• Title/Summary/Keyword: legacy

Search Result 1,022, Processing Time 0.031 seconds

A Study on the Recognition of University Students and Parents about Legacy Preferences (기여입학제의 찬반에 대한 대학생과 학부모의 인식 분석)

  • Kim, Dal-Hyo
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.25 no.3
    • /
    • pp.632-642
    • /
    • 2013
  • Legacy preferences has become the key issue of educational policy. The purpose of this study was to investigate the recognition of university students and parents about legacy preferences. The questionnaire which was made by researcher of this study was used as the method of this study. As a sampling, university students 360 and parents 312 were sampled. And SPSSWIN 20.0 was used as the method of data analysis. As a conclusion, this study indicates as follows. First, the ratio of disagreement of legacy preferences was higher than the ratio of agreement of legacy preferences. But higher-income class parents were tended to agree with legacy preferences. Second, many university students and parents regarded 'economic advantages for tuition payments and a scholarship', 'excellences for education by helping financial deficit of university' as agreement reasons of legacy preferences. And many university students and parents regarded 'reproduction of social class', 'promotion of one's sense of values of mammonism' as disagreement reasons of legacy preferences.

Extension of Legacy Gear Design Systems Using XML and XSLT in a Distributed Design Environment (분산 설계 환경 하에서 XML과 XSLT를 이용한 레거시 기어 설계 시스템의 확장)

  • 정태형;박승현
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.11 no.4
    • /
    • pp.19-25
    • /
    • 2002
  • As computer-related technologies have been developed, legacy design systems have not been appropriate far new computing environment. It is necessary that most of them are either modified or newly developed. However, these activities require quite much amount of cost and time. This paper presents a method of extending legacy design systems to the internet without any modification using XML and XSLT. We have been extended legacy systems in the two viewpoints. First, an XML document has been defined to present the input information of a legacy system which is executed on the consol environment - MS DOS, for example. Also, an XSLT document has been generated to transform an XML document to the input document of the legacy system An XML document is transformed to the input document by XSLT processor according to the transformation rules defined in the XSLT document. This technique to generate input documents is independent to the platform type and facilitates to link legacy systems to other systems. Second, a legacy system controller has been made to control a legacy system and developed a web service to extend it and its controller. The legacy system controller operates it automatically. The web service provides its functions to other systems via internet. We have applied the developed methodologies to the legacy gear design system 조ich calculates AGMA gear rating md made AGMA gem rating web service.

A Balance of Primary and Secondary Values: Exploring a Digital Legacy

  • Cushing, Amber L.
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.3 no.2
    • /
    • pp.67-94
    • /
    • 2013
  • This exploratory research explores the concept of a digital legacy as a general concept and as a collection of digital possessions with unique characteristics. The results reported in this article are part of a larger study. In Cushing (2013), the author identified the characteristics of a digital possession. In this study, these characteristics of a digital possession were utilized to explore how the characteristics of several digital possessions could form a collection, or a digital legacy. In addition to being explored as a collection of digital possessions, data was collected about the general concept of a digital legacy. In part I of the study, 23 participants from three age groups were interviewed about their general concept of a digital legacy. Five general characteristics describing a digital legacy were identified. In part II of the study, interview data from Cushing (2013) was used to create statements describing digital possessions. The statements were classified utilizing the archival concept of primary and secondary values, as well as the consumer behavior concepts of self extension to possessions and possession attachment. Primary value refers to the purpose for which the item was created, while secondary value refers to an additional value that the participants can perceive the item to hold, such as a perception that an item can represent one's identity. Using standard Q method procedure, 48 participants were directed to rank their agreement with 60 statements (written on cards), along a distribution of -5 to +5, according to the characteristics of the digital possession they would most like to maintain for a digital legacy. The ranked statements were analyzed using Q factor analysis, in order to perceive the most common statements associated with maintaining digital possessions for a digital legacy. Q method results suggested that most individuals described the digital possessions they wanted to maintain for a digital legacy using various combinations of characteristics associated with primary and secondary values. This suggests that while some participants will respond to personal archiving based on the concept of preserving identity (a perceived secondary value), this will not appeal to everyone. Information professional could consider this difference in appeal when marketing personal archiving assistance to patrons.

Real-time Virtual Integration of heterogeneous system and Union Query System

  • Min, Seong-Hyeon;Lee, Sang-Joon;Kwak, Ho-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.107-114
    • /
    • 2016
  • In this paper, we propose the building method for the unified IoT service platform between the variety of legacy systems with the heterogeneous structures and the operating environments. To accommodate the structural diversity of legacy systems, we develop a virtual integrated structure and interface abstracting method. By this, the new platform can use the data sources of the legacy systems as if the data source is in the new platform. In a manner without modification of the legacy systems with performing minimum tasks, we proposes a model that can be integrated without affecting the availabilities of the legacy systems.

Legacy Migration Development Methodology for Construction of Web environment system (웹 환경 시스템 구축을 위한 레거시 마이그레이션 개발방법론)

  • Lee, Jun-Woong;Yang, Hae-Sool
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1428-1442
    • /
    • 2007
  • Nowadays, as IT environment is changing rapidly, traditional infra system such as hardware, software, and development methodology are changing as well. Legacy system has been filled with Intellectual property such as invested budget and development period for the time of IT is developing. Many countries around the world are having troubles with how to manage the legacy system. It is time to study on a development method and the implementation of supporting tool to reuse or process the legacy system. In this paper, it proves the definition, concept and also background of legacy system by showing real market and technology trend. Developed to handle the concrete development methodology, procedure and reference. We can get more profitability and productivity advance by reuse of legacy system and maintenance cost-saving through legacy migration.

  • PDF

Design and Implementation of Tool Constructing Migration of Legacy System (레거시시스템의 마이그레이션을 위한 지원도구의 설계 및 구현)

  • Yang, Hae-Seung;Park, Pyung-Hyung;Yang, Hae-Sool
    • The KIPS Transactions:PartD
    • /
    • v.14D no.7
    • /
    • pp.763-772
    • /
    • 2007
  • Due to increased software development cost, interest about the method and automated tool for reusing legacy system have been running high. Therefore, In this study, it proves the definition, concept and also background of legacy system by showing real market and technology trend. Automation tool is designed and developed to handle the concrete development methodology, procedure and reference. Also, we implemented the process that analyze the legacy system and extract, refine, store and reuse the candidate components by using LM(Legacy to Modern System) supporting tool presented in this paper. If LM supporting tool is applied to legacy system migration, we can expect cutting costs, shortening the developing period and succeeding the intellectual property by software re-engineering.

A Study on Nuclear Legacy Site Management according to International Management Guidance (국제 관리 지침에 따른 레거시 부지 관리에 대한 연구)

  • Chang, Sunyoung
    • Journal of the Korean Society of Radiology
    • /
    • v.16 no.2
    • /
    • pp.185-194
    • /
    • 2022
  • The decommission of nuclear legacy sites, which have been contaminated by previous activities such as uranium mining & milling as well as nuclear tests, has started to gain global attention. Within the Korean peninsula, Republic of Korea(ROK)has had experience in dismantling research reactors. For the Democratic People's Republic of Korea(DPRK), the possibility of nuclear activities being implemented and operations records being managed without consideration of the latest nuclear safety regulations are high. Hence, the chances of DPRK's sites remaining as nuclear legacy is also high. This study investigates approaches and considerations that needs to be taken in account in the event of a nuclear legacy site occurrence, reviewing its international cases for the solution of the legacy sites. The regulation, process of optimization, and stakeholder engagement for a nuclear legacy site should be considered in such an event. Developing legacy site response plans can be used to prevent future legacy site occurrences.

Extension of legacy gear design systems using XML and XSLT (XML과 XSLT를 이용한 레거시 기어 설계 시스템의 확장에 관한 연구)

  • 정태형;박승현
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2001.10a
    • /
    • pp.257-262
    • /
    • 2001
  • As computer-related technologies have been developed, legacy design systems have not been appropriate for new computing environment. Therefore, it is necessary that most of them are either modified or newly developed. However, this requires quite much amount of cost and time. This paper presents a method of extending legacy design system without modification using XML and XSLT. In order to apply the developed method, a good example of legacy design systems, AGMA gear rating system has been extended so as to be suitable for the distributed computing environment. An XML document for AGMA gear rating process is defined. It is transformed to the form of the input document of AGMA gear rating system by XSLT processor according to the transformation rules defined in the AGMA gear rating XSLT document. After that, AGMA gear rating system reads this input document and generates an output document in the server. These operations are automatically executed by the external legacy system controller without user interactions. Using these operations, AGMA gear rating web service has been developed based on SOAP and WSDL to provide the functions of legacy AGMA gear rating system through the distributed network. Any system or user can implement AGMA gear rating process independently to the platform type, without making it for oneself, by simply referring the AGMA gear rating web service via Internet.

  • PDF

A Methodology for Translation of Operating System Calls in Legacy Real-time Software to Ada (Legacy 실시간 소프트웨어의 운영체제 호출을 Ada로 번역하기 위한 방법론)

  • Lee, Moon-Kun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2874-2890
    • /
    • 1997
  • This paper describes a methodology for translation of concurrent software expressed in operating system (OS) calls to Ada. Concurrency is expressed in some legacy software by OS calls that perform concurrent process/task control. Examples considered in this paper are calls in programs in C to Unix and calls in programs in CMS-2 to the Executive Service Routines of ATES or SDEX-20 other software re/reverse engineering research has focused on translating the OS calls in a legacy software to calls to another OS. In this approach, the understanding of software has required knowledge of the underlying OS, which is usually very complicated and informally documented. The research in this paper has focused on translating the OS calls in a legacy software into the equivalent protocols using the Ada facilities. In translation to Ada, these calls are represented by Ada equivalent code that follow the scheme of a message-based kernel oriented architecture. To facilitate translation, it utilizes templates placed in library for data structures, tasks, procedures, and messages. This methodology is a new approach to modeling OS in Ada in software re/reverse engineering. There is no need of knowledge of the underlying OS for software understanding in this approach, since the dependency on the OS in the legacy software is removed. It is portable and interoperable on Ada run-time environments. This approach can handle the OS calls in different legacy software systems.

  • PDF

XML Gateway Design and Implementation for Legacy Databases (Legacy 데이터베이스를 위한 XML Gateway 설계 및 구현)

  • 김정희;김휴찬;곽호영
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.5
    • /
    • pp.623-630
    • /
    • 2002
  • Method of designing and implementing the XML Gateway is proposed for supporting the data movement between the Legacy databases. XML technologies, Oracle XML Utility, and JDeveloper are used for this purpose. The data in Legacy database are extracted by XSQL pages, parsed, transformed by XSL, and finally saved by XMLHttprequest object of XSQL servlet. With the help of the implemented system, an assigned operator does not have to handle the database with the SQL*Plus tools. In addition, the data movement is easily carried out by using the familiar Web interface offered by system.

  • PDF