• Title/Summary/Keyword: 생명 주기

Search Result 598, Processing Time 0.026 seconds

A Study on Effective Requirement Traceability Management Method in Implementation Project of Information System (정보시스템개발 프로젝트에서의 효과적인 요구사항추적 관리 방안에 관한 연구)

  • Jeong, Cheon-Su;Kim, Seung-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.115-126
    • /
    • 2012
  • It is very important to trace whether all the requirements has been reflected in the developed system. However, most existing researches apply Requirement Traceability Matrix(RTM) to the whole SDLC according to the development methodology. RTM has no practical value because it has not only too many pursuit items but also its tracking method is very complicated and the practical management in developing the information system is not accomplished nearly. Therefore, in this study, we proposed an enhanced RTM which was composed of only necessary items and allow us to manage the applied area effectively from Request for Proposal(RFP) or the proposal stage to SDLC stage then confirmed the effect through six actual applicable cases of information system development project of "K" company.

Cost-Benefit Analysis for Determination of the Time to Implement In-line Inspection(ILI) on High Pressure Urban Gas Pipelines (도시가스 고압배관의 내부검사(ILI) 이행시기 결정을 위한 비용-편익 분석)

  • Ryou, Young-Don;Kim, Young-Seob;Lee, Su-Kyung
    • Journal of the Korean Institute of Gas
    • /
    • v.15 no.1
    • /
    • pp.15-21
    • /
    • 2011
  • Cost-benefit analysis (CBA) has been performed in order to decide whether the ILI (in-line inspection) suggested as risk mitigation measure (RMM) from quantitative risk assessment is reasonably practicable. As a result of CBA, we could find out the reasonable intervals of implementation of ILI. In order to assess the benefit, value of preventing a fatality (VPF), which measures value of human life, has been used. The adequate VPF figure of high pressure urban gas pipelines for CBA used in this paper is two billion won. As a result of 2 case studies, we found that the most reasonable intervals of ILI suggested as RMM were 13 years or 15 years.

Decision of Neural Network Architecture for Software Development Effort Estimation using Prior Information (사전 정보를 이용한 소프트웨어 개발노력 추정 신경망 구조 결정)

  • 박석규;유창열;박영목
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.9
    • /
    • pp.1191-1198
    • /
    • 2001
  • An increasingly important facet of software development is the ability to estimate the associate cost and effort of development early in the development life cycle. Most of the proposed models are based upon a combination of intuition, expert judgement, and regression analysis of empirical data. Overall, the work has failed to produce any single model that can be applied with a reasonable degree of success to a variety of environments. This paper presents a neural network (NN) model that related software development effort to software size measured in function element types. The heuristic approach is applied to decide the number of hidden neurons in NN from the relationship between input-output pairs. The research describes appropriate NN modeling in the context of a case study for 24 software development projects. Also, this paper compared the NN model with a regression analysis model and found the NN model has better accuracy.

  • PDF

Human Resource Metadata Standardization for Managing Science & Technology Personnel (과학기술전문인력 관리를 위한 인력정보 메타데이터 표준화)

  • Kim Kyung-Ok;Song In-Seok;Pyo Sun-Hee;Lee Mi-Wha;Lee Jae-Jin
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.48-52
    • /
    • 2005
  • R&D Personnel information is constructed locally based on the needs of each institute and therefore is distributed over different databases. It does not support inter operability which makes it difficult to access and update that leads to the problem of ineffective usage. In this study, we have categorized the lower level information that forms the domestic S&T Personnel and defined the relationship between each type of information to suggest a standard for the data elements that guarantee the access to specific information in order to support inter operability. We have analyzed the human resource information database of domestic and foreign research institutes for the data modeling. We have also made reference to the standard metadata and database of other types that can be linked with the human resource information in designing the data elements. ISO/IEC 11179, the international standard for the metadata registry(MDR), was adopted to apply the object, attribute and expression to be described to the name of the data element.

  • PDF

Comparison and an evaluation of a component technology for a Web system development and application based on CBD (CBD 기반의 웹 시스템 개발 적응을 위한 컴포넌트 기술 비교 평가)

  • 나윤지
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.4
    • /
    • pp.59-66
    • /
    • 2002
  • As for the software development, it is complicated, and size of software is growing larger. And contraction of a software development period is required acutely because it is short a period of software life cycle. Also, it becomes harder development and a maintenance because it is short a life cycle of developed software. According to this an effort is increased in order to reduce a development cost and time as using a component to have been implemented previously in development of software. A current component technology is developing into a very fast speed and is bringing a large change into development of a Web base system in addition to existing software development method. In this paper, we were handling a related technology for Web system development of a CBD base systematically and derived an issue to apply it to development of a Web system and presented an efficient practical use method of a component technology. First of all we looked into a component technology and a CBD methodology systematically and described a component technology in Web. Also, we proposed a method to increase development and efficiency of practical use of a Web system based on a component. The this study result can decrease a development cost of a Web system and a load of maintenance management through the re-use of a code.

  • PDF

Application of Software Quality Model and Metric for Software Product Assurance for KASS Control Station (KASS 통합운영국 소프트웨어 품질 보증을 위한 소프트웨어 품질 모델 및 메트릭 적용방안)

  • Kim, Youn-sil;Lee, Eun-sung
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.1
    • /
    • pp.28-36
    • /
    • 2020
  • Korea augmentation satellite system (KASS) is the Korean satellite based augmentation system (SBAS) developed by ministry of land, infrastructure, and transport (MOLIT) since 2014. Since KASS is the safety critical system that can affect to the safety of airplane, the software of KASS is developed according to the DO178B software level induced from safety analysis. In case of KASS control station (KCS), most of the software of KCS get assigned software level E in DO178B. In that case, ECSS-Q-ST-80C category D is assigned as a software product assurance standard. In this paper, the software related standard ECSS-E-ST-40C, ECSS-Q-HB-80-04A are analyzed to satisfy ECSS-Q-ST-80C and as a result the software product assurance activities regarding software life cycle and the software quality model, metric is proposed for the product assurance of the KCS software.

An Approach to decide the location of a method using the logistic analysis (로지스틱 분석을 이용한 메소드 위치 결정 방법)

  • Jung Young A.;Park Young B,
    • The KIPS Transactions:PartD
    • /
    • v.12D no.7 s.103
    • /
    • pp.1017-1022
    • /
    • 2005
  • There are many changes in the software requirements during the whole software life cycle. These changes require modification of the software, and it is important to keep software quality and stability while we are modifying the software. Refactoring is one of the technology to keep software quality and stability during the software modification; there are many researches related to automatic refactoring. In this paper, we propose three factors for Move Method which is one of the refactoring technique. We applied binomial logistic analysis to data which were extracted from sample program by each factor. The result of this process was very close to the result of manual analysis by program experts. Furthermore, we found that these factors have major roll to determine Position of a method, and these factors can be used as a basis of finding optimal position of a method.

Service-Dependability-Case based Self-Adaptation in Service-Oriented Environment (서비스 지향 컴퓨팅 환경에서 서비스 안정성 케이스 기반 자가 적응 방법)

  • Jung, Changhee;Lee, Seok-Won
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1339-1348
    • /
    • 2015
  • In a distributed system environment based on a service-oriented architecture, separate systems collaborate to achieve the goals of the entire system by using services provided other systems. A service quality violation from using one service can cause runtime system failure in the environment. The existing self-adaptation methods follow fault tolerance mechanism that responds to a failure after a service quality violation. In other words, these methods are limited to responsive action. Therefore, a service-dependability-case based self-adaptation mechanism is necessary to preserve the dependability of the self-adaptive system. This paper demonstrates that the service-dependability-case based self-adaptation mechanism is better than QoS(quality of service)-based self-adaptation with fault tolerance to preserve the dependability of the self-adaptive system. Additionally, this paper suggests a method to present and analyze service dependability by using GSN(Goal Structuring Notation) which is the existing modeling method for the presentation of assurance cases, an action mechanism adapted using an analysis result of service-dependability-cases, a methods of leveraging the service-dependability-case based self-adaptation mechanism by following the service's life cycle, and the framework architecture including the major components and the interactions between the components in the control loop of the self-adaptation process.

An Empirical Study of Relationship between Object-oriented Metrics and Maintainability (객체지향 메트릭과 유지보수성과의 관계에 대한 실험적 연구)

  • Jung Woo-Seong;Chae Heung-Seok
    • The KIPS Transactions:PartD
    • /
    • v.13D no.2 s.105
    • /
    • pp.241-250
    • /
    • 2006
  • Software maintenance is an important and very expensive activity in software life cycle. To estimate the maintainability cost of software, many software metrics have been proposed. This paper presents the result of an experimental study to explore the relationship between maintainability and some software metrics. LCOM, RFC, DAC, and LOC are employed as metrics and time really spent for maintenance activity has been collected. In the experimental study, we have found that for some systems, the existing metrics may not be an indicator to maintenance effort, which is not consistent with our general knowledge on the relationship between them. Specifically speaking, we recognized that there should be more empirical study on the relationship between metrics and maintainability of softwares which have been developed using recent technologies such as software architecture and design pattern.

An IDE based Hierarchical Node Authentication Protocol for Secure Data Transmission in WSN Environment (WSN 환경에서 안전한 데이터 전달을 위한 IDE 기반의 계층적 노드인증 프로토콜)

  • Cho, Young-Bok;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3B
    • /
    • pp.149-157
    • /
    • 2012
  • In WSN environment, the sensor nodes collect sensed data, and transmit data to the BS. BS is difficult to trust the data from unauthenticated nodes. Therefore, many papers have been proposed about the node authentication and the safety of data. In the AM-E paper, data is delivered after node authentication. In this time, the sensor nodes are directly communicated to BS the AREQ/AREP message for authentication. Therefore, the sensor nodes consume more energy for authentication. Also, noes communicate directly with the BS for authentication will have problem due to the limited energy of nodes. In this paper, the same security with AM-E is supported, Furthermore, to minimize the energy consumption, IDE based hierarchical node authentication protocol is proposed. Compared with AM-E, the number of alive nodes is increased about 39%. Thus, the entire network life time is extended and energy efficiency is improved.