• Title/Summary/Keyword: Software Structure

Search Result 2,303, Processing Time 0.032 seconds

Pseudoreceptor: Concept and an Overview

  • Kothandan, Gugan;Madhavan, Thirumurthy;Gadhe, Changdev G.;Cho, Seung Joo
    • Journal of Integrative Natural Science
    • /
    • v.3 no.3
    • /
    • pp.162-167
    • /
    • 2010
  • A pseudoreceptor combines structure-based and ligand-based techniques to represent a unifying concept for both receptor mapping and ligand matching. In this molecular modeling approach, there are opportunities to construct the pseudoreceptor models using a set of small molecules. To build a reliable pseudoreceptor model, we need a set of ligand molecules with known affinity (biological activity) to generate 3D bioactive conformation for each of these ligand molecules. Several software packages are available to generate a pseudoreceptor model and this can provide an entry point for structure based drug discovery in cases where receptor structure information is not available. In this review, we presented the concept of pseudoreceptor, as well as discussed about various software packages available to generate a pseudoreceptor model.

Implementation of a software for a control system with dual structure under the real-time operating system (실시간 운영체제 환경하에서 이중화된 제어시스템을 위한 소프트웨어의 구현)

  • 박세화;황동환;이재혁;김병국;변증남;문봉채;김은기
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1992.10a
    • /
    • pp.61-66
    • /
    • 1992
  • In this paper, a method for implementing software for the control system with dual structure in processor module is proposed and implemented to enhance its reliability. In this implementation the multi-tasking function which is provided by a real-time operating system is applied. The overall softwre is divided into five tasks and is performed in each of the dual processor module, independently. By this, the processor module with dual structure can achieve a control objective and fault diagnostics effectively. An experimental result shows that the backup processor module can be substituted for the primary processor module immediately when it happens to fail, because data relating the failure information are exchanged continuously done via shared memories.

  • PDF

An Interpretation of Hydrogeologic Structure Using Geophysical Data from Chungwon Area, Chungcheongbuk-Do (물리탐사자료를 이용한 수리지질구조 해석 -충청북도 청원지역)

  • 송성호;정형재;권병두
    • Economic and Environmental Geology
    • /
    • v.33 no.4
    • /
    • pp.283-293
    • /
    • 2000
  • A set of geophysical survey results over an area in Bookil-myun, Chungwon-Gun, Chungcheongbuk-Do is presented; resistivity logging, d.c. sounding, dipole-dipole resistivity, and controlled-source magnetotelluric (CSMT) surveys. These surveys were chosen in this research for the estimation of the basement depth and the delineation of the hydrogeologic structure over the survey area. The results provide an optimal input to a hydrogeologic modeling analysis using the strategies built in GIS software. A total of 14 lines of dipole-dipole resistivity surveys, 25 stations of d.c. sounding and 6 stations of CSMT sounding were performed. In addition 10 boreholes were chosen for resistivity logging to correlate the logs to the surface data. A quantitative information on the hydrogeologic structure over the area is provided by synthesizing the results from various geophysical data and attribute layers are constructed by utilizing a GIS software Arc/ Info. The constructed layers match well to the hydrogeologic structures, which were outlined from the drilling data. The methodology tested and adopted in this study would be useful for providing a more reliable input to the hydrogeologic model setup.

  • PDF

A Study on User Authentication Method for Foldable Screen-Based Devices (폴더블 스크린 기반 기기 사용자 인증기법 연구)

  • Choi, Dongmin
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.3
    • /
    • pp.440-447
    • /
    • 2021
  • Smartphones are currently being produced with similar functions, shapes, and software. The foldable smartphone is a product that dramatically changed the shape of the existing smartphone. Therefore, it affects the functions and software. In this paper, we analyze the potential security vulnerability of current mobile authentication methods by dividing them into two parts, security vulnerabilities of non-foldable smartphones, and security vulnerability that appears with the changed smartphone structure. According to the analysis result, the classic and current mobile user authentication methods appears to be easily affected by the smartphone display structure. Finally, we propose an appropriate authentication method as well as the concept of security measures for smartphones with foldable screen. Our method shows that it is more secure than the conventional authentication methods in foldable display smartphone.

Pushover analysis of gabled frames with semi-rigid connections

  • Shooshtari, Ahmad;Moghaddam, Sina Heyrani;Masoodi, Amir R.
    • Steel and Composite Structures
    • /
    • v.18 no.6
    • /
    • pp.1557-1568
    • /
    • 2015
  • The nonlinear static analysis of structure, which is under the effect of lateral loads and provides the capacity curve of the structure, is defined as a push-over analysis. Ordinarily, by using base shear and the lateral displacement of target point, the capacity curve is obtained. The speed and ease of results interpretation in this method is more than that of the NRHA responses. In this study, the nonlinear static analysis is applied on the semi-rigid steel gabled frames. It should be noted that the members of this structure are analyzed as a prismatic beam-column element in two states of semi-rigid connections and supports. The gabled frame is modeled in the OpenSees software and analyzed based on the displacement control at the target point. The lateral displacement results, calculated in the top level of columns, are reported. Furthermore, responses of the structure are obtained for various support conditions and the rigidity of nodal connections. Ultimately, the effect of semi-rigid connections and supports on the capacity and the performance point of the structure are presented in separated graphs.

