• Title/Summary/Keyword: Software Adaptability

Search Result 69, Processing Time 0.025 seconds

Fast Video Data Encryption for Swarm UAVs Using Hybrid Crypto-system (하이브리드 암호시스템을 이용한 군집 영상의 고속 암호화)

  • Cho, Seong-Won;Kim, Jun-Hyeong;Chae, Yeo-Gyeong;Joung, Yu-Min;Park, Tae-Kyou
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.7
    • /
    • pp.602-609
    • /
    • 2018
  • This paper proposes the hybrid crypto-system for fast video data encryption of UAV(Unmanned Aerial Vehicle) under the LTE(Long-Term Evolution) wireless communication environment. This hybrid crypto-system is consisted of ECC(Elliptic Curve Cryptography) public key algorithm and LEA(Light-weight Encryption Algorithm) symmetric key algorithm. ECC is a faster public key algorithm with the same security strength than RSA(Rivest Shamir Adleman), and Korean standard LEA with the same key size is also a faster symmetric key algorithm than AES(Advances Encryption Standard). We have implemented this hybrid crypto-system using OpenSSL, OpenCV and Socket programs under the Swarm 8-UAV. We have shown the efficient adaptability of this hybrid crypto-system for the real-time swarm UAV through the experiments under the LTE communication environment.

A Study of Quality-based Software Architecture Design Model under Web Application Development Environment (품질기반 웹 애플리케이션 개발을 위한 소프트웨어아키텍쳐 설계절차 예제 정립)

  • Moon, Song Chul;Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.115-122
    • /
    • 2012
  • As the most common application development of software development time, error-free quality, adaptability to frequent maintenance, such as the need for large and complex software challenges have been raised. When developing web applications to respond to software reusability, reliability, scalability, simplicity, these quality issues do not take into account such aspects traditionally. In this situation, the traditional development methodology to solve the same quality because it has limited development of new methodologies is needed. Quality of applications the application logic, data, and architecture in the entire area as a separate methodology can achieve your goals if you do not respond. In this study secure coding, the big issue, web application factors to deal with security vulnerabilities, web application architecture, design procedure is proposed. This proposal is based on a series of ISO/IEC9000, a web application architecture design process.

A Service Reusability-Centric Process for Developing Software-as-a-Service (서비스 재사용성 중심의 Software-as-a-Service 개발 프로세스)

  • Lee, Jung-Woo;La, Hyun-Jung;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.7
    • /
    • pp.518-535
    • /
    • 2010
  • Cloud Computing is emerged as an effective reuse paradigm, where service providers operate hardware and software and as a service, and service consumers invoke the service through Internet. Software-as-a-Service (SaaS) is a type of cloud services, where the whole software is designed as a service so that several consumers can reuse the SaaS. While tradition software applications are developed for a specific organization, SaaS is developed for multiple users in the various organizations. Hence, reusability is very essential characteristic of SaaS. Reusability is defined as a metric of how effective and efficient software functionalities can be used by various users. Reusability in SaaS is evaluated by considering three sub-characteristics; applicability, adaptability, and scalability. Since such a SaaS has considerable differences and characteristics from traditional software applications, conventional methods including object-oriented modeling, component-based development method, and service-oriented architecture (SOA) service development method would be limited in developing services which can fulfill these three sub-characteristics related to reusability as well as SaaS-intrinsic characteristics. Hence, there is a great demand for effective processes for developing SaaS cloud services. In this paper, we present a practical process for developing SaaS, which focuses on ensuring reusability. And by performing a case study with our proposed SaaS development process, we evaluate applicability of our proposed process and explain how the process is used in a real domain. Then, we compare our proposed process with others for verifying our study. Through the proposed process, cloud services with high quality can be more effectively developed.

