• Title/Summary/Keyword: Object-oriented technique

Search Result 247, Processing Time 0.024 seconds

Analysis of Traffic Card Big Data by Hadoop and Sequential Mining Technique (하둡과 순차패턴 마이닝 기술을 통한 교통카드 빅데이터 분석)

  • Kim, Woosaeng;Kim, Yong Hoon;Park, Hee-Sung;Park, Jin-Kyu
    • Journal of Information Technology Applications and Management
    • /
    • v.24 no.4
    • /
    • pp.187-196
    • /
    • 2017
  • It is urgent to prepare countermeasures for traffic congestion problems of Korea's metropolitan area where central functions such as economic, social, cultural, and education are excessively concentrated. Most users of public transportation in metropolitan areas including Seoul use the traffic cards. If various information is extracted from traffic big data produced by the traffic cards, they can provide basic data for transport policies, land usages, or facility plans. Therefore, in this study, we extract valuable information such as the subway passengers' frequent travel patterns from the big traffic data provided by the Seoul Metropolitan Government Big Data Campus. For this, we use a Hadoop (High-Availability Distributed Object-Oriented Platform) to preprocess the big data and store it into a Mongo database in order to analyze it by a sequential pattern data mining technique. Since we analysis the actual big data, that is, the traffic cards' data provided by the Seoul Metropolitan Government Big Data Campus, the analyzed results can be used as an important referenced data when the Seoul government makes a plan about the metropolitan traffic policies.

Design and Implementation of a Framework Modeler for Intranet Construction Tool (인트라넷 구축 도구를 위한 프레임워크 모델러의 설계 및 구현)

  • Lee, Chang-Mog;Yoo, Cheol-Jung;Chang, Ok-Bae;Lee, Sang-Duck
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.1
    • /
    • pp.63-76
    • /
    • 2001
  • As reusability becomes recognized more importantly, with the introduction of ObjectOriented Programming Languages, developers not only want to reduce development duration, but also to develop a proper system robustly and safely by renovating the Hot Spot in order to reuse the existing framework. When we perform these works, we need the development environment which is the Rapid Application Development tool, and the RAD tools provide us with the convenient development environment. The need of RAD tools is recognized by every Object-Oriented programmer, and many business enterprises are developing them. In this paper, we will present a design and implementation of module-based modeler as a method for developing technique to constmct user-driven Intranet environment for the generation of the program based on the framework. The framework modeler used Java language that is independent on platform, and applied the technique of OMT editor that provides the UML notation partially. Additionally, The modeler also includes the notations that are not supported in OMT editor. In addition to this characteristic, it is structured to develop system consistently with applying the Agent pattern, which is a design pattern suggested by ourselves, to send messages occurred between various Views. The existing MVC(Model-View-Controller) architecture does not have this function. Thus, this tool has a flexibility when user's requirements are changed, or functions are extended.

  • PDF

Process Development and Verification for Construction VE Object Selection of Performance-Oriented (성능중심의 건설VE 대상 선정 프로세스 개발 및 검증)

  • Kim, Soo-Yong;Yang, Jin-Kook
    • Korean Journal of Construction Engineering and Management
    • /
    • v.13 no.4
    • /
    • pp.25-32
    • /
    • 2012
  • The current VE activity is recognizing the VE object selection in job-plan simply as formal procedure. Therefore, many problems are happening in the process of selecting VE object during the preparatory stage. As a result of trying to analysis problems through literature review and expert interview, the problems were surveyed such as the lack of connectivity between preparatory stage and analytical stage, the temporal cost-based restrictions, and lack of recognition in VE team members in the existing method of selecting subjects centering on the high-cost field. Accordingly, this study suggested the improved method of selecting VE objects in order to solve this problem in the stage of selecting VE objects. An improvement method of selecting VE objects is what selects the secondary VE subjects by applying again Fish-Bone diagram and Worth technique based on the primary VE objects, which were selected by the conventional technique of selecting objects in the high-cost field. To verify effectiveness in the proposed improvement method, it tried to apply it to the actual case of the road construction VE project. As result of, the improvement method was analyzed to be considerably effective in comparison with the existing selection method of VE objects. Therefore, the Improvement method will contribute to increasing the VE performance.

A Study on Selection Method of COTS Component Based on the Software Quality Measurement (소프트웨어 품질측정에 의한 상용컴포넌트 선정방법에 관한 연구)

  • Oh, Kie-Sung;Lee, Nam-Yong;Rhew, Sung-Yul
    • The KIPS Transactions:PartD
    • /
    • v.9D no.5
    • /
    • pp.897-902
    • /
    • 2002
  • Because of rapid evolution of software technique, numerous software professionals have been concerned with component based development methodologies. However, it is hard to find out a systematic technique for the selection of COTS (Commercial Off The Shelf) component in consumer position. Up to date, the major of component quality evaluation is object-oriented metric based evaluation methodology. But this paper present four step process and evaluation criteria based on MCDM (Multiple Criteria Decision Making) technique for optimal COTS component selection in consumer position. We considered funtionality, efficiency, usability based on IS0/IEC 9126 for Quality measurement and executed practical analysis about commercial EJB component in internet. This paper show that the proposed selection technique is applicable to optimal COTS component selection.

Early Null Pointer Check using Predication in Java Just-In-Time Compilation (자바 적시 컴파일에서의 조건 수행을 이용한 비어 있는 포인터의 조기검사)

  • Lee Sanggyu;Choi Hyug-Kyu;Moon Soo-Mook
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.7
    • /
    • pp.683-692
    • /
    • 2005
  • Java specification states that all accesses to an object must be checked at runtime if object refers to null. Since Java is an object-oriented language, object accesses are frequent enough to make null pointer checks affect the performance significantly. In order to reduce the performance degradation, there have been attempts to remove redundant null pointer checks. For example, in a Java environment where a just-in-time (JIT) compiler is used, the JIT compiler removes redundant null pointer check code via code analysis. This paper proposes a technique to remove additional null pointer check code that could not be removed by previous JIT compilation techniques, via early null pointer check using an architectural feature called predication. Generally, null point check code consists of two instructions: a compare and a branch. Our idea is moving the compare instruction that is usually located just before an use of an object, to the point right after the object is defined so that the total number of compare instructions is reduced. This results in reduction of dynamic and static compare instructions by 3.21$\%$ and 1.98$\%$. respectively, in SPECjvm98 bechmarks, compared to the code that has already been optimized by previous null pointer check elimination techniques. Its performance impact on an Itanium machine is an improvement of 0.32$\%$.

A Plagiarism Detection Technique for Source Codes Considering Data Structures (데이터 구조를 고려한 소스코드 표절 검사 기법)

  • Lee, Kihwa;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.6
    • /
    • pp.189-196
    • /
    • 2014
  • Though the plagiarism is illegal and should be avoided, it still occurs frequently. Particularly, the plagiarism of source codes is more frequently committed than others since it is much easier to copy them because of their digital nature. To prevent code plagiarism, there have been reported a variety of studies. However, previous studies for plagiarism detection techniques on source codes do not consider the data structures although a source code consists both of data structures and algorithms. In this paper, a plagiarism detection technique for source codes considering data structures is proposed. Specifically, the data structures of two source codes are represented as sets of trees and compared with each other using Hungarian Method. To show the usefulness of this technique, an experiment has been performed on 126 source codes submitted as homework results in an object-oriented programming course. When both the data structures and the algorithms of the source codes are considered, the precision and the F-measure score are improved 22.6% and 19.3%, respectively, than those of the case where only the algorithms are considered.

Design and Implementation of Method Generation based Watermarking Technique for Android Copyright Protection (안드로이드 저작권 보호를 위한 메소드 생성 기반 워터마킹 기법의 설계 및 구현)

  • Park, Heewan
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.1
    • /
    • pp.61-69
    • /
    • 2019
  • As smartphones become widespread, numerous applications are developed and social issues related to software copyright are emerging. Software watermarking is digital watermarking technology applied to software and is a technology that can be used to recognize copyright owners. Generally, Java language is used to develop applications on the Android environment. The Java is an object-oriented language that supports method overloading and overriding. In this paper, we propose and implement a method generation based watermarking technique. As a result of evaluating the overhead due to the watermark, it was confirmed that the increase of the executable file size and the decrease of the execution speed are not large. Using the watermarking technique proposed in this paper, it is expected that copyright information can be verified when illegal copying is suspected or actual program is stolen, and piracy attempts will be prevented in advance.

Comparison of Major Black-Box Testing Methods in Object-Oriented Software (객체지향 소프트웨어를 위한 주요 블랙박스 테스트 기법들의 비고)

  • Seo, Kwang-Ik;Choi, Eun-Man
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.1
    • /
    • pp.1-16
    • /
    • 2006
  • As the size of software is getting huge, it has been impossible for testers to test all of source coed. Therefore, the method which uses information of requirements for testing has been researched and accepted. Although there are a lot of test methods based on requirement specification, each method has a different approach and coverage. So we should consider their various approach and coverage in the stage of test planning. This paper presents the empirical comparison and the result by applying various black-box testing methods to software system. For this experiment we studied five black-box testing methods including UML based specification technique. We applied the five testing methods to application system and evaluated the coverage of extracted test case.

(Performance Monitoring Techniques for EJB Applications) (EJB 어플리케이션의 성능 모니터링 기법)

  • 나학청;김수동
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.5_6
    • /
    • pp.529-539
    • /
    • 2003
  • Due to the emersion of J2EE (Java 2, Enterprise Edition), many enterprises inside and outside of the country have been developing the enterprise applications appropriate to the J2EE model. With the help of the component model of Enterprise JavaBeans (EJB) which is the J2EE core technology, we can develop the distributed object applications quite simple. EJB application can be implemented by using the component-oriented object transaction middleware and the most applications utilize the distributed transaction. Due to these characteristics, EJB technology became popular and then the study for EJB based application has been done quite actively. However, the research of techniques for the performance monitoring during run-time of the EJB applications has not been done enough. In this paper, we propose the techniques for monitoring the performance of EJB Application on the run time. First, we explore the workflow for the EJB application service and classily the internal operation into several elements. The proposed techniques provide monitoring the performance elements between the classified elements. We can also monitor by extracting the performance information like state transition and process time of the bean which is related to the lifetime occurred during one workflow, and the resource utilization rate.

Exporting Business Process Modeling using IDEF3 and UML (IDEF3와 UML을 이용한 수출영업업무 프로세스 모델링)

  • 김병남;김태운;김홍배;이영일;이광욱
    • Journal of Intelligence and Information Systems
    • /
    • v.7 no.2
    • /
    • pp.179-193
    • /
    • 2001
  • A good modeling technique for system analysis and design is an essential area for the implementation of information system. Structured and object-oriented techniques are regarded as two standard in system modeling. This paper reviewed and implemented two system analysis and design techniques based-on IDEF3 and UML. IDEF3 is the first method used to analyze business process, which has the advantage of simplicity and brevity. UML provides visual standard which can represent the idea of system analysis from the people who participate in the system development process. UML is accepted as an industry standard from the object management group with the advantage of graphical representation of developer\`s view. This paper proposes system design and modeling perspectives based-on IDEF3 and UML techniques about the semi-structured business process for the medium-sized trading company.

  • PDF