• Title/Summary/Keyword: Windows Operating System

Search Result 241, Processing Time 0.035 seconds

STATUS OF GOCI DATA PROCESSING SYSTEM(GDPS) DEVELOPMENT

  • Han, Hee-Jeong;Ahn, Yu-Hwan;Ryu, Joo-Hyung
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.159-161
    • /
    • 2007
  • Geostationary Ocean Color Imager (GOCI), the world-first ocean remote sensing instrument on geostationary Communication, Ocean, Meteorological Satellite (COMS), will be able to take a picture of a large region several times a day (almost with every one hour interval). We, KORDI, are in charge for developing the GOCI data processing system (GDPS) which is the basic software for processing the data from GOCI. The GDPS will be based on windows operating system to produce the GOCI level 2 data products (useful for oceanographic environmental analysis) automatically in real-time mode. Also, the GDPS will be a user-interactive program by well-organized graphical user interfaces for data processing and visualization. Its products will be the chlorophyll concentration, amount of total suspended sediments (TSS), colored dissolved organic matters (CDOM) and red tide from water leaving radiance or remote sensing reflectance. In addition, the GDPS will be able to produce daily products such as water current vector, primary productivity, water quality categorization, vegetation index, using individual observation data composed from several subscenes provided by GOCI for each slit within the target area. The resulting GOCI level 2 data will be disseminated through LRIT using satellite dissemination system and through online request and download systems. This software is carefully designed and implemented, and will be tested by sub-contractual company until the end of this year. It will need to be updated in effect with respect to new/improved algorithms and the calibration/validation activities.

  • PDF

VirtAV: an Agentless Runtime Antivirus System for Virtual Machines

  • Tang, Hongwei;Feng, Shengzhong;Zhao, Xiaofang;Jin, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5642-5670
    • /
    • 2017
  • Antivirus is an important issue to the security of virtual machine (VM). According to where the antivirus system resides, the existing approaches can be categorized into three classes: internal approach, external approach and hybrid approach. However, for the internal approach, it is susceptible to attacks and may cause antivirus storm and rollback vulnerability problems. On the other hand, for the external approach, the antivirus systems built upon virtual machine introspection (VMI) technology cannot find and prohibit viruses promptly. Although the hybrid approach performs virus scanning out of the virtual machine, it is still vulnerable to attacks since it completely depends on the agent and hooks to deliver events in the guest operating system. To solve the aforementioned problems, based on in-memory signature scanning, we propose an agentless runtime antivirus system VirtAV, which scans each piece of binary codes to execute in guest VMs on the VMM side to detect and prevent viruses. As an external approach, VirtAV does not rely on any hooks or agents in the guest OS, and exposes no attack surface to the outside world, so it guarantees the security of itself to the greatest extent. In addition, it solves the antivirus storm problem and the rollback vulnerability problem in virtualization environment. We implemented a prototype based on Qemu/KVM hypervisor and ClamAV antivirus engine. Experimental results demonstrate that VirtAV is able to detect both user-level and kernel-level virus programs inside Windows and Linux guest, no matter whether they are packed or not. From the performance aspect, the overhead of VirtAV on guest performance is acceptable. Especially, VirtAV has little impact on the performance of common desktop applications, such as video playing, web browsing and Microsoft Office series.

MFT-based Forensic Evidence File Search Method Using Direct Access to Physical Sector of Hard Disk Drive (하드디스크의 물리적 섹터 접근 방법을 이용한 MFT기반 증거 파일 탐색 기법)

  • Kim, Yo-Sik;Choi, Myeong-Ryeol;Chang, Tae-Joo;Ryou, Jae-Cheol
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.65-71
    • /
    • 2008
  • According to the capacity of hard disk drive is increasing day by day, the amount of data that forensic investigators should analyze is also increasing. This trend need tremendous time and effort in determining which files are important as evidence on computers. Using the file system APIs provided by Windows system is the easy way to identify those files. This method, however, requires a large amount of time as the number of files increase and changes the access time of files. Moreover, some files cannot be accessed due to the use of operating system. To resolve these problems, forensic analysis should be conducted by using the Master File Table (MFT). In this paper, We implement the file access program which interprets the MFT information in NTFS file system. We also extensibly compare the program with the previous method. Experimental results show that the presented program reduces the file access time then others. As a result, The file access method using MFT information is forensically sound and also alleviates the investigation time.

  • PDF

Parallel Processing of k-Means Clustering Algorithm for Unsupervised Classification of Large Satellite Images: A Hybrid Method Using Multicores and a PC-Cluster (대용량 위성영상의 무감독 분류를 위한 k-Means Clustering 알고리즘의 병렬처리: 다중코어와 PC-Cluster를 이용한 Hybrid 방식)

  • Han, Soohee;Song, Jeong Heon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.37 no.6
    • /
    • pp.445-452
    • /
    • 2019
  • In this study, parallel processing codes of k-means clustering algorithm were developed and implemented in a PC-cluster for unsupervised classification of large satellite images. We implemented intra-node code using multicores of CPU (Central Processing Unit) based on OpenMP (Open Multi-Processing), inter-nodes code using a PC-cluster based on message passing interface, and hybrid code using both. The PC-cluster consists of one master node and eight slave nodes, and each node is equipped with eight multicores. Two operating systems, Microsoft Windows and Canonical Ubuntu, were installed in the PC-cluster in turn and tested to compare parallel processing performance. Two multispectral satellite images were tested, which are a medium-capacity LANDSAT 8 OLI (Operational Land Imager) image and a high-capacity Sentinel 2A image. To evaluate the performance of parallel processing, speedup and efficiency were measured. Overall, the speedup was over N / 2 and the efficiency was over 0.5. From the comparison of the two operating systems, the Ubuntu system showed two to three times faster performance. To confirm that the results of the sequential and parallel processing coincide with the other, the center value of each band and the number of classified pixels were compared, and result images were examined by pixel to pixel comparison. It was found that care should be taken to avoid false sharing of OpenMP in intra-node implementation. To process large satellite images in a PC-cluster, code and hardware should be designed to reduce performance degradation caused by file I / O. Also, it was found that performance can differ depending on the operating system installed in a PC-cluster.

The Effect of Switching Costs on user Resistance in the Adoption of Open Source Software (오픈소스 소프트웨어 도입 시 전환비용이 사용자 저항에 미치는 영향)

  • Kim, Hee-Woong;Noh, Seung-Eui;Lee, Hyun-Lyung;Kwahk, Kee-Young
    • Information Systems Review
    • /
    • v.11 no.3
    • /
    • pp.125-146
    • /
    • 2009
  • The emergence of open source software(OSS) with its most prominent advantages creates a vast interest among practitioners. A study on Linux, the most well-known OSS, estimated that it would cost as 5.4 billion Euros taking over 73,000 person-years if it had been developed by conventional means. However, Linux has achieved only 0.65 percent of the operating system market for individual users while Microsoft windows family counts for nearly 90 percent of the market. Much of the effort being spent in the development of OSS is going to waste and potential value that OSS can bring to users is not being realized. Adoption of OSS is often accompanied by the discontinuance of existing software that is already in place. If users resist changing, they may not adopt OSS. Using the case of Linux, this study examines user resistance to change from the commercial operating software to the free operating system. This study identifies six sub-types of switching costs (uncertainty, emotional, setup, learning, lost benefit, and sunk costs) and tests their effects on user resistance to change based on a survey of 201 users. The results show that user resistance to change has a negative impact on the adoption of OSS. Further, this study shows that uncertainty and emotional costs have significant effects on user resistance to change. Beyond previous research on technology adoption, this research contributes towards an understanding of the switching costs leading to user resistance to change and offers suggestions to OSS practitioners for developing strategies to improve the adoption of OSS.

Development of GUI Program for Automated Generation of Airfoil Performance Table (에어포일 공력 성능 테이블의 자동생성을 위한 GUI 환경의 프로그램 개발)

  • Kim, Tae-Woo;Lee, Jae-Won;Chae, Sang-Hyun;Oh, Se-Jong;Yee, Kwan-Jung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.35 no.8
    • /
    • pp.685-692
    • /
    • 2007
  • This paper describes the development procedure of GUI Program for the automated generation of airfoil performance table used in helicopter comprehensive code. Considering commercialization, the program is developed based on the Windows operating system. In addition, it is aimed to enhance user's convenience by including embedded postprocessor which enables real-time display of calculation procedure and grid system. Using the validated CFD code, the aerodynamic analyses are automated for a given range of Mach number and angles of attack. The computational grid system is designed to generate automatically once the surface coordinates are given. Mixed-Language scheme is employed in order to combine the CFD code in Fortran with C++ based GUI program, which makes the time-consuming code conversion unnecessary.

