• Title/Summary/Keyword: Code Quality

Search Result 887, Processing Time 0.023 seconds

Analysis of Factors Affecting Intention of Continuous Use for Mobile Wallet Based on the Information System Success Model (정보시스템 성공모형을 기반으로 한 모바일월렛 지속사용의도에 미치는 영향 요인 분석)

  • Jeon, Sun-Ho;Kang, Ju-Young;Lim, Jay-Ick
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.325-340
    • /
    • 2014
  • Mobile payment system using NFC attracted attention as the mobile payment market grows due to the fast diffusion of smart phones. However, non NFC mobile payment recently appeared because of the slow growth of infrastructure for NFC. With advent of Non NFC mobile payment applications, mobile payment industry is in developing trend. Non NFC mobile payment revitalizes the market by overcoming the limit of NFC with the smart applications using bar code and QR code payment, and providing various discounts, membership benefits and payment information. Therefore, this paper analyzed the intention of continuous use with the quality of mobile payment application based on the information system success model. Three categories of factors which are system quality, service quality, and information quality were used. We verified the significance of the factors affecting the intension of continuous use. mainly, quality of information was considered as an important factor of continuous Intention to Use. Also, unlike previous NFC, it was found that in Non-NFC, compatibility might not be as important factor. Moreover, we suggest a marketing strategy of companies for mobile payment industry which focus on information quality. and future research directions for non NFC payment market.

An Efficient Code Expansion from EM to SPARC Code (EM에서 SPARC 코드로 효율적인 코드 확장)

  • Oh, Se-Man;Yun, Young-Shick
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2596-2604
    • /
    • 1997
  • There are two kinds of backends in ACK:code generator(full-fledged backend) and code expander(fast backend). Code generators generate target code using string pattern matching and code expanders generate target code using macro expansion. ACK translates EM to SPARC code using code expander. The corresponding SPARC code sequences for a EM code are generated and then push-pop optimization is performed. But, there is the problem of maintaining hybrid stack. And code expander is not considered to passes parameters of a procedure call through register windows. The purpose of this paper is to improve SPARC code quality. We suggest a method of SPARC cod generation using EM tree. Our method is divided into two phases:EM tree building phase and code expansion phase. The EM tree building phase creates the EM tree and code expansion phase translates it into SPARC code. EM tree is designed to pass parameters of a procedure call through register windows. To remove hybrid stack, we extract an additional information from EM code. We improved many disadvantages that arise from code expander in ACK.

  • PDF

Block-based Image Authentication Algorithm using Differential Histogram-based Reversible Watermarking (차이값 히스토그램 기반 가역 워터마킹을 이용한 블록 단위 영상 인증 알고리즘)

  • Yeo, Dong-Gyu;Lee, Hae-Yeoun
    • The KIPS Transactions:PartB
    • /
    • v.18B no.6
    • /
    • pp.355-364
    • /
    • 2011
  • In most applications requiring high-confidential images, reversible watermarking is an effective way to ensure the integrity of images. Many watermarking researches which have been adapted to authenticate contents cannot recover the original image after authentication. However, reversible watermarking inserts the watermark signal into digital contents in such a way that the original contents can be restored without any quality loss while preserving visual quality. To detect malicious tampering, this paper presents a new block-based image authentication algorithm using differential histogram-based reversible watermarking. To generate an authentication code, the DCT-based authentication feature from each image block is extracted and combined with user-specific code. Then, the authentication code is embedded into image itself with reversible watermarking. The image can be authenticated by comparing the extracted code and the newly generated code and restored into the original image. Through experiments using multiple images, we prove that the presented algorithm has achieved over 97% authentication rate with high visual quality and complete reversibility.

NC Code Post-Processor Considering Metal Removal Rate (절삭부하 예측을 통한 NC코드 후처리시스템)

  • 이기우;노상도;신동목;한형상
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.17 no.5
    • /
    • pp.116-123
    • /
    • 2000
  • This paper presents an NC code post-processor that adjusts feedrates to keep the variation of metal removal rate along the tool paths minimum. Metal removal rate is estimated by virtually machining the part, whose surface model is built from a series of NC codes defined in operation plan, with cutting-tool-assembly models, whose geometry are defined in a machining database. The NC code post-processor modifies the feedrates by the adjustment rules, which are based on the machining knowledge for effective machining. This paper illustrates a procedure fur grouping machining conditions and we also show how to determine an adjustment rule for a machining-condition group. An example part was machined and it shows that the variation of cutting force was dramatically reduced after applying the NC code post-processor. The NC code post-processor is expected to increase productivity while maintaining the quality of the machined part.

  • PDF

Development of Rule-based Checking Modules for the Evacuation Regulations of Super-tall Buildings in Open BIM Environments (개방형BIM환경에서의 룰기반 초고층건축물 피난법규 검토모듈 개발)

  • Kim, Inhan;Choi, Jungsik;Cho, Geunha
    • Korean Journal of Computational Design and Engineering
    • /
    • v.18 no.2
    • /
    • pp.83-92
    • /
    • 2013
  • IFC based open BIM has internationally developed as a solution for interoperability problem among different software applications. Despite much interest and effort, the open BIM technologies are rarely introduced to the construction industry and need more technical development for a practical application as well. This research aims to develop automated code checking modules for quality assurance process of BIM data. The research have analyzed domestic regulations focusing on super-tall buildings and developed open BIM-based code checking modules for the evacuation regulations. The modules are able to validate evacuation regulations such as installation of emergency elevator and fire safety zone. The authors expect to improve the process of BIM quality assurance and enhance the quality of BIM data by this research on automated checking system.

ISO 2859-1 (1989), Sampling Plans Indexed by Acceptable Quality Level for Lot-by-Lot Inspection (ISO 2859-1 (1989), 계수조정형 샘플링 검사규격)

  • Hong, Sung-Hoon;Lee, Seung-Hwan
    • Journal of Korean Society for Quality Management
    • /
    • v.24 no.3
    • /
    • pp.77-93
    • /
    • 1996
  • This paper is concerned with the International Standard ISO 2859-1 (1989), Sampling Plans Indexed by Acceptable Quality Level (AQL) for Lot-by-Lot Inspection, his standard is AQL type sampling scheme, and incorporates switching rules to move among normal, tightened, and reduced inspections. Sample size code letters and inspection levels of ISO 2859-1 are the same as those of other attributes standards MIL-STD-105D, ANSI Z1.4, and KS A 3109. But ISO 2859-1 has more simple switching rules than KS A 3109 has. The sampling procedures of the ISO 2859-1 are matched to the variables international standard ISO 3951 to enable us to move between them. Composite OC and ASN curves are given for AQL 2.5% and code letter F.

  • PDF

Propose of New Ultrasonic Nondestructive Code Considering Discontinuity Position (불연속부의 위치를 고려한 초음파 비파괴 검사 규격의 개선안)

  • Jeong, Hwa-Young;Shin, Byoung-Chul;Jung, Beom-Seok;Lee, Chang-Moo
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.3 no.4
    • /
    • pp.173-178
    • /
    • 1999
  • KS-code(KS B 0896) for nondestructive ultrasonic testing classifies the quality level by ratio of flaw size to plate thickness only. But stress distributions using verification(3 point bending test) show that location of the flaws is more important than the flaw size. So. KS-code should take the effect of flaw location for classifying the quality level of welded steel structures.

  • PDF

Design and Implementation of a Data Extraction Tool for Analyzing Software Changes

  • Lee, Yong-Hyeon;Kim, Kisub;Lee, Jaekwon;Jung, Woosung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.8
    • /
    • pp.65-75
    • /
    • 2016
  • In this paper, we present a novel approach to help MSR researchers obtain necessary data with a tool, termed General Purpose Extractor for Source code (GPES). GPES has a single function extracts high-quality data, e.g., the version history, abstract syntax tree (AST), changed code diff, and software quality metrics. Moreover, features such as an AST of other languages or new software metrics can be extended easily given that GPES has a flexible data model and a component-based design. We conducted several case studies to evaluate the usefulness and effectiveness of our tool. Case studies show that researchers can reduce the overall cost of data analysis by transforming the data into the required formats.

Complement of Ultrasonic Nondestructive Testing Code using Finite Element Method (유한요소법을 이용한 초음파 비파괴검사 규격의 보완)

  • Jeong, Hwa-Young;You, Seung-Youp;Shin, Byoung-Churl;Jung, Beom-Seok;Yi, Chang-Moo
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.3 no.1
    • /
    • pp.157-162
    • /
    • 1999
  • KS-code(KS B 0896) for nondestructive ultrasonic testing judge the quality level by ratio of flaw size to plate thickness only. But stress distributions using finite element analysis show that location of the flaws are more important than the flaw size. So, KS-code should take into account of flaw location for judging the quality level of welded steel structures.

  • PDF