds of computer devices, ranging from minicomputers to servers and mobile devices. These occurring changes have led to draw the conclusion that the number of attacks on important information over the network systems is increasing with every year. …”
    Get full text
    Get full text