• Title/Summary/Keyword: Code reused

Search Result 15, Processing Time 0.026 seconds

Service Management System Framework for Web-based Remote Education (웹 기반 원격교육을 위한 서비스관리시스템 프레임워크)

  • 배제민
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.7
    • /
    • pp.933-944
    • /
    • 2001
  • In the process of software development, object-oriented framework enables directly improving the productivity of the developer through the reuse of code, analysis and design informations. object-oriented framework is a set of usable and expandable classes and their connectivity. It is a meta solution that contains the code to be reused in the framework and the expert design results on a specific area. This paper constructs the framework that extracts the common services of BBS, chatting, white board and ftp applications for internet-based remote education system. These services can be mostly reused within heterogeneous applications in the form of component.

  • PDF

Design and fabrication of beam dumps at the µSR facility of RAON for high-energy proton absorption

  • Jae Chang Kim;Jae Young Jeong;Kihong Pak;Yong Hyun Kim;Junesic Park;Ju Hahn Lee;Yong Kyun Kim
    • Nuclear Engineering and Technology
    • /
    • v.55 no.10
    • /
    • pp.3692-3699
    • /
    • 2023
  • The Rare isotope Accelerator complex for ON-line experiments in Korea houses several accelerator complexes. Among them, the µSR facility will be initially equipped with a 600 MeV and 100 kW proton beam to generate surface muons, and will be upgraded to 400 kW with the same energy. Accelerated proton beams lose approximately 20% of the power at the target, and the remaining power is concentrated in the beam direction. Therefore, to ensure safe operation of the facility, concentrated protons must be distributed and absorbed at the beam dump. Additionally, effective dose levels must be lower than the legal standard, and the beam dumps used at 100 kW should be reused at 400 kW to minimize the generation of radioactive waste. In this study, we introduce a tailored method for designing beam dumps based on the characteristics of the µSR facility. To optimize the geometry, the absorbed power and effective dose were calculated using the MCNP6 code. The temperature and stress were determined using the ANSYS Mechanical code. Thus, the beam dump design consists of six structures when operated at 100 kW, and a 400 kW beam dump consisting of 24 structures was developed by reusing the 100 kW beam dump.

An Object-Oriented Railway Model for Multi-Train Operation Simulation (객체지향 철도 모델에 의한 다중 열차운행 시뮬레이션)

  • 최규형
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.11 no.5
    • /
    • pp.193-200
    • /
    • 2003
  • A computer simulation program to evaluate the performance of railway systems and train operation plans and the effects of new technologies is provided. The program has the functions of tracing the movements of trains on railway network following the indication of railway signalling system and obeying all kinds of operation rules. An object-oriented technique is applied to model railway system effectively, and it is expected that the program code can be reused easily for other railway simulation programs. Dedicated graphic user interface displaying the simulation outputs by animation during simulation process makes the program convenient to use. Simulation results on the train operations on Kyung-bu line show the proposed program is promising.

Designing SMS Phishing Profiling Model (스미싱 범죄 프로파일링 모델 설계)

  • Jeong, Youngho;Lee, Kukheon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.293-302
    • /
    • 2015
  • With the attack information collected during SMS phishing investigation, this paper will propose SMS phishing profiling model applying criminal profiling. Law enforcement agencies have used signature analysis by apk file hash and analysis of C&C IP address inserted in the malware. However, recently law enforcement agencies are facing the challenges such as signature diversification or code obfuscation. In order to overcome these problems, this paper examined 169 criminal cases and found out that 89% of serial number in cert.rsa and 80% of permission file was reused in different cases. Therefore, the proposed SMS phishing profiling model is mainly based on signature serial number and permission file hash. In addition, this model complements the conventional file hash clustering method and uses code similarity verification to ensure reliability.

Generic User Interface Model for Multi-Platform (다중플랫폼을 위한 제너릭 사용자 인터페이스 모델)

  • Kang, Hyo-Woon;Kim, Jin-Deog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2926-2932
    • /
    • 2014
  • Smart Phone market consists of several platforms such as Windows Phone, Apple iOS and Android of Google. Each platform uses different coding style respectively. Platform-dependent application results in high cost and low code reusability during development of application. It also provides heterogeneous display forms to users. In this paper, we propose a platform-independent generic interface model that could be operated in both the various smart phones and PC. Because the proposed model provides the same UI on multiple platforms, users can operate applications without awkwardness. The model includes a module which copes with the changes of the resolutions in various platforms and a module which switches scenes of each application for performance improvement. Moreover, a module which connects DB is also proposed in order to overcome the difference of way to store data in each platform. The implementation results show that the difference of display and operating manner in any hetero-platform is eliminated.

Software Architecture Recovery for Android Application Reuse (안드로이드 어플리케이션의 재사용을 위한 소프트웨어 아키텍처 생성)

  • Park, Jin-Soo;Kwon, Jang-Jin;Hong, Jang-Eui;Choi, Min
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.2
    • /
    • pp.9-17
    • /
    • 2013
  • Android applications market has increased rapidly due to the popularity of smart phones. In order to high competitiveness in the application market should be high productivity, reduce cost. And short development cycle is required because of increased the android applications demand. Owing to develop applications in short time, the requirements analysis, design process are able to omitted. But in the case of reuse application at development phase, involved many problems because omit document or design. so target of this paper is android application source code that omit document or design. we propose architecture recovery techniques from android application source code by reverse engineering with identify functions are reused. We expect that increase productivity and reduce development cost, smooth maintain by proposed technique.

  • PDF

Constructing an Open Source Based Software System for Reusable Module Extraction (재사용 모듈 추출을 위한 오픈 소스 기반 소프트웨어 시스템 구축)

  • Byun, Eun Young;Park, Bokyung;Jang, Woosung;Kim, R. Young Chul;Son, Hyun Seung
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.9
    • /
    • pp.535-541
    • /
    • 2017
  • Today, the scale of the computer software market has increased, and massive sized software has been developed to satisfy diverse requirements. In this context, software complexity is increasing and the quality of software is becoming more difficult to manage. In particular, software reuse is important for the improvement of the environments of legacy systems and new system development. In this paper, we propose a method to reuse modules that are certified by quality. Reusable levels are divided into code area (method, class, and component), project domain, and business levels. Based on the coupling and cohesion of software complexity, we propose a reusable module extraction mechanism with reusability metrics, which constructs a visualization of the "reusable module's chunk" based on the method and class levels. By applying reverse engineering to legacy projects, it is possible to identify reusable modules/objects/chunks. If these modules/objects/chunks are to be reused to develop an extension system or similar new system, we need to ensure software reliability in order to reduce the time and cost of software development.

Authentication Algorithm using Random Graphic Code (무작위적인 그래픽 코드를 이용한 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.63-69
    • /
    • 2019
  • Using a smartphone allows quick and easy authentication and payment. However, smartphone security threats are evolving into a variety of new hacking technologies, and are changing to attacks specific to the mobile environment. Therefore, there is a demand for an authentication method suitable for a mobile environment. In order to solve security weaknesses in knowledge-based authentication, many companies provide two-step authentication services such as OTP(One Time Password) to provide authentication services such as finance, games, and login. Although OTP service is easy to use, it is easy to duplicate random number table and has a disadvantage that can be reused because it is used as valid value within time limit. In this paper, we propose a mechanism that enables users to quickly and easily authenticate with high security using the authentication method that recognizes special characters through smartphone's dedicated application.

Embedding Built-in Tests in Hot Spots of an Object-Oriented Framework (객체지향 프레임웍의 Hot Spot에 Built-in Tests를 내장하는 방법)

  • Shin, Dong-Ik;Jeon, Tae-Woong;Lee, Syung-Young
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.1_2
    • /
    • pp.65-79
    • /
    • 2002
  • Object-oriented frameworks need to be systematically tested because they are reused in developing many applications software. They also need additional testing whenever they are extended for reuse. Frameworks, however, have properties that make it difficult to control and observe the testing of the parts that were modified and extended. In this paper, we describe the method of embedding test components as BIT(Built-In Test) into the framework's hot spots in order to efficiently detect the faults through testing that occurred while implementing application programs by modifying and extending the framework. The test components embedded into a framework make it easy to control and observe testing the framework, and thereby improve the testability of frameworks. Test components designed by the method proposed in this paper can be dynamically attached and detached to/from hot spots of a framework without changes or intervention to the framework code.

Improving Extensibility of DEVS Simulation Environment with Model Base by using Event Control Model Templates (이벤트 제어 모델 템플릿을 사용한 모델 라이브러리 기반 DEVS 시뮬레이션 환경의 확장성 개선)

  • Kwon, Se Jung;Lee, Jun Hee;Choi, Changbeom;Kim, Tag Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.1
    • /
    • pp.91-99
    • /
    • 2018
  • Discrete event simulation environments often need to be modified because additional questions to systems may become apparent while observing the simulation results repeatedly. It leads to increasing development budget and depreciating the effectiveness of the environment. To avoid the modifications and to generate the altered results, this paper applies an Event Control Model (ECM) with control functions that modulate, delete and generate the events at the simulation time. In addition, this paper suggests an easier approach for domain-users, who do not want to program at source code level, by using ECM templates. The simulators with the ECMs can have better extensibility because it becomes more adaptable to possibly unanticipated changes. It prevents increasing development costs due to modifications or development of new models by M&S experts, and it provides a new alternative step to domain users. To support the effectiveness of this approach, this paper describes a relevant example, which is composed of an initial simulation model based on our empirical studies. It will show that there exist the uncountable benefits because the existing simulator is reused by domain users without new projects.