• 제목/요약/키워드: Software Design and Implementation

검색결과 1,393건 처리시간 0.034초

Safety-critical 소프트웨어 적용을 위한 소프트웨어 개발 절차 (A Software Engineering Process for Safety-critical Software Application)

  • Kang, Byung-Heon;Kim, Hang-Bae;Chang, Hoon-Seon;Jeon, Jong-Sun;Park, Suk-Joon
    • Nuclear Engineering and Technology
    • /
    • 제27권1호
    • /
    • pp.84-95
    • /
    • 1995
  • Application of computer software to safety-critical systems is on the increase. To be successful, the software must be designed and constructed to meet the functional and performance requirements of the system. For safety reason, the software must be demonstrated not only to meet these requirements, but also to operate safely as a component within the system. For longer-term cost consideration, the software must be designed and structured to ease future maintenance and modifications. This paper present a software engineering process for the production of safety-critical software for a nuclear power plant The presentation is expository in nature of a viable high quality safety-critical software development. It is based on the ideas of a rational design process and on the experience of the adaptation of such process in the production of the safety-critical software for the Shutdown System Number Two of Wolsong 2, 3 & 4 nuclear power generation plants. This process is significantly different from a conventional process in terms of rigorous software development phases and software design techniques. The process covers documentation, design, verification and testing using mathematically precise notations and highly reviewable tabular format to specify software requirements and software design. These specifications allow rigorous, stepwise verification of software design against software requirements, and code against software design using static analysis. The software engineering process described in this paper applies the principle of information-hiding decomposition in software design using a modular design technique so that when a change is' required or an error is detected, the affected scope can be readily and confidently located. It also facilitates a sense of high degree of confidence in the ‘correctness’ of the software production, and provides a relatively simple and straightforward code implementation effort.

  • PDF

메타데이터 기반 응용프로그램 생성기 설계 (A Design of the Application Program Generator based on Meta-Data)

  • 김치수;오은진
    • 정보처리학회논문지D
    • /
    • 제11D권7호
    • /
    • pp.1477-1482
    • /
    • 2004
  • 소프트웨어 개발은 보통 요구사항, 분석, 설계, 구현, 그리고 테스팅의 5단계의 과정으로 이루어진다. 개발과정 중 시스템 설계의 빈번한 변화와 그에 따른 프로그래밍의 어려움으로 인한 시스템 설계와 구현 사이에 항상 불일치가 발생하게 된다. 본 논문에서는 시스템 설계와 구현 사이의 불일치를 줄이고, 소프트웨어 개발이 신속하고 유연하게 되도록 비즈니스 로직을 인식하여 응용프로그램을 생성시켜주는 도구를 설계하였다. 응용 프로그램 생성기의 핵심 아이디어는 같은 영역에 있는 비즈니스 애플리케이션을 첫째, 공통의 비즈니스 로직과 화면표시 로직으로 나누어 인식한다. 둘째, 시스템 디자인을 지속적인 메타데이터로 다룬다. 셋째, 지속적인 메타데이터를 사용해서 요구사항에 맞는 비즈니스 에플리케이션을 구축하거나 커스터마이즈한다.

데이터망을 통한 교환기 소프트웨어 원격 적용 시스팀 (An Implementation of ESS Software Remote Application System)

  • 민경원;오원욱편용헌정태진
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 1998년도 추계종합학술대회 논문집
    • /
    • pp.221-224
    • /
    • 1998
  • Software release over the network is the most efficacious way of software update. Software release of electronic switching system, considering its environments, is the typical case that is in need of adopting the method. The media of transferring software and data of TDX-10A electronic switching system are magnetic tapes containing them, so the MT must be delivered between remotely placed office and package generation system. SMART-10A system provides the file tranfer on the data network between TDX-10A and the package generation system and ability of remote application of new software. This paper shows the implementation of file transfer between TDX-10A and computer system connected by data networks, status handling for duplicated system, and monitor process design with IPC on UNIX system.

  • PDF

디자인 패턴을 적용한 닷넷 리모팅 공통 프레임워크 설계 및 구현 (Design and Implementation of .NET Remoting Common Framework Applied Design Pattern)

  • 강윤성;이준환;조한진
    • 한국콘텐츠학회논문지
    • /
    • 제11권3호
    • /
    • pp.36-47
    • /
    • 2011
  • 현재의 소프트웨어 개발의 주요 쟁점은 재사용 가능한 유연한 소프트웨어의 개발이다. 이미 많은 소프트웨어의 성공적인 개발 경험은 소프트웨어의 환경에 따라 또는 구현하려는 모듈의 성격에 따라 공통된 모습을 패턴으로 추출하여 제시되고 있다. 경험된 패턴을 개발하고자 하는 목적에 맞게 선택하여 이를 재사용하면 빠르고 정확하게 소프트웨어를 개발할 수 있다. 이러한 개발은 성공과 실패에 따라 다른 새로운 경험이 되고 다시 재사용 된다. 소프트웨어 개발에 있어서 디자인 패턴의 적용은 선택이 아닌 필수 사항이 되었다. 본 논문에서는 재사용 가능한 소프트웨어 개발을 위해 분산통신 서비스 기술 중 하나인 닷넷 리모팅 기술을 사용하여 디자인 패턴을 적용한 공통 프레임워크를 설계하고 구현한다.

임베디드시스템을 사용한 시스템온칩 (The SoC using Embedded Systems)

  • 박춘명
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2007년도 춘계종합학술대회
    • /
    • pp.481-484
    • /
    • 2007
  • 본 논문에서는 임베디드시스템에 기초를 둔 시스템온칩을 구성하는 방법을 제안하였다. 제안한 방법은 이전의 방법에 비해 좀 더 콤팩트하고 효과적이다. 이 방법은 높은 수행시뮬레이션을 요구하고 하드웨어/소프트웨어 통합설계 툴을 사용하여 구현을 위한 실행 가능한 규격화된 적절함을 요구한다. 시스템 인터페이스 처럼 이미 존재하고 있는 부품의 재사용은 지원되지만, 작업 이후는 단지 하드웨어/소프트웨어 통합설계 툴의 프로그램에 의해 수행되어진다. 실제 설계 흐름은 모든 프로세스를 통하여 요구되는 구현으로부터 모든 설계 단계 사이의 궤환을 허용하게끔 설명되어진다. 향후 좀더 진보된 임베디드시스템에 기초를 둔 시스템은칩을 구성하는 방법이 요구된다.

  • PDF

Design and Implementation of Secure 3-Tier Web Application with Open Source Software

  • 김창수;유혜인;이용주
    • 디지털산업정보학회논문지
    • /
    • 제6권1호
    • /
    • pp.33-54
    • /
    • 2010
  • Providing a secure 3-tier Web application has become a high priority for companies as e-businesses have increased the amount and the sensitivity of corporate information that can be accessed through the web. Web applications become more difficult to secure with this very increase in online traffic and transactions. This paper first reviews the 3-tier of web application, types of attacks that can threaten web application services and security principles. We then are designing and implementing a secure web application with open source software that able to mitigate the web application vulnerable to attack.

저전력 센서 네트워크 노드용 SHA-1 해쉬함수 구현 분석 (Analysis of implementation of SHA-1 hash function for Low power Sensor Network)

  • 최용제;이항록;김호원
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2006년도 하계종합학술대회
    • /
    • pp.201-202
    • /
    • 2006
  • In this paper, we achieved software and hardware implementation of SHA-1 hash function for sensor network. We implemented the software to be compatible with TinySec. In hardware design, we optimized operation logics for small area of hardware and minimized data transitions of register memory for low power design. Designed the software and hardware is verified on commercial sensor motes and our secure motes respectively.

  • PDF

컴포넌트를 이용한 게임 개발의 분석 및 설계에 관한 연구 (A Study on the Design and Analysis of Component based Game Development)

  • 정해룡;정광호
    • 한국게임학회 논문지
    • /
    • 제1권1호
    • /
    • pp.73-79
    • /
    • 2001
  • The objective of this paper is to systematically establish the development of game software through the fusion of game implementation and component methodology. The development of game software has inconsistently accomplished without the consistent frame for the analysis and design of game development in the domestic environments. Therefore in case of the development of game software based on game component, although a lot of resources were required in the initial the accumulation of experience and the technology of reuse lead to the efficiency of the maintenance ultimately.

  • PDF

Design and Implementation of UAV System for Autonomous Tracking

  • Cho, Eunsung;Ryoo, Intae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권2호
    • /
    • pp.829-842
    • /
    • 2018
  • Unmanned Aerial Vehicle (UAV) is diversely utilized in our lives such as daily hobbies, specialized video image taking and disaster prevention activities. New ways of UAV application have been explored recently such as UAV-based delivery. However, most UAV systems are being utilized in a passive form such as real-time video image monitoring, filmed image ground analysis and storage. For more proactive UAV utilization, there should be higher-performance UAV and large-capacity memory than those presently utilized. Against this backdrop, this study described the general matters on proactive software platform and high-performance UAV hardware for real-time target tracking; implemented research on its design and implementation, and described its implementation method. Moreover, in its established platform, this study measured and analyzed the core-specific CPU consumption.

Efficient Implementation of the MQTT Protocol for Embedded Systems

  • Deschambault, Olivier;Gherbi, Abdelouahed;Legare, Christian
    • Journal of Information Processing Systems
    • /
    • 제13권1호
    • /
    • pp.26-39
    • /
    • 2017
  • The need for embedded devices to be able to exchange information with each other and with data centers is essential for the advent of the Internet of Things (IoT). Several existing communication protocols are designed for small devices including the message-queue telemetry transport (MQTT) protocol or the constrained application protocol (CoAP). However, most of the existing implementations are convenient for computers or smart phones but do not consider the strict constraints and limitations with regard resource usage, portability and configuration. In this paper, we report on an industrial research and development project which focuses on the design, implementation, testing and deployment of a MQTT module. The goal of this project is to develop this module for platforms having minimal RAM, flash code memory and processing power. This software module should be fully compliant with the MQTT protocol specification, portable, and inter-operable with other software stacks. In this paper, we present our approach based on abstraction layers to the design of the MQTT module and we discuss the compliance of the implementation with the requirements set including the MISRA static analysis requirements.