• Title/Summary/Keyword: JAVA language

Search Result 421, Processing Time 0.024 seconds

A Study on Improvement of 2-Dim Filtering Efficiency for Image (2차원 영상 필터링 효율 향상을 위한 기술연구)

  • Jeon, Joon-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.6
    • /
    • pp.99-110
    • /
    • 2005
  • These days, many image processing techniques have been studied for effective image compression. Among those, The 2D image filtering is widely used for 2D image processing. The 2D image filtering can be implemented by performing the 1D linear filter separately in the horizontal and vertical direction. Efficiency of image compression depends on what filtering method is used. Generally, circular convolution is widely used in 2D image filtering for image processing. However it doesn't consider correlations at the boundary region of image, therefore effective filtering can not be performed. To solve this problem. I proposed new convolution technique using loop convolution which satisfies the 'alias-free' and 'error-free' requirement in the reconstructed image. This method could provide more effective compression performance than former methods because it used highly-correlated data when performed at the boundary region. In this paper, Sub-band Coding(SBC) was adopted to analyze efficiency of proposed filtering technique, and the simulator developed by Java-based language was used to examine the performance of proposed method.

A Study on the GUI Development Methods for GIS Construction under the Intranet Environment (인트라넷 환경에서 GIS 구축을 위한 GUI 개발 방법에 관한 연구)

  • Bu, Ki-Dong;Jo, Myung-Hee
    • Journal of the Korean association of regional geographers
    • /
    • v.4 no.2
    • /
    • pp.139-150
    • /
    • 1998
  • Recently in connection with the development of network technology, GIS researches shift their focuses to openGIS which enables to share heterogeneous geodata and geoprocessing resource under the environment of LAN and WAN. This study proposes an easy method to develope GUIs which enables openGIS in the intranet environment. In the developing stage of GUI, the most important thing is to develop effective windows programming technique and apply a internet linking technique to developed GUIs. This study shows an internet linking technique and a GUI developing method using OLE automation and ActiveX/COM standards. Using a case study of Taegu City Library, the study constructs a GIS database and develops its GUI which performs map overlaying, referencing attribute tables, drawing up of thematic map, buffer analysis, and statistical calculations. This study remains same further research areas of developing a new advanced technique for openGIS and its GUI using distributed object model of CORBA, Java language, and JDBC data accessing technique.

  • PDF

Prediction & Assessment of Change Prone Classes Using Statistical & Machine Learning Techniques

  • Malhotra, Ruchika;Jangra, Ravi
    • Journal of Information Processing Systems
    • /
    • v.13 no.4
    • /
    • pp.778-804
    • /
    • 2017
  • Software today has become an inseparable part of our life. In order to achieve the ever demanding needs of customers, it has to rapidly evolve and include a number of changes. In this paper, our aim is to study the relationship of object oriented metrics with change proneness attribute of a class. Prediction models based on this study can help us in identifying change prone classes of a software. We can then focus our efforts on these change prone classes during testing to yield a better quality software. Previously, researchers have used statistical methods for predicting change prone classes. But machine learning methods are rarely used for identification of change prone classes. In our study, we evaluate and compare the performances of ten machine learning methods with the statistical method. This evaluation is based on two open source software systems developed in Java language. We also validated the developed prediction models using other software data set in the same domain (3D modelling). The performance of the predicted models was evaluated using receiver operating characteristic analysis. The results indicate that the machine learning methods are at par with the statistical method for prediction of change prone classes. Another analysis showed that the models constructed for a software can also be used to predict change prone nature of classes of another software in the same domain. This study would help developers in performing effective regression testing at low cost and effort. It will also help the developers to design an effective model that results in less change prone classes, hence better maintenance.

Implementation of a Hybrid-App of a Path Tracking System Using Geolocation and Maps on Mobile Devices (위치정보와 지도를 이용한 경로추적 시스템의 모바일 기기에서의 하이브리드 앱 구현)

  • Yoo, Moon-Sung
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.633-637
    • /
    • 2013
  • By using geolocation and maps, we need to trace the path of ourselves, others, or the objects. Until now, we used a native apps development mehod to develop path tracking systems in mobile devices such as smart phones and tablet computers. A disadvantage of this method is that we have to work again to provide the same service on different platforms. Web Apps and Hybrid Apps are developed to recover this disadvantage. Since Hybrid Apps look like Native Apps apparently, users prefer Hybrid Apps to Web Apps. In this paper, we develop a hybrid app which can trace the path on mobile devices. The recently suggested next generation markup language, HTML5, has geolocation features. By using them, we implemented a hybrid app for a path tracking system. First, we create a web app using HTML5, CSS, and JavaScript, Then, PhoneGap, a mobile development framework, is used to convert it to the hybrid app. By implementing hybrid app, various apps which need path tracking can be developed rapidly and effectively, regardless of the mobile devices.

A Systematic Literature Survey of Software Metrics, Code Smells and Refactoring Techniques

  • Agnihotri, Mansi;Chug, Anuradha
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.915-934
    • /
    • 2020
  • Software refactoring is a process to restructure an existing software code while keeping its external behavior the same. Currently, various refactoring techniques are being used to develop more readable and less complex codes by improving the non-functional attributes of software. Refactoring can further improve code maintainability by applying various techniques to the source code, which in turn preserves the behavior of code. Refactoring facilitates bug removal and extends the capabilities of the program. In this paper, an exhaustive review is conducted regarding bad smells present in source code, applications of specific refactoring methods to remove that bad smell and its effect on software quality. A total of 68 studies belonging to 32 journals, 31 conferences, and 5 other sources that were published between the years 2001 and 2019 were shortlisted. The studies were analyzed based on of bad smells identified, refactoring techniques used, and their effects on software metrics. We found that "long method", "feature envy", and "data class" bad smells were identified or corrected in the majority of studies. "Feature envy" smell was detected in 36.66% of the total shortlisted studies. Extract class refactoring approach was used in 38.77% of the total studies, followed by the move method and extract method techniques that were used in 34.69% and 30.61% of the total studies, respectively. The effects of refactoring on complexity and coupling metrics of software were also analyzed in the majority of studies, i.e., 29 studies each. Interestingly, the majority of selected studies (41%) used large open source datasets written in Java language instead of proprietary software. At the end, this study provides future guidelines for conducting research in the field of code refactoring.

An Automated Draft Report Generator for Peripheral Blood Smear Examinations Based on Complete Blood Count Parameters

  • Kim, Young-gon;Kwon, Jung Ah;Moon, Yeonsook;Park, Seong Jun;Kim, Sangwook;Lee, Hyun-A;Ko, Sun-Young;Chang, Eun-Ah;Nam, Myung-Hyun;Lim, Chae Seung;Yoon, Soo-Young
    • Annals of Laboratory Medicine
    • /
    • v.38 no.6
    • /
    • pp.512-517
    • /
    • 2018
  • Background: Complete blood count (CBC) results play an important role in peripheral blood smear (PBS) examinations. Many descriptions in PBS reports may simply be translated from CBC parameters. We developed a computer program that automatically generates a PBS draft report based on CBC parameters and age- and sex-matched reference ranges. Methods: The Java programming language was used to develop a computer program that supports a graphical user interface. Four hematology analyzers from three different laboratories were tested: Sysmex XE-5000 (Sysmex, Kobe, Japan), Sysmex XN-9000 (Sysmex), DxH800 (Beckman Coulter, Brea, CA, USA), and ADVIA 2120i (Siemens Healthcare Diagnostics, Eschborn, Germany). Input data files containing 862 CBC results were generated from hematology analyzers, middlewares, or laboratory information systems. The draft reports were compared with the content of input data files. Results: We developed a computer program that reads CBC results from a data file and automatically writes a draft PBS report. Age- and sex-matched reference ranges can be automatically applied. After examining PBS, users can modify the draft report based on microscopic findings. Recommendations such as suggestions for further evaluations are also provided based on morphological findings, and they can be modified by users. The program was compatible with all four hematology analyzers tested. Conclusions: Our program is expected to reduce the time required to manually incorporate CBC results into PBS reports. Systematic inclusion of CBC results could help improve the reliability and sensitivity of PBS examinations.

Fuzzing Method for Web-Assembly Module Safety Validation (웹 어셈블리 모듈 안전성 검증을 위한 퍼징 방법)

  • Park, Sunghyun;Kang, Sangyong;Kim, Yeonsu;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.275-285
    • /
    • 2019
  • Web-assemblies are a new binary standard designed to improve the performance of Web browser JavaScript. Web-assemblies are becoming a new web standard that can run at near native speed with efficient execution, concise representation, and code written in multiple languages. However, current Web-assembly vulnerability verification is limited to the Web assembly interpreter language, and vulnerability verification of Web-assembly binary itself is insufficient. Therefore, it is necessary to verify the safety of the web assembly itself. In this paper, we analyze how to operate the web assembly and verify the safety of the current web-assembly. In addition, we examine vulnerability of existing web -assembly and analyze limitations according to existing safety verification method. Finally, we introduce web-assembly API based fuzzing method to overcome limitation of web-assembly safety verification method. This verifies the effectiveness of the proposed Fuzzing by detecting crashes that could not be detected by existing safety verification tools.

Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain (블록체인을 이용한 위변조 안드로이드 악성 앱 판별)

  • Hwang, Sumin;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.61-68
    • /
    • 2019
  • Although the number of smartphone users is continuously increasing due to the advantage of being able to easily use most of the Internet services, the number of counterfeit applications is rapidly increasing and personal information stored in the smartphone is leaked to the outside. Because Android app was developed with Java language, it is relatively easy to create counterfeit apps if attacker performs the de-compilation process to reverse app by abusing the repackaging vulnerability. Although an obfuscation technique can be applied to prevent this, but most mobile apps are not adopted. Therefore, it is fundamentally impossible to block repackaging attacks on Android mobile apps. In addition, personal information stored in the smartphone is leaked outside because it does not provide a forgery self-verification procedure on installing an app in smartphone. In order to solve this problem, blockchain is used to implement a process of certificated application registration and a fake app identification and detection mechanism is proposed on Hyperledger Fabric framework.

KPetro: An Information System for Korean Petroglyph Ruins Supporting the Dedicated Camera Application (KPetro: 전용 카메라 앱을 지원하는 한국 암각화 유적 정보 시스템)

  • Lee, Wookun;Lee, Myung-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.1
    • /
    • pp.265-276
    • /
    • 2017
  • Korean petroglyphs have been found over a lot of ruins through nation-wide regions including Daegok-ri Bangudae and Cheonjeon-ri in Ulsan. In this paper, we present an information system for Korean petroglyph ruins named KPetro which supports the dedicated camera application and the timeline service. The system provides the services for searching and updating information in various ways over the primary database constructed with the data on petroglyph ruins, which are collected by the Bangudae Petroglyph Institute. In addition, through the camera application developed for the system, users can easily add photos to the appropriate petroglyph ruin according to the GPS information of the location where those photos are taken. Also, the system provides the timeline service showing the photos for a specific petroglyph ruins in order of shooting time. To support both mobile and desktop environments, KPetro provides its functions in a web browser using the HTML5 standard technology and the JavaScript language, enabling the system to be adaptable to various user devices and extendable for its functionalities.

Design and Implementation of a Translator for Translating Java Bytecode into MSIL (자바 Bytecode 에서 MSIL 로의 변환을 위한 번역기의 설계 및 구현)

  • Min, Jung-Hyun;Oh, Se-Man
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.743-746
    • /
    • 2001
  • 자바는 객체지향 언어이고, 한번 작성된 프로그램은 자바 가상 기계가 있는 모든 곳에서 수정없이 실행될 수 있기 때문에 소프트웨어의 개발과 유지 보수에 많은 장점을 가진 언어이다. 이러한 특징으로 인하여 개발되는 제품들이 자바로 구현되는 경우가 많다. 그러나 아직 대다수 소프트웨어 개발자들은 주로 C 언어나 C++ 언어를 사용하고 있으며, 최근에는 C#이라는 언어를 사용하고 있다. 자바가 플랫폼에 독립적인 장점은 가지고 있지만, 다수의 개발자 및 사용자가 마이크로소프트 윈도우 운영체제를 사용하고 있다는 것을 감안한다면 그리 탁월한 장점만은 될 수 없다. 또한, 최근의 개발동향이 COM(Component Object Model)을 지향하고 있고, 이는 더 이상 개발자들에게 프로그래밍 언어에 구애를 받지 않고 오직 개발 제품에 대한 집중력을 가질 수 있는 환경을 제공할 수 있다면, 그 개발 효율에 있어서 상당한 이점을 가질 수 있다는 의미이다. 따라서, COL(Component Object Language)을 기반으로 하고 있는 C# (C sharp)언어를 사용하여 개발을 함에 있어서 자바의 언어를 C# 언어로 변환할 수 있다면, 신생 언어인 C#에 있어서 기존 자바로 되어 있는 유용한 개발 제품들을 보다 효율적으로 이용할 수 있을 것이다. 본 논문에서는 두 언어(자바, C#)를 하나로 잇는 교량(bridge)역할을 할 수 있도록 자바의 중간 언어인 Bytecode를 C#의 중간 언어인 MSIL(Microsoft Intermediate Language)로 바꿀 수 있는 중간 언어 번역기를 설계하고 구현하였다. 이를 위한 방법으로는 먼저, 자바 Bytecode 와 MSIL 의 어셈블리 형태에서의 명령어 매칭과정을 매핑 테이블을 이용하여 처리하였고, MSIL 에서 자바 Bytecode 의 함수와 같은 기능을 하는 메소드의 변환을 위하여 마크로 변환기법을 이용하여 해결하였다.I/O ratio 2.5). BTEX의 상대적 함량도 실내가 실외보다 높아 실내에도 발생원이 있음을 암시하고 있다. 자료 분석결과 유치원 실내의 벤젠은 실외로부터 유입되고 있었고, 톨루엔, 에틸벤젠, 크실렌은 실외뿐 아니라 실내에서도 발생하고 있었다. 정량한 8개 화합물 각각과 총 휘발성 유기화합물의 스피어만 상관계수는 벤젠을 제외하고는 모두 유의하였다. 이중 톨루엔과 크실렌은 총 휘발성 유기화합물과 좋은 상관성 (톨루엔 0.76, 크실렌, 0.87)을 나타내었다. 이 연구는 톨루엔과 크실렌이 총 휘발성 유기화합물의 좋은 지표를 사용될 있고, 톨루엔, 에틸벤젠, 크실렌 등 많은 휘발성 유기화합물의 발생원은 실외뿐 아니라 실내에도 있음을 나타내고 있다.>10)의 $[^{18}F]F_2$를 얻었다. 결론: $^{18}O(p,n)^{18}F$ 핵반응을 이용하여 친전자성 방사성동위원소 $[^{18}F]F_2$를 생산하였다. 표적 챔버는 알루미늄으로 제작하였으며 본 연구에서 연구된 $[^{18}F]F_2$가스는 친핵성 치환반응으로 방사성동위원소를 도입하기 어려운 다양한 방사성의 약품개발에 유용하게 이용될 수 있을 것이다.었으나 움직임 보정 후 영상을 이용하여 비교한 경우, 결합능 변화가 선조체 영역에서 국한되어 나타나며 그 유의성이 움직임 보정 전에 비하여 낮음을 알 수 있었다. 결론: 뇌활성화 과제 수행시에 동반되는 피험자의 머리 움직임에 의하여 도파민 유리가 과대평가되었으며 이는 이 연구에서 제안한 영상정합을 이용한 움직임 보정기법에 의해서 개선되었다. 답이 없는 문제, 문제 만들기, 일반화가 가능한 문제 등으로 보고, 수학적 창의성 중 특히 확산적 사고에 초점을 맞추어 개방형 문제가 확산적 사고의 요소인 유창성, 독창성, 유연성 등에 각각 어떤 영향을 미치는지 20주의 프로그램을 개발, 진행하여 그 효과를

  • PDF