• Title/Summary/Keyword: Computer software

Search Result 8,400, Processing Time 0.034 seconds

Automatic UML Design Extraction with Software Visualization based on Reverse Engineering

  • Jung, Se Jun;Kim, Janghwan;Lee, Won Young;Park, Bo Kyung;Son, Hyun Seung;Kim, R. Young Chul
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.89-96
    • /
    • 2021
  • In various areas of the 4th industry, a big issue is software quality enhancement for stability and reliability of the smart software systems. After revising software promotion law at 2020, we must clearly define requirements and separate design parts and implementation parts of an all public software development contracts. In this study, we need to validate whether the final implementation of software is followed by the original design or not. To do this, we consider the design restoration through software visualization based on reverse engineering. Therefore we propose an UML design extraction and visualization method based on reverse engineering. Based on this, we may validate whether it is implemented according to the original design, and how much visualizes and includes the code the internal complexity for improvement of software quality.

Improving Fault Traceability of Web Application by Utilizing Software Revision Information and Behavior Model

  • Baek, Seungsuk;Lee, Jung-Won;Lee, Byungjeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.817-828
    • /
    • 2018
  • Modern software, especially web-based software, is broadly used in various fields. Most web applications employ design patterns, such as a model-view-controller (MVC) pattern and a factory pattern as development technology, so the application can have a good architecture to facilitate maintenance and productivity. A web application, however, may have defects and developers must fix the defects when a user submits bug reports. In this paper, we propose a novel approach to improving fault traceability in web application by using software revision information and software behavior model to reduce costs and effectively handle the software defect. We also provide a case study to show effectiveness of our approach.

A Multi-Perspective Benchmarking Framework for Estimating Usable-Security of Hospital Management System Software Based on Fuzzy Logic, ANP and TOPSIS Methods

  • Kumar, Rajeev;Ansari, Md Tarique Jamal;Baz, Abdullah;Alhakami, Hosam;Agrawal, Alka;Khan, Raees Ahmad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.240-263
    • /
    • 2021
  • One of the biggest challenges that the software industry is facing today is to create highly efficient applications without affecting the quality of healthcare system software. The demand for the provision of software with high quality protection has seen a rapid increase in the software business market. Moreover, it is worthless to offer extremely user-friendly software applications with no ideal security. Therefore a need to find optimal solutions and bridge the difference between accessibility and protection by offering accessible software services for defense has become an imminent prerequisite. Several research endeavours on usable security assessments have been performed to fill the gap between functionality and security. In this context, several Multi-Criteria Decision Making (MCDM) approaches have been implemented on different usability and security attributes so as to assess the usable-security of software systems. However, only a few specific studies are based on using the integrated approach of fuzzy Analytic Network Process (FANP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) technique for assessing the significant usable-security of hospital management software. Therefore, in this research study, the authors have employed an integrated methodology of fuzzy logic, ANP and TOPSIS to estimate the usable - security of Hospital Management System Software. For the intended objective, the study has taken into account 5 usable-security factors at first tier and 16 sub-factors at second tier with 6 hospital management system softwares as alternative solutions. To measure the weights of parameters and their relation with each other, Fuzzy ANP is implemented. Thereafter, Fuzzy TOPSIS methodology was employed and the rating of alternatives was calculated on the foundation of the proximity to the positive ideal solution.

A Method for Improving Recommender System using Graph Clustering (그래프 클러스터링을 이용한 추천 시스템 성능 개선 방안)

  • Hong, Dong-Gyun;Hong, Jiwon;Lee, Yeon-Chang;Kim, Sang-Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.1233-1234
    • /
    • 2015
  • 추천 시스템의 정확도를 향상시키기 위한 방법으로 그래프 클러스터링을 활용한다. 본 논문에서는 실험을 통하여 RWR 알고리즘을 사용하는 추천 시스템의 정확도를 Modularity 기반 클러스터링 알고리즘을 활용함으로써 개선하는 것을 보인다.

A UML-Based Work Flow Model of the Component Based Software Development Process (UML에 기반한 CBSD Process의 Work Flow Model)

  • Yim, Sung-Bin;Song, Chi-Yang;Moon, Chang-Joo;Baik, Doo-Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.04a
    • /
    • pp.842-845
    • /
    • 2000
  • 컴포넌트라는 소프트웨어 개발 기술에 대해서 중요성이 점점 높아만 가고 있는 가운데, 이 컴포넌트 기술를 이용하여 효율적이고, 실용적으로 소프트웨어를 개발 할 수 있도록 컴포넌트 기반의 소프트웨어 개발 방법에 대하여 연구 제시한다. 즉, 컴포넌트가 가지고 있는 구성요소로서 인터페이스라는 것이 있는데 이 인터페이스와 컴포넌트를 이용해서 만들고자 하는 시스템에 대한 요구사항에 맞게 분석 및 설계를 하고, 만들고자 하는 시스템과 컴포넌트의 투명성을 보여 줄 수 있는 방법에 대해서 Work Flow Model과 각각의 프로세스에 의해서 만들어지는 산출물을 통해서 컴포넌트 기반의 소프트웨어 개발 프로세스에 대해서 제시를 한다.

  • PDF

A Comparative Analysis on Software Education Unit in Practical Arts Textbooks based on 2015 Revised National Curriculum

  • Kim, Ji-Yun;Lee, Tae-Wuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.2
    • /
    • pp.217-225
    • /
    • 2019
  • In this paper, we proposed comparison of software education units according to 2015 Revised National Curriculum. Comparative analysis of 6 Practical Arts textbooks was conducted especially on the software education units. The analysis criteria were decided to be unit system, unit structure, learning objectives, the way of placing contents, activities, supporting materials, providing resources, and evaluation. As a result, the software education units have secured a lot of quantity compared to the total number of units. And the affective domain of the learning objectives is shown to be lacking. All the textbooks were uniformly arranged the component of contents described in 2015 revised national curriculum. Cooperative activities are strengthened compared to the previouse curriculum. On the other hand, evaluations have a large variation among textbooks and some have fewer types.

Study on Z specification for S/W Safety of Computer Based Interlocking Systems (전자연동장치 S/W 안전성 확보를 위한 Z 방법표현에 관한 연구)

  • Ahn, Jin;Lee, Jongwoo
    • Journal of the Korean Society for Railway
    • /
    • v.20 no.1
    • /
    • pp.55-63
    • /
    • 2017
  • Railway interlocking systems which are safety-critical systems are rapidly changed from relay-based systems to computer-based systems which have high flexible. Computer-based interlocking systems (CBI) are consisted of hardware and software in which system safeties arise one of important problems. The interlocking software of the CBI influences directly to the system safeties. "z" notation is one of formal methods have been used for system software specification to secure system safety. In this paper, the specification of interlocking logics for CBI systems is realized using "z" notation and verifies it with Z/EVES.

Intelligent Surveillance System using Kinect sensor and Multirotor (키넥트 및 멀티로터를 이용한 지능형 감시 시스템)

  • Oh, Jung-hak;Yu, Do-jun;Goo, Ha-neul;Kim, Ho-sung;Kim, Seong-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.541-544
    • /
    • 2012
  • In technology advances, The field of military and security surveillance system for a wide range of interest is required. Surveillance system offers a variety of services by the software that work with a remote access server. This paper shows the results of the implementation using three platforms as Mjpg-streamer for server, Arduino-multiwii for control system, OpenNI and OpenCV for image processing.

  • PDF

A Study on Efficient Software Education Donation Ecosystem

  • Kil, Hyunyoung;Lee, Won Joo;Lim, Chunsung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.4
    • /
    • pp.175-182
    • /
    • 2018
  • In this paper, we propose a software education ecosystem model for activating software education donation. First, in order to investigate current software education donation status, we will conduct a survey on software education donors and analyze the results. 39.6% of the software education donors responded that they were introduced to software education donation activities through their affiliated companies, institutions, organizations. Therefore, it can be seen that the promotion of software education donation activities is the most effective by promoting through software companies, organizations, and organizations and using human networks. The subjects of software education donation activities were the highest at middle school students (73.9%), and the contents of software education donations were the highest at programming practice (63.3%). Donors' satisfaction with software education donation activities was 57.9%. The social support for SW education donors was in the order of software education contents support, activity cost support, equipment and network support, and place sponsorship. 87.4% of donors were willing to continue to donate to software education. The reason why they did not want to continue donating software education was 'lack of personal time' (65.4%). Therefore, it is necessary to develop appropriate social support and incentive system to overcome shortage of personal time in order to activate software education contribution. In order to promote sustainable software education donations, it is essential to establish a virtuous circle of software education donation ecosystem based on cooperation and solidarity with various organizations such as government, corporations, institutions, universities and civil society organizations.

Software Engineering Meets Network Engineering: Conceptual Model for Events Monitoring and Logging

  • Al-Fedaghi, Sabah;Behbehani, Bader
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.9-20
    • /
    • 2021
  • Abstraction applied in computer networking hides network details behind a well-defined representation by building a model that captures an essential aspect of the network system. Two current methods of representation are available, one based on graph theory, where a network node is reduced to a point in a graph, and the other the use of non-methodological iconic depictions such as human heads, walls, towers or computer racks. In this paper, we adopt an abstract representation methodology, the thinging machine (TM), proposed in software engineering to model computer networks. TM defines a single coherent network architecture and topology that is constituted from only five generic actions with two types of arrows. Without loss of generality, this paper applies TM to model the area of network monitoring in packet-mode transmission. Complex network documents are difficult to maintain and are not guaranteed to mirror actual situations. Network monitoring is constant monitoring for and alerting of malfunctions, failures, stoppages or suspicious activities in a network system. Current monitoring systems are built on ad hoc descriptions that lack systemization. The TM model of monitoring presents a theoretical foundation integrated with events and behavior descriptions. To investigate TM modeling's feasibility, we apply it to an existing computer network in a Kuwaiti enterprise to create an integrated network system that includes hardware, software and communication facilities. The final specifications point to TM modeling's viability in the computer networking field.