• Title/Summary/Keyword: information-oriented society

Search Result 2,815, Processing Time 0.035 seconds

A Study on Date Modeling for Object - Oriented Database Design (객체지향 데이터베이스 설계를 위한 데이터 모델링에 관한 연구)

  • Park, Won-Ok
    • Asia pacific journal of information systems
    • /
    • v.2 no.2
    • /
    • pp.103-120
    • /
    • 1992
  • Object-Oriented method is a rather difficult one, theories are different as many as they are, and can hardly be found well-applied examples of OOD. So, this paper deal with the history, the needs, the benefits, basic concept of object-oriented design methods, especially the designing procedure which covers from analyzing the requirements, designing the EER(extended entity relationship) model, transforming this model into relational schema, to OODB schema step. Major contributions can be identified; First, the proposed method will ensure that it improve the productivity, increase the software quality, and elevate the maintainability. Second, it provide the framework of how object-oriented schema is constructed for OODB design. Third, suggested realistic case study will enhance the better understanding of how the current business process will be applied to the OODB design step.

  • PDF

Ultra Low Power Data Aggregation for Request Oriented Sensor Networks

  • Hwang, Kwang-Il;Jang, In
    • Journal of Information Processing Systems
    • /
    • v.10 no.3
    • /
    • pp.412-428
    • /
    • 2014
  • Request oriented sensor networks have stricter requirements than conventional event-driven or periodic report models. Therefore, in this paper we propose a minimum energy data aggregation (MEDA), which meets the requirements for request oriented sensor networks by exploiting a low power real-time scheduler, on-demand time synchronization, variable response frame structure, and adaptive retransmission. In addition we introduce a test bed consisting of a number of MEDA prototypes, which support near real-time bidirectional sensor networks. The experimental results also demonstrate that the MEDA guarantees deterministic aggregation time, enables minimum energy operation, and provides a reliable data aggregation service.

Coupling Measures for Classes in Object-Oriented System (객체 지향 시스템에서의 클래스 결합도 척도)

  • 이종석;천은홍
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.6 no.4
    • /
    • pp.22-29
    • /
    • 2001
  • As the importance of software measurement increases, there are more researches developing the new software measure. Given the importance of object-oriented development techniques, one specific area where this has occurred is coupling measurement in object-oriented systems. This thesis presents the coupling measure COM based on the methods and OOC based on the classes in measuring the coupling of object-oriented systems. And, it evaluates them using the coupling properties suggested by Briand while it compares them with other coupling measures by applying them to a system developed in the language of C++programming language.

  • PDF

FORE: A Form-Driven Object-Oriented Reverse Engineering Methodology (업무 양식에 근거한 객체 지향 역공학 방법론)

  • Yoo, Cheon-Soo;Lee, Hee-Seok
    • Asia pacific journal of information systems
    • /
    • v.9 no.1
    • /
    • pp.115-142
    • /
    • 1999
  • Legacy applications are valuable assets that should be integrated into next generation business systems. To gain this advantage, progressive companies can reverse engineer the legacy business operations. This paper presents a form-driven object-oriented reverse engineering(FORE) methodology by the use of business forms to recover semantics of legacy applications. They retain the user-oriented contents of business and thus are easily understandable. Our form driven object-oriented reverse engineering methodology consists of five phases: form and usage analysis, form object slicing, object structure modeling, scenario design, and model integration. Knowledge about form structure and user interaction with legacy applications is used to capture the design semantics. An object model, which consists of an object structure model and scenario results from such form knowledge. The resulting object model is more likely to help reverse engineers understand and reuse legacy systems.

  • PDF

A Study on User-Oriented Library Management (이용자지향적 도서관경영에 관한 연구)

  • Chung, Hi-Sun
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.22 no.1
    • /
    • pp.193-210
    • /
    • 2011
  • In this era all successful organizations, whether profit or nonprofit, accept marketing concept as management philosophy and try to maximize consumer satisfaction in order to achieve their own goals. Libraries are no exception. A consumer decision process model is borrowed to explain how library service users act through five stages. Armed with information about library users, library management can be more user-oriented and bring higher user satisfaction. Some measures for effective library management are suggested.

Visual Object-Oriented Database Design Support System(VODS) (시각적 객체 지향 데이타베이스 설계 지원 시스템에 관한 연구)

  • Ryu, Si-Guk;Gang, Hyeon-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.4
    • /
    • pp.745-756
    • /
    • 1996
  • In this paper, the design and implementation of VODS is described. VODS is an object-oriented database de-sign support system. VODS supports the whole database design steps according to the EOMT(extended OMT). EOMT as an object- oriented database design methodology is deviced by extending the object model of OMT(Object Modeling Technique) for supporting information navigations to manipulate hyperemia objects. Database designers can do the whole design steps by clicking mouse buttons on the appropriate icons or commands from the initial screen mode.

  • PDF

Modeling for SOA Based Business Process Generation and Testing (SOA 기반의 비즈니스 프로세스 생성 및 테스팅을 위한 모델링)

  • Lee, Sang Young
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.167-175
    • /
    • 2012
  • Service-oriented Architecture(SOA) is one of the most recent trends in IT solutions. SOA is a paradigm for organizing and utilizing distributed capabilities that may be under the control of different ownership domains and implemented using various technology stacks. From a technical perspective SOA, can be considered a method for designing and developing IT systems where applications are constructed from loosely coupled and autonomous building blocks. And SOA is a very effective response to the problems faced by companies in terms of reusability, interoperability and reduce coupling between systems that implement their information systems. To exploit these advantages many organizations have decided to evolve their legacy systems towards this architecture. This paper proposes a modeling for SOA based business process generation and testing, and introduces its implementation in the BPEL. And we analyze business process between enterprises, modeling the service-oriented business process with BPEL to realization level. Also, we suggests that UML is used from high-level business problems to the process of low-level problem for Visual and effectively.

Accessibility to Instances Regardless of Versions in Schema Evolution Environments in Object-Oriented Databases (객체지향 데이터베이스의 스키마진화 환경에서 버전에 무관한 인스턴스 접근)

  • Jin, Min
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.553-561
    • /
    • 1999
  • The facility of schema evolution is necessary in object-oriented database applications. There exist several versions of schema and instances created under different versions of the schema concurrently in the database. This base proposes a mechanism for supporting accessing instances regardless of versions of the schema in schema evolution environments in object oriented databases. There is trade-off between the flexibility of schema modification operations and the system overhead for supporting such schema modifications. Access handling routines are provided to the undefined attributes in each version of the class. Access handling routines are also defined for each pair of semantics rather than defining backdate/update functions for each pair of versions of a class. Thus, this mechanism supports the change of semantics with reduced user and system overhead.

  • PDF

Modeling for Measurement of Class Reusability in Object-Oriented Programs (객체 지향 프로그램에서 클래스 재사용성 측정 모델링)

  • Yun, Hui-Hwan;Gu, Yeon-Seol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.580-588
    • /
    • 1999
  • The reuse of software components from existing software system enhances productivity and reliability, decreases the cost of production in software development. The extraction of software components with high reusability from existing software system is very important in software reuse. The reuse of a class is classified into white-box reuse to reuse with modification and black-box reuse to reuse without modification. A class has the property of procedural language and object-oriented language. Therefore, it must measure reusability in consideration of two properties. In black-box reuse, independence of class is important quality. It can quantify through information hiding, coupling between objects, cohesion, etc. In white-box reuse, modification is the best important quality. It can quality through class complexity, coupling, cohesion, documentation, etc. We propose a new model for measurement of class reusability and the measure criteria in object-oriented program. A class that is measured by proposed model can judge whether the reuse with modification has the advantage or the reuse without modification has the advantage.

  • PDF

Survey of Return-Oriented Programming(ROP) Detection and Prevention Methods (Return-Oriented Programming(ROP) 탐지 및 방지 기술 분석)

  • Bae, Hyo-Bin;Min, Jae-Won;Park, Min-Woo;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1064-1067
    • /
    • 2012
  • Return-Oriented Programming(ROP) 공격은 버퍼 오버플로우 공격, Return-into libc 공격의 계보를 이어 소프트웨어의 취약점을 공격하는 대표적인 기술 중 하나이다. 이 공격은 윈도우 운영체제 상에서의 Exploitation, iOS DEP 우회 및 코드 사이닝과 같은 기술을 무력화하기 위해 사용되고 있는 취약점 공격법이다. 그렇기 때문에 ROP 공격이 소개된 이후부터 현재까지 탐지법 및 방어법에 대한 논의가 활발하게 이루어지고 있다. 본 논문에서는 이러한 ROP 공격을 막기 위한 방법들을 특징에 따라 세 가지 종류로 분류하여 소개하고, 각각의 방법들의 장점과 단점을 비교 분석하여 향후 ROP 방어에 관한 연구에 기여를 하고자 한다.