• Title/Summary/Keyword: Software design and implementation

Search Result 1,394, Processing Time 0.043 seconds

A Software Engineering Process for Safety-critical Software Application (Safety-critical 소프트웨어 적용을 위한 소프트웨어 개발 절차)

  • Kang, Byung-Heon;Kim, Hang-Bae;Chang, Hoon-Seon;Jeon, Jong-Sun;Park, Suk-Joon
    • Nuclear Engineering and Technology
    • /
    • v.27 no.1
    • /
    • pp.84-95
    • /
    • 1995
  • Application of computer software to safety-critical systems is on the increase. To be successful, the software must be designed and constructed to meet the functional and performance requirements of the system. For safety reason, the software must be demonstrated not only to meet these requirements, but also to operate safely as a component within the system. For longer-term cost consideration, the software must be designed and structured to ease future maintenance and modifications. This paper present a software engineering process for the production of safety-critical software for a nuclear power plant The presentation is expository in nature of a viable high quality safety-critical software development. It is based on the ideas of a rational design process and on the experience of the adaptation of such process in the production of the safety-critical software for the Shutdown System Number Two of Wolsong 2, 3 & 4 nuclear power generation plants. This process is significantly different from a conventional process in terms of rigorous software development phases and software design techniques. The process covers documentation, design, verification and testing using mathematically precise notations and highly reviewable tabular format to specify software requirements and software design. These specifications allow rigorous, stepwise verification of software design against software requirements, and code against software design using static analysis. The software engineering process described in this paper applies the principle of information-hiding decomposition in software design using a modular design technique so that when a change is' required or an error is detected, the affected scope can be readily and confidently located. It also facilitates a sense of high degree of confidence in the ‘correctness’ of the software production, and provides a relatively simple and straightforward code implementation effort.

  • PDF

A Design of the Application Program Generator based on Meta-Data (메타데이터 기반 응용프로그램 생성기 설계)

  • Kim Chi Su;Oh Eun Jin
    • The KIPS Transactions:PartD
    • /
    • v.11D no.7 s.96
    • /
    • pp.1477-1482
    • /
    • 2004
  • Software development process consists of five phases : requirement, analysis, design, implementation and testing. There is almost always a gap between the system design and implementation stages, caused by a combination of the difficulty of programming and frequent changes on the system design. The goal of this paper is to reduce the gap between system design and implementation, and we design a tool producing a application program by recognizing business logic for a more rapid and flexible developing of software. The core idea of Application Program Generator is : firstly, to recognize that business application in the same domain share business logic and presentation logic : secondly, to treat system design as persistent meta-data ; thirdly, to use the persistent meta-data to build or customize applications as required.

An Implementation of ESS Software Remote Application System (데이터망을 통한 교환기 소프트웨어 원격 적용 시스팀)

  • 민경원;오원욱편용헌정태진
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.221-224
    • /
    • 1998
  • Software release over the network is the most efficacious way of software update. Software release of electronic switching system, considering its environments, is the typical case that is in need of adopting the method. The media of transferring software and data of TDX-10A electronic switching system are magnetic tapes containing them, so the MT must be delivered between remotely placed office and package generation system. SMART-10A system provides the file tranfer on the data network between TDX-10A and the package generation system and ability of remote application of new software. This paper shows the implementation of file transfer between TDX-10A and computer system connected by data networks, status handling for duplicated system, and monitor process design with IPC on UNIX system.

  • PDF

Design and Implementation of .NET Remoting Common Framework Applied Design Pattern (디자인 패턴을 적용한 닷넷 리모팅 공통 프레임워크 설계 및 구현)

  • Kang, Yun-Sung;Lee, Jun-Hwan;Cho, Han-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.3
    • /
    • pp.36-47
    • /
    • 2011
  • The main issue in the current software development is the development of a reusable and flexible software. Already many successful software development experiences have been proposed to extract patterns of common look, depending on the software environment or depending on the nature of the module you want to implement. Can develop the software quickly and accurately to select fit for the purpose of developing and reuse using experienced patterns. These developments are depending on the success and failure become a new experience and reuse again. Apply design pattern in software development is required, was not an option. In this paper, design and implement to a common framework applied design patterns for the development of reusable software using .NET Remoting in one of the technologies of distributed communication services.

The SoC using Embedded Systems (임베디드시스템을 사용한 시스템온칩)

  • Park, Chun-Myoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.481-484
    • /
    • 2007
  • This paper presents a method of constructing the system-on-chip(SoC) based on embedded systems. The proposed method is more compact and effectiveness than former methods. The requirements generation start high level performance simulation and then passes to an executable specification suitable for implementation using a hardware/software co-design tool. The reuse of pre-exiting components is supported, as well as synthesis of the system interface, but only after much work is done to program the hardware/software co-design tool. The actual design flow described allows feedback among all design levels, e.g. from implementation up to requirements, throughout the process. In the future, it is necessary to development the advanced method of constructing system-on-chip based on embedded systems.

  • PDF

Design and Implementation of Secure 3-Tier Web Application with Open Source Software

  • Kim, Chang Su;Low, Hooi Yin;Lee, Yong Ju
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.1
    • /
    • pp.33-54
    • /
    • 2010
  • Providing a secure 3-tier Web application has become a high priority for companies as e-businesses have increased the amount and the sensitivity of corporate information that can be accessed through the web. Web applications become more difficult to secure with this very increase in online traffic and transactions. This paper first reviews the 3-tier of web application, types of attacks that can threaten web application services and security principles. We then are designing and implementing a secure web application with open source software that able to mitigate the web application vulnerable to attack.

Analysis of implementation of SHA-1 hash function for Low power Sensor Network (저전력 센서 네트워크 노드용 SHA-1 해쉬함수 구현 분석)

  • Choi, Yong-Je;Lee, Hang-Rok;Kim, Ho-Won
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.201-202
    • /
    • 2006
  • In this paper, we achieved software and hardware implementation of SHA-1 hash function for sensor network. We implemented the software to be compatible with TinySec. In hardware design, we optimized operation logics for small area of hardware and minimized data transitions of register memory for low power design. Designed the software and hardware is verified on commercial sensor motes and our secure motes respectively.

  • PDF

A Study on the Design and Analysis of Component based Game Development (컴포넌트를 이용한 게임 개발의 분석 및 설계에 관한 연구)

  • Jung, Hae-Ryong;Jung, Kwang-Ho
    • Journal of Korea Game Society
    • /
    • v.1 no.1
    • /
    • pp.73-79
    • /
    • 2001
  • The objective of this paper is to systematically establish the development of game software through the fusion of game implementation and component methodology. The development of game software has inconsistently accomplished without the consistent frame for the analysis and design of game development in the domestic environments. Therefore in case of the development of game software based on game component, although a lot of resources were required in the initial the accumulation of experience and the technology of reuse lead to the efficiency of the maintenance ultimately.

  • PDF

Design and Implementation of UAV System for Autonomous Tracking

  • Cho, Eunsung;Ryoo, Intae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.829-842
    • /
    • 2018
  • Unmanned Aerial Vehicle (UAV) is diversely utilized in our lives such as daily hobbies, specialized video image taking and disaster prevention activities. New ways of UAV application have been explored recently such as UAV-based delivery. However, most UAV systems are being utilized in a passive form such as real-time video image monitoring, filmed image ground analysis and storage. For more proactive UAV utilization, there should be higher-performance UAV and large-capacity memory than those presently utilized. Against this backdrop, this study described the general matters on proactive software platform and high-performance UAV hardware for real-time target tracking; implemented research on its design and implementation, and described its implementation method. Moreover, in its established platform, this study measured and analyzed the core-specific CPU consumption.

Efficient Implementation of the MQTT Protocol for Embedded Systems

  • Deschambault, Olivier;Gherbi, Abdelouahed;Legare, Christian
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.26-39
    • /
    • 2017
  • The need for embedded devices to be able to exchange information with each other and with data centers is essential for the advent of the Internet of Things (IoT). Several existing communication protocols are designed for small devices including the message-queue telemetry transport (MQTT) protocol or the constrained application protocol (CoAP). However, most of the existing implementations are convenient for computers or smart phones but do not consider the strict constraints and limitations with regard resource usage, portability and configuration. In this paper, we report on an industrial research and development project which focuses on the design, implementation, testing and deployment of a MQTT module. The goal of this project is to develop this module for platforms having minimal RAM, flash code memory and processing power. This software module should be fully compliant with the MQTT protocol specification, portable, and inter-operable with other software stacks. In this paper, we present our approach based on abstraction layers to the design of the MQTT module and we discuss the compliance of the implementation with the requirements set including the MISRA static analysis requirements.