Academic literature on the topic 'Windows Operating Systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Windows Operating Systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Windows Operating Systems"

1

Hwang, Seung-won. "Teaching operating systems with Windows." ACM SIGCSE Bulletin 39, no. 3 (June 25, 2007): 316. http://dx.doi.org/10.1145/1269900.1268882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Okolica, James, and Gilbert L. Peterson. "Windows operating systems agnostic memory analysis." Digital Investigation 7 (August 2010): S48—S56. http://dx.doi.org/10.1016/j.diin.2010.05.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vdovjak, Krešimir, Josip Balen, and Krešimir Nenadić. "Experimental Evaluation of Desktop Operating Systems Networking Performance." International journal of electrical and computer engineering systems 11, no. 2 (June 24, 2020): 67–76. http://dx.doi.org/10.32985/ijeces.11.2.2.

Full text
Abstract:
The rapid advancement of network, communication and Internet technology resulted with always-on, always-connected, device-independent and remote online working, business, education and entertainment environment. Consequently, users are searching for solutions and technologies that enable fast and reliable wide area network connection and the typical solution is through using personal computers connected with ethernet cable to network equipment and infrastructure that supports gigabit ethernet connection. Besides the complex network infrastructure that can influence performance, the bottleneck can also be caused by insufficient hardware, operating system and software resources on clients’ machines. Therefore, in this paper a networking performance evaluation of three globally most common and most used versions of Windows operating systems; namely Windows 7TM, Windows 8.1TM and Windows 10TM, on two identical computer systems, is conducted. Networking performance measurements are performed with three different benchmarks: namely iPerf, D-ITG and NetStress. Performance evaluation results showed that a newer versions of an operating system bring certain networking performance improvements but by sacrificing other performances.
APA, Harvard, Vancouver, ISO, and other styles
4

Legault, Alain, and Janet Matey. "Professional Video under 32-Bit Windows Operating Systems." SMPTE Journal 105, no. 12 (December 1996): 760–67. http://dx.doi.org/10.5594/j06424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hwang, Seung-won. "Blended learning for teaching operating systems with Windows." ACM SIGCSE Bulletin 41, no. 3 (August 25, 2009): 380. http://dx.doi.org/10.1145/1595496.1563022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hwang, Seung-won. "Video courseware for teaching operating systems with Windows." ACM SIGCSE Bulletin 41, no. 3 (August 25, 2009): 340. http://dx.doi.org/10.1145/1595496.1562981.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ilyenko, Anna, Sergii Ilyenko, and Tatiana Kulish. "PROSPECTIVE PROTECTION METHODS OF WINDOWS OPERATION SYSTEM." Cybersecurity: Education, Science, Technique 4, no. 8 (2020): 124–34. http://dx.doi.org/10.28925/2663-4023.2020.8.124134.

Full text
Abstract:
The article deals with the problem of ensuring information security of the Windows operating system and identifying promising security methods. This article identifies that the basic approach to operating system security is the "hardening of the operating system" process. The study presents statistics on the distribution of popular operating systems, namely Windows, Mac, Linux, Chrome, BSD. The analysis and classification of modern vulnerabilities of the operating system is made and the consequences of their action are given in the examples. These deficiencies can cause a computer system to intentionally violate the confidentiality, integrity and accessibility of information and the system as a whole. Based on the vulnerability analysis, the basic approaches and methods for the organization of protection of the operating system are determined. Standard approaches are discussed, namely the use of built-in security software, Active Directory security, and virtualization to deter attacks. Today, much attention is paid to cryptography and the principles of network, system, organizational and operational security, including risk analysis and disaster recovery, to ensure the security of the operating system. These approaches are basic and are a component of security in today's operating systems, but nowadays, using integrated approaches is more effective. A quick response to the violation of the integrity and accessibility of the operating system in combination with quenching, here are the main directions of development and improvement of the operating system. A rather new approach proposed in the article to protect Windows products is to use the Blockchain direction. It is currently used to validate digital certificates and can be said to have potential in other areas of operating system security. This paper shows examples of Blockchain implementation for certificate validation, taking into account some of the variations of validation. The examples are implemented in Python 3.0. The research of prospective methods and remedies of the operating system conducted in the article suggests that the use of system hardening is one of the effective and comprehensive approaches to providing security information, which will allow timely detection of vulnerabilities and timely response to violations of the basic properties of the operating system.
APA, Harvard, Vancouver, ISO, and other styles
8

BACIVAROV, Ioan, and Ioan-Cosmin MIHAI. "Access Rights Analysis in Microsoft Windows and Linux Operating Systems." International Journal of Information Security and Cybercrime 1, no. 1 (June 21, 2012): 8–14. http://dx.doi.org/10.19107/ijisc.2012.01.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gugliermetti, F., and F. Bisegna. "A model study of light control systems operating with Electrochromic Windows." Lighting Research & Technology 37, no. 1 (March 2005): 3–19. http://dx.doi.org/10.1191/1365782805li123oa.

Full text
Abstract:
Luminous environment apects related to the integration of control systems with ElectroChromic (EC) windows for non-residential buildings are analyzed. On/off and linear control strategies to reverse the EC transparency from the bleached to the coloured state, integrated with dimming and on/off artificial light control systems, are investigated as regards visual aspects. Different EC window systems are compared with a double sheet glass system equipped with different internal shading for some Italian cities in typical Mediterranean geographic areas. An integrated energy analysis program, IENUS (Integrated Energy Use Simulation), that simulates hourly thermal and luminous aspects on the base of TMYs (Typical Meteorological Years) is used as a work tool.
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Ya Jun. "Operating Linux Softwares on Windows Platform." Applied Mechanics and Materials 394 (September 2013): 495–98. http://dx.doi.org/10.4028/www.scientific.net/amm.394.495.

Full text
Abstract:
Operating Linux Application softwares on Windows platform, can not only promote the development of interoperability technology of these two operating systems, but also strengthen the status Windows has in the market. Because of the differences in the architectures of Linux and Windows, when running Linux application programs in Windows operating system, we need to resort to some certain kinds of technologies such as Services For Unix, Application Programming Interface emulation, virtual machine platform, source codes refactoring, etc. This paper aims at making deep analyses on the principles and features of these technologies.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Windows Operating Systems"

1

Goktepe, Meftun. "Windows XP Operating System security analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FGoktepe.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2002.
Thesis advisor(s): Richard Harkins, Cynthia Irvine. Includes bibliographical references (p. 105-107). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
2

Oakes, David R. "Microsoft operating systems development and strategy : an assessment of the Windows 2000 Server operating system." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369436.

Full text
Abstract:
Thesis (M.S. in Systems Technology (Scientific and Technical Intelligence)) Naval Postgraduate School, September 1999.
Thesis advisor(s): Douglas E. Brinkley. Includes bibliographical references (p. 151-153). Also Available online.
APA, Harvard, Vancouver, ISO, and other styles
3

Pettersson, Erik. "Comparison of System Performance During DDoS Attacks in Modern Operating Systems." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-13748.

Full text
Abstract:
Distributed Denial of Service attacks are an ever prevalent challenge for system administra-tors today to overcome. The attack, which is all about restricting legitimate users access to a service, such as a web-page. Can cost companies and governments millions of dollars if not properly managed. This study aims to explore if there is any difference in performance between some of the most modern iterations of popular server operating systems today. Those server operating systems are: Windows Server 2016, Ubuntu 16 and FreeBSD 11. And submitting them to one of the most popular DDoS attacks at the time of writing, a so called HTTP-Get request. The webservers used are some of the most widely used today, Apache and Microsoft IIS. Each server will be submitted to attacks, and compared between one another. Different de-fence methods will also be tested and examined. Tests include shorter tests that is repeated multiple times for data validity, and one longer test for every condition in order to control if the results are similar. During these tests, the operating systems will measure CPU/RAM utilization, and a control computer will measure Round Trip Time. Windows Server 2016 using IIS and FreeBSD 11 perform similarly resource wise, but Win-dows Server 2016 with IIS had a better Round Trip Time performance. Windows Server 2016 with Apache performs worst in all measurements, while Ubuntu 16 performs in the middle, but has the most stable performance.
APA, Harvard, Vancouver, ISO, and other styles
4

Montehermoso, Ronald Centeno. "Microsoft Windows Server 2003 : security enhancements and new features /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FMontehermoso.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, Sept. 2004.
Thesis Advisor(s): Douglas E. Brinkley. Includes bibliographical references (p. 111-118). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
5

DiLemmo, Marc C. "A DEVICE DRIVER ARCHITECTURE FOR TELEMETRY APPLICATIONS." International Foundation for Telemetering, 1998. http://hdl.handle.net/10150/609221.

Full text
Abstract:
International Telemetering Conference Proceedings / October 26-29, 1998 / Town & Country Resort Hotel and Convention Center, San Diego, California
This paper illustrates a device driver implementation used to support a PC compatible telemetry device. Device requirements included operation on Windows NT 4.0, Windows 95, Windows NT 5.0 and Windows 98 platforms. A single device driver was not possible due to the differences between driver requirements on the various operating systems. The Windows Driver Model (WDM) was considered for NT 5.0 and Win98, however, NT 4.0 and Win95 does not support the WDM. To minimize software development and support efforts, it was clear that an architecture compatible to both WDM, NT 4.0 and Windows 95 needed to be developed. The resulting layered device driver architecture provides a common upper interface and uses a register based model to describe the hardware at the lower interface. The common upper interface is compatible with all of the target operating systems and presents a consistent Applications Programming Interface (API) for the telemetry application developer. The lower interface is specific for each platform but contains minimal device specific functionality. A simple register I/O driver is easily implemented using all of the target operating systems. The layered architecture and register based interface to the hardware results in a multiple operating system code set which differs only at the lowest layer.
APA, Harvard, Vancouver, ISO, and other styles
6

Tsegaye, Melekam Asrat. "A comparative study of the Linux and windows device driver architecture with a focus on IEEE1394 (high speed serial bus) drivers." Thesis, Rhodes University, 2004. http://hdl.handle.net/10962/d1004829.

Full text
Abstract:
New hardware devices are continually being released to the public by hardware manufactures around the world. For these new devices to be usable under a PC operating system, device drivers that extend the functionality of the target operating system have to be constructed. This work examines and compares the device driver architectures currently in use by two of the most widely used operating systems, Microsoft’s Windows and Linux. The IEEE1394 (high speed serial bus) device driver stacks on each operating system are examined and compared as an example of a major device driver stack implementation, including driver requirements for the upcoming IEEE1394.1 bridging standard.
APA, Harvard, Vancouver, ISO, and other styles
7

Holm, Kristian, and Morgan Hallgren. "Hur hanterar institutioner en miljö med blandade Operativsystem?" Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5169.

Full text
Abstract:
The purpose of this thesis is to investigate if there are environments that use some kind of central authentication system within institutions/schools. The hypothesis is that an institution not using a form of central authentication service has more need for maintenance and as such is considered a higher cost for the organization. The gathering of data has been done through interviews with technical personal at Blekinge Tekniska Högskola and Linköpings Universitet. Based on the technical background of the authors, and the system limited to discussing Windows and UNIX operating systems, a discussion and analysis of the systems working today has been done, with emphasize on the hypothesis.
APA, Harvard, Vancouver, ISO, and other styles
8

Scruggs, Janet E. Yee Michael. "Migration from netware to windows NT network operating system /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA368151.

Full text
Abstract:
Thesis (M.S. in Information Technology Management, M.S. in Information Systems) Naval Postgraduate School, June 1999.
"June 1999". Thesis advisors(s): Douglas E. Brinkley, Erik Jansen, Mark Nissen. Includes bibliographical references (p. 123-125). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
9

Scruggs, Janet E., and Michael Yee. "Migration from netware to windows NT network operating system." Thesis, Monterey, California. Naval Postgraduate School, 1999. http://hdl.handle.net/10945/13557.

Full text
Abstract:
Migration from an existing information technology system to a new system presents many managerial challenges. There are technological challenges associated with running the old system, maintaining data integrity and bringing the new system online all without seriously impacting daily operations. There are human factors to consider like resistance to change and conflict management. In addition, organizational issues like management support and cross functional communication channels need to he addressed. This thesis reviews the technical migration from an operational NetWare network to Windows NT completed at the Defense Manpower Data Center (DMDC) in Monterey, CA. The DMDC case presents a typical set of issues that an IT manager is likely to face when implementing technology driven change. Technical, human and organizational factors of technical change are discussed. A list of lessons learned and a set of technical management guidelines are derived from analysis of the DMDC case. Details of Windows NT 4.0 and 5.0 features are included.
APA, Harvard, Vancouver, ISO, and other styles
10

Rhee, Sokwoo. "Development of a Windows NT real-time operating system for NC machine control." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/45474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Windows Operating Systems"

1

Haldar, Sibsankar. Operating systems. Upper Saddle River, NJ: Pearson Education, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haldar, Sibsankar. Operating systems. Upper Saddle River, NJ: Pearson, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Aravind, Alex A. (Alex Alagarsamy), 1965-, ed. Operating systems. Upper Saddle River, NJ: Pearson, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

B, Galvin Peter, and Gagne Greg, eds. Operating system concepts: Windows XP update. 6th ed. New York, NY: John Wiley & Sons, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Livingston, Brian. Sekrety Windows 95. 3rd ed. Kiev: Dialektika, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Livingston, Brian. Windows 95 secrets. 3rd ed. Foster City, CA: IDG Books Worldwide, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

1947-, Straub Davis, ed. Windows 95 secrets. 4th ed. Foster City, CA: IDG Books Worldwide, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Davis, Straub, ed. Windows 95 secrets. 3rd ed. Foster City, Calif: IDG, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

McBride, P. K. Windows made simple. Oxford: Made Simple, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Varhol, Peter. Microsoft's Windows NT operating system. Charleston, S.C., U.S.A: Computer Technology Research Corp., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Windows Operating Systems"

1

Gaskill, Frank W. "There Are Other Operating Systems besides Windows." In A Spectrum of Solutions for Clients with Autism, 277–81. New York, NY : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429299391-36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Battistoni, Roberto, Emanuele Gabrielli, and Luigi V. Mancini. "A Host Intrusion Prevention System for Windows Operating Systems." In Computer Security – ESORICS 2004, 352–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30108-0_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Meyers, Scott, and Mike Lee. "Working with Microsoft Windows and Other Operating Systems." In Learn Mac OS X Snow Leopard, 627–36. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-1947-7_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Negi, Vipul Singh, and Nirmalya Kar. "Security and Anonymity Aspects in Tails and Windows 10 Operating Systems." In Communications in Computer and Information Science, 188–99. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66763-4_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Weik, Martin H. "Windows Operating System." In Computer Science and Communications Dictionary, 1924. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_21134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Forte, Dario. "Windows 2000 Operating System." In Handbook of Computer Networks, 57–77. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118256114.ch5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fox, Richard. "The Windows Operating System." In Information Technology, 367–417. Second edition. | Boca Raton : CRC Press, 2020.: Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781003050971-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rhodes, Chris, and Andrew Bettany. "Upgrading the Windows Client Operating System." In Windows Installation and Update Troubleshooting, 67–88. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1827-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sreerag, M., M. Sethumadhavan, and P. P. Amritha. "Identifying and Mitigating Vulnerabilities of Hardened Windows Operating System." In Information and Communication Technology for Competitive Strategies (ICTCS 2020), 623–32. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0739-4_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zegzhda, Peter D., Dmitry P. Zegzhda, and Maxim O. Kalinin. "Vulnerabilities Detection in the Configurations of MS Windows Operating System." In Lecture Notes in Computer Science, 339–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11560326_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Windows Operating Systems"

1

Hwang, Seung-won. "Teaching operating systems with Windows." In the 12th annual SIGCSE conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1268784.1268882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Calder, Brad. "Inside windows azure." In ASPLOS '14: Architectural Support for Programming Languages and Operating Systems. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2541940.2560008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Voitovych, Olesia, Leonid Kupershtein, and Ivan Pavlenko. "Hidden process detection for windows operating systems." In 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T). IEEE, 2017. http://dx.doi.org/10.1109/infocommst.2017.8246439.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hwang, Seung-won. "Video courseware for teaching operating systems with Windows." In the 14th annual ACM SIGCSE conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1562877.1562981.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hwang, Seung-won. "Blended learning for teaching operating systems with Windows." In the 14th annual ACM SIGCSE conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1562877.1563022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Legault, Alain, Jean Lapierre, Louis Dionne, and Tim Cherna. "Professional Video under 32-Bit Windows™ Operating Systems." In SMPTE Technical Conference. IEEE, 1995. http://dx.doi.org/10.5594/m00480.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Джабраилов, Зелимхан Адамович, Ислам Арбиевич Магомедов, and Ильяс Бекович Асхабов. "COMPARISON OF MOBILE OPERATING SYSTEMS: ANDROID OS, IOS, WINDOWS PHONE OS." In Высокие технологии и инновации в науке: сборник избранных статей Международной научной конференции (Санкт-Петербург, Ноябрь 2020). Crossref, 2020. http://dx.doi.org/10.37539/vt188.2020.39.53.024.

Full text
Abstract:
Статья описывает три наиболее распространенные операционные системы Android, iOS и Windows Phone, а также их краткую историю. В данной статье описываются преимущества и недостатки операционных систем. The article describes the three most common operating systems Android, iOS and Windows Phone, as well as their brief history. The work also will describe advantages and disadvantages of following operating systems.
APA, Harvard, Vancouver, ISO, and other styles
8

Honjo, Shintaro, Shunsaku Matsumoto, and Takeshi Sano. "Maximizing Production with Real-Time Integrity Operating Windows." In Offshore Technology Conference. OTC, 2021. http://dx.doi.org/10.4043/31030-ms.

Full text
Abstract:
Abstract A conceptual design of digital Intelligent Production Integrity Operating Windows (IP-IOW) system, which is an unique and transformational solution to the oil and gas offshore industry focusing on maximizing production while optimizing equipment operation, was developed through a Nippon Foundation (NF) - DeepStar® partnership project. This connects the fluids system with the equipment system using IP-IOW architecture and specifications of a digital platform. The developed digital IP-IOW architecture contains five major evaluation modules, which are Component risk analysis (CRA), Failure Mode and Effect Analysis (FMEA), Failure Evaluation (FE), Maintenance Evaluation (ME), and Reliability Availability, and Maintainability Analysis (RAMA) focusing on critical components, including subsea choke, flowline and riser, topside choke, topside equipment, and crude export line. Each module has a function of monitoring, risk evaluation or analysis of each component based on various existing databases and/or industrial standards. Component risk analysis (CRA) module is designed as a key module to evaluate individual risk of each component based on the evaluation results of the other modules and to provide IP-IOW dashboards through operation and maintenance analysis methods. CRA module analyzes operation and maintenance based on the likelihood of failure (probability of failure) as a function of operation and maintenance conditions and impact of the damage. Calculated safety operating windows (SOWs) and reliability operating windows (ROWs) would be indicated on the IP-IOW dashboard. In this project, detailed gap analysis was also conducted to gain an understanding of what relevant industry standards and practices have been published and how these publications have gaps with respect to IP-IOW. A completed search was made of technical indices and reference sources to identify codes and standards that may or can be used for developing Integrity Operating Windows (IOWs) for topside fixed equipment. Current API, DNV, and EI applicable recommended practices (RP) cover damaging effect, in-service inspection, risk ranking, repair items prioritization, and alteration of fixed equipment systems. However, the RPs do not cover how to integrate industry best practices into a real-time digital operating environment that is integral to the next generation O&M system. A critical recommendation is to connect the systems digitally allowing for data analytics using the Digital Twin of the asset. Several case studies on module development were conducted to demonstrate an example of the module development process and the workflow of module. RAM analysis on one of selected offshore production facilities identified top 30 high risk components from around 1200 components. A pilot physical model was also developed to enable the embodiment of a new industry recommended practice for offshore large scale of FPSO asset. This conceptual pilot has used the topside choke sand erosion connecting the fluid characterization (multi-phase flow) with the selected equipment to develop the correlation addressing major technical challenges of fixed equipment while maximizing production. An example of validation results of erosion module showed good agreement between actual inspection results and CFD calculation results. Overall, IP-IOW is designed based on rigorous CFD and field data to predict critical section of system and/or equipment likelihood of failure (LOF), such as Erosion with solids, flow induced vibration (FIV), acoustic induced vibration (AIV), vortex induced vibration (VIV), and corrosion in offshore environment. Mitsubishi Heavy Industries (MHI) has been sponsored by Nippon Foundation (NF) and DeepStar (DS) Joint Ocean Innovation R&D Program to perform a research study (Phase 1) of project titled "19143 Fixed Equipment Integrity Operating Windows based on Facility Operating Conditions" started from May 2019.
APA, Harvard, Vancouver, ISO, and other styles
9

Debbarma, Shibendu, and Abhijit Das. "Empirical Measuring IPv4/IPv6 Network Performance on Microsoft Windows Operating Systems." In 2013 Third International Conference on Advances in Computing and Communications (ICACC). IEEE, 2013. http://dx.doi.org/10.1109/icacc.2013.83.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Narayan, Shaneel, Samad S. Kolahi, Yonathan Sunarto, Du D. T. Nguyen, and Paul Mani. "Performance comparison of IPv4 and IPv6 on various windows operating systems." In 2008 11th International Conference on Computer and Information Technology (ICCIT). IEEE, 2008. http://dx.doi.org/10.1109/iccitechn.2008.4803056.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Windows Operating Systems"

1

Davis, CS. Tracking the Inside Intruder Using Net Log on Debug Logging in Microsoft Windows Server Operating Systems. Office of Scientific and Technical Information (OSTI), January 2004. http://dx.doi.org/10.2172/821103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Davis, CS. Tracking the Inside Intruder Using Net Log on Debug Logging in Microsoft Windows Server Operating Systems. Office of Scientific and Technical Information (OSTI), January 2004. http://dx.doi.org/10.2172/821123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tarko, Andrew P., Jose Thomaz, and Mario Romero. SNIP Light User Manual. Purdue University, 2020. http://dx.doi.org/10.5703/1288284317136.

Full text
Abstract:
A systemic approach to identifying road locations that exhibit safety problems was provided by the Safety Needs Identification Program (SNIP and SNIP2) developed by the Purdue University Center for Road Safety (CRS). The new version SNIP Light has been developed to provide other uses with planning level traffic safety analysis capability for a wider range of uses including Metropolitan Planning Agencies (MPOs) who want the tool for planning cost-effective safety programs in their metropolitan areas. The SNIP Light reduces the demand of computing and data storage resources and replaces the SQL server database system an integrated module coded in-house which is considerably faster than the original component. Furthermore, certain proficiency required to install and use the old version is no longer needed thanks to the intuitive single-window interface and executing file operations in the background without the user’s involvement. Some operations, such as optimizing funding of safety projects, are removed to simplify the tool.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography