• Title/Summary/Keyword: Legacy Development Methodology

Search Result 24, Processing Time 0.023 seconds

Design and Implementation of Component-Based XML/EDI System (컴포넌트기반의 XML/EDI 시스템 설계 및 구현)

  • 문태수;김호진
    • The Journal of Information Systems
    • /
    • v.12 no.1
    • /
    • pp.87-116
    • /
    • 2003
  • One of the important applications for business-to-business electronic commerce is in procurement and inventory management using electronic data interchange(EDI). Using online catalogs and approved supplier lists, firms can easily create requisitions and purchasing documents. The emerging trend in EDI technology is changed from VAN(Value Added Network) based EDI to XML based EDI. This paper intends to suggest a component-based XML/EDI system using Unified Modeling Language(UML), as an application system for automobile part industry. Applying component based XML/EDI systems designed with UML methodology, we analyzed the workflow and the document on procurement process between trading partners and implemented a prototype of efficient XML/EDI system, as a surrogate of existing VAN/EDI. The result of applying object-oriented CBD(Component Based Development) technique is to minimize the risk of life cycle and facilitate the reuse of software as mentioned to limitation of information engineering methodology. It enables the interoperability with corporate legacy systems such as ERP(Enterprise Resource Planning), SCM(Supply Chain Management). This system proposes a solution to apply analysis phase and design phase in implementation of XML/EDI system. The implementation of XML/EDI system using CBD shows the ease of use in software reuse and the interoperability with corporate internal information system. The purchasing department with XML/EDI system can electronically communicate purchase orders, delivery schedules to external suppliers and interoperate with other application systems.

  • PDF

Space Reengineering and Amended UML Approach to Requirement Analysis for Ubiquitous Smart Space Development (유비쿼터스 지능 공간 요구분석을 위한 공간재설계법 및 수정된 UML 접근법)

  • Kwon, Oh-Byung;Lee, Nam-Yeon;Sim, Jae-Mun
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.99-125
    • /
    • 2007
  • Recently, as the development of Ubiquitous Smart Space (USS) such as U-City is proliferating, preparing a development methodology dedicated to USS characteristics has become one of the crucial issues to increase the productivity of the USS projects. However, since the legacy development methodologies such as traditional UML do not consider the critical components of ubiquitous computing space such as context-awareness, service oriented architecture and multi-agent communication, they are not optimized for USS analysis and design. Hence, the purpose of this paper is to propose a USS-sophisticated development methodology. To do so, a hybrid approach, BPR-USS for space reengineering and UML-USS by amending UML with corresponding toolkit based on StarUML has been implemented. To show the feasibility of the approach described in this paper, an illustrative example with an actual USS development project for a multiplex space in Seoul is shown.

  • PDF

An Architecture and Software Process for the Convergence of Heterogeneous Medical Recording Contents (이질적인 의무기록 콘텐츠의 융합을 위한 시스템 아키텍처와 소프트웨어 프로세스)

  • Kim, Jong-Ho
    • Journal of Digital Contents Society
    • /
    • v.12 no.4
    • /
    • pp.501-510
    • /
    • 2011
  • Most of electronic medical record systems which have been built in Korean hospitals are based on source oriented medical record approach. These systems hardly satisfy diverse objectives owing to the innate imperfections in system architecture and development methodology. Thus, the hybrid of source oriented and problem oriented approach is highly desirable. The purpose of this study is to present an architecture and methodology required to construct hybrid electronic medical record system and to develop a prototype based on them. Analyzing the clinical processes and data requirements of problem oriented medical record approach we developed a software process model as weel as an architecture model which consists of legacy system, clinical data repository, problem list database, prospective plan database, user interface, and synchronization procedures.

Design and Implementation of Security Frame work for Application Server with Components

  • 김행곤;강전근
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.4
    • /
    • pp.531-540
    • /
    • 2004
  • Development of Web service application requires the interoperability between various heterogeneous systems, extensibility to allow modification of business environment not of user interface, maintainability, flexibility and reusability As the properties of CBD (Component Based Development) have gradually become clear, attention has started to turn the smooth technology and methodology to solve the existing problems and issues the dynamic responds for the distributed web environments. In this paper, we identify some of the major architectural affecting CBD and describe the Design and Implementation of Security Framework for Application Server with Components. We identify the candidate components, model it using UML and layer it on the architecture. The frameworks will Provide the various security functions, such as incorporating with legacy security systems, supporting of J2EE, JAAS and Kerberos and assisting in increasing the tailorability of component.

