• Title/Summary/Keyword: windows operating systems

Search Result 105, Processing Time 0.024 seconds

Development of Multiple Neural Network for Fault Diagnosis of Complex System (복합시스템 고장진단을 위한 다중신경망 개발)

  • Bae, Yong-Hwan
    • Journal of the Korean Society of Safety
    • /
    • v.15 no.2
    • /
    • pp.36-45
    • /
    • 2000
  • Automated production system is composed of many complicated techniques and it become a very difficult task to control, monitor and diagnose this compound system. Moreover, it is required to develop an effective diagnosing technique and reduce the diagnosing time while operating the system in parallel under many faults occurring concurrently. This study develops a Modular Artificial Neural Network(MANN) which can perform a diagnosing function of multiple faults with the following steps: 1) Modularizing a complicated system into subsystems. 2) Formulating a hierarchical structure by dividing the subsystem into many detailed elements. 3) Planting an artificial neural network into hierarchical module. The system developed is implemented on workstation platform with $X-Windows^{(r)}$ which provides multi-process, multi-tasking and IPC facilities for visualization of transaction, by applying the software written in $ANSI-C^{(r)}$ together with $MOTIF^{(r)}$ on the fault diagnosis of PI feedback controller reactor. It can be used as a simple stepping stone towards a perfect multiple diagnosing system covering with various industrial applications, and further provides an economical approach to prevent a disastrous failure of huge complicated systems.

  • PDF

A Strategy for Adopting Server Virtualization in the Public Sector: NIPA Computer Center

  • Song, Jong-Cheol;Ryu, Jee-Woong;Moon, Byung-Joo;Jung, Hoe-Kyung
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.1
    • /
    • pp.61-65
    • /
    • 2012
  • Many public organizations have been adopting and operating various servers. These servers run on Windows, Unix, and Linux operating systems that generally use less than 10% of their capacity. For migrating a public organization to cloud computing, we must first virtualize the server environment. This article proposes a strategy for server virtualization that the National IT Industry Promotion Agency (NIPA) has done and describes the effects of a public organization migrating to cloud computing. The NIPA Computer Center planned an effective virtualization migration on various servers. This project of virtualization migration was conducted with the existing policy of separate x86 servers and Unix servers. There are three popular approaches to server virtualization: a virtual machine model, a paravirtual machine model, and virtualization at the operating system layer. We selected a VMware solution that uses the virtual machine model. We selected servers for virtualization in the following manner. Servers were chosen that had the highest rate of service usage and CPU usage and had been operating for five years or more. However, we excluded servers that require 80% or greater rates of CPU usage. After adopting the server virtualization technique, we consolidated 32 servers into 3 servers. Virtualization is a technology that can provide benefits in these areas: server consolidation and optimization, infrastructure cost reduction and improved operational flexibility, and implementation of a dual computing environment.

Methods of DICOM and Non-DICOM Interfacing for various Radiological Equipments with PACS (방사선 검사 관련 의료장비와 PACS 간의 연동을 위한 DICOM 및 Non-DICOM 인터페이스 방안)

  • Kim, H.C.
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.6 no.1
    • /
    • pp.51-64
    • /
    • 2003
  • This thesis describes the effective interfacing methods of PACS Modality based on the system installation andoperating experiences. PACS(Picture Archiving and Communication Systems) is a system for medical image archiving and communication using large storage device and high-speed network. The standard communication protocol of PACS is DICOM(Digital Imaging and Communication in Medicine) based on TCP/IP and point-to-point protocol. However, there are many Non-DICOM Modalities and DICOM Modalities having problems. First, we had interfaced almost modalities. Fuji CR, GE CT, MRI, Angio, Fluoro, Phillips Angio, Shimadzu Fluoro. Ultrasound PACS, with the main PACS in the Seoul S Hospital as large scale hospital. And we manipulated the intelligent image distribution and the CT. MRI Interfaces never experienced beforein the Anyang J Hospital and the Chungju C Hospital as mid or small scale hospital. Technically, we developed both the DICOM Interface and the Non-DICOM Interface. At the last, the DICOM Worklist and the DICOM Print Interface were implemented in the Seoul B Hospital, the Bucheon SJ Hospital and the Seoul K Hospital independently with PACS. The Oracle, Sybase and MS-SQL are used as database, and UNIX, Macintosh, MS Windows as operating systems. And the Visual C++ and UNIX C are the main programming tools. We have used UTP, coaxial and fiber optic cable under 10/100 mbps LAN for networking.

  • PDF

The Implementation and Performance Evaluation of a Multi-OS Platform Software Streaming Services (다중 운영체제 플랫폼 소프트웨어 스트리밍 서비스의 구현과 성능평가)

  • O, Chang-Hun;Song, Dong-Ho;Jeon, Yong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1B
    • /
    • pp.25-37
    • /
    • 2008
  • Network streaming technology is a service method which can support several application software via streaming in networks. Although multimedia streaming technology has been developed and widely used, research on the software streaming technology is not yet being progressed actively. In this paper, we design and implement a software streaming technology based on Java language with enhanced performance, compare the existing related systems with it and analyze several characteristics, and perform the performance evaluation. The implemented system has a platform to be used in multiple operating systems in addition to Windows system. It can also be used without installing a software at the client's computer, and has a novel feature that the user's convenience is maximized.

Research on text mining based malware analysis technology using string information (문자열 정보를 활용한 텍스트 마이닝 기반 악성코드 분석 기술 연구)

  • Ha, Ji-hee;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.45-55
    • /
    • 2020
  • Due to the development of information and communication technology, the number of new / variant malicious codes is increasing rapidly every year, and various types of malicious codes are spreading due to the development of Internet of things and cloud computing technology. In this paper, we propose a malware analysis method based on string information that can be used regardless of operating system environment and represents library call information related to malicious behavior. Attackers can easily create malware using existing code or by using automated authoring tools, and the generated malware operates in a similar way to existing malware. Since most of the strings that can be extracted from malicious code are composed of information closely related to malicious behavior, it is processed by weighting data features using text mining based method to extract them as effective features for malware analysis. Based on the processed data, a model is constructed using various machine learning algorithms to perform experiments on detection of malicious status and classification of malicious groups. Data has been compared and verified against all files used on Windows and Linux operating systems. The accuracy of malicious detection is about 93.5%, the accuracy of group classification is about 90%. The proposed technique has a wide range of applications because it is relatively simple, fast, and operating system independent as a single model because it is not necessary to build a model for each group when classifying malicious groups. In addition, since the string information is extracted through static analysis, it can be processed faster than the analysis method that directly executes the code.

Implementation and Performance analysis of a Framework to Support Real-Time of Robot Components (로봇 컴포넌트에 실시간성을 지원하기 위한 프레임워크 구현 및 성능분석)

  • Choi, Chan-Woo;Cho, Moon-Haeng;Park, Seong-Jong;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.81-94
    • /
    • 2009
  • In ubiquitous environments, the real-time features are necessary to insure the QoS of the intelligent service robots. In this paper, we design and implement a real-time framework for intelligent service robots to support real-time features. The real-time framework to support real-time scheduling services is implemented on the general operating systems. We solve the problem that the scheduler of a general operating system can not support real-time features. This paper also proposes realtime scheduling services to guarantee the QoS of real-time robot applications. We implemented the proposed real-time framework on the Windows operating system and conducted some performance experiments. The experimental results show that the proposed real-time framework can improve thread response times and it has slight performance overhead of $62{\mu}s$.

A Study on Strategies of educating Linux in University (대학의 리눅스 교육 방안 연구)

  • 김정훈
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.12
    • /
    • pp.1759-1764
    • /
    • 2002
  • Linux was developed by Linus Torvalds at University of Helsinkyi, Finland. Today Linux becomes to compete with windows operation of Microsoft. and is adopted worldwide on IBM products. The British government is viewing Linux as a desktop operating system. In Tunisia, Linux is under consideration as the governmental operating system. Even Sun Microsystems, the powerful supplier in workstation and sewer market, is working on developing ways in using Linux. is now getting further attentions on governmental level in several countries. The growing interests in adopting Linux in computer operating systems are not on a personal preference level any more. A number of companies and organizations, even some governmental administrations start to see its potential capabilities and are looking for ways for its applications. The necessity of teaching Linux in university is, therefore, imminent and should be discussed in course development without delay. The purpose of this paper is showing the things to be considered, problem analysis and some solution as grafting Linux in university education.

