• Title/Summary/Keyword: Legacy Applications

Search Result 124, Processing Time 0.03 seconds

Design and Implementation of MOST Network Service over POSIX (차량용 MOST 네트워크를 위한 POSIX 기반의 Network Service 설계 및 구현)

  • Lee, Mu-Youl;Chung, Sung-Moon;Jin, Hyun-Wook
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.1
    • /
    • pp.23-28
    • /
    • 2010
  • The automotive industry tries to provide infotainment systems to emerging automobiles. Since the infotainment systems require various peripheral devices and network connectivity, legacy operating systems such as Linux and Windows can be much preferred due to its plentiful device drivers and multimedia applications while the operating systems following OSEK standard are used for automotive electronic control units. Thus it is highly desired that the system software supporting infotainment applications can be portable over different legacy operating systems providing unified programming interfaces. The majority of legacy operating systems support POSIX interfaces for application development. MOST is an automotive network standard for infotainment systems. Network Service defines the protocol stacks for MOST control data, which is essential to implement infotainment applications over MOST. In this paper, we suggest a POSIX-based Network Service so that we can utilize legacy device drivers and applications for automotive infotainment systems. We measure the performance of the POSIX-based Network Service and show that its overhead is not significant.

FORE: A Form-Driven Object-Oriented Reverse Engineering Methodology (업무 양식에 근거한 객체 지향 역공학 방법론)

  • Yoo, Cheon-Soo;Lee, Hee-Seok
    • Asia pacific journal of information systems
    • /
    • v.9 no.1
    • /
    • pp.115-142
    • /
    • 1999
  • Legacy applications are valuable assets that should be integrated into next generation business systems. To gain this advantage, progressive companies can reverse engineer the legacy business operations. This paper presents a form-driven object-oriented reverse engineering(FORE) methodology by the use of business forms to recover semantics of legacy applications. They retain the user-oriented contents of business and thus are easily understandable. Our form driven object-oriented reverse engineering methodology consists of five phases: form and usage analysis, form object slicing, object structure modeling, scenario design, and model integration. Knowledge about form structure and user interaction with legacy applications is used to capture the design semantics. An object model, which consists of an object structure model and scenario results from such form knowledge. The resulting object model is more likely to help reverse engineers understand and reuse legacy systems.

  • PDF

A Research on System Interconnection Using XML/EDI, WML (XML/EDI, WML을 사용한 시스템 연계에 관한 연구)

  • 안동률;박정선
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.225-237
    • /
    • 2002
  • As the population of the Internet inneases, so does that of mobile Internet. Currently, the use area of mobile Internet is rather limited due to the low speed of transmission and lack of applications. However, it is evident that the speed will be improved and more applications will be developed. In this paper, we propose: i) to use WAP in SCM, ii) to interconnect WAP and XML/EDI system, iii) to interconnect WAP, XML/EDI, Legacy system in SCM. We implemented a prototype which can show the interconnection among WAP, XML/EDI, and Legacy system. We hope the concept could be used in real applications in the near future.

  • PDF

A Feature-Oriented Method for Extracting a Product Line Asset from a Family of Legacy Applications (레거시 어플리케이션 제품군으로부터 제품라인 자산을 추출하는 휘처 기반의 방법)

  • Lee, Hyesun;Lee, Kang Bok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.7
    • /
    • pp.337-352
    • /
    • 2017
  • Clone-and-own reuse is an approach to creating new software variants by copying and modifying existing software products. A family of legacy software products developed by clone-and-own reuse often requires high maintenance cost and tends to be error-prone due to patch-ups without refactoring and structural degradation. To overcome these problems, many organizations that have used clone-and-own reuse now want to migrate their legacy products to software product line (SPL) for more systematic reuse and management of software asset. However, with most of existing methods, variation points are embedded directly into design and code rather than modeled and managed separately; variation points are not created ("engineered") systematically based on a variability model. This approach causes the following problems: it is difficult to understand the relationships between variation points, thus it is hard to maintain such code and the asset tends to become error-prone as it evolves. Also, when SPL evolves, design/code assets tend to be modified directly in an ad-hoc manner rather than engineered systematically with appropriate refactoring. To address these problems, we propose a feature-oriented method for extracting a SPL asset from a family of legacy applications. With the approach, we identify and model variation points and their relationships in a feature model separate from implementation, and then extract and manage a SPL asset from legacy applications based on the feature model. We have applied the method to a family of legacy Notepad++ products and demonstrated the feasibility of the method.

A Data Modeling Methodology for CALS Environment (CALS 환경을 지원하는 데이터 모델링 방법론 개발)

  • 김중인;김철한;우훈식;임동순
    • The Journal of Society for e-Business Studies
    • /
    • v.5 no.2
    • /
    • pp.61-79
    • /
    • 2000
  • For CALS environment, sharing information among business processes within the enterprise and between enterprises have been increased through common database. To support integrated data environment, data of the local legacy system must coincide with data of the global system to guarantee data integrity and transparency. This study is concerned with the implementation of this distributed database system under CALS environment. Based on existing IDEF methods, we developed a modified method which newly includes concepts of the enterprise structure, the integration of legacy databases, the distribution of data, and the distributed applications .

