• Title/Summary/Keyword: 클래스도

Search Result 2,341, Processing Time 0.023 seconds

Design and Implementation of A Conceptual Class Diagram Elicitation System (개념클래스 다이어그램 도출 시스템의 설계 및 구현)

  • Park, Ga-Young;Lee, Yong-Hun;Lee, Sang-Bum
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.420-426
    • /
    • 2011
  • In this paper, we introduce a system which helps to draw a conceptual class diagram from the problem description by combining various class diagram deriving methods. Generally, problem description is a kind of statements including user requirements in the early development phase. The system developer can derive a conceptual class diagram from this document, which playes an important role during the object-oriented software development. Until now, it is not easy for the novice to elicit classes because it requires good experience and intuition. In addition, there are also some difficulties of finding valid conceptual classes by hand when the size of system becomes larger. Therefore, we develop a system to solve these problems so that the developer is able to construct the conceptual class diagram easily.

Design and Implementation of A Compatible Class Library for Data Broadcasting Contents (데이터 방송 콘텐츠의 호환을 위한 클래스 라이브러리의 설계 및 구현)

  • Yim Hyun-Jeong;Lim Soon-Bum
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.4
    • /
    • pp.515-527
    • /
    • 2006
  • Domestic standards for data broadcasting differ in the fact that satellite broadcasting chose MHP, cable OCAP, satellite ACAP, therefore making reuse of data contents impossible due to the differences. To resolve this problem, this study designed and implemented independent middleware class library for developing data broadcasting contents. To define class library which could bridge between applications and different middleware, standard library developing methods were used; and analysis of procedural application of each middleware was carried out. Based upon the analysis, classes with embedded transform and handle modules were defined to be linked to libraries of each middleware; and to verify the implemented class library, test contents were created to be compared to the existing contents. This kind of contents development by independent middleware class library allows for reuse of data contents easier, and develops an environment for higher quality of contents by reducing the efforts needed to learn each middleware for the developers.

  • PDF

A Mechanism to Determine Method Location among Classes using Neural Network (신경망을 이용한 클래스 간 메소드 위치 결정 메커니즘)

  • Jung, Young-A.;Park, Young-B.
    • The KIPS Transactions:PartB
    • /
    • v.13B no.5 s.108
    • /
    • pp.547-552
    • /
    • 2006
  • There have been various cohesion measurements studied considering reference relation among attributes and methods in a class. Generally, these cohesion measurement are camed out in one class. If the range of reference relation considered are extended from one class to two classes, we could find out the reference relation between two classes. Tn this paper, we proposed a neural network to determine the method location. Neural network is effective to predict output value from input data not to be included in training and generalize after training input and output pattern repeatedly. Learning vector is generated with 30-dimensional input vector and one target binary values of method location in a constraint that there are two classes which have less than or equal to 5 attributes and methods The result of the proposed neural network is about 95% in cross-validation and 88% in testing.

Detection of Car Hacking Using One Class Classifier (단일 클래스 분류기를 사용한 차량 해킹 탐지)

  • Seo, Jae-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.6
    • /
    • pp.33-38
    • /
    • 2018
  • In this study, we try to detect new attacks for vehicle by learning only one class. We use Car-Hacking dataset, an intrusion detection dataset, which is used to evaluate classification performance. The dataset are created by logging CAN (Controller Area Network) traffic through OBD-II port from a real vehicle. The dataset have four attack types. One class classification is one of unsupervised learning methods that classifies attack class by learning only normal class. When using unsupervised learning, it difficult to achieve high efficiency because it does not use negative instances for learning. However, unsupervised learning has the advantage for classifying unlabeled data, which are new attacks. In this study, we use one class classifier to detect new attacks that are difficult to detect using signature-based rules on network intrusion detection system. The proposed method suggests a combination of parameters that detect all new attacks and show efficient classification performance for normal dataset.

Sharing based Admission Control Scheme for Service Differentiation in Optical Burst Switching Networks (광 버스트 스위칭 네트워크에서 서비스 차별화를 제공하는 공유 기반의 허락 제어 방식)

  • Paik, Junghoon
    • Journal of Broadcast Engineering
    • /
    • v.20 no.5
    • /
    • pp.748-755
    • /
    • 2015
  • In this paper, sharing based admission control scheme is suggested for both service differentiation and improvement of wavelength utilization efficiency in burst switching networks. To provide service differentiation and high wavelength utilization efficiency, some of the wavelengths on a output link are shared with all classes and the others are used for the highest class exclusively. Markov based analysis is applied to the suggested scheme for the performance analysis and the numerical results are derived. The results are: The performance of lower traffic is more improved by the more number of shared wavelengths in case that the higher traffic or lower traffic is arrived equally or that the input rate of lower traffic is low. Another result is that the sharing effect of wavelengths is a little bit lowered when lower traffic passes the threshold.

Implementation of Management System for Contamination Vulnerability Calibration of the Ground Water by an Object-oriented Geographic Data Model (객체지향 지리 데이터 모델에 의한 지하수의 오취약성 분석을 위한 관리시스템 구현)

  • Lee, Hong-Ro
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.6 no.2
    • /
    • pp.101-112
    • /
    • 2003
  • This paper designs and implements the management system that can calibrate the contamination vulnerability of the ground water, using an object oriented data model. Geographic-objects are specified by features extracted from an applicable geographic domain, and geographic-fields are defined by chemical factors extracted from each driven water. To show the topological relationships among the geographic-objects and the geographic-fields, this paper attach the weight and the ratio of the drastic model to chemical factors represented on the land use digital map and the ground water digital map. The geographic feature class, administrative boundary class, land use class and driven water class consist of a class composition hierarchy for evaluating the convenient contamination vulnerability calibration with spatial relationships among the well objects. Therefore, this management system for evaluating the contamination vulnerability can also contribute to the application of other natural environments.

  • PDF

Analysis of the ROMizer of simpleRTJ Embedded Java Virtual Machine (simpleRTJ 임베디드 자바가상기계의 ROMizer 분석 연구)

  • Yang, Hee-jae
    • The KIPS Transactions:PartA
    • /
    • v.10A no.4
    • /
    • pp.397-404
    • /
    • 2003
  • Dedicated-purpose embedded Java system usually takes such model that all class files are converted into a single ROM Image by the ROMizer in the host computer, and then the Java virtual machine in the embedded system executes the image. Defining the ROM Image is a very important issue for embedded system with limited memory resource and low-performance processor since the format directly influences on the memory usage and effectiveness of accessing entries in classes. In this paper we have analyzed the ROMizer and especially the format of the ROM image implemented in the simpleRTJ embedded Jana virtual machine. The analysis says that memory space can be saved up to 50% compared to the original class file and access speed exceeds up to six times with the use of the ROMizer. The result of this study will be applied to develop a more efficient ROMizer for a ROM-based embedded Java system.

Classification of Traffic Classes for Application Services in Military Communication Networks (군 통신망 응용서비스를 위한 트래픽 클래스 분류 방법)

  • Choi, Geun-Kyung;Kim, Bo-Sung;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.76-88
    • /
    • 2012
  • Traffic classification for application services in military communication networks is one of the core requirements to provide efficient resource management for NCW operations. Though several standards and organizations provided their own traffic classification methods, the methods have been mainly focused on commercial services, but not reflected military specifics. In addition, though various military application services have been emerged, some of those services have been classified into different traffic classes due to implicit criteria for the classification among organizations. In this paper, we propose a methodology to classify traffic classes and to determine delivery requirements for military application services based on various standards by DoD as well as several commercial standards based on Y.1541. The validation of the proposed methodology was carried out by comparing the results by proposed one with the traffic classification suggestions by existing commercial standards, DoD and FCS. We expect that the proposed methodology can contribute to achieve efficient operations of limited military network resources, since the proposed method can provide systematic and consistent way to assign traffic classes for new and existing military applications services.

A Study on the Validation Test for Open Set Face Recognition Method with a Dummy Class (더미 클래스를 가지는 열린 집합 얼굴 인식 방법의 유효성 검증에 대한 연구)

  • Ahn, Jung-Ho;Choi, KwonTaeg
    • Journal of Digital Contents Society
    • /
    • v.18 no.3
    • /
    • pp.525-534
    • /
    • 2017
  • The open set recognition method should be used for the cases that the classes of test data are not known completely in the training phase. So it is required to include two processes of classification and the validation test. This kind of research is very necessary for commercialization of face recognition modules, but few domestic researches results about it have been published. In this paper, we propose an open set face recognition method that includes two sequential validation phases. In the first phase, with dummy classes we perform classification based on sparse representation. Here, when the test data is classified into a dummy class, we conclude that the data is invalid. If the data is classified into one of the regular training classes, for second validation test we extract four features and apply them for the proposed decision function. In experiments, we proposed a simulation method for open set recognition and showed that the proposed validation test outperform SCI of the well-known validation method

A Study on the Necessity and Cases of Non-Face-to-Face Online Craft Education Programs (비대면 온라인 공예 교육 프로그램의 필요성과 사례 연구)

  • Jang, Ji-Su;Chung, Jean-Hun
    • Journal of Digital Convergence
    • /
    • v.19 no.9
    • /
    • pp.277-282
    • /
    • 2021
  • The purpose of this thesis is to suggest the direction of various online education media to be developed in the future by studying the necessity and cases of non-face-to-face online craft education programs. To this end, among the online class platforms currently operated in Korea, four places that contain craft education programs were selected and analyzed for comparison. Class101, Hobbyful, Conects-Hobby Class, and Air Klass are examples. As a result of the study, the common features and advantages of the convenience of accessing contents and the diversity of class composition were found. However, there was a limitation in that the real-time inquiry and response system was not systematically implemented in most online class platforms. In particular, as the number of users of the online class platform is gradually increasing in the untact era caused by Covid-19, continuous research and development will be required to ensure that interaction, the most important characteristic of face-to-face, can also be performed well on online platforms.