An Analysis of Measurement in Scrum Method and Its Case Study (스크럼 방법론에서의 측정 지표 분석 및 사례 연구)

  • Kim, Sung-Kun;Hwang, Soon-Sam
    • Information Systems Review
    • /
    • v.10 no.3
    • /
    • pp.185-205
    • /
    • 2008
  • As time to market and rapid reaction to changes in demand is much required, agile software development methodologies whose characteristics are great adaptability and short iteration developments are getting more popular. Though there have been a number of literature suggesting the great potential of agile software development, some recent studies have also mentioned its limitations. We believe there remains much confusion as to whether agile approaches are good to introduce or not. In an effort to provide 'real' characteristics of agile development, this paper evaluates Scrum, one of the most used agile approaches, using a software measurement framework. It also presents a Scrum measurement case study of a web portal company. We believe this study will provide some concrete guidelines as to whether Scrum is worth, what are weak points, and how to control the agile process in order to get over the weakness.

Embedded Monitoring System using Bit-masking Technique (비트마스킹 기법을 이용한 임베디드 모니터링 시스템)

  • Shin Won;Kim Tae-Wan;Chang Chun-Hyon
    • The KIPS Transactions:PartD
    • /
    • v.13D no.4 s.107
    • /
    • pp.613-618
    • /
    • 2006
  • As the embedded software spreads in various areas, many development tools have been made to minimize the developing time. But these tools cannot be applicable to all the environment because they have been created for the specific platform. As such, this paper proposes an Embedded Monitoring System, which supports the various communication environment and removes the limitation of adaptability to the various platforms. Using the Code Inline technique, this system can perform the monitoring process. However, we should consider the optimization for the monitoring process and monitoring sensors because the technique has the monitoring sensor overhead. As such, this paper proposes an approach for initializing the monitoring process and a bit-masking technique for optimizing the monitoring sensor. The Embedded Monitoring System will be applicable to all the areas using embedded systems.

Faster Detouring for Data Plane Failures in Software Defined Networks (SDN에서 데이터 평면 장애를 해결하는 빠른 우회 기법)

  • Thorat, Pankaj;Yeom, Sanggil;Choo, Hyunseung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.124-126
    • /
    • 2016
  • Successful deployment of the Software Defined Network (SDN) depends on its ability to cope up with network failures. There are various types of failures that may occur in an SDN. The most common are switch and link failures. It is necessary to recover the network from failures for a continuous service availability. But for the real-time services fast recovery from the failure is required to minimize the service disruption time. In the proposed work, we focused on minimizing the recovery time after the failure is detected. Once the failure is detected, the controller involvement is needed to dynamically reroute the failure disrupted flows from the failed component to an alternate path. The aim of the proposed scheme is to provide a traffic management scheme which can react to the dynamic network events by rapidly modifying the forwarding behavior of the switches for faster in-band network adaptability. The proposed scheme (1) Considers the shared data and control path delay (2) Optimally utilize the network resources (3) Eliminates the need of constant monitoring overhead at the controller which results into faster detouring and ultimately rapid recovery.

Complex Bandpass Sampling Technique and Its Generalized Formulae for SDR System (SDR 시스템을 위한 Complex Bandpass Sampling 기법 및 일반화 공식의 유도)

  • Bae, Jung-Hwa;Ha, Won;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7C
    • /
    • pp.687-695
    • /
    • 2005
  • A bandpass sampling technique, which is a method directly downconverting a bandpass signal to a baseband or a low IF signal without analog mixers, can be an alterative choice for the SDR system to minimize the RF front-end. In this paper, a complex bandpass sampling technique for two bandpass-filtered signals is proposed. We derived generalized formulae for the available sampling range, the signal's IF and the minimum sampling frequency taking into consideration the guard-bands for the multiple RE signals. Thru the simulation experiments, the advantages of the . complex bandpass sampling over the pre-reported real bandpass sampling are investigated for applications in the SDR design.

A Cost-Effective Land Surveying System for Engineering Applications

  • El-Ashmawy, Khalid L.A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.373-380
    • /
    • 2022
  • The field of land surveying is changing dramatically due to the way data is processed, analyzed and presented. Also, there is a growing demand for digital spatial information, coming primarily from the GIS (Geographical Information System) user community. Such a demand has created a strong development potential for a new land surveying software. An overview of the development and capabilities of a land surveying software platform based on the Windows system, SurveyingMap, is presented. Among its many features, SurveyingMap provides a lot of adaptability for networks adjustment, geodetic and plane coordinates transformation, contouring, sectioning, DTM (Digital Terrain Model) generation, and large scale mapping applications. The system output is compatible with well known computer aided drafting (CAD) /GIS packages to expand its scope of applications. SurveyingMap is also suitable for non-technical users due to the user-friendly graphic user interface. The system could be used in engineering, architecture, GIS, and academic teaching and research, among other fields. Two applications of SurveyingMap, extension of field control and large scale mapping, for the case study area are established. The results demonstrate that the system is adaptable and reasonably priced for use by college and university students.

Design of Problem-Based Blended Learning for the Improvement of Software Adaptability (응용소프트웨어 적응력 향상을 위한 문제중심의 B-러닝 설계)

  • Kim, Sun-Nam;Yoo, In-Hwan
    • 한국정보교육학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.129-134
    • /
    • 2007
  • 학교 현장에서의 컴퓨터 교육은 여전히 시범실습위주로 이루어지고 있으며. 초등학교 컴퓨터 교육에서 많은 비중을 차지하는 소프트웨어 교육은 더욱 그러하다. 소프트웨어는 끊임없이 개발되거나 업그레이드 되고 있어 가르쳐야 할 내용이 많아져 새로운 학습방법이 필요하다. 즉 문제사태에서 필요한 기능을 찾아 스스로 문제를 해결하고 다른 응용소프트웨어에 전이 및 파지할 수 있는 능력을 길러주는 학습방법이 필요하다. 그 방법 중의 하나가 구성주의 학습 원리에 부합한 문제중심학습이며 학습의 효과를 높이기 위해서 온라인과 오프라인학습의 장점을 혼합한 B-러닝 방법이 필요하다. 따라서 본 연구는 응용소프트웨어의 적응력을 향상시키기 위해 한글 워드프로세서 학습내용을 학습자의 수준에 맞게 문제중심으로 재구성하고 온라인 학습을 위해 학급커뮤니티를 설계 및 구현하였다. 그리고 문제중심의 B-러닝에 적합한 학습모형을 설계하여 제시하였다. 문제중심의 B-러닝은 구성주의 학습 원리에 적합한 실생활의 문제를 학습내용으로 하고 면대면 교실수업의 장점과 온라인 학습의 장점을 혼합하여 자기주도적으로 탐구학습을 하는 것이므로 응용소프트웨어의 적응력은 향상될 것으로 기대한다.

  • PDF

An Intelligent Intrusion Detection Model

  • Han, Myung-Mook
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.224-227
    • /
    • 2003
  • The Intrsuion Detecion Systems(IDS) are required the accuracy, the adaptability, and the expansion in the information society to be changed quickly. Also, it is required the more structured, and intelligent IDS to protect the resource which is important and maintains a secret in the complicated network environment. The research has the purpose to build the model for the intelligent IDS, which creates the intrusion patterns. The intrusion pattern has extracted from the vast amount of data. To manage the large size of data accurately and efficiently, the link analysis and sequence analysis among the data mining techniqes are used to build the model creating the intrusion patterns. The model is consist of "Time based Traffic Model", "Host based Traffic Model", and "Content Model", which is produced the different intrusion patterns with each model. The model can be created the stable patterns efficiently. That is, we can build the intrusion detection model based on the intelligent systems. The rules prodeuced by the model become the rule to be represented the intrusion data, and classify the normal and abnormal users. The data to be used are KDD audit data.

  • PDF