• Title/Summary/Keyword: Software Developer

Search Result 225, Processing Time 0.037 seconds

A study on the fault detection efficiency of software (소프트웨어의 결함 검출 효과에 관한 연구)

  • Kim, Sun-Il;Che, Gyu-Shik;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.737-743
    • /
    • 2008
  • I compare my parameter estimation methodoloay with existing method, considering both of testing effort and fault detecting rate simultaneously in software reliability modeling. Generally speaking, fault detection/removal mechanism depends on how apply previous fault detection/removal and testing effort of S/W. The fault removal efficiency makes large influence to the reliability growth, testing and removal cost in developing stage S/W. This is very useful measure during all the developing stages and much helpful for the developer to estimate debugging efficiency, and furthermore, to anticipate additional working amount.

Development of Dental Medical Image Processing SW using Open Source Library (오픈 소스를 이용한 치과 의료영상처리 SW 개발)

  • Jongjin, Park
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.1
    • /
    • pp.59-64
    • /
    • 2023
  • With the recent development of IT technology, medical image processing technology is also widely used in the dental field, and the treatment effect is enhanced by using 3D data such as CT. In this paper, open source libraries such as ITK and VTK are introduced to develop dental medical image processing software, and how to use them to develop dental medical image processing software centering on 3D CBCT. In ITK, basic algorithms for medical image processing are implemented, so the image processing pipeline can be quickly implemented, and the desired algorithm can be easily implemented as a filter by the developer. The developed algorithm is linked with VTK to implement the visualization function. The developed SW can be used for dental diagnosis and treatment that overcomes the limitations of 2D images..

Design and Performance Evaluation of Software On-Demand Streaming System Providing Virtual Software Execution Environment (가상 소프트웨어 실행 환경을 제공하는 주문형 소프트웨어 스트리밍 시스템 설계 및 성능평가)

  • Kim Young-Man;Park Hong-Jae;Han Wang-Won;Choi Wan;Heo Seong-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.501-510
    • /
    • 2006
  • Software streaming allows the execution of stream-enabled software on desktop or portable computing devices like PC, PDA, laptop, cellular phone, etc., even while the transmission/streaming from the server may still be in progress. In this paper, we present an efficient streaming system called Software On-Demand(SOD) streaming system to transmit stream-enabled applications in addition to automatic installation of program registry, environment variables, configuration files, and related components. In particular, we design and implement a SOD system in Linux to provide the user with the instant look-and-click software execution environment such that software download and installation are internally proceeded in a completely user-transparent way. Therefore, the SOD system relieves the user from the tricky, failure-prone installation business. In addition, the software developer now obtains a new, powerful means to advertise and propagate their software products since the user can use software packages via user-friendly UI window or web browser by look-and-click interactive operation. In the paper, we also make a couple of SOD streaming experiments using a spectrum of popular softwares. Based on the analysis of the experiment results, we also propose two performance improvement schemes.

How to Combine Secure Software Development Lifecycle into Common Criteria (CC에서의 소프트웨어 개발보안 활용에 대한 연구)

  • Park, Jinseok;Kang, Heesoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.171-182
    • /
    • 2014
  • Common Criteria is a scheme that minimize IT products's vulnerabilities in accordance with the evaluation assurance level. SSDLC(Secure Software Development Lifecycle) is a methodology that reduce the weakness that can be used to generate vulnerabilities of software development life cycle. However, Common Criteria does not consider certificated IT products's vulnerabilities after certificated it. So, it can make a problem the safety and reliability of IT products. In addition, the developer and the evaluator have the burden of duplicating evaluations of IT products that introduce into the government business due to satisfy both Common Criteria and SSDLC. Thus, we researched the relationship among the Common Criteria, the static code analysis tools, and the SSDLC. And then, we proposed how to combine SSDLC into Common Criteria.

Applying rework indicator to control software development project (소프트웨어 개발 프로젝트 제어를 위한 재작업 지표의 적용)

  • Han Hyuk-Soo;Kim Han-Saem
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.61-66
    • /
    • 2006
  • It is reported that the success ratio of software development projects has been only 30%. Many causes lower project's chance of success, particularly lack of systematic project management. Especially, moving on the next phase of project with unsatisfactory outputs can be very problematic because it can cause much waste of resource, time and even lead to the failure of the whole project. Peer review and inspection are some of the practices designed to prevent such waste and possible failure. When defects are identified through such progress, each developer has to work on the product component again and fix the problem. This process is called rework. In this paper, we propose a method for improving quality of reworked product component to prevent excessive cost and time consumed caused by moving on the next phase of a project with a problematic product component. More specifically, this paper suggests a rework indicator that measures the level of rework based on its complexity and severity and is used to choose appropriate checking method on reworked product component. The research also confirmed the method's usefulness and effectiveness by applying the suggested method on four projects.

SorMob: Computation Offloading Framework based on AOP (SorMob: AOP 기반의 연산 오프로딩 프레임워크)

  • Cho, Yeongpil;Cho, Doosan;Paek, Yunheung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.5
    • /
    • pp.203-208
    • /
    • 2013
  • As smartphones are rapidly and widely spread, their applications request gradually larger computation power. Recently, in the personal computer, computing power of hardware has exceeded performance requirement of software sometimes. Computing power of smartphone, however, will not grow at the same pace as demand of applications because of form factor to seek thinner devices and power limitation by relatively slow technical progress of battery. Computation offloading is getting huge attention as one of solution for the problem. It has not commonly used technology in spite of advantages for performance and power consumption since the existing offloading frameworks are difficult for application developer to utilize. This paper presents an application developer-friendly offloading framework, named SorMob. Based on Aspect Oriented Programming model, SorMob provides a convenient environment for application development, and its performance was verified by comparing with the existing offloading framework.

