To see the other types of publications on this topic, follow the link: Windows NT (Computer system).

Dissertations / Theses on the topic 'Windows NT (Computer system)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 37 dissertations / theses for your research on the topic 'Windows NT (Computer system).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Rimer, Matthew Scott 1975. "The secure file system under Windows NT." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80571.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1999.
Includes bibliographical references (p. 53-54).
by Matthew Scott Rimer.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
2

Arum, Mochamad. "Implementation consideration for Windows NT integrated network for System Management computer laboratories." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA308151.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, March 1996.
Thesis advisor(s): Norman F. Schneidewind, R.A. Buddenberg. "March 1996." Includes bibliographical references. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
3

Almedia, Danilo (Danilo D'Amico) 1975. "Framework for implementing file systems in Windows NT." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/46208.

Full text
Abstract:
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.
Includes bibliographical references (p. 38-39).
by Danilo Almedia.
S.B.and M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
4

Korba, Jonathan (Jonathan James) 1977. "Windows NT attacks for the evaluation of intrusion detection systems." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86454.

Full text
Abstract:
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2000.
Includes bibliographical references (leaves 99-101).
by Jonathan Korba.
S.B.and M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
5

Windingland, Kim L. "A DISTRIBUTED NETWORK ARCHITECTURE FOR PC-BASED TELEMETRY SYSTEMS." International Foundation for Telemetering, 1996. http://hdl.handle.net/10150/608384.

Full text
Abstract:
International Telemetering Conference Proceedings / October 28-31, 1996 / Town and Country Hotel and Convention Center, San Diego, California
The ever-increasing power of PC hardware combined with the new operating systems available make the PC an excellent platform for a telemetry system. For applications that require multiple users or more processing power than a single PC, a network of PCs can be used to distribute data acquisition and processing tasks. The focus of this paper is on a distributed network approach to solving telemetry test applications. This approach maximizes the flexibility and expandability of the system while keeping the initial capital equipment expenditure low.
APA, Harvard, Vancouver, ISO, and other styles
6

Scruggs, Janet E. Yee Michael. "Migration from netware to windows NT network operating system /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA368151.

Full text
Abstract:
Thesis (M.S. in Information Technology Management, M.S. in Information Systems) Naval Postgraduate School, June 1999.
"June 1999". Thesis advisors(s): Douglas E. Brinkley, Erik Jansen, Mark Nissen. Includes bibliographical references (p. 123-125). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
7

Scruggs, Janet E., and Michael Yee. "Migration from netware to windows NT network operating system." Thesis, Monterey, California. Naval Postgraduate School, 1999. http://hdl.handle.net/10945/13557.

Full text
Abstract:
Migration from an existing information technology system to a new system presents many managerial challenges. There are technological challenges associated with running the old system, maintaining data integrity and bringing the new system online all without seriously impacting daily operations. There are human factors to consider like resistance to change and conflict management. In addition, organizational issues like management support and cross functional communication channels need to he addressed. This thesis reviews the technical migration from an operational NetWare network to Windows NT completed at the Defense Manpower Data Center (DMDC) in Monterey, CA. The DMDC case presents a typical set of issues that an IT manager is likely to face when implementing technology driven change. Technical, human and organizational factors of technical change are discussed. A list of lessons learned and a set of technical management guidelines are derived from analysis of the DMDC case. Details of Windows NT 4.0 and 5.0 features are included.
APA, Harvard, Vancouver, ISO, and other styles
8

Boothe-Rabek, Jesse C. (Jesse Clayton) 1979. "WinNTGen : Creation of a Windows NT 5.0+ network traffic generator." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/29667.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2003.
Includes bibliographical references (leaves 65-67).
The Lincoln Adaptable Real Time Information Assurance Testbed (LARIAT) project is the first fully automatable network testbed for the evaluation of information assurance (IA) technologies. It allows researchers to easily set up experiments that evaluate the accuracy of host-based and network-based intrusion detection systems (IDSs). Initially, the network traffic it could produce used UNIX services and protocols as implemented for the Linux and Solaris platforms. However, due to the widespread deployment of Windows-based systems in production environments, it is necessary to include Windows-based traffic when testing IA systems in order to provide a comprehensive evaluation. This thesis describes WinNTGen, a Windows network traffic generation system that integrates into the existing LARIAT framework and enables it to produce Windows-based network traffic. To do this, WinNTGen simulates the actions of a user controlling applications that in turn use network resources. This frees WinNTGen from the need to re-implement network protocols and allows it to operate at a higher level of abstraction. WinNTGen controls applications via loadable libraries that encapsulate the manner in which a typical user interacts with a particular application. The statistical parameters that specify the behavior of a user with each application are derived from real users' behavioral data as they interacted with each application. The system is flexible and extensible so that different versions of the same application as well as additional applications can be controlled by modifying and adding libraries. Finally, the reality and the throughput of the network traffic produced by the WinNTGen system are evaluated.
by Jesse C. Boothe-Rabek.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
9

Lucas, Julie A. "Ensuring a C2 level of trust and interoperability in a networked Windows NT environment." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA319428.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, September 1996.
Thesis advisor(s): Gus K. Lott, Cynthia E. Irvine, Rex Buddenberg. "September 1996." Includes bibliographical references (p. 135-140). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
10

Zounmevo, Judicaël. "Proposal of an optimized checkpoint-recovery environment for Windows NT 5.x." Thesis, McGill University, 2007. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=112590.

Full text
Abstract:
This work proposes some generic approaches to offer transparency and efficiency to checkpoint-recovery implementations on Windows. On the one hand, a complete environment is proposed to prepare Windows to incorporate transparently any checkpoint-recovery implementation whose architecture respects a simple contract of reusability. The environment allows any application to use some checkpoint-recovery services with only the default process creation mechanisms offered by Windows. Moreover, it handles automatically the recovery of the processes in case of a crash and requires no human intervention in most scenarios. On the other hand, an optimization module is proposed to minimize the checkpointing time and to slow its degradation in situations of high checkpoint-recovery demands. The results show an excellent control of the checkpoint cost degradation and sometimes the complete absence of the penalty associated with concurrent checkpoint requests.
APA, Harvard, Vancouver, ISO, and other styles
11

Rhee, Sokwoo. "Development of a Windows NT real-time operating system for NC machine control." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/45474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kreiner, Barrett. "Issues of implementing X windows on a non-X windows device." Virtual Press, 1991. http://liblink.bsu.edu/uhtbin/catkey/770950.

Full text
Abstract:
X windows is a graphic display management system. It is designed to work on a variety of machines and display adapters, however it is not designed for terminals with local graphics capabilities. X windows can be made to work on this type of terminal, although in a slower and restricted form. The problem with designing a variation of X for these terminals is the translation from X requests to native graphics commands, and the mapping of terminal input into X events. These implementation issues are discussed and example code is provided.
Department of Computer Science
APA, Harvard, Vancouver, ISO, and other styles
13

Goktepe, Meftun. "Windows XP Operating System security analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FGoktepe.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2002.
Thesis advisor(s): Richard Harkins, Cynthia Irvine. Includes bibliographical references (p. 105-107). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
14

Penna, Sergio D., and Domingos B. Rios. "MIGRATING FROM A VAX/VMS TO AN INTEL/WINDOWS-NT BASED GROUND STATION." International Foundation for Telemetering, 1999. http://hdl.handle.net/10150/608310.

Full text
Abstract:
International Telemetering Conference Proceedings / October 25-28, 1999 / Riviera Hotel and Convention Center, Las Vegas, Nevada
Upgrading or replacing production systems is always a very resource-consuming task, in particular if the systems being replaced are quite specialized, such as those serving any Flight Test Ground Station. In the recent past a large number of Ground Station systems were based in Digital’s VAX/VMS architecture. The computer industry then expanded very fast and by 1990 realtime PCM data processing systems totally dependent on hardware and software designed for IBM-PC compatible micro-computers were becoming available. A complete system replacement in a typical Ground Station can take from one to several years to become a reality. It depends on how complex the original system is, how complex the resulting system needs to be, how much resources are available to support the operation, how soon the organization needs it, etc. This paper intends to review the main concerns encountered during the replacement of a typical VAX/VMS-based by an Intel-Windows NT-based Ground Station. It covers the transition from original requirements to totally new requirements, from mini-computers to micro-computers, from DMA to high-speed LAN data transfers, while conserving some key architectural features. This 8-month development effort will expand EMBRAER’s capability in acquiring, processing and archiving PCM data in the next few years at a lower cost, while preserving compatibility with old legacy flight test data.
APA, Harvard, Vancouver, ISO, and other styles
15

Leichner, Ted, Stephen J. Nicolo, Ed Snyder, Mark Stacy, and Charles Ziegler. "ADVANCED TELEMETRY PROCESSING AND DISPLAY SYSTEM (ATPDS)." International Foundation for Telemetering, 2000. http://hdl.handle.net/10150/608270.

Full text
Abstract:
International Telemetering Conference Proceedings / October 23-26, 2000 / Town & Country Hotel and Conference Center, San Diego, California
This paper describes a PC-based Advanced Telemetry Processing and Display System (ATPDS)- a highend, real-time telemetry processing and display system implemented on a COTS PC platform. for A network-centric architecture was chosen from candidate architectures as the most viable for the ATPDS. The network-centric architecture is Windows NT-based, client/server based, supporting clients and servers on both local or remote PC workstations. The architecture supports distributing processing loads across multiple workstations, optimizing mission processing requirements. The advantage of this system is its flexibility and expandability with low acquisition and life-cycle support costs. The ATPDS allows the user to configure one or more small systems into a larger high-end system based on varying mission requirements.
APA, Harvard, Vancouver, ISO, and other styles
16

Euresti, David 1979. "Self-certifying file system implementation for Windows." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87422.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.
Includes bibliographical references (leaves 38-39).
by David Euresti.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
17

Zeeshan, Ahmed. "Integration of Variants Handling in M-System-NT." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2128.

Full text
Abstract:
This Master thesis proposes a solution to manage variabilities of software product line applications. The objective of the research is to support software decision makers in handling additional software complexity introduced by product line architectures. In order to fulfill this objective an approach to analyze, visualize, and measure product line specific characteristics of the C/C++ source code are proposed. The approach is validated in an empirical experiment using an open source software system. For that purpose the approach is first implemented into ®1 M-System-NT, an existing software measurement tool developed at Fraunhofer. The target hypothesis of the Institute for Experimental Software engineering research master thesis to perform static analysis of C/C++ source code, measure traditional and product line measures to identify the correlation between measures and indicate the fault proneness.
Official Address: Researcher Zeeshan Ahmed, Mechanical Engineering Informatics and TU Virtual Product Development Division (MIVP) Vienna, Austria Permanent Address: Zeeshan Ahmed, Humdered Street Mohala Garhi Shadula Sahib Gujrat, Pakistan
APA, Harvard, Vancouver, ISO, and other styles
18

Windingland, Kim, and John LaPlante. "Telemetry System User Interface for Windows™." International Foundation for Telemetering, 1993. http://hdl.handle.net/10150/611849.

Full text
Abstract:
International Telemetering Conference Proceedings / October 25-28, 1993 / Riviera Hotel and Convention Center, Las Vegas, Nevada
Due to the rapid advancement of technology in GUI design tools within Microsoft Windows™, a sophisticated human-machine interface can be developed for telemetry systems. A PC Windows™-based telemetry system would effectively provide a "bridge" between the telemetry world and the Windows™ world, bringing many low cost off-the-shelf software and hardware tools into the telemetry realm that has been unprecedented. This paper describes the results of such an approach in the development of Loral's Visual Telemetry System (VTS) software.
APA, Harvard, Vancouver, ISO, and other styles
19

Hashim, Noor Hayati. "An architecture for the forensic analysis of Windows system generated artefacts." Thesis, University of South Wales, 2011. https://pure.southwales.ac.uk/en/studentthesis/forensic-analysis-of-windows-system-generated-artefacts(be571569-2afe-4d52-8c99-9dbc8388b1db).html.

