• Title/Summary/Keyword: Java-environment software

Search Result 119, Processing Time 0.017 seconds

An Implementation of a Component Repository based on J2EE Application Model (J2EE 어플리케이션 모델 기반의 컴포넌트 저장소 구현)

  • 안성아;최희석;염근혁
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.1
    • /
    • pp.77-93
    • /
    • 2002
  • Now we are following component-based software development as a solution to improve the reusability, reliability, and extensibility of the software. To support these, the developed components must be reused through component repository at software development. However, traditional centralized repositories couldn't activate component markets since not only the number of users were restricted but also most of the provided components were those on clients like user interface and so on. Recently, a lot of server-side components, reused in a specific domain, have appeared thanks to the development of both Internet technology and component technology such as EJB, DCOM, etc. Therefore, component repositories, based on domain information, classify and provide components and must offer web-based service for many users to use it stably. This study introduces the implementation of a component repository based on J2EE application model. It provides application developers with the service to search and extract appropriate components, and supplies them reliable services in web environment.

  • PDF

Supporting WebDAV-based Remote Workspaces for Eclipse IDE (이클립스 통합 개발 환경에서의 WebDAV 기반 원격작업공간 지원)

  • Kim, Seong-Hune;Lee, Hong-Chang;Lee, Myung-Joon
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.97-114
    • /
    • 2008
  • Eclipse is an open integrated environment for software development, rapidly emerging as the de facto standard for developing java applications. Also, it is easily extensible since new functions for the environment can be added through the installation of various plug-in modules. WebDAV is an IETF standard protocol, which is an extended version of HTTP 1.1, supporting asynchronous collaborative authoring of various contents on the web. In this paper, we describe the development of the DAVSpace plug-in which enables programmers to use remote workspaces offered by WebDAV servers as project workspaces for software development in Eclipse. Based on the WebDAV protocol, DAVSpace supports the management of resources on the remote workspaces associated with projects in Eclipse. Using DAVSpace, we can create a project in Eclipse on a designated remote workspace in addition to the default local workspace. Whenever an event for storing a resource is generated, DAVSpace stores the resource into both workspaces. Thanks to DAVSpace, developers can effectively proceed their projects regardless of where they are located.

  • PDF

Design Patterns for Realizing Object-Oriented Inheritance in EJB Environment (EJB 환경에서 객체지향 상속 관계 설계 패턴)

  • Choi, Si-Won;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.11D no.1
    • /
    • pp.153-162
    • /
    • 2004
  • Software development methodology using object-oriented analysis and design techniques for improving productivity and maintainability has acquired a substantial acceptance in both academia and industry as a fundamental paradigm. Enterprise Java Beans (EJB) is widely used in both academia and industry because it provides high unability and rapid application development. EJB supports object-oriented paradigm, but there are several things to consider when designing detail model of object-oriented model or implementing object-oriented model with EJB model. One of them is inheritance problem. In this paper, we classify the types of class inheritance which is shown upon in object-oriented model into three types and identify the problems which can happen when implementing the inheritance mechanism with EJB model. And this paper proposes three patterns for realizing the inheritance in EJB. Moreover, applicable patterns and guidelines for each object-oriented inheritance types for the proposed patterns are suggested.

IMMORTAL : Fault Tolerant Distributed Middleware System based on Remote Method Invocation (IMMORTAL : 원격 메쏘드 호출에 기반한 결함허용 분산 미들웨어 시스템)

  • Hyun, Mu-Yong;Kim, Shik;Kim, Myung-Jun;Yamakita, Jiro
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.562-572
    • /
    • 2002
  • Distributed object technologies have become popular in developing distributed systems. Although such middleware platforms as DSOM, DCOM, CORBA and Java RMI ease the development of distributed applications, they do not directly improve the reliability and the availability of these applications. Because the task of developing fault-tolerance techniques for distributed object paradigms is often complicated and error-prone, there is a great need for a development toolkit that enhances the reliability and the availability of distributed objects. In this paper, we propose a fault-tolerant distributed middleware system based on RMI, called IMMORTAL. We use a log-based rollback-recovery mechanism for supporting reliable distributed computing. Through a series of experiments, we observe that benchmark applications on the IMMORTAL tolerate hardware and software failures and evaluate its performance and scalability.

e-Engineering Framework to Support Collaborative Design of Automotive Suspension Systems (협업설계를 위한 엔지니어링 프레임워크 개발에 관한 연구 -자동차 서스펜션 모듈에의 적용-)

  • Park, Seong-Whan;Lee, Jai-Kyung;Lee, Han-Min
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.21 no.6
    • /
    • pp.555-561
    • /
    • 2008
  • This paper describes an e-Engineering framework to support collaborative design of automotive suspension systems developed at KIMM(Korea Institute of Machinery and Materials). The e-Engineering framework is proposed and developed on the base of the multi-layered software agents including engineering task agent which is generated from the domain knowledge of experts. The developed framework is aim to widely spread application to the small and medium enterprises by adopting open source technologies such as JADE (Java Agent Development Framework) and by using the independent characteristics related with applicant H/W and 81W system. This framework can provide an integrated design environment to support distributed personnel, design activities and engineering resources during product development process. For the validation of the system's applicability and efficiency, the several practical design processes for automotive suspension systems of RR/FR lower arms and RR cross member are applied and discussed.

Design and implementation of the focusable table component for mobile application using the WFC (모바일 GUI를 지원하는 WFC에서 포커싱 가능한 테이블 컴포넌트의 설계 및 구현)

  • Jun, Jong-Chan;Kim, Jeong-Ik;Kang, Young-Man;Han, Soon-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.485-492
    • /
    • 2010
  • In this paper, we propose a focusable table component for mobile application to support table form representation of various contents and manipulation such as focusing on the contents using the WFC which is a software module to support components of the window based GUI package. It is not easy for us to express contents with table attributes on mobile devices. Java provides several table components, but these are not suitable on the mobile environment. So we design and develop the extended table component to provide properly table form representation and manipulation on the mobile devices. Also, we provide a performance comparison between th supposed table component and Java Swing's JTable.

Toward Design and Implement to Multiple Schemes for Strong Authentication Mechanism - Case Studying : Secure Entrance System - (다단계 사용자 신분확인 메커니즘 설계와 구현 방안 : 출입통제 시스템 사례 중심으로)

  • Hong Seng-Phil;Kim Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.161-172
    • /
    • 2006
  • As the innovative technologies related to ubiquitous computing are being rapidly developed in recent IT trend, the concern for IT dysfunction(e.g., personal information abuse, information risk, threat, vulnerability, etc.) are also increasing. In our study, we suggested how to design and implement to multiple schemes for strong authentication mechanism in real system environments. We introduce the systematic and secure authentication technologies that resolve the threats incurring from the abuse and illegal duplication of financial transaction card in the public and financial institutions. The multiple schemes for strong authentication mechanism applied to java technology, so various application programs can be embedded, Independent of different platforms, to the smartcard by applying the consolidated authentication technologies based on encryption and biometrics(e.g., finger print identification). We also introduce the appropriate guidelines which can be easily implemented by the system developer and utilized from the software engineering standpoint of view. Further, we proposed ways to utilize java card based biometrics by developing and applying the 'smartcard class library' in order for the developer and engineers involved in real system environment(Secure entrance system) to easily understand the program. Lastly, we briefly introduced the potential for its future business application.

  • PDF

The implementation of sign design simulation software (사인디자인 제작 체험 시뮬레이션 소프트웨어 개발)

  • Paik, Jin-Kyung;Lee, Kyung-Mi;Yeoun, Myeong-Heum
    • Archives of design research
    • /
    • v.19 no.2 s.64
    • /
    • pp.163-172
    • /
    • 2006
  • Sign is one of the important factors in city and national image formation, thus requires high level of quality. However, domestic sign emphasize only the sense of attention that leads to big sized signs, thus often results in a poor coordination with the surrounding space. This situation requires employees in sign business want to learn specialized knowledge about design field. Based on these circumstances, we propose sign design software to employees in sign business field as an aid tool that can help to develop good signs in terms of functionality as well as harmony of design. Thus, in this investigation, sign simulation software application case that can design sign and apply this sign to the actual application site is presented. In order to develop this software, literature survey and preliminary studies were performed to analyze the preparation process and environment, and designed sign design element and software elements, user interrace, and finally Java software were utilized. This developed software can be used as a textbook in sign design related departments in schools, and hopefully to enhance the social recognition of sign as well as academic interest.

  • PDF

A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS

  • Behrens, Reinhard;Ahmed, Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6092-6115
    • /
    • 2017
  • This paper demonstrates a case for an end-to-end pure Application Security Layer for reliable and confidential communications within an Internet of Things (IoT) constrained environment. To provide a secure key exchange and to setup a secure data connection, Transport Layer Security (TLS) is used, which provides native protection against replay attacks. TLS along with digital signature can be used to achieve non-repudiation within app-to-app communications. This paper studies the use of TLS over the JavaScript Object Notation (JSON) via a The Constrained Application Protocol (CoAP) RESTful service to verify the hypothesis that in this way one can provide end-to-end communication flexibility and potentially retain identity information for repudiation. As a proof of concept, a prototype has been developed to simulate an IoT software client with the capability of hosting a CoAP RESTful service. The prototype studies data requests via a network client establishing a TLS over JSON session using a hosted CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages was intercepted and verified against simulated MITM attacks. The experimental results confirm that TLS over JSON works as hypothesised.

A Proposal Of The Horizontality Development Method On The Spring MVC (스프링 MVC에서 수평 개발 방법의 제안)

  • Yang, Ill Deung;Kim, Seong Ryeol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2350-2358
    • /
    • 2015
  • The Spring framework including the MVC design concept is the standard in web development in the JAVA environment. The programming style of the structure must be kept strictly, so every web program is able to employ the same structure. It is convenient to distribute jobs, but there are some side effects, like duplication of code, deterioration of professionalization, and deterioration of program performance. To ameliorate those problems, we propose the horizontality development method(HDM) on Spring MVC. We proved that the HDM can solve the problems through the experiment to keep the MVC structure.