• Title/Summary/Keyword: Application Software

Search Result 3,816, Processing Time 0.029 seconds

Application Software Modeling and Integration Methodology using AUTOSAR-ready Light Software Architecture (AUTOSAR 대응 경량화 소프트웨어 아키텍처를 이용한 어플리케이션 소프트웨어 모델링 및 통합 방법)

  • Park, In-Seok;Lee, Woo-Taik;SunWoo, Myoung-Ho
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.20 no.6
    • /
    • pp.117-125
    • /
    • 2012
  • This paper describes a model-based software development methodology for AUTOSAR-ready light software architecture(AUTOSAR-Lite). The proposed methodology briefly represents an application software modeling technique using Matlab/Simulink. Using the proposed technique, application software architecture elements (e.g. software components, runnables, and interfaces) and functional behaviors can be designed in a single modeling environment. From the designed model, the codes of application software is automatically generated using Real-Time Workshop Embedded Coder. The generated application software is easily integrated with hand-coded basic software using the proposed method. In order to evaluate the proposed methodology, a diesel engine management system for a passenger car was employed as a case study. Based on the methodology, 8 atomic software components and 52 runnables are successfully developed, and they are evaluated by engine experiments. From this case study, AUTOSAR compatible model-based application software was successfully developed, and the effectiveness of the proposed methodology was evaluated.

Improving Fault Traceability of Web Application by Utilizing Software Revision Information and Behavior Model

  • Baek, Seungsuk;Lee, Jung-Won;Lee, Byungjeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.817-828
    • /
    • 2018
  • Modern software, especially web-based software, is broadly used in various fields. Most web applications employ design patterns, such as a model-view-controller (MVC) pattern and a factory pattern as development technology, so the application can have a good architecture to facilitate maintenance and productivity. A web application, however, may have defects and developers must fix the defects when a user submits bug reports. In this paper, we propose a novel approach to improving fault traceability in web application by using software revision information and software behavior model to reduce costs and effectively handle the software defect. We also provide a case study to show effectiveness of our approach.

SOFTWARE STREAMING TECHNOLOGY FOR TELEMETICS APPLICATIONS

  • Kim, Jung-Sook;Choi, Ji-Hoon;Choi, Jung-Dan
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.597-600
    • /
    • 2005
  • The software streaming technology enables telematics software to be automatically updated through a wireless network. When the software starts running, software streaming system inspects its version and then, automatically download latest one. The software streaming system breaks the software into several pieces that are streamed to the user as needed. In this way, software streaming system can improves the telematics application load time while updating the software through wireless network. In our experiments, the application load time was reduced about 7 times compared to downloading whole software at best case.

  • PDF

PROCEDURE FOR APPLICATION OF SOFTWARE RELIABILITY GROWTH MODELS TO NPP PSA

  • Son, Han-Seong;Kang, Hyun-Gook;Chang, Seung-Cheol
    • Nuclear Engineering and Technology
    • /
    • v.41 no.8
    • /
    • pp.1065-1072
    • /
    • 2009
  • As the use of software increases at nuclear power plants (NPPs), the necessity for including software reliability and/or safety into the NPP Probabilistic Safety Assessment (PSA) rises. This work proposes an application procedure of software reliability growth models (RGMs), which are most widely used to quantify software reliability, to NPP PSA. Through the proposed procedure, it can be determined if a software reliability growth model can be applied to the NPP PSA before its real application. The procedure proposed in this work is expected to be very helpful for incorporating software into NPP PSA.

Research on the Process of Constructing Application Systems Using the E-R Model and an Automated Application Generator (E-R 모델과 자동생성기를 이용한 응용시스템의 구축 과정에 관한 연구)

  • Chung, Il-Choo
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.4
    • /
    • pp.133-155
    • /
    • 2005
  • This Paper makes an attempt to suggest a process of automatically generating application software based on the Entity-Relationship model 1. The designer develops an E-R model of an real-world system. 2. The designer inputs the entity and relationship types, and attributes shown in the E-R model, and also the basic operations of the application system to the software generator. 3. The application generator produces database schema and link information between application programs, and then automatically generates a stereo-type application system. In order for the automated application generator to build the application system in a systematic way, four basic program generation rules have been suggested. A set of computer programs have been developed in order to show the applicability of the automated software generation process suggested in this paper. By following each rule with the generator, the designer can build an application in an efficient manner compared with traditional (manual programming) approaches. It has been demonstrated from the case study that the idea of applying an automated generator in systems development based upon the E-R model is feasible.

  • PDF

The Prodecural Characteristics of Application Software Package Acquisition And There Influences on MIS Performance. (응용소프트웨어 패키지 구입과정의 특성이 경영정보시스템 성과에 미치는 영향)

  • 이진주;신현식
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1990.04a
    • /
    • pp.71-80
    • /
    • 1990
  • The main objectives of this paper are as follows: 1) identifying th procedural characteristics of application software package acquisition and, 2) analyzing the relationship between those characteristics and MIS performance. Three stages and thirty core tasks of the application software package acquisition process were identified after reviewing relevant literature. The model specifying the relationship between procedural characteristics of application software package acquisition and MIS performance was established and 12 hypotheses were derived. Data were collected form 41 Korean companies and hypotheses were tested empirically.

  • PDF

Study on ISA's assessment to software process for EN50128 SIL4 (EN50128 SIL4 소프트웨어 프로세스 ISA 인증 사례 연구)

  • Cho, Chi-Hwan;Kang, Chan-Yong;Hwang, Jin-Ho
    • Proceedings of the KSR Conference
    • /
    • 2010.06a
    • /
    • pp.838-849
    • /
    • 2010
  • It is inevitable to control the systematic failure to obtain the software safety integrity of embedded software installed in rolling stock. Because it is not possible to assess systematic failure integrity by quantitative methods, SILs are used to group documentation, methods, tools and techniques throughout software development lifecycle which, when used effectively, are considered to provide an appropriate level of confidence in the realization of a system to a stated integrity level. Normally, safety approval process is through generic product, generic application and specification application for. For safety approval on generic application of software based system, it is required to apply the certified software processes from the planning stage for the assigned SIL. As such, we will develop project specific application with high safety integrity within time limit of contractual delivery schedule through software assessment to the modified area with the re-use of certified software module and documentation. At this point, Hyundai Rotem has developed software processes applicable to support SIL 4 based on EN50128 which was assessed and certified by TUV SUD. This paper introduces the Hyundai Rotem's detailed approach and prospective action to achieve software safety integrity level.

  • PDF

A Study on the Maintenance Cost Estimation Model for Application Software by Considering Risks (위험을 고려한 응용소프트웨어의 유지관리비용 산정모델에 관한 연구)

  • Jeong, Hyung Jong;Koo, Eun Young;Han, Kyeong Seok
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.67-84
    • /
    • 2015
  • Software is more diverse and complex and the level of importance for the maintenance of application software to securely operate software is also gradually increasing in proportion. The calculation method for maintenance cost of application software applied in Korea public enterprises is involved in the range of 10 to 15% of development cost, depending on the Software Project Cost Estimation Guide. Moreover, as most software maintenance cost estimation procedures do not take into consideration of the risk factors related of maintenance, it can be seen as a main cause for the occurrence of maintenance related accidents. This study proposes a maintenance cost estimate model that takes into consideration of the risks related to the software maintenance activities to improve and resolve issues arising from the estimation of maintenance cost. In doing so, maintenance risk factors are analyzed and a risk index is derived through the analysis of risk levels based on the risk factors. Based on such analysis, a maintenance cost estimate method which reflects the maintenance risk index was established.

Design and Implementation of Safety Verification System for Application Software (응용 소프트웨어 안전성 검증 시스템 설계 및 구현)

  • Soh, Woo-Young
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.191-197
    • /
    • 2008
  • A safe computer environment is necessarily required for computer users, because of a damage is widely increased by a malicious software such as the warm, virus and trojan horse. A general vaccine program can detect after the malicious software intruded. This kinds of the vaccine program show good result against a malicious code which is well known, however, there is no function in the vaccine or not enough ability to detect an application software which a malicious code included. So, this paper proposes an application verification system to decide existence and nonexistence of a malicious code in the application software. The proposed application verification system with a mechanism that grasps the flow type of malicious code, can make a reduction of a damage for computer users before the application software executed.

  • PDF

Use of Software Agent Technology in Management Information System: A Literature Review and Classification

  • Hamirahanim Abdul Rahman;Jinsoo Park;Jihae Suh
    • Asia pacific journal of information systems
    • /
    • v.29 no.1
    • /
    • pp.65-82
    • /
    • 2019
  • Technological innovations over the years have accentuated the workings in corporate- connected organizations and different application platforms. Hence, a unified management information system (MIS) that can utilize the Web and propel programming developments is required. Software agents, the latest developments in computer software technology, can be utilized to rapidly and effortlessly build integrated information systems. Consequently, 59 research papers on the use of software agents in MIS were identified from top 40 MIS journals published between 2007 and 2017. Then, we reviewed and classified all the research papers according to two categories: application fields and application categories. The application fields consisted of eight sub-groups: manufacturing, telecommunication systems, traffic and transportation management, information filtering and gathering, electronic commerce, business process management, entertainment, and medical care; whereas the application categories consisted of three sub-groups: multi-agent systems, personal assistants, and multi-agent simulation. The research papers were further divided into journal and year of publication, and journal and application field. The objective of our research was to understand the trend of the use software agent technology in MIS by examining the published research paper beside to add knowledge and content to the information system academic discipline.