• Title/Summary/Keyword: 코드 재사용

Search Result 476, Processing Time 0.028 seconds

Reengineering PC-based Java Program to WIPI Program - An Experience Report (PC 기반 JAVA 프로그램에서 WIPI 프로그램으로의 리엔지니어링)

  • Park Sung-Hwan;Park Won-Joo;Park Sang-Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.191-194
    • /
    • 2006
  • 최근 모바일 콘텐츠 산업의 급속한 성장으로 모바일 콘텐츠 작성은 새로운 콘텐츠를 작성하기 보다는 기존 PC기반의 프로그램을 모바일 환경에 맞게 변환하는 추세이다. 모바일 환경에 맞게 변환을 할 때 소프트웨어공학 기법을 적용하면 효율적인 리엔지니어링이 가능하다. 우리는 기존 PC기반의 바둑게임 프로그램을 모바일 환경의 프로그램으로 변환하던 중 많은 문제점과 마주치게 되었다. 우리는 문제점을 해결하고, 차후 코드의 재사용성을 고려하여 디자인 패턴을 고려한 리엔지니어링을 했다. 이러한 리엔지니어링을 하면 모바일 콘텐츠 개발자는 차후 PDA와 같은 다른 뷰를 가지는 프로그램으로의 변환도 손쉽게 할 수 있다. 우리는 기존의 패턴 이용하여 코드 재사용성을 높이는 효율적인 리엔지니어링 기법을 제안한다.

  • PDF

Constructing an Open Source Based Software System for Reusable Module Extraction (재사용 모듈 추출을 위한 오픈 소스 기반 소프트웨어 시스템 구축)

  • Byun, Eun Young;Park, Bokyung;Jang, Woosung;Kim, R. Young Chul;Son, Hyun Seung
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.9
    • /
    • pp.535-541
    • /
    • 2017
  • Today, the scale of the computer software market has increased, and massive sized software has been developed to satisfy diverse requirements. In this context, software complexity is increasing and the quality of software is becoming more difficult to manage. In particular, software reuse is important for the improvement of the environments of legacy systems and new system development. In this paper, we propose a method to reuse modules that are certified by quality. Reusable levels are divided into code area (method, class, and component), project domain, and business levels. Based on the coupling and cohesion of software complexity, we propose a reusable module extraction mechanism with reusability metrics, which constructs a visualization of the "reusable module's chunk" based on the method and class levels. By applying reverse engineering to legacy projects, it is possible to identify reusable modules/objects/chunks. If these modules/objects/chunks are to be reused to develop an extension system or similar new system, we need to ensure software reliability in order to reduce the time and cost of software development.

Analysis of Code Design Evaluation Methods According to Input/Output Information Conditions (입출력 정보 조건에 따른 코드 설계 평가 방법 분석)

  • Kyeong Hur
    • Journal of Practical Engineering Education
    • /
    • v.16 no.3_spc
    • /
    • pp.259-265
    • /
    • 2024
  • In order to improve the SW convergence capabilities of university undergraduate students, methods to evaluate undergraduate students' code design capabilities should be researched along with the development of related courses. In previous studies, there were qualitative evaluation methods and quantitative relative evaluation methods for code results. In the quantitative relative evaluation method, the number of problem decomposition depth, number of function reuses, and number of functions were measured and evaluated. In this study, an evaluation method that was not presented in previous studies was proposed using the problem of presenting the number of input and output information types when designing code. The evaluation problems proposed in this paper applied up to three types of input information and three types of output information. Through this, five code design evaluation questions were presented and a method to quantitatively calculate code design scores was proposed. Codes from 100 student respondents were collected and analyzed through courses that applied the proposed evaluation method. Through result analysis, the number of problem decomposition depths was proportional to the number of types of input information, the number of function reuses was proportional to the number of types of output information, and the number of functions showed a correlation that was proportional to the total number of types of input and output information. Lastly, by analyzing the distribution of evaluation scores of 100 respondents, we demonstrated that the code design evaluation method according to the five input/output information condition evaluation problems is effective.

바이링걸의 재일 코리안 인지증 고령자와의 커뮤니케이션 -개인 회상법에 의한 양국 언어의 회화 분석을 통해-

  • Kim, Chun-Nam
    • 한국사회복지학회:학술대회논문집
    • /
    • 2008.04a
    • /
    • pp.422-425
    • /
    • 2008
  • 바이링걸의 인지증고령자와의 보다 유효한 커뮤니케이션의 가능성의 검토를 목적으로, 이문화를 배려한 모국어에 의한 개인 회상법을 이용한 회화를 실시했다. 회화는, 재일 코리안의 문화를 배려한 특별 양호 노인홈에 입주중이며 중도의 인지증 바이링걸 고령자 4명(모두 여성, 평균 88세)의 협력하에 실시했다. 모국어와 일본어의 장면에서, 개인 회상법에 의한 회화 내용과 감정 표출에 차이가 발생하는가의 관점에서 양 회화장면의 비교 분석을 실시했다. 그 결과, 중증의 인지증고령자라고해도 바이링걸의 특징인 자연스러운 코드 스위칭(Code-Switching;CS)가 관찰되었다. 즉, 과거의 학습이나 경험에 의해 축적된 모국의 언어 형식을 사용하는 기능이 잔존 능력으로서 잠재하고있는 것이 밝혀졌다. 덧붙여 ERiC 감정 반응 평가 척도를 이용해 관찰한 결과, 일본어의 장면보다 모국어의 장면에 대해 긍정적 감정의 풍부함이 관찰되었다. 이상으로, 바이링걸의 재일 코리안 인지증고령자 1세와 모국어를 이용한 회상법에 의한 회화는, 바이링걸의 특징을 기초로한 하나의 유효한 어프로치라고 생각된다.

  • PDF

GPS 신호 획득 과정에서의 C/A 코드 반복 횟수 추정 알고리즘 설계

  • Yu, Won-Jae;Choe, Gwang-Ho;Im, Jun-Hu;Kim, Ra-U;So, Hyeong-Min;Lee, Hyeong-Geun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.10a
    • /
    • pp.270-272
    • /
    • 2015
  • 선박의 항해 도중 GPS 위성을 이용하여 위치를 추정하는 방법이 널리 사용되고 있다. 본 연구에서는 재밍으로 인하여 항해 중에 간헐적인 GPS 신호의 획득은 가능하나 지속적인 신호 추적이 불가하여 GPS 위성의 코드 위상 측정치만 얻을 수 있는 상황을 가정하였다. 동 시간대의 기준국에서 수신한 항법 메시지와 신호 획득 과정에서 측정된 코드 위상 만을 이용하여 GPS C/A 코드의 반복 횟수를 정확히 추정하고 대략적인 위치 해를 계산하는 알고리즘을 개발하였다.

  • PDF

Efficient Detection of Android Mutant Malwares Using the DEX file (DEX 파일을 이용한 효율적인 안드로이드 변종 악성코드 탐지 기술)

  • Park, Dong-Hyeok;Myeong, Eui-Jung;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.895-902
    • /
    • 2016
  • Smart phone distribution rate has been rising and it's security threat also has been rising. Especially Android smart phone reaches nearly 85% of domestic share. Since repackaging on android smart phone is relatively easy, the number of re-packaged malwares has shown steady increase. While many detection techniques have been proposed in order to prevent malwares, it is not easy to detect re-packaged malwares by static analysis and it is also difficult to operate dynamic analysis in android smart phone. Static analysis proposed in this paper features code reuse of repackaged malwares. We extracted DEX files from android applications and performed static analysis using class names and method names. This process doesn't not include reverse engineering, so it is possible to detect malwares efficiently.

Component Code Generation Using Feature Diagram and XML/XSLT (특성 다이어그램과 XML/XSLT 기술을 이용한 컴포넌트 코드 자동 생성)

  • 최승훈
    • Journal of Internet Computing and Services
    • /
    • v.3 no.4
    • /
    • pp.83-94
    • /
    • 2002
  • Recently for software development productivity a lot of researches in the field of software engineering hove focuses on the component-based software product lines which allows the reuse of forger-granularity software components Its purpose is to develop the specific software application of quality more rapidly by instantiating and assembling the components populated in software product line assets The essential part to build the component-based software product lines is the quality of components, and one of the most important features determining the quality of components is 'reconfigurability' Component reconfigurability means the extent to which the reusers can change the functions and architecture of the component according to their context and environment. This paper proposes the component code generation technique which provides the reconfigurability at the time of code generation using The feature diagram and XML/XSLT technologies The approach of this paper allows the component reusers to get automatically their own component source code by providing only the values of variabilities represented in the feature diagram of the component family. The real world example, the code generation system for o list container family, shows the applicability of the feature model and XML related technologies in the area of the generative programming. Our approach should be basis to build the component based software product lines and extensible to support the larger graularity components.

  • PDF

Research on the PAPR Reduction Method using Selection of Extra Code Set in PB/MC-CDMA System (PB/MC-CDMA 시스템에서 여분의 코드집합을 이용한 PAPR 감쇄기법에 관한 연구)

  • Lee, Kyu-Jin;Lee, Dong-Joon;Lee, Kye-San;Kim, Jin-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.1
    • /
    • pp.110-118
    • /
    • 2009
  • The PB/MC-CDMA(Partial Block Multi Carrier Code Division Multilple Access) system can improve the performance by reducing the ICI(Inter-Code Interference) between users. Also, this system can achieve the frequency diversity gain by avoiding ISI(Inter Symbol Interference). Therefore, the performance of PB/MC-CDMA system is better than that of conventional MC-CDMA(Multi Carrier Code Division Multiple Access) system. However, similarly to other multi-carrier systems, it still has a PAPR(Peak to Average Power Ratio) issue. In this paper, we propose a peak power reduction technique involving optimized spreading code selection without side information for the PB/MC-CDMA. The PB/MC-CDMA system in each block of units reuses the code so the extra code will be remained. This extra code is divided into several groups to calculate the PAPR and solving the PAPR problem by transferring the selected code which has minimum peak power.

  • PDF

Preliminary Analysis of the CANDU Moderator Thermal-Hydraulics using the CUPID Code (2상 유동 해석코드 CUPID를 이용한 CANDU 원자로 감속재 열수력 예비해석)

  • Park, Sang Gi;Lee, Jae Ryong;Yoon, Han Young;Kim, Hyoung Tae;Jeong, Jae Jun
    • Journal of Energy Engineering
    • /
    • v.21 no.4
    • /
    • pp.419-426
    • /
    • 2012
  • A transient, three-dimensional, two-phase flow analysis code, CUPID, has been developed in KAERI. In this work, we performed a preliminary analysis using the CUPID code to investigate the thermal-hydraulic behavior of the moderator in the Calandria vessel of a CANDU reactor. At first, we validated the CUPID code using the three experiments that were performed at Stern Laboratories Inc. To avoid the complexity to generate computational mesh around the Calandria tube bundles, a porous media approach was applied for the region. The pressure drop in the porous media zone was modeled by an empirical correlation. The results of the calculations showed that the CUPID code can predict the mixed flow pattern of forced and natural convection inside the Calandria vessel very well. Thereafter, the analysis was extended to a two-phase flow condition. Also, the local maximum temperature in the Calandria vessel was plotted as a function of the injection flow rate, which may be utilized to predict the local subcooling margin.