Extension of Code Refactoring Technique to Support Energy Efficiency and Language Conversion of Embedded Software (임베디드 소프트웨어의 에너지 효율성과 언어 변환 지원을 위한 코드 리팩토링 기법 확장)

  • Nam, Seungwoo;Hong, Jang-Eui
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.91-103
    • /
    • 2018
  • Refactoring is an engineering technique for securing the quality of existing legacy code, improving the internal structure without changing the functionality of the software. Along with the reuse of open source software, reuse of source code through programming language conversion is increasingly required due to technical or market requirements. In this situation, the refactoring technique including language conversion as well as energy efficiency is considered to be an important means for improving the productivity and the quality of embedded software development. This paper proposes a code refactoring technique that converts the grammar and structure of a programming language into those of a different language through comparison and mapping, in addition to the existing energy efficient refactoring technique. The use of the proposed refactoring technique can expect to improve the competitiveness of the product through rapid software development and quality improvement by coping with the environment change of the software development language and enhancing the reuse of the existing code.

An Estimation Process of Effort and Cost in Security Evaluation of Information Technology Security Systems by utilizing Evaluation Work Break-down Structure (EWBS를 통한 정보보호 시스템의 보안성 평가 업무량 및 비용 산정 프로세스)

  • You, Hyung-Joon;Ko, Jeong-Ho;Chang, Soo-Jin;Ahn, Sun-Suk;Lee, Gang-Soo;Jung, Hong-Jin
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.2
    • /
    • pp.134-147
    • /
    • 2000
  • Even though software industry has been activated, there lack in results of studies on evaluation effort and cost of software systems including Information Technology Security System (ITSS). In this paper, we present a process and a tool for evaluation effort and cost of ITSS, which are conformed to a ITSS evaluation criteria(i. e., Common Criteria or ISO/IEC 15408), by utilizing Evaluation Work Break-down Structure (EWBS) and conventional software development cost estimation methods. Even though we concentrate on ITSS, results of this paper can be applied to estimation of effort and cost of evaluation of software development process and software products.

  • PDF

Design of controller for mobile robot in welding process of shipbuilding engineering

  • Ku, Namkug;Ha, Sol;Roh, Myung-Il
    • Journal of Computational Design and Engineering
    • /
    • v.1 no.4
    • /
    • pp.243-255
    • /
    • 2014
  • The present study describes the development of control hardware and software for a mobile welding robot. This robot is able to move and perform welding tasks in a double hull structure. The control hardware consists of a main controller and a welding machine controller. Control software consists of four layers. Each layer consists of modules. Suitable combinations of modules enable the control software to perform the required tasks. Control software is developed using C programming under QNX operating system. For the modularizing architecture of control software, we designed control software with four layers: Task Manager, Task Planner, Actions for Task, and Task Executer. The embedded controller and control software was applied to the mobile welding robot for successful execution of the required tasks. For evaluate this imbedded controller and control software, the field tests are conducted, it is confirmed that the developed imbedded controller of mobile welding robot for shipyard is well designed and implemented.

Task Assignment Model for Crowdsourcing Software Development: TAM

  • Tunio, Muhammad Zahid;Luo, Haiyong;Wang, Cong;Zhao, Fang;Gilal, Abdul Rehman;Shao, Wenhua
    • Journal of Information Processing Systems
    • /
    • v.14 no.3
    • /
    • pp.621-630
    • /
    • 2018
  • Selection of a suitable task from the extensively available large set of tasks is an intricate job for the developers in crowdsourcing software development (CSD). Besides, it is also a tiring and a time-consuming job for the platform to evaluate thousands of tasks submitted by developers. Previous studies stated that managerial and technical aspects have prime importance in bringing success for software development projects, however, these two aspects can be more effective and conducive if combined with human aspects. The main purpose of this paper is to present a conceptual framework for task assignment model for future research on the basis of personality types, that will provide a basic structure for CSD workers to find suitable tasks and also a platform to assign the task directly. This will also match their personality and task. Because personality is an internal force which whittles the behavior of developers. Consequently, this research presented a Task Assignment Model (TAM) from a developers point of view, moreover, it will also provide an opportunity to the platform to assign a task to CSD workers according to their personality types directly.

The Design and Implementation of a Reusable Viewer Component

  • Kim, Hong-Gab;Lim, Young-Jae;Kim, Kyung-Ok
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.66-69
    • /
    • 2002
  • This article outlines the capabilities of a viewer component called GridViewer, and proves its reusability. GridViewer was designed for the construction of the image display part of GIS or remote sensing application software, and consequently it is particularly straightforward to closely couple GridViewer with access to very large images. Displaying is performed through pyramid structure, which enables to treat very large dataset up to several gigabytes in size under the limited capability of PC. GridViewer is free from responsibility to handle various formats of raster data files by taking grid coverage, which is designed by OGC to promote interoperability between implementations done by data vendors and software vendors providing analysis and grid processing implementations. GridViewer differs from other such viewer by allowing for clients to extend its function and capability by using small set of methods originally implemented in it. We show its reusability and expandability by applying it in developing application programs performing various functions not supported originally by the GridViewer COM component.

  • PDF