• Title/Summary/Keyword: Java Programs

Search Result 171, Processing Time 0.026 seconds

Low Overhead System Monitoring Based on SNMP (SNMP를 이용한 효율적인 시스템 모니터링)

  • Kim, Tae-Su;Jeong, Chang-Young;Kim, Dong-Uk;Kim, Yong-Seok
    • Journal of Industrial Technology
    • /
    • v.25 no.A
    • /
    • pp.175-182
    • /
    • 2005
  • SNMP is a standard protocol for management of networking devices. Nowadays, most computer systems have capability to act as SNMP agents. In this paper, we describe our system monitoring software based on SNMP. It consists of a monitoring server, SNMP agents, and client programs. The monitoring server collects status information from the SNMP agents running on the monitoring target graphical display. We developed two version of clients, Java based standalone program and Web based program. Since most known SNMP packages are too big and heavy, we developed an efficient version of SNMP library for out system monitoring.

  • PDF

Remote Controlled Robot System using Real-Time Operating System (실시간 운영체제를 탑재한 원격 제어 로봇 시스템)

  • Lee, Tae-Hee;Cho, Sang
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.8
    • /
    • pp.689-695
    • /
    • 2004
  • This paper presents a robot system that combines computer network and an autonomous mobile robot where RTOS is installed. We propose a wireless communication protocol, and also implement it on the RTOS of the robot system. Main controller of the robot processes the control program as a task type in the real-time operating system. Peripheral devices are driven by the device driver functions with the dependency of the hardware. Because the client and server program was implemented to support the multi-platforms by Java SDK and Java JMF, it is easy to analyze programs, maintain system, and correct the errors in the system. End-user can control a robot with a vision showing remote sight over the Internet in real time, and the robot is moved keeping away from the obstacles by itself and command of the server received from end-user at the local client.

A Development of Smart Phone Application Layout Education Program for Gifted Children of Information (초등정보영재를 위한 스마트폰 애플리케이션 레이아웃 교육 프로그램 개발)

  • Lee, MiSuk;Kim, Kapsu
    • Journal of The Korean Association of Information Education
    • /
    • v.16 no.4
    • /
    • pp.409-418
    • /
    • 2012
  • In recent years many people are changing their mobile phones from feature phones to smart phones because huge number of useful smart phone applications are released onto the market everyday. Development of smart phone applications could be very helpful educational contents for technologically gifted children who has lots of curiosity and creativity. For this reason this paper deals with development of smart phone application UI(User Interface) layout education programs for the technologically gifted children. These education programs which can operating under Android-based smartphone, have been developed by using JAVA and Eclipse. Survey from the technologically gifted children education experts has been analyzed by Delphi method to figure out effectiveness of the developed education programs.

  • PDF

A Study of protective measures of the source program for the development of the Internet of Things (IoT): Protection of the program as well as plagiarism research (사물인터넷(IoT)발전을 위한 소스프로그램 보호방안 연구: 프로그램의 보호와 유사표절 연구)

  • Lee, Jong-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.31-45
    • /
    • 2018
  • Recent dramatical development of computer technology related to internet technology intensifies the dispute over software of computer or smart device. Research on software has been flourished with political issuing of fierce competition among nations for software development. Particularly industrial growth in ethernet based big data and IoT (Internet of Things) has promoted to build and develop open source programs based on java, xcode and C. On these circumstances, issue on software piracy has been confronted despite the basic security policy protecting intellectual property rights of software and thus it is of substantial importance to protect the rights of originality of source program license. However, the other issue on source technology protection of developer is the possibility of hindrance to advancement in industry and culture by developing programs. This study discuss the way of enhancing legal stability of IoT application program development and reinforcing precision in inspection of program plagiarism by analyzing the source programs with newly introducing text mining technique, thus suggests an alternative protective way of infringement of personal information due to duplicating program.

InfoFlow: A Web-based Workflow Management System

  • Kim, Yeong-Ho;Kang, Suk-Ho;Kim, Dong-Soo;Heo, Won-Chang;Ko, Young-Myoung;Lee, Sang-Jin;Joo, Kyoung-Jun
    • Proceedings of the CALSEC Conference
    • /
    • 1999.07b
    • /
    • pp.587-596
    • /
    • 1999
  • In this paper, we introduce the design and development of a web-based workflow management system. The goal of the developed system is to manage business processes occurring in the CITIS (Contractor Integrated Technical Information Services) environment. The system is composed of three main modules: Process Designer, Workflow Engine, and Client modules. The Process Designer is a module that provides the environment for the build-time function, which generates the specifications of processes. The module presents the capability of defining nested process models, which is powerful in particular for designing complex processes. Since the other two modules are implemented using pure Java technology, the Workflow Engine can be implemented on any platform and the Client programs can be accessed via the WWW interface. This indicates that there is no need to install any client programs at the client-sides. Users who has a connection to the internet with web browsers, such as Internet Explorer and Netscape Navigator, and has a proper right of access can utilize the normal client, monitoring client, and system administration client programs. Communications between the workflow engine and the clients are implemented using the java servlet mechanism. The workflow system can serve as the underlying platform of process management tool in CALS and CITIS environments. An example scenario of using the system is presented.

  • PDF

Array Bounds Check Elimination using Ineguality Graph in Java Just-in-Time Compiler (대소관계 그래프를 이용한 Just-in-Time 컴파일 환경에서의 배열 경계 검사 제거)

  • Choi Sun-il;Moon Soo-mook
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.12
    • /
    • pp.1283-1291
    • /
    • 2005
  • One of the problems in boosting Java performance using a Just-in-Time (JIT) compiler is removing redundant array bound checks. In conventional static compilers, many powerful algorithms have been developed, yet they are not directly applicable to JIT compilation where the compilation time is part of the whole running time. In the current JIT compilers, we tan use either a naive algorithm that is not powerful enough or an aggressive algorithm which requires the transformation into a static single assignment (SSA) form of programs (and back to the original form after optimization), thus causing too much overhead not appropriate for JIT compilation This paper proposes a new algorithm based on an inequality graph which can eliminate array bounds check codes aggressively without resorting to the SSA form. When we actually perform this type of optimization, there are many constraints in code motion caused by the precise exception rule in Java specification, which would cause the algorithm to miss many opportunities for eliminating away bound checks. We also propose a new method to overcome these constraints.

A Visualization System for Permission Check in Java using Static Analysis (정적분석을 이용한 자바 언어의 권한검사 시각화 시스템)

  • Kim, Yun-Kyung;Chang, Byeong-Mo
    • The KIPS Transactions:PartA
    • /
    • v.13A no.5 s.102
    • /
    • pp.399-404
    • /
    • 2006
  • In Jana 2, to enforce a suity policy of a program, programmer writes permission sets required by the code at the policy file, sets Security Manager on system and executes the program. Then Security Manager checks by stack inspection whether an access request to resource should be granted or denied whenever code tries to access critical resource. In this paper, we develop a visualization tool which helps programmers enforce security policy effectively into programs. This system is based on the static permission check analysis which analyzes permission checks which must succeed or fail at each method. Based on this analysis information, programmer can examine visually how permission checks and their stack inspection are performed. By modifying program or policy file if necessary and examining analysis information repeatedly, programmer can enforce security policy correctly.

Development of a user-friendly training software for pharmacokinetic concepts and models

  • Han, Seunghoon;Lim, Byounghee;Lee, Hyemi;Bae, Soo Hyun
    • Translational and Clinical Pharmacology
    • /
    • v.26 no.4
    • /
    • pp.166-171
    • /
    • 2018
  • Although there are many commercially available training software programs for pharmacokinetics, they lack flexibility and convenience. In this study, we develop simulation software to facilitate pharmacokinetics education. General formulas for time courses of drug concentrations after single and multiple dosing were used to build source code that allows users to simulate situations tailored to their learning objectives. A mathematical relationship for a 1-compartment model was implemented in the form of differential equations. The concept of population pharmacokinetics was also taken into consideration for further applications. The source code was written using R. For the convenience of users, two types of software were developed: a web-based simulator and a standalone-type application. The application was built in the JAVA language. We used the JAVA/R Interface library and the 'eval()' method from JAVA for the R/JAVA interface. The final product has an input window that includes fields for parameter values, dosing regimen, and population pharmacokinetics options. When a simulation is performed, the resulting drug concentration time course is shown in the output window. The simulation results are obtained within 1 minute even if the population pharmacokinetics option is selected and many parameters are considered, and the user can therefore quickly learn a variety of situations. Such software is an excellent candidate for development as an open tool intended for wide use in Korea. Pharmacokinetics experts will be able to use this tool to teach various audiences, including undergraduates.

Field Usage Pattern in Typical Java Programs (전형적 자바 프로그램에서 필드의 사용 형태)

  • Yang, Hee-Jae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.865-867
    • /
    • 2005
  • 자바 프로그램은 클래스의 집합으로 이루어지며 클래스는 필드와 메소드로 구성된다. 필드는 힙 메모리에 저장되므로 필드의 사용 형태는 힙 메모리의 사용 형태에 직접적인 영향을 미친다. 즉 자바 힙 메모리의 사용을 분석하기 위해서는 필드의 사용 형태를 분석해야 한다는 것이다. 본 논문에서는 전형적 자바 프로그램에서 필드가 어떻게 사용되어지는지를 정성적으로 분석하고 실험을 통해 확인하였다. 본 연구의 결과는 자바가상기계의 힙 메모리 구조 개발에 도움을 줄 것이며, 나아가 효율적인 자바가상기계의 개발을 가능하게 할 것으로 기대된다.

  • PDF

Design of HDTS System for Locating Logical Errors in Java Programs (자바 프로그램의 논리적인 오류를 찾기 위한 HDTS 시스템의 설계)

  • Kouh Hoon-Joon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.11a
    • /
    • pp.397-400
    • /
    • 2004
  • 이전 논문은 자바 프로그램 내에 포함된 논리적인 오류를 발견하기 위해 HDTS 기술을 제안하였다. HDTS 는 알고리즈믹 프로그램 디버깅 기술, 단계적 프로그램 디버깅 기술, 그리고 프로그램 분할을 혼합하여 효율적으로 논리적인 오류가 포함된 프로그램을 디버깅하는 기술이다. 본 논문에서는 HDTS 기술을 구현하기 위한 HDTS 시스템을 설계한다.

  • PDF