• Title/Summary/Keyword: Windows Operating System

Search Result 240, Processing Time 0.043 seconds

Design and Implementation of a Phone System Operating on PDA (PDA기반 음성전화시스템의 설계 및 구현)

  • 안용운;김상철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.199-201
    • /
    • 2001
  • 최근 모바일 컴퓨팅 기술이 발전되면서, PDA 등과 같은 소형 컴퓨팅 장치가 빠른 속도로 보급되고 있다. PDA는 이동전화나 무선 LAN 등을 통해서 다른 PDA 또는 일반 컴퓨터에 접속해서 메일 수신, 인터넷, 채팅 등에 사용되고 있다. 우리는 PDA간 또는 PDA와 데스크탑 컴퓨터간의 음성통신 기능을 제공하는 음성 전화 시스템을 개발하였다. 본 논문은 우리가 개발한 음성 전화 시스템의 기능, 구조, 구현을 소개한다. 우리의 음성 전화 시스템은 Windows CE 환경 하에서 동작하고 H.323을 지원하도록 설계되어있다. 또한, 본 논문에서는 음성통신을 위한 송, 수신 버퍼 사용의 효율적인 방법을 제안한다. 우리의 조사에 의하면, Windows CE 기반의 음성전화시스템에 대한 기존 연구가 거의 발표되지 않았다.

Extended Linear Vulnerability Discovery Process

  • Joh, HyunChul
    • Journal of Multimedia Information System
    • /
    • v.4 no.2
    • /
    • pp.57-64
    • /
    • 2017
  • Numerous software vulnerabilities have been found in the popular operating systems. And recently, robust linear behaviors in software vulnerability discovery process have been noticeably observed among the many popular systems having multi-versions released. Software users need to estimate how much their software systems are risk enough so that they need to take an action before it is too late. Security vulnerabilities are discovered throughout the life of a software system by both the developers, and normal end-users. So far there have been several vulnerability discovery models are proposed to describe the vulnerability discovery pattern for determining readiness for patch release, optimal resource allocations or evaluating the risk of vulnerability exploitation. Here, we apply a linear vulnerability discovery model into Windows operating systems to see the linear discovery trends currently observed often. The applicability of the observation form the paper show that linear discovery model fits very well with aggregate version rather than each version.

Real-Time Support on Multi-Processor for Windows (멀티프로세서 윈도우즈 상에서 실시간성 지원)

  • Song, Chang-In;Lee, Seung-Hoon;Ju, Min-Gyu;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.6
    • /
    • pp.68-77
    • /
    • 2012
  • As the system development environment moves from single core to multi core-based platforms, it becomes more important to maintain compatibility between single core-based implementations and multi core-based implementations. Moreover, it is very important to support real-time on multi core platforms especially in cases of embedded software or test equipments which need real-time as well as correctness. Since Windows operating system dopes not support real-time in itself, it has been supporting real-time using expensive third-party solutions such as RTX or INtime. So as to reduce this kind of development expenses, in this paper, we propose RTiK-MP(Real-Time implant Kernel-Multi Processor) which supports real-time on Windows using the Local APIC of x86 architectures, and evaluate the performance of the proposed RTiK-MP after deploying it on portable missile test equipments.

Design and Implementation of Finger Keyboard with Video Camera (비디오 카메라를 이용한 핑거 키보드의 설계 및 구현)

  • Hwang, Kitae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.157-163
    • /
    • 2016
  • This paper presents Finger Keyboard which detects the user's key types on a keyboard drawn on the paper using a video camera. The Finger Keyboard software was written in standard C/C++ language and thus easy to port to other computing environments. We installed a popular USB-type web camera on a Windows PC and implemented the Finger Keyboard as a Windows application which detects key typing and then injects the key code into the message queue of the Windows operating system. Also we implemented the Finger Keyboard on the Raspberry Pi 2 embedded computer with a dedicated camera and connected it to the Android device as an external keyboard through the Bluetooth. The result of experiments showed that the average ratio of recognition success is around 80% at the typing speed of 120 characters per minute.

Design of the File Security Function Using Encryption Algorithm in the Windows Operating System (윈도우 운영체제에서 암호화 알고리즘을 이용한 파일 보안 기능 설계)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.612-618
    • /
    • 2013
  • The file security function, which this paper suggests, restricts the access of an unauthorized users by using password algorithm and saving file. Saved files that are encrypted are read by decrypting them with decryption algorithm. These features are user interface to design the program for user friendly. The security function implements both file encryption and decryption programs and tests whether the experiment works or not. In addition, when a decryption is progressed and the settings of between decryption and encryption are different each other, the security function also checks the possibility of decryption. We can enhance the security on important files stored in Windows servers or personal computers by developing this program.

Research on Registry Analysis based Malware Detection Method (Registry 분석을 통한 악성코드 감염여부 탐지 방법 연구)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.5
    • /
    • pp.37-43
    • /
    • 2017
  • A registry is a hierarchy database which is designed to store information necessary for operating system and application programs in Windows operating system, and it is involved in all activities such as booting, logging, service execution, application execution, and user behavior. Digital forensic is widely used. In recent years, malicious codes have penetrated into systems in a way that is not recognized by the user, and valuable information is leaked or stolen, causing financial damages. Therefore, this study proposes a method to detect malicious code by using a shareware application without using expensive digital forensic program, so as to analysis hacking methods and prevent hacking damage in advance.

Design and Implementation of a Video-On-Demand System using Software RAID Technology (소프트웨어 RAID 기술을 이용한 주문형 비디오 시스템의 설계 및 구현)

  • Kim, Jong-Hoon
    • Journal of The Korean Association of Information Education
    • /
    • v.3 no.1
    • /
    • pp.22-32
    • /
    • 1999
  • In this paper, a von system which is based on current computer technologies is implemented. This von system organizes many personal computers in a local network into a configuration server, storage servers, and clients. To provide reliability, the data is stored using software RAID technology. Also, multimedia services are client-based for efficiency. The software components of this von system are the von configuration software, the von configuration service software, the von management software, and the von service software. Only the von service software runs in the client, while all the others run in the configuration server. The operating system on which the configuration server is run is the Windows NT such that the software executes like the UNIX-daemon process in the Windows NT service manager.

  • PDF

Device Driver Development of LSM Using General Purpose PCI I/O Board

  • Kim, Hyun-Joong;Lee, Sang-Min;Ham, Woon-Chul
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1684-1688
    • /
    • 2003
  • In this paper, position and speed control algorithm of LSM (Linear Stepping Motor) using general-purpose PCI I/O board is discussed. The main purpose of this paper is to show that LSM controller can be established on the non real time operating system such as Microsoft Win2000 under the assumption that thread priority strategy is well designed. We can guarantee sampling interval less than 5msec based on the Pentium III microprocessor. Therefore this kind of LSM controller development environment makes shorten the prior research period needed to verify the validness of the proposed control strategy. We also introduce the tool of the real-time windows target system of matlab, which also makes shorten the prior research period. The main focus of this paper is on developing general purpose NT device driver which can drive the general purpose PCI board and applying it for implementing the hardware interface for 2- axis linear stepping motor control. From the experimental results show that the developed LSM controller guarantee 2 micrometer resolution in position control with 10cm/sec moving speed

  • PDF

Design and Implementation of Interactive Editing System for SGML DTD Composition (SGML 문서형 정의부 작성을 위한 대화형 편집 시스템 설계 및 구현)

  • 김창수;정회경
    • The Journal of Information Technology
    • /
    • v.2 no.2
    • /
    • pp.35-49
    • /
    • 1999
  • This papar describes an design and implementation of a rule builder, named SGML DTD(Document Type Definition) Editor conforming to ISO 8879(SGML : Standard Generalized Markup Language). SGML DTD define types of logical structure in documents and it is very hard to managing, operating with general common text editors because of it's complex structures. Therefore, We studied DTD automatic editor and production system, prototype system, direct operations on graphic trees in the environment of windows. It's easy to handle with general users. So, We analyzed the structures of document, and studied about SGML documents operation models. And also described logical structures by tree on Windows.

  • PDF

Implementation of IC Card Interface Chipset with AES Cryptography (AES 암호화 모듈을 내장한 IC카드 인터페이스 칩? 개발)

  • 김동순;이성철
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.9
    • /
    • pp.494-503
    • /
    • 2003
  • In this paper, we propose the implementation techniques of IC card chipset that is compatible with international standard ISO-7816 and supports WindowsCE operating system to expropriate various electronic cash and credit card. This IC card interface chip set is composed with 32 bit ARM720T Core and AES(Advanced Encryption System) cryptography module for electronic commerce. Six IC card interfaces support T=0, T=1 protocol and two of them are used to interface with user card directly, the others are used for interface with SAM card. In addition, It supports a LCD controller and USB interface for host. We improved the performance about 70% than software based It card chip set and verified using Hynix 0.35um process.