• Title/Summary/Keyword: Software systems

Search Result 5,609, Processing Time 0.027 seconds

A Study on the Application of CMMI for Aircraft Software Development Process Improvement (CMMI를 활용한 항공기 소프트웨어 개발 프로세스 개선에 관한 연구)

  • Lee, Sung-Ju;Yoon, Jae-Wook;Byun, Jai-Hyun
    • Journal of Korean Society for Quality Management
    • /
    • v.34 no.3
    • /
    • pp.1-18
    • /
    • 2006
  • CMMI(Capability Maturity Model Integration) has been recognized as a critical method to validate the competitiveness of software development organization since its introduction. CMMI imposes additional requirements on the software development organization which has been established and certified to the ISO 9001 quality management system. This paper reviews the similarities and differences between CMMI and ISO 9001. This paper also examines what ate required to deploy the CMMI on the aircraft software development organization which has been certified to ISO 9001. The results of this study will help software development organization to provide the direction for implementing CMMI. Some suggestions are presented to identify and strengthen the weak portion of the software process quality management system.

Real-time control software for flexible manufacturing system (FMS의 실제 시간 제어에 관한 연구)

  • 이석희
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1986.10a
    • /
    • pp.518-526
    • /
    • 1986
  • This paper gives the detail of the work carried out to develop real-time control software for Flexible Manufacturing Systems. A basic design philosophy to implement such software is proposed. The major features are the partitioning of complicated control actions into simplified ones, structured programming and multi-threaded transaction-based tasks. The software operates on the basis of passing task-to-task messages via mailboxes, causing appropriate actions to be taken by each task. Each task represents a separate subprocess so that the subprocesses can be run simultaneously. The task-to-task message could be easily replaced by computer-to-computer communication, using LAN, demonstrating that the software methods developed produce a flexible designs for control software of an FMS. A method of linking such software to simulation software is suggested as a potentially powerful additional design-tool.

  • PDF

Development of Real-Time Control Software for Autonomous Mobile Robot (자율 주행 로봇의 실시간 제어 소프트웨어의 개발)

  • Lee, Jong-Hyuk;Jo, Eu-Teum;Jeong, Hyeon-A;Kim, Hyung-Shin
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.4
    • /
    • pp.336-345
    • /
    • 2011
  • In this paper, we introduce software development process for autonomous mobile robot with LEGO RCX. The software is designed from course analysis and a series of software design processes are applied for the development. Various control methods are devised to identify robot's location and to optimize the running strategy. To assure realtime property and reliability of the software, we adopted software engineering processes during the development. In this paper, we report the detailed software design processes and the implementation result that we have experienced with our practical LEGO robot platform.

A Pragmatic Framework for Predicting Change Prone Files Using Machine Learning Techniques with Java-based Software

  • Loveleen Kaur;Ashutosh Mishra
    • Asia pacific journal of information systems
    • /
    • v.30 no.3
    • /
    • pp.457-496
    • /
    • 2020
  • This study aims to extensively analyze the performance of various Machine Learning (ML) techniques for predicting version to version change-proneness of source code Java files. 17 object-oriented metrics have been utilized in this work for predicting change-prone files using 31 ML techniques and the framework proposed has been implemented on various consecutive releases of two Java-based software projects available as plug-ins. 10-fold and inter-release validation methods have been employed to validate the models and statistical tests provide supplementary information regarding the reliability and significance of the results. The results of experiments conducted in this article indicate that the ML techniques perform differently under the different validation settings. The results also confirm the proficiency of the selected ML techniques in lieu of developing change-proneness prediction models which could aid the software engineers in the initial stages of software development for classifying change-prone Java files of a software, in turn aiding in the trend estimation of change-proneness over future versions.

Availability Improvement Model of (n,k) Cluster Systems using Software Rejuvenation (소프트웨어 재활기법을 적용한 (n,k) 클러스터 시스템의 가용도 향상 모델)

  • 이재성;박기진;강창훈;박범주;김성수
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.5_6
    • /
    • pp.290-298
    • /
    • 2003
  • Internet-based computer systems have to provide both high-availability and high-performance. Cluster technology has been used to obtain availability and performance simultaneously Generally, high-availability cluster systems tolerate a failure of a cluster node and cost-effectively solve it. In this paper, we study availability and downtime cost of (n,k) cluster systems. By considering performance, we model state transition of (n,k) cluster systems and apply software rejuvenation technique to improve availability of the system. We find that software rejuvenation can be used to improve availability of (n,k) cluster systems.

A Study on the Software Safety Assessment of Healthcare Systems

  • Olenski, Rafal;Park, Man-Gon
    • Journal of Multimedia Information System
    • /
    • v.2 no.2
    • /
    • pp.241-248
    • /
    • 2015
  • The safety-critical software in healthcare systems needs more and more perceptive excess among human observation and computer support. It is a challenging conversion that we are fronting in confirming security in healthcare systems. Held in the center are the patients-the most important receivers of care. Patient injuries and fatalities connected to health information technologies commonly show up in the news, contrasted with tales of how health experts are being provided financial motivation to approve the products that may be generating damage. Those events are unbelievable and terrifying, however they emphasize on a crucial issue and understanding that we have to be more careful for the safety and protection of our patients.

Software - ergonomic solutions of information retrieval systems for texts and facts data (Facts 및 Text 정보검색시스템을 위한 소프트웨어 - 인간공학적 해법)

  • ;J. Krause;T. Mandl;A. Schaefer;M. Stempfhuber
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.2 no.1
    • /
    • pp.80-87
    • /
    • 2001
  • This article shows how general software-ergonomic principles are successfully applied in the design of user friendly graphical interfaces. A theoretical model(WOB-Model) is derived from empirical studies and validated in the development of several systems. It provides basic principles within a well-balanced framework and leads to concrete design guidelines. The user tests with the software shows that many of the common usability problems can be eliminated.

  • PDF

Identity-based Deniable Authenticated Encryption for E-voting Systems

  • Jin, Chunhua;Chen, Guanhua;Zhao, Jianyang;Gao, Shangbing;Yu, Changhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3299-3315
    • /
    • 2019
  • Deniable authentication (DA) is a protocol in which a receiver can generate an authenticator that is probabilistically indistinguishable from a sender. DA can be applied in many scenarios that require user privacy protection. To enhance the security of DA, in this paper, we construct a new deniable authenticated encryption (DAE) scheme that realizes deniable authentication and confidentiality in a logical single step. Compared with existing approaches, our approach provides proof of security and is efficient in terms of performance analysis. Our scheme is in an identity-based environment; thus, it avoids the public key certificate-based public key infrastructure (PKI). Moreover, we provide an example that shows that our protocol is applicable for e-voting systems.

Software Design of Stores Management System based on the TMO Model (TMO 모델 기반 무장 관리 시스템 소프트웨어 설계)

  • Park, Hansol
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.13 no.1
    • /
    • pp.1-6
    • /
    • 2017
  • A stores management software which is embedded in the stores management system requires high-level reliability and real-time processing. It also required to implement and verify protocols which requires timing constraints to control various weapons. In this paper, we propose design methodology to design a stores management software and its support middleware based on the TMO (Time-triggered Message-triggered Object) model.

A Certification Method for the Quality of Package Software Considering the Measurement Scale (측정척도를 고려한 패키지 S/W 품질인증 방법)

  • 권원일;이공선;송기평;유영관;이종무
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2001.12a
    • /
    • pp.158-165
    • /
    • 2001
  • The certification of software products can provide a greater level of acceptance and feeling of security to customers of these products. This paper presents a certification method for the quality of package software. First of all, the evaluation criteria are derived from ISO/1EC 9126 and 12119 standards, and then the evaluation module are designed considering the measurement scale type. The results can be applied to construct the certification scheme of software product quality for the commercial purpose.

  • PDF