Design and Implementation of A Conceptual Class Diagram Elicitation System (개념클래스 다이어그램 도출 시스템의 설계 및 구현)

  • Park, Ga-Young;Lee, Yong-Hun;Lee, Sang-Bum
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.420-426
    • /
    • 2011
  • In this paper, we introduce a system which helps to draw a conceptual class diagram from the problem description by combining various class diagram deriving methods. Generally, problem description is a kind of statements including user requirements in the early development phase. The system developer can derive a conceptual class diagram from this document, which playes an important role during the object-oriented software development. Until now, it is not easy for the novice to elicit classes because it requires good experience and intuition. In addition, there are also some difficulties of finding valid conceptual classes by hand when the size of system becomes larger. Therefore, we develop a system to solve these problems so that the developer is able to construct the conceptual class diagram easily.

Implementation Requirements for Interoperability among IP over ATM Equipment (IP over ATM 장비들간의 상호 운용성을 위한 구현 요구 사항)

  • Min, Sang-Won;Kim, Hwang-Nam;Lee, Suk-Yeong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.4
    • /
    • pp.489-497
    • /
    • 1999
  • 국내의 ATM 기술은 대부분 교환기 시스템 개발에 집중되어 있었고 최근에는ATM 서비스 분야에 대한 개발 요구가 있다. 이러한 가운데 Internet 서비스는 데이타 망의 기본 서비스로 자리잡았으며, ATM망도 기본적으로 Internet 서비스를 지원하여야 한다. IETF의 IPOA (Classical IP and ARP over ATM)는 국내 망 여건 및 구현의 용이성으로 Internet 서비스를 위한 프로토콜중 가장 선호 대상이지만 RFC사양의 허술함, 구현자의 사양에 대한 이해 부족과 초기 외산 장비 제조 업체들의 자체 사양때문에 기존의 IPOA장비들과 상호 운용 시험에서 후발 IPOA 개발자는 시행착오를 겪어야만 한다. 본 논문에서는 기존 외산 IPOA 장비들과 자체 개발한 장비와 상호 운용 시험을 수행하면서 겪은 사례 연구를 정리하였고 이를 기초로 기존의 외산 IPOA와 상호 운용할 수 있는 최종 요구 사항을 제시하였다. 본 논문을 기초로 IPOA 장비를 개발한다면 국내 후발 ATM 장비 업체는 개발의 시간 및 노력을 줄일 수 있고 향후 IP/ATM 국내 기술력 향상에 도움이 될 것이다.Abstract While we have been focusing on development of ATM switching systems, recently the demand on service by use of ATM switching system is increasing rapidly. Among various ATM services, the Internet service should be provided in an ATM network since the Internet service has been the basic data service. Many domestic engineers consider the classical IP and ARP over ATM (IPOA) to be an appropriate method for interworking of IP and ATM because the IP is the network protocol used in most domestic data networks, and the IPOA is simpler and has less overhead than other approaches. However, it is not easy for a developer to implement the IPOA function module interoperable with other existing ones due to the incomplete description of IETF's RFC specifications, misunderstanding of designer and/or developer, and incompatible vendors' specifications. In this paper, we show several case studies undertaken for interoperability tests of IPOA products between our product and other vendor's products, and discuss the implementation requirement of the IPOA software to be interoperable with the existing IPOA equipment.The design and implementation requirements presented in this paper will reduce the effort of IPOA-developing engineers and time required for interoperability test. Also, this contribution will be helpful in IP/ATM interworking areas.

A Study on the Contribution Evaluation of Developer in Convergence Social App Manufacturing Platform (융복합 소셜 앱 제작 플랫폼에서 참여자의 기여도 평가 방법에 관한 연구)

  • Gu, Seokmo;Park, SeongIk;Park, KyungDong;Ahn, ByongSun;Kim, Yei-chang
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.225-233
    • /
    • 2015
  • The convergence social app manufacturing platform for both demander and developer in worldwide provides a collective collaborative development approach. This platform can bring enhanced productivity with exchange of views among participants. If the assessment is not fair that many participants will leave the collective collaborative project. The previous studies verified the reliability of the evaluation based on statistical techniques. Because the previous studies did not consider the task performance of participants, do not reflect the feature of project tasks. So, the contribution scores of the participants can be distorted. In this study, we suggest the method for evaluating the development contributions value. This is considered the task performance of participants and involved the method of equitable and consistency peer assessment.

Toward Design and Implement to Multiple Schemes for Strong Authentication Mechanism - Case Studying : Secure Entrance System - (다단계 사용자 신분확인 메커니즘 설계와 구현 방안 : 출입통제 시스템 사례 중심으로)

  • Hong Seng-Phil;Kim Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.161-172
    • /
    • 2006
  • As the innovative technologies related to ubiquitous computing are being rapidly developed in recent IT trend, the concern for IT dysfunction(e.g., personal information abuse, information risk, threat, vulnerability, etc.) are also increasing. In our study, we suggested how to design and implement to multiple schemes for strong authentication mechanism in real system environments. We introduce the systematic and secure authentication technologies that resolve the threats incurring from the abuse and illegal duplication of financial transaction card in the public and financial institutions. The multiple schemes for strong authentication mechanism applied to java technology, so various application programs can be embedded, Independent of different platforms, to the smartcard by applying the consolidated authentication technologies based on encryption and biometrics(e.g., finger print identification). We also introduce the appropriate guidelines which can be easily implemented by the system developer and utilized from the software engineering standpoint of view. Further, we proposed ways to utilize java card based biometrics by developing and applying the 'smartcard class library' in order for the developer and engineers involved in real system environment(Secure entrance system) to easily understand the program. Lastly, we briefly introduced the potential for its future business application.

  • PDF