  • PDF

The Implementation of Enterprise Application Integration System in ERP Environment (ERP 환경에서 EAI시스템 실증적 적용 사례 연구)

  • Nam, Ho-Ki;Park, Sang-Min;Kim, Jhong-Hyun;Jung, Sung-Ah
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.3
    • /
    • pp.197-205
    • /
    • 2010
  • The company protects the information of legacy system to satisfy all member in company. Integrating between applications is increasing recently because of e-Business activation. The e-Business activation also make between extra companies and intra companies integrated. This paper suggest on implementing the ERP using Phased Approach Method and the EAI(Enterprise Application Integration) with legacy system. This paper also suggest the standard method which would be used in implementing the EAI in another company and reduce the mistake during the EAI project. Therefore, it would be the one system between complicated systems through application integration, it would be also make shop floors visualized. This research would help users and service suppliers getting more advantages of e-Business system.

Design of Hybrid V2X Communication Module for Electromagnetic Confirmity Evaluation (전자파 적합성 평가를 위한 하이브리드 V2X 통신모듈 설계)

  • Seungkyu Choi;Juwon Lee;Kyuhyeon Kim
    • Journal of Auto-vehicle Safety Association
    • /
    • v.15 no.4
    • /
    • pp.65-70
    • /
    • 2023
  • In the paper, we propose a design method and process of a hybrid V2X communication module that combines WAVE communication, LTE-V2X communication, and legacy LTE communication in evaluating vehicle V2X electromagnetic compatibility. C-ITS is suitable for safety service applications due to its low latency, and legacy LTE is suitable for applications such as traffic information and infotainment due to its high latency and high capacity. In order to evaluate the V2X communication system, the evaluation equipment must have communication performance of the same level or higher. The main design contents presented in this paper will be applied to the implementation of a hybrid V2X communication module for electromagnetic compatibility evaluation.

Design of Hybrid V2X Communication Module for Cooperative Automated Driving (자율협력주행을 위한 하이브리드 V2X 통신모듈 설계)

  • Lim, Ki-taeg;Jin, Seong-keun;Kwak, Jae-min
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.3
    • /
    • pp.213-219
    • /
    • 2018
  • In this paper, we propose a design method and process for hardware and software of hybrid V2X communication module that supports both C-ITS communication protocol designed for vehicle environment and Legacy LTE communication technology. C-ITS is suitable for safety service applications due to its low latency characteristics, and Legacy LTE is a technology suitable for non-safety applications such as traffic information and infotainment due to high latency and high capacity. The hybrid V2X communication module supports multiple communication technologies of WAVE and LTE, in which WAVE supports multiple channels, so that it is designed to transmit road information such as LDM and positioning correction information to an autonomous vehicle in real time. The main design results presented in this paper will be applied to the implementation of future hybrid V2X communication terminals for vehicles.

Repetitive Delivery Scheme for Left and Right Views in Service-Compatible 3D Video Service

  • Yun, Kugjin;Cheong, Won-Sik;Lee, Jinyoung;Kim, Kyuheon;Lee, Gwangsoon;Hur, Namho
    • ETRI Journal
    • /
    • v.36 no.2
    • /
    • pp.264-270
    • /
    • 2014
  • This paper introduces a novel repetitive delivery scheme for the left and right views in service-compatible (SC) 3D video that provides full backward compatibility to a legacy DTV system while retaining HD 3D visual quality without additional bandwidth or a codec over the legacy broadcasting channel. The proposed SC delivery scheme transmits individual view sequences of a 3D video in interlaced form, that is, a left-view sequence of a 3DTV program to be used repeatedly is transmitted first and stored locally, and the right-view sequence of the 3D program is then transmitted. This paper specifically describes the signaling, synchronization, and storage format methods used to validate the proposed SC delivery scheme. The experiment results show that the proposed SC delivery scheme can be effectively applied for an SC 3DTV service without degrading the DTV quality using only legacy DTV platforms.

A Use-case based Component Mining Approach for the Modernization of Legacy Systems (레거시 시스템을 현대화하기 위한 유스케이스 기반의 컴포넌트 추출 방법)

  • Kim, Hyeon-Soo;Chae, Heung-Seok;Kim, Chul-Hong
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.7
    • /
    • pp.601-611
    • /
    • 2005
  • Due to not only proven stability and reliability but a significant investment and years of accumulated -experience and knowledge, legacy systems have supported the core business applications of a number of organizations over many years. While the emergence of Web-based e-business environments requires externalizing core business processes to the Web. This is a competitive advantage in the new economy. Consequently, organizations now need to mine the business value buried in the legacy systems for reuse in new e-business applications. In this paper we suggest a systematic approach to mining components that perform specific business services and that consist of the legacy system's assets to be leveraged on the modem platform. The proposed activities are divided into several tasks. First, use cases that realize the business processes are captured. Secondly, a design model is constructed for each identified use case in order to integrate the use cases with the similar functionalities. Thirdly, we identify component candidates from the design model and then adjust the component candidates by considering common elements among the candidate components. And also business components are divided into three more fine-grained components to deploy them onto J2EE/EJB environments. finally, we define the interfaces of components which provide functionalities of the components as operations.