Development of Hovering AUV 'NOAH' Test-bed for Underwater Explorations (수중탐사용 호버링 무인잠수정 NOAH의 테스트베드 개발)

  • Byun, Seung-Woo;Kim, Joon-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.2
    • /
    • pp.414-419
    • /
    • 2010
  • This paper describes the design and performance of a hovering AUV 'NOAH' constructed at Jeju National University. We analyse the dynamic performance of NOAH using simulation program and carry out depth control test at small basin. The main purpose of NOAH is to carry out fundamental tests on its attitude control and position control. Its configuration is similar to general ROV appearance for underwater works and dimension is $0.75m{\times}0.5m{\times}0.5m$. It has 4 thrusters of 450watt for longitudinal/lateral/vertical propulsion and is equipped with a pressure sensor for measuring water depth and a magnetic compass for measuring heading angle. The navigation of the vehicle is controlled by an on-board Pentium III-class computer, which runs with the help of the Windows XP operating system. These give us an ideal environment for developing various algorithm which are needed for developing and advanced hovering AUV.

A Study on Image Acquisition and Usage Trace Analysis of Stick-PC (Stick-PC의 이미지 수집 및 사용흔적 분석에 대한 연구)

  • Lee, Han Hyoung;Bang, Seung Gyu;Baek, Hyun Woo;Jeong, Doo Won;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.7
    • /
    • pp.307-314
    • /
    • 2017
  • Stick-PC is small and portable, So it can be used like a desktop if you connect it to a display device such as a monitor or TV anytime and anywhere. Accordingly, Stick-PC can related to various crimes, and various evidence may remain. Stick-PC uses the same Windows version of the operating system as the regular Desktop, the artifacts to be analyzed are the same. However, unlike the Desktop, it can be used as a meaningful information for forensic investigation if it is possible to identify the actual user and trace the usage by finding the traces of peripheral devices before analyzing the system due to the mobility. In this paper, We presents a method of collecting images using Bootable OS, which is one of the image collection methods of Stick-PC. In addition, we show how to analyze the trace of peripheral connection and network connection trace such as Display, Bluetooth through the registry and event log, and suggest the application method from the forensic point of view through experimental scenario.

A Design of Timestamp Manipulation Detection Method using Storage Performance in NTFS (NTFS에서 저장장치 성능을 활용한 타임스탬프 변조 탐지 기법 설계)

  • Jong-Hwa Song;Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.23-28
    • /
    • 2023
  • Windows operating system generates various logs with timestamps. Timestamp tampering is an act of anti-forensics in which a suspect manipulates the timestamps of data related to a crime to conceal traces, making it difficult for analysts to reconstruct the situation of the incident. This can delay investigations or lead to the failure of obtaining crucial digital evidence. Therefore, various techniques have been developed to detect timestamp tampering. However, there is a limitation in detection if a suspect is aware of timestamp patterns and manipulates timestamps skillfully or alters system artifacts used in timestamp tampering detection. In this paper, a method is designed to detect changes in timestamps, even if a suspect alters the timestamp of a file on a storage device, it is challenging to do so with precision beyond millisecond order. In the proposed detection method, the first step involves verifying the timestamp of a file suspected of tampering to determine its write time. Subsequently, the confirmed time is compared with the file size recorded within that time, taking into consideration the performance of the storage device. Finally, the total capacity of files written at a specific time is calculated, and this is compared with the maximum input and output performance of the storage device to detect any potential file tampering.

User-friendly Web-based ezSIM Platform Development for SMBs (중소·중견기업을 위한 사용자 친화형 웹 기반 ezSIM 플랫폼 개발)

  • Yoon, Tae Ho;Park, Hyungwook;Sohn, Ilyoup;Hwang, Jae Soon;Seo, Dongwoo
    • Korean Journal of Computational Design and Engineering
    • /
    • v.20 no.1
    • /
    • pp.65-74
    • /
    • 2015
  • Structure and/or fluid analysis is gradually increased by an essential design process in the small and medium-sized businesses (SMBs) because of the needs for a rapid design process and the certification about the supplement of the parts by the large business (LB). In this paper, we developed the web-based ezSIM platform installed in the resources integrated system server. The ezSIM platform is based on the heterogeneous linux and windows operating system for the user-friendly connection with the part of the analysis for the SMBs. The procedure of the structure/fluid analysis service module using the public software and the license-free open code in the ezSIM platform was explained. The convenience of the ezSIM platform service was presented by the reaction rate of the graphic motion compared with that of a local PC and the solving and pre-post processing interface compared with that of the KISTI supercomputer. The web-based ezSIM platform service was identified as a useful and essential platform to the SMBs for the usage of the structure and/or fluid analysis procedure.