• Title/Summary/Keyword: Maintainability& #41;

Search Result 5, Processing Time 0.019 seconds

A Hierarchical RAM Simulation Model Framework (계층적 RAM 시뮬레이션 모델 프레임워크)

  • Kim, Hye-Lyeong;Choi, Sang-Yeong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.1
    • /
    • pp.41-49
    • /
    • 2010
  • In this paper, we propose a hierarchical RAM simulation model framework which are used to analyze the RAM specifications on the concept refinement phase. The hierarchical RAM simulation model framework consists of RAM simulation models, class library and each model's input and output data lists. The hierarchical RAM simulation models are co-operated with 3 kinds of model - type I, II, III. Type I, II models are used to analyze the target operational availability and Type III is used to establish the initial RAM specifications. Each model's input and output data lists are defined by considering each model's purpose of RAM analysis. The class library is arranged with each model's classes for implementing the hierarchical simulation models. The proposed framework may be applied for executing the RAM activities effectively.

Estimation of the Life-span for Urban Rolling Stock through LCC Analysis (Focused on Seoul Metro) (LCC분석을 통한 도시철도 전동차의 경제적 사용내구년한 추정(서울메트로 사례를 중심으로))

  • Chung, Su Young;Lee, Won Young
    • Journal of the Korean Society for Railway
    • /
    • v.15 no.5
    • /
    • pp.508-516
    • /
    • 2012
  • The lifespan of a rolling stock is limited to 25 years by the urban railway law. But it can be extended to 40 years by conducting the regular safety test. This gives additional 15 years of lifespan. In Seoul Metro, Many of the rolling stocks were already replaced with new types in 1996 and 2008. New type - VVVF rolling stocks have better safety, maintainability, durability than old types. For this reason, it is desirable to extend the lifespan of new type-rolling stocks. In this paper, we investigated the economical lifespan using LCC (Life Cycle Cost) analysis. This study shows that the economical lifespan comes out 41 years when extra 10% cost has been considered after 25 years of the train service and 46 years when extra 10% cost not considered.

The Software Quality Testing on the basis of the International Standard ISO/IEC 25023 (국제표준 ISO/IEC 25023 을 기반으로 한 소프트웨어 품질평가)

  • Jung, Hye-Jung
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.6
    • /
    • pp.35-41
    • /
    • 2016
  • As software is very important, modern men are interesting software quality testing. In this paper, we analyze the Internation standard and Test data, so, we propose the testing method by analysing testing data. We compare ISO/IEC 9126-2 testing model with ISO/IEC 25023 testing model. On the basis of ISO/IEC 25023, we classify the test data and we analyze the difference of International Standard to functionality, reliability, usability, efficiency, maintainability, portability, compatability, and security. By reality 331 testing data, we classify test data, and analyze difference according to sex. We find regression model by functionality, usability and testing date and we prove difference of testing date and the number of error by tester. Also, we prove difference of the number of error in software type.

A Systematic Literature Survey of Software Metrics, Code Smells and Refactoring Techniques

  • Agnihotri, Mansi;Chug, Anuradha
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.915-934
    • /
    • 2020
  • Software refactoring is a process to restructure an existing software code while keeping its external behavior the same. Currently, various refactoring techniques are being used to develop more readable and less complex codes by improving the non-functional attributes of software. Refactoring can further improve code maintainability by applying various techniques to the source code, which in turn preserves the behavior of code. Refactoring facilitates bug removal and extends the capabilities of the program. In this paper, an exhaustive review is conducted regarding bad smells present in source code, applications of specific refactoring methods to remove that bad smell and its effect on software quality. A total of 68 studies belonging to 32 journals, 31 conferences, and 5 other sources that were published between the years 2001 and 2019 were shortlisted. The studies were analyzed based on of bad smells identified, refactoring techniques used, and their effects on software metrics. We found that "long method", "feature envy", and "data class" bad smells were identified or corrected in the majority of studies. "Feature envy" smell was detected in 36.66% of the total shortlisted studies. Extract class refactoring approach was used in 38.77% of the total studies, followed by the move method and extract method techniques that were used in 34.69% and 30.61% of the total studies, respectively. The effects of refactoring on complexity and coupling metrics of software were also analyzed in the majority of studies, i.e., 29 studies each. Interestingly, the majority of selected studies (41%) used large open source datasets written in Java language instead of proprietary software. At the end, this study provides future guidelines for conducting research in the field of code refactoring.

Design and Implementation of Security System Based on Intrusion Tolerance Technology : Focus on Wargame System (침입감내기술 기반의 보안시스템 설계 및 구현 : 워게임체계를 중심으로)

  • Lee, Gang-Tack;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.41-48
    • /
    • 2005
  • Objective of this study is to design and implement security system based on intrusion tolerance technology for the improvement of dependability in defense system. In order to do so, I identify and extract core technologies through the research and analysis into characteristics, structures, main functions, and technologies of intrusion tolerance architecture. And I accomplish a design of security system through the redundant system based on these core technologies. To implement and verify intrusion tolerance system, I chose 'wargame system' as a subjected system, and accomplished 'Wargame Intrusion Tolerance System' and verified security required functions through a performance test. By applying showed security system into the development of application software based on intrusion tolerance, systematic and efficient system could be developed. Also applying 'WITDS' can solve the current security problems, and this will be basic model for design of security architecture in the federation system after.

  • PDF