Full text
Abstract:
Computer forensic tools have been developed to enable forensic investigators to analyse software artefacts to help reconstruct possible scenarios for activity on a particular computer system. A number of these tools allow the examination and analysis of system generated artefacts such as the Windows registry. Examination and analysis of these artefacts is focussed on recovering the data extracting information relevant to a digital investigation. This information is currently underused in most digital investigations. With this in mind, this thesis considers system generated artefacts that contain information concerning the activities that occur on a Windows system and will often contain evidence relevant to a digital investigation. The objective of this research is to develop an architecture that simplifies and automates the collection of forensic evidence from system generated files where the data structures may be either known or in a structured but poorly understood (unknown) format. The hypothesis is that it should be feasible to develop an architecture that will be to integrate forensic data extracted from a range of system generated files and to implement a proof of concept prototype tool, capable of visualising the Event logs and Swap files. This thesis presents an architecture to enable the forensic investigator to analyse and visualise a range of system generated artefacts for which the internal arrangement of data is either well structured and understood or those for which the internal arrangement of the data is unclear or less publicised (known and not known data structures). The architecture reveals methods to access, view and analyse system generated artefacts. The architecture is intended to facilitate the extraction and analysis of operating system generated artefacts while being extensible, flexible and reusable. The architectural concepts are tested using a prototype implementation focussed the Windows Event Logs and the Swap Files. Event logs reveal evidence regarding logons, authentication, account and privilege use and can address questions relating to which user accounts were being used and which machines were accessed. Swap file contains fragments of data, remnants or entire documents, e-mail messages or results of internet browsing which reveal past user activities. Issues relating to understanding and visualising artefacts data structure are discussed and possible solutions are explored. The architecture is developed by examining the requirements and methods with respect to the needs of computer forensic investigations and forensic process models with the intention to develop a new multiplatform tool to visualise the content of Event logs and Swap files. This tool is aimed at displaying data contained in event logs and swap files in a graphical manner. This should enable the detection of information which may support the investigation. Visualisation techniques can also aid the forensic investigators in identifying suspicious events and files, making such techniques more feasible for consideration in a wider range of cases and, in turn, improve standard procedures. The tool is developed to fill a gap between capabilities of certain other open source tools which visualise the Event logs and Swap files data in a text based format only.
APA, Harvard, Vancouver, ISO, and other styles
20

Singh, Balraj. "A parametrized CAD tool for VHDL model development with X Windows." Thesis, This resource online, 1990. http://scholar.lib.vt.edu/theses/available/etd-03242009-040819/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Johansson, Björn. "Prestandaövervakning av Windows server med WMI : En vidareutveckling av System Monitor." Thesis, Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-42914.

Full text
Abstract:
Technological advancements and digitalization opens up a whole new set of opportunities for manufacturing industries to improve and enhance their effectiveness. As the importance of IT grows in the industry so does the complexity of the systems they use. This requires a countermeasure. IT systems need to be managed and monitored and thus rises the need for tools to perform this task in a swift and effective manner. Because when a plant stands still, time is money.This thesis describes the development of an extension to System Monitor which is used by the company ÅF. System Monitor is a system and troubleshooting tool to monitor the manufacturing execution system PaperLine.System Monitor consists of a service that collects data from PaperLine and its servers, a database for storing the collected data and a web client for presenting the data to the user. The result of the project is an improved version of System Monitor with means to collect and display performance data from servers running on the windows server operating system. In addition general improvements have been made and bugs have been dealt with. The project has been a success for both the author and ÅF.
APA, Harvard, Vancouver, ISO, and other styles
22

Zhu, Tong 1971. "Develop real-time multitasking system and client/server based windows protocol for IBM PC/PS2." Thesis, The University of Arizona, 1992. http://hdl.handle.net/10150/278250.

Full text
Abstract:
As Local Area Networks becoming increasingly popular, the need to develop protocols for remote login, client/server based peer to peer connections, and event driven windows protocol for IBM PC/PS2 is ever greater. This thesis is primary devoted to the development of a real-time multitasking system for the IBM PC/PS2, and a client/server, event driven Windows protocol similar to X-Window protocol available in computers based on Unix platform. In addition, features such as interprocess communication queues, virtual windows, heap managers which are necessities in a distributed environment are provided also. Program developer may include this multitasking program in the kernel of the PC network operating system such as Novell Netware, and Microsoft Lan Manager. Consequently, a multitasking kernel is developed to provide dynamic tasking spawning, fast task switching, and MS-DOS independent dynamic memory allocation. In addition, a window manager based on this multitasking kernel is developed to manage dialog windows or tasking windows in a distributed environment. Windows may be sent across the network and be displayed remotely.
APA, Harvard, Vancouver, ISO, and other styles
23

Nilsson, Christoffer, and Marcus Nilsson. "Installationsgränssnitt under Linux och Windows XP utifrån ISO 9241." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3955.

