• Title/Summary/Keyword: software architecture pattern

Search Result 74, Processing Time 0.025 seconds

CAD/CAM System development for Stereolitihography (광조형용 CAD/CAM 시스템 개발)

  • 홍삼열;김준안;반갑수;백인환
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1996.04a
    • /
    • pp.592-596
    • /
    • 1996
  • The CAD/CAM System oriented to StereoLithographic Rapid Prototyping was constructed and developed. The software architecture uses a 586PC running the windows NT operating system. An .STL file brought into the software program can be verified in divers view points and focused for a detail of concern. A variety of Entity was applied to define an array of triangular facets and sliced loops. The system provides Edit, Scale, Orient, Copy and Divide commands to modify .STL model. The NC codes are created according to various laser beam scan pattern and the software show the parts on the platform before they are constructed. This system is written in Visual C and has been proved as a powerful tool for producing solid parts directly from a CAD modelling, using actual applications.

  • PDF

신발소재 재단용 채산 소프트웨어 개발

  • 류영근;김행렬
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1996.10a
    • /
    • pp.145-155
    • /
    • 1996
  • This paper is to describe the development of nesting software for, the materials cutting plan of footware manufacturing processes. In shoes cutting process, almost of the materials cutting plan is dependent upon worker's experience. Thus the pattern nesting by worker's experience for materials cutting is different form the real cutting results and also different from the error size of yield in degree of worker's skill. Recently, a few of domestic shoes makers use of oversee's nesting software. But the nesting software unfits for the domestic actual circumstances, and is complex to use, and is expensive, and is not to be interfaced with the auto cutting machine. Therefore, we have developed the economic nesting systems that are easier for novice to use and fit for the domestic circumstances , which can syncronize with the development of the auto cutting machine. The system comprises interrelated modules for materials information, nesting simulation, utility . The architecture of system, the functions of each module and the information processing procedures of each function are discussed.

Design Model for Extensible Architecture of Smart Contract Vulnerability Detection Tool

  • Choi, Yun-seok;Lee, Wan Yeon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.189-195
    • /
    • 2020
  • Smart contract, one of the applications of blockchain, is expected to be used in various industries. However, there is risks of damages caused by attacks on vulnerabilities in smart contract codes. Tool support is essential to detect vulnerabilities, and as new vulnerabilities emerge and smart contract implementation languages increase, the tools must have extensibility for them. We propose a design model for extensible architecture of smart contract vulnerability detection tools that detect vulnerabilities in smart contract source codes. The proposed model is composed of design pattern-based structures that provides extensibility to easily support extension of detecting modules for new vulnerabilities and other implementation languages of smart contract. In the model, detecting modules are composed of independent module, so modifying or adding of module do not affect other modules and the system structure.

Improvement of Class Reuse at Sensor Network System Based on TinyOS Using CATL Model and Facade Pattern (CATL 모델과 Facade 패턴을 이용한 TinyOS 기반 센서네트워크 시스템 클래스 재사용 개선)

  • Baek, Jeong-Ho;Lee, Hong-Ro
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.15 no.2
    • /
    • pp.46-56
    • /
    • 2012
  • Recently, when software architecture is designed, the efficiency of reusability is emphasized. The reusability of the design can raise the quality of GIS software, and reduce the cost of maintenance. Because the object oriented GoF design pattern provides the class hierarchy that can represent repetitively, the importance is emphasized more. This method that designs the GIS software can be applied from various application systems. A multiple distributed sensor network system is composed of the complex structure that each node of the sensor network nodes has different functions and sensor nodes and server are designed by the combination of many classes. Furthermore, this sensor network system may be changed into more complex systems according to a particular purpose of software designer. This paper will design the CATL model by applying Facade pattern that can enhance the efficiency of reuse according to attributes and behaviors in classes in order to implement the complicated structure of the multiple distributed sensor network system based on TinyOS. Therefore, our object oriented GIS design pattern model will be expected to utilize efficiently for design, update, or maintenance, etc. of new systems by packing up attributes and behaviors of classes at complex sensor network systems.

