To see the other types of publications on this topic, follow the link: Windows Operating Systems.

Journal articles on the topic 'Windows Operating Systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Windows Operating Systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hwang, Seung-won. "Teaching operating systems with Windows." ACM SIGCSE Bulletin 39, no. 3 (June 25, 2007): 316. http://dx.doi.org/10.1145/1269900.1268882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Okolica, James, and Gilbert L. Peterson. "Windows operating systems agnostic memory analysis." Digital Investigation 7 (August 2010): S48—S56. http://dx.doi.org/10.1016/j.diin.2010.05.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vdovjak, Krešimir, Josip Balen, and Krešimir Nenadić. "Experimental Evaluation of Desktop Operating Systems Networking Performance." International journal of electrical and computer engineering systems 11, no. 2 (June 24, 2020): 67–76. http://dx.doi.org/10.32985/ijeces.11.2.2.

Full text
Abstract:
The rapid advancement of network, communication and Internet technology resulted with always-on, always-connected, device-independent and remote online working, business, education and entertainment environment. Consequently, users are searching for solutions and technologies that enable fast and reliable wide area network connection and the typical solution is through using personal computers connected with ethernet cable to network equipment and infrastructure that supports gigabit ethernet connection. Besides the complex network infrastructure that can influence performance, the bottleneck can also be caused by insufficient hardware, operating system and software resources on clients’ machines. Therefore, in this paper a networking performance evaluation of three globally most common and most used versions of Windows operating systems; namely Windows 7TM, Windows 8.1TM and Windows 10TM, on two identical computer systems, is conducted. Networking performance measurements are performed with three different benchmarks: namely iPerf, D-ITG and NetStress. Performance evaluation results showed that a newer versions of an operating system bring certain networking performance improvements but by sacrificing other performances.
APA, Harvard, Vancouver, ISO, and other styles
4

Legault, Alain, and Janet Matey. "Professional Video under 32-Bit Windows Operating Systems." SMPTE Journal 105, no. 12 (December 1996): 760–67. http://dx.doi.org/10.5594/j06424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hwang, Seung-won. "Blended learning for teaching operating systems with Windows." ACM SIGCSE Bulletin 41, no. 3 (August 25, 2009): 380. http://dx.doi.org/10.1145/1595496.1563022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hwang, Seung-won. "Video courseware for teaching operating systems with Windows." ACM SIGCSE Bulletin 41, no. 3 (August 25, 2009): 340. http://dx.doi.org/10.1145/1595496.1562981.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ilyenko, Anna, Sergii Ilyenko, and Tatiana Kulish. "PROSPECTIVE PROTECTION METHODS OF WINDOWS OPERATION SYSTEM." Cybersecurity: Education, Science, Technique 4, no. 8 (2020): 124–34. http://dx.doi.org/10.28925/2663-4023.2020.8.124134.

Full text
Abstract:
The article deals with the problem of ensuring information security of the Windows operating system and identifying promising security methods. This article identifies that the basic approach to operating system security is the "hardening of the operating system" process. The study presents statistics on the distribution of popular operating systems, namely Windows, Mac, Linux, Chrome, BSD. The analysis and classification of modern vulnerabilities of the operating system is made and the consequences of their action are given in the examples. These deficiencies can cause a computer system to intentionally violate the confidentiality, integrity and accessibility of information and the system as a whole. Based on the vulnerability analysis, the basic approaches and methods for the organization of protection of the operating system are determined. Standard approaches are discussed, namely the use of built-in security software, Active Directory security, and virtualization to deter attacks. Today, much attention is paid to cryptography and the principles of network, system, organizational and operational security, including risk analysis and disaster recovery, to ensure the security of the operating system. These approaches are basic and are a component of security in today's operating systems, but nowadays, using integrated approaches is more effective. A quick response to the violation of the integrity and accessibility of the operating system in combination with quenching, here are the main directions of development and improvement of the operating system. A rather new approach proposed in the article to protect Windows products is to use the Blockchain direction. It is currently used to validate digital certificates and can be said to have potential in other areas of operating system security. This paper shows examples of Blockchain implementation for certificate validation, taking into account some of the variations of validation. The examples are implemented in Python 3.0. The research of prospective methods and remedies of the operating system conducted in the article suggests that the use of system hardening is one of the effective and comprehensive approaches to providing security information, which will allow timely detection of vulnerabilities and timely response to violations of the basic properties of the operating system.
APA, Harvard, Vancouver, ISO, and other styles
8

BACIVAROV, Ioan, and Ioan-Cosmin MIHAI. "Access Rights Analysis in Microsoft Windows and Linux Operating Systems." International Journal of Information Security and Cybercrime 1, no. 1 (June 21, 2012): 8–14. http://dx.doi.org/10.19107/ijisc.2012.01.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gugliermetti, F., and F. Bisegna. "A model study of light control systems operating with Electrochromic Windows." Lighting Research & Technology 37, no. 1 (March 2005): 3–19. http://dx.doi.org/10.1191/1365782805li123oa.

Full text
Abstract:
Luminous environment apects related to the integration of control systems with ElectroChromic (EC) windows for non-residential buildings are analyzed. On/off and linear control strategies to reverse the EC transparency from the bleached to the coloured state, integrated with dimming and on/off artificial light control systems, are investigated as regards visual aspects. Different EC window systems are compared with a double sheet glass system equipped with different internal shading for some Italian cities in typical Mediterranean geographic areas. An integrated energy analysis program, IENUS (Integrated Energy Use Simulation), that simulates hourly thermal and luminous aspects on the base of TMYs (Typical Meteorological Years) is used as a work tool.
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Ya Jun. "Operating Linux Softwares on Windows Platform." Applied Mechanics and Materials 394 (September 2013): 495–98. http://dx.doi.org/10.4028/www.scientific.net/amm.394.495.

Full text
Abstract:
Operating Linux Application softwares on Windows platform, can not only promote the development of interoperability technology of these two operating systems, but also strengthen the status Windows has in the market. Because of the differences in the architectures of Linux and Windows, when running Linux application programs in Windows operating system, we need to resort to some certain kinds of technologies such as Services For Unix, Application Programming Interface emulation, virtual machine platform, source codes refactoring, etc. This paper aims at making deep analyses on the principles and features of these technologies.
APA, Harvard, Vancouver, ISO, and other styles
11

Joh, HyunChul. "Software Risk Assessment for Windows Operating Systems with respect to CVSS." European Journal of Engineering Research and Science 4, no. 11 (November 27, 2019): 41–45. http://dx.doi.org/10.24018/ejers.2019.4.11.1610.

Full text
Abstract:
CVSS is recognized as a de facto standard for categorizing and measuring software vulnerabilities in both how easy for exploitation for the given security bug and how much impact on a system having the vulnerability in a sense of the three security factors. Meanwhile, since the early 2000s, quantitative risk assessments of software systems had been able to be examined thanks to the accumulated enough datasets for a scientific investigation. However, there are still a lot of research attempts not to be taken in a quantitative examination of software risk assessments. In this paper, we are quantitatively analyzing CVSS scores in vulnerabilities from the three most recent Windows products, namely, Windows 7, Windows 8.1 and Windows 10. The result shows that AML vulnerability discovery model represents Windows vulnerability discovery trend reasonably. Furthermore, we found explicitly that, most of the time, security bugs are compromised with no authentication required systems. This result is corresponding with the output from the previous research based on Web browsers.
APA, Harvard, Vancouver, ISO, and other styles
12

Nugent, Paul W., Joseph A. Shaw, Nathan J. Pust, and Sabino Piazzolla. "Correcting Calibrated Infrared Sky Imagery for the Effect of an Infrared Window." Journal of Atmospheric and Oceanic Technology 26, no. 11 (November 1, 2009): 2403–12. http://dx.doi.org/10.1175/2009jtecha1288.1.

Full text
Abstract:
Abstract A method is demonstrated for deriving a correction for the effects of an infrared window when used to weatherproof a radiometrically calibrated thermal infrared imager. The technique relies on initial calibration of two identical imagers without windows and subsequently operating the imagers side by side: one with a window and one without. An equation is presented that expresses the scene radiance in terms of through-window radiance and the transmittance, reflectance, and emissivity of the window. The window’s optical properties are determined as a function of angle over the imager’s field of view through a matrix inversion using images observed simultaneously with and without a window. The technique is applied to calibrated sky images from infrared cloud imager systems. Application of this window correction algorithm to data obtained months before or after the algorithm was derived leads to an improvement from 0.46 to 0.91 for the correlation coefficient between data obtained simultaneously from imagers with and without a window. Once the window correction has been determined, the windowed imager can operate independently and provide accurate measurements of sky radiance.
APA, Harvard, Vancouver, ISO, and other styles
13

Kozachok, Vasilii, Alexander Kozachok, and Evgenii Kochetkov. "Multi-Level Policy Model Access Control Security Operating Systems of the Windows Family." Voprosy kiberbezopasnosti, no. 1(41) (2021): 41–56. http://dx.doi.org/10.21681/2311-3456-2021-1-41-56.

Full text
Abstract:
The purpose of research – development of a more advanced Windows NT family access control mechanism to protect against information leakage from memory by hidden channels. The method of research – analysis of Windows NT family models of mandatory access control and integrity control, modeling of access control security policy for specified security properties, automatic verification of models. The Lamport Temporal Logic of Actions (TLA +) used to describe the model and its specification is used. TLA+ allows automatic verification of the model with the specified security properties. The result of research – revealed the main limitations of the existing mandatory integrity control of operating systems of the Windows NT family. A set of structures of a multilevel model has been developed, reflecting the attributes that are significant for modeling the process of access of subjects to objects. The key mechanisms of access control in the operating system are modeled: management of users, groups, subjects, objects, roles, rights, discretionary and mandatory access control, mandatory integrity control - multilevel control of subjects’ access to objects. The model defines a mechanism for controlling the creation of subjects based on executable files to organize an isolated software environment. The values of the attributes of the model variables for the initialization stage are determined. The invariants of variables correctness in the process of verification and subjects to objects safe access are developed. The model was specified using the TLA + modeling language and verified.
APA, Harvard, Vancouver, ISO, and other styles
14

Kozlov, Sergey Viktorovich, Sergey Alexandrovich Kopylov, Boris Vladimirovich Kondrat’ev, and Dmitry Olegovich Obydenkov. "Implementing Watermarking Based on a Virtual XPS Printer for Windows Operating Systems." Proceedings of the Institute for System Programming of the RAS 32, no. 5 (2020): 95–110. http://dx.doi.org/10.15514/ispras-2020-32(5)-7.

Full text
Abstract:
The article presents an approach to electronic documents printed marking by implementing a virtual XPS printer in Windows operating systems. The developed approach allows marking electronic documents during printing, regardless of the document presentation format and requirements for the printing process. During the marking approach development and implementation, a comparative analysis of technical solutions in the field of marking electronic documents was carried out, advantages and disadvantages were determined. Requirements and limitations imposed on the marking approach are defined. The virtual printer technology choice for the marking documents implementation in the printing process is substantiated. In the course of the marking approach implementing based on virtual printer technology, the structure of the organization and interaction of the marking process with the components of the print service of Windows family operating systems is given. The architecture of a virtual XPS printer driver has been developed. The process of practical implementation of the marker embedding into an electronic document using the developed virtual printer is described. In the process of the marking approach practical implementation, a interaction features description of the developed print filter with the printing subsystem, the parameters of metadata processing and the organization features of the marking server multithreaded implementation is presented. The implementation features of the developed marking approach in individual operating systems of the Windows family are considered. Limitations and assumptions are determined for each of the considered operating systems. Marking process requirements and further research directions are formulated.
APA, Harvard, Vancouver, ISO, and other styles
15

N., Sushil, Ramesh R., and Yogesh M. "Results of Penetration Testing on different Windows Client Operating Systems." International Journal of Computer Applications 156, no. 6 (December 15, 2016): 43–45. http://dx.doi.org/10.5120/ijca2016912531.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Tejaswini, K. "Cross-Platform File Explore with NW.JS." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 10, 2021): 500–504. http://dx.doi.org/10.22214/ijraset.2021.34950.

Full text
Abstract:
Our typical desktop file explorer applications are written in high-level programming languages and frameworks. Those apps are depending on the operating system. It can only operate on one operating system at a time. Windows&, for example, has My Computer, Windows 10 has This PC, Ubuntu has Files, and so on. Any web browser will not be able to operate this old file explorer desktop programme. This file explorer is a desktop application written in NW.js that runs on any platform. The application is created using Web-based programming languages. HTML, CSS, and JavaScript are examples of basic and straightforward languages. This programme is OS agnostic. As a result, it may operate on a variety of operating systems, including Windows, Linux, and MacOS. It cuts down on time spent on development and training. The cross-platform desktop programme has basic features such as file opening, copying, and pasting, directory navigation, showing the current directory path, and windowing functions such as maximise, minimise, and dismiss the window.
APA, Harvard, Vancouver, ISO, and other styles
17

Piątkowska, Ewelina, Katarzyna Wąsik, and Małgorzata Plechawska-Wójcik. "The use of .NET Core in web applications development." Journal of Computer Sciences Institute 7 (September 30, 2018): 142–49. http://dx.doi.org/10.35784/jcsi.663.

Full text
Abstract:
The article presents the use of .NET Core in web applications development. The analysis covers tests performed on a test application based on the .NET Core framework. The following benchmarking criteria were selected for the framework analysis: pattern search in text, counting parsing time, rendering operations on graphical files, adding files to archives, CRUD operation speed. These criteria were compared on two different operating systems - Windows, Linux. Additionally, the paper presents results obtained after the tests and their analysis. The hypothesis that tests will be executed faster on Windows than on Linux has only been partially confirmed.
APA, Harvard, Vancouver, ISO, and other styles
18

Hovden, Robert. "Running Digital Micrograph on Linux and Mac OSX." Microscopy Today 20, no. 2 (February 28, 2012): 24–27. http://dx.doi.org/10.1017/s155192951200003x.

Full text
Abstract:
Gatan Digital Micrograph (DM) software is considered an industry standard among microscopists. The offline DM application is freely available from Gatan. Unfortunately, DM software has been designed to run only on Microsoft Windows operating systems, thus distancing the microscopy community from popular Unix-based systems, such as Linux or Mac OSX. An ad hoc solution to this problem has required a virtualized Windows operating system running on top of the user's native operating system. This is not only slow, having to emulate each processor instruction, but also requires installation and licensing of Windows and the virtualization software. However, with the aid of open-source resources, it is possible to run DM natively on Linux and Mac OSX (Figure 1). This article was written as a guide with easy-to-follow installation instructions to liberate users from the Windows emulation pidgeonhole and enable them to freely analyze data on Unix-based systems.
APA, Harvard, Vancouver, ISO, and other styles
19

Adrianto, Felix, Inez Gavrila Wahyudi, and Jovis Tanner. "Eksplorasi Kecepatan Perhitungan Aplikasi Matematika pada Windows (98, Me, Xp, 7, 8)." Jurnal ULTIMA InfoSys 4, no. 2 (December 1, 2013): 60–64. http://dx.doi.org/10.31937/si.v4i2.243.

Full text
Abstract:
This research aims to give information regarding the speed of mathematical calculation on windows so that people can choose an operating system which suits them without wasting their time. In this research, we need a laptop and some operating systems (windows) so that we can compare one with the other accurately. The result of this research will be noted and analysed qualitatively, quantitatively, and descriptively. It shows that running the same mathematical calculation program on different operating systems will produce a same result but different time. Index Terms - calculate the speed, operating system
APA, Harvard, Vancouver, ISO, and other styles
20

Yasin. "WINDOWS WEB PROXY CACHING SIMULATION: A TOOL FOR SIMULATING WEB PROXY CACHING UNDER WINDOWS OPERATING SYSTEMS." Journal of Computer Science 10, no. 8 (August 1, 2014): 1380–88. http://dx.doi.org/10.3844/jcssp.2014.1380.1388.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Wieczorek, Dawid, and Jakub Smołka. "Comparison of performance multi-platform application core on Android and Windows 10 Mobile." Journal of Computer Sciences Institute 6 (March 30, 2018): 87–91. http://dx.doi.org/10.35784/jcsi.647.

Full text
Abstract:
The article examined whether applications written using the cross-platform application framework perform equally well as native solutions on selected operating systems. The Xamarin.Forms framework was tested against the native Android SDK and Universal Windows Platform frameworks for mobile systems Android and Windows 10 Mobile.
APA, Harvard, Vancouver, ISO, and other styles
22

Zadereyko, Olexander, Olena Trofymenko, and Nataliia Loginova. "ALGORITHM OF USER’S PERSONAL DATA PROTECTION AGAINST DATA LEAKS IN WINDOWS 10 OS." Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska 9, no. 1 (March 3, 2019): 41–44. http://dx.doi.org/10.5604/01.3001.0013.0905.

Full text
Abstract:
In the European Union, in the first half of 2018, the General Data Protection Regulation came into force, which established the new rules for processing users’ personal data for IT companies. The operating systems (OS) are the dominant software that is responsible for collecting and processing data in computer systems. The most common OS is the Windows OS family. The authors identified Windows 10 operating systems, that collect and accumulate user's personal data; developed and tested practically an algorithm, the application of which localizes and blocks the transfer of user's personal data to official servers of the Microsoft company.
APA, Harvard, Vancouver, ISO, and other styles
23

Basinya, Evgeny. "An automated system of network and system administration of Windows and Linux family operating systems." Science Bulletin of the Novosibirsk State Technical University, no. 4 (December 20, 2018): 47–58. http://dx.doi.org/10.17212/1814-1196-2018-4-47-58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Ketabchi, Saeed, Hossein Moosaei, Hossein Sahleh, and Mohammad Hedayati. "Large Scale Linear Programming in the Windows and Linux computer operating systems." Applied Mathematics & Information Sciences 7, no. 4 (July 1, 2013): 1553–56. http://dx.doi.org/10.12785/amis/070440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Borges, Ariane Santos, Paulo H. R. Gabriel, and Rodrigo Sanches Miani. "An updated analysis of seasonal variations of the security vulnerability discovery process." Revista Brasileira de Computação Aplicada 12, no. 2 (June 22, 2020): 122–33. http://dx.doi.org/10.5335/rbca.v12i2.10665.

Full text
Abstract:
Several factors may influence the security vulnerability discovery rates. The projection of these rates might help the development and the prioritization of software patches. Previous work studied the seasonal behaviors of the vulnerability discovery process for several operating systems and web related software systems. We propose a replication study of an experiment conducted more than a decade ago to understand the changes in the dynamics of the security vulnerability discovery rates. In contrast to the findings from ten years ago, the investigated systems do not exhibit a year-end peak. Besides, the higher incidence during mid-year months for Microsoft operating systems was only noticed for the most recent Windows OSes: Windows 8.1 and Windows 10. These results highlight the importance of reproducibility in scientific works. In the area of cybersecurity, in particular, it is important that models are created from studies conducted using updated data.
APA, Harvard, Vancouver, ISO, and other styles
26

Zhang, Lan, Min Yuan, Tao Liu, Li Wang, and Peng Gao. "Research on Program Calling and File Sharing between Windows and Linux." Applied Mechanics and Materials 214 (November 2012): 721–24. http://dx.doi.org/10.4028/www.scientific.net/amm.214.721.

Full text
Abstract:
There is often more than one kind of operating systems in enterprises’ and organizations’ local area network. Therefore, exchanging visits under different operating systems would be very meaningful and important. Especially in the field of bioinformatics, in order to meet the requirements of researchers from various disciplines, such as mathematics, biology and computer science, we develop a new, intuitive and convenient system for exchanging resources between Windows and Linux.
APA, Harvard, Vancouver, ISO, and other styles
27

Ruiz-García, A., I. Nuez, M. D. Carrascosa-Chisvert, and J. J. Santana. "Simulations of BWRO systems under different feedwater characteristics. Analysis of operation windows and optimal operating points." Desalination 491 (October 2020): 114582. http://dx.doi.org/10.1016/j.desal.2020.114582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Sobhy, Ahmed Refaat, Abeer Twakol Khalil, Mohamed M. Elfaham, and Atalla Hashad. "UAV Cloud Operating System." MATEC Web of Conferences 188 (2018): 05011. http://dx.doi.org/10.1051/matecconf/201818805011.

Full text
Abstract:
Unmanned aerial vehicle (UAV) which is a special case of mobile ad-hoc networks (MANETs) that attracts many researchers as it becomes a scope for both military and civilian applications. Also the trend of cloud computing when it is combined with UAV highlights this field of research in many aspects, but the most significant point of research is the operating system for the cloud. This paper investigates UAV cloud operating system showing the throughput (bits/Sec) for the system implemented when using both Windows and Linux operating systems in order to select the operating system used based on a real scientific results.
APA, Harvard, Vancouver, ISO, and other styles
29

Buryta, Michał, and Piotr Kopniak. "Comparison of the security mechanisms of popular operating systems for mobile devices." Journal of Computer Sciences Institute 4 (September 30, 2017): 87–91. http://dx.doi.org/10.35784/jcsi.599.

Full text
Abstract:
The article concerns the differences in the mechanisms of securing the three most popular mobile platforms, which are Android, iOS and Windows Phone. Mainly focuses on the differences related to access to user data, installing and running applications, Internet access, network connectivity, cloud services, backup, file encryption capabilities, the use of electronic signatures and connect the device to your computer.
APA, Harvard, Vancouver, ISO, and other styles
30

Choi, Kwan-Deok, and Ho Jang. "Simulator for Performance Analysis of Wireless Network based on Microsoft Windows Operating Systems." Journal of the Korea Society of Computer and Information 15, no. 2 (February 28, 2010): 155–62. http://dx.doi.org/10.9708/jksci.2010.15.2.155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Haglund, Richard F. "Damage Mechanisms in Optical Materials For High-Power, Short-Wavelength Laser Systems." MRS Bulletin 11, no. 3 (June 1986): 46–47. http://dx.doi.org/10.1557/s088376940005483x.

Full text
Abstract:
Damage to optical materials under intense photon irradiation has always been a major problem in the design and operation of high-energy and high-average-power lasers. In short-wavelength lasers, operating at visible and ultraviolet wavelengths, the problem appears to be especially acute; presently attainable damage thresholds seriously compromise the engineering design of laser windows and mirrors, pulsed power trains and oscillator-amplifier systems architecture. Given the present interest in ultraviolet excimer lasers and in short-pulse, high-power free-electron lasers operating at visible and shorter wavelengths, the “optical damage problem” poses a scientific and technological challenge of significantdimensions. The solution of this problem even has significant implications outside the realm of lasers, for example, in large space-borne systems (such as the Hubble Telescope) exposed to intense ultraviolet radiation.The dimensions of the problem are illustrated by the Large-Aperture krypton-fluoride laser amplifier Module (LAM) shown schematically in Figure 1. This device, now operating at the Los Alamos National Laboratory, is typical of current and planned large excimer lasers for fusion applications. The LAM has an active volume of some 2 m3, and optical surfaces (resonator mirror and windows) exceeding 1 m2 in size; the fabrication of these optical elements was the most expensive and time-consuming single item in the construction of the laser. During laser operation, a population inversion in an Ar-Kr-F2 mix ture is created through electron-beam excitation of the laser gas by two 400 kA beams of 650 keV electrons from a cold cathode discharge. The electron trajectories in the gas are constrained by a 4 kG magnetic field transverse to the optical axis produced by a pair of large Helmholtzcoils.
APA, Harvard, Vancouver, ISO, and other styles
32

Dalimunthe, Ruri Ashari, Riki Andri Yusda, and William Ramdhan. "INSTALASI SISTEM OPERASI BERBASIS WINDOWS 10 PADA SEKOLAH MAN KISARAN." Jurdimas (Jurnal Pengabdian Kepada Masyarakat) Royal 3, no. 2 (July 14, 2020): 163–68. http://dx.doi.org/10.33330/jurdimas.v3i2.499.

Full text
Abstract:
Abstract: Community service activities entitled "Installation of Operating Systems Based on Windows 10" aims to provide information to students from MAN Asahan about Installing Windows Operating Systems. The method used in this activity is a direct observation of the MAN Asahan school by watching and analyzing the problems or troubleshooting that occurs at the Computer Lab at MAN Asahan. In addition, information on problems in the computer Labs of the school was also carried out by a team of lecturers as the perpetrators of this community service by way of direct interviews with the Teachers and employees who served in the Computer Lab of the MAN Asahan school. The end result of this dedication is how students can repair computers, as well as troubleshooting that occurs on school computers and computers at home, can be overcome alone without having to use computer repair services.Keywords: installation; operating system; Windows 10 Abstrak: Kegiatan pengabdian kepada masyarakat yang diberi judul “Instalasi Sistem Operasi Berbasis Windows 10” bertujuan untuk memberikan informasi kepada siswa dan siswi MAN Asahan tentang Instalasi Sistem Operasi Windows. Metode yang digunakan dalam kegiatan ini adalah observasi langsung ke sekolah MAN Asahan dengan melihat serta menganalisa permasalahan ataupun troubleshooting yang terjadi pada Laboratorium Komputer disekolah MAN Asahan. Selain itu, Informasi permasalahan pada komputer Lab sekolah juga dilakukan tim dosen selaku pelaku kegiatan pengabdian ini dengan cara wawancara langsung kepada Guru dan pegawai yang bertugas di Lab Komputer sekolah MAN Asahan. Hasil akhir dari pengabdian ini adalah bagaimana siswa dan siswi dapat memperbaiki komputer serta troubleshooting yang terjadi pada komputer sekolah maupun komputer dirumah dapat teratasi sendiri tanpa harus memakai jasa perbaikan komputer. Kata kunci: instalasi; sistem operasi; windows 10
APA, Harvard, Vancouver, ISO, and other styles
33

Djordjevic-Kajan, S., Dragan Stojanovic, and Aleksandar Stanimirovic. "Advanced System Software curricula." Facta universitatis - series: Electronics and Energetics 18, no. 2 (2005): 309–17. http://dx.doi.org/10.2298/fuee0502309d.

Full text
Abstract:
An advanced System Software curricula at the Faculty of Electronic Engineering in Nis is presented in this paper. The system software track consists of two important themes of Computer Science and Computing in General organized now as two separated courses: Operating Systems course and System Software Development and System Programming course. Both courses offer extensive teaching of foundational concepts and principles of Operating Systems and System Programming along with design and implementation of presented topics in real operating systems and system software, such as Unix, Linux and Windows 2000/XP. Laboratory environments and exercises for both courses offer both examination of main algorithms and structures within operating systems and system software through simulation, and what is more important, hands-on experience with operating system internals and code.
APA, Harvard, Vancouver, ISO, and other styles
34

Borodin, Alexander, Roman Veynberg, Dmitry Pisarev, and Oleg Litvishko. "Simulation of artefact detection in Viber and Telegram instant messengers in Windows operating systems." Business Informatics 13, no. 4 (December 31, 2019): 39–48. http://dx.doi.org/10.17323/1998-0663.2019.4.39.48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Omoto, Kunio. "Development of New Beta-Counting Programs Operating Under a Windows® NT Workstation." Radiocarbon 40, no. 1 (1997): 151–55. http://dx.doi.org/10.1017/s0033822200017999.

Full text
Abstract:
β-counting software programs were developed and installed in new PCs for operation under a Windows® NT workstation. The new software programs allow us to simultaneously control several β-counting systems, either remotely or from within the laboratory. This setup is much less expensive than our previous arrangement, which required a separate PC for each counter.
APA, Harvard, Vancouver, ISO, and other styles
36

Lu, X. H., Zhen Yuan Jia, Y. Z. Lv, and J. Y. Yang. "High Precision Timing of the Copying Control System Based on Windows 2000." Materials Science Forum 626-627 (August 2009): 87–92. http://dx.doi.org/10.4028/www.scientific.net/msf.626-627.87.

Full text
Abstract:
A design proposal for developing a high-precision timer of the real-time digital copying control system is put forward by analyzing the real-time characteristics of Windows 2000 operating system. Proposals of using information systems timer—WM_TIMER, multimedia timer, VxD and hardware to achieve high-precision timing in Windows operating system are analyzed and compared. Based on computer high-frequency timer and multi-thread technology, timing function provided by Microsoft Visual C++ is used to achieve a high-precision software timer of the system. Finally, the researched timing method is tested in Advantech IPC-610 host with Intel Pentium 4 processor, and the maximum timing error is less than 5μs which meets the system timing requirements.
APA, Harvard, Vancouver, ISO, and other styles
37

Wu, Caicong, Zhibo Chen, Dongxu Wang, Bingbing Song, Yajie Liang, Lili Yang, and Dionysis D. Bochtis. "A Cloud-Based In-Field Fleet Coordination System for Multiple Operations." Energies 13, no. 4 (February 11, 2020): 775. http://dx.doi.org/10.3390/en13040775.

Full text
Abstract:
In large-scale arable farming, multiple sequential operations involving multiple machines must be carried out simultaneously due to restrictions of short time windows. However, the coordination and planning of multiple sequential operations is a nontrivial task for farmers, since each operation may have its own set of operational features, e.g., operating width and turning radius. Taking the two sequential operations—hoeing cultivation and seeding—as an example, the seeder has double the width of the hoeing cultivator, and the seeder must remain idle while waiting for the hoeing cultivator to finish two rows before it can commence its seeding operation. A flow-shop working mode can coordinate multiple machines in multiple operations within a field when different operations have different implement widths. To this end, an auto-steering-based collaborative operating system for fleet management (FMCOS) was developed to realize an in-field flow-shop working mode, which is often adopted by the scaled agricultural machinery cooperatives. This paper proposes the structure and composition of the FMCOS, the method of operating strip segmenting, and a new algorithm for strip state updating between successive field operations under an optimal strategy for waiting time conditioning between sequential operations. A simulation model was developed to verify the state-updating algorithm. Then, the prototype system of FMCOS was combined with auto-steering systems on tractors, and the collaborative operating system for the server was integrated. Three field experiments of one operation, two operations, and three operations were carried out to verify the functionality and performance of FMCOS. The results of the experiment showed that the FMCOS could coordinate in-field fleet operations while improving both the job quality and the efficiency of fleet management by adopting the flow-shop working mode.
APA, Harvard, Vancouver, ISO, and other styles
38

O’Shaughnessy, Stephen, and Anthony Keane. "Automating the Generation of User Activity Timelines on Microsoft Vista and Windows 7 Operating Systems." International Journal of Ambient Computing and Intelligence 4, no. 2 (April 2012): 35–47. http://dx.doi.org/10.4018/jaci.2012040103.

Full text
Abstract:
For many computer forensics investigations, the discovery of the complete activity history of users is an essential part of the process; however, due to the complexity and variety of current modern personal computer operating systems, the availability of useful tools is limited. This limitation is based on the tools ability to retrieve the relevant data and present it to the investigator in a user friendly format. The current software tools that claim to extract user activity information put the onus on the investigator to construct the timeline from the data which can introduce errors and is time consuming. This paper discusses the development and evaluation of a new tool, the User Activity Tracker (UAT), which automates the visual presentation of the timeline process by retrieving and consolidating user activity data into a single source and producing as accurately as possible, the timeline of user activity on that computer. The UAT tool was tested against a modern commercial forensic tool and the results of this preliminary testing showed that the UAT tool was faster and required less manual intervention to produce a greater level of detail of the user’s activity than the commercial tool.
APA, Harvard, Vancouver, ISO, and other styles
39

Adekotujo, Akinlolu, Adedoyin Odumabo, Ademola Adedokun, and Olukayode Aiyeniko. "A Comparative Study of Operating Systems: Case of Windows, UNIX, Linux, Mac, Android and iOS." International Journal of Computer Applications 176, no. 39 (July 15, 2020): 16–23. http://dx.doi.org/10.5120/ijca2020920494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Hong, Seung-Hyun, and Leonardo Rezende. "Lock-in and unobserved preferences in server operating systems: A case of Linux vs. Windows." Journal of Econometrics 167, no. 2 (April 2012): 494–503. http://dx.doi.org/10.1016/j.jeconom.2011.09.031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Pan, Jiaye, and Yi Zhuang. "PMCAP: A Threat Model of Process Memory Data on the Windows Operating System." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/4621587.

Full text
Abstract:
Research on endpoint security involves both traditional PC platform and prevalent mobile platform, among which the analysis of software vulnerability and malware is one of the important contents. For researchers, it is necessary to carry out nonstop exploration of the insecure factors in order to better protect the endpoints. Driven by this motivation, we propose a new threat model named Process Memory Captor (PMCAP) on the Windows operating system which threatens the live process volatile memory data. Compared with other threats, PMCAP aims at dynamic data in the process memory and uses a noninvasive approach for data extraction. In this paper we describe and analyze the model and then give a detailed implementation taking four popular web browsers IE, Edge, Chrome, and Firefox as examples. Finally, the model is verified through real experiments and case studies. Compared with existing technologies, PMCAP can extract valuable data at a lower cost; some techniques in the model are also suitable for memory forensics and malware analysis.
APA, Harvard, Vancouver, ISO, and other styles
42

Pauric, Allen D., Ion C. Halalay, and Gillian R. Goward. "Combined NMR and molecular dynamics modeling study of transport properties in sulfonamide based deep eutectic lithium electrolytes: LiTFSI based binary systems." Physical Chemistry Chemical Physics 18, no. 9 (2016): 6657–67. http://dx.doi.org/10.1039/c5cp05811b.

Full text
Abstract:
The trend toward Li-ion batteries operating at increased (>4.3 V vs. Li/Li+) voltages requires the development of novel classes of lithium electrolytes with electrochemical stability windows exceeding those of LiPF6/carbonate electrolyte solutions.
APA, Harvard, Vancouver, ISO, and other styles
43

Massoz, Quentin, Jacques Verly, and Marc Van Droogenbroeck. "Multi-Timescale Drowsiness Characterization Based on a Video of a Driver’s Face." Sensors 18, no. 9 (August 25, 2018): 2801. http://dx.doi.org/10.3390/s18092801.

Full text
Abstract:
Drowsiness is a major cause of fatal accidents, in particular in transportation. It is therefore crucial to develop automatic, real-time drowsiness characterization systems designed to issue accurate and timely warnings of drowsiness to the driver. In practice, the least intrusive, physiology-based approach is to remotely monitor, via cameras, facial expressions indicative of drowsiness such as slow and long eye closures. Since the system’s decisions are based upon facial expressions in a given time window, there exists a trade-off between accuracy (best achieved with long windows, i.e., at long timescales) and responsiveness (best achieved with short windows, i.e., at short timescales). To deal with this trade-off, we develop a multi-timescale drowsiness characterization system composed of four binary drowsiness classifiers operating at four distinct timescales (5 s, 15 s, 30 s, and 60 s) and trained jointly. We introduce a multi-timescale ground truth of drowsiness, based on the reaction times (RTs) performed during standard Psychomotor Vigilance Tasks (PVTs), that strategically enables our system to characterize drowsiness with diverse trade-offs between accuracy and responsiveness. We evaluated our system on 29 subjects via leave-one-subject-out cross-validation and obtained strong results, i.e., global accuracies of 70%, 85%, 89%, and 94% for the four classifiers operating at increasing timescales, respectively.
APA, Harvard, Vancouver, ISO, and other styles
44

Venčkauskas, Algimantas, Vacius Jusas, Kęstutis Paulikas, and Jevgenijus Toldinas. "Investigation of Artifacts Left by BitTorrent Client on the Local Computer Operating under Windows 8.1." Information Technology And Control 44, no. 4 (December 18, 2015): 451–61. http://dx.doi.org/10.5755/j01.itc.44.4.13082.

Full text
Abstract:
BitTorrent client application is a popular tool to download large files from Internet, but this application is quite frequently used for illegal purposes that are one of the types of cybercrimes. If order to fight against this type of cybercrime we carried out the research, during which we investigated the evidences left by BitTorrent client application in registry under Windows 8.1 operating system. The experiment was carried out in three steps: installation, download, and uninstallation. The snapshots of registry were taken and compared prior and after each step. Changes in Windows registry were collected and joined into tables. The experiment revealed that BitTorrent client application creates Windows registry artefacts that can contain information which might be used as evidence during an investigation. The evidence remains in the registry even after the removal of the application, although it can really prove the fact of usage of the application only. The investigation of file system can reveal the purpose and the contents of the BitTorrent client session.DOI: http://dx.doi.org/10.5755/j01.itc.44.4.13082
APA, Harvard, Vancouver, ISO, and other styles
45

Spirin, Oleg M., and Olena S. Holovnia. "ЗАСТОСУВАННЯ ТЕХНОЛОГІЙ ВІРТУАЛІЗАЦІЇ UNIX-ПОДІБНИХ ОПЕРАЦІЙНИХ СИСТЕМ У ПІДГОТОВЦІ БАКАЛАВРІВ ІНФОРМАТИКИ." Information Technologies and Learning Tools 65, no. 3 (July 1, 2018): 201. http://dx.doi.org/10.33407/itlt.v65i3.2055.

Full text
Abstract:
Despite the widespread use of virtualization technologies in education the problem of individual selection of virtualization tools for teaching certain courses, including teaching operating systems to Bachelors of Computer Science, remains scarcely studied. Research of operating systems teaching process to Bachelors of Computer Science found a range of issues in using virtualization technologies. These are as listed: hardware and software failures; low performance of virtualized operating systems; lack of adapted instructions; dependence on specific computer laboratories; unequal conditions of independent work with virtualized operating systems. Comparison of Bachelors of Computer Science scores in Operating Systems course which included studying Linux and Windows operating systems and also Fundamentals of Operating Systems Theory, resulted in general lower level of learning outcomes in Linux compared to the ones of the entire academic subject. A survey of Ukrainian teachers of Operating Systems course shows a number of differences in teaching process. It includes differences in teachers’ experience of using virtualization technologies, variety of virtualization technologies applied during the course, factors estimation for selecting virtualization tools. The article proposes the methodology of using unix-like operating systems virtualization technologies in professional training of Bachelors of Computer Science based on the variable approach to using mentioned technologies. The approach involves combining several virtualization tools in the frames of one course of Operating Systems to meet specific features of teaching the course as well as individual students’ needs and ensures hardware and software fault tolerance. Didactic model underlying the proposed methodology is described in the article. Experimental results on methodology effectiveness are provided.
APA, Harvard, Vancouver, ISO, and other styles
46

Morais, Daniel K., Luiz F. W. Roesch, Marc Redmile-Gordon, Fausto G. Santos, Petr Baldrian, Fernando D. Andreote, and Victor S. Pylro. "BTW—Bioinformatics Through Windows: an easy-to-install package to analyze marker gene data." PeerJ 6 (July 30, 2018): e5299. http://dx.doi.org/10.7717/peerj.5299.

Full text
Abstract:
Recent advances in Next-Generation Sequencing (NGS) make comparative analyses of the composition and diversity of whole microbial communities possible at a far greater depth than ever before. This brings new challenges, such as an increased dependence on computation to process these huge datasets. The demand on system resources usually requires migrating from Windows to Linux-based operating systems and prior familiarity with command-line interfaces. To overcome this barrier, we developed a fully automated and easy-to-install package as well as a complete, easy-to-follow pipeline for microbial metataxonomic analysis operating in the Windows Subsystem for Linux (WSL)—Bioinformatics Through Windows (BTW). BTW combines several open-access tools for processing marker gene data, including 16S rRNA, bringing the user from raw sequencing reads to diversity-related conclusions. It includes data quality filtering, clustering, taxonomic assignment and further statistical analyses, directly in WSL, avoiding the prior need of migrating from Windows to Linux. BTW is expected to boost the use of NGS amplicon data by facilitating rapid access to a set of bioinformatics tools for Windows users. Moreover, several Linux command line tools became more reachable, which will enhance bioinformatics accessibility to a wider range of researchers and practitioners in the life sciences and medicine. BTW is available in GitHub (https://github.com/vpylro/BTW). The package is freely available for noncommercial users.
APA, Harvard, Vancouver, ISO, and other styles
47

McCoy, Ryan J., and Fergal J. O'Brien. "Visualizing feasible operating ranges within tissue engineering systems using a “windows of operation” approach: A perfusion-scaffold bioreactor case study." Biotechnology and Bioengineering 109, no. 12 (June 11, 2012): 3161–71. http://dx.doi.org/10.1002/bit.24566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Caldas, L. G., and L. K. Norford. "Genetic Algorithms for Optimization of Building Envelopes and the Design and Control of HVAC Systems." Journal of Solar Energy Engineering 125, no. 3 (August 1, 2003): 343–51. http://dx.doi.org/10.1115/1.1591803.

Full text
Abstract:
Many design problems related to buildings involve minimizing capital and operating costs while providing acceptable service. Genetic algorithms (GAs) are an optimization method that has been applied to these problems. GAs are easily configured, an advantage that often compensates for a sacrifice in performance relative to optimization methods selected specifically for a given problem, and have been shown to give solutions where other methods cannot. This paper reviews the basics of GAs, emphasizing multi-objective optimization problems. It then presents several applications, including determining the size and placement of windows and the composition of building walls, the generation of building form, and the design and operation of HVAC systems. Future work is identified, notably interfaces between a GA and both simulation and CAD programs.
APA, Harvard, Vancouver, ISO, and other styles
49

Hasan, M. M., S. Sultana, and C. K. Foo. "Mixed-mode Operating System for Real-time Performance." ASEAN Journal on Science and Technology for Development 26, no. 1 (November 26, 2017): 43–56. http://dx.doi.org/10.29037/ajstd.303.

Full text
Abstract:
The purpose of the mixed-mode system research is to handle devices with the accuracy of real-time systems and at the same time, having all the benefits and facilities of a matured Graphic User Interface (GUI) operating system which is typically nonreal-time. This mixed-mode operating system comprising of a real-time portion and a non-real-time portion was studied and implemented to identify the feasibilities and performances in practical applications (in the context of scheduled the real-time events). In this research an i8751 microcontroller-based hardware was used to measure the performance of the system in real-time-only as well as non-real-time-only configurations. The real-time portion is an 486DX-40 IBM PC system running under DOS-based realtime kernel and the non-real-time portion is a Pentium III based system running under Windows NT. It was found that mixed-mode systems performed as good as a typical realtime system and in fact, gave many additional benefits such as simplified/modular programming and load tolerance.
APA, Harvard, Vancouver, ISO, and other styles
50

Akselrud, Lev, and Yuri Grin. "WinCSD: software package for crystallographic calculations (Version 4)." Journal of Applied Crystallography 47, no. 2 (March 11, 2014): 803–5. http://dx.doi.org/10.1107/s1600576714001058.

Full text
Abstract:
The fourth version of the program packageWinCSDis multi-purpose computer software for crystallographic calculations using single-crystal and powder X-ray and neutron diffraction data. The software environment and the graphical user interface are built using the platform of the Microsoft .NET Framework, which grants independence from changing Windows operating systems and allows for transferring to other operating systems. Graphic applications use the three-dimensional OpenGL graphics language.WinCSDcovers the complete spectrum of crystallographic calculations, including powder diffraction pattern deconvolution, crystal structure solution and refinement in 3 + dspace, refinement of the multipole model and electron density studies from diffraction data, and graphical representation of crystallographic information.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography