When I install Ubuntu after window 8 you can not find windows 8.
When I install windows 8 after Ubuntu you can not find Ubuntu .
Assuming you have a UEFI based system (as opposed to BIOS) - you might find this helpful. http://itsfoss.com/install-ubuntu-1404-dual-boot-mode-windows-8-81-uefi/
Yes windows 8 dose not list the Linux partitions ,
and dose not existing in booting manager when I turn on the computer.
The privacy issues for health care data is always been an issue. Can we collect the health care data with the consent of the person? To create an app that collects health data to build a health...
11 December 2019 5,349 3 View
What is the most effective approach to applying a questionnaire for scientific research? The reason for using questionnaire is to measure the awareness of security in social media for university...
09 October 2019 3,830 7 View
could AI harm people? could AI be out of control? could we rely on AI at level that we give up on providing idea with our own mind? could AI prevent our mind from evolving?
07 August 2019 7,160 4 View
If we want to keep using technologies we must abandoning Artificial intelligence. unless we found a way to control it which is unlikely to happen. Some rules must be adopted to band or control AI...
06 July 2019 7,493 5 View
I need here the obstacles that phase the SON's providers from applying their security plan at full range scale.
05 June 2019 7,348 6 View
As we know social media has become an international product that connect all the world, but if we starting band company like Huawei, their is a consequences (ex. economically,socially). Because...
05 June 2019 6,201 2 View
If we classify security to availability, confidentiality, and integrity type, should we consider fake accounts problem as an integrity security type.
03 April 2019 4,838 3 View
I need to analyze the cases of security incident in social online network's (social media) from scientific legit papers.
03 April 2019 5,574 3 View
I need the document for latest security standards for IT, also I need a security standards for specific field in IT such as IoT, cloud computing and social media.
01 February 2019 6,495 4 View
What is the most important issues to deal with to bulid a dynamic cloud computing standard?
09 October 2018 6,776 2 View
I'm targeting to deploy a mesh network and manually configure MANET routing protocols. I'm preparing scenarios, architectures, and hard devices needed to do that. Are there some step-by-step...
03 March 2021 1,931 5 View
I have dataset which shows the length of power lines. I need to classify the lines based on the line length. Is there a rule to classify the High voltage (HV) and low voltage (LV) lines based on...
03 March 2021 4,116 4 View
The range of forms and sizes of cavities in rock is very big. Is there a classification scheme for rock cavities regarding their size and shape?
02 March 2021 4,511 3 View
Is there a powerful system for the security of the systems distributed on IoT systems?
02 March 2021 3,858 10 View
Which is suitable for use with Python? MySQL or SQL Server? What is your suggestion?
01 March 2021 3,422 3 View
Hi everyone, I would like to ask how I can download BibExcel software for MacOs? There are some links which are supported by Windows but I could not find it for Mac. or is there any other software...
01 March 2021 652 1 View
I like to do project in laser measurement system. My objective is to eliminate or reduce the cosine error, abbe error in Laser measurement system. I have Rhenishaw XL80 system. Please tell the...
28 February 2021 4,890 3 View
Hi every body I need to collect datasets from different source to work on recommendation system algorithms, could you advise me how collect data?
27 February 2021 7,063 7 View
25 February 2021 1,987 3 View
Hi everyone How to model Supercritical water gasification (SCWG) process in Homer software?
25 February 2021 4,075 1 View