• Title/Summary/Keyword: windows operating systems

Search Result 105, Processing Time 0.03 seconds

Experimental study on reduction in rain water penetration through industrial windows used for natural ventilation (자연환기용 공장창호의 빗물유입 저감대책에 관한 실험적 연구)

  • Piao, Cheng Xu;Kim, Tae-Hyeung;Ha, Hyun-Chul;Xu, Rong Bin
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.20 no.3
    • /
    • pp.175-183
    • /
    • 2010
  • Windows are widely used for natural ventilation of the various buildings. Especially high level windows as a part of industrial ventilation systems, play a crucial role in natural ventilation. Compared to mechanical ventilation system, natural ventilation has the advantage of lower installation and operating costs. In general, high level windows for industrial buildings have three types; louver type, 45$^{\circ}$ open type and 90$^{\circ}$ open type. Based on previous studies, it was found that the louver type and 45$^{\circ}$ open type are very effective in reducing rainwater penetration, but they did not have enough ventilation efficiencies. Preliminary tests were performed with the various types of windows. It was found that a 90$^{\circ}$ open double layer type window was the best among those which tested in our preliminary tests. Simulated rain was used to estimate the amount of rain penetrated through windows and to observe the paths of rain penetration. Various 90$^{\circ}$ open windows were tested to find the windows with minimum rain penetration and maximum ventilation efficiency.

A single use RF Transit Card Study on development of operating systems, vending machines (1회용 RF교통카드 발매기 운영체제 개발방법에 관한 연구)

  • Yu, Sin-Cheol;Park, Kwang-Hwan
    • Proceedings of the KSR Conference
    • /
    • 2011.05a
    • /
    • pp.1148-1154
    • /
    • 2011
  • Vending machines to release single-use RF(Radio Frequency) transport cards at Seoul Metro stations are operated under unmanned facility and have release & charge function. This Paper introduces function, configuration of vending machine to release single-use RF transport cards, the basic concepts & overview about vending machine's operating system. And suggests programming procedure to develop OS image of Windows Embedded operating system which is onboard the main board's electronic circuitry.

  • PDF

Evaluation and Benchmarking on Operating System for Embedded Devices (임베디드 디바이스를 위한 운영체제의 벤치마킹과 성능평가)

  • Jeong, Tai-Kyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.156-163
    • /
    • 2006
  • The objective of this paper is to evaluate the performance of an operating system for embedded devices to that of the commercially available Windows platform. Analysis includes benchmarking the operating systems using a 'typical' PC workload, as well as identifying low-level areas in which the updated OS is limiting or enhancing the system performance. The primary benchmarking suites selected for this paper are 'WinStone' and 'HBench', with the former providing an application-based suite of tests and the latter providing the most direct means for isolating operating system effects on the system. We have demonstrated in a case study for embedded microprocessors, and evaluated a Windows platform at a low-level test as well as an application level using a benchmarking suite.

A Research on the Exposure Status of Cybersecurity Risk of Process Control System and Its Counterplan (공정제어시스템의 사이버보안 위험 노출 현황 및 대응방안 연구)

  • Kim, Youngse;Park, Jinhyung;Kim, Sangki;Kim, Byungjick;Lee, Joonwon;Park, Kyoshik
    • Korean Chemical Engineering Research
    • /
    • v.60 no.4
    • /
    • pp.492-498
    • /
    • 2022
  • Process control systems used in most domestic petrochemical corporates today are based on the Windows platforms. As technology leans toward opened environment, the exposure risk of control systems is increasing. However, not many companies are preparing for various cyberattacks due to lack of awareness and misunderstanding of cyber intrusion. This study investigated the extent of how much exposed the petrochemical process control system is to security threats and suggested practical measures to reduce OT cybersecurity vulnerabilities. To identify the cyber threat status of process control systems, vulnerabilities of the Windows platform, a principal cyber threat factor, have been analyzed. For research, three major DCS providers in Korea and the discontinuation of Windows platform of 635 control systems were investigated. It was confirmed that 78% of the survey subjects were still operating in the discontinued windows platforms, and those process control systems were operated in a state vulnerable to cyber intrusions. In order to actively cope with these cyber threats, legal regulations such as designation of critical infrastructure for major petrochemical facilities which is implemented in advanced countries such as the United States are needed. Additionally, it is necessary to take the initiative in eradicating security threats to the process control systems by aggressively introducing security solutions provided from existing DCS suppliers. This paper was submitted to Professor Ko JaeWook's retirement anniversary issue.

A Study on the Quality Evaluation Model of Operating Systems (운영체제 품질 평가 모형)

  • Yun Min Seok;Han Sang Ho
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2002.05a
    • /
    • pp.1006-1013
    • /
    • 2002
  • The multiplicity of operating systems brings about a choice problem to the end-user and a multi-fold intensity to the competing developer. This study intends to provide guidelines solving the problems for both the end-user and the developers of operating systems. For the purpose, we adopt an appropriate evaluation model in terms of user-perceived quality through the applicable criteria and an evaluation method. Briefly, reliability and portability are key factors to contribute to the perceived duality. The empirical study also illustrates a comparative analysis on the dominant products. Microsoft Windows and Linux, in Korea.

  • PDF

A New System Design for Wireless Remote Control Over Single-tasking Operating Systems (단일 작업 운영체제 환경에서의 무선 원격 제어 시스템 설계)

  • Kim, Chang-Hoon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.21 no.6
    • /
    • pp.31-39
    • /
    • 2016
  • In this paper, we propose a new system for wireless remote control over single-tasking operating systems such as Microsoft's disk operating system(DOS). In order to control a DOS device in a windows operating system, the proposed architecture uses a video transmitter, a virtual network driver, and a wireless keyboard module. Analysis shows that the proposed system, over 15Mbps wireless LAN(802.11n), can transmit at least 10 to 15 video frames, achieves speed up to a maximum of 8Mbps roughly, and is able to satisfy real time processing with respect to key input. Therefore, the proposed system is well suited to a remote control solution based on DOS devices.

A Cloud-based Integrated Development Environment for Robot Software Development (로봇 소프트웨어 개발을 위한 클라우드 기반 통합 개발 환경)

  • Yoon, Jae Hoon;Park, Hong Seong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.21 no.2
    • /
    • pp.173-178
    • /
    • 2015
  • Cloud systems are efficient models that can utilize various infrastructures, platforms, and applications regardless of the type of clients. This paper proposes a cloud-based integrated development environment (IDE) for robot software development which would make software development easier. The proposed system provides robot simulation to test the robot HW modules or robot systems for development and testing of software operating in a robot system with two or more different operating systems (OS) such as Windows, Linux, and real-time OS. This paper implements and evaluates the proposed system using OPRoS [33].

Analysis and Recovery of CIH virus (CIH 바이러스 분석 및 대책)

  • 김광조
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.4
    • /
    • pp.49-60
    • /
    • 1999
  • In this paper we introduce the definition and historical overviews of computer virus program and review their side-effect and ways of infections. We describe the feature of CIH virus which damaged lots of PC systems in Asian countries recently and propose new methods how to rescue against destruction under the operating system of the Microsoft's Windows 95/98. Our experiment results can fix hard disk having FAT32 file system structure and show some popular program cases of having recovered by commercial vaccine program.

Extended Linear Vulnerability Discovery Process

  • Joh, HyunChul
    • Journal of Multimedia Information System
    • /
    • v.4 no.2
    • /
    • pp.57-64
    • /
    • 2017
  • Numerous software vulnerabilities have been found in the popular operating systems. And recently, robust linear behaviors in software vulnerability discovery process have been noticeably observed among the many popular systems having multi-versions released. Software users need to estimate how much their software systems are risk enough so that they need to take an action before it is too late. Security vulnerabilities are discovered throughout the life of a software system by both the developers, and normal end-users. So far there have been several vulnerability discovery models are proposed to describe the vulnerability discovery pattern for determining readiness for patch release, optimal resource allocations or evaluating the risk of vulnerability exploitation. Here, we apply a linear vulnerability discovery model into Windows operating systems to see the linear discovery trends currently observed often. The applicability of the observation form the paper show that linear discovery model fits very well with aggregate version rather than each version.

A Performance Analysis of Firewall on the FreeBSD Kernel (FreeBSD 커널 기반의 침입 차단 시스템 성능 분석)

  • 박창서
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.8
    • /
    • pp.1726-1731
    • /
    • 2003
  • The firewall is generally used to protect the internal information system from intruders and hackers who attack through the Internet. However, it is very difficult for a user to verify the performance of the firewall as well as the difference of the performance for the operating mode such as Bridge Mode and Gateway Mode. In this paper, the performance of a firewall on the operating systems or windows 2000, Linux, and FreeBSD is compared. Finally, The performance of a firewall on the FreeBSD is compared at different operating modes and the effect of the number of rules by testing throughput of a firewall is analyzed.