• Title/Summary/Keyword: Java Tool

Search Result 215, Processing Time 0.022 seconds

Implementation of An Automatic Program Generator for Transforming CASE Data Format into CDIF Format (CASE 자료 형식으로부터 CDIF 형식으로 변환하는 프로그램 자동 생성기의 구현)

  • Bae, Sang-Hyun;Nam, Young-Kwang;Shin, Gyu-Sang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.12
    • /
    • pp.3840-3847
    • /
    • 2000
  • Electronic Industries Association has set a standard format called CDIF(CASE Data Interchange Format) for exchanging information between CASE tools from 1991. If data used on a CASE tool is represented in CDIF format, then any other CASE tools can use the data by translating CDlF format into their own format. In order to do so, each CASE vendor must provide a translator program from CDIF to its own data format or from its own data to CDIF format. In this thesis, we have implemented a source code generator for translating CASE data format into CDIF format only if they provide how data is stored. This automatic program generator generates CDIF statements using data format used in CASE tools, meta information about stored data and CDIF meta information. In the thesis, the automatic program generator has been implemented with Java and Oracle DBMS with JOBC interface in Sun O/S environment.

  • PDF

A Component Composition Testing Technique in CBSD (CBSD에서의 컴포넌트 조립 테스트 기법)

  • Yoon, Hoi-Jin;Choi, Byoung-Ju
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.10
    • /
    • pp.694-702
    • /
    • 2002
  • An application in Component-Based Software Development (CBSD) is built by 'composing'two kinds of components; One is a component that is made by current developer himself, and the other is a component that is from other developments. We define the former as a 'White-box component' and the latter as a 'Black-box component.' The error from the composition can be said to be caused by interactions of Black-box components and White-box components. This paper proposes a new testing technique for composition errors, and applies the technique to Enterprise Java Beans component architecture. Our technique selects test cases by injecting a fault only into the specific parts of a White-box component. This specific parts for injecting a fault are selected by analyzing composition patterns, and lead to make our test cases have a good effectiveness. We show the effectiveness of our test cases through an experiment. Moreover, we also mention an automation tool for our technique.

Design and implementation of Android obfuscation technique using layout file transformation (레이아웃 파일 변환을 이용한 안드로이드 난독화 기법의 설계 및 구현)

  • Park, Heewan
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.1-7
    • /
    • 2020
  • Android apps are mostly distributed as an apk files, and when the apk file is uncompressed, resource files such as xml files, images, and sounds related to app design can be extracted. If the resources of banking or finance-related apps are stolen and fake apps are distributed, personal information could be stolen or financial fraud may occur. Therefore, it is necessary to make it difficult to steal the design as well as the code when distributing the app. In this paper, we implemented a tool to convert the xml file into Java code and obfuscate using the Proguard, and evaluated the execution performance. If the layout obfuscation technique proposed in this paper is used, it is expected that the app operation performance can be improved and the illegal copying damage caused by the theft of the screen design can be prevented.

An analysis of satisfaction index on computer education of university using kernel machine (커널머신을 이용한 대학의 컴퓨터교육 만족도 분석)

  • Pi, Su-Young;Park, Hye-Jung;Ryu, Kyung-Hyun
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.5
    • /
    • pp.921-929
    • /
    • 2011
  • In Information age, the academic liberal art Computer education course set up goals for promoting computer literacy and for developing the ability to cope actively with in Information Society and for improving productivity and competition among nations. In this paper, we analyze on discovering of decisive property and satisfaction index to have a influence on computer education on university students. As a preprocessing method, the proposed method select optimum property using correlation feature selection of machine learning tool based on Java and then we use multiclass least square support vector machine based on statistical learning theory. After applying that compare with multiclass support vector machine and multiclass least square support vector machine, we can see the fact that the proposed method have a excellent result like multiclass support vector machine in analysis of the academic liberal art computer education satisfaction index data.

An analysis of satisfaction index on computer education of university based on Fuzzy Decision Making Method (퍼지의사결정법에 기반한 대학의 컴퓨터교육 만족도 분석)

  • Ryu, Kyung-Hyun;Hwang, Byung-Kon
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.4
    • /
    • pp.502-509
    • /
    • 2013
  • In Information age, The academic liberal art computer education course set up goals to promote computer literacy and develop the ability to cope with changes in information society and improve productivity and national competitiveness. In this paper, we analyze on discovering of decisive variable and satisfaction index to have a influence on computer education on university students. As a preprocessing course, the proposed method selects optimum variable using correlation based feature selection(CFS) of machine learning tool based on Java and we calculate weighted value for each variable and then, we generate the optimal variable using weighted value based on fuzzy decision making method. we proposed Fuzzy decision making method in analysis of the academic liberal art computer education satisfaction index data and checked the accuracy of the satisfaction evaluation by using recall and precision.

Development of Relational Database Management System for Agricultural Non-point Source Pollution Control (관계형 데이터베이스를 이용한 농업비점 자료 관리 시스템 개발)

  • Park, Jihoon;Kang, Moon Seong;Song, Inhong;Hwang, Soon Ho;Song, Jung-Hun;Jun, Sang Min
    • Journal of Korean Society of Rural Planning
    • /
    • v.19 no.4
    • /
    • pp.319-327
    • /
    • 2013
  • The objective of this research was to develop a relational database management system(RDBMS) to collect, manage and analyze data on agricultural non-point source(NPS) pollution. The system consists of the relational database for agricultural NPS data and data process modules. The data process modules were composed of four sub-modules for data input, management, analysis, and output. The data collected from the watershed of the upper Cheongmi stream and Geunsam-Ri were used in this study. The database was constructed using Apache Derby with meteorological, hydrological, water quality, and soil characteristics. Agricultural NPS-Data Management System(ANPS-DMS) was developed using Oracle Java. The system developed in this study can deal with a variety of agricultural NPS data and is expected to provide an appropriate data management tool for agricultural NPS studies.

An Automatic Testing Method for EJB Components based on In-Container Testing Strategy (컨테이너 내부 테스팅 전략 기반의 EJB 컴포넌트 테스트 자동화 방법)

  • Kuk, Seung-Hak;Kim, Hyeon Soo
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.85-98
    • /
    • 2015
  • Component technologies which enable quickly and effectively to develop software have begun to come into the spotlight since early 1990s. Currently, a number of software development works are performed on the J2EE/EJB environment. However component testing is a very complicated task, in addition it requires more efforts than the previous Java class testing. Thus many developers do not perform sufficiently testing works. In this paper we propose an automatic testing method for EJB components based on the in-container testing strategy and implement a testing tool. Since our method builds automatically the test environment for EJB components, it is possible for developers or testers to save their time and efforts at the test preparation phase. Therefore we are convinced that the reliability of EJB components can be increased through sufficient testings with our method.

Match Field based Algorithm Selection Approach in Hybrid SDN and PCE Based Optical Networks

  • Selvaraj, P.;Nagarajan, V.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5723-5743
    • /
    • 2018
  • The evolving internet-based services demand high-speed data transmission in conjunction with scalability. The next generation optical network has to exploit artificial intelligence and cognitive techniques to cope with the emerging requirements. This work proposes a novel way to solve the dynamic provisioning problem in optical network. The provisioning in optical network involves the computation of routes and the reservation of wavelenghs (Routing and Wavelength assignment-RWA). This is an extensively studied multi-objective optimization problem and its complexity is known to be NP-Complete. As the exact algorithms incurs more running time, the heuristic based approaches have been widely preferred to solve this problem. Recently the software-defined networking has impacted the way the optical pipes are configured and monitored. This work proposes the dynamic selection of path computation algorithms in response to the changing service requirements and network scenarios. A software-defined controller mechanism with a novel packet matching feature was proposed to dynamically match the traffic demands with the appropriate algorithm. A software-defined controller with Path Computation Element-PCE was created in the ONOS tool. A simulation study was performed with the case study of dynamic path establishment in ONOS-Open Network Operating System based software defined controller environment. A java based NOX controller was configured with a parent path computation element. The child path computation elements were configured with different path computation algorithms under the control of the parent path computation element. The use case of dynamic bulk path creation was considered. The algorithm selection method is compared with the existing single algorithm based method and the results are analyzed.

Analysis and simulator implementation of Mighty, an advanced imperfect information game

  • Lee, Jeongwon;Kim, Kwihoon;Kim, Seung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.1
    • /
    • pp.9-21
    • /
    • 2022
  • Mighty is an imperfect information game, similar to the internationally popular four-player card game Bridge, but more complex in terms of game rules and operation. An environment for exploring and analyzing the strategy of the Mighty Game is required, but compared to the development of many simulators for strategy analysis of other card games such as Bridge, there is no analysis tool for the Mighty Game. Even the definition and understanding of the Mighty game at the academic level is lacking. To solve these problems, this paper systematically defined the procedures and rules of the Mighty Game. And based on this definition, we implemented a simulator that can learn Mighty game and analyze various strategies. For the usability and accessibility of the service, the simulator was developed with JavaScript, and various analysis functions are provided in the web environment. Lastly, comparative analysis with other trick-taking games dealt with in the related research domain showed that the Mighty game has its value as an incomplete information game and that there are many characteristics that make it easy to apply AI-based learning methods.

Services Quality Improvement through Control Management Cloud-Based SLA

  • Abel Adane
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.89-94
    • /
    • 2023
  • Cloud-based technology is used in different organizations around the world for various purposes. Using this technology, the service providers provide the service mainly SaaS, PaaS and while the cloud service consumer consumes the services by paying for the service they used or accessed by the principle of "pay per use". The customer of the services can get any services being at different places or locations using different machines or electronic devices. Under the conditions of being well organized and having all necessary infrastructures, the services can be accessed suitably. The identified problem in this study is that cloud providers control and monitor the system or tools by ignoring the calculation and consideration of various faults made from the cloud provider side during service delivery. There are currently problems with ignoring the consumer or client during the monitoring and mentoring system for cloud services consumed at the customer or client level by SLA provisions. The new framework was developed to address the above-mentioned problems. The framework was developed as a unified modeling language. Eight basic components are used to develop the framework. For this research, the researcher developed a prototype by using a selected cloud tool to simulate and java programming language to write a code as well as MySQL to store data during SLA. The researcher used different criteria to validate the developed framework i.e. to validate SLA that is concerned with a cloud service provider, validate what happened when the request from the client-side is less than what is specified in SLA and above what is specified in SLA as well as implementing the monitoring mechanism using the developed Monitoring component. The researcher observed that with the 1st and 3rd criteria the service level agreement was violated and this indicated that if the Service level agreement is monitored or managed only by cloud service prover, there is a violation of LSA. Therefore, the researcher recommended that the service level agreement be managed by both cloud service providers and service consumers in the cloud computing environment.