• Title/Summary/Keyword: Software Tools

Search Result 1,231, Processing Time 0.03 seconds

Design Application of Evolutionary Algorithms in Architecture (디지털 디자인 미디어 - Evolutionary Algorithms의 현대건축에의 적용 방법론)

  • Kim, Ho-Jeong
    • Journal of Industrial Technology
    • /
    • v.27 no.A
    • /
    • pp.39-46
    • /
    • 2007
  • I discuss the preliminary version of an investigative software, GSE, - Genetic 3D Surface Explorer, in which genetic operations interact with AutoCAD to generate novel 3D Forms for the Architect. GSE allows us to comment on design issues concerning computer aided design tools based on evolutionary algorithms.

  • PDF

Computer aided dynamic accuracy evaluation on CNC machine tools (전산기를 이용한 CNC 공작 기계의 동적 정밀도의 평가에 대한 연구)

  • Kwon, H.D.
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.13 no.7
    • /
    • pp.24-28
    • /
    • 1996
  • In this paper, a new measurement system has been developed for measuring servo errors of CNC machine tools. Unlike the ball link bar method using circular path, the developed system uses two orthogonal straight paths for measurement of errors, giving relatively short test length. For position measurment, linear displacement sensor and steel cube have been designed, and the software for relevant data sampling and error evaluation has been implemented.

  • PDF

Empirical Risk Assessment in Major Graphical Design Software Systems

  • Joh, HyunChul;Lee, JooYoung
    • Journal of Multimedia Information System
    • /
    • v.8 no.4
    • /
    • pp.259-266
    • /
    • 2021
  • Security vulnerabilities have been reported in major design software systems such as Adobe Photoshop and Illustrator, which are recognized as de facto standard design tools in most of the design industries. Companies need to evaluate and manage their risk levels posed by those vulnerabilities, so that they could mitigate the potential security bridges in advance. In general, security vulnerabilities are discovered throughout their life cycles repeatedly if software systems are continually used. Hence, in this study, we empirically analyze risk levels for the three major graphical design software systems, namely Photoshop, Illustrator and GIMP with respect to a software vulnerability discovery model. The analysis reveals that the Alhazmi-Malaiya Logistic model tends to describe the vulnerability discovery patterns significantly. This indicates that the vulnerability discovery model makes it possible to predict vulnerability discovery in advance for the software systems. Also, we found that none of the examined vulnerabilities requires even a single authentication step for successful attacks, which suggests that adding an authentication process in software systems dramatically reduce the probability of exploitations. The analysis also discloses that, for all the three software systems, the predictions with evenly distributed and daily based datasets perform better than the estimations with the datasets of vulnerability reporting dates only. The observed outcome from the analysis allows software development managers to prepare proactively for a hostile environment by deploying necessary resources before the expected time of vulnerability discovery. In addition, it can periodically remind designers who use the software systems to be aware of security risk, related to their digital work environments.

Case Study of Software Reverse Engineering using McCabe and BP/Win Tools (McCabe 및 BP/Win도구를 이용한 소프트웨어 역공학 사례연구)

  • Jo, Hyeon-Hun;Choe, Yong-Rak;Rhew, Sung-Yul
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.5
    • /
    • pp.528-535
    • /
    • 2000
  • This paper aims at providing guidelines enabling productive software construction by offering reusable modules which is used not only for effective maintenance for each step, but also for a re-engineering process after analyzing developed source code. There are four processing steps. The first is to analyze source code. The second is module slicing and clustering using McCabe and BP/Win Tools, The third is to transform the outputs extracted from the business model to reusable modules. The final step is to design repository and to construct a system. In this paper, we applied the fourth step to our case study, which was specified from the first step to the fourth. The specified fourth step contains various things for constructing repository. And the fourth step reanalyzes informal and unstructured information by using reverse engineering tools, in order to provide effective guidelines for productive software maintenance and re-engineering.

  • PDF

Study on ISA's assessment to software process for EN50128 SIL4 (EN50128 SIL4 소프트웨어 프로세스 ISA 인증 사례 연구)

  • Cho, Chi-Hwan;Kang, Chan-Yong;Hwang, Jin-Ho
    • Proceedings of the KSR Conference
    • /
    • 2010.06a
    • /
    • pp.838-849
    • /
    • 2010
  • It is inevitable to control the systematic failure to obtain the software safety integrity of embedded software installed in rolling stock. Because it is not possible to assess systematic failure integrity by quantitative methods, SILs are used to group documentation, methods, tools and techniques throughout software development lifecycle which, when used effectively, are considered to provide an appropriate level of confidence in the realization of a system to a stated integrity level. Normally, safety approval process is through generic product, generic application and specification application for. For safety approval on generic application of software based system, it is required to apply the certified software processes from the planning stage for the assigned SIL. As such, we will develop project specific application with high safety integrity within time limit of contractual delivery schedule through software assessment to the modified area with the re-use of certified software module and documentation. At this point, Hyundai Rotem has developed software processes applicable to support SIL 4 based on EN50128 which was assessed and certified by TUV SUD. This paper introduces the Hyundai Rotem's detailed approach and prospective action to achieve software safety integrity level.

  • PDF

The Impact of the Competitiveness of Intermediate Software on Enterprise Results : a Case Study of Chinese Intermediate Software

  • Liu, Zi-Yang;Chen, Yi;Li, Hao
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.258-261
    • /
    • 2018
  • The purpose of this paper is to draw a conclusion on the impact of intermediate software on enterprise results. In this paper, product innovation and product reliability are especially used as analytical factors. An exploratory analytical study is conducted on the competitiveness of intermediate software, in the hope of gaining a new understanding of the competitiveness of intermediate software. Data are analyzed using such quantitative analytical tools as SPSS and AMOS. Using reliability analysis, validity analysis and structural equation model analysis, the final results are achieved. According to the analysis results, we can draw the following conclusions: the competitiveness of intermediate software has a positive impact on the innovation of software products. The competitiveness of intermediate software doesn't have a positive impact on the reliability of software products. Product innovation has a positive impact on enterprise results. Product reliability also has a positive impact on enterprise results. By analyzing the conclusions, we can make certain suggestions and draw implications on the competitiveness of China's software industry.

  • PDF

Design and Implementation of a CASE Tool Supporting Proof of Consistency between OO Models (객체지향 모형 간 일관성 검증을 지원하는 CASE 도구 설계 및 구현)

  • Lee, Seon-Mi;Jeon, Jin-Ok;Ryu, Jae-Cheol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.2965-2980
    • /
    • 1999
  • There are several models and the corresponding diagrams to express software system in many kinds of viewpoints, but these are supposed to be integrated and implemented into only one system. Therefore, the software modelers should have the models ensuring the consistency between information in software development life cycle. To support the robust models for modelers using OO modeling methods, i.e. UML, and CASE tools, the meta models of the software architecture and the consistency rules between the models are suggested in this thesis. Finally, the rules are implemented in the OO CASE tool, DEBUTO(Design By UML Tool). It supports UML1.1 notations and has visual modeling editors that enable users make their own software model.

  • PDF

Review of Automatic Testing Tool for Vital Software Safety Test and Assessment of Railway Signalling Systems (열차제어시스템 바이탈 소프트웨어 안전성 평가를 위한 테스트 도구의 검토)

  • Hwang, Jong-Gyu;Jo, Hyun-Jeong;Yoon, Yong-Gi;Jeong, Rak-Gyo
    • Proceedings of the KIEE Conference
    • /
    • 2007.10c
    • /
    • pp.204-206
    • /
    • 2007
  • The portion of embedded software in railway signaling system is increased by the advance of computer and communication technology. And the safely requirements for railway system are standardized by int'l std., such as IEC 62278 and IEC 62279. According to these circumstances for software safety problems, we are deduced the testing items for software safety test and assessment for railway signaling. Testing tools used for embedded software are surveyed to find a feasible safety assessment architecture. And the architecture of automatic test tool is proposed to test the deduced safely testing items in this paper.

  • PDF

Implementation of Remote Adapter for Debugging of Ubiquitous Embedded Software

  • Park Myeong-Chul;Ha Seok-Wun
    • Journal of information and communication convergence engineering
    • /
    • v.3 no.2
    • /
    • pp.96-100
    • /
    • 2005
  • Since ubiquitous embedded software is sensitive to the resources and environment of target system, it should be debugged in the same environment as actual target system. However, existing tools to debug embedded software, in which access to internal signal or resources is limited, are uneconomical. In the thesis, economical and practical USB-JTAG Adapter that can use open GDB is suggested. It can remove existing limitations of environment implementation that have many difficulties in implementing an environment for remote debugging. Hence, the thesis provides economical interfacing environment that can debug ubiquitous embedded software inside remote system.

A Python-based educational software tool for visualizing bioinformatics alignment algorithms

  • Elis Khatizah;Hee-Jo Nam;Hyun-Seok Park
    • Genomics & Informatics
    • /
    • v.21 no.1
    • /
    • pp.15.1-15.4
    • /
    • 2023
  • Bioinformatics education can be defined as the teaching and learning of how to use software tools, along with mathematical and statistical analysis, to solve biological problems. Although many resources are available, most students still struggle to understand even the simplest sequence alignment algorithms. Applying visualizations to these topics benefits both lecturers and students. Unfortunately, educational software for visualizing step-by-step processes in the user experience of sequence alignment algorithms is rare. In this article, an educational visualization tool for biological sequence alignment is presented, and the source code is released in order to encourage the collaborative power of open-source software, with the expectation of further contributions from the community in the future. Two different modules are integrated to enable a student to investigate the characteristics of alignment algorithms.