• Title/Summary/Keyword: computer software program

Search Result 807, Processing Time 0.028 seconds

A Study on the Development of a Computer-Assisted Program for Elementary School Foodservice(I)-Based on Foodservice Management- (초등학교 급식운영을 위한 컴퓨터 프로그램 개발에 관한 연구(I)-급식관리를 중심으로-)

  • 허은실;이경혜;이경화
    • Korean Journal of Community Nutrition
    • /
    • v.5 no.2
    • /
    • pp.208-216
    • /
    • 2000
  • This study is a part of a software program which was developed for efficient foodservice management of elementary school foodservice. The foodservice management system consists of general information, manu planning, inventory management, and printing of results. Advantages of software programs developed in this study, compared with previous elementary school foodservice programs are as follows. 1) This program can be used to foodservice and nutrition management at the same time. 2) The screen is designed as a homepage for convenience. 3) This program is useful in cycle menu planning. 4) Seasonal menu could be reflected in menu. 5) This program has the results printing function. 6) Data can be revisable. 7) This program can be used to middle and high school.

  • PDF

An Implementation of the Host-based DBMS Simulator for Developing Switching System Software (교환기 소프트웨어 개발을 위한 호스트 기반 데이터베이스 시뮬레이터의 구현)

  • Park, Young-Ho;Lee, Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.231-239
    • /
    • 2006
  • For such large-scale software as for operating a switching system, the use of real-time databases is essential for data exchanges among various functions and their data processing. Under the environment of developing the DBMS software for a switching system, the application program including database manipulations is first developed on a host computer and then the developed program is loaded into a switching system for its tests. To make it possible for DBMS manipulation software to be developed on a host computer rather than a switching system itself, we developed a host-based DBMS simulation system(HDBMS). In this paper we presented the roles and functions of HDBMS, its system structure, and the technical details for implementing HDBMS.

  • PDF

Design and Implementation of Safety Verification System for Application Software (응용 소프트웨어 안전성 검증 시스템 설계 및 구현)

  • Soh, Woo-Young
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.191-197
    • /
    • 2008
  • A safe computer environment is necessarily required for computer users, because of a damage is widely increased by a malicious software such as the warm, virus and trojan horse. A general vaccine program can detect after the malicious software intruded. This kinds of the vaccine program show good result against a malicious code which is well known, however, there is no function in the vaccine or not enough ability to detect an application software which a malicious code included. So, this paper proposes an application verification system to decide existence and nonexistence of a malicious code in the application software. The proposed application verification system with a mechanism that grasps the flow type of malicious code, can make a reduction of a damage for computer users before the application software executed.

  • PDF

Dictionary Based Software Watermarking Technique (사전 소프트웨어 워터마크 기술 기반)

  • Pervez, Zeeshan;Lee, Sungyoung;Lee, Young-Koo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.241-242
    • /
    • 2009
  • As software is becoming increasing important to the human society, so does the effort to produce them is also increasing.. All of these efforts can be at risk when source code of the application is reverse engineered by the software pirate. Many attempts have been made to protect Intellectual Property Rights (IPR); one of the newest attempts to protect IPR is software watermarking. It is used to prove ownership right when IPR are violated, and also prevents the bandit from altering the code for his own use. In this paper we are presenting a new technique for software watermarking know as Dictionary Based Software Watermarking (DBSW). DBSW works by embedding dummy instructions in source code with the help of predefined mapping already available in the dictionary. These instructions are identical to the normal instructions of the program and are hard to identify or to extract from the watermarked program. With the help of DBSW we not only can stop source code alteration but can also identify the buyer how has distributed the pirated copy.

A Design Method of the Simulation Program for HILS (HILS를 위한 시뮬레이션 프로그램 설계 기법)

  • Park, Haerhee;Jeon, In-Soo;Song, Chang-Joon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.4
    • /
    • pp.435-440
    • /
    • 2013
  • In this paper, a design method of the simulation program for HILS(Hardware-In-the-Loop Simulation) system is proposed. The present method consists of definition of requirements for HILS, development of specifications, and implementation of the program to satisfy the specifications. In the implementation of the program, the application of hardware interface and the concept of structural modularization are proposed to satisfy the specifications. The concepts of CSCI(Computer Software Configuration Item) and encapsulation are used for structural modularization. The proposed method was practically applied to the development of the simulation program for the efficient operation in HILS of an anti-ship missile system.

A Study on the Object-Orient Program Slicing (객체지향 프로그램 슬라이싱에 관한 연구)

  • Bang, Geuk-In;Park, Young-Ok;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.461-465
    • /
    • 2002
  • When general software system wants to need continuous Dept of Software Engineering by discovery of specification imperative sentence in some program, programmer analyzes program through practice orbit chase of program about value of input data. This paper that see therefore applies object intention program Slicing to existent program Slicing method, and express practice orbit of program in object intention subordination graph and show process that become Slicing. Proposed algorithm defenses crab extension is possible and can be used advantageously in case program is developed gradually as well as.

  • PDF

The Development of Computer Integrated Safety Diagnosis System for Press Process (PRESS 공정의 컴퓨터 통합 안전 진단시스템 구축에 관한 연구)

  • 강경식;나승훈;김태호
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.18 no.36
    • /
    • pp.175-182
    • /
    • 1995
  • Industrial safety management program can be divided three part that is education, technology, and management. The effectiveness of a industrial safety management program depends on the ability to manage hardware which is technology and software, education and management, In this research, it will be described that how to design and develop Computer Integrated Safety System and Computer Based Training System for Press operations which is how to integrated industrial safety program wi th production planning and control in order to control efficiently using personnel computer system.

  • PDF

Class Slicing Method using Program Dependency Graph in C++ (C++에서 프로그램 의존도 그래프를 이용한 클래스 분해 방법)

  • 김영선;김홍진;손용식
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.1
    • /
    • pp.63-80
    • /
    • 1998
  • In object-oriented software development, reuse has been studied for the enhancement of software quality and software developer's productivity. But improper modeling in design phase and uncontrolled change during maintenance activities have a problem to reuse a class. In this paper we analyze a semantic cohesion of classes using C++ Program dependency graph, and slice a class with cohesion, so that this method supports the re-estimate of class quality and the extensibility of class. Therefore this proposed method in this paper increases the easibility of the restructuring in the reusable systems, when the developer selects a requested component for a object-oriented program development.

  • PDF

A Comparative Study on the Legal Protection for Computer Software Trade

  • Seo, Jung-Doo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.17
    • /
    • pp.227-250
    • /
    • 2002
  • This paper is to explore the direction of international software protection laws, either copyright or patent right, by examining the current situations in the United States, European countries, Asia including Korea and the WTO/TRIPs Agreement. According to the comparative legal systems, each court and office gives both copyrightability and patentability of software by a stronger and appropriate intellectual property protection system.

  • PDF

Comment on the Copyrightability of Font-files as Computer Program (글자체파일의 컴퓨터프로그램저작물성 판단에 대한 비판)

  • Jeong, Jin-Keun
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.17-24
    • /
    • 2019
  • Use without permission of font files is a social problem. In the meantime, our court recognized font files as computer programs. Is the font file a computer program? This recognition arises from the inability to distinguish between computer programs and data. Expert recognition, on the other hand, does not recognize font files as computer programs. In this regard, there was a case in 2014 that INI files were not computer programs, but only data files. So, the attitude of the Supreme Court in 2001 only makes it difficult to distinguish between computer programs and data. The Supreme Court's decision needs to be changed. In addition, a new legal system should be in place to protect font files.