• Title/Summary/Keyword: 아키텍처 변환 패턴

Search Result 8, Processing Time 0.02 seconds

A Framework for Software System Evolution using Architectural Transformation Pattern (아키텍처 변환 패턴을 이용한 소프트웨어 시스템 진화 프레임워크)

  • Park, Taehyun;Ahn, Hwi;Kang, Sungwon;Park, Jongbin;Hwang, Sangcheol
    • Journal of Software Engineering Society
    • /
    • v.26 no.1
    • /
    • pp.17-29
    • /
    • 2013
  • Software System Evolution is more planned and systematic maintenance process as well as a type of maintenance. The research of software evolution provides basis of decisions for maintenance value through cost-benefit analysis of legacy system and architecture-based software evolution enables engineers to reduce maintenance cost by automation of repetitive evolution tasks. This paper proposes a framework for software system evolution using architectural transformation pattern.

  • PDF

An Approach to Composite Techniques and Application of EJB Component using Adapter Pattern (Adapter패턴을 이용한 EJB 컴포넌트 조립 기법 및 응용)

  • Jeong Hwa-Young
    • Journal of Internet Computing and Services
    • /
    • v.4 no.1
    • /
    • pp.67-74
    • /
    • 2003
  • According to change of software development technique as design pattern, component based development etc.., web server development part is applied activity to fit in various user requirement. Especially, EJB as sewer side component model much researches and introduce by easy and various development support. Also, component composing techniques is receiving many interests by easy and efficient application way that architecture based C2 style architecture with message handling. But, in case of EJB component that can not cail thread, C2 framework modification is unavoidable for component composition by C2 style architeccture. For this, we propose techniques to use Adapter pattern to be one of structure pattern among pattern. That is, did so that component composition by C2 style architecture may can consist changing to be able to call thread function in EJB by Adapter pattern.

  • PDF

Enterprise Architecture Modeling apply to real time web publishing based on XML with SVG (엔터프라이즈 아키텍처 모델의 웹 기반 시스템 적용을 위한 SVG Web Publishing)

  • Soo-Youn Bang;Jong-Woo Ha;Byung-Gul Ryu;Sang-Keun Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.455-458
    • /
    • 2008
  • 기업의 전사적 비즈니스와 IT 환경의 통합 청사진을 보여주는 엔터프라이즈 아키텍처의 효율적인 시스템 적용을 위하여는 조직의 비즈니스, 정보, 응용시스템, 기술 기반구조의 연관관계와 미래모델을 시각적으로 사용자에게 보여주어야 한다. 기존 ITAMS 혹은 EAMS 라고 불리는 시스템에 아키텍처 툴을 이용하여 EA 의 모델정보를 퍼블리싱하여 시각화하였는데 시스템과 아키텍처 툴간의 플랫폼의 이질성으로 인하여 아키텍처정보를 그래픽화하여 변환하고 해당정보를 시스템에서 보여주는데 실시간 적용이 불가능 했을 뿐 아니라 사용자의 편의성이 원활하지 않았다. 이에 본 연구는 XML 기반의 SVG 그래픽 도구를 이용하여 아키텍처 작업을 가능하게 하고 SVG 정보의 자동 생성 및 웹기반 모델링 툴을 구현하여 시스템과 모델링 툴의 단일 레파지토리화를 통하여 데이터의 이원화를 해소하고 사용자 편의성을 증대하는 패턴을 구현한다.

SPA ViewModel Transformation for RESTful API (RESTful API를 위한 SPA ViewModel 변환)

  • Dong-il Cho
    • Journal of Internet Computing and Services
    • /
    • v.24 no.1
    • /
    • pp.9-15
    • /
    • 2023
  • Single-Page Application(SPA) requires data transformation for communication with RESTful API. The Backend for Frontend(BFF) pattern handles this transformation in the server, but there is some problem that increases the number of communication and makes development and distribution difficult. In this study, we propose an architecture that maps the ViewModel of SPA and the model of RESTful API directly in SPA. The proposed architecture automatically generates a mapping model between the RESTful API model and the ViewModel using the OpenAPI specification, which is the document model of the RESTful API. The data transfer component of SPA automatically converts RESTful API data and ViewModel using the created model. As a result of comparison with the existing BFF method through case study, the proposed architecture showed higher development productivity than BFF, and as a result of load tests, it recorded about 6% lower server CPU occupancy compared to BFF.

Design and Implementation of a Paper Submission Management System Using Domain Object Interface and Object Oriented Design Patterns (객체지향 설계 유형 및 도메인 객체 인터페이스를 이용한 논문 투고 관리 시스템 설계 및 구현)

  • Sim, Chun-Bo;Jung, Se-Hoon;Lim, Eun-Cheon;You, Kang-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.449-458
    • /
    • 2010
  • Recently, the interest on object oriented design patterns has been increased considering to reusability of software and efficiency of maintenance expense in designing software architecture. In this paper, we design the paper submission management system applicable to specific domain using domain object interface based on object oriented design patterns, and then implement it with Java and XML. The proposed system applies method of implementation by assemblying each system objects with upward after system entire architecture design by combining properly downward method and upward method and applies with GoF Design pattern. As well as, we convert domain data of system into the form of various persistent objects through XML, and minimize the complexity of system by not adopting method that generates domain object as in Class with automatic. Finally, the implementation of our system can be used in general C/S environment, but we implement system user GUI using the XSLT built in general web browser in consideration for user convenience and consistency.

Image-Based Machine Learning Model for Malware Detection on LLVM IR (LLVM IR 대상 악성코드 탐지를 위한 이미지 기반 머신러닝 모델)

  • Kyung-bin Park;Yo-seob Yoon;Baasantogtokh Duulga;Kang-bin Yim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.31-40
    • /
    • 2024
  • Recently, static analysis-based signature and pattern detection technologies have limitations due to the advanced IT technologies. Moreover, It is a compatibility problem of multiple architectures and an inherent problem of signature and pattern detection. Malicious codes use obfuscation and packing techniques to hide their identity, and they also avoid existing static analysis-based signature and pattern detection techniques such as code rearrangement, register modification, and branching statement addition. In this paper, We propose an LLVM IR image-based automated static analysis of malicious code technology using machine learning to solve the problems mentioned above. Whether binary is obfuscated or packed, it's decompiled into LLVM IR, which is an intermediate representation dedicated to static analysis and optimization. "Therefore, the LLVM IR code is converted into an image before being fed to the CNN-based transfer learning algorithm ResNet50v2 supported by Keras". As a result, we present a model for image-based detection of malicious code.

A Design Method for Dynamic Selection of SOA Services (SOA 서비스의 동적 선택 설계 기법)

  • Bae, Jeong-Seop;La, Hyun-Jung;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.2
    • /
    • pp.91-104
    • /
    • 2008
  • Service-Oriented Computing (SOC) is the development method that published services are selected and composed at runtime to deliver the expected functionality to service clients. SOC should get maximum benefits not only supporting business agility but also reducing the development time. Services are selected and composed at runtime to improve the benefits. However, current programming language, SOC platforms, business process modeling language, and tools support either manual selection or static binding of published services. There is a limitation on reconfiguring and redeploying the business process to deliver the expected services to each client. Therefore, dynamic selection is needed for composing appropriate services to service clients in a quick and flexible manner. In this paper, we propose Dynamic Selection Handler (DSH) on ESB. we present a design method of Dynamic Selection Handler which consists of four components; Invocation Listener, Service Selector, Service Binder and Interface Transformer. We apply appropriate design patterns for each component to maximize reusability of components. Finally, we describe a case study that shows the feasibility of DSH on ESB.

Design and Implementation of the Survival Game API Using Dependency Injection (의존성 주입을 활용한 서바이벌 게임 API 설계 및 구현)

  • InKyu Park;GyooSeok Choi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.183-188
    • /
    • 2023
  • Game object inheritance and multiple components allow for visualization of system architecture, good code reuse, and fast prototyping. On the other hand, objects are more likely to rely on high latency between game objects and components, static casts, and lots of references to things like null pointers. Therefore, It is important to design a game in such a way so that the dependency of objects on multiple classes could be reduced and existing codes could be reused. Therefore, we designed the game to make the classes more modular by applying Dependency Injection and the design patterns proposed by the Gang of Four. Since these dependencies are attributes of the game object and the injection occurs only in the initialization pass, there is little performance degradation or performance penalty in the game loop. Therefore, this paper proposed an efficient design method to effectively reuse APIs in the design and implementation of survival games.