• Title/Summary/Keyword: Windows Operating System

Search Result 241, Processing Time 0.024 seconds

User-friendly Automatic Polishing Robot System and Its Integrated Operating Program

  • Lee, Min-Cheol;Jung, Jin-Young;Go, Seok-Jo
    • International Journal of Precision Engineering and Manufacturing
    • /
    • v.5 no.3
    • /
    • pp.69-76
    • /
    • 2004
  • Polishing a die that has free-form surfaces is a time-consuming and tedious job, and requires a considerable amount of high-precision skill. In order to reduce the polishing time and cope with the shortage of skilled workers, an automatic polishing robot system was developed. The polishing robot system is composed of two subsystems, a three-axis machining center and a two-axis polishing head. The machining center is controlled by a FANUC controller, and the polishing head by DSP controller. The system has five degrees of freedom and is able to keep the polishing tool normal to the die surface during operation. To easily operate the developed polishing robot system, this study developed an integrated operating program in the Windows environment. The program consists of five modules: a polishing data generation module, a code separation module, a polishing module, a graphic simulator module, and a teaching module. Also, the automatic teaching system was developed to easily obtain teaching data and it consists of a three dimensional joystick and a proximity sensor. Also, to evaluate the performance of the integrated operating program and the polishing robot system, polishing experiments of a die of shadow mask were carried out.

A Performance Analysis of Firewall on the FreeBSD Kernel (FreeBSD 커널 기반의 침입 차단 시스템 성능 분석)

  • 박창서
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.8
    • /
    • pp.1726-1731
    • /
    • 2003
  • The firewall is generally used to protect the internal information system from intruders and hackers who attack through the Internet. However, it is very difficult for a user to verify the performance of the firewall as well as the difference of the performance for the operating mode such as Bridge Mode and Gateway Mode. In this paper, the performance of a firewall on the operating systems or windows 2000, Linux, and FreeBSD is compared. Finally, The performance of a firewall on the FreeBSD is compared at different operating modes and the effect of the number of rules by testing throughput of a firewall is analyzed.

Development Opened CNC Software Based on MS Winsows CE (Windows CE 기반의 CNC 선반 개발에 관한 연구)

  • 임태완;이철수
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2003.04a
    • /
    • pp.448-453
    • /
    • 2003
  • This paper researched about technique of Opened CNC that were able to adapt themselves to rapid development of software and hardware. It is basic research what develop a scheme whereby technic make property. This paper theorized about to realize Opened CNC Software which is developing CNC Software flow from building Windows CE operating system's image that is possible realtime acting and multitasking. And Opened CNC Software's component designed independent classified modules. Classify Opened CNC Software's component which was consisted of basic OS Kernel, NC Code parser, Servo Motor Control, Software PLC, MMI(Man-Machine Interftce). And show there's functional example

  • PDF

Design and Implement of a File System in Web-based Virtual OS (웹기반 가상 OS에서의 File System 설계 및 구현)

  • 심충섭;김진석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.121-123
    • /
    • 2001
  • 최근 인터넷관련 기술은 사용의 편의성이 강조되고 있다. 이에 많은 연구자들은 언제 어디서나 사용자만의 컴퓨터환경을 제공하는 가상 OS(WebOS: Web Operating System)를 개발하였다[1,2,3]. 그러나 가상 OS를 구현할 때 기존 시스템(Unix, Linux, Windows등)의 File System을 사용하면 시스템의 정보를 사용자가 예측할 수 있기 때문에 시스템 안전성 문제가 발생할 수 있다. 본 논문에서는 기존 시스템의 File System을 이용하지 않고 가상의 File System을 사용함으로써 기존 시스템보다 안전하며 향후 가상 OS에서 개발되어질 프로그램들에 사용할 수 있는 DB구조의 File System을 설계 및 구현한다.

Solid Circulation Characteristics of Two Oxygen Carriers for Chemical Looping Combustion System (케미컬루핑 연소시스템을 위한 두 가지 산소전달입자들의 고체순환 특성)

  • RYU, HO-JUNG;LEE, DOYEON;NAM, HYUNGSEOK;JO, SUNG-HO;BAEK, JEOM-IN
    • Transactions of the Korean hydrogen and new energy society
    • /
    • v.29 no.4
    • /
    • pp.393-400
    • /
    • 2018
  • To confirm the operating range of two oxygen carriers for chemical looping combustion system, the effects of operating variables on solid circulation rate were measured and discussed using a two-interconnected circulating fluidized bed system at ambient temperature and pressure. Moreover, suitable operating ranges to avoid choking of the fast fluidized bed (air reactor) were confirmed for two oxygen carriers. A continuous long-term operation of steady-state solid circulation more than 24 hours was also demonstrated within the operating windows. Finally we could confirm that those two oxygen carriers are suitable for chemical looping combustion system with high solid circulation rate and smooth solid circulation.

High Speed Communication System for UNIX Cluster System (유닉스 클러스터시스템의 고속통신구조 상용화에 관한 연구)

  • 김현철
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.9
    • /
    • pp.1239-1244
    • /
    • 2001
  • The Virtual Interface Architecture (VIA) is usually suggested as a new standard high-performance communication of the cluster systems. However the VIA specification aims for platform independence, the current Intel VI Provider Library (VIPL) design favors systems with Intel architecture processors running the Windows operating system (OS). This paper aims for clarifying the guesstion problem of VIA and VIPL in the newtrul time of CPU Architecture and OS further more, It suggests the solution aiming the communication in the other CPU or OS

  • PDF

uPC player : An OS Virtualization-based Technique to Support Stateless Computing Execution Environment on Windows (uPC player : 윈도우 운영체제에서의 OS가상화 기반 무상태 컴퓨팅 실행환경 지원 기술)

  • Sung, Baek-Jae;Park, Chan-Ik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.1
    • /
    • pp.125-129
    • /
    • 2010
  • Stateless computing supports a mobility of computing environment easily. It is becoming a major technology for securing personal user's information on shared computing environment. With the advance of virtualization technology and cloud computing, stateless computing is an essential part of personal computing environment connectivity (user's setting and data is stored in remote server or some storage, and it can be restored at any computing environment) In this paper, we propose uPC player that supports stateless computing execution environment on Windows. uPC player provides Windows operating system to user by using an uPC OS virtualization module. In this paper, we leverage how uPC player is designed and implemented for supporting a stateless computing execution environment. uPC player provides a desktop switch between host-system execution environment and uPC virtual execution environment. And it needs just one second for loading uPC virtual execution environment by using OS virtualization-based technique.

A Study on Injection Attacks and Defenses on Microsoft Windows (MS Windows에서 인젝션 공격 및 방어 기법 연구)

  • Seong, HoJun;Cho, ChangYeon;Lee, HoWoong;Cho, Seong-Je
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.9-23
    • /
    • 2020
  • Microsoft's Windows system is widely used as an operating system for the desktops and enterprise servers of companies or organizations, and is a major target of cyber attacks. Microsoft provides various protection technologies and strives for defending the attacks through periodic security patches, however the threats such as DLL injection and process injection still exist. In this paper, we analyze 12 types of injection techniques in Microsoft Windows, and perform injection attack experiments on four application programs. Through the results of the experiments, we identify the risk of injection techniques, and verify the effectiveness of the mitigation technology for defending injection attacks provided by Microsoft. As a result of the experiments, we have found that the current applications are vulnerable to several injection techniques. Finally, we have presented the mitigation techniques for these injection attacks and analyzed their effectiveness.

Establishing Automated Mapping/Facilities Management System Using PC-CAD (PC용 CAD를 이용한 단지기반시설 정보화)

  • 이규석;안승만;탁형렬
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.15 no.2
    • /
    • pp.141-148
    • /
    • 1997
  • Continuous development of Personal Computer(PC) combined with the decrease of price and the expansion of operating system in PC like Windows 95, and Windows N/T makes it possible for the user to consider PC-bas-ed Automated Happing/Facilities Management (AM/FM) system. Therefore, the purpose of this study is to establish a PC-based data automation system of pipe infrastructures-water, sewer, and drainage-and road in Korea Land Corporation. In order to achieve this goal, relevant literature survey was done first. Secondly, the study site was determined by discussion with Korea Land Institute. Thirdly, PC-based CAD software for AM/FM in the world market were surveyed, and AutoCAD Map was selected because KLC had been using hundreds of AutoCAD copies already. After that user needs assessment was done to visit on-site office, local branch office, and the corresponding city office for the system design and database design. After the graphic data were digitized and the attribute data were entered into the batabase, the data automation system was established, and tested for application. Finally, the guidelines and problems for PC-based data automation in AM/FM was discussed.

  • PDF

Bidirectional LSTM based light-weighted malware detection model using Windows PE format binary data (윈도우 PE 포맷 바이너리 데이터를 활용한 Bidirectional LSTM 기반 경량 악성코드 탐지모델)

  • PARK, Kwang-Yun;LEE, Soo-Jin
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.87-93
    • /
    • 2022
  • Since 99% of PCs operating in the defense domain use the Windows operating system, detection and response of Window-based malware is very important to keep the defense cyberspace safe. This paper proposes a model capable of detecting malware in a Windows PE (Portable Executable) format. The detection model was designed with an emphasis on rapid update of the training model to efficiently cope with rapidly increasing malware rather than the detection accuracy. Therefore, in order to improve the training speed, the detection model was designed based on a Bidirectional LSTM (Long Short Term Memory) network that can detect malware with minimal sequence data without complicated pre-processing. The experiment was conducted using the EMBER2018 dataset, As a result of training the model with feature sets consisting of three type of sequence data(Byte-Entropy Histogram, Byte Histogram, and String Distribution), accuracy of 90.79% was achieved. Meanwhile, it was confirmed that the training time was shortened to 1/4 compared to the existing detection model, enabling rapid update of the detection model to respond to new types of malware on the surge.