• Title/Summary/Keyword: JAVA language

Search Result 423, Processing Time 0.027 seconds

A Study on the Development of the SCADA System using the Internet (인터넷을 이용한 SCADA 시스템 구축에 관한 연구)

  • Park, I.K.;Yoon, K.K.;Kim, Y.S.;Lee, S.G.;Ahn, B.W.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07g
    • /
    • pp.2373-2376
    • /
    • 1998
  • This paper describes the development of the SCADA(Supervisory Control and Data Acquisition) system which can be controlled via the Internet. In this paper, the SCADA system is composed of a number of microprocessor-based RTU(Remote Terminal Unit)s, a MMI(Man Machine Interface) host, a SCADA server, and SCADA clients. There are two protocols used in the system. Each RTU and the MMI host are connected by a RS-485 line and CSMA/CD(Carrier Sense Multiple Access / Collision Detection) protocol is used to communicate with each other. TCP/IP(Transmission Control Protocol/Internet Protocol) is used among the MMI host, the SCADA server, and SCADA clients. The equipments installed in the field are controlled by a number of RTUs. The function of the MMI host is to acquire real-time data from RTUs and control them. The SCADA server supports data transfer between the networked MMI host and the SCADA client on the web-server through TCP/lP. Data transfer is possible regardless of the type of network only if there are TCP/lP Winsock-compatible stack driver. The SCADA client is implemented as the shape of web-page by means of JAVA language. Therefore, it runs on a web-browser such as Netscape and Explorer, and allows a number of users to access this SCADA system.

  • PDF

Development of AVL-GIS System Using IDGPS and Wireless Communication Techniques (IDGPS 와 무선통신을 이용한 AVL-GIS 시스템개발)

  • 안충현;양종윤;최종현
    • Spatial Information Research
    • /
    • v.7 no.2
    • /
    • pp.209-221
    • /
    • 1999
  • In this research, AVL-GIS(Automatic Vehicle Location System linked with Geographic Information System) system was developed using integration of core techniques of GIS engine written by Java language, GOS(Global Positioning System) and wireless telecommunication interfacing techniques. IDGPS(Inverted differential GPS) techniques was employed to estimate accurate position of mobile vehicle and to supervise their path from AVL-GLS control center system. Between mobile vehicle and AVL-GLS control center system which has spatial data analysis function, road network and rleate ddata base were connected wireless phone to communicate for position an dmessage in real time. The developed system from this research has more enhanced GIS functions rather than previous AVL oriented system which has MDT for message display and voice communication only. This system can support build-up application system such as fleet management like bus, taxi, truck, disaster and emergency and monitoring of transportation status for customer s order via web browser in filed of EC/CALS in low cost.

  • PDF

A Study on Improvement of 2-Dim Filtering Efficiency for Image (2차원 영상 필터링 효율 향상을 위한 기술연구)

  • Jeon, Joon-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.6
    • /
    • pp.99-110
    • /
    • 2005
  • These days, many image processing techniques have been studied for effective image compression. Among those, The 2D image filtering is widely used for 2D image processing. The 2D image filtering can be implemented by performing the 1D linear filter separately in the horizontal and vertical direction. Efficiency of image compression depends on what filtering method is used. Generally, circular convolution is widely used in 2D image filtering for image processing. However it doesn't consider correlations at the boundary region of image, therefore effective filtering can not be performed. To solve this problem. I proposed new convolution technique using loop convolution which satisfies the 'alias-free' and 'error-free' requirement in the reconstructed image. This method could provide more effective compression performance than former methods because it used highly-correlated data when performed at the boundary region. In this paper, Sub-band Coding(SBC) was adopted to analyze efficiency of proposed filtering technique, and the simulator developed by Java-based language was used to examine the performance of proposed method.

A Study on the GUI Development Methods for GIS Construction under the Intranet Environment (인트라넷 환경에서 GIS 구축을 위한 GUI 개발 방법에 관한 연구)

  • Bu, Ki-Dong;Jo, Myung-Hee
    • Journal of the Korean association of regional geographers
    • /
    • v.4 no.2
    • /
    • pp.139-150
    • /
    • 1998
  • Recently in connection with the development of network technology, GIS researches shift their focuses to openGIS which enables to share heterogeneous geodata and geoprocessing resource under the environment of LAN and WAN. This study proposes an easy method to develope GUIs which enables openGIS in the intranet environment. In the developing stage of GUI, the most important thing is to develop effective windows programming technique and apply a internet linking technique to developed GUIs. This study shows an internet linking technique and a GUI developing method using OLE automation and ActiveX/COM standards. Using a case study of Taegu City Library, the study constructs a GIS database and develops its GUI which performs map overlaying, referencing attribute tables, drawing up of thematic map, buffer analysis, and statistical calculations. This study remains same further research areas of developing a new advanced technique for openGIS and its GUI using distributed object model of CORBA, Java language, and JDBC data accessing technique.

  • PDF

Prediction & Assessment of Change Prone Classes Using Statistical & Machine Learning Techniques

  • Malhotra, Ruchika;Jangra, Ravi
    • Journal of Information Processing Systems
    • /
    • v.13 no.4
    • /
    • pp.778-804
    • /
    • 2017
  • Software today has become an inseparable part of our life. In order to achieve the ever demanding needs of customers, it has to rapidly evolve and include a number of changes. In this paper, our aim is to study the relationship of object oriented metrics with change proneness attribute of a class. Prediction models based on this study can help us in identifying change prone classes of a software. We can then focus our efforts on these change prone classes during testing to yield a better quality software. Previously, researchers have used statistical methods for predicting change prone classes. But machine learning methods are rarely used for identification of change prone classes. In our study, we evaluate and compare the performances of ten machine learning methods with the statistical method. This evaluation is based on two open source software systems developed in Java language. We also validated the developed prediction models using other software data set in the same domain (3D modelling). The performance of the predicted models was evaluated using receiver operating characteristic analysis. The results indicate that the machine learning methods are at par with the statistical method for prediction of change prone classes. Another analysis showed that the models constructed for a software can also be used to predict change prone nature of classes of another software in the same domain. This study would help developers in performing effective regression testing at low cost and effort. It will also help the developers to design an effective model that results in less change prone classes, hence better maintenance.

Implementation of a Hybrid-App of a Path Tracking System Using Geolocation and Maps on Mobile Devices (위치정보와 지도를 이용한 경로추적 시스템의 모바일 기기에서의 하이브리드 앱 구현)

  • Yoo, Moon-Sung
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.633-637
    • /
    • 2013
  • By using geolocation and maps, we need to trace the path of ourselves, others, or the objects. Until now, we used a native apps development mehod to develop path tracking systems in mobile devices such as smart phones and tablet computers. A disadvantage of this method is that we have to work again to provide the same service on different platforms. Web Apps and Hybrid Apps are developed to recover this disadvantage. Since Hybrid Apps look like Native Apps apparently, users prefer Hybrid Apps to Web Apps. In this paper, we develop a hybrid app which can trace the path on mobile devices. The recently suggested next generation markup language, HTML5, has geolocation features. By using them, we implemented a hybrid app for a path tracking system. First, we create a web app using HTML5, CSS, and JavaScript, Then, PhoneGap, a mobile development framework, is used to convert it to the hybrid app. By implementing hybrid app, various apps which need path tracking can be developed rapidly and effectively, regardless of the mobile devices.

A Systematic Literature Survey of Software Metrics, Code Smells and Refactoring Techniques

  • Agnihotri, Mansi;Chug, Anuradha
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.915-934
    • /
    • 2020
  • Software refactoring is a process to restructure an existing software code while keeping its external behavior the same. Currently, various refactoring techniques are being used to develop more readable and less complex codes by improving the non-functional attributes of software. Refactoring can further improve code maintainability by applying various techniques to the source code, which in turn preserves the behavior of code. Refactoring facilitates bug removal and extends the capabilities of the program. In this paper, an exhaustive review is conducted regarding bad smells present in source code, applications of specific refactoring methods to remove that bad smell and its effect on software quality. A total of 68 studies belonging to 32 journals, 31 conferences, and 5 other sources that were published between the years 2001 and 2019 were shortlisted. The studies were analyzed based on of bad smells identified, refactoring techniques used, and their effects on software metrics. We found that "long method", "feature envy", and "data class" bad smells were identified or corrected in the majority of studies. "Feature envy" smell was detected in 36.66% of the total shortlisted studies. Extract class refactoring approach was used in 38.77% of the total studies, followed by the move method and extract method techniques that were used in 34.69% and 30.61% of the total studies, respectively. The effects of refactoring on complexity and coupling metrics of software were also analyzed in the majority of studies, i.e., 29 studies each. Interestingly, the majority of selected studies (41%) used large open source datasets written in Java language instead of proprietary software. At the end, this study provides future guidelines for conducting research in the field of code refactoring.

An Automated Draft Report Generator for Peripheral Blood Smear Examinations Based on Complete Blood Count Parameters

  • Kim, Young-gon;Kwon, Jung Ah;Moon, Yeonsook;Park, Seong Jun;Kim, Sangwook;Lee, Hyun-A;Ko, Sun-Young;Chang, Eun-Ah;Nam, Myung-Hyun;Lim, Chae Seung;Yoon, Soo-Young
    • Annals of Laboratory Medicine
    • /
    • v.38 no.6
    • /
    • pp.512-517
    • /
    • 2018
  • Background: Complete blood count (CBC) results play an important role in peripheral blood smear (PBS) examinations. Many descriptions in PBS reports may simply be translated from CBC parameters. We developed a computer program that automatically generates a PBS draft report based on CBC parameters and age- and sex-matched reference ranges. Methods: The Java programming language was used to develop a computer program that supports a graphical user interface. Four hematology analyzers from three different laboratories were tested: Sysmex XE-5000 (Sysmex, Kobe, Japan), Sysmex XN-9000 (Sysmex), DxH800 (Beckman Coulter, Brea, CA, USA), and ADVIA 2120i (Siemens Healthcare Diagnostics, Eschborn, Germany). Input data files containing 862 CBC results were generated from hematology analyzers, middlewares, or laboratory information systems. The draft reports were compared with the content of input data files. Results: We developed a computer program that reads CBC results from a data file and automatically writes a draft PBS report. Age- and sex-matched reference ranges can be automatically applied. After examining PBS, users can modify the draft report based on microscopic findings. Recommendations such as suggestions for further evaluations are also provided based on morphological findings, and they can be modified by users. The program was compatible with all four hematology analyzers tested. Conclusions: Our program is expected to reduce the time required to manually incorporate CBC results into PBS reports. Systematic inclusion of CBC results could help improve the reliability and sensitivity of PBS examinations.

Fuzzing Method for Web-Assembly Module Safety Validation (웹 어셈블리 모듈 안전성 검증을 위한 퍼징 방법)

  • Park, Sunghyun;Kang, Sangyong;Kim, Yeonsu;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.275-285
    • /
    • 2019
  • Web-assemblies are a new binary standard designed to improve the performance of Web browser JavaScript. Web-assemblies are becoming a new web standard that can run at near native speed with efficient execution, concise representation, and code written in multiple languages. However, current Web-assembly vulnerability verification is limited to the Web assembly interpreter language, and vulnerability verification of Web-assembly binary itself is insufficient. Therefore, it is necessary to verify the safety of the web assembly itself. In this paper, we analyze how to operate the web assembly and verify the safety of the current web-assembly. In addition, we examine vulnerability of existing web -assembly and analyze limitations according to existing safety verification method. Finally, we introduce web-assembly API based fuzzing method to overcome limitation of web-assembly safety verification method. This verifies the effectiveness of the proposed Fuzzing by detecting crashes that could not be detected by existing safety verification tools.

Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain (블록체인을 이용한 위변조 안드로이드 악성 앱 판별)

  • Hwang, Sumin;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.61-68
    • /
    • 2019
  • Although the number of smartphone users is continuously increasing due to the advantage of being able to easily use most of the Internet services, the number of counterfeit applications is rapidly increasing and personal information stored in the smartphone is leaked to the outside. Because Android app was developed with Java language, it is relatively easy to create counterfeit apps if attacker performs the de-compilation process to reverse app by abusing the repackaging vulnerability. Although an obfuscation technique can be applied to prevent this, but most mobile apps are not adopted. Therefore, it is fundamentally impossible to block repackaging attacks on Android mobile apps. In addition, personal information stored in the smartphone is leaked outside because it does not provide a forgery self-verification procedure on installing an app in smartphone. In order to solve this problem, blockchain is used to implement a process of certificated application registration and a fake app identification and detection mechanism is proposed on Hyperledger Fabric framework.