scispace - formally typeset
Search or ask a question
Topic

Batch file

About: Batch file is a research topic. Over the lifetime, 262 publications have been published within this topic receiving 2638 citations. The topic is also known as: batch & BAT file.


Papers
More filters
Patent
01 Oct 1997
TL;DR: In this paper, a method of automatically configuring and formatting a computer system for installation of a prespecified application program in the computer system, which includes the performing the following acts: automatically creating a primary active DOS partition on a primary hard disk drive of the computer systems; automatically selecting a size value for a primary extended DOS partition; automatically creating the primary extendedDOS partition on the primary disk drive.
Abstract: A method of automatically configuring and formatting a computer system for installation of a prespecified application program in the computer system, which includes the performing the following acts: automatically creating a primary active DOS partition on a primary hard disk drive of the computer system; automatically selecting a size value for a primary extended DOS partition; automatically creating the primary extended DOS partition on the primary hard disk drive, wherein the size of the primary extended DOS partition equals the selected size value; automatically formatting each partition so as to create a root directory and a file allocation table for each partition; and automatically executing a DOS batch file in order to install said prespecified application program.

23 citations

Patent
02 Sep 1999
TL;DR: Disclosed as mentioned in this paper is a system, method, and program for creating a file, such as a batch file, that is capable of executing on one of many different operating systems.
Abstract: Disclosed is a system, method, and program for creating a file, such as a batch file, that is capable of executing on one of many different operating systems. An object is processed including a plurality of instructions. Each instruction is associated with at least one executable function. A determination is made of an operating system in which the generated file will be executed. For each instruction in the object, a native operating system command is generated that is capable of executing the function associated with the instruction on the determined operating system. Each generated native operating system command is inserted into the file. Execution of the file on the determined operating system will execute the native operating system commands in the file to perform the functions associated with the instructions included in the object.

22 citations

Proceedings ArticleDOI
01 Dec 2016
TL;DR: This paper presents an intuitive and inexpensive big data security analysis approach using Computational Intelligence (CI) techniques for Windows desktop users, where the combination of Windows batch programming, EmEditor and R are used for the security analysis.
Abstract: Big Data security analysis is commonly used for the analysis of large volume security data from an organisational perspective, requiring powerful IT infrastructure and expensive data analysis tools. Therefore, it can be considered to be inaccessible to the vast majority of desktop users and is difficult to apply to their rapidly growing data sets for security analysis. A number of commercial companies offer a desktop-oriented big data security analysis solution; however, most of them are prohibitive to ordinary desktop users with respect to cost and IT processing power. This paper presents an intuitive and inexpensive big data security analysis approach using Computational Intelligence (CI) techniques for Windows desktop users, where the combination of Windows batch programming, EmEditor and R are used for the security analysis. The simulation is performed on a real dataset with more than 10 million observations, which are collected from Windows Firewall logs to demonstrate how a desktop user can gain insight into their abundant and untouched data and extract useful information to prevent their system from current and future security threats. This CI-based big data security analysis approach can also be extended to other types of security logs such as event logs, application logs and web logs.

22 citations

Journal ArticleDOI
TL;DR: This program was to develop a portable microcomputer-based simulation system to assess the techno-economic viability of competing coal liquefaction technologies by a menu-driven batch file, which guides the user logically through the simulation of a process.
Abstract: The objective of this program was to develop a portable microcomputer-based simulation system to assess the techno-economic viability of competing coal liquefaction technologies. The Eclipse suite of programs which has been developed to achieve this objective is called by a menu-driven batch file, rich guides the user logically through the simulation of a process. All the information which is required to simulate a given process is prompted by, and entered onto, user-friendly screens. These screens restrict the input of information to sensible values only, and the program automatically checks that the information supplied is valid and complete. The storage of this information in flexible data structures, and the use of databases, ensure that manual data entry is minimized

19 citations

Patent
Edmund Magruder Cummins1
19 Mar 1986
TL;DR: In this paper, a method for improving the performance of application programs which run under a disk operating system (DOS) is described, which uses a batch file memory buffer of variable size, processing the most frequently used DOS/BATCH commands internally and passing low usage commands to DOS by using a secondary command processor.
Abstract: A method for improving the performance of application programs which run under a disk operating system (DOS) is disclosed. The problem addressed is that of poor application performance caused by repetitive disk accesses when using large batch files. This problem is alleviated by using a batch file memory buffer of variable size, processing the most frequently used DOS/BATCH commands internally, and passing low usage commands to DOS by using a secondary command processor.

19 citations

Network Information
Related Topics (5)
Software
130.5K papers, 2M citations
75% related
Software system
50.7K papers, 935K citations
72% related
Web service
57.6K papers, 989K citations
71% related
Server
79.5K papers, 1.4M citations
70% related
User interface
85.4K papers, 1.7M citations
70% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20212
20204
201916
201815
201713
201614