  • PDF

A Development of DCS Binding Delay Analysis System based on PC/Ethernet and Realtime Database

  • Gwak, Kwi-Yil;Lee, Sung-Woo;Lim, Yong-Hun;Lee, Beom-Seok;Hyun, Duck-Hwa
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1571-1576
    • /
    • 2005
  • DCS has many processing components and various communication elements. And its communication delay characteristic is affected diverse operating situation and context. Especially, binding signal which traversed from one control-node to another control-node undergo all sort of delay conditions. So its delay value has large deviation with the lapse of time, and the measurement of delay statistics during long time is very difficult by using general oscilloscope or other normal instruments. This thesis introduces the design and implementation of PC-based BDAS(Binding Delay Analysis System) System developed to overcomes these hardships. The system has signal-generator, IO-card, data-acquisition module, delay-calculation and analyzer module, those are implemented on industrial standard PC/Ethernet hardware and Windows/Linux platforms. This system can detect accurate whole-system-wide delay time including io, control processing and network delay, in the resolution of msec unit, and can analyze each channel's delay-historic data which is maintained by realtime database. So, this system has strong points of open system architecture, for example, user-friendly environment, low cost, high compatibility, simplicity of maintenance and high extension ability. Of all things, the measuring capability of long-time delay-statistics obtained through historic-DB make the system more valuable and useful, which function is essential to analyze accurate delay performance of DCS system. Using this system, the verification of delay performance of DCS for nuclear power plants is succeeded in KNICS(Korea Nuclear Instrumentation & Control System) projects

  • PDF

A Study on the Entropy Evaluation Method for Time-Dependent Noise Sources of Windows Operating System and It's Applications (윈도우 운영체제의 시간 종속 잡음원에 대한 엔트로피 평가 방법 연구)

  • Kim, Yewon;Yeom, Yongjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.809-826
    • /
    • 2018
  • The entropy evaluation method for noise sources is one of the evaluation methods for the random number generator that is the essential element of modern cryptographic systems and cryptographic modules. The primary entropy evaluation methods outside of the country are more suitable to apply to hardware noise sources than software noise sources, and there is a difficulty in quantitative evaluation of entropy by software noise source. In this paper, we propose an entropy evaluation method that is suitable for software noise sources, considering characteristics of software noise sources. We select time-dependent noise sources that are software noise sources of Windows OS, and the heuristic analysis and experimental analysis are performed considering the characteristics of each time-dependent noise source. Based on these analyses, we propose an entropy harvest method from the noise source and the min-entropy estimation method as the entropy evaluation method for time-dependent noise sources. We also show how to use our entropy evaluation method in the Conditioning Component described in SP 800-90B of NIST(USA).

A Study on the Improvement and Utilization of Public N-Day Vulnerability Databases (N-day 취약점 데이터베이스 개선 및 활용 방안 연구)

  • JongSeon Jeong;Jungheum Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.667-680
    • /
    • 2024
  • If the software is not updated after the vulnerability is disclosed, it can continue to be attacked. As a result, the importance of N-day detection is increasing as attacks that exploit vulnerabilities increase. However, there is a problem that it is difficult to find specific version information in the published vulnerability database, or that the wrong version or software is outputted. There is also a limitation in that the connection between the published vulnerability databases is not good. In order to overcome these limitations, this paper proposes a method of building information including comprehensive vulnerability information such as CVE, CPE, and Exploit Database into an integrated database. Furthermore, by developing a website for searching for vulnerabilities based on an integrated database built as a result of this study, it is effective in detecting and utilizing vulnerabilities in specific software versions and Windows operating systems.