• 제목/요약/키워드: Computer Software

검색결과 8,412건 처리시간 0.032초

Automatic UML Design Extraction with Software Visualization based on Reverse Engineering

  • Jung, Se Jun;Kim, Janghwan;Lee, Won Young;Park, Bo Kyung;Son, Hyun Seung;Kim, R. Young Chul
    • International journal of advanced smart convergence
    • /
    • 제10권3호
    • /
    • pp.89-96
    • /
    • 2021
  • In various areas of the 4th industry, a big issue is software quality enhancement for stability and reliability of the smart software systems. After revising software promotion law at 2020, we must clearly define requirements and separate design parts and implementation parts of an all public software development contracts. In this study, we need to validate whether the final implementation of software is followed by the original design or not. To do this, we consider the design restoration through software visualization based on reverse engineering. Therefore we propose an UML design extraction and visualization method based on reverse engineering. Based on this, we may validate whether it is implemented according to the original design, and how much visualizes and includes the code the internal complexity for improvement of software quality.

Improving Fault Traceability of Web Application by Utilizing Software Revision Information and Behavior Model

  • Baek, Seungsuk;Lee, Jung-Won;Lee, Byungjeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권2호
    • /
    • pp.817-828
    • /
    • 2018
  • Modern software, especially web-based software, is broadly used in various fields. Most web applications employ design patterns, such as a model-view-controller (MVC) pattern and a factory pattern as development technology, so the application can have a good architecture to facilitate maintenance and productivity. A web application, however, may have defects and developers must fix the defects when a user submits bug reports. In this paper, we propose a novel approach to improving fault traceability in web application by using software revision information and software behavior model to reduce costs and effectively handle the software defect. We also provide a case study to show effectiveness of our approach.

A Multi-Perspective Benchmarking Framework for Estimating Usable-Security of Hospital Management System Software Based on Fuzzy Logic, ANP and TOPSIS Methods

  • Kumar, Rajeev;Ansari, Md Tarique Jamal;Baz, Abdullah;Alhakami, Hosam;Agrawal, Alka;Khan, Raees Ahmad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권1호
    • /
    • pp.240-263
    • /
    • 2021
  • One of the biggest challenges that the software industry is facing today is to create highly efficient applications without affecting the quality of healthcare system software. The demand for the provision of software with high quality protection has seen a rapid increase in the software business market. Moreover, it is worthless to offer extremely user-friendly software applications with no ideal security. Therefore a need to find optimal solutions and bridge the difference between accessibility and protection by offering accessible software services for defense has become an imminent prerequisite. Several research endeavours on usable security assessments have been performed to fill the gap between functionality and security. In this context, several Multi-Criteria Decision Making (MCDM) approaches have been implemented on different usability and security attributes so as to assess the usable-security of software systems. However, only a few specific studies are based on using the integrated approach of fuzzy Analytic Network Process (FANP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) technique for assessing the significant usable-security of hospital management software. Therefore, in this research study, the authors have employed an integrated methodology of fuzzy logic, ANP and TOPSIS to estimate the usable - security of Hospital Management System Software. For the intended objective, the study has taken into account 5 usable-security factors at first tier and 16 sub-factors at second tier with 6 hospital management system softwares as alternative solutions. To measure the weights of parameters and their relation with each other, Fuzzy ANP is implemented. Thereafter, Fuzzy TOPSIS methodology was employed and the rating of alternatives was calculated on the foundation of the proximity to the positive ideal solution.

그래프 클러스터링을 이용한 추천 시스템 성능 개선 방안 (A Method for Improving Recommender System using Graph Clustering)

  • 홍동균;홍지원;이연창;김상욱
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2015년도 추계학술발표대회
    • /
    • pp.1233-1234
    • /
    • 2015
  • 추천 시스템의 정확도를 향상시키기 위한 방법으로 그래프 클러스터링을 활용한다. 본 논문에서는 실험을 통하여 RWR 알고리즘을 사용하는 추천 시스템의 정확도를 Modularity 기반 클러스터링 알고리즘을 활용함으로써 개선하는 것을 보인다.

UML에 기반한 CBSD Process의 Work Flow Model (A UML-Based Work Flow Model of the Component Based Software Development Process)

  • 임성빈;송치양;문창주;백두권
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2000년도 제13회 춘계학술대회 및 임시총회 학술발표 논문집
    • /
    • pp.842-845
    • /
    • 2000
  • 컴포넌트라는 소프트웨어 개발 기술에 대해서 중요성이 점점 높아만 가고 있는 가운데, 이 컴포넌트 기술를 이용하여 효율적이고, 실용적으로 소프트웨어를 개발 할 수 있도록 컴포넌트 기반의 소프트웨어 개발 방법에 대하여 연구 제시한다. 즉, 컴포넌트가 가지고 있는 구성요소로서 인터페이스라는 것이 있는데 이 인터페이스와 컴포넌트를 이용해서 만들고자 하는 시스템에 대한 요구사항에 맞게 분석 및 설계를 하고, 만들고자 하는 시스템과 컴포넌트의 투명성을 보여 줄 수 있는 방법에 대해서 Work Flow Model과 각각의 프로세스에 의해서 만들어지는 산출물을 통해서 컴포넌트 기반의 소프트웨어 개발 프로세스에 대해서 제시를 한다.

  • PDF

A Comparative Analysis on Software Education Unit in Practical Arts Textbooks based on 2015 Revised National Curriculum

  • Kim, Ji-Yun;Lee, Tae-Wuk
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권2호
    • /
    • pp.217-225
    • /
    • 2019
  • In this paper, we proposed comparison of software education units according to 2015 Revised National Curriculum. Comparative analysis of 6 Practical Arts textbooks was conducted especially on the software education units. The analysis criteria were decided to be unit system, unit structure, learning objectives, the way of placing contents, activities, supporting materials, providing resources, and evaluation. As a result, the software education units have secured a lot of quantity compared to the total number of units. And the affective domain of the learning objectives is shown to be lacking. All the textbooks were uniformly arranged the component of contents described in 2015 revised national curriculum. Cooperative activities are strengthened compared to the previouse curriculum. On the other hand, evaluations have a large variation among textbooks and some have fewer types.

전자연동장치 S/W 안전성 확보를 위한 Z 방법표현에 관한 연구 (Study on Z specification for S/W Safety of Computer Based Interlocking Systems)

  • 안진;이종우
    • 한국철도학회논문집
    • /
    • 제20권1호
    • /
    • pp.55-63
    • /
    • 2017
  • 철도에 사용되고 있는 Safety critical systems 중 하나인 연동장치는 relay-based systems에서 computer-based systems으로 급속히 변환되고 있다. computer-based interlocking systems (CBI)의 안전성확보가 중요한 문제 중 하나로 떠오르고 있다. CBI를 구성하는 연동논리 software는 시스템 안전성에 직접적으로 영향을 미치는 부분 중 하나이다. Formal methods 중 하나인 "Z"notation은 이 software 안전성 확보를 위해 software 명세에 많이 사용되고 있다. 본 논문에서는 "Z"notation을 이용하여 연동논리 일부분을 구현하였으며, Z/EVES를 이용하여 검증을 하였다.

키넥트 및 멀티로터를 이용한 지능형 감시 시스템 (Intelligent Surveillance System using Kinect sensor and Multirotor)

  • 오정학;유도준;구하늘;김호승;김성우
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2012년도 추계학술대회
    • /
    • pp.541-544
    • /
    • 2012
  • 기술이 발전함에 따라 군사 및 보안 분야에서 무인 감시 시스템에 대한 폭넓은 관심이 요구되고 있다. 이러한 감시 시스템은 원격 서버와 연동할 수 있는 소프트웨어를 통해 다양한 서비스를 제공할 수 있다. 본 논문에서는 멀티로터의 원격 제어 및 자동 비행을 위하여 오픈 소스 소프트웨어를 기반으로 제어시스템 및 감시 시스템 소프트웨어를 개발하였다. 또한, 리눅스 기반의 서버를 지원하는 Mjpg-streamer, 제어를 위한 Arduino 기반의 Multiwii 그리고 영상처리를 위한 OpenNI와 OpenCV 라이브러리 3종류의 오픈 소프트웨어를 탑재하여 구현된 결과를 보여준다.

  • PDF

A Study on Efficient Software Education Donation Ecosystem

  • Kil, Hyunyoung;Lee, Won Joo;Lim, Chunsung
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권4호
    • /
    • pp.175-182
    • /
    • 2018
  • In this paper, we propose a software education ecosystem model for activating software education donation. First, in order to investigate current software education donation status, we will conduct a survey on software education donors and analyze the results. 39.6% of the software education donors responded that they were introduced to software education donation activities through their affiliated companies, institutions, organizations. Therefore, it can be seen that the promotion of software education donation activities is the most effective by promoting through software companies, organizations, and organizations and using human networks. The subjects of software education donation activities were the highest at middle school students (73.9%), and the contents of software education donations were the highest at programming practice (63.3%). Donors' satisfaction with software education donation activities was 57.9%. The social support for SW education donors was in the order of software education contents support, activity cost support, equipment and network support, and place sponsorship. 87.4% of donors were willing to continue to donate to software education. The reason why they did not want to continue donating software education was 'lack of personal time' (65.4%). Therefore, it is necessary to develop appropriate social support and incentive system to overcome shortage of personal time in order to activate software education contribution. In order to promote sustainable software education donations, it is essential to establish a virtuous circle of software education donation ecosystem based on cooperation and solidarity with various organizations such as government, corporations, institutions, universities and civil society organizations.

Software Engineering Meets Network Engineering: Conceptual Model for Events Monitoring and Logging

  • Al-Fedaghi, Sabah;Behbehani, Bader
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.9-20
    • /
    • 2021
  • Abstraction applied in computer networking hides network details behind a well-defined representation by building a model that captures an essential aspect of the network system. Two current methods of representation are available, one based on graph theory, where a network node is reduced to a point in a graph, and the other the use of non-methodological iconic depictions such as human heads, walls, towers or computer racks. In this paper, we adopt an abstract representation methodology, the thinging machine (TM), proposed in software engineering to model computer networks. TM defines a single coherent network architecture and topology that is constituted from only five generic actions with two types of arrows. Without loss of generality, this paper applies TM to model the area of network monitoring in packet-mode transmission. Complex network documents are difficult to maintain and are not guaranteed to mirror actual situations. Network monitoring is constant monitoring for and alerting of malfunctions, failures, stoppages or suspicious activities in a network system. Current monitoring systems are built on ad hoc descriptions that lack systemization. The TM model of monitoring presents a theoretical foundation integrated with events and behavior descriptions. To investigate TM modeling's feasibility, we apply it to an existing computer network in a Kuwaiti enterprise to create an integrated network system that includes hardware, software and communication facilities. The final specifications point to TM modeling's viability in the computer networking field.