• Title/Summary/Keyword: programming languages

Search Result 326, Processing Time 0.021 seconds

A study on implementation of software development environment for SDL (통신 프로토콜 명세 언어 SDL을 위한 소프트웨어 개발 환경 구현)

  • Choe, Yeong-Han;Kim, Seong-Un
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.6
    • /
    • pp.1522-1533
    • /
    • 1996
  • This paper presents a programming environment for the edition and verification of specification language SDL. It is implemented in the Concerto software factory, which has been as a support for the development of real size software. Concerto is a software factory designed for application development in the fields of computer communication protocols or real time system. It offers various kinds of tools to produce software, organize this production and automate it. Concerto allows a smooth integration of various formalism such as the C and $C^{++}$, languages, structured documentation, HOOD methodology (Hierarchical Object Orient Design). In this paper, as an important tools in the process of communication protocol software development, we describe fist describe the principles of this environment, then we illustrate its application by means of a simple example, the Inres protocol. Moreover, we study how hypertext mechanism of Concert to create logical links between a protocol and its asscoiated service.

  • PDF

A Study of Development of Diagnostic System for Web Application Vulnerabilities focused on Injection Flaws (Injection Flaws를 중심으로 한 웹 애플리케이션 취약점 진단시스템 개발)

  • Kim, Jeom-Goo;Noh, Si-Choon;Lee, Do-Hyeon
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.99-106
    • /
    • 2012
  • Today, the typical web hacking attacks are cross-site scripting(XSS) attacks, injection vulnerabilities, malicious file execution and insecure direct object reference included. Web hacking security systems, access control solutions, access only to the web service and flow inside but do not control the packet. So you have been illegally modified to pass the packet even if the packet is considered as a unnormal packet. The defense system is to fail to appropriate controls. Therefore, in order to ensure a successful web services diagnostic system development is necessary. Web application diagnostic system is real and urgent need and alternative. The diagnostic system development process mu st be carried out step of established diagnostic systems, diagnostic scoping web system vulnerabilities, web application, analysis, security vulnerability assessment and selecting items. And diagnostic system as required by the web system environment using tools, programming languages, interfaces, parameters must be set.

Engine Sound Design for Electric Vehicle by using Software Synthesizer (소프트웨어 신디사이저를 이용한 전기자동차 엔진 사운드 디자인)

  • Bae, June;Kim, Jangyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1547-1552
    • /
    • 2017
  • Unlike diesel locomotives, electric vehicles have various issues because they have very quiet engine sound. For example, pedestrians are exposed to the dangerous electric vehicles on the road because they can not recognize the electric vehicles' sound. Moreover, the driver is unable to recognize how fast driver's car is driving at a certain speed. To solve these problems, electric cars' sound needs to be artificially implemented and played. This paper examines the problems of the previous sampling engine sound approach. In this paper, instead of using sampling sounds, we developed a novel synthesizer algorithm via programming languages as a software. In experimental results, we demonstrated and verified our proposed synthesizer's approach is superior to the previous sampling approach. In addition, through these synthesizer's approach, we highly expect the proposed synthesizer's approach will give safety, convenience and comfort to the electric vehicles' users.

A Study of Knowledge and Skills Required for Web Developers (웹 개발자에게 요구되는 지식과 스킬에 대한 연구)

  • Lee, Choong Kwon;Lee, Hong-Hee;Yoo, Sang Jin
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.3
    • /
    • pp.57-66
    • /
    • 2013
  • Many researchers have investigated and studied on the knowledge and skills required for IT workforce, such as programmers, systems analysts, and IT managers. The results of these studies helped us not only to understand the changes of IT trends and to prepare IT workers for their future careers. But, the web developer, which is a newly evolving job title, has little been studied. This research is intended to look into the knowledge and skills for web developers by collecting and analyzing the job advertisements posted the commercial job boards in the Internet. The specific technical requirements for Web developers are programming languages knowledge/skills such as Java and JSP, database, and Internet/Web. Knowledge/skills for general development and knowledge on information technology are required in System section. The results of this research is expected to help us understand the knowledge and skills related to web development.

Container-based Cluster Management System for User-driven Distributed Computing (사용자 맞춤형 분산 컴퓨팅을 위한 컨테이너 기반 클러스터 관리 시스템)

  • Park, Ju-Won;Hahm, Jaegyoon
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.9
    • /
    • pp.587-595
    • /
    • 2015
  • Several fields of science have traditionally demanded large-scale workflow support, which requires thousands of central processing unit (CPU) cores. In order to support such large-scale scientific workflows, large-capacity cluster systems such as supercomputers are widely used. However, as users require a diversity of software packages and configurations, a system administrator has some trouble in making a service environment in real time. In this paper, we present a container-based cluster management platform and introduce an implementation case to minimize performance reduction and dynamically provide a distributed computing environment desired by users. This paper offers the following contributions. First, a container-based virtualization technology is assimilated with a resource and job management system to expand applicability to support large-scale scientific workflows. Second, an implementation case in which docker and HTCondor are interlocked is introduced. Lastly, docker and native performance comparison results using two widely known benchmark tools and Monte-Carlo simulation implemented using various programming languages are presented.

A Performance Evaluation of Circuit Minimization Algorithms for Mentorship Education of Informatics Gifted Secondary Students (중등 정보과학 영재 사사 교육을 위한 회로 최소화 알고리즘 성능 평가)

  • Lee, Hyung-Bong;Kwon, Ki-Hyeon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.12
    • /
    • pp.391-398
    • /
    • 2015
  • This paper devises a performance improvement and evaluation process of circuit minimization algorithms for mentorship education of distinguished informatics gifted secondary students. In the process, students learn that there are several alternative equivalent circuits for a target function and recognize the necessity for formalized circuit minimization methods. Firstly, they come at the concept of circuit minimization principle from Karnaugh Map which is a manual methodology. Secondly, they explore Quine-McCluskey algorithm which is a computational methodology. Quine-McCluskey algorithm's time complexity is high because it uses set operations. To improve the performance of Quine-McCluskey algorithm, we encourage them to adopt a bit-wise data structure instead of integer array for sets. They will eventually see that the performance achievement is about 36%. The ultimate goal of the process is to enlarge gifted students' interest and integrated knowledge about computer science encompassing electronic switches, logic gates, logic circuits, programming languages, data structures and algorithms.

Method and Application of Searching Hot Spot For Reengineering Software Using AOP (AOP를 이용한 재공학에서의 핫 스팟 탐색과 응용)

  • Lee, Ei-Sung;Choi, Eun-Man
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.83-92
    • /
    • 2009
  • Complicated business logic makes program complexity more complicated. It's inevitable that the program must undergo reengineering processes all the way of in its lifetime. Hot spot analysis that has diverse purposes is getting an important question more and more. As a rule, reengineering process is done by UML model-based approach to analyze the legacy system. The smallest fragment of targets to be analysed is unit, that is function or class. Today's software development is to deal with huge change of software product and huge class including heavy quantity of LOC(Lines Of Code). However, analysis of unit is not precise approach process for reliable reengineering consequence. In this paper, we propose very precise hot spot analysis approach using Aspect-Oriented Programming languages, such as AspectJ. Typically the consistency between UML and source is needed code to redefine the modified library or framework boundaries. But reengineering approach using AOP doesn't need to analyze UML and source code. This approach makes dynamic event log data that contains detailed program interaction information. This dynamic event log data makes it possible to analyze hot spot.

A Study on IoT information Generation Tool for User Defined Web Services (사용자 정의 웹 서비스를 위한 IoT 정보 자동생성 도구에 관한 연구)

  • Sim, Sungho
    • Journal of Digital Convergence
    • /
    • v.16 no.11
    • /
    • pp.329-334
    • /
    • 2018
  • Web services are standardized software technologies that enable interoperability of operating systems and programming languages through networks and related standards. Web services are distributed computing services that provide and discover services making it possible to access various services. Since the search method of web service considers only the functional aspect, it has a limitation on user-oriented search when selecting a service. In order to solve these problems, this study proposes an automatic IoT information generation tool, and provides IoT extension information when searching a web service, thereby improving the problem so that a suitable service can be selected for a user. Automatic IoT extension information generation tool proposed in this study collects and stores various information generated in the process of sensing, networking, and information processing by collaborating autonomously in a distributed environment of user, object, and service. The proposed method supports the service search suitable for the user by providing the information generated by the user as extended information when searching the web service. The proposed method can be applied to the 4th industry sector to provide a customized service that meets various environment requirements.

Digital Competencies Required for Information Science Specialists at Saudi Universities

  • Yamani, Hanaa;AlHarthi, Ahmed;Elsigini, Waleed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.212-220
    • /
    • 2021
  • The objectives of this research were to identify the digital competencies required for information science specialists at Saudi universities and to examine whether there existed conspicuous differences in the standpoint of these specialists due to years of work experience with regard to the importance of these competencies. A descriptive analytical method was used to accomplish these objectives while extracting the required digital competency list and ascertaining its importance. The research sample comprised 24 experts in the field of information science from several universities in the Kingdom of Saudi Arabia. The participants in the sample were asked to complete a questionnaire prepared to acquire the pertinent data in the period between January 5, 2021 and January 20, 2021. The results reveal that the digital competencies required for information science specialists at Saudi universities encompass general features such as the ability to use computer, Internet, Web2, Web3, and smartphone applications, digital learning resource development, data processing (big data) and its sharing via the Internet, system analysis, dealing with multiple electronic indexing applications and learning management systems and its features, using electronic bibliographic control tools, artificial intelligence tools, cybersecurity system maintenance, ability to comprehend and use different programming languages, simulation, and augmented reality applications, and knowledge and skills for 3D printing. Furthermore, no statistically significant differences were observed between the mean ranks of scores of specialists with less than 10 years of practical experience and those with practical experience of 10 years or more with regard to conferring importance to digital competencies.

Development of a Forensic Analyzing Tool based on Cluster Information of HFS+ filesystem

  • Cho, Gyu-Sang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.178-192
    • /
    • 2021
  • File system forensics typically focus on the contents or timestamps of a file, and it is common to work around file/directory centers. But to recover a deleted file on the disk or use a carving technique to find and connect partial missing content, the evidence must be analyzed using cluster-centered analysis. Forensics tools such as EnCase, TSK, and X-ways, provide a basic ability to get information about disk clusters, but these are not the core functions of the tools. Alternatively, Sysinternals' DiskView tool provides a more intuitive visualization function, which makes it easier to obtain information around disk clusters. In addition, most current tools are for Windows. There are very few forensic analysis tools for MacOS, and furthermore, cluster analysis tools are very rare. In this paper, we developed a tool named FACT (Forensic Analyzer based Cluster Information Tool) for analyzing the state of clusters in a HFS+ file system, for digital forensics. The FACT consists of three features, a Cluster based analysis, B-tree based analysis, and Directory based analysis. The Cluster based analysis is the main feature, and was basically developed for cluster analysis. The FACT tool's cluster visualization feature plays a central role. The FACT tool was programmed in two programming languages, C/C++ and Python. The core part for analyzing the HFS+ filesystem was programmed in C/C++ and the visualization part is implemented using the Python Tkinter library. The features in this study will evolve into key forensics tools for use in MacOS, and by providing additional GUI capabilities can be very important for cluster-centric forensics analysis.