Sentence examples for configuration of hardware from inspiring English sources

Exact(4)

The configuration of hardware resources and resource demands is done using the standard SPT Profile which is extended where necessary.

Hacking is commonly described as "act of re-designing the configuration of hardware or software systems to alter their intended function" [32].

The overall control system is comprehensive, comprising of various selected control and instrumentation components, integrated within a configuration of hardware architecture centred around a dSPACE DS1004 DSP processor board.

The DAS software essentially meets the demand of an active remote configuration of hardware digitizers, like PXI system and that of the initialization of acquisition within the local network.

Similar(56)

Major exhibitions here and abroad included his elegant, stripped-down configurations of hardware store materials like chain-link fencing, pipe, rope, hoses, lumber, sawhorses, oil barrels and nuts and bolts.

Major exhibitions included his elegant, stripped-down configurations of hardware-store materials like chain-link fencing, pipes, ropes, hoses, lumber, saw horses, oil barrels, and nuts and bolts.

However, the above mentioned hardware-based methods all require a kind of special configuration of the hardware set-up in the system design in order to achieve their objectives, which inevitably limits the flexibility of OCT system by sacrificing the scanning speed and increasing the system cost.

For this reason, the configuration of the hardware was designed with particular attention.

The configuration of chips, hardware resource usages, and the performance of the proposed skin color detection will be described in fourth section.

Efficient protection solutions to cope with the attack discussed in the previous sections, and more generally boot time attacks, mainly rely on the configuration of the hardware of each computer, which is the responsibility of both the firmware and the kernel.

Key processing are mainly concentrated in the kernel level (including Xen and Linux), such as the configuration and virtualization of hardware performance counters, sampling mechanism and etc., while use-space daemons of virtual machines are primarily used to analyze samples from the buffer in the kernel which are connected with corresponding functions or sections.

Show more...

Ludwig, your English writing platform

Write better and faster with AI suggestions while staying true to your unique style.

Student

Used by millions of students, scientific researchers, professional translators and editors from all over the world!

MitStanfordHarvardAustralian Nationa UniversityNanyangOxford

Since I tried Ludwig back in 2017, I have been constantly using it in both editing and translation. Ever since, I suggest it to my translators at ProSciEditing.

Justyna Jupowicz-Kozak quote

Justyna Jupowicz-Kozak

CEO of Professional Science Editing for Scientists @ prosciediting.com

Get started for free

Unlock your writing potential with Ludwig

Letters

Most frequent sentences: