• Title/Summary/Keyword: Software reuse

Search Result 395, Processing Time 0.023 seconds

Design of SW Framework for Airborne Radar Real-time Signal Processing using Modular Programming (모듈화를 활용한 항공기 레이다 실시간 신호처리 SW Framework 설계)

  • Jihyun, Lee;Changki, Lee;Taehee, Jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.76-86
    • /
    • 2023
  • Radars used by air-crafts have two important characteristics; First, they should have a real-time signal processing system finishing signal processing before deadline while getting and processing successive in-phase and quadrature data. Second, they can cover a lot of modes including A2A(Air to Air), A2G(Air to Gound), A2S(Air to Sea), and Ground Map(GM). So the structure of radar signal processing SWs in modern airborne radars are becoming more complicate. Also, the implementation of radar signal processing SW needs to reuse common code blocks between other modes for efficiency or change some of the code blocks into alternative algorithm blocks. These are the reason why the radar signal processing SW framework suggested in this paper is taking advantage of modular programming. This paper proposes an modular framework applicable on the airborne radar signal processing SW maintaining the real-time characteristic using the signal processing procedures for A2G/A2S as examples.

Development of Reconfigurable Tactical Operation Display Framework by Battery and Battalion (포대/대대 별 재구성 가능한 전술작전화면 프레임워크 개발)

  • Lee, Sangtae;Lee, Seungyoung;Wi, SoungHyouk;Cho, Kyutae
    • Journal of KIISE
    • /
    • v.44 no.5
    • /
    • pp.476-485
    • /
    • 2017
  • The tactical operation centers of future anti-aircraft missile systems provide the environment for the research on future air threats, tactical information, integrated battlefield environment creation and management, engagement control and command and control algorithms. To develop the key functional elements of integrated battlefield situation creation and processing and tactical operation automation processing operations, battery/battalion tactical operation control and reconfiguration design software are required. Therefore, the algorithm software of each function and the tactical operation display software and link software for interworking between equipment were developed as reconfigurable through a data-centric design. In this paper, a tactical operation display framework that can be reconfigured on the operation display of the tactical operations according to the battery/battalion is introduced. This tactical operation display framework was used to develop a common data model design for the reconfigurable structure of multi-role tactical operations with battery / battalion and mission views, and a display configuration tool that provides a tactical operation display framework for view development was also developed using the MVC pattern. If the tactical operation display framework is used, it will be possible to reuse the view design through the common base structure, and a view that can be reconfigured easily and quickly will also be developed.

Automatic Source Code Generating Technique from Design Patterns (디자인 패턴에 대한 소스코드 자동 생성 기법)

  • Kim, Woon-Yong;Choi, Young-Keun
    • The KIPS Transactions:PartD
    • /
    • v.9D no.5
    • /
    • pp.847-858
    • /
    • 2002
  • A purpose of the object-oriented programming is to promote reuse and development time, and to improve software quality. A way for this purpose is using a design information well-defined and tested in previous time when developing software. Such design information is called design patterns. The design patterns are descriptions of abstract solution to recurse software design problems In a systematic and general way. But because the design patterns are descriptions of abstract solution, the specification and application of patterns generally rely on manual implementation and is applied to various forms. As a result, we need to spend a lot of time to develop software program not only because of difficulty in analyzing and applying to patterns consistently, but also because of the frequent programing faults. And because the applied design patterns don't express inside application visually, it is difficult to analyze and test for this design patterns. In this paper, we propose automatic source code generating technique to be able to efficiently apply the element of design patterns when developing application. And we show a way to analyze and use the applied design patterns in application. As a result, the design patterns in application provide the consistent structure and efficiency, and make analysis and using effect increased.

A Study on Development of Network Management Systems base on Component (컴포넌트 기반의 망관리 시스템 개발에 관한 연구)

  • Kim, Haeng-Kon;Kim, Ji-Young
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.937-950
    • /
    • 2004
  • With growing population of internet and web applications, distributed environment is considered to be the standard architecture of application. A network management systems(NMS) is necessary to control and monitor the complex network resources for providing and sharing the heft quality service. We recognize the NMS as a standard infrastructure for supporting efficient networking and a separate commercial applications. We believe every resource including software, hardware and environment for the network management should be separated from special protocols, vendors and applications. Therefore, We need a standard network management system that is efficient and consistent because of the heterogeous network features. In regards to software development, software reuse through assembling and extending the reusable elements such as patterns and components assures to realize the best productivity and quality The component based development(CBD) methodology that can assemble black box though well defined interfaces makes it possible to develop easer and quicker applications and is proved as the best software development solution involved in construction, selection and assembly of components. In this thesis, we describe the architecture for the network management and identify, define and design the components through analysis and design in the network management domain and Identified components mapped to the component architecture. We also specify the component development and design and implement the component for developing the network management. Implemented components apply to the component repository system that register, retrieve and understand the components. We analyze, design and implement the entire network management system based on configuration, connection, performance and fault management through the pre-developed components.

An Implementation of IEEE 1516.1-2000 Standard with the Hybrid Data Communication Method (하이브리드 데이터 통신 방식을 적용한 IEEE 1516.1-2000 표준의 구현)

  • Shim, Jun-Yong;Wi, Soung-Hyouk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1094-1103
    • /
    • 2012
  • Recently, software industry regarding national defense increases system development of distributed simulation system of M&S based to overcome limit of resource and expense. It is one of key technologies for offering of mutual validation among objects and reuse of objects which are discussed for developing these systems. RTI, implementation of HLA interface specification as software providing these technologies uses Federation Object Model for exchanging information with joined federates in the federation and each federate has a characteristic that is supposed to have identical FOM in the federation. This technology is a software which is to provide the core technology which was suggested by the United state's military M&S standard framework. Simulator, virtual simulation, and inter-connection between military weapons system S/W which executes on network which is M&S's core base technology, and it is a technology which also can be used for various inter-connection between S/W such as game and on-line phone. These days although RTI is used in military war game or tactical training unit field, there is none in Korea. Also, it is used in mobile-game, distribution game, net management, robot field, and other civilian field, but the number of examples are so small and informalized. Through this developing project, we developed the core technique and RTI software and provided performance of COTS level to improve communication algorithms.

A Comparison Study of Methods about Component Identification (컴포넌트 식별 방법에 관한 비교 연구)

  • 최미숙
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.3
    • /
    • pp.383-390
    • /
    • 2002
  • System developments by components are accomplished by creating new software based on independent components having respective function. Generally, component-based software developments are expected to obtain profits caused by reuse of software, such as improvement of quality, rapid development, and efficiency of maintenance. In a component-based system, the most important goal and also key to success is to identify and construct high quality components that may increase reusability. Therefore, it is necessary for component developers to understand strong and weak points of existing component development methodologies in the aspect of identification of component, and to select the most appropriate methodology for the system to be constructed. It is also necessary for component developers to develop a new methodology enabling effective identification of independent components through modification and/or complementation of existing methodologies. The modification and complementation needs comparison and analysis of various existing methodologies. Accordingly, the this paper is to provide explanation for some widely used methodologies representing the existing component-based software development methodologies such as RUP(Rational Unified Process) of Rational company[1,9], CBD96 of Computer Associates company[2,3], UNIFACE of Compuware company[5], and UML components methodology derived from extending of the component developing method of CBD96 by Cheesman and Daniels[4]. The this paper is also to point out respective problems of the representative existing methodologies. Furthermore, component identification methodologies are compared and analyzedon the whole through this paper.

  • PDF

A Code Clustering Technique for Unifying Method Full Path of Reusable Cloned Code Sets of a Product Family (제품군의 재사용 가능한 클론 코드의 메소드 경로 통일을 위한 코드 클러스터링 방법)

  • Kim, Taeyoung;Lee, Jihyun;Kim, Eunmi
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.1
    • /
    • pp.1-18
    • /
    • 2023
  • Similar software is often developed with the Clone-And-Own (CAO) approach that copies and modifies existing artifacts. The CAO approach is considered as a bad practice because it makes maintenance difficult as the number of cloned products increases. Software product line engineering is a methodology that can solve the issue of the CAO approach by developing a product family through systematic reuse. Migrating product families that have been developed with the CAO approach to the product line engineering begins with finding, integrating, and building them as reusable assets. However, cloning occurs at various levels from directories to code lines, and their structures can be changed. This makes it difficult to build product line code base simply by finding clones. Successful migration thus requires unifying the source code's file path, class name, and method signature. This paper proposes a clustering method that identifies a set of similar codes scattered across product variants and some of their method full paths are different, so path unification is necessary. In order to show the effectiveness of the proposed method, we conducted an experiment using the Apo Games product line, which has evolved with the CAO approach. As a result, the average precision of clustering performed without preprocessing was 0.91 and the number of identified common clusters was 0, whereas our method showed 0.98 and 15 respectively.

Security-Aware Optimized Link Routing Protocol for Mobile Ad-Hoc Networks

  • Dhir, Amandeep;Sengupta, Jyotsna
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.1
    • /
    • pp.52-83
    • /
    • 2009
  • In this technical report, we have examined the basic building blocks of mobile ad-hoc networks. The paper discusses various security requirements of ad-hoc networks, attacks in ad-hoc networks, Security Implementation and Routing Protocols. The primary purpose of the paper is to address the Optimized Link State Routing (OLSR) protocol in detail, along with the various possible attacks. Finally, algorithms for securing OLSR are proposed, via the addition of digital signatures, as well as more advanced techniques such as cross checking of advertised routing control data with the node's geographical position. The main aim of this research work is the addition of security features to the existing OLSR protocol. In order to effectively design a secure routing protocol, we present a detailed literature survey of existing protocols, along with the various attacks. Based on the information gathered from the literature survey, a secure routing protocol for OLSR is proposed. The proposed secure routing protocol involves the addition of a digital signature as well as more advanced techniques such as the reuse of previous topology information to validate the actual link state. Thus, the main objective of this work is to provide secure routing and secure data transmission.

Construction of a Game Site by the Component Base Design (컴포넌트 기반 설계의 게임 사이트 구축)

  • Kim Chi-Su;Kim Jae-Woong
    • Journal of Internet Computing and Services
    • /
    • v.4 no.3
    • /
    • pp.23-30
    • /
    • 2003
  • A component base technology can maintain effectively and save time and expenses of development. In this thesis we found many components including the setup/execution component to construct game sites and analyzed and designed the components by the use of UML. If programmers develop the game site by using the component that distributes, setups and executes the game program by one click and other components, they can manage the game site easily, distribute the game program effectively and offer a convenient user interface. Also, by the reuse of these components, programmers can construct the game site easily and economically.

  • PDF

Technical Assessment of Component Reference Models (컴포넌트 참조 모델의 기술적 비교 평가)

  • 허진선;김수동
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.6
    • /
    • pp.697-715
    • /
    • 2004
  • Component-Based Development (CBD) is a reuse technology Providing enhancement in productivity through using the unit of component which is larger-grained than an object. However, reference model defining the elements and semantics of CBD component is standardized neither internationally nor in industrial. This yields interoperability and portability problem between CBD platforms, and presents burden of choosing appropriate model to developers. In this paper, we define meta-models for representative component reference models, and identify advantages, disadvantages, and features of each model through technical comparison of meta-models. Besides, through a proposal of essential component model containing common and essential elements that all component models must conform and a extended component model containing maximum elements and mechanisms, we can precisely assess candidate component models in practice.