Tài liệu miễn phí Hệ điều hành
Download Tài liệu học tập miễn phí Hệ điều hành
Liver segmentation is relevant for several clinical applications. Automatic liver segmentation using convolutional neural networks (CNNs) has been recently investigated. In this paper, we propose a new approach of combining a largest connected component (LCC) algorithm, as a post-processing step, with CNN approaches to improve liver segmentation accuracy.
9/24/2020 6:14:28 PM +00:00
Chapter 32 - Cisco IT Essentials Useful Practical Tips (Operating systems). The following will be discussed in this chapter: Brands and versions of operating systems, operating systems capabilities, network operating system (NOS), Windows OS directory structure,...
8/29/2020 8:50:48 AM +00:00
In this chapter, we examine one of the most important and widely used categories of operating systems: embedded operating systems. The embedded system environment places unique and demanding requirements on the OS and calls for design strategies quite different than that found in ordinary operating systems.
8/29/2020 8:50:34 AM +00:00
This chapter examines some more advanced concepts related to process management, which are found in a number of contemporary operating systems. We show that the concept of process is more complex and subtle than presented so far and in fact embodies two separate and potentially independent concepts: one relating to resource ownership and another relating to execution.
8/29/2020 8:50:28 AM +00:00
Discuss basic concepts related to concurrency, such as race conditions, OS concerns, and mutual exclusion requirements; understand hardware approaches to supporting mutual exclusion; define and explain semaphores; define and explain monitors;...
8/29/2020 8:50:22 AM +00:00
This chapter examines two problems that plague all efforts to support concurrent processing: deadlock and starvation. We begin with a discussion of the underlying principles of deadlock and the related problem of starvation. Then we examine the three common approaches to dealing with deadlock: prevention, detection, and avoidance.
8/29/2020 8:50:16 AM +00:00
The contents of this chapter include all of the following: Discuss the principal requirements for memory management, understand the reason for memory partitioning and explain the various techniques that are used, understand and explain the concept of paging,...
8/29/2020 8:50:09 AM +00:00
This chapter examines two problems that plague all efforts to support concurrent processing: deadlock and starvation. We begin with a discussion of the underlying principles of deadlock and the related problem of starvation. Then we examine the three common approaches to dealing with deadlock: prevention, detection, and avoidance.
8/29/2020 8:50:03 AM +00:00
The contents of this chapter include all of the following: Discuss the principal requirements for memory management, understand the reason for memory partitioning and explain the various techniques that are used, understand and explain the concept of paging,...
8/29/2020 8:49:57 AM +00:00
After studying this chapter, you should be able to: Summarize key categories of I/O devices on computers, discuss the organization of the I/O function, explain some of the key issues in the design of OS support for I/O, analyze the performance implications of various I/O buffering alternatives,...
8/29/2020 8:49:51 AM +00:00
After studying this chapter, you should be able to: Describe the various approaches to virtualization, understand the processor issues involved in implementing a virtual machine, understand the memory management issues involved in implementing a virtual machine, understand the I/O management issues involved in implementing a virtual machine,...
8/29/2020 8:49:45 AM +00:00
After studying this chapter, you should be able to: Assess the key security issues that relate to operating systems, understand the design issues for file system security, distinguish among various types of intruder behavior patterns and understand the types of intrusion techniques used to breach computer security, compare and contrast two methods of access control.
8/29/2020 8:49:39 AM +00:00
The contents of this chapter include all of the following: File system management and optimization, disk quotas (a fair distribution of disk space), file system backups, back up incrementally, logical dump algorithm, file system consistency,...
8/29/2020 8:49:33 AM +00:00
The various processes in an operating system must be protected from one another’s activities. For that purpose, various mechanisms exist that can be used to ensure that the files, memory segments, CPU, and other resources can be operated on by only those processes that have gained proper authorization from the operating system. In this chapter, we examine the problem of protection in great detail and develop a unifying model for implementing protection.
8/29/2020 8:49:27 AM +00:00
Chapter 17 examines various mechanisms for process synchronization and communication, as well as methods for dealing with the deadlock problem, in a distributed environment. In addition, since a distributed system may suffer from a variety of failures that are not encountered in a centralized system, we also discuss here the issue of failure in a distributed system.
8/29/2020 8:49:21 AM +00:00
Chapter 16 looks at the current major research and development in distributed-file systems (DFS). The purpose of a DFS is to support the same kind of sharing when the files are physically dispersed among the various sites of a distributed system.
8/29/2020 8:49:14 AM +00:00
Lecture 15 - Memory management page replacement algorithms design issues. The contents of this chapter include all of the following: Background, topology, network types, communication, communication protocol, robustness, design strategies.
8/29/2020 8:49:08 AM +00:00
In this chapter, we begin a discussion of file systems at the lowest level: the structure of secondary storage. We first describe the physical structure of hard disks and magnetic tapes. We then describe disk-scheduling algorithms, which schedule the order of disk I/Os to maximize performance. Next, we discuss disk formatting and management of boot blocks, damaged blocks, and swap space. We conclude with an examination of the structure of RAID systems.
8/29/2020 8:49:02 AM +00:00
This chapter is primarily concerned with issues surrounding file storage and access on the most common secondary-storage medium, the disk. We explore ways to structure file use, to allocate disk space, to recover freed space, to track the locations of data, and to interface other parts of the operating system to secondary storage. Performance issues are considered throughout the chapter.
8/29/2020 8:48:56 AM +00:00
In this chapter, we consider the various aspects of files and the major directory structures. We also discuss the semantics of sharing files among multiple processes, users, and computers. Finally, we discuss ways to handle file protection, necessary when we have multiple users and we want to control who may access files and how files may be accessed.
8/29/2020 8:48:50 AM +00:00
All these strategies have the same goal: to keep many processes in memory simultaneously to allow multiprogramming. However, they tend to require that an entire process be in memory before it can execute. Virtual memory is a technique that allows the execution of processes that are not completely in memory. In this chapter, we discuss virtual memory in the form of demand paging and examine its complexity and cost.
8/29/2020 8:48:44 AM +00:00
In this chapter, we discuss various ways to manage memory. The memory- management algorithms vary from a primitive bare-machine approach to paging and segmentation strategies. Each approach has its own advantages and disadvantages. Selection of a memory-management method for a specific system depends on many factors, especially on the hardware design of the system. As we shall see, many algorithms require hardware support, leading many systems to have closely integrated hardware and operating-system memory management.
8/29/2020 8:48:38 AM +00:00
After studying this chapter you will be able to develop a description of deadlocks, which prevent sets of concurrent processes from completing their tasks; to present a number of different methods for preventing or avoiding deadlocks in a computer system.
8/29/2020 8:48:32 AM +00:00
In this chapter, we discuss various mechanisms to ensure the orderly execution of cooperating processes that share a logical address space, so that data consistency is maintained.
8/29/2020 8:48:26 AM +00:00
In previous chapter, we introduced threads to the process model. On operating systems that support them, it is kernel-level threads not processes that are in fact being scheduled by the operating system. However, the terms process scheduling and thread scheduling are often used interchangeably. In this chapter, we use process scheduling when discussing general scheduling concepts and thread scheduling to refer to thread-specific ideas.
8/29/2020 8:48:19 AM +00:00
In this chapter, we introduce many concepts associated with multithreaded computer systems, including a discussion of the APIs for the Pthreads, Windows, and Java thread libraries. We look at a number of issues related to multithreaded programming and its effect on the design of operating systems. Finally, we explore how the Windows and Linux operating systems support threads at the kernel level.
8/29/2020 8:48:13 AM +00:00
The objectives of this chapter are to introduce the notion of a process a program in execution, which forms the basis of all computation; to describe the various features of processes, including scheduling, creation, and termination; to explore interprocess communication using shared memory and mes- sage passing.
8/29/2020 8:48:07 AM +00:00
The objectives of this chapter are to describe the services an operating system provides to users, processes, and other systems; to discuss the various ways of structuring an operating system, to discuss the various ways of structuring an operating system.
8/29/2020 8:48:01 AM +00:00
The main contents of this chapter include all of the following: Computer system operation, I/O structure, storage structure, storage hierarchy, hardware protection, general system architecture.
8/29/2020 8:47:55 AM +00:00
In this chapter, you will learn to: To describe the basic organization of computer systems, to provide a grand tour of the major components of operating systems, to give an overview of the many types of computing environments, to explore several open-source operating systems.
8/29/2020 8:47:48 AM +00:00