• Title/Summary/Keyword: JAVA language

Search Result 424, Processing Time 0.02 seconds

Design and Implementation of CTI System for Hearing-Impaired People in Mobile Environment (모바일 환경에서 청각장애인을 위한 CTI시스템 설계 및 구현)

  • Yang, Seung-Su;Park, Seok-Cheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.47-54
    • /
    • 2013
  • In this paper, analyze the technical elements of the CTI system to design the proposed system, understand the requirements of CTI IP based system. in the Hearing-Impaired designed a CTI system of mobile phone-based services available to the CTI call center system based on this. Furthermore, we implemented voiceXML scenario data analysis modules using the JAVA language to implement the system was designed, the server provides. And an implementation of the CTI system of mobile phone base for the Hearing-Impaired by integrating the modules that have been implemented. Finally, create a scenario that uses the CTI system for mobile base to test and evaluation, based on the test scenario each functional, we conducted repeated tests. It was possible to confirm the results of time for the acquisition of the test result information has been reduced about 20 seconds on average than the audio system based on conventional.

An Android API Obfuscation Tool using Reflection and String Encryption (리플렉션과 문자열 암호화를 이용한 안드로이드 API 난독화 도구)

  • Lee, Joohyuk;Park, Heewan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.1
    • /
    • pp.23-30
    • /
    • 2015
  • Reflection is a feature of the Java programming language that can examine and manipulate components of program itself. If you use the reflection, you can get an obfuscation effect of Java source because it converts sources into complicated structures. However, when using it, strings of components name of program are exposed. Therefore, it cannot prevent static analysis. In this paper, we presents a method and a tool of interfere with static analysis using reflection. And in this case, exposed strings are encoded using Vigen$\acute{e}$re cipher. Experimental results show that this tool is effective in increasing the overall complexity of the source code. Also the tool provides two types decryption method based on server and local. It can be selected based on the importance of the API because it affects the execution speed of the application.

리눅스 기반의 인터넷 원격 교육 시스템 개발 -교재 설계 모듈을 중심으로-

  • 성평식;박춘원
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2000.11a
    • /
    • pp.635-645
    • /
    • 2000
  • Within a context of rapid technological change and shifting market conditions, the education environment requires new paradigm of education delivery In accordance of such a technological progress, distance education system, which makes the loaming take place at anytime anywhere, overcoming barriers of time, or distance, is emerging as a mainstream of education delivery replacing the convectional one way delivery system from instructor to learners. This Paper aims to introduce the development principle and algorithm about Instructional System Design(ISD) module, a part of a total solution for distance education services. It was developed on Linux, a free Unix-type operating system. Linux supports so various network protocols, sharing the network resources in a smooth way, that it is able to integrate with other operating system very easily, especially with Windows NT or Windows 2000 servers. In terms of quality, it never falls behind the windows products which are commercially available only, It is a right operating system for the such a school environment that is usually limited in budgets. The development environment of the distance education solution to which ISD module belongs is composing of Apache server for web server, Java bean based on components for ISD module, PHP, server-side scripting language, for HTML documents and MySQL for DBMS.

  • PDF

Development and application of a floor failure depth prediction system based on the WEKA platform

  • Lu, Yao;Bai, Liyang;Chen, Juntao;Tong, Weixin;Jiang, Zhe
    • Geomechanics and Engineering
    • /
    • v.23 no.1
    • /
    • pp.51-59
    • /
    • 2020
  • In this paper, the WEKA platform was used to mine and analyze measured data of floor failure depth and a prediction system of floor failure depth was developed with Java. Based on the standardization and discretization of 35-set measured data of floor failure depth in China, the grey correlation degree analysis on five factors affecting the floor failure depth was carried out. The correlation order from big to small is: mining depth, working face length, floor failure resistance, mining thickness, dip angle of coal seams. Naive Bayes model, neural network model and decision tree model were used for learning and training, and the accuracy of the confusion matrix, detailed accuracy and node error rate were analyzed. Finally, artificial neural network was concluded to be the optimal model. Based on Java language, a prediction system of floor failure depth was developed. With the easy operation in the system, the prediction from measured data and error analyses were performed for nine sets of data. The results show that the WEKA prediction formula has the smallest relative error and the best prediction effect. Besides, the applicability of WEKA prediction formula was analyzed. The results show that WEKA prediction has a better applicability under the coal seam mining depth of 110 m~550 m, dip angle of coal seams of 0°~15° and working face length of 30 m~135 m.

Feature Configuration Verification Using JESS Rule-based System (JESS 규칙 기반 시스템을 이용한 특성 구성 검증)

  • Choi, Seung-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.135-144
    • /
    • 2007
  • Feature models are widely used in domain engineering phase of software product lines development to model the common and variable concepts among products. From the feature model, the feature configurations are generated by selecting the features to be included in target product. The feature configuration represents the requirements for the specific product to be implemented. Although there are a lot of researches on how to build and use the feature models and feature configurations, the researches on the formal semantics and reasoning of them are rather inactive. This paper proposes the feature configuration verification approach based on JESS, java-based rule-base system. The Graph Product Line, a standard problem for evaluating the software product line technologies, is used throughout the paper to illustrate this approach. The approach in this paper has advantage of presenting the exact reason causing inconsistency in the feature configuration. In addition, this approach should be easily applied into other software product lines development environments because JESS system can be easily integrated with Java language.

  • PDF

Implementation of a Display and Analysis Program to improve the Utilization of Radar Rainfall (레이더강우 자료 활용 증진을 위한 표출 및 분석 프로그램 구현)

  • Noh, Hui-Seong
    • Journal of Digital Contents Society
    • /
    • v.19 no.7
    • /
    • pp.1333-1339
    • /
    • 2018
  • Recently, as disasters caused by weather such as heavy rains have increased, interests in forecasting weather and disasters using radars have been increasing, and related studies have also been actively performed. As the Ministry of Environment(ME) has established and operated a radar network on a national scale, utilization of radars has been emphasized. However, persons in charge and researchers, who want to use the data from radars need to understand characteristics of the radar data and are also experiencing a lot of trials and errors when converting and calibrating the radar data from Universal Format(UF) files. Hence, this study developed a Radar Display and Analysis Program(RaDAP) based on Graphic User Interface(GUI) using the Java Programming Language in order for UF-type radar data to be generated in an ASCII-formatted image file and text file. The developed program can derive desired radar rainfall data and minimize the time required to perform its analysis. Therefore, it is expected that this program will contribute to enhancing the utilization of radar data in various fields.

An Authoring Strategy of Educational Contents using Component Technology and Concept-Based Branch Method (컴포넌트 기술과 개념단위 분기방법을 이용한 교육을 콘텐츠의 저작지침)

  • 오용선;신운섭
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.1
    • /
    • pp.1-8
    • /
    • 2003
  • In this paper, we propose a novel model and effective authoring strategy of educational contents which improve the drilling effects in the cyber education through Internet. Especially we offer an authoring process of digital contents of engineering departs using JAVA component library technology and concept-based branch method, making the element of the library as unit-contents separated in accordance with their characteristics arid then accessing them at arbitrary instant in the replaying time. In proportion to the proposed model and strategy, the resultant contents shows advanced adaptabilities and interactions so that the contents can be user-oriented considerations. Combining and realizing the proposed authoring strategy for constitution of digital contents, we can get a more efficient scenario of making and drilling especially in the area of engineering or language courses.

  • PDF

Automated Code Smell Detection and Refactoring using OCL (OCL을 이용한 자동화된 코드스멜 탐지와 리팩토링)

  • Kim, Tae-Woong;Kim, Tae-Gong
    • The KIPS Transactions:PartD
    • /
    • v.15D no.6
    • /
    • pp.825-840
    • /
    • 2008
  • Refactoring is a kind of software modification process that improves system qualities internally but maintains system functions externally. What should be improved on the existing source codes should take precedence over the others in such a modification process using this refactoring. Martin Fowler and Kent Beck proposed a method that identifies code smells for this purpose. Also, some studies on determining what refactoring will be applied to which targets through detecting code smells in codes were presented. However, these studies have a lot of disadvantages that show a lack of precise description for such code smells and detect limited code smells only. In addition, these studies showed other disadvantages that generate ambiguity in behavior preservation due to the fact that a description method of pre-conditions for the behavior preservation is included in a refactoring process or unformalized. Thus, our study represents a precise specification of code smells using OCL and proposes a framework that performs a refactoring process through the automatic detection of code smells using an OCL interpreter. Furthermore, we perform the automatic detection in which the code smells are be specified by using OCL to the java program and verify its applicability and effectivity through applying a refactoring process.

Integrated Management Middleware for the Servers supporting the terminal-independent (단말기 독립형 서버 통합 관리 미들웨어)

  • Kim Jeong-Hee;Kwak Ho-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1106-1118
    • /
    • 2006
  • The Internet has become an important instrument for providing many pieces of information to us. And server systems offer the various services after processing a volume of information, it's network topology also has been complex for providing information. Therefore this expansion means the importance of fast and sustained management of server systems. But most of server systems are located in fire-walls to allow only restricted access. Moreover, due to the difference of management based on the different operating system of each server system, management of server system is not to efficiency. That is, sever administrators have to manage by themselves many kinds of servers by using local-based or socket-based single access applications. Therefore, we design and implement a middleware system which allows to manage many kinds of severs integrally ruling XML-based Web Services which have distributed object technology such as CORBA, Java RMI and DCOM, but are free from platforms or development languages. System also provides location transparency and terminal independence and calls a server system management command to manage systems.

Comparison of Design and Implementation for Distributed Active Objects based on RMI and CORBA environment (RMI와 CORBA 환경하의 분산 액티브 객체의 설계 및 구현에 대한 비교 분석)

  • Lee, Do-Hak;Kim, Shik;Hyun, Mu-Yong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2721-2731
    • /
    • 1997
  • Distributed programming can be greatly simplified by language support for distributed communication. Many web-browsers now offer some form of active objects and the number and types of them are growing daily in interesting and innovative ways. Java applets are well known as one kind of active object related to web-browser. This paper focuses in distributed active objects which is one kind of active objects that can communicate with other active objects located in different machines across the Internet. Java RMI and CORBA IDL are two major programming environments for distributed active objects which are non compatible with each other. To make discussion concrete, we introduce a single application as implemented on two environments : the HORM, adopting RMI mechanism, and the OrbixWeb2.0.1, adopting CORBA specification, respectively. Binding, inheritance, polymorphism, object passing and callbacks across the machine boundary in distributed programming environments are issued. The results show that some differences in the implementation of distributed active objects can have a significant impact on how distributed applications are structured. The comparison between two implementations on the programming environments will be the basis for building the translation system between HORB to OrbixWeb and vice versa.

  • PDF