• Title/Summary/Keyword: 공개 소프트웨어

Search Result 436, Processing Time 0.027 seconds

A Study of Software Architecture Design Methods for Multiple Access Con trol under Web-based Medical Information System Environment (웹 기반 의료정보시스템 다중 접근제어를 위한 소프트웨어아키텍쳐 설계방법)

  • Noh, Si-Choon;Hwang, Jeong-Hee
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.43-49
    • /
    • 2011
  • Web-based health information provides a lot of conveniences, however the security vulnerabilities that appear in the network environment without the risk of exposure in the use of information are growing. Web-based medical information security issues when accessing only the technology advances, without attempting to seek a safe methodology are to increase the threat element. So it is required. to take advantage of web-based information security measures as a web-based access control security mechanism-based design. This paper is based on software architecture, design, ideas and health information systems were designed based on access control security mechanism. The methodologies are to derive a new design procedure, to design architecture and algorithms that make the mechanism functio n. To accomplish this goal, web-based access control for multiple patient information architecture infrastructures is needed. For this software framework to derive features that make the mechanism was derived based on the structure. The proposed system utilizes medical information, medical information when designing an application user retrieves data in real time, while ensuring integration of encrypted information under the access control algorithms, ensuring the safety management system design.

A Program Analysis Technique for Recovery of Layered Architecture and Conformance Checking (층위구조 아키텍처의 복구 및 일치성 검사를 위한 프로그램 분석 방법)

  • Park Chanjin;Hong Euyseok;Kang Yoohoon;Wu Chisu
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.8
    • /
    • pp.730-741
    • /
    • 2005
  • Layered Architecture is a kind of nodule decomposition techniques, which decomposes a program by generality This paper proposes a ]aver based method for recovering layered architecture from object-oriented program and checking conformance against architectural document. To specify the rules for layered style in object-oriented program, we define a partially ordered set on modules by module use relationship and module layer relationship by module override relationship. The meaning of module layer relationship is explained with an example from design patterns. Steps to recover layered architecture from program are described and a metamodel for the recovery is proposed. Architecture recovery is performed on source codes from open-source software project, and the implication of parts that do not conform to its architectural document is discussed. As a result of checking, it is pointed out that, although the parts are considered allowable exceptions of layered architecture, their modifications should be controlled carefully.

uLAMP: Unified Linguistic Asset Management Platform for Natural Language Processing (uLAMP: 자연어 처리를 위한 자원 통합 관리 플랫폼)

  • Um, Jung-Ho;Shin, Sung-Ho;Choi, Sung-Pil;Jung, Hanmin
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.12
    • /
    • pp.25-34
    • /
    • 2012
  • Due to the development of wireless devices such as smart-phone and internet, a lot of linguistic resources actively are opened in each area of expertise. Also, various systems using semantic web technologies are developing for determining whether such information are useful or not. In order to build these systems, the processes of data collection and natural language processing are necessary. But, there is few systems to use of integrating software and data required those processes. In this paper, we propose the system, uLAMP, integrating software and data related to natural language processing. In terms of economics, the cost can be reduced by preventing duplicated implementation and data collection. On the other hand, data and software usability are increasing in terms of management aspects. In addition, for the evaluation of uLAMP usability and effectiveness, user survey was conducted. Through this evaluation, the advantages of the currentness of data and the ease of use are found.

An Efficient Log Data Management Architecture for Big Data Processing in Cloud Computing Environments (클라우드 환경에서의 효율적인 빅 데이터 처리를 위한 로그 데이터 수집 아키텍처)

  • Kim, Julie;Bahn, Hyokyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.1-7
    • /
    • 2013
  • Big data management is becoming increasingly important in both industry and academia of information science community. One of the important categories of big data generated from software systems is log data. Log data is generally used for better services in various service providers and can also be used as information for qualification. This paper presents a big data management architecture specialized for log data. Specifically, it provides the aggregation of log messages sent from multiple clients and provides intelligent functionalities such as analyzing log data. The proposed architecture supports an asynchronous process in client-server architectures to prevent the potential bottleneck of accessing data. Accordingly, it does not affect the client performance although using remote data store. We implement the proposed architecture and show that it works well for processing big log data. All components are implemented based on open source software and the developed prototypes are now publicly available.

Arduino hardware and Android ADK software combination (아두이노 하드웨어와 안드로이드 ADK 소프트웨어의 결합)

  • Lee, Sung-jin;Choi, Chul-kil;Lee, Kyung-mu;Choi, Byeong-yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.336-339
    • /
    • 2013
  • Arduino is for design based on open source prototyping platform, artist, designer, hobby activists, etc, i has been designed for all those who are interested in the environment construct. Arduino adventage you can easily create applications hardware, without deep knowledge about the hardware. Configuration of arduino using AVR microcontroller ATmage 168, software to action arduino using arduino program, MATLAB, Processing. Arduino is open source base, you can hardware production directly and using shield additionally, the arduino can be combined. Android AKD is open source. You can create android smart phone application. By the way compatible and can be used android ADK add arduino Manifast. Using arduino program, arduino bread-board design on hardware., create button click, connection with each other. In this paper, sortware was used for arduino program and android ADK, hardware was used for arduino MegaADK board, After making one accessory using the software and hardware verification.

  • PDF

A Practical Study on Code Static Analysis through Open Source based Tool Chains (Open Source 기반 툴 체인화를 통한 코드 정적 분석 연구)

  • Kang, Geon-Hee;Kim, R. Young Chul;Yi, Geun Sang;Kim, Young Soo;Park, Yong. B.;Son, Hyun Seung
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.2
    • /
    • pp.148-153
    • /
    • 2015
  • In our domestic software industries, it is focused on such a high quality development/ testing process, maturity measurement, and so on. But the real industrial fields are still working on a code-centric development. Most of the existing legacy systems did not keep the design and highly increased the code complexity with more patching of the original codes. To solve this problem, we adopt a code visualization technique which is important to reduce the code complexity among modules. To do this, we suggest a tool chaining method based on the existing open source software tools, which extends NIPA's Software Visualization techniques applied to procedural languages. In addition, it should be refactored to fix bad couplings of the quality measurement indicators within the code visualization. As a result, we can apply reverse engineering to the legacy code, that is, from programming via model to architecture, and then make high quality software with this approach.

Creating Atmospheric Scattering Corrected True Color Image from the COMS/GOCI Data (천리안위성 해양탑재체 자료를 이용한 대기산란 효과가 제거된 컬러합성 영상 제작)

  • Lee, Kwon-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.16 no.1
    • /
    • pp.36-46
    • /
    • 2013
  • The Geostationary Ocean Color Imager (GOCI), the first geostationary ocean color observation instrument launched in 2010 on board the Communication, Ocean, and Meteorological Satellite (COMS), has been generating the operational level 1 data. This study describes a methodology for creating the GOCI true color image and data processing software, namely the GOCI RGB maker. The algorithm uses a generic atmospheric correction and reprojection technique to produce the color composite image. Especially, the program is designed for educational purpose in a way that the region of interest and image size can be determined by the user. By distributing software to public, it would maximize the understanding and utilizing the GOCI data. Moreover, images produced from the geostationary observations are expected to be an excellent tool for monitoring environmental changes.

A Study of Advanced N-Tier Model for Improving Maintainability of Web Applications in Cloud Environment (클라우드 환경에서 웹 어플리케이션의 유지보수성 향상을 위한 N-계층 모델의 개선에 관한 연구)

  • Kim, In-Kyu;Shin, Joon-Chul
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.4
    • /
    • pp.537-552
    • /
    • 2013
  • Software-as-a-Service (SaaS) has led to paradigm shifts in the information management area by combining it with SOA and Mashup. System developers now have more chances to access various high-quality functions through API opened on the web. But external resources are controlled by service providers so that it raises the component's uncertainty in system management which is related to external resources. In the cloud environment, components related to external resources causes negative effects on system's maintainability by making them dependant on service providers. This study proposes a way to enhance maintainability by using stable external resources. For this work, we suggest the N+1-tier model in which an external resource tier is added to the N-tier model. After that, we analyze how adding an external resource tier affects the decreasing complexity of maintainability and improving maintainability on web application.

A Metrics Set for Measuring Software Module Severity (소프트웨어 모듈 심각도 측정을 위한 메트릭 집합)

  • Hong, Euy-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.1
    • /
    • pp.197-206
    • /
    • 2015
  • Defect severity that is a measure of the impact caused by the defect plays an important role in software quality activities because not all software defects are equal. Earlier studies have concentrated on defining defect severity levels, but there have almost never been trials of measuring module severity. In this paper, first, we define a defect severity metric in the form of an exponential function using the characteristics that defect severity values increase much faster than severity levels. Then we define a new metrics set for software module severity using the number of defects in a module and their defect severity metric values. In order to show the applicability of the proposed metrics, we performed an analytical validation using Weyuker's properties and experimental validation using NASA open data sets. The results show that ms is very useful for measuring the module severity and msd can be used to compare different systems in terms of module severity.

Development of SAML Software for JAVA Web Applications in Korea (국내 자바 웹 응용을 위한 SAML 소프트웨어의 개발)

  • Jo, Jinyong;Chae, Yeonghun;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1160-1172
    • /
    • 2019
  • Federated authentication is a user authentication and authorization infrastructure that spans multiple security domains. Many overseas Web applications have been adopting SAML-based federated authentication. However, in Korea, it is difficult to apply the authentication because of the high market share of a specific Web (application) server, which is hard to use open-source SAML software and the high adoption of Java-based standard framework which is not easy to integrate with SAML library. This paper proposes the SAML4J, which is developed in order to have Web applications easily and safely integrated with the Java-based framework. SAML4J has a developer-friendly advantage of using a session storage independent of the framework and processing Web SSO flows through simple API. We evaluate the functionality, performance, and security of the SAML4J to demonstrate the high feasibility of it.