• Title/Summary/Keyword: Windows O.S

Search Result 53, Processing Time 0.023 seconds

Developing File Security for Windows Operating System (윈도우 운영체제에서 파일 보안 기능 개발)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1423-1428
    • /
    • 2010
  • This paper designs file security function on Windows O.S. Whenever you use Windows O.S, you need to protect some file data. This paper designs these security protection functions. This paper proposes two security functions on Windows O.S. One is file security. the other is directory access protection. To check the proposed functions well, I experiment the above functions on the Windows O.S. By this experiment, I confirmed that the proposed function worked well.

Analysis of the problems in(SMRT) L-CTC and derivation of measures (서울도시철도(SMRT) L-CTC의 문제점 분석 및 해결 방안 도출)

  • Park, Geum-Heui;Lee, Jong-Woo
    • Proceedings of the KSR Conference
    • /
    • 2008.11b
    • /
    • pp.1204-1212
    • /
    • 2008
  • This study enables to troubleshoot the problems of the existing dual system with the help of the implementation of totally dualized fault-tolerant system to L-CTC computer and HADAX, and equipments are simplified and systems are modernized with the addition of the control function, as a upgraded LCP control system, to L-CTC computer on the basis of WINDOWS based O/S switched from DOS environment. An error on Microlok, which is aninterlocking apparatus, forwarded to L-CTC computer ensures to handle the false data during the operation of the system. This paper discusses a sure way to prevent the deterioration of (SMRT) L-CYC system and to bolster its stability with formation of the dual system. Additionally, WINDOW based O/S consisting of L-CTC computer leads to simplification and modernization of facilities and enhances maintenance functions offering centralization for branch offices and machine rooms as well.

  • PDF

Forensic data extracts of Android and Windows Mobile O.S. Smart Phone (Google Android와 Windows Mobile Smart Phone의 포렌식 자료 추출)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.235-239
    • /
    • 2010
  • Use of mobile phones reached saturation point, the recent use of the iPhone, including the Smart Phone is increasing rapidly. How to extract forensic data from current mobile phones and SYN, JTAG, Revolving There are three ways. Mobile phone and Smart Phone, but the technology and how to use forensic data because of the difference must have different extraction methods. In this paper, in the Smart Phone will study how to extract forensic data. Commonly used in the Google Android Smart Phone and Windows Mobile Smart Phone OS in the specification and analysis for analysis, the data analysis. Also, Google Android and Windows Mobile Smart Phone to extract forensic data to generate evidence. The present study tested the Mobile Smart Phone technology research will contribute to the development of forensic techniques.

  • PDF

A Realtime Analytical System of Football Game

  • Min, Dae-kee
    • Communications for Statistical Applications and Methods
    • /
    • v.8 no.2
    • /
    • pp.557-564
    • /
    • 2001
  • The objective of he study is to record the real conditions along with the soccer ball that is, each player's ball keeping time, the number football keeping, accuracy of passing to other player, direction, etc., on a real-time basis, measure them in numbers and get necessary analyzed output as much as one needs. The study consists of the following stages: (1) Record the data by drawing through Visual Interface on a real-time basis; (2) Graphic windows to display the recorded data item by item in graphic; (3) Form windows to display the individual or team scores anytime when needed; (4) Windows to display the analyzed data in visualized form. The effect of the study is threefold: (1) It inputs all the game-related data on a real-time basis, which was impossible before and shows analyzed contents during the game enabling each tea manager o use; (2) In cse of TV broadcasting or newspaper articles, it explains objectively the situations of he game to the TV viewers or readers; (3) After the game, it provides importance information on each team's playing ability and individual player's technical improvement through data analysis.

  • PDF

The technique of an adaptive scheduling for a multi-tasking separation (다중작업 분할처리를 위한 적응형 스케쥴링 기법)

  • Go, Jeong-Hwan;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.10
    • /
    • pp.2371-2377
    • /
    • 2010
  • As the substantial increment in program complexity and appearance of mega program, the programs need to be divided to small tasks with multiple partitions and performed with a priority based scheduling. And also, a program development has to be progressed according to diversify of development environment. For instance, there are some restrictions upon O/S environment such as embedded O/S or windows. Therefore, the adaptive scheduling technique which performs multiple task partitioning process, regardless environment or O/S, is suggested. In this study, In this study, the adaptive scheduling technique algorithm and its applied examples are described.

Characteristics of Memory Windows of MFMIS Gate Structures (MFMIS 게이트 구조에서의 메모리 윈도우 특성)

  • Park, Jun-Woong;Kim, Ik-Soo;Shim, Sun-Il;Youm, Min-Soo;Kim, Yong-Tae;Sung, Man-Young
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2003.07a
    • /
    • pp.319-322
    • /
    • 2003
  • To match the charge induced by the insulators $CeO_2$ with the remanent polarization of ferro electric SBT thin films, areas of Pt/SBT/Pt (MFM) and those of $Pt/CeO_2/Si$ (MIS) capacitors were ind ependently designed. The area $S_M$ of MIS capacitors to the area $S_F$ of MFM capacitors were varied from 1 to 10, 15, and 20. Top electrode Pt and SBT layers were etched with for various area ratios of $S_M\;/\;S_F$. Bottom electrode Pt and $CeO_2$ layers were respectively deposited by do and rf sputtering in-situ process. SBT thin film were prepared by the metal orgnic decomposition (MOD) technique. $Pt(100nm)/SBT(350nm)/Pt(300nm)/CeO_2(40nm)/p-Si$ (MFMIS) gate structures have been fabricated with the various $S_M\;/\;S_F$ ratios using inductively coupled plasma reactive ion etching (ICP-RIE). The leakage current density of MFMIS gate structures were improved to $6.32{\times}10^{-7}\;A/cm^2$ at the applied gate voltage of 10 V. It is shown that in the memory window increase with the area ratio $S_M\;/\;S_F$ of the MFMIS structures and a larger memory window of 3 V can be obtained for a voltage sweep of ${\pm}9\;V$ for MFMIS structures with an area ratio $S_M\;/\;S_F\;=\;6$ than that of 0.9 V of MFS at the same applied voltage. The maximum memory windows of MFMIS structures were 2.28 V, 3.35 V, and 3.7 V with the are a ratios 1, 2, and 6 at the applied gate voltage of 11 V, respectively. It is concluded that ferroelectric gate capacitors of MFMIS are good candidates for nondestructive readout-nonvolatile memories.

  • PDF

Configuration of PC based Fault Diagnosis System of I/O Cards (PC 기반 I/O 카드의 고장 진단 시스템의 구성에 관한 연구)

  • Byun, S.H.;Ma, B.R.
    • Proceedings of the KIEE Conference
    • /
    • 1999.11c
    • /
    • pp.763-765
    • /
    • 1999
  • Due to the improvement of PC Performance and Windows-based OS, PC-based control system is gradually taking over industrial control in the industry site. In this paper, we suggest the method to configure PC-based fault diagnosis system of I/O cards and the method to generate test signals to find out the short conditions of adjacent channels of cables which connect I/O cards with terminal blocks.

  • PDF

The technique of adaptive scheduling for multi-tasking separation control (다중작업 분할처리를 위한 적응형 스케쥴링 기법)

  • Go, Jeong-Hwan;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.499-502
    • /
    • 2010
  • Because of the substantial increase in program complexity and appearance of mega program, the needs to devide the program into small task with multiple partitions, and perform a scheduling based on the priority is required. And also, a program can be developed on specific environment according to the diversify of development environment. for instance, there are some restrictions upon O/S environment such as Embedded or Windows. therefore, the adaptive scheduling technique which perform multiple task partitioning process regardless environment or O/S is suggested. In this study, Adaptive scheduling technique algorithm and its application to be described.

  • PDF

Comparisons of the growth properties of Ce$O_{2}$ and $Y_{2}$$O_{3}$ buffer layers on Ni tapes

  • S. M. Lim;Kim, H. S.;D. Youm
    • Proceedings of the Korea Institute of Applied Superconductivity and Cryogenics Conference
    • /
    • 2003.02a
    • /
    • pp.113-116
    • /
    • 2003
  • The growth properties of $Y_2$O$_3$ and CeO$_2$ films for the buffer layers on Ni tapes were studied comparatively. The water vapor larger than 2$\times$10$^{-5}$ Torr and the substrate temperature higher than $700^{\circ}C$ were required for the proper growth of $Y_2$O$_3$ films, while the upper limits of the water vapor and the lower limit of the substrate temperatures for the proper growth of CeO$_2$ were 1$\times$10$^{-5}$ Torr and 50$0^{\circ}C$, respectively. These imply that the windows of the growth conditions of CeO$_2$ are wider than those of $Y_2$O$_3$. However the formation of cracks in CeO$_2$ films were its disadvantage, while $Y_2$O$_3$ showed no cracks. PACS. No 85.25.K, 81.15.A.

  • PDF

Design of the File Security Function Using Encryption Algorithm in the Windows Operating System (윈도우 운영체제에서 암호화 알고리즘을 이용한 파일 보안 기능 설계)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.612-618
    • /
    • 2013
  • The file security function, which this paper suggests, restricts the access of an unauthorized users by using password algorithm and saving file. Saved files that are encrypted are read by decrypting them with decryption algorithm. These features are user interface to design the program for user friendly. The security function implements both file encryption and decryption programs and tests whether the experiment works or not. In addition, when a decryption is progressed and the settings of between decryption and encryption are different each other, the security function also checks the possibility of decryption. We can enhance the security on important files stored in Windows servers or personal computers by developing this program.