• Title/Summary/Keyword: Legacy Systems

Search Result 338, Processing Time 0.025 seconds

Design and Implementation of a General-Purpose Document Repository System for the ebXML Based e-Biz Framework (ebXML기반 e-비즈니스 프레임워크를 위한 범용 문서저장 관리 시스템의 설계 및 구현)

  • Lim Cheol Su
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.1
    • /
    • pp.128-136
    • /
    • 2005
  • In this paper, we designed and implemented the general-purpose document repository manager for the ebXML-based e-business framework that support the rapid translation of various types of documents and provide the flexibility corresponding to the framework changes. Also, we automated the manually-processed e-business document translation process by designing the adaptor module for the interoperability of legacy systems. In the regards, our designed general purpose document manager makes it possible to integrate the existing e-commerce systems that are operated on the heterogeneous frameworks, and can be used on global e-business solution.

  • PDF

Development of HIS System through the HL7-Based Combination of Legacy System (레거시 시스템과의 HL7 기반 연동을 통한 HIS 시스템 개발)

  • Lee Sang-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.55-62
    • /
    • 2004
  • Tn the modern integrated healthcare environment, digital technology plays a critical role in the success of its operation. For overcoming the deteriorated healthcare management environment is to improve business service ability, cost and management efficiency through information processing of the business service process and the decision support system. For a solution of these problems, the Hospital Information System(HIS) was introduced. In this paper we proposed HIS system through the HL7-based with legacy system that improves both the efficiencies of medical of office and medical treatments. The implementation of HIS system enables combination of legacy systems including HL7 based OCS and PACS. And we proved the effective HIS development method provided by analysis of total module.

  • PDF

C2JNI: An Embedded C to JNI Translator (C2JNI: 내장 C 언어에서 JNI 코드를 생성하는 변환기)

  • 유재우;최종명;김영철
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.11
    • /
    • pp.1551-1559
    • /
    • 2004
  • Java, a platform independent object-oriented programming language, is widely used, however it should be integrated with JNI to use system services or to reuse legacy systems. Though JNI provides the standard APIs which allow Java to be combined with C/$C^{++}$, it is very hard and cumbersome for developers to use JNI APIs. In order to address this problem, we introduce a translator named C2JNI, which converts the embedded C program into a JNI compatible C program. With C2JNI, developers can Integrate Java and C programs without JNI APIs, and it will reduce the complexity caused by JNI APIs.

An Optimal Orthogonal Overlay for Fixed MIMO Wireless Link (고정된 MIMO 환경에서의 최적의 직교 오버레이 시스템 설계)

  • Yun, Yeo-Hun;Cho, Joon-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10C
    • /
    • pp.929-936
    • /
    • 2009
  • In this paper, we consider designing a multi-input multi-output (MIMO) overlay system for fixed MIMO wireless link, where a frequency flat narrowband channel is shared by multiple transmitter and receiver pairs. Assuming the perfect knowledge of the second-order statistics of the received legacy signals and the composite channels from the overlay transmitter to the legacy receivers, the jointly optimal linear precoder and decoder matrices of the MIMO overlay system is derived to minimize the total mean squared error (MSE) of the data symbol vector, subject to total average transmission power and zero interference induced to legacy MIMO systems already existing in the frequency band of interest. Furthermore, the necessary and sufficient condition for the existence of the optimal solution is also derived.

A Design Technique of Meta-Model for Reengineering from Legacy to CBD (레거시로부터 CBD로의 재공학을 위한 메타 모델 설계 기법)

  • Kim Chul-Jin;Cho Eun-Sook
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.3
    • /
    • pp.398-412
    • /
    • 2005
  • There is an increasing interest in migration legacy systems to new hardware platforms and to new software development paradigms. The reason is that high maintenance costs and lack of documentation. In order to migrate or transform legacy system, various approaches such as screen scrapping, wrapping, semi-development, and re-development, tools, and methodologies are introduced until now. However, architecture or requirements level's transformation is not suggested because most of those approaches focus on code-level transformation or a few model-level transform. In this paper, we suggest a meta-model driven approach applying 3D space concept, which can be applied into architecture and requirement phase. Proposed integrated model drives seamless migration or co-evolution from code to architecture of reverse engineering and from architecture to code of forward engineering.

  • PDF

Development of Low Latency Secure Communication Device for Legacy SCADA (저지연 Legacy SCADA 보안 통신장치 개발)

  • Choi, Moon-Suk;Kim, Chung-Hyo;Lim, You-Seok;Ju, Seong-Ho;Lim, Yong-Hun;Jeon, Kyung-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.339-346
    • /
    • 2013
  • As the need for security of SCADA systems is increasing, significant progress has been made in research on security of control protocol. However, very few security solutions were adapted to legacy SCADA system. The reasons for non-adoption are latency, cost and key management problem. We propose a low latency, economic security Solution to solve these issues. The proposed solution performs security function in data link layer and has minimum overhead to minimize latency. Furthermore, we try to solve the key management problem by providing systematic security keys and key distribution method.

Context-aware Ontology Modeling using by Legacy Home Appliences (생활기기 센서를 이용한 상황인지 온톨로지 모델링)

  • Lee, Eunyoung;Min, Ukki;Won, Yusuk;Kim, Bonam
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.737-740
    • /
    • 2013
  • The widespread use of smart home appliances with smart home networking is leading to a next generation of a new technology that exploit user contextual information to provide a richer experience. However, in the most part of home networking systems the intelligent personalization services between user and home appliances have not been adequately supplied in respect of the long lifespan of the legacy home appliances. In addition, without installing smart home appliances when constructing new building the users can not use this service. To use this service, the legacy home appliance need to attach enabler equipped with the various sensors just as it is smart home appliances. The goal is to create a service that enables appliances to exchange information and control their actions through the IoT gateway to achieve nonintrusive behavior and customized services without human intervention. In this paper, we propose a ontology model to represent the user context to be able to induce right service automatically and use it to discover, utilize and enhance different services in real time that the user may be interested in.

  • PDF

Runtime Fault Detection Method based on Context Insensitive Behavioral Model for Legacy Software Systems (레거시 소프트웨어 시스템을 위한 문맥 독립적 행위 기반 실시간 오작동 탐지 기법)

  • Kim, Suntae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.9-18
    • /
    • 2015
  • In recent years, the number of applications embedded in the various devices such as a smart phone is getting larger. Due to the frequent changes of states in the execution environment, various malfunctions may occur. In order to handle the issue, this paper suggests an approach to detecting method-level failures in the legacy software systems. We can determine if the software executes the abnormal behavior based on the behavior model. However, when we apply the context-sensitive behavior model to the method-level, several problems happen such as false alarms and monitoring overhead. To tackle those issues, we propose CIBFD (Context-Insensitive Behavior Model-based Failure Detection) method. Through the case studies, we compare CIBFD method with the existing method. In addition, we analyze the effectiveness of the method for each application domains.

A Transaction Scheme for Managing Mobile Units in Wireless Environments: A Case of Airport Safety Control (무선환경에서의 이동객체 관리를 위한 통제기법: 공항 안전통제 업무를 중심으로)

  • Kim, Yong-Jae;Ahn, Hyun-Sup;Lee, Seog-Jun;Hyun, Doo-Woon;Choi, Yong-Goo;Lee, Sang-Won
    • Information Systems Review
    • /
    • v.10 no.2
    • /
    • pp.309-327
    • /
    • 2008
  • This research is a byproduct of a project initiated by a major airport in Korea. The airport aimed to enhance airside safety and weighed a few IT options that may strengthen its current safety practices. In order to satisfy requirements unique to the airport and to inherit existing legacy systems, a PCS-based mobile database system was proposed. We first discuss technical aspects of the system as well as design issues in mobile systems before we compare two specific alternatives for transactional service handoff. A simulation study comparing two types of coordination follows before we present a scheme that manages transaction processing and locating service in mobile environments. Finally, we discuss the limitations of the scheme from the perspectives of the airport in question along with other research issues.