  • PDF

Reengineering guidelines to develop eclipse plug-ins using AWT based legacy application (AWT 기반 어플리케이션을 이클립스 플러그-인으로 리엔지니어링 할 때 재사용을 위해 고려할 사항들)

  • YANG, Jin-Seok;Son, Dong Ryul;Kang, Kyo. C.
    • Journal of Software Engineering Society
    • /
    • v.24 no.2
    • /
    • pp.67-75
    • /
    • 2011
  • In order to improve working speed, add more functions and provide better user interface of ASADAL, the AWT based Java application to support FORM Software Product Line Development Methodology; we had to reengineer this application to be Eclipse based plug-in application. In order to improve working speed, add more functions and provide better user interface of ASADAL, the AWT based Java application to support FORM Software Product Line Development Methodology; we had to reengineer this application to be Eclipse based plug-in application. And then, this paper introduces the plug-in developed by applying guidelines presented in the reengineering cases of ASADAL's feature model editor and behavior model editor.

  • PDF

WMPS: A Positioning System for Localizing Legacy 802.11 Devices

  • Gallo, Pierluigi;Garlisi, Domenico;Giuliano, Fabrizio;Gringoli, Francesco;Tinnirello, Ilenia
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.2
    • /
    • pp.106-116
    • /
    • 2012
  • The huge success of location-aware applications has called for the rapid development of an alternative positioning system to the global positioning system (GPS) for indoor localization based on existing technologies, such as 802.11 wireless networks. This paper proposes the Wireless MAC Processor Positioning System (WMPS), which is a localization system running on off-the-shelf 802.11 Access Points and based on the time-of-flight ranging of users' standard terminals. This paper proves through extensive experiments that the propagation delays can be measured with the accuracy required by indoor applications despite the different noise components that can affect the result: latencies of the hardware transreceivers, multipath, ACK jitters and timer quantization. Key to this solution is the choice of the Wireless MAC Processor architecture, which enables a straightforward implementation of the ranging subsystem directly inside the commercial cards without affecting the basic DCF channel access algorithm. In addition to the proposed measurement framework, this study developed a simple and effective localization algorithm that can work without requiring any preliminary calibration or device characterization. Finally, the architecture allows the measurement methodology to be adjusted as a function of the network load or propagation environments at the run time, without requiring any firmware update.

  • PDF

CityDataHub-based Smart-Platform Design for Dissemination of Smart City Data Hub (스마트시티 데이터허브 보급을 위한 시티데이터허브 기반 스마트 플랫폼 설계)

  • Lee, Geum Bi;Kim, Ki Su;Kang, Seung Hag
    • The Journal of Information Systems
    • /
    • v.31 no.4
    • /
    • pp.101-121
    • /
    • 2022
  • Purpose This study aims to introduce a Smart-Platform for solving numerous problems in urban cities and improving citizens' convenience. This Smart-Platform is achieved by studying the City Data Hub technology to build and spread a Smart City Data Hub . Design/methodology/approach In this study, we analyzed the functions in detail and interlocking flows specific to the published City Data Hub module and designed a Smart-Platform with additional UI-based functions to improve users' convenience based on our previous experience. Findings The City Data Hub will provide a modular data hub platform functionality for application by different stakeholders. However, further research on detailed functionality and experience in interworking legacy systems will be required to apply the platform realistically. Therefore, we judged that this Smart-Platform, which supplements the City Data Hub with additional functions, would be useful for utilizing the City Data Hub in the future. Through the demonstration of the platform designed, it is also necessary to explore the direction of continuous development for the future.

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

Model Based Approach to Estimating Privacy Concerns for Context-Aware Services (상황인식서비스를 위한 모델 기반의 프라이버시 염려 예측)

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.2
    • /
    • pp.97-111
    • /
    • 2009
  • Context-aware computing, as a core of smart space development, has been widely regarded as useful in realizing individual service provision. However, most of context-aware services so fat are in its early stage to be dispatched for actual usage in the real world, caused mainly by user's privacy concerns. Moreover, since legacy context-aware services have focused on acquiring in an automatic manner the extra-personal context such as location, weather and objects near by, the services are very limited in terms of quality and variety if the service should identify intra-personal context such as attitudes and privacy concern, which are in fact very useful to select the relevant and timely services to a user. Hence, the purpose of this paper is to propose a novel methodology to infer the user's privacy concern as intra-personal context in an intelligent manner. The proposed methodology includes a variety of stimuli from outside the person and then performs model-based reasoning with social theory models from model base to predict the user's level of privacy concern semi-automatically. To show the feasibility of the proposed methodology, a survey has been performed to examine the performance of the proposed methodology.

  • PDF

Program Analysis Activities for Development of Componentization Methodology for of Legacy System (레가시 시스템의 컴포넌트화 방법론 개발을 위한 프로그램 분석 활동)

  • Cha, Jung-Eun;Kim, Cheol-Hong;Yang, Young-Jong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11c
    • /
    • pp.2119-2122
    • /
    • 2002
  • 기업의 비즈니스 프로세스가 복잡, 다양해짐에 따라, 현재 운영 시스템에 대한 급격한 기술적 변화를 수용하고 이를 조직적 측면의 기업 프로세스로 적용하기 위해 레가시 시스템의 현대화가 요구된다. 따라서, 현재의 기업들은 다양한 사용자들이 각자 그들의 관점에서 필요한 비즈니스 요구들을 웹 상에서 처리시킬 수 있도록 J2EE, .NET 등으로 대표되는 컴포넌트 및 웹 서비스 기술을 적용한 새로운 e-business 환경을 수용해야만 한다. 하지만, 기업 조직의 중요한 지식과 프로세스들을 처리하는 시스템들은 대부분 과거(Legacy)의 기술에 의해 개발되어졌으며, 이러한 시스템들을 새로운 비즈니스 환경에 적용하기에는 웹 환경을 위한 분산 아키텍쳐의 결여와 개방성과 표준화 미흡으로 시스템의 유지보수에 많은 어려움을 가진다. 또한, 방법론 차원에서 재공학의 절차와 기법을 체계적으로 정의하고 지원하기 위한 노력이 매우 부족한 실정이다. 본 논문에서는 레거시 시스템을 새로운 시스템 환경으로의 변환 및 통합을 위한 재공학 방법론 개발을 목적으로 프로그램 분석 활동을 설명한다. 본 논문에서 개발하고자 하는 방법론은 다양한 추상화 수준에서 역공학 정보를 복구하고, 컴포넌트화 단계를 통해 새로운 시스템으로 진화할 수 있는 절차 및 기법들을 제공한다. 레거시 시스템 컴포넌트화 방법론은 변환계획 단계, 역공학 단계, 컴포넌트화 단계, 인도 단계의 4 단계로 구성되어 있으며, 본 논문에서는 전체 단계 중 가장 기초가 되고 중요한 단계인 역공학 단계에 초점을 두고 프로그램 분석을 위한 절차 및 과정의 주요 지침들을 제시한다.0보다 유의적으로 우수하였으며, 맛, 다즙성 및 전체적인 기호도는 TMR-0 및 TMR-1 사이에 유의성이 없었다(p<0.05).能性)을 알아보고자 본(本) 실험(實驗)을 실시(實施)한 결과(結果), 유의성(有意性) 있는 결과(結果)를 얻었기에 보고(報告)하는 바이다.또한 이들 상피세포(上皮細胞)들을 투과전자현미경적(透過電子顯微鏡的)으로 관찰(觀察)하였을 때 초미세구조(超微細構造)가 잘 보존(保存)되었으나 Langer-hans cell내(內)의 Birbeck granule은 유리전(遊離前) 피부상피조직내(皮膚上皮組織內)의 Langerhans cell내(內)의 Birbeck granule에 비(比)해 수적(數的)으로 현저히 감소(減少)되어 있었다. 그러나 Thy-1 양성(陽性) dendritic cell에서 볼 수 있는 dense-core 과립(顆粒)은 별변화(別變化)없이 쉽게 관찰(觀察)될 수 있었다. 조직배양(組織培養)을 한 견(犬)의 keratinocyte에 대(對)해 사람 pemphigus vulgaris의 항체(抗體)로 반응(反應)시킨 후 protein-A gold(15 nm)로 표식(標識)시킨 바 제일 바깥 상층(上層)의 keratinocyte에 있어서 세포막표면(細胞膜表面)을 따라 표식(標識)되어 세포막항원(細胞膜抗元)을 나타내었으며, 이와 같은 소견(所見)으로 미루어 정상피부(正常皮膚) 중층편평상피세포(重層扁平上皮細胞)에서도 동일(同一)한 소견(所見)을 관찰(觀察)할 수 있다고 본다.al remnants, Resorption of fetus로 관찰된 것이다. Fetal death는 수정후

  • PDF