Full text
Abstract:
This thesis investigates how different Linux-distributions installation interface relate to the ISO 9241 standard, parts 12 and 13, and how they relate to the installation interface of Windows XP, with the hypothesis: "There is a Linux-distribution whose installation interface according to applicable HCIrecommendations is equivalent to that of Windows XP." With the checklists provided by ISO 9241 an empirical study has been made, and so comparable measurements of how well the Linux-distributions and Windows XP follows the recommendations of the standard was obtained. By comparing the results from the tests similarities and differences between the installation interfaces can be deducted. As the result and the conclusion shows there are Linux-distributions whose installation interface, according to the applicable HCI-recommendations, are equivalent to that of Windows XP.
APA, Harvard, Vancouver, ISO, and other styles
24

Cider, Andreas, and Max Jacobs. "Byggserverövervakning : Utveckling av ett system för att synliggöra integrationsproblem." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-32441.

Full text
Abstract:
Mjukvara i datorer styr många viktiga funktioner i dagens samhälle och används i stor utsträckning för att kommunicera men även för att styra utrustning. För att mjukvara ska fungera tillförlitligt behöver den byggas korrekt och testas utförligt. För att uppnå tillförlitlighet kan en byggserver används för att automatiskt bygga och testa mjukvaran. Den här rapporten beskriver hur en prototyp av ett övervakningssystem för byggservrar skapats. Systemet sköter övervakningen genom en övervakningstjänst som hämtar information från en byggserver av typen CruiseControl.NET [10] och presenterar informationen på en webbportal. Informationen som hämtas ut från byggservern går från en hög abstraktionsnivå ner till minsta detalj som är baserad på loggfiler från bygget, med exempelvis information om kompileringsfel. Utvecklingen av övervakningssystemet har haft fokus på att göra det möjligt att använda molntjänster och på det sättet inte begränsa vart en byggserver finns placerad. En av de molntjänster som använts är Service Bus Relay [27] som hanterar kommunikationen mellan en övervakningstjänst och webbportalen. Webbportalen har utvecklats för att vara responsiv [34] för på så sätt stödja mobila enheter och ge användaren frihet att besöka webbportalen oavsett enhet. Webbportalen använder sig av en databas för att lagra informationen som bland annat möjliggör övervakning av flera byggservrar, och den välutvecklade användarhanteringen. Det har gjorts flera lärdomar, bland annat genom upptäckt av en bugg i Microsofts implementation av meddelandehanteringen i Service Bus Relay.
Software in computers control many important functions in today's society and are widely used for communication but also to control equipment. For the software to work reliably it needs to be built correctly and tested extensively. To achieve reliability, a build server can be used to automatically build and test the software. This report describes how a prototype of a monitoring system for the build servers was created. The system will be monitored by a monitoring service that retrieves information from a build server using the CruiseControl.NET [10] software. The information gathered by the monitoring service will be presented on a web portal. The information retrieved from build the server goes from a high level of abstraction down to the smallest detail that is based on the log files from the build server, for example, information about compilation errors. The development of the monitoring system has been focused on making it possible to use cloud services and thus not restrict where a build server is located. One of the cloud services used is the Service Bus Relay [27] that handles the communication between a monitoring service and the web portal. The web portal is developed to be responsive [34] and provide support for mobile devices which give the user the freedom to visit the web portal from whatever device. The web portal uses a database to store information which enables monitoring of multiple build servers. A well-developed user management system is used on the web portal which provides administrators with an effective tool for user management. There have been several lessons learned, including the discovery of a bug in the Microsoft implementation of message handling in the Service Bus Relay.
APA, Harvard, Vancouver, ISO, and other styles
25

Bricault, Gary S. "GSD : an interactive window-oriented debugger for the AT & T UNIX-PC /." Online version of thesis, 1989. http://hdl.handle.net/1850/10549.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Wen, Shenning. "The study, design, and implementation of Data mart functions in Windows environments." CSUSB ScholarWorks, 1998. https://scholarworks.lib.csusb.edu/etd-project/1374.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Jian, Zhang, and Huang Ming-Sheng. "A Multi-Pulse PPK Telemetry System Based on PC." International Foundation for Telemetering, 1995. http://hdl.handle.net/10150/611603.

Full text
Abstract:
International Telemetering Conference Proceedings / October 30-November 02, 1995 / Riviera Hotel, Las Vegas, Nevada
A new kind of telemetry ground data system--Multi-Pulse PPK (Pulse Position Keying) Telemetry System Based on PC(MPPK-PCTS) is presented in this paper. Being Aimed at the lower bit rate which is the essential shortcoming of Single-Pulse PPK(SPPK), Multi-Pulse PPK(MPPK) signal is introduced to this system. Its signal forms, bit rate, energy efficiency and error probability have been analysed in detail. The symmetric Bi-Pulse PPK(BPPK) signal with fixed reference pulse can be practised in engineering. In this system, front-ends are intelligent and modular, all modules are integrated in a personal computer chassis through EISA/PCI bus. The system operates under multi-media WINDOWS environment, with intelligent user interface. Faults can be detected and located automatically. With flexible performance, good expandibility and small size, the system can be used in reentry telemetry and many other fields where higher rate and lower power are both required.
APA, Harvard, Vancouver, ISO, and other styles
28

Olsson, Johan. "Prestandajämförelse mellan Windows Server container och Hyper-V : I vilken grad förloras resurser när ett system partitioneras med dessa?" Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15747.

Full text
Abstract:
Det här arbetet hade målet att undersöka vilken storlek förlusten av resurser som Hyper-V och Windows Server container introducerar när ett system delas upp med dessa. Genom att testa detta skulle man också kunna jämföra Microsofts implementering av containerbaserad virtualisering med Linux implementering och se om det finns några likheter. För att kunna jämföra med tidigare forskning fanns målet att försöka efterlikna metoden i tidigare forskning som gjort liknande tester i operativsystemet Linux med KVM och LXC så nära som möjligt. Resultaten visades sig till stor del överensstämma med resultaten på tester genomförda i Linux. Det vill säga att container-baserad virtualisering har överlag en mindre förlust av resurser än hypervisor-baserad virtualisering. Undantaget var dock nätverkstesterna där container-baserad virtualisering presterade sämst men även detta överensstämde med tidigare forskning.
This work had the goal of looking at the loss of resources that Hyper-V and Windows Server container introduce when a system is partitioned with these. By testing this, you could also compare Microsoft's implementation of container-based virtualization with Linux implementation and see if there are any similarities. To be able to compare with previous research, the goal was to try to mimic the method in previous research that made similar tests in the Linux operating system with KVM and LXC as close as possible. The results were largely consistent with the results of tests conducted in Linux. That is, container-based virtualization generally has a smaller loss of resources than hypervisor-based virtualization. The exception was, however, the network tests where container-based virtualization performed poorest, but this also was consistent with previous research.
APA, Harvard, Vancouver, ISO, and other styles
29

Zhang, Qi. "The Application of Sequential Pattern Mining in Healthcare Workflow System and an Improved Mining Algorithm Based on Pattern-Growth Approach." University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1378113261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Pettersson, Erik. "Comparison of System Performance During DDoS Attacks in Modern Operating Systems." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-13748.

Full text
Abstract:
Distributed Denial of Service attacks are an ever prevalent challenge for system administra-tors today to overcome. The attack, which is all about restricting legitimate users access to a service, such as a web-page. Can cost companies and governments millions of dollars if not properly managed. This study aims to explore if there is any difference in performance between some of the most modern iterations of popular server operating systems today. Those server operating systems are: Windows Server 2016, Ubuntu 16 and FreeBSD 11. And submitting them to one of the most popular DDoS attacks at the time of writing, a so called HTTP-Get request. The webservers used are some of the most widely used today, Apache and Microsoft IIS. Each server will be submitted to attacks, and compared between one another. Different de-fence methods will also be tested and examined. Tests include shorter tests that is repeated multiple times for data validity, and one longer test for every condition in order to control if the results are similar. During these tests, the operating systems will measure CPU/RAM utilization, and a control computer will measure Round Trip Time. Windows Server 2016 using IIS and FreeBSD 11 perform similarly resource wise, but Win-dows Server 2016 with IIS had a better Round Trip Time performance. Windows Server 2016 with Apache performs worst in all measurements, while Ubuntu 16 performs in the middle, but has the most stable performance.
APA, Harvard, Vancouver, ISO, and other styles
31

Driscoll, Michael T. "A machine vision system for capture and interpretation of an orchestra conductor's gestures." Link to electronic version, 1999. http://www.wpi.edu/Pubs/ETD/Available/etd-051199-142455/unrestricted/thesis.pdf.

Full text
Abstract:
Thesis (M.S.)--Worcester Polytechnic Institute.
Keywords: color thresholding; video for Windows; center of mass calculation; contour extraction; area calculation; virtual orchestra; Broadway. Includes bibliographical references (leaves 62-63).
APA, Harvard, Vancouver, ISO, and other styles
32

Ševčík, Andrej. "Zamrznutí." Master's thesis, Vysoké učení technické v Brně. Fakulta výtvarných umění, 2016. http://www.nusl.cz/ntk/nusl-240504.

Full text
Abstract:
The subject of diploma thesis is cycle of paintings, animation and video. This work is based on the operation system error. I focusing on well know phenomen of freezing computer and follow layering of system windows over themselves. Due to an error may arise aesthetic shape, which may refer to geometric abstraction. On this phenomenon interested me especially the elementary aspects of painting, building space on surface, geometry, movement and shape.
APA, Harvard, Vancouver, ISO, and other styles
33

Vašák, Petr. "Helpdesk pro podporu správy firemních počítačových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-235535.

Full text
Abstract:
The thesis is dealing with creating and implementation of helpdesk system with diagnostics (feedback) for The Best Network Solution, the IT outsourcing company, serving for maintenance theirs computer networks, equipment and end customers support.
APA, Harvard, Vancouver, ISO, and other styles
34

李釗城. "The Desing And Implementation Of Single-Server VOD System Over Windows NT." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/90722382612418955473.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Miles, Russell Slater. "Deploying a secure Windows operating system and applications." 2007. http://etd.louisville.edu/data/UofL0306t2007.pdf.

Full text
Abstract:
Thesis (M.Eng.)--University of Louisville, 2007.
Title and description from thesis home page (viewed May 9, 2007). Department of Computer Engineering and Computer Science. Vita. "May 2007." Includes bibliographical references (p. 20-21).
APA, Harvard, Vancouver, ISO, and other styles
36

"Chinese window system with distributed fonts." Chinese University of Hong Kong, 1990. http://library.cuhk.edu.hk/record=b5886624.

Full text
Abstract:
Cheang Sio Man.
Thesis (M.Phil.)--Chinese University of Hong Kong, 1990.
Bibliography: leaves [103-106]
Chapter 1. --- THE EMERGENCE OF WINDOW SYSTEMS --- p.1-1
Chapter 2. --- THE NEED OF A CHINESE WINDOW SYSTEM --- p.2-1
Chapter 3. --- REQUIREMENTS AND DIFFICULTIES OF DEVELOPING A CHINESE WINDOW SYSTEM --- p.3-1
Chapter 3.1. --- Input Method and Character Encoding --- p.3-1
Chapter 3.2. --- Layout Direction and Formatting Mechanism --- p.3-3
Chapter 3.3. --- Fonts --- p.3-3
Chapter 3.3.1. --- Bitmap font --- p.3-4
Chapter 3.3.2. --- Outline font --- p.3-6
Chapter 4. --- A TRIAL TO OVERCOME THE DIFFICULTIES IN SUPPORTING CHINESE FONTS - OVERVIEW OF A CHINESE FONT SERVER SYSTEM --- p.4-1
Chapter 4.1. --- Network Font Server --- p.4-3
Chapter 4.2. --- Local Font Server --- p.4-4
Chapter 4.3. --- Fonts --- p.4-5
Chapter 4.3.1. --- Bitmap font --- p.4-5
Chapter 4.3.1. --- Outline font --- p.4-5
Chapter 4.4. --- Caching --- p.4-6
Chapter 5. --- ORGANIZATION OF THE CHINESE FONT SERVER SYSTEM --- p.5-1
Chapter 5.1. --- Communication Module --- p.5-2
Chapter 5.1.1. --- Client connection request channel --- p.5-3
Chapter 5.1.2. --- Client communication channels --- p.5-3
Chapter 5.1.3. --- Network server connection channel --- p.5-4
Chapter 5.2. --- Client Service Module --- p.5-7
Chapter 5.2.1. --- Font manipulation module --- p.5-7
Chapter 5.2.1.1. --- Request to open a new font --- p.5-8
Chapter 5.2.1.2. --- Request to close an opened font --- p.5-8
Chapter 5.2.1.3. --- Request to load a font character --- p.5-9
Chapter 5.2.2. --- Cache module --- p.5-10
Chapter 6. --- FROM THE CHINESE FONT SERVER SYSTEM TO A CHINESE WINDOW SYSTEM --- p.6-4
Chapter 7. --- SCREEN FONTS --- p.7-1
Chapter 7.1. --- Hand-edit --- p.7-3
Chapter 7.2. --- Bitmap Scaling --- p.7-3
Chapter 7.3. --- Outline Scaling --- p.7-5
Chapter 7.4. --- Manual Refinement --- p.7-16
Chapter 8. --- FONT CACHING --- p.8-1
Chapter 8.1. --- Font Caching Strategies --- p.8-1
Chapter 8.1.1. --- Pre-loading --- p.8-1
Chapter 8.1.2. --- Fix-loading --- p.8-4
Chapter 8.1.3. --- Demand loading --- p.8-6
Chapter 8.1.3.1. --- Least Recently Used (LRU) replacement --- p.8-9
Chapter 8.1.3.2. --- Least Frequently Used (LFU) replacement --- p.8-9
Chapter 8.1.4. --- Hybrid loading --- p.8-16
Chapter 8.2. --- Retrieval Method --- p.8-22
Chapter 8.2.1. --- Binary searching --- p.8-22
Chapter 8.2.2. --- Tree searching --- p.8-24
Chapter 8.2.3. --- Hash searching --- p.8 26
Chapter 8.3. --- Cache Expansion and Retraction --- p.8-33
Chapter 9. --- AN EXPERIMENTAL CHINESE FONT SERVER SYSTEM - CAPABILITIES AND RESTRICTIONS --- p.9-1
Chapter 9.1. --- Experimental Servers --- p.9-1
Chapter 9.2. --- Programming Interfaces --- p.9-3
Chapter 9.2.1. --- Connection request --- p.9-3
Chapter 9.2.2. --- Open and close fonts --- p.9-4
Chapter 9.2.3. --- Request to load cache --- p.9-5
Chapter 9.2.4. --- Change the current font --- p.9-5
Chapter 9.2.5. --- Request a font character --- p.9-5
Chapter 9.3. --- Testing Applications --- p.9-6
Chapter 9.4. --- Statistics --- p.9-8
Chapter 9.4.1. --- Cache performance --- p.9-8
Chapter 9.4.1.1. --- Tests --- p.9-8
Chapter 9.4.1.2. --- Results --- p.9-10
Chapter 9.4.1.3. --- Discussion --- p.9-10
Chapter 9.4.2. --- Local Server Vs. Network Server --- p.9-12
Chapter 9.4.2.1. --- Tests --- p.9-12
Chapter 9.4.2.2. --- Results --- p.9-13
Chapter 9.4.2.3. --- Discussion --- p.9-13
Chapter 9.4.3. --- Outline Font --- p.9-14
Chapter 9.4.3.1. --- Tests --- p.9-14
Chapter 9.4.3.2. --- Results --- p.9-14
Chapter 9.4.3.3. --- Discussion --- p.9-15
Chapter 10. --- EPILOGUE --- p.10-1
Chapter 10.1. --- Conclusion --- p.10-1
Chapter 10.2. --- Future Extension --- p.10-2
APA, Harvard, Vancouver, ISO, and other styles
37

(6623858), Nicolas Villacis Vukadinovic. "WhatsApp Forensics: Locating Artifacts in Web and Desktop Clients." Thesis, 2019.

Find full text
Abstract:
WhatsApp is the most popular instant messaging application worldwide. Since 2016, users can send and receive messages through desktop clients, either through the WhatsApp desktop application or the web client accessible from supported web browsers. The author identified a gap in the literature in terms of WhatsApp forensics for desktop and web clients. The aim of the study was to locate forensic artifacts on WhatsApp clients. These clients included the desktop application on both Windows and Mac operating systems. Chrome and Firefox web clients were also analyzed for the Windows operating system, as well as Chrome and Safari web clients on the Mac operating system. A WhatsApp log file was identified as the main artifact providing information throughout all clients analyzed. Cached profile pictures were also found, as well as history information about visited websites and ran applications.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography