Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
668
result(s) for
"Linux distributions"
Sort by:
DicomOS: A Preliminary Study on a Linux-Based Operating System Tailored for Medical Imaging and Enhanced Interoperability in Radiology Workflows
by
Currieri, Tiziana
,
Gambino, Orazio
,
Pirrone, Roberto
in
Adaptability
,
Annotations
,
Collaboration
2025
In this paper, we propose a Linux-based operating system, namely, DicomOS, tailored for medical imaging and enhanced interoperability, addressing user-friendly functionality and the main critical needs in radiology workflows. Traditional operating systems in clinical settings face limitations, such as fragmented software ecosystems and platform-specific restrictions, which disrupt collaborative workflows and hinder diagnostic efficiency. Built on Ubuntu 22.04 LTS, DicomOS integrates essential DICOM functionalities directly into the OS, providing a unified, cohesive platform for image visualization, annotation, and sharing. Methods include custom configurations and the development of graphical user interfaces (GUIs) and command-line tools, making them accessible to medical professionals and developers. Key applications such as ITK-SNAP and 3D Slicer are seamlessly integrated alongside specialized GUIs that enhance usability without requiring extensive technical expertise. As preliminary work, DicomOS demonstrates the potential to simplify medical imaging workflows, reduce cognitive load, and promote efficient data sharing across diverse clinical settings. However, further evaluations, including structured clinical tests and broader deployment with a distributable ISO image, must validate its effectiveness and scalability in real-world scenarios. The results indicate that DicomOS provides a versatile and adaptable solution, supporting radiologists in routine tasks while facilitating customization for advanced users. As an open-source platform, DicomOS has the potential to evolve alongside medical imaging needs, positioning it as a valuable resource for enhancing workflow integration and clinical collaboration.
Journal Article
Linux System Administration
by
Halfacree, Gareth
,
Upton, Eben
in
Debian Linux distribution
,
graphical user interface
,
Linux system administration
2016
The majority of modern Linux distributions are user friendly, with a graphical user interface (GUI) that provides an easy way to perform common tasks. It is, however, quite different to both Windows and OS X, so to get the most out of the Raspberry Pi, users first need a quick primer on using the operating system. In Linux, users spend most of their time running a restricted user account. Raspbian is the name given to a customised variant of the popular Debian Linux distribution. Debian is one of the longest‐running Linux distributions and concentrates on stability, high compatibility, and excellent performance even on modest hardware—making it a great partner for the Raspberry Pi. Raspbian is the recommended Linux distribution for the Raspberry Pi, but there are alternatives. The content of the SD card is known as its file system and is split into multiple sections, each with a particular purpose.
Book Chapter
Wired and Wireless Ethernet
by
Duntemann, Jeff
,
Upton, Eben
in
Computer hardware
,
Linux distributions
,
medium access mechanism
2016
This chapter is primarily about wired and wireless Ethernet (both of which are used a great deal with the Raspberry Pi) and focuses on the bottom four layers, including the transport layer, network layer, data link layer, and physical layer. One way to think of it is that the transport set is about moving data, whereas the top three layers, called the application set, are about processing data via networked applications. These layers are the application layer, presentation layer, and session layer. Wi‐Fi is analogous to Ethernet with wireless media, in that it too spans the data link and physical layers of the open system interconnection (OSI) model, with several variations of the medium access (MAC) mechanism and physical layers. Most models of the Raspberry Pi have a wired Ethernet port that is standard and will work without any tweaking on Linux distributions like Raspbian.
Book Chapter
Linux on the Education Desktop: Bringing the Glocal into the Technical Communication Classroom
by
St. Amant, Kirk
,
Flammia, Madelyn
in
Debian Linux distribution
,
educational settings
,
enterprise solutions market
2016
The chapter discusses the Linux success stories in US educational settings belong mostly to server-side solutions where, for example, an email server running Windows® is replaced with Linux. It begins by briefly acknowledging the worldwide success of Linux in the server and enterprise solutions market as well as its growth in the handheld device market. The chapter explores what we can learn from Europe's successful large-scale adoptions of Linux particularly in educational contexts by focusing on an autonomous region of Spain that, until recently, relied on a customized version of the Debian Linux distribution. It presents specific educational strategies professional communication instructors can use to bring these Linux success stories. The chapter discusses how to integrate the ideas into the professional communication classroom in order to help students better understand how the notion of combined global and local (or global) can affect international markets for and uses of technologies.
Book Chapter
Securing Linux on a Network
2015
This chapter provides a brief introduction to securing Linux on a network. It covers some of the basics, such as the OSI model, that you need in order to get started on this process. The chapter describes how you can set iptables firewall rules manually and use the iptables service directly, without the firewalled service. A wonderful tool to help you review your network services from a network standpoint is the nmap security scanner. The nmap utility is available in most Linux distribution repositories. Completely disabling an unused service is fine, but for needed network services, you must set up access control. This control can be accomplished, via the /etc/ hosts.allow and /etc/hosts.deny files, for selected services on Linux systems that incorporate TCP Wrapper support. Firewalls can be placed into different categories, depending upon their function. Each category has an important place in securing your server and network.
Book Chapter
Starting with Linux Shells
by
Bresnahan, Christine
,
Blum, Richard
in
GNU utilities
,
Linux CD distribution
,
Linux desktop environment
2015
This chapter explains what Linux is and where the shell and command line fit in the overall Linux picture. Four main parts make up a Linux system: the Linux kernel, GNU utilities, graphical desktop environment and application software. Each of these parts has a specific job in the Linux system. A relatively new phenomenon in the Linux world is the bootable Linux CD distribution. Most modern PCs can boot from a CD instead of the standard hard drive. As with all good things, Linux LiveCDs have a few drawbacks. But advances are being made in the Linux LiveCD world that will help to solve some of these problems. These advances include the ability to: copy Linux system files from the CD to memory; copy system files to a file on the hard drive; store system settings on a USB memory stick; and store user settings on a USB memory stick.
Book Chapter
DAMBE7: New and Improved Tools for Data Analysis in Molecular Biology and Evolution
2018
DAMBE is a comprehensive software package for genomic and phylogenetic data analysis on Windows, Linux, and Macintosh computers. New functions include imputing missing distances and phylogeny simultaneously (paving the way to build large phage and transposon trees), new bootstrapping/jackknifing methods for PhyPA (phylogenetics from pairwise alignments), and an improved function for fast and accurate estimation of the shape parameter of the gamma distribution for fitting rate heterogeneity over sites. Previous method corrects multiple hits for each site independently. DAMBE’s new method uses all sites simultaneously for correction. DAMBE, featuring a user-friendly graphic interface, is freely available from http://dambe.bio.uottawa.ca (last accessed, April 17, 2018).
Journal Article
TRANSIT - A Software Tool for Himar1 TnSeq Analysis
by
Baker, Richard
,
DeJesus, Michael A.
,
Ambadipudi, Chaitra
in
Algorithms
,
Analysis
,
Bacterial genetics
2015
TnSeq has become a popular technique for determining the essentiality of genomic regions in bacterial organisms. Several methods have been developed to analyze the wealth of data that has been obtained through TnSeq experiments. We developed a tool for analyzing Himar1 TnSeq data called TRANSIT. TRANSIT provides a graphical interface to three different statistical methods for analyzing TnSeq data. These methods cover a variety of approaches capable of identifying essential genes in individual datasets as well as comparative analysis between conditions. We demonstrate the utility of this software by analyzing TnSeq datasets of M. tuberculosis grown on glycerol and cholesterol. We show that TRANSIT can be used to discover genes which have been previously implicated for growth on these carbon sources. TRANSIT is written in Python, and thus can be run on Windows, OSX and Linux platforms. The source code is distributed under the GNU GPL v3 license and can be obtained from the following GitHub repository: https://github.com/mad-lab/transit.
Journal Article
Gene expression in soft-shell clam (Mya arenaria) transmissible cancer reveals survival mechanisms during host infection and seawater transfer
2025
Transmissible cancers are unique instances in which cancer cells escape their original host and spread through a population as a clonal lineage, documented in Tasmanian devils, dogs, and ten bivalve species. For a cancer to repeatedly transmit to new hosts, these lineages must evade strong barriers to transmission, notably the metastasis-like physical transfer to a new host body and rejection by that host’s immune system. We quantified gene expression in a transmissible cancer lineage that has spread through the soft-shell clam ( Mya arenaria ) population to investigate potential drivers of its success as a transmissible cancer lineage, observing extensive differential expression of genes and gene pathways. We observed upregulation of genes involved with genotoxic stress response, ribosome biogenesis and RNA processing, and downregulation of genes involved in tumor suppression, cell adhesion, and immune response. We also observe evidence that widespread genome instability affects the cancer transcriptome via gene fusions, copy number variation, and transposable element insertions. Finally, we incubated cancer cells in seawater, the presumed host-to-host transmission vector, and observed conserved responses to halt metabolism, avoid apoptosis and survive the low-nutrient environment. Interestingly, many of these responses are also present in healthy clam cells, suggesting that bivalve hemocytes may have inherent seawater survival responses that may partially explain why transmissible cancers are so common in bivalves. Overall, this study reveals multiple mechanisms this lineage may have evolved to successfully spread through the soft-shell clam population as a contagious cancer, utilizing pathways known to be conserved in human cancers as well as pathways unique to long-lived transmissible cancers.
Journal Article
Raw QPP-RNG randomness via system jitter across platforms: a NIST SP 800-90B evaluation
2025
High-quality randomness is fundamental to the security of modern cryptographic systems. We present
QPP-RNG
, a true random number generator (TRNG) that harvests entropy from diverse system-level jitters–including CPU pipeline timing divergences, DRAM refresh cycle perturbations, cache miss-driven memory access latencies, and other subtle hardware and operating system-induced fluctuations. QPP-RNG’s core mechanism measures the elapsed time of randomized array sorting operations–where each Fisher-Yates shuffle is infinitesimally perturbed by these microscopic jitters–and amplifies these timing variations into cryptographically strong randomness through a quantum permutation pad (QPP) architecture, all achievable on commodity hardware. The raw output of QPP-RNG underwent rigorous evaluation for independent and identically distributed (IID) behavior using the NIST SP 800-90B IID test suite, alongside the comprehensive NIST SP 800-22 and ENT statistical test batteries. Across a range of platforms, including Windows, macOS, and Raspberry Pi, QPP-RNG consistently achieved high IID min-entropy between
and
bits/byte. It passed all NIST SP 800-90B IID tests with
-values significantly above the
threshold, confirming that its generated randomness is statistically indistinguishable from ideal IID sources derived directly from system jitter. Cross-platform analyses spanning x86_64 and ARM64 architectures further demonstrate that the extracted jitter fingerprint–and consequently the generated randomness–exhibits remarkable statistical consistency, irrespective of the underlying hardware or operating system. QPP-RNG’s entropy density compares favorably with leading commercial entropy sources. It matches or slightly exceeds the NIST IID-certified min-entropy of ID Quantique’s Quantis QRNG (7.8744 bits/byte), and significantly outperforms both Red Hat’s CPU Time Jitter RNG (7.4528 bits/byte) and Quside’s PCIe One quantum entropy source (6.5136 bits/byte). Even against specialized hardware RNGs like Microchip’s ECC608 (4.0568 bits/byte), QPP-RNG demonstrates superior performance using only general-purpose processors. By effectively transforming otherwise discarded system noise into a reliable and high-quality entropy stream, QPP-RNG establishes a novel paradigm for embedded security, providing a robust entropy source on general-purpose devices without specialized hardware. This makes it especially well-suited for resource-constrained Internet of Things (IoT) and edge computing applications where strong entropy sources are paramount.
Journal Article