Dissertations / Theses on the topic 'Windows Operating Systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 46 dissertations / theses for your research on the topic 'Windows Operating Systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Goktepe, Meftun. "Windows XP Operating System security analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FGoktepe.pdf.
Full textThesis advisor(s): Richard Harkins, Cynthia Irvine. Includes bibliographical references (p. 105-107). Also available online.
Oakes, David R. "Microsoft operating systems development and strategy : an assessment of the Windows 2000 Server operating system." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369436.
Full textThesis advisor(s): Douglas E. Brinkley. Includes bibliographical references (p. 151-153). Also Available online.
Pettersson, Erik. "Comparison of System Performance During DDoS Attacks in Modern Operating Systems." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-13748.
Full textMontehermoso, Ronald Centeno. "Microsoft Windows Server 2003 : security enhancements and new features /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FMontehermoso.pdf.
Full textThesis Advisor(s): Douglas E. Brinkley. Includes bibliographical references (p. 111-118). Also available online.
DiLemmo, Marc C. "A DEVICE DRIVER ARCHITECTURE FOR TELEMETRY APPLICATIONS." International Foundation for Telemetering, 1998. http://hdl.handle.net/10150/609221.
Full textThis paper illustrates a device driver implementation used to support a PC compatible telemetry device. Device requirements included operation on Windows NT 4.0, Windows 95, Windows NT 5.0 and Windows 98 platforms. A single device driver was not possible due to the differences between driver requirements on the various operating systems. The Windows Driver Model (WDM) was considered for NT 5.0 and Win98, however, NT 4.0 and Win95 does not support the WDM. To minimize software development and support efforts, it was clear that an architecture compatible to both WDM, NT 4.0 and Windows 95 needed to be developed. The resulting layered device driver architecture provides a common upper interface and uses a register based model to describe the hardware at the lower interface. The common upper interface is compatible with all of the target operating systems and presents a consistent Applications Programming Interface (API) for the telemetry application developer. The lower interface is specific for each platform but contains minimal device specific functionality. A simple register I/O driver is easily implemented using all of the target operating systems. The layered architecture and register based interface to the hardware results in a multiple operating system code set which differs only at the lowest layer.
Tsegaye, Melekam Asrat. "A comparative study of the Linux and windows device driver architecture with a focus on IEEE1394 (high speed serial bus) drivers." Thesis, Rhodes University, 2004. http://hdl.handle.net/10962/d1004829.
Full textHolm, Kristian, and Morgan Hallgren. "Hur hanterar institutioner en miljö med blandade Operativsystem?" Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5169.
Full textScruggs, Janet E. Yee Michael. "Migration from netware to windows NT network operating system /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA368151.
Full text"June 1999". Thesis advisors(s): Douglas E. Brinkley, Erik Jansen, Mark Nissen. Includes bibliographical references (p. 123-125). Also available online.
Scruggs, Janet E., and Michael Yee. "Migration from netware to windows NT network operating system." Thesis, Monterey, California. Naval Postgraduate School, 1999. http://hdl.handle.net/10945/13557.
Full textRhee, Sokwoo. "Development of a Windows NT real-time operating system for NC machine control." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/45474.
Full textNilsson, Christoffer, and Marcus Nilsson. "Installationsgränssnitt under Linux och Windows XP utifrån ISO 9241." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3955.
Full textMullaseril, Paul Abraham 1959. "Capacitated rural postman problem with time windows and split delivery." Diss., The University of Arizona, 1997. http://hdl.handle.net/10150/282300.
Full textWible, David Barry. "Methods for extension of ground shipment windows through a supplier collaboration initiative." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/66040.
Full text"June 2011." Cataloged from PDF version of thesis.
Includes bibliographical references (p. 77-78).
Amazon.com is a leading retailer and UPS is the leading package delivery company in the world. Amazon spends hundreds of millions of dollars each year shipping products to customers via parcel carriers such as UPS. Arguably, both companies rely on each other for their future success and are therefore interested in developing a closer relationship. But supplier collaboration efforts are challenging and partnerships between industry leading companies are not common. This research paper demonstrates a case study where two industry giants are working together on a process improvement projects to better serve their customers. This project has a goal of finding opportunities to delivery and sort UPS Ground packages more efficiently so as to allow for a longer window of time each day that the UPS Ground ship method is available. Additional goals exist around implementing more consistent processes and delivering product to UPS earlier in the evening for more efficient sorting. This project demonstrated that significant transportation savings can be achieved through these process improvements. Amazon and UPS are able to work together in a productive way to strengthen their long term relationships.
by David Barry Wible.
S.M.
M.B.A.
Jansen, Nikolas. "Usability Evaluation of Windows 8 with Keyboard and Mouse : Challenges Related to Operating System Migration in Large Organizations." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22973.
Full textBricault, Gary S. "GSD : an interactive window-oriented debugger for the AT & T UNIX-PC /." Online version of thesis, 1989. http://hdl.handle.net/1850/10549.
Full textRajesh, Edwin. "Assessment of Marine Conditions for Logistics, Operation Envelope and Weather Window for Offshore Projects." Thesis, Högskolan på Gotland, Institutionen för kultur, energi och miljö, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-217003.
Full textBahmann, Helge. "A network transparent, retained mode multimedia processing framework for the Linux operating system environment." Doctoral thesis, Technische Universitaet Bergakademie Freiberg Universitaetsbibliothek "Georgius Agricola", 2009. http://nbn-resolving.de/urn:nbn:de:bsz:105-967869.
Full textBehzadnia, Peyman. "Dynamic Energy-Aware Database Storage and Operations." Scholar Commons, 2018. http://scholarcommons.usf.edu/etd/7125.
Full textJones, Craig Allen McGee. "Business Strategies for ASEAN's Single Window in Southeast Asia." Thesis, Walden University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10248949.
Full textSince the Asian Financial Crisis of 1997 and the Global Financial Crisis of 2007, members of the Association of Southeast Asia Nations (ASEAN) have sought to strengthen ASEAN’s regional economies through a digital trade project known as the ASEAN Single Window (ASW). The purpose of this case study was to explore the business strategies that multinational organizational leaders used to overcome business barriers while implementing ASEAN partnership contracts and ASW region-wide projects. This study may be unique in that, at the time of this research, there was no published study in which researchers had explored a single window for a vast, multination geographical region. Data collection was done via in-depth interviews with ASW executives, studying online ASW-related conferences, and examining relevant strategic documents. A 6-phase thematic analysis process based on methodological triangulation corroborated the data and addressed construct validity through data familiarization, generating initial coding, categorizing codes and searching for themes, breaking codes into subcategories, data reduction and defining and naming themes, and report generation. The 4 strategic themes that emerged were business models and processes, public–private partnerships, project management methodologies, and overlapping themes. The findings offer insights into ways to overcome the ASW’s constraints and barriers. These strategic themes developed into a list of critical success factors and a summary list of principle business strategies and best practices. The implication for social change is a regionally collaborative trading environment providing potential economic options that not only impede the deterioration of the regional social fabric but support new opportunities such as trade liberalization and economic stability.
Svoboda, Tomáš. "Porovnání mobilních operačních systémů z pohledu vývoje, distribuce a monetizace aplikací." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-113919.
Full textGardner, Robert Matthew. "A Wide-Area Perspective on Power System Operation and Dynamics." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26779.
Full textPh. D.
Dutia, Dharini. "Multi-Robot Task Allocation and Scheduling with Spatio-Temporal and Energy Constraints." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1298.
Full textŠevčík, Andrej. "Zamrznutí." Master's thesis, Vysoké učení technické v Brně. Fakulta výtvarných umění, 2016. http://www.nusl.cz/ntk/nusl-240504.
Full textRen, Peng. "Off-line and On-line Affective Recognition of a Computer User through A Biosignal Processing Approach." FIU Digital Commons, 2013. http://digitalcommons.fiu.edu/etd/838.
Full textSkopal, Miroslav. "Univerzální hardwarová platforma podporující operační systém Linux." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218709.
Full textSohr, Martin. "Zabezpečovací systém pro rodinný dům." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2012. http://www.nusl.cz/ntk/nusl-219383.
Full textTrivedi, Anish Chandrakant. "An examination of Linux and Windows CE embedded operating systems." Thesis, 2010. http://hdl.handle.net/2152/ETD-UT-2010-08-1633.
Full texttext
Lai, Chun-Hao, and 賴俊豪. "Using SVM Technique to Detect Unauthorized Use Under Windows Operating Systems." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/51867213261125340934.
Full text國立中央大學
資訊管理研究所
95
Security damage about “Unauthorized use” are usually be discovered after it happened. And it costs about 50% financial loss in 30% respondents in 2006, CSI/FBI. Because of the popularity of Microsoft Window operation system, we discuss the “anomaly user behavior” in recent papers. After that we propose a view about “too large”, “include too many system information” in dataset that used for building normal user behavior model. It brings information security analyzer a lot of inconvenient in Microsoft Window OS environment.Then, we reference the thought, “Window Title”, and recommend a kind of dataset. The proposed dataset takes advantage of “few dataset”, “distinguish anomaly user behavior”.Finally, we use “Support Vector Machine” to verify the effect, and give some experimental results to explain the cuts of the dataset in our proposed system.
KAI, CHOU TE, and 周德凱. "Integrated Development Environment for USB device driver under Windows Operating Systems." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/91643221094050514559.
Full text南台科技大學
電子工程系
95
The driver is an interface of the communication of computer and peripheral device, so the connection between most devices and operating systems needs assistance via it. In Microsoft's window operating system, the driver is a very complicated set of Kernel-Mode Code. After the driver loads to the operating system, set about disposing the hardware interface in the operating system at once, and manage the system demand during operation, so the relation between the driver and operating system is close. That is to say, the developer of the driver does not have relevant background knowledge, and then the development of the program may encounter the difficulty. In this thesis, we combine the development concept of the software and hardware, and set up the development environment of USB device driver, so the user can utilize this environment to produce the driver fast. Passing the package simulation device that we designed, it can imitate USB device and convey the package. Our design method can get the result of planning and proving each other of the software and hardware, and even there is not any hardware device on the initial stage of developing, the test job will not have great influence.
Chang, Chung-Han, and 張眾函. "Design and Implementation of USB Device Driver Generator for Windows Operating Systems." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/32520229246053474718.
Full text南台科技大學
電子工程系
94
The device driver plays an important role in an operating system. It is the communication bridge between the hardware peripheral and the application programs running on computer. Device drivers are very sophisticate to develop, because it depends on knowledge of peripheral device specification as well as the OS. kernel’s details. Because a driver is a program which operates in the kernel of OS, it is very sensitive to the modification/upgrade of an OS. Even dealing with the same peripheral device, it usually can not avoid to redevelop a new version of device driver for a newer version of OS. Therefore, the development of device drivers has become a big problem for many PC peripheral system providers. In this thesis, we proposed a device driver generator for PC peripherals using USB interface. More specifically, we focus on the USB force feedback devices. Given the necessary parameters for a specific device, the tool can automatic generate a specific device driver, an INF file and a corresponding application program for verification. This tool can release a software engineer from learning the heavy burden of investigating the operating system core and relevant knowledge of the hardware, hence accelerates the development of the driver. In short, it is a very useful synthesis tool for device driver, which can help many hardware peripheral providers to solve their problem.
Λευτεράτος, Παναγιώτης. "Μελέτη του λειτουργικού συστήματος ''Windows CE'' για υπολογιστές τσέπης (Pocket PC) του συστήματος εντοπισμού θέσης GPS και ανάπτυξη εφαρμογής για την καταγραφή της σημάνσης του οδικού δικτύου." Thesis, 2006. http://nemertes.lis.upatras.gr/jspui/handle/10889/532.
Full textIn our modern society the continuous need for information and communication has led to the development of even smaller, but at the same time and more powerful, mobile devices. State of the art technology introduces pocket computers (Pocket PC) with size similar to a cell-phone, including powerful processing circuits, multiple capabilities of networking and an operating system (Windows CE/Mobile) capable for developing a broad range of applications. Pocket PCs can be used as sophisticated cell-phones, multimedia reproduction devices (picture, sound and video), personal organizers, city navigators and more. In this master thesis, we will describe in detail this operating system, the technical characteristics of Pocket PCs and their capabilities. We will also present the software development kits (SDKs) available for these devices. Another achievement of technology which has invaded recently in our lives is the Global Positioning System (GPS). GPS uses satellites orbiting the earth, to find our current location on Earth and for precise time calculation. At start it had only military use, but nowadays it is used extensively by citizens for civilian purposes. The applications of GPS vary from navigating through a city to oceanography. Modern technology is able to manufacture small GPS receivers with the capability to connect to a number of devices, including Pocket PCs. With the appropriate program running on the Pocket PC, we have the unique possibility to process territorial data on the go. In our thesis we will describe the GPS system and the protocol responsible for exporting data from a GPS receiver.
Figueira, Ana Raquel Correia. "Elliptic Curve Cryptography Services for Mobile Operating Systems." Master's thesis, 2015. http://hdl.handle.net/10400.6/5515.
Full textDispositivos móveis como computadores portáteis, smartphones ou tablets, são, nos dias de hoje, considerados objectos indispensáveis pela grande maioria das pessoas residentes em países desenvolvidos. Por serem utilizados como assistentes pessoais ou de trabalho, alguns destes dispositivos guardam, processam e transmitem dados sensíveis ou privados. Naturalmente, o número de aplicações móveis com mecanismos criptográficos integrados ou que oferecem serviços de segurança, tem vindo a aumentar de forma significativa nos últimos anos. Infelizmente, nem todas as aplicações são seguras por construção, e outras podem não implementar as primitivas criptográficas corretamente. Mesmo aquelas que as implementam corretamente podem sofrer de problemas de longevidade, já que primitivas criptográficas que são hoje em dia consideradas seguras podem tornar-se obsoletas nos próximos anos. O Rivest, Shamir and Adleman (RSA) constitui um exemplo de um sistema criptográfico muito popular que se pode tornar obsoleto a curto prazo. Enquanto que os problemas de segurança em ambientes de computação móvel podem ser de média severidade para utilizadores casuais, estes são normalmente críticos para várias classes profissionais, nomeadamente advogados, jornalistas e oficiais da justiça. É, por isso, importante, abordar estes problemas de uma forma estruturada. Este programa de mestrado foca-se na engenharia e implementação de uma aplicação móvel que oferece uma série de serviços de segurança. A aplicação foi desenhada para ser segura por construção para o sistema operativo Windows Phone 8.1 que, altura em que esta dissertação foi escrita, era a plataforma com a oferta mais discreta em termos de aplicações deste tipo. A aplicação fornece funcionalidades como trocar um segredo criptográfico entre duas entidades de forma segura, cifra, decifra e assinatura digital de mensagens e ficheiros, gestão de contactos e chaves de cifra, e geração e armazenamento seguro de palavras-passe. Parte das primitivas criptográficas utilizadas neste trabalho fazem parte da teoria da criptografia em curvas elípticas, para a qual se acredita que o problema do logaritmo discreto é de mais difícil resolução e para o qual a manipulação de chaves é mais simples. A biblioteca que define uma série de curvas, e contendo os procedimentos e operações que suportam as primitivas criptográficas, foi totalmente implementada no âmbito deste trabalho, dado ainda não existir nenhuma disponível no seu início, compreendendo assim uma das suas contribuições. O trabalho evoluiu da análise do estado da arte para o levantamento dos requisitos e para a fase de engenharia de software, aqui descrita detalhadamente, culminando no desenvolvimento de um protótipo. A engenharia da aplicação incluiu a definição de um sistema de confiança para troca de chaves públicas e também modelação da base de dados de suporte. Os resultados mais visíveis deste programa de mestrado são o protótipo da aplicação móvel, completamente funcional e disponibilizando as funcionalidades de segurança acima mencionadas, a implementação de uma biblioteca Elliptic Curve Cryptography (ECC) para framework .NET, e esta dissertação. O código fonte com a implementação da biblioteca foi publicada online. O seu desenvolvimento e melhoramento foi sobretudo dominado por testes unitários. A biblioteca e a aplicação móvel foram desenvolvidas em C?. O nível de segurança oferecido pela aplicação é garantido através da orquestração e combinação de algoritmos da criptografia de chave simétrica atuais, como o Advanced Encryption Standard (AES) e o Secure Hash Algorithm 256 (SHA256), com as primitivas ECC. A geração de palavras-passe é feita recorrendo utilizando vários sensores e dispoitivos de entrada como fontes de entropia, que posteriormente são alimentadas a uma função de hash criptográfica. As palavras-passe são guardadas numa base de dados cifrada, cuja chave de cifra muda sempre que a base de dados é aberta, sendo obtida através da aplicação de um Password-Based Key Derivation Function 2 (PBKDF2) a uma palavrapasse mestre. O modelo de confiança para chaves públicas desenhado no âmbito deste trabalho é inspirado no Pretty Good Privacy (PGP), mas a granularidade dos níveis de confiança é superior.
Tsegaye, Melekam Asrat. "A comparative study of the Linux and windows device driver architecture with a focus on IEEE1394 (high speed serial bus) drivers /." 2002. http://eprints.ru.ac.za/55/.
Full textMiles, Russell Slater. "Deploying a secure Windows operating system and applications." 2007. http://etd.louisville.edu/data/UofL0306t2007.pdf.
Full textTitle and description from thesis home page (viewed May 9, 2007). Department of Computer Engineering and Computer Science. Vita. "May 2007." Includes bibliographical references (p. 20-21).
I-Shu, Huang, and 黃一書. "A Study Of GPIO Driving Under Windows CE Operating System." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/04926321961901644510.
Full text明新科技大學
電子工程研究所
100
Embedded system has been be an important product in our life, for example : mobile phone, PDA and, iPhone, all these are application of embedded system. For now, the most popular is smart phone such as iPhone and HTC. The most popular embedded systems are Linux, Windows, and Android. This paper is focus on how to drive GPIO under the operation system of Windows CE. We used the Platform of ARM9 DMA-2440XP that provide by DAMTK. We drive the GPIO under the original BSP and use both software Platform Builder and embedded Visual C++ 4.0 SP4 to write program of control panel on the LCD in order to control any device. In this paper, the starting point started with LED. As new technology grow in such a rapid rate, transport without line becomes a must in our life. This paper used wifi developed by ZigBee of Chir Kal which allowed us to control the robot throw GPIO without line.
Evan and 邱奕珩. "Diffusion of innovations effect at operating system: Case study Windows Vista." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/10856528630543809838.
Full text亞洲大學
經營管理學系碩士在職專班
98
Abstract Since 1964, IBM began selling all kinds of large computer for business or garderment used. Until recently, the PC and notebook has become home to electronic equipment. Computer operating system market has been subject to U.S. Microsoft Windows family of products exclusive product advantage. Until Microsoft 2008 operating system platform to individuals officially launched Windows Vista series resulting from a Windows XP system with a new conflict between the Windows Vista. The most of consumers to resist the new system Windows Vista serious proliferation, thereby continuing to support the existing system of Windows XP. Through the VISTA in this study were among consumers to boycott the recipient of the relationship between the behavior of the system in the market, combined with innovation diffusion theory of technology acceptance model to study the innovation of the computer operating system by the bulk resistance of the actual status of factors. Study found that Windows Vista in the compatibility and relative advantage in significant relevance to consumers. This association can actually use in marketing management, and related to the promotion of innovation through the diffusion rate.
sea, Huang cheng, and 黃政熙. "converrting composite font to outline font in windows operation system." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/02383386707703323925.
Full text國立臺灣科技大學
電子工程技術研究所
86
The Chinese characters are numerous and complicated. In order to reduce the data volume of various fonts, Windows system uses the vector font of TrueType from composite method. Chinese fonts are usually used in graphic software. However, font translations among some Chinese software packages are incompatible, e.g. the international CorelDraw and domestic graphic software for titles. They do not access the Windows to get the bitmap data, instead they access the data of font dot to display the character. Therefore, the TrueType font from composite method shows the overlay of strokes in many characters. To solve the above problems, is we need to transfer the vector font to outline font of the TrueType font in the Chinese Windows system. This research adopts the mathematical theory of the Bezier curve to describe the outline of font, and uses the graphic user interface of windows system to provide a more user-friendly interface that eliminate the inconvenience of command line interface. The main transfer font is DYNA font, and the thesis also can be applied to other font of composition.
Shyuan-Long, Shyu. "The Development of PXI Data Acquisition Board on Windows CE Embedded Operating System." 2005. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2801200510334200.
Full textWang, Sheng-Hao, and 王聖豪. "An Integrated Development Platform for Heterogeneous Multicore Constructed on Windows CE Operating System." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/56178067830765857745.
Full text國立中山大學
電機工程學系研究所
101
Heterogeneous multicore systems with highly parallel computing are the significant trends for being used to improve the performances of processors in computing. They are provided with some modules for communications between different cores and with different instruction set architectures so that it is difficult to develop applications on such systems. Therefore, we present an integrated development platform for heterogeneous multicore to simplify the application development flow. The architecture of the platform is composed of application layer, abstraction layer and hardware layer. The hardware layer is the heterogeneous multicore system with a master processor and multiple slave coputational units; The abstraction layer is divided into two parts: one is the platform management core on a master processor; the other is the implementor for accelerated functions on each slave coputational unit. The former manages not only resources of accelerated functions and slave coputational units by using semaphore machanism but also shared memory by using dynamic storage management. In addition, it coordinates the communications between different cores by using interrupts and FIFOs; In the application layer, we consider the code to be accelerated on a coputational unit as function-like sub-program, called accelerated function. Therefore, we provide APIs not only on the master processor for caller but also on the slave coputational unit for the callee. Furthermore, we provide an integrator to make a single executable for simplifying implement manner. Finally, we apply the framework of the platform to Windows CE (WinCE) operating system, and we successfully realize it on TI DM3730 processor. Using the procedure of developing applications as examples, we verify that this platform doesn''t affect the total performance, and that it is feasible.
Shyu, Shyuan-Long, and 徐玄龍. "The Development of PXI Data Acquisition Board on Windows CE Embedded Operating System." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/39471158571592982953.
Full text國立臺灣大學
機械工程學研究所
93
This thesis develops a device driver for a National Instrument (NI) Analog-to-digital conversion (A/D) board to be used in a NI PXI system under the Windows CE environment. The PXI standard is an extension to the popular PCI bus interface tailored to fit hostile instrument usage environment. Even though it posses many rugged elements, the PXI system is not popular among the PC market. The peripheral support around it is therefore very limited. This thesis uses the Platform Builder provided with WinCE to develop the device driver for the NI A/D board. The software is developed under Embedded Visual C++, and the driver is fully compatible for PXI system installation.
Lin, Hung-hsien, and 林紘賢. "The Study of Remote Diagnosis for CNC Operation Based on Windows System." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/17193404492440155347.
Full text大葉大學
機械與自動化工程學系
99
This study is based on the Internet, through the establishment of IP Camera with remote monitoring and image processing zone discharge HMI system, through the system can operate the machine remotely monitor the situation. And this system is the use of human-machine interface WINPC32 Pro build, integrate into the use of personnel can use this to screen for discharge processing operations, but also between PC and PLC data communication interface. This control system installed in the EDM platform, and the actual processing and functional testing, in order to understand the control system produced in this study, the actual EDM machine in processing the case. Human-machine interface system is divided into server-side and client-side man-machine interface, the server-side man-machine interface for mechanical manufacturing, and human-machine interface for the purchase of the client machine's customers via the Internet so they can remote monitoring without the need to survey the scene real machine, the machine with remote network monitoring, if the abnormal machines, machinery manufacturing remote monitoring capabilities over the network, customers can quickly understand the operations of the unusual factors, and to give advice and processing methods can greatly reduce maintenance costs and time costs. This system can effectively be used in education share their views with academic exchanges, through the remote control makes the distance between people is not due to the difficulties arising from technical communication.
Luo, Huan-Ting, and 駱煥庭. "Writing a graphical user interface for displaying organic molecules on Windows-based operation system." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/64080303563300080740.
Full text國立清華大學
資訊系統與應用研究所
97
目前在結構生物學上有許多分子模型軟體可供選擇使用,但是許多雖然功能強大,但介面對使用者卻不夠親和而不便於使用,讓使用者減少使用的勇氣。本實驗以 Microsoft Foundation Classes (MFC) 以及 OpenGL 這個 Application Program Interface (API) 開發適用於 Microsoft Windows 平台的分子模型軟體。雖然很多生物研究所需的軟體工具都是建構在 Linux 環境上,但 Microsoft Windows 平台仍是一般使用者最熟悉並最常使用的平台。藉 OpenGL 這個高效的 API 提供 Wireframe、Ball\&Stick 以及 Space-fill 等三種呈現模式來展示各種複雜的化學以及藥物的三維立體分子結構,並能夠方便地使用滑鼠任意操控該結構的動作變化,如:旋轉、平移和遠近,並呈現即時的變化來滿足使用者的需求。同時整合計算基本分子特性的功能,如:氮、氧原子和氫鍵給予者或接受者以及胜肽鍵等十種性質的數量。在程式中所輸入的分子結構檔案是來自 SYBYL 公司制定的 MOL2 檔案,而 MOL2 檔案的取得可以藉由 Protein Data Bank 所提供的 PDB 檔案,經過 SYBYL 這個化學分子計算軟體平台的轉換來產生。
Li, Yu-Chien, and 李侑蒨. "A Study on consumer’s adoption of new operation system – An example of Microsoft Windows 7." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/34114234658415994203.
Full text輔仁大學
國際創業與經營管理學程碩士在職專班
98
The use of personal computer has been very popular in the current era and it has been an indispensable tool used whether in our life, society or at work. Consumers request for the basic functions while using operation systems in the past, however, consumer request more for speed, function, convenience and flexibility of the applications. Microsoft possesses more than 80% products in computer operation system, and still keeps introducing new update versions of operation systems to keep their advantage in the market. Windows 7 is developed to get rid of the bad reputation of previous version of operation system: Windows Vista. The specific of Windows 7 is the enhancement of current functions and the initiation of breakthrough new functions. This study, therefore, is to investigate the perspective on the impact of consumer’s intention to use the new Microsoft operation system, Windows 7. This study expounded based on technology acceptance model, combined with theory of planned behavior, diffusion of innovation and perceived risks. We gathered more than 300 questionnaires to start the exploratory research to grope after the factor of the adopting determinants. The results detects the perceived usefulness and perceived ease of use from TAM, perceived self-efficacy from TPB, compatibility and innovativeness from DOI and perceived risks do impact consumer’s adopting intention in different certain extent. By comprehending the impact factors, the industry can study from past failures and launch the products that meet customer’s requirements.
Mihordea, Margareta. "A proposal for kernel implementation of a window facility for ASCII terminals in the UNIX System V operating system." Thesis, 1988. http://spectrum.library.concordia.ca/4624/1/ML44243.pdf.
Full textJian-HongLin and 林建宏. "XHTML5:An X Window Remote Operation System for Cloud Computing Environment Based on HTML5." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/99751643137303111715.
Full text國立成功大學
電腦與通信工程研究所
100
With technology advancement, mobile devices prevail among embedded system products. However, many applications can not run directly on mobile devices due to limitation in computing power and platform variety. This thesis implements an X window remote operation system which allows users to access remote applications everywhere through a browser with no plug-in installation required and no other client-end software needed. There are Web & WebSocket Server, X Server Manager, Application Manager, and Input Handler on the server side. The Web & WebSocket Server realize the communication interface between server and clients while X Server Manager, Application Manager, and Input Handler deal with user input and requests from client side. The user interface on the client side is achieved by a web page. The development of this X window remote operation system features four main characteristics. First, the output display produced by remote application is presented by drawing instructions. Forwarding drawing instructions consumes less bandwidth than forwarding pictures of the application output. Second, web browser is used as the unified platform. A drawing library for HTML5 canvas element is implemented which realizes drawing application screen on the web page. Third, server directly pushes screen update information to client. This thesis uses HTML5 WebSocket as the communication protocol between client and server, which allows the connection established by a client to remain open. Fourth, this system supports multiple connections. The connections are isolated and will not interfere with each other. This thesis achieves the goals of decreasing the response latency and reducing the amount of data transferred over network from remote X window operation system. As a result, users can operate remote X window applications easily and smoothly.
Bahmann, Helge. "A network transparent, retained mode multimedia processing framework for the Linux operating system environment." Doctoral thesis, 2008. https://tubaf.qucosa.de/id/qucosa%3A22645.
Full text