• Title/Summary/Keyword: 소프트웨어 품질 관리

Search Result 426, Processing Time 0.021 seconds

A Change Tracking Technique for Maintaining Consistency of Game Design Artifacts (게임 기획 산출물의 일관성 유지를 위한 변경 추적 기법)

  • Park Jae-Hyun;Yi Du-Won;Rhew Sung-Yul
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.103-110
    • /
    • 2006
  • The Game development process that the Korea Game Development Infinity researches and publishes has laid important groundwork for the game industry. However, the game design cannot guarantee a software quality because an artifact is made incorrect by a game planner's new idea and modification. In this paper theorized the system to maintain artifacts consistently that is generated in planning phase and make changed contents traceable. First, it defined an ACT graph to represent relation of between artifacts, a ACT table that traces and manages it changes and a table of artifacts change history. Also, it suggested the ACT process applying as we mentioned above. Then we worked a case study to verify the change tracking technique which is presented. In a case study, we find game designer is capable to grip and modify a change of artifacts when it occurs a change of game design artifacts. As a result of that, we can save the time and effort to maintain the consistency among game design artifacts.

Fault-Causing Process and Equipment Analysis of PCB Manufacturing Lines Using Data Mining Techniques (데이터마이닝 기법을 이용한 PCB 제조라인의 불량 혐의 공정 및 설비 분석)

  • Sim, Hyun Sik;Kim, Chang Ouk
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.2
    • /
    • pp.65-70
    • /
    • 2015
  • In the PCB(Printed Circuit Board) manufacturing industry, the yield is an important management factor because it affects the product cost and quality significantly. In real situation, it is very hard to ensure a high yield in a manufacturing shop because products called chips are made through hundreds of nano-scale manufacturing processes. Therefore, in order to improve the yield, it is necessary to analyze main fault process and equipment that cause low PCB yield. This paper proposes a systematic approach to discover fault-causing processes and equipment by using a logistic regression and a stepwise variable selection procedure. We tested our approach with lot trace records of real work-site. A lot trace record consists of the equipment sequence that the lot passed through and the number of faults for each fault type in the lot. We demonstrated that the test results reflected the real situation of a PCB manufacturing line.

A Theoretical Study on the Toyota Production System and New JIT (도요타 생산방식(TPS)과 NEW JIT에 관한 이론적 연구)

  • Lim, Jae-Hwa;Mok, Jin-Hwan
    • Korean Business Review
    • /
    • v.19 no.1
    • /
    • pp.93-114
    • /
    • 2006
  • Recently, TPS is one of the hot issues which enterprises and manufacturing related people were greatly concerned. TPS is very representative of Japanese production system. And TPS have contributed to the advance of industrial engineering. This study highlights the limitation and unsolved problems of presented TPS, through understanding the basic principles and characteristics and application process of TPS. To be continuously developing and competitive system in the future, we suggest New JIT System to complement current TPS system. New JIT is a customer oriented system. For the customer satisfied quality management, renovate business process in production, development and sales area. It has hardware and software system. Hardware system is consists of TMS, TDS, TPS. Software system is scientific SQC utilized TQM. For the advanced next generation manufacturing management system, we should develop New JIT system.

  • PDF

An Internet Multicast Routing Protocol with Region-based Tree Switching (지역망간의 트리전환을 이용하는 인터넷 멀티캐스트 라우팅 프로토콜)

  • Kim, Won-Tae;Park, Yong-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.2
    • /
    • pp.234-243
    • /
    • 2000
  • We design a modified network architecture with condsidering current Internet network model and traffic characteristics, and propose EDCBT(Enhanced Dispersed Core-based Tree) multicast routing protocol, which enhances scalabity, reliability, end-to-end delay and resource utilization EDBCT adopts bidirectional dispersed shared trees and manages both of intradomain and interdomain multicast trees for a multicast group. Each regional multicast tree is estabilshed from its core router and they are interconnected by the operation between border routers on edges of each regional network. As a result, interdomain multicast tree can be easily established. We introduce a new concept named RBTS(Region-based Tree Switching), which dramatically enhances QoS and network utilization. Finally, protocol performance and the effect of core router location are evaluated with MIL3 OPNet network simulator, in terms of end-to-end delay, packet loss and throughput.

  • PDF

A Study on the Hole-Plan system combined with 3D CAD (3차원 CAD 통합형 홀 플랜 시스템에 관한 연구)

  • Ruy, Won-Sun;Yu, Yun-Sik;Ko, Dae-Eun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.1
    • /
    • pp.1-7
    • /
    • 2012
  • It is necessary to construct the process automation system to improve the design efficiency and procure the higher design quality on the field of ship building. To construct this system, the shipbuilding companies should improve the 3D CAD/CAM system customized to the ship design and the software about design information management which could solve the conflict problem between the several related design division at the same time. The typical example is the Hole-plan process in the ship-building design. For the request of additional holes from outfitting division, the hull design division checks the compatibility conditions and reflects these holes to the hull panels if acceptable. if not, the requests are rejected and sent back to the outfitting division. These serial processes are not simple and require the tedious communication, discussion, and the complicated drawings. This article gives a basic introduction to the process of hole-plan system and proposes a strategy to automate its process.

The control method on environment in pen using artificial neural network (인공신경망을 이용한 축사 환경 제어 방안)

  • Min, J.H.;Huh, M.Y.;Park, J.Y.
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.563-566
    • /
    • 2017
  • In order to prevent livestock diseases and produce the high quality livestock products in the livestock industry, it is necessary to manage the conditions of the livestock farms in the optimal condition. Therefore, these days the research on livestock growth models that analyze the factors of the air environment, the breeding environment, and the numerical rules of livestock in vivo is being carried out to improve and manage the environment in which livestock are kept. However, conventional models of growth are not sufficient to support the decision-making to control complex environment in pen by analyzing and interpreting air environment and breeding environment in a complex way. In this paper, we propose a method to control the complex environment in pen by using artificial neural network model based on biological information, air environment, breeding environment and production information.

  • PDF

Machine Learning-based Optimal VNF Deployment Prediction (기계학습 기반 VNF 최적 배치 예측 기술연구)

  • Park, Suhyun;Kim, Hee-Gon;Hong, Jibum;Yoo, Jae-Hyung;Hong, James Won-Ki
    • KNOM Review
    • /
    • v.23 no.1
    • /
    • pp.34-42
    • /
    • 2020
  • Network Function Virtualization (NFV) environment can deal with dynamic changes in traffic status with appropriate deployment and scaling of Virtualized Network Function (VNF). However, determining and applying the optimal VNF deployment is a complicated and difficult task. In particular, it is necessary to predict the situation at a future point because it takes for the process to be applied and the deployment decision to the actual NFV environment. In this paper, we randomly generate service requests in Multiaccess Edge Computing (MEC) topology, then obtain training data for machine learning model from an Integer Linear Programming (ILP) solution. We use the simulation data to train the machine learning model which predicts the optimal VNF deployment in a predefined future point. The prediction model shows the accuracy over 90% compared to the ILP solution in a 5-minute future time point.

A Study on the Procedure for Constructing Linked Open Data of Records Information by Using Open Source Tool (오픈소스 도구를 이용한 기록정보 링크드 오픈 데이터 구축 절차 연구)

  • Ha, Seung Rok;Yim, Jin Hee;Rieh, Hae-young
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.1
    • /
    • pp.341-371
    • /
    • 2017
  • Recently, the web service environment has changed from document-centered to data-oriented focus, and the Linked Open Data (LOD) exists at the core of the new environment. Specific procedures and methods were examined to build the LOD of records information in accordance with this trend. With the service sustainability of small-scale archive in consideration, an exemplification on LOD building process by utilizing open source software was developed in this paper. To this end, a 5-step service framework for LOD construction was proposed and applied to a collection of diary records from 'Human and Memory Archive'. Proof of Concept (POC) utilizing open source softwares, Protege and Apache Jena Fuseki, was conducted according to the proposed 5 step framework. After establishing the LOD of record information by utilizing the open source software, the connection with external LOD through interlinking and SPARQL search has been successfully performed. In addition, archives' considerations for LOD construction, including improvement on the quality of content information, the role of the archivist, were suggested based on the understanding obtained through the LOD construction process of records information.

Improvement Plan of NFRDI Serial Oceanographic Observation (NSO) System for Operational Oceanographic System (운용해양시스템을 위한 한국정선해양관측시스템 발전방향)

  • Lee, Joon-Soo;Suh, Young-Sang;Go, Woo-Jin;Hwang, Jae-Dong;Youn, Seok-Hyun;Han, In-Seong;Yang, Joon-Yong;Song, Ji-Young;Park, Myung-Hee;Lee, Keun-Jong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.16 no.3
    • /
    • pp.249-258
    • /
    • 2010
  • This study seeks to improve NFRDI Serial Oceanographic observation (NSO) system which has been operated at current observation stations in the Korean Seas since 1961 and suggests the direction of NSO for practical use of Korean operational oceanographic system. For improvement, data handling by human after CTD (Conductivity-Temperature-Depth) observation on the deck, data transmission, data reception in the land station, and file storage into database need to be automated. Software development to execute QA/QC (Quality Assurance/Quality Control) of real-time oceanographic observation data and to transmit the data with conversion to appropriate format automatically will help to accomplish the automation. Inmarsat satellite telecommunication systems with which have already been equipped on board the current observation vessels can realize the real-time transmission of the data. For the near real-time data transmission, CDMA (Code Division Multiple Access) wireless telecommunication can provide efficient transmission in coastal area. Real-time QA/QC procedure after CTD observation will help to prevent errors which can be derived from various causes.

A Study on Systematic Firmware Security Analysis Method for IoT Devices (체계적인 IoT 기기의 펌웨어 보안 분석 방법에 관한 연구)

  • Kim, Yejun;Gim, Jeonghyeon;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.31-49
    • /
    • 2021
  • IoT devices refer to embedded devices that can communicate with networks. Since there are various types of IoT devices and they are widely used around us, in the event of an attack, damages such as personal information leakage can occur depending on the type of device. While the security team analyzes IoT devices, they should target firmware as well as software interfaces since IoT devices are operated by both of them. However, the problem is that it is not easy to extract and analyze firmware and that it is not easy to manage product quality at a certain level even if the same target is analyzed according to the analyst's expertise within the security team. Therefore, in this paper, we intend to establish a vulnerability analysis process for the firmware of IoT devices and present available tools for each step. Besides, we organized the process from firmware acquisition to analysis of IoT devices produced by various commercial manufacturers, and we wanted to prove their validity by applying it directly to drone analysis by various manufacturers.