• Title/Summary/Keyword: JAVA language

Search Result 421, Processing Time 0.023 seconds

Design and Implementation of a Java ORB (Java ORB설계 및 구현)

  • Lee, Gwon-Il;Seo, Rae-Won
    • The Journal of Engineering Research
    • /
    • v.6 no.1
    • /
    • pp.41-51
    • /
    • 2004
  • 본 논문은 OMG(Object Management Group) CORBA(Common Object Request Broker Architecture) 2.0을 만족하는 객체 중개자인 iORB(Internet ORB)의 설계 및 구현에 대한 것이다. iORB는 OMG IDL(Interface Definition Language)을 자바(Java)로 사상(mapping)할 뿐만 아니라 iORB 자체를 자바로 구현한 자바 객체 중개자(Java ORB)이다. iORB는 이식성 있는 스텁과 스켈리턴 코드를 지원하며, 기본 통신 프로토콜로 IIOP(Internet Inter-ORB Protocol)을 채택하고 있다. 그리고 원격 시스템의 객체 구현(object implementation) 참조에 필요한 IOR(Interoperable Object Reference) 찾기를 IP Multicast를 사용하고 있다. 본 논문에서는 이러한 특성을 지닌iORB의 설계 및 구현 경험에 대해서 기술한다.

  • PDF

Implementation of Face Detection System on Android Platform for Real-Time Applications (실시간 응용을 위한 안드로이드 플랫폼에서의 안면 검출 시스템 구현)

  • Han, Byung-Gil;Lim, Kil-Taek
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.8 no.3
    • /
    • pp.137-143
    • /
    • 2013
  • This paper describes an implementation of face detection technology for a real-time application on the Android platform. Java class of Face-Detection for detection of human face is provided by the Android API. However, this function is not suitable to apply for the real-time applications due to inadequate detection speed and accuracy. In this paper, the AdaBoost based classification method which utilizes Local Binary Pattern (LBP) histogram is employed for face detection. The face detection module has been developed by C/C++ language for high-speed image processing, and this module is included to the Android platform using the Java Native Interface (JNI). The experiments were carried out in the Java-based environment and JNI-based environment. The experimental results have shown that the performance of JNI-based is faster than Java-based method and our system is well enough to apply for real-time applications.

Conceptual Study of the Application Software Manager Using the Xlet Model in the Nuclear Fields (원자력 관점에서의 Xlet 모델을 이용한 응용 소프트웨어 관리자 개념 연구)

  • Joon-Koo Lee;Hee-Seok Park;Heui-Youn Park;In-Soo Koo
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.11a
    • /
    • pp.59-65
    • /
    • 2003
  • In order to reduce the cost of software maintenance including software modification, we suggest the object oriented program with checking the version of application program using the Java language and the technique of executing the downloaded application program via network using the application manager. In order to change the traditional scheduler to the application manager we have adopted the Xlet concept in the nuclear fields using the network. In usual Xlet means a Java application that runs on the digital television receiver. The Java TV Application Program Interface(API) defines an application model called the Xlet application lifecycle. Java applications that use this lifecycle model are called Xlets. The Xlet application lifecycle is compatible with the existing application environment and virtual machine technology. The Xlet application lifecycle model defines the dialog(protocol) between an Xlet and its environment

  • PDF

On Design and Implementation of Distributed Objects Translation System for Inter-Operability (분산 객체의 호환을 위한 객체 번역 시스템의 설계 및 구현)

  • Kim, Sik
    • The Journal of Information Technology
    • /
    • v.5 no.1
    • /
    • pp.29-37
    • /
    • 2002
  • Distributed programming can be greatly simplified by language support for distributed communication. Many web browsers now offer some form of distributed objects and the number and types of them are growing daily in interesting and innovative ways CORBA IDL and Java RMI, the representative of distributed object model, support different approaches for distributed computing environments. CORBA approach does not support the application generated by java RMI, even though it supports multiple programming languages. Object translation system between RMI to CORBA is designed and implemented for interoperability of distributed objects on the two different distributed programming environments. Suggested system is considered binding, inheritance, polymorphism, object passing, and callback which are key properties on the distributed objects. Translation System we suggested is implemented on the Window/NT(version 4.0) with Java Development Kit(version 1.1.6).

  • PDF

A Study on Object-Oriented Programming Education for Improving Logical Thinking Ability of Elementary School Students (초등학생의 논리적 사고력 향상을 위한 객체지향 프로그래밍 교육 연구)

  • Park, Kyeong-Mo;Hong, Tae-Jin
    • Journal of Digital Contents Society
    • /
    • v.10 no.2
    • /
    • pp.367-373
    • /
    • 2009
  • Computer programming education helps students understand abstract concepts better and solve given problems independently. Many previous studies on programming education have focused on procedural programming languages such as BASIC and C, but studies on objected-oriented program ming language like JAVA is rare. This paper examines how an architectural neural, objected-oriented JAVA programming study system can improve logical thinking ability and encourage self-led study and stimulate interests in computers among elementary school students. The system has been developed and is suitable for distributed Internet environment. The experiment results demonstrated that the objected-oriented programming education enhances logical thinking ability, exerts a positive impact on student achievement in math and science, and stimulate interests in computers.

  • PDF

Sanskrit Inscriptions in Northeastern Indian Scripts in Premodern Java and the Maritime Asian Networks of Mahāyāna Buddhist Tantra

  • Andrea ACRI
    • Acta Via Serica
    • /
    • v.9 no.1
    • /
    • pp.91-138
    • /
    • 2024
  • This survey explores artifacts like steles, metal or stone statues, metal foils, and coins, bearing inscriptions in the Sanskrit language and Siddhamātṛkā (or "Siddham"), Nāgarī, and Proto-Bengali/Gauḍī scripts produced in Java between the 8th and 13th century CE, contextualizing them against the background of the pan-Asian networks of Tantric Buddhism or Mahāyāna Buddhist Tantra and especially its circulation along the maritime "Silk Routes." Discussing the interrelationship between languages, scripts, religions, and politics in Java and relevant regions of the wider Buddhist world, it tries to answer questions concerning foreign or local agency and audience as well as transregional connectivity. In particular, it argues that the quick spread of varieties of Mahāyāna/Mantrayāna Buddhism from the Subcontinent to Java and East Asia during a "first wave" from the 8th to the 9th century appears to have occurred in parallel with the diffusion of Siddhamātṛkā script in those locales, whereas a "second wave" of Tantric Buddhism linking the Indo-Tibetan and East Asian Buddhist world is associated with Nāgarī and Proto-Bengali/Gauḍī script in East Java.

Program Translation from Conventional Programming Source to Java Bytecode (기존 프로그래밍 원시코드에서 자바 바이트 코드로의 변환)

  • Jeon-Geun Kang;Haeng-Kon Kim
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.8
    • /
    • pp.963-980
    • /
    • 2002
  • Software reengineering is making various research for solutions against problem of maintain existing systems. Reengineering has a meaning of development of software on exizting systems through the reverse engineering auf forward engineering. Most of the important concepts used in reengineering is composition that is restructuring of the existing objects. Is there a compiler that can compile a program written in a traditional procedural language (like C or Pascal) and generate a Java bytecode, rather than an executable code that runs oかy on the machine it was compiled (such as an a.out file on a Unix machine)\ulcorner This type of compiler may be very handy for today's computing environment of heterogeneous networks. In this paper we present a software system that does this job at the binary-to-binary level. It takes the compiled binary code of a procedural language and translates it into Java bytecode. To do this, we first translate into an assembler code called Jasmin [7] that is a human-readable representation of Java bytecode. Then the Jasmin assembler converts it into real Java bytecode. The system is not a compiler because it does not start at the source level. We believe this kind of translator is even more useful than a compiler because most of the executable code that is available for sharing does not come with source programs. Of course, it works only if the format of the executable binary code is known. This translation process consists of three major stages: (1) analysis stage that identifies the language constructs in the given binary code, (2) initialization stage where variables and objects are located, classified, and initialized, and (3) mapping stage that maps the given binary code into a Jasmin assembler code that is then converted to Java bytecode.

  • PDF

A Study On The Development Of a Home Networking System Using An Embedded Linux Board (임베디드 리눅스 보드를 이용한 홈 네트워킹 시스템 구현에 관한 연구)

  • Lee, Heon-Joo;Lee, Jong-Su;Choi, Kyung-Sam
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.592-595
    • /
    • 2003
  • In this paper, we have designed a Home Networking System using an embedded linux board. The system based on the World-Wide-Web is composed of three parts - a Server, a Client and a Simulator. The Home Networking Server is built in an embedded board using an embedded linux kernel. A web-server and Home Networking Server Seryice Demon programming with a Jaya-Language is included in the board. Clients can connect to the server board using a web-browser in the desktop computer, PDA or any other machines which include a web-browser. For this purpose, we made the client program using a Java-Applet. So, the clients who connect to the server for the control of the applications, download the class-file and execute the client-program in the web-browser. So, the clients don't need any other programs to control the applications from a remote place. The size of server board is very small (86.3$\times$74mm), which makes it very useful not only for the Home-Networking-System but also in many other fields, e.g., embedded robot control system, etc. Using an embedded board instead of a desktop computer is good for a simple network environment and it occupies only a small space to make the system.

  • PDF

A SMIL 1.0 Contents Generating Tool Implemented by JAVA (JAVA로 구현한 SMIL 1.0 컨텐츠 생성도구)

  • Song, Jun-Hong;Kim, Se-Young;Lee, Jong-Youl;Kim, Hyun-Hee;Shin, Dong-Kyoo;Shin, Dong-Il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.565-568
    • /
    • 2001
  • 고속 인터넷과 멀티미디어 관련 기술의 발달에 따라 통합 멀티미디어 서비스의 기반 구축이 활발히 진행되고 있으며, 이에 따라 단순 이미지, 텍스트만으로 구성되었던 기존의 웹 서비스 환경은 급격히 변화하고 있다. 그러나, 과거의 정적인 텍스트 위주의 고정된 내용을 표현하는 웹 페이지 저작으로는 멀티미디어에 대한 급격히 증대되는 사용자의 요구를 수용할 수 없게 되었다. 이에 따라 1998년도에 시간에 기반을 둔 멀티미디어 데이터의 통합 및 동기화를 위한 효과적인 프리젠테이션(Presentation)을 기술할 수 있는 SMIL(Synchronized Multimedia Integration Language)이 W3C(World Wide Web Consortium)에 의해 제안되었다. SMIL은 XML(eXended Markup Language)에 기반 한 선언적 마크업(Markup) 언어이며 텍스트 편집기 등으로 쉽게 저작할 수 있으나, 태그(Tag)기반 언어이므로 태그의 사용법을 숙지하여야만 효과적인 멀티미디어 프리젠테이션 제작이 가능하다. 이러한 난점을 극복하기 위해 본 논문에서는 Java를 기반으로 한 SMIL 문서 템플릿 기능과 멀티미디어 소스의 미리 보기 기능을 지원하는 SMIL 저작도구의 설계, 구현에 대하여 서술한다.

  • PDF

Development of Safe Korean Programming Language Using Static Analysis (정적 분석을 이용한 안전한 한글 프로그래밍 언어의 개발)

  • Kang, Dohun;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.79-86
    • /
    • 2016
  • About 75% of software security incidents are caused by software vulnerability. In addition, the after-market repairing cost of the software is higher by more than 30 times than that in the design stage. In this background, the secure coding has been proposed as one of the ways to solve this kind of maintenance problems. Various institutions have addressed the weakness patterns of the standard software. A new Korean programming language Saesark has been proposed to resolve the security weakness on the language level. However, the previous study on Saesark can not resolve the security weakness caused by the API. This paper proposes a way to resolve the security weakness due to the API. It adopts a static analyzer inspecting dangerous methods. It classifies the dangerous methods of the API into two groups: the methods of using tainted data and those accepting in-flowing tainted data. It analyses the security weakness in four steps: searching for the dangerous methods, configuring a call graph, navigating a path between the method for in-flowing tainted data and that uses tainted data on the call graph, and reporting the security weakness detected. To measure the effectiveness of this method, two experiments have been performed on the new version of Saesark adopting the static analysis. The first experiment is the comparison of it with the previous version of Saesark according to the Java Secure Coding Guide. The second experiment is the comparison of the improved Saesark with FindBugs, a Java program vulnerability analysis tool. According to the result, the improved Saesark is 15% more safe than the previous version of Saesark and the F-measure of it 68%, which shows the improvement of 9% point compared to 59%, that of FindBugs.