Computing :: Operatingsystems :: DOS Beyond 640K 2Nd

Total Page:16

File Type:pdf, Size:1020Kb

Computing :: Operatingsystems :: DOS Beyond 640K 2Nd DOS® Beyond 640K 2nd Edition DOS® Beyond 640K 2nd Edition James S. Forney Windcrest®/McGraw-Hill SECOND EDITION FIRST PRINTING © 1992 by James S. Forney. First Edition © 1989 by James S. Forney. Published by Windcrest Books, an imprint of TAB Books. TAB Books is a division of McGraw-Hill, Inc. The name "Windcrest" is a registered trademark of TAB Books. Printed in the United States of America. All rights reserved. The publisher takes no responsibility for the use of any of the materials or methods described in this book, nor for the products thereof. Library of Congress Cataloging-in-Publication Data Forney, James. DOS beyond 640K / by James S. Forney. - 2nd ed. p. cm. Rev. ed. of: MS-DOS beyond 640K. Includes index. ISBN 0-8306-9717-9 ISBN 0-8306-3744-3 (pbk.) 1. Operating systems (Computers) 2. MS-DOS (Computer file) 3. PC -DOS (Computer file) 4. Random access memory. I. Forney, James. MS-DOS beyond 640K. II. Title. QA76.76.063F644 1991 0058.4'3--dc20 91-24629 CIP TAB Books offers software for sale. For information and a catalog, please contact TAB Software Department, Blue Ridge Summit, PA 17294-0850. Acquisitions Editor: Stephen Moore Production: Katherine G. Brown Book Design: Jaclyn J. Boone Cover: Sandra Blair Design, Harrisburg, PA WTl To Sheila Contents Preface Xlll Acknowledgments xv Introduction xvii Chapter 1. The unexpanded system 1 Physical limits of the system 2 The physical machine 5 Life beyond 640K 7 The operating system 10 Evolution: a two-way street 12 What else is in there? 13 Out of hiding 13 Chapter 2. At the heart of things 15 The ubiquitous 8088 16 The 80286 20 The supercharged 80386 23 Above and beyond: the i486 29 An SX version of the i486 30 Boosting performance even more ... sometimes 30 A ticking clock 31 There's more 33 Chapter 3. The new breed 35 A brave new world 35 Games anyone can play 36 The revolution almost no one noticed 40 Meanwhile back at the ranch 41 To the beat of a different drummer 42 And in the center ring . .. 45 Chapter 4. Expanded memory 47 In the beginning 48 A little dinner music, please 48 Using expanded memory 52 Expanded memory that is-but isn't-what it seems 53 Only a stopgap 54 Chapter 5. EMS memory 55 The 4.0 backfill: mapping conventional memory 58 But not for everyone 59 The sheep from the goats 60 Registers: real and fake-and often.missing 60 Bus speed 65 The bottom line 66 Chapter 6. Stealing the store 67 A party of volunteers 70 DOS 5's mMEM.SYS and company 71 Bigger than life 75 Fragmentation 76 Declaring open season on the BIOS 78 For want of a map 79 It went where? 81 Stealing still another 64K-maybe even 96K 81 Don't count the 80286 out yet 83 Chapter 7. Extended memory and new frontiers 85 A quick review 86 Protected mode 87 Bottoms up 89 Enter the DOS extender 90 Lotus put it all together-just like 1-2-3 92 Canned answers for uncanny problems 95 What's a VCPI? 98 DPMI: a light in the window 99 In these muddy waters 100 Chapter 8. DOS's mysterious "extra" 64K 103 With a little sleight of hand 104 Fool's gold 107 Gift or Trojan horse? 108 Digging for gold the old-fashioned way 109 Chapter 9. Chairmen of the board 113 The changing face of management 113 Duos, quartets, and one-man bands 114 New directions 115 Getting down to brass tacks 117 Super specialists 118 Gentlemen, start your engines 119 Me too 121 Exceptions to the rule 122 Shots in the dark 123 Getting downright pushy 123 Chapter 10. Two times 5.0 127 Left foot, right foot 128 The Microsoft connection 128 A cut above 130 Just having EMS is not enough 130 From digital research: DR DOS 5.0 134 More than just a matter of semantics 135 Configuring your system on the fly 137 Choices, choices 138 Don't send a boy to do a man's work 139 Chapter 11. Entry-level answers 141 More room with HeadRoom 142 Context switching: Carousel's revolving door approach 145 Task swapping under the DOSs 146 Task switching lurking in the background 148 FAX boards 148 Spoolers and buffered output 149 Peripheral sharing 151 It all helps-but is it enough? 151 Chapter 12. DESQview and the age of multitasking 153 The heretics 154 A textbook 4.0 EMS case study 156 Stick to the straight and narrow 158 To build a better mousetrap 160 Negative overhead 161 Worlds in collision 163 Windows' windows 164 The tortoise and the hare 164 For power users and beyond 165 DESQview X 166 Chapter 13. Windows 169 About a ton of memory 170 A three-windows world 171 What Windows 3.0 provides, and what it doesn't 172 QEMM 173 386MAX 174 ALL CHARGE 386 176 hDC FirstApps 176 Chapter 14. Beyond the real 179 If it will run on any 8086 machine . .. 180 No virtual clock 181 VM386: multitasking and more 181 A megabyte for everyone 183 A clean environment 185 Split personality 187 Virtual machines do not have virtual crashes 188 More than just one pretty face: the multiuser option 189 Chapter 15. The MOOS multiuser option 191 The virtual machine again 192 Multiuser VM386 193 DR Multiuser DOS 195 The double whammy 196 Idle power 199 PC-MOS 200 Only the tip of the iceberg 204 What you don't see 205 Chapter 16. Keeping up, or trying to 207 Supercharging that old 8088 208 The 286 dilemma 210 The ALL 386SX: a new approach 210 The empire strikes back: Intel's SnapIn 386 211 Charge it with the ALL ChargeCard 212 Adopting a new mother 214 The interleave factor 217 Superfast "disks" and disk caching 219 Chapter 17. The ultimate upgrade 221 Striking a happy medium 222 Cash and carry 224 Down memory lane 225 Ladies-in-waiting 226 Don't miss the bus 226 What's wrong with the old bus? 228 Beyond "advanced technology" 228 Putting the pieces together 231 Recycled oldies 233 No no no! 233 Chapter 18. Crash course 237 The high road 239 Looking in high places-even on an 8088 240 On a higher plane 242 Where did that come from? 243 Any old port in a storm 246 Software crashes can be just as hard 246 Detectives on a disk 249 Chapter 19. Parting shots 253 Ship of fools 254 To stretch a point 254 The more things change 255 The ultimate shell game 256 APPENDICES A. Advanced programming functions available under LIM 4.0 EMS 257 B. Special considerations for mapping LIM 4.0 EMS memory 261 C. Using bootable floppies to test new confIgUrations 265 D. The basics of hexadecimal 269 E. Addresses for the software developers 271 Glossary 273 Index 277 Preface So much has happened since the first edition of this book was published that many of the questions asked then have long since been answered. Someone recently observed that, in the period since the introduction of the mM PC, our use of memory has increased tenfold every five years. We went so quickly from just 64K in those first machines to 640K as the standard in later models. We had reached that tenfold figure less than five years after the introduction of the first PC; however, the 64K figures predates that machine. The five year estimate is pretty close. Another five or so years later, we now have seen another tenfold increase in our needs. To use Windows 3.0 you really need at least 2 Mb; to multitask you'd better add another 2 Mb or 4 Mb more. To do real multitasking effectively in DESQview, VM386, or anyone of several multitaskers, you proba­ bly need at least that much memory. Not only has our appetite for memory become almost insatiable, but-with this appetite, a new genre of hardware, and new, more powerful applications soft­ ware-we must change the way we think about memory and how we access it. Even DOS itself has changed with the introduction of two powerful 5.0 releases from the two key players in the game (old rivals Microsoft and Digital Research), plus a third if you include the new DR Multiuser DOS 5.0, also from Digital. Each DOS addresses the challenge of our exploding needs in its own unique way. Although there is nothing truly novel in the changes any of these three-or any of the severallook-alikes-have made, they do focus attention on the issues in a somewhat different light. In the reflection of that light and the many changes in the issues since this book first was published, we look now not just beyond 640K but to the issues and the answers as we look ahead to DOS's second decade. xiii Acknowledgments Very special thanks once again to Gary Saxer of Quarterdeck Office Systems (Desqview). Without his patience and insights, this project might have fallen short of expectations. Special thanks also to the following (not in order of their contributions): Paul Tarlow at Qualitas, Inc.; John Barrett at All Computers Inc.; Cristy Gersich and Eric Straub at Microsoft; Dirk Smith at Phar Lap; Roger Kasten at Newer Tech­ nology; and Evan Lim at Intelligent Graphics Corporation. Thanks to the following companies that, in addition to those above, still represent only a part ofthe many companies and individuals that generously furnished hard­ ware, software and/or expertise specifically for use in preparing this book and in shaping its direction: ALR ALL Computers Inc.
Recommended publications
  • Software Requirements Specification
    Software Requirements Specification for Connectome Version 3.0 Prepared by: 1. Jon Schuck 2. Kennan Meyer 3. Nate Bender 4. Sheik Hassan 5. Khaled Alhendi 6. Bairavi Venkatesh 7. Kevin Garrone Senior Design Project Advisor: Mr. Jeff Salvage Fall 2016 to Spring 2017 1 Table of Contents Revision History.............................................................................................................................. 4 1. Introduction ............................................................................................................................. 5 1.1. Purpose ............................................................................................................................. 5 1.2. Overview .......................................................................................................................... 5 1.3. Product Scope ................................................................................................................... 6 1.3.1. In Scope .................................................................................................................... 6 1.3.2. Out of Scope ............................................................................................................. 7 1.4. Definitions ........................................................................................................................ 7 2. Overall Description ................................................................................................................. 9 2.1. Hardware Functions
    [Show full text]
  • Guidelines for Tools Development and Operating Environments
    Managing social, behavioral and economic data and metadata Guidelines for Tools Development and Operating Environments Author/Maintainer Pascal Heus, Open Data Foundation Contributors Jack Gager(Metadata Technology), Jannick Jensen (Danish Data Archive), Herve Lhours (UKDA) Version 2010-08-03 Table of Contents Overview....................................................................................................................................................2 Product Development.................................................................................................................................3 Environment.......................................................................................................................................... 3 Collaborative environment.................................................................................................................... 4 Licensing............................................................................................................................................... 5 Products Guide...........................................................................................................................................8 Overview............................................................................................................................................... 8 Web server software.............................................................................................................................. 8 Rich client Platforms...........................................................................................................................10
    [Show full text]
  • Kontron / ICS Advent SB586P(V) Manual (Pdf)
    Full-service, independent repair center -~ ARTISAN® with experienced engineers and technicians on staff. TECHNOLOGY GROUP ~I We buy your excess, underutilized, and idle equipment along with credit for buybacks and trade-ins. Custom engineering Your definitive source so your equipment works exactly as you specify. for quality pre-owned • Critical and expedited services • Leasing / Rentals/ Demos equipment. • In stock/ Ready-to-ship • !TAR-certified secure asset solutions Expert team I Trust guarantee I 100% satisfaction Artisan Technology Group (217) 352-9330 | [email protected] | artisantg.com All trademarks, brand names, and brands appearing herein are the property o f their respective owners. Find the Kontron / ICS Advent SB586PV at our website: Click HERE Model SB586P(V) Product Manual MANUAL NUMBER : 00431-027-3C Page - ii FOREWORD This product manual provides information to install, operate and or program the referenced product(s) manufactured or distributed by ICS Advent. The following pages contain information regarding the war- ranty and repair policies. Technical assistance is available at: 800-480-0044. Manual Errors, Omissions and Bugs: A "Bug Sheet" is included as the last page of this manual. Please use the "Bug Sheet" if you experience any problems with the manual that requires correction. The information in this document is provided for reference only. ICS Advent does not assume any liability arising from the application or use of the information or products described herein. This document may contain or reference information and products protected by copyrights or patents and does not convey any license under the patent rights of ICS Advent, nor the rights of others.
    [Show full text]
  • SOS Internals
    Understanding a Simple Operating System SOS is a Simple Operating System designed for the 32-bit x86 architecture. Its purpose is to understand basic concepts of operating system design. These notes are meant to help you recall the class discussions. Chapter 1 : Starting Up SOS 3 Registers in the IA-32 x86 Architecture BIOS (Basic Input/Ouput System) Routines Real Mode Addressing Organization of SOS on Disk and Memory Master Boot Record SOS Startup A20 Line 32-bit Protected Mode Addressing Privilege Level Global Descriptor Table (GDT) More on Privilege Levels The GDT Setup Enabling Protected Mode Calling main() Chapter 2 : SOS Initializations 10 In main() Disk Initialization Display Initialization Setting Up Interrupt Handlers Interrupt Descriptor Table (IDT) A Default Interrupt Handler Load IDT The Programmable Interrupt Controller (PIC) The Keyboard Interrupt Handler Starting the Console Putting It All Together Chapter 3: SOS1 – Single-tasking SOS 16 Running User Programs GDT Entries Default Exception Handler User Programs Executable Format System Calls Creating User Programs The run Command Understanding a Simple Operating System The DUMB Memory Manager Program Address Space Process Control Block Switching to a User Program Kernel-Mode Stack Chapter 4 : SOS2 – Multi-tasking SOS 24 Running Multiple User Programs NAÏVE Memory Manager Programmable Interval Timer (PIT) Process States Timer Interrupt Handler Sleep System Call The run Command Process Queue The Scheduler The Complete Picture ps Command Chapter 5 : SOS3 – Paging in SOS 31
    [Show full text]
  • Computer Problem Solving 1) What Is the First 640K of Memory Addresses Called?
    Computer Problem Solving 1) What is the first 640k of memory addresses called? a. extended memory b. upper memory c. high memory d. conventional memory Competency: Personal computer components 2) What was the first socket to support dual voltage inputs? a. Socket 7 b. Socket 5 c. Socket 8 d. Socket 423 Competency: Personal computer components 3) Which card is used to add modems and network cards to the portable computer? a. Type 1 b. Type 2 c. Type 3 d. Type 4 Competency: Laptop and portable devices 4) Which type of battery is used most often in notebook computers? a. NiMH b. NiCad c. Li-ION d. Zinc Air Competency: Laptop and portable devices 5) Which of the following does the erase lamp remove? a. static charge from the developed image area on the paper b. static charge from the margin areas of the paper c. leftover toner particles from the paper d. any static charge that may remain on the drum Competency: Printers and scanners 6) Which standard that was first available in Windows 95 and that incorporated as a BIOS configuration option to conserve electrical power? a. ACPI b. APM c. PCMIA d. Energy Star Competency: Operating systems 7) Which of the following files is the virtual memory swap file needed to boot Windows 2000/XP? a. Pagefile.sys b. Hal.dll c. Kernel32.dll d. Himem.sys Competency: Operating systems 8) Which of the following protocols guarantees packet delivery? a. HTTP b. IP c. TCP d. UDP Competency: Networks 9) What is the standard recommendation for changing your password? a.
    [Show full text]
  • OS 386 Multiuser/Multitasking Operating System
    OS 386 Multiuser/Multitasking Operating System REFERENCE GUIDE [Q] DIGITAL RESEARCH@ os REFERENCE GUIDE [jill DIGITAL RESEARCH~ COPYRIGHT Copyright © 1987 Digital Research Inc. All rights reserved. No part of this publication may be reproduced, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise without the prior written permission of Digital Research Inc, 60 Garden Court, Box DRI, Monterey, California 93942 DISCLAIMER DIGITAL RESEARCH MAKES NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE CONTENTS HEREOF AND SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE. Further Digital Research Inc. reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of Digital Research Inc to notify any person of such revision or changes. NOTICE TO USER This manual should not be construed as any representation or warranty with respect to the software named herein. Occasionally changes or variations exist in the software that are not reflected in the manual. Generally, if such changes or variations are known to exist and to affect the product significantly, a release note or READ.ME file accompanies the manual and the distribution disks. In that event, be sure to read the release note or READ.ME file before using the product. ii TRADEMARKS Digital Research and its logo, CP/M, and CP/M-86 are registered trademarks of Digital Research Inc. Cardfile, Concurrent, Concurrent DOS 386, Concurrent DOS XM, DR EDIX, DOS Plus and MP/M-86 are trademarks of Digital Research Inc.
    [Show full text]
  • The Bootstrap the Where Are Wenow?
    Dedicated Operating System March2011 Prof. Dr.Antônio AugustoFröhlich http://www.lisha.ufsc.br/Guto Getting ready for the OS for the ready Getting [email protected] LISHA/UFSC The Boot: The March 2011 (http://www.lisha.ufsc.br) 1 Dedicated Operating System March2011 ● ● ● BIOSgot the system ready for BIOSbrought the system on ● Lots of “jmp” so far, no calls, why? ● First instruction fetched ● initializedBIOS a complex architecture Where the stack?Where is 0x7c00 BIST, POST, hooks The Bootstrap Where are we now? we are Where (http://www.lisha.ufsc.br) =>Today class 2 EPOS Bootstrap: m src/boot/pc_boot.S e t ; CONSTANTS s ;============================================================ y ; PHYSICAL MEMORY MAP S ; 0x0000 0000 -+-----------------------+ BOOT_IDT ; | IDT (4 K) | g ; 0x0000 1000 -+-----------------------+ BOOT_GDT ; | GDT (4 K) | n i ; 0x0000 2000 -+-----------------------+ t ; : : a ; | BOOT STACK (23 K) | r ; 0x0000 7c00 -+-----------------------+ BOOTSTRAP_STACK e ; | BOOT CODE (512 b) | BOOTSTRAP_CODE p ; 0x0000 7e00 -+-----------------------+ ; | RESERVED (512 b) | O ; 0x0000 8000 -+-----------------------+ DISK_IMAGE ; | DISK IMAGE (608 K) | d ; : : e ; | | t ; 0x000a 0000 -+-----------------------+ a ; | UNUSED (384K) | c ; : : i ; | | d ; 0x000f f000 -+-----------------------+ e D March 2011 (http://www.lisha.ufsc.br) 3 EPOS Bootstrap: Notes m e t s Code to be ran at real mode (16 bits) y S Interrupts (IDT) ● g At real mode, always at 0x0000 n ● i At protected mode, anywhere (IDTR) t a Segmentation (GDT) r ● e Always
    [Show full text]
  • Thank You for Purchasing the Elder Scrolls: Arena. Dedicated Rpgers
    The Elder Scrolls ARENA hank you for purchasing The Elder Scrolls: Arena. Dedicated RPGers have invested an incredible amount of effort into creating this detailed simulation. If you enjoy the game, please pass the word! There is no better advertising than a satisfied customer. TYou can also purchase the second chapter of The Elder Scrolls, entitled Daggerfall, in Fall 1996. TES: Daggerfall will feature the same open-endedness and breadth as Arena, but will feature increased NPC (Non-Player-Character) interaction, a faster, more sophisticated 3-D engine, and a more extensive storyline. With all the planned enhancements, Daggerfall will give you even more of an opportunity to role-play your character as you choose. We are very excited about Daggerfall and what it will mean to the role-playing community. On our part, we promise to keep bringing you the best in computer simulation software and welcome any suggestions you may have for how we can serve you better. Journey well, and peace be with you. —The Bethesda Team Installing the Game Place the CD into your computer’s CD-ROM drive. Type the drive letter followed by a colon (Ex: D: for most CD-ROM drives) and hit <ENTER>. Next type INSTALL and hit <ENTER>. If you are installing Arena from floppy disks, select ‘Install Game’ and follow the prompts. Because you are installing from the CDROM, 5 megabytes of data will be copied to your hard drive when you select ‘Exit’. The next step is to configure your game (see below). Configuring Arena to your System To configure any Sound FX and Music drivers once Arena has successfully installed (if you wish to play the game with sound and/or music), choose the ‘Configure Game’ option.
    [Show full text]
  • XICE Lnstallationguide for Motorola 68000, 68HCOOO, 68ECOOO and 68302 Development Systems for DOS and UNIX Hosts
    1mmm Applied Microsystems Corporation XICE lnstallationGuide for Motorola 68000, 68HCOOO, 68ECOOO and 68302 Development Systems for DOS and UNIX Hosts May 1993 PIN 922-17140-03 Copyright© 1993 Applied Microsystems Corporation All rights reserved. \' '\'9~t\B<\', nnt:iubmv ~'9\nt . ,:~ s no gnilis' IBM XT and IBM AT are trademarks of IBM Corporation Microsoft and MS-DOS™ are trademarks of Microsoft Corporation. Microtec is a registered trademarks of Microtec Research, Inc. SP ARC, SPARCstation, Sun, Sun-3, Sun-4, NFS, and PC-NFS are trademarks o Microsystems, Inc. UNIX is a registered trademark of AT&T. VALIDATE is a registered tradmark of Applied Microsystems Corporation I Contents Chapter 1 Introduction Organization of the documentation................................... 1-2 Overview of the toolchain................................................... 1-4 XICE ............................................................................. 1-4 XRAY............................................................................ 1-4 C Cross Compiler......................................................... 1-4 C++ Compiler............................................................... 1-4 Chapter2 Installing on a Sun Workstation Step 1: Check minimum requirements ................ ............. 2-2 Requirements for Sun 4 (SPARC) workstations........ 2-2 Step 2: Set up the directory structure............................... 2-3 · Step 3: Copy the software from the tape........................... 2-4 Step 4: Define individual user's setup..............................
    [Show full text]
  • Beyond MOV ADD XOR – the Unusual and Unexpected
    Beyond MOV ADD XOR the unusual and unexpected in x86 Mateusz "j00ru" Jurczyk, Gynvael Coldwind CONFidence 2013, Kraków Who • Mateusz Jurczyk o Information Security Engineer @ Google o http://j00ru.vexillium.org/ o @j00ru • Gynvael Coldwind o Information Security Engineer @ Google o http://gynvael.coldwind.pl/ o @gynvael Agenda • Getting you up to speed with new x86 research. • Highlighting interesting facts and tricks. • Both x86 and x86-64 discussed. Security relevance • Local vulnerabilities in CPU ↔ OS integration. • Subtle CPU-specific information disclosure. • Exploit mitigations on CPU level. • Loosely related considerations and quirks. x86 - introduction not required • Intel first ships 8086 in 1978 o 16-bit extension of the 8-bit 8085. • Only 80386 and later are used today. o first shipped in 1985 o fully 32-bit architecture o designed with security in mind . code and i/o privilege levels . memory protection . segmentation x86 - produced by... Intel, AMD, VIA - yeah, we all know these. • Chips and Technologies - left market after failed 386 compatible chip failed to boot the Windows operating system. • NEC - sold early Intel architecture compatibles such as NEC V20 and NEC V30; product line transitioned to NEC internal architecture http://www.cpu-collection.de/ x86 - other manufacturers Eastern Bloc KM1810BM86 (USSR) http://www.cpu-collection.de/ x86 - other manufacturers Transmeta, Rise Technology, IDT, National Semiconductor, Cyrix, NexGen, Chips and Technologies, IBM, UMC, DM&P Electronics, ZF Micro, Zet IA-32, RDC Semiconductors, Nvidia, ALi, SiS, GlobalFoundries, TSMC, Fujitsu, SGS-Thomson, Texas Instruments, ... (via Wikipedia) At first, a simple architecture... At first, a simple architecture... x86 bursted with new functions • No eXecute bit (W^X, DEP) o completely redefined exploit development, together with ASLR • Supervisor Mode Execution Prevention • RDRAND instruction o cryptographically secure prng • Related: TPM, VT-d, IOMMU Overall..
    [Show full text]
  • Open WATCOM Programmer's Guide
    this document downloaded from... Use of this document the wings of subject to the terms and conditions as flight in an age stated on the website. of adventure for more downloads visit our other sites Positive Infinity and vulcanhammer.net chet-aero.com Watcom FORTRAN 77 Programmer's Guide Version 1.8 Notice of Copyright Copyright 2002-2008 the Open Watcom Contributors. Portions Copyright 1984-2002 Sybase, Inc. and its subsidiaries. All rights reserved. Any part of this publication may be reproduced, transmitted, or translated in any form or by any means, electronic, mechanical, manual, optical, or otherwise, without the prior written permission of anyone. For more information please visit http://www.openwatcom.org/ Portions of this manual are reprinted with permission from Tenberry Software, Inc. ii Preface The Watcom FORTRAN 77 Programmer's Guide includes the following major components: · DOS Programming Guide · The DOS/4GW DOS Extender · Windows 3.x Programming Guide · Windows NT Programming Guide · OS/2 Programming Guide · Novell NLM Programming Guide · Mixed Language Programming · Common Problems Acknowledgements This book was produced with the Watcom GML electronic publishing system, a software tool developed by WATCOM. In this system, writers use an ASCII text editor to create source files containing text annotated with tags. These tags label the structural elements of the document, such as chapters, sections, paragraphs, and lists. The Watcom GML software, which runs on a variety of operating systems, interprets the tags to format the text into a form such as you see here. Writers can produce output for a variety of printers, including laser printers, using separately specified layout directives for such things as font selection, column width and height, number of columns, etc.
    [Show full text]
  • Fuel Assembly Assessment from CVD Image Analysis: a Feasibility Study
    SKI Report 97:14 CSSP R SE97001 61 Fuel Assembly Assessment from CVD Image Analysis: A Feasibility Study Clark S. Lindsay and Thomas Lindblad May 1997 ISSN 1104-1374 ISBN SKI-R-97/14-SE STATENSSKI KARNKRAFTINSPEKTION Atomic1*1 Energy Commission de controls Svveais-" Nucecv Rowe1 insoeNcycte .iVT. e ^ #J3ontrol Board de lenergie atomique SKI Report 97:14 CSSP Report 110 Fuel Assembly Assessment from CVD Image Analysis: A Feasibility Study Clark S. Lindsay and Thomas Lindblad Department of Physics, Royal Institute of Technology, Stockholm, Sweden May 1997 SKI Project Number 96184 Prepared for the Swedish and Canadian Safeguards Support Programs to IAEA under IAEA Task JNT A00704. This report concerns a study which has been conducted for the Swedish Nuclear Power Inspectorate (SKI). The conclusions and viewpoints presented in the report are those of the authors and do not necessarily coincide with those of the SKI. NORSTEDTS TRYCKERI AB Stockholm 1997 Abstract SKI commissioned a feasibility study of automatic assessment of fuel assemblies from images obtained with the digital Cerenkov viewing device (CVD) currently in development. The goal is to assist the IAEA inspectors in evaluating the fuel since they typically have only a few seconds to inspect an assembly. We report results here in two main areas: (1) investigation of basic image processing and recognition techniques needed to enhance the images and find the assembly in the image; (2) study of the properties of the distributions of light from the assemblies to determine whether they provide unique signatures for different bum-up and cooling times for real fuel or indicate presence of non-fuel.
    [Show full text]