نتایج جستجو برای: booting

تعداد نتایج: 1102  

Journal: :Environmental Earth Sciences 2023

Abstract Handheld optical sensor was used to measure canopy reflectance at red region (656 nm) and near-infrared (774 generate NDVI data for monitoring rice productivity under soil amendment with combinations of fertilizers two levels water regime in smallholder Irrigation Scheme, Lower Moshi, North Tanzania. The study carried out an experimental design which consisted irrigation (flooding syst...

1997
Samuel A. Fineberg

The Whitney project is integrating commodity off-the-shelf PC hardware and software technology to build a parallel supercomputer with hundreds to thousands of nodes. To build such a system, one must have a scalable software model, and the installation and maintenance of the system software must be completely automated. We describe the design of an architecture for booting, installing and config...

Journal: :International Journal of Enviornment and Climate Change 2021

To manage the Cyperus rotundus (Purple nut sedge.) is a troublesome, economically damaging weed, widely naturalized in tropical and subtropical regions of world. A field experiment was done at Students Instructional Farm Chandra Shekhar Azad University Agriculture & Technology, Kanpur (U.P).The study conducted to investigate competitive effects C. wheat (Triticum aestivum L.) under varying ...

2015
Sebastian Biedermann Stefan Katzenbeisser Jakub Szefer

In this paper we present a new class of side-channel attacks on computer hard drives. Hard drives contain one or more spinning disks made of a magnetic material. In addition, they contain different magnets which rapidly move the head to a target position on the disk to perform a write or a read. The magnetic fields from the disk’s material and head are weak and well shielded. However, we show t...

2014
Xingjie Yu Bo Chen Zhan Wang Bing Chang Wen Tao Zhu Jiwu Jing

Nowadays, smartphones have started being used as a tool to collect and spread politically sensitive or activism information. The exposure of the possession of such sensitive data shall pose a risk in severely threatening the life safety of the device owner. For instance, the data owner may be caught and coerced to give away the encryption keys so that the encryption alone is inadequate to mitig...

2007
Vincent Zimmer

The Unified Extensible Firmware Interface (UEFI) provides a consistent set of interfaces designed to support the booting of shrink-wrap operating systems, loading of drivers that replace legacy PC/AT option ROM’s, and support operating-system absent diagnostics and applications. In addition to this, UEFI capabilities are exported by C-callable interfaces, thus allowing for UEFI platforms to spa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید