• Title/Summary/Keyword: Software re-engineering

Search Result 169, Processing Time 0.023 seconds

A Study on Analysis of a Process Similarity for the Service Reuse (서비스 재사용을 위한 프로세스 유사도 분석에 관한 연구)

  • Hwang, Chi-Gon;Yun, Chang-Pyo;Jung, Kye-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.238-240
    • /
    • 2014
  • A cloud computing include a SaaS frameworks be able to use a software as a service. Despite the existing service depending on the difference of the tenant and the use, if the service provider re-establish a service, they are required resources In terms of costs and managerial. So we propose a technique for analysis software structure using the process algebra to reuse existing software. A process algebra analyze the structure of the software, express in business process or different languages and verify that it can be reused. As CCS in a process algebra is useful to convert the business process or XML, by using this, we structure a process and propose meta storage for comparison and management a structured document.

  • PDF

Study on the Transmission Error Prediction for a Spur Gear Pair (스퍼기어의 전달오차에 관한 연구)

  • Zhang, Qi;Zhang, Jing;Zhu, Zhong Gang;Wang, Zhen Rong;Xu, Zhe-zhu;Lyu, Sung Ki
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.33 no.2
    • /
    • pp.109-114
    • /
    • 2016
  • Nowadays, lower gear vibration and noise are necessary for drivers in automotive gearbox, which means that transmission gearbox should be optimized to avoid noise annoyance and fatigue before quantity production. Transmission error (T.E.) is the excitation factor that affects the noise level known as gear whine, and is also the dominant source of noise in the gear transmission system. In this paper, the research background, the definition of T.E. and gear micro-modification were firstly presented, and then different transmission errors of loaded torques for the spur gear pair were studied and compared by a commercial software. It was determined that the optimum gear micro-modification could be applied to optimize the transmission error of the loaded gear pair. In the future, a transmission test rig which is introduced in this paper is about to be used to study the T.E. after gear micro-geometry modification. And finally, the optimized modification can be verified by B&K testing equipment in the semi-anechoic room later.

Efficient Key Re-dissemination Method for Saving Energy in Dynamic Filtering of Wireless Sensor Networks (무선 센서 네트워크의 동적 여과 기법에서 에너지 절약을 위한 효율적인 키 재분배 기법)

  • Park, Dong-Jin;Cho, Tae-Ho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.71-72
    • /
    • 2015
  • WSN의 센서 노드는 제한된 자원으로 인해 보안상의 취약성을 가지며 공격자는 쉽게 임의의 데이터를 삽입하는 허위 데이터 주입 공격을 할 수 있다. WSN에서는 이러한 공격이 치명적이기 때문에 허위 데이터를 가능한 빨리 여과해야 한다. 허위 데이터 주입 공격을 탐지하는 기법으로 동적 여과 기법이 제안되었는데 이 기법은 초기 분배된 비밀키에 대한 재분배가 이루어지지 않아 같은 공격에 계속 노출될 경우 불필요한 에너지 소모가 발생한다. 본 논문에서 제안하는 기법은 효율적인 키 재분배를 통해 허위 데이터를 빨리 감지하고 에너지 효율성을 향상시킨다. 전달 노드에서 허위 데이터가 탐지되면 정의된 알람 메시지를 통해 베이스 스테이션에 보고되고 키 재분배를 수행하여 더 효율적으로 허위 데이터를 감지한다. 그러므로 제안 기법은 기존 기법과 비교하였을 때 허위 데이터를 조기에 감지하고 전체 네트워크의 에너지를 절약한다.

  • PDF

A Method of Service Reuse using Analysis of Process Similarity and Meta Repository (프로세스 유사도 분석과 메타 저장소를 이용한 서비스 재사용 기법)

  • Hwang, Chi-Gon;Yoon, Chang-Pyo;Jung, Kye-Dong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1375-1380
    • /
    • 2014
  • SaaS at a cloud computing is a framework to provide a software as a service. Depending on the difference of the tenant and the use, if the service provider re-establish a service, they are required resources In terms of costs and managerial. So we propose a technique for analysis of software structure using the process algebra to reuse existing software. A process algebra analyze the structure of the software, express in different languages and verify that it can be reused. CCS in a process algebra is useful to convert the business process or XML, by using this, we structure a process as process view and propose meta storage for comparison and management a structured document.

An Object-oriented Finite Element Analysis Program Architecture of Easy Extension (확장이 쉬운 구조의 객체지향 유한요소해석 프로그램)

  • Nam, Yong-Yun
    • 연구논문집
    • /
    • s.33
    • /
    • pp.27-38
    • /
    • 2003
  • The object-oriented programming languages are widely used in the modern software engineering. The procedural type FEM codes are still used because it is very hard and cost consuming job to re-code them into object-oriented programs. In this study, a FEM program was newly designed and coded with C++, an object-oriented language. Also a special programming technique, auto-loading technique was developed for open structured program, with which the extension and maintenance can be carried out easily. For example, the additions of element libraries to an existence FEM program do not require any modifications of the program.

  • PDF

Secure Multicast using Proxy Re-Encryption in an IoT Environment

  • Kim, SuHyun;Hwang, YongWoon;Seo, JungTaek
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.946-959
    • /
    • 2018
  • Recently interest in Internet of Things(IoT) has attracted significant attention at national level. IoT can create new services as a technology to exchange data through connections among a huge number of objects around the user. Data communication between objects provides not only information collected in the surrounding environment but also various personalized information. IoT services which provide these various types of data are exposed to numerous security vulnerabilities. If data is maliciously collected and used by an attacker in an IoT environment that deals with various data, security threats are greater than those in existing network environments. Therefore, security of all data exchanged in the IoT environment is essential. However, lightweight terminal devices used in the IoT environment are not suitable for applying the existing encryption algorithm. In addition, IoT networks consisting of many sensors require group communication. Therefore, this paper proposes a secure multicast scheme using the proxy re-encryption method based on Vehicular ad-hoc networks(VANET) environment. The proposed method is suitable for a large-scale dynamic IoT network environment using unreliable servers.

Task failure resilience technique for improving the performance of MapReduce in Hadoop

  • Kavitha, C;Anita, X
    • ETRI Journal
    • /
    • v.42 no.5
    • /
    • pp.748-760
    • /
    • 2020
  • MapReduce is a framework that can process huge datasets in parallel and distributed computing environments. However, a single machine failure during the runtime of MapReduce tasks can increase completion time by 50%. MapReduce handles task failures by restarting the failed task and re-computing all input data from scratch, regardless of how much data had already been processed. To solve this issue, we need the computed key-value pairs to persist in a storage system to avoid re-computing them during the restarting process. In this paper, the task failure resilience (TFR) technique is proposed, which allows the execution of a failed task to continue from the point it was interrupted without having to redo all the work. Amazon ElastiCache for Redis is used as a non-volatile cache for the key-value pairs. We measured the performance of TFR by running different Hadoop benchmarking suites. TFR was implemented using the Hadoop software framework, and the experimental results showed significant performance improvements when compared with the performance of the default Hadoop implementation.

Use Case Identification Method based on Goal oriented Requirements Engineering(GoRE) (Goal 지향 요구공학 기반의 유스케이스 식별 방법)

  • Park, Bokyung;Kim, R. Youngchul
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.7
    • /
    • pp.255-262
    • /
    • 2014
  • Our previous research[1] suggested object extraction and modeling method based on Fillmore's case grammar. This approach had not considered of use case extraction and method. To solve this problem, we adopt Fillmore's semantic method as linguistic approach into requirement engineering, which refine fillmore's case grammar for extracting and modeling use cases from customer requirements. This Refined mechanism includes the definition of a structured procedure and the representation of visual notations for 'case' modeling. This paper also proposes the use case decision matrix to identify use case size from extracted use cases based on goal oriented requirement engineering(GoRE), which related with the complexity of use case, and also prioritizes the use cases with this matrix. It demonstrates our proposal with the bank ATM system.

Component-based Requirements Analysis for the GPS Applications (GPS 애플리케이션에 대한 컴포넌트 기반의 요구사항 분석)

  • Lee, Sang Young;Lee, Yoon Hyeon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.177-188
    • /
    • 2012
  • GIS provides the various analyzing and displaying using diverse spatial data have supported the powerful functionality and friendly user-interface. But, early GIS software is developed as package tool, it have many difficulties with reducing the cost of developing GPS application and satisfying the various user requirements. At present, the developed GPS applications across multiple domains, despite the common features are built separately for each domain in terms of software engineering development followed out waste of time and money expenditure. However, common features between GPS applications, if deployed as a component assembly and reuse components in terms of enabling the two kinds of component-based development can bring out the beneficial results. In this paper, we described the Analysis and design of GPS ApplicationsS based on Component. Each GPS component is composed of many objects accomplish the atomic service processing and cooperate with each other. And, GPS components meets the qualifications of thc low cost of developing GPS application because of the reusability and re-composition.

BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment

  • Zhang, Lejun;Zou, Yanfei;Yousuf, Muhammad Hassam;Wang, Weizheng;Jin, Zilong;Su, Yansen;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1634-1652
    • /
    • 2022
  • Due to the increasing need for data sharing in the age of big data, how to achieve data access control and implement user permission revocation in the blockchain environment becomes an urgent problem. To solve the above problems, we propose a novel blockchain-based data sharing scheme (BDSS) with fine-grained access control and permission revocation in this paper, which regards the medical environment as the application scenario. In this scheme, we separate the public part and private part of the electronic medical record (EMR). Then, we use symmetric searchable encryption (SSE) technology to encrypt these two parts separately, and use attribute-based encryption (ABE) technology to encrypt symmetric keys which used in SSE technology separately. This guarantees better fine-grained access control and makes patients to share data at ease. In addition, we design a mechanism for EMR permission grant and revocation so that hospital can verify attribute set to determine whether to grant and revoke access permission through blockchain, so it is no longer necessary for ciphertext re-encryption and key update. Finally, security analysis, security proof and performance evaluation demonstrate that the proposed scheme is safe and effective in practical applications.