Design for the Multimedia Messaging Engine for Electronic Traffic Administration Services (전자교통행정서비스를 위한 멀티미디어 메시징 엔진의 설계)

  • Kung Sang-Hwan;Koh Hyon-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.10-19
    • /
    • 2005
  • It may not be strange to anticipate that the forth-coming epoch of electronic government would bring us lots of convenience on account of ubiquitous environment with mobile devices. Such environment enables us to access the up-to-date information anytime and also a worker to carry out administration services to perform one's line of duty at anytime with electronic, handy devices such as PDA. What we now recognize from the field of electronic traffic administration services is that the office work flow as well as the public services has been remarkably improved by using of not only text but video and image information under the distributed, mobile environment. One of key requirements of this kinds of services is the feature of exchanging various information among multiple information publishers and subscribers. We call this feature Messaging Services generally The study in this paper focuses on the architecture design of the Messaging Engine software, complying with the pattern-oriented software architecture design methodology. And our contribution also goes to the discovery of three architecture patterns found in the design process and the efficient multi-threading architecture compared to one of the Messaging Engine solutions.

  • PDF

MVC Architecture-aware Restructuring of Web Apps (MVC 아키텍처 인지하는 웹 앱 재구조화)

  • Oh, Jaewon;Ahn, Woo Hyun;Kim, Taegong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2153-2166
    • /
    • 2017
  • Web apps have a problem that they cause same data to be repetitively retrieved, processed, and displayed when web browsers load different web pages. To resolve the problem, this paper presents and evaluates a new method for restructuring of Java web apps. This approach dynamically analyzes Java web apps from the MVC (Model-View-Controller) architecture point of view and identifies redundant data by using the composite view pattern. Then the input apps are restructured in order not to load the redundant data when users make requests for new pages. This restructuring generates new web apps that conform to the MVC architecture and improve the performance of input web apps. The experimental results showed that when compared to legacy web apps, the restructured apps' response time was reduced on desktop PCs and mobile devices by 38% and 55%, respectively. In addition, case studies using open-source web apps showed the applicability of the proposed approach.

A Study for deployment methodology of SOA(Service Oriented Architecture) (서비스 지향아키텍처 구축단계에 대한 연구)

  • Lee, Sang-Wan;Cho, Jae-Hoon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.30 no.4
    • /
    • pp.96-102
    • /
    • 2007
  • The most fundamental method in IT innovation up to today is the SOA which has been accepted as the standard for the system integration and makes the business more flexible. Although it is important to classify the workflow of enterprise into the unit of services, there is no systematical research on this topic yet. This paper proposes a SOA deployment methodology, which composed of 6 steps. By utilizing this methodology, an enterprise can build up the SOA applied environment easily to achieve its business objectives and to make a linkage between services and business processes more effectively and efficiently, which is proved through Analytic Hierarchy Process. It is considered that Service Oriented Architecture can be the future standard for the IT integration beyond the individual application.

제5차 ISKSE발표문-Software Develpment For TEXAC System

  • Park, Chan-Mo
    • The Science & Technology
    • /
    • v.11 no.9 s.112
    • /
    • pp.41-49
    • /
    • 1978
  • Automatic pattern recognition using computers has manu potential applications. In many cases successful automatic pattern recognition procedures require an analysis of texture of a picture by a conventional digital computer: but this involves a type af computing that is at the present time extremely time-consuming and thus very expensive. In response to this situation, TEXAC was designed and built which is capable of most whole picture operations at a rapid television rate of 1/30th of a second. The results of operations are displayed continuously on color and black-and-white television monitors. The paper presents the architecture of the TEXAC, the picture processing language developed and some of the results of TEXAC whole picture operations.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.4
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF