• Title/Summary/Keyword: 소프트웨어 프로세스 수준과 성과

Search Result 78, Processing Time 0.027 seconds

Feature Model Specification Method in Product-Line Development (프로덕트 라인 개발에서 피쳐 모델의 명세화 기법)

  • 송재승;김민성;박수용
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.11
    • /
    • pp.1001-1014
    • /
    • 2003
  • In a feature modeling, problems such as ambiguities, interpretation errors, incompleteness, etc caused by informal specification occur in the modeling phase. Therefore, feature specification method and processes are suggested in this paper to resolve these problems. The structure and language of feature modeling is defined in this paper to specify various features. First, this feature model is abstracted in the meta-level to get predicates and attributes. Formal feature model specification method is proposed using multi-paradigm language. Second, Feature specification process is proposed to describe how to specify feature formally. And third, Feature interaction management is defined to solve the problems caused between specified features. Finally, the proposed feature specification method is applied to Distributed Meeting Scheduler System domain.

소아의 음성장애 및 치료 : 사례연구

  • 정옥란
    • Journal of the Korean Society of Laryngology, Phoniatrics and Logopedics
    • /
    • v.7 no.1
    • /
    • pp.128-131
    • /
    • 1996
  • 소아들의 음성장애의 대부분은 음성과 기능에 의한 성대의 오용 및 남용으로부터 기인한다. 그러나 음성장애에 대한 인식의 부족으로 인하여 소아의 음성장애 발견율은 극히 낮은 수준에 머므르고 있다. 치료에 있어서도 행동의 통제가 그다지 쉽지 않기 때문에 많은 어려움이 따른다. 본 연구는 소아의 음성장애의 발생경위와 문제의 설명과 차팅에 의한 남용의 감소에 초점을 둔 치료사례이다. 5세 아동의 심한 음성장애로 의뢰되어졌다. 음성증후는 목쉰소리, 기식화된 소리, 일시적인 발성일탈(phonation break) 등이 두드러졌다. 이비인후과 전문의의 스트로보스코프(stroboscope) 검진결과 초기 양측성 성대결절이 성대 앞쪽으로부터 1/3 지점에서 발견되었으며 비지피치(Visi-Pitch)로 측정된 퍼터베이션(perturbation 수치가 16.8이었다. 사례사 조사 과정에서 아동이 활동적이며 자주 고함을 지르고 자동차놀이를 주로하며 많은 시간을 보낸다는 것이 밝혀졌다. 중재 프로그램은 우선 문제를 설명하고 인식시키는 것과 고함을 지르거나 자동차놀이를 하면서 자동차 소음을 흉내내는 등의 음성남용 회수를 감소시키는 것에 초점을 두었다 17회의 치료로 성대결절이 감소되었고 퍼터베이션은 3.8로 저하되었으며 아동 스스로 음성남용을 통제할 수 있다는 임상적 판단하에 치료를 종결하였다. 1개월 후 추후 검사에서 남용적인 습관이 여전히 나타나지 않았으며 음성상태도 양호하였다. 소아 음성장애의 치료는 소아가 이해할 수 있는 용어로 문제의 인식을 확실히 시키고 행동을 체계적으로 통제할 수 있는 치료프로그램을 실행시키는 임상가의 자질이 대단히 중요하다. 그러나 그에 못지 않게, 많은 시간을 아동과 함께 보내는 부모나 교사의 협력이 치료의 성패를 좌우할 수 있다.조구와 처리구간에 차이가 없었다. 그러나 유지방 함량의 경우 대조구가 3.22%, 처리구가 3.37%로 처리구가 0.15% point 증가했으나 유의차는 없었다. Fan + sprinkler가 설치된 시설에서 사육된 젖소에서 생산된 우유내 체세포수는 대조구에 비해 26.63%가 감소되었으나 유의차는 발견할 수 없었다. 이상의 시험 결과에서 볼 때 fan + sprinkler를 이용한 방서 방법은 고온 stress를 완화시켜 유생산성의 증가에 기여할 수 있는 하나의 방법이라고 본다.을 알 수가 있었다.없다. 본 논문의 대상은 바로 이러한 합성 동사성명사의 논항구조와 동사성명사에 의해 하위범주화된 논항들의 문법적 실현양상이다..그 결과 심리적 특성과 사용자 수용 특성은 아바타 수용도에 부분적으로 영향을 미친다는 것 결과가 나타났다.웨어 프로세스 평가와 개선 모델의 개발을 위한 기초적인 자료를 제공할 것으로 예상된다 또한, 본 연구 결과는, 우리나라 소프트웨어 조직들이 실제로 무엇을 필요로 하는지를 밝힘으로써, 우리나라의 소프트웨어 산업을 육성하기 위한 실효성 있는 정책 입안을 위한 기초 자료를 제공할 것으로 예상된다.다.를 검증하려고 한다. 협력체계 확립, ${\circled}3$ 전문인력 확보 및 인력구성 조정, 그리고 ${\circled}4$ 방문보건사업의 강화 등이다., 대사(代謝)와 관계(關係)있음을 시사(示唆)해 주고 있다.ble nutrient (TDN) was highest in booting stage (59.7%); however no significant difference was found among other stages. The concentrations of Ca and P were not

  • PDF

A Study on Systematic Firmware Security Analysis Method for IoT Devices (체계적인 IoT 기기의 펌웨어 보안 분석 방법에 관한 연구)

  • Kim, Yejun;Gim, Jeonghyeon;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.31-49
    • /
    • 2021
  • IoT devices refer to embedded devices that can communicate with networks. Since there are various types of IoT devices and they are widely used around us, in the event of an attack, damages such as personal information leakage can occur depending on the type of device. While the security team analyzes IoT devices, they should target firmware as well as software interfaces since IoT devices are operated by both of them. However, the problem is that it is not easy to extract and analyze firmware and that it is not easy to manage product quality at a certain level even if the same target is analyzed according to the analyst's expertise within the security team. Therefore, in this paper, we intend to establish a vulnerability analysis process for the firmware of IoT devices and present available tools for each step. Besides, we organized the process from firmware acquisition to analysis of IoT devices produced by various commercial manufacturers, and we wanted to prove their validity by applying it directly to drone analysis by various manufacturers.

Service Identification of Component-Based System for Service-Oriented Architecture (서비스 지향 아키텍처를 위한 컴포넌트기반 시스템의 서비스 식별)

  • Lee, Hyeon-Joo;Choi, Byoung-Ju;Lee, Jung-Won
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.2
    • /
    • pp.70-80
    • /
    • 2008
  • Today, businesses have to respond with flexibility and speed to ever-changing customer demand and market opportunities. Service-oriented architecture (SOA) is the best methodology for minimizing the complexity and the cost of enterprise-level infrastructure and for maximizing the productivity and the flexibility of an enterprise. Most of the enterprise-level SOA delivery strategies deal with the top-down approach, which organization has to define the business processes, to model business services, and to find the required services or to develop new services. However, a lot of peoples want to maximally reuse legacy component-based systems as well as to deliver SOA into their organizations. In this paper, we propose a bottom-up approach for identifying business services with proper granularity. It can improve the reusability and maintenance of services by considering not data I/O of components of legacy applications but GUI event patterns. Our proposed method is applied to MIS with 129 GUIs and 13 components. As a result, the valiance of the coupling value of components is increased five times and three business services are distinctly exposed. It also provides a 49% improvement in reducing the relationship problems between services over a service identification method using only partitioning information of components.

Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development (무기 시스템 개발에서 기술보호를 위한 위험관리 기반의 Anti-Tampering 적용 기법)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.99-109
    • /
    • 2018
  • Tampering involves illegally removing technologies from a protected system through reverse engineering or developing a system without proper authorization. As tampering of a weapon system is a threat to national security, anti-tampering measures are required. Precedent studies on anti-tampering have discussed the necessity, related trends, application cases, and recent cybersecurity-based or other protection methods. In a domestic situation, the Defense Technology Protection Act focuses on how to prevent technology leakage occurring in related organizations through personnel, facilities and information systems. Anti-tampering design needs to determine which technologies are protected while considering the effects of development cost and schedule. The objective of our study is to develop methods of how to select target technologies and determine counter-measures to protect these technologies. Specifically, an evaluation matrix was derived based on the risk analysis concept to select the protection of target technologies. Also, based on the concept of risk mitigation, the classification of anti-tampering techniques was performed according to its applicability and determination of application levels. Results of the case study revealed that the methods proposed can be systematically applied for anti-tampering in weapon system development.

Microarchitectural Defense and Recovery Against Buffer Overflow Attacks (버퍼 오버플로우 공격에 대한 마이크로구조적 방어 및 복구 기법)

  • Choi, Lynn;Shin, Yong;Lee, Sang-Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.3
    • /
    • pp.178-192
    • /
    • 2006
  • The buffer overflow attack is the single most dominant and lethal form of security exploits as evidenced by recent worm outbreaks such as Code Red and SQL Stammer. In this paper, we propose microarchitectural techniques that can detect and recover from such malicious code attacks. The idea is that the buffer overflow attacks usually exhibit abnormal behaviors in the system. This kind of unusual signs can be easily detected by checking the safety of memory references at runtime, avoiding the potential data or control corruptions made by such attacks. Both the hardware cost and the performance penalty of enforcing the safety guards are negligible. In addition, we propose a more aggressive technique called corruption recovery buffer (CRB), which can further increase the level of security. Combined with the safety guards, the CRB can be used to save suspicious writes made by an attack and can restore the original architecture state before the attack. By performing detailed execution-driven simulations on the programs selected from SPEC CPU2000 benchmark, we evaluate the effectiveness of the proposed microarchitectural techniques. Experimental data shows that enforcing a single safety guard can reduce the number of system failures substantially by protecting the stack against return address corruptions made by the attacks. Furthermore, a small 1KB CRB can nullify additional data corruