• Title/Summary/Keyword: JAVA program

Search Result 339, Processing Time 0.028 seconds

COSIM(HARDWARE-SOFTWARE COSIMULATOR): JAVABEANS-BASED TOOL FOR WEB APPLICATIONS

  • Lee, Kangsun;Jaeho Jung;Youngsuk Hwang
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2001.10a
    • /
    • pp.354-358
    • /
    • 2001
  • Cosim (Hardware and Software Co-Simulator) is a JavaBeans-based simulation tool fur validating systems architecture and estimating performance of web applications. Cosim has four components: Modeler, Translator, Engine and Scenario. Users start from Modeler to describe systems architecture in UML(Unified Modeling Language) deployment diagram, and then specify hardware & software performance parameters such as execution delay, network topology, and frame size. All information specified on Modeler are sent to Translator, and then automatically converted to Java programs. Scenario is responsible to run the Java program and produce results in text reports and graphs. Developers can reduce development time and cost by validating systems architecture of web applications before the actual deployment.

  • PDF

A Study of a Java Programming Plan for the Development of Mathematics Learning Materials of Middle School (중학교 수학 학습자료 개발을 위한 Java 프로그래밍 설계 연구)

  • 장진관
    • Journal of the Korean School Mathematics Society
    • /
    • v.2 no.1
    • /
    • pp.181-195
    • /
    • 1999
  • This research is produced as a applet of learning materials, and is made with the internet languages HTML, Java, and NamoWebeditor. It contains "Greatest Common Divisor and Least Common Multiple", "Parallel translation of function of second order", "Pythagoras Theorem", which is the current middle school mathmatics textbook for third graders. The keynote of this research is that the students can study individually through logging into the internet on their own computers; the program is made using graphics and animation on order to develop the learners′ interest in mathematics. I hope that this research can supplement our currently insufficient internet educational data.

  • PDF

The Design of XML DTD for Information Sharing of Java Program (Java 프로그램의 정보공유를 위한 XML DTD 설계)

  • 장근실;유철중;장옥배
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10a
    • /
    • pp.510-512
    • /
    • 1999
  • 개발환경이 고정된 장소에서 분산된 장소로 점차 변함에 따라서 프로젝트나 프로그래밍에 관련된 주변인들 사이에 발생할 수 있는 정보 공유와 교환이 어려워지고 있다. 인터넷과 인트라넷의 급격한 증가로 인해 개발자들은 분산된 환경에서 작업을 수행하는 일이 많아지면서 기존의 HTML을 이용한 문서의 공유나 교환은 HTML의 제한점들로 인해 많은 부담이 된다. 본 논문에서는 분산환경에서 정보공유와 교환을 위해 HTML의 제한점들을 보안하여 확장성이 뛰어나고, 사용자 정의 태그를 지원하며, 문서의 논리적인 정보를 제공할 수 있는 XML을 이용하여 급격한 사용자 증가를 얻고 있는 Java 프로그램을 대상을 하는 정보 공유와 교환에 필요한 정보들을 각 모듈별로 제안하고, 제안된 정보에 대한 HML DTD를 설계한다.

  • PDF

A Method to Construct Control Flow Graphs for Java Programs by Decoupling Exception Flow Analysis from Normal Flow Analysis (예외 흐름 분석을 정상 흐름 분석과 분리하여 Java프로그램에 대한 제어 흐름 그래프를 생성하는 방법)

  • 조장우;창병모
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.5
    • /
    • pp.643-650
    • /
    • 2004
  • Control flow graph is used for Performing many Program-analysis techniques, such as data-flow and control-dependence analysis, and software-engineering techniques, such as program slicing and testings. For these analyses to be safe and useful, the CFG should incorporate the exception flows that are induced by exceptions. In previous research to construct control flow graph, normal flows and exception flows are computed at the same time, since these two flows are known to be mutually dependent. By investigating realistic Java programs, we found that the cases when these two flows are mutually dependent rarely happen. So, we can decouple exception flow analysis from normal flow analysis. In this paper we propose an analysis that estimates exception flows. We also propose exception flow graph to represent exception flows. And we show that the control flow graph that accounts for exception flows can be constructed by merging exception flow graph onto normal control flow graph.

A Study of protective measures of the source program for the development of the Internet of Things (IoT): Protection of the program as well as plagiarism research (사물인터넷(IoT)발전을 위한 소스프로그램 보호방안 연구: 프로그램의 보호와 유사표절 연구)

  • Lee, Jong-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.31-45
    • /
    • 2018
  • Recent dramatical development of computer technology related to internet technology intensifies the dispute over software of computer or smart device. Research on software has been flourished with political issuing of fierce competition among nations for software development. Particularly industrial growth in ethernet based big data and IoT (Internet of Things) has promoted to build and develop open source programs based on java, xcode and C. On these circumstances, issue on software piracy has been confronted despite the basic security policy protecting intellectual property rights of software and thus it is of substantial importance to protect the rights of originality of source program license. However, the other issue on source technology protection of developer is the possibility of hindrance to advancement in industry and culture by developing programs. This study discuss the way of enhancing legal stability of IoT application program development and reinforcing precision in inspection of program plagiarism by analyzing the source programs with newly introducing text mining technique, thus suggests an alternative protective way of infringement of personal information due to duplicating program.

The Design and Implementation of On-Line Performance Monitor for JaNeC (JaNeC을 위한 온라인 성능감시기의 설계 및 구현)

  • Kim, Myung-Ho;Kim, Nam-Hoon;Choi, Jae-young
    • The KIPS Transactions:PartA
    • /
    • v.9A no.4
    • /
    • pp.563-572
    • /
    • 2002
  • A performance monitor is indispensable to trace and evaluate performance of a program under distributed processing environment. A performance monitor il classified as off-line and on-line according to its output method. An off-line performance monitor analyzes its performance after a program terminates, and an on-line performance monitor analyzes its one while a program runs. Therefore, the on-line function is essential to analyzing and debugging the program fast. JaNeC, distributed processing environment that is implemented in Java, contains an off-line performance monitor for this. However, this performance monitor may not analyze the program running on JaNeC efficiently. Consequently, this paper explains that an on-line performance monitor is designed and implemented for fast analysis and debugging of the program running on JaNeC. This on-line performance monitor is designed to minimize effects on a program to analyze, and provides various forms of graphic output, to analyze the program effectively. In addition, even after a program terminates, it provides interface with the off-line performance monitor, to analyze again.

A Java Birthmark based on Control Flow Graph Matching (제어 흐름 그래프 매칭 기반 자바 버스마크)

  • Park, Hee-Wan;Lim, Hyun-Il;Choi, Seok-Woo;Han, Tai-Sook
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.11
    • /
    • pp.871-875
    • /
    • 2009
  • A software birthmark is inherent characteristics that can be used to identify a program. In this paper, we propose a new Java birthmark based on control flow graph (CFG) matching. The CFG matching consists of node matching and edge matching. To get similarities of nodes and edges of two CFGs, we apply a sequence alignment algorithm and a shortest path algorithm, respectively. To evaluate the proposed birthmark, we perform experiments on Java programs that implement various algorithms. In the experiments, the proposed birthmark shows not only high credibility and resilience but also fast runtime performance.

A Catalog of Bad Smells in Design-by-Contract Methodologies with Java Modeling Language

  • Viana, Thiago
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.4
    • /
    • pp.251-262
    • /
    • 2013
  • Bad smells are usually related to program source code, arising from bad design and programming practices. Refactoring activities are often motivated by the detection of bad smells. With the increasing adoption of Design-by-Contract (DBC) methodologies in formal software development, evidence of bad design practices can similarly be found in programs that combine actual production code with interface contracts. These contracts can be written in languages, such as the Java Modeling Language (JML), an extension to the Java syntax. This paper presents a catalog of bad smells that appear during DBC practice, considering JML as the language for specifying contracts. These smells are described over JML constructs, although several can appear in other DBC languages. The catalog contains 6 DBC smells. We evaluate the recurrence of DBC smells in two ways: first by describing a small study with graduate student projects, and second by counting occurrences of smells in contracts from the JML models application programming interface (API). This API contains classes with more than 1,600 lines in contracts. Along with the documented smells, suggestions are provided for minimizing the impact or even removing a bad smell. It is believed that initiatives towards the cataloging of bad smells are useful for establishing good design practices in DBC.

Development of Optimal Maze Path Game Using Java (3차원 최적 미로 게임 개발)

  • Kim, Ki-Bum;Baek, Tae-Gwan;Jeong, Gab-Joong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.113-116
    • /
    • 2007
  • This paper describes the development of an optimal 3D maze path game as web-based game contents. Client user using web can access and run java applet program with download of java byte code with the independence of hardware system. The optimal 3D maze path game developed in this paper consists of random maze path generation module, selected path input module, weighted optimal path search module, and path comparison module. It enhances the cognition faculty of game users with the comparison of the maze path searched by optimal path search algorithm and the selected maze path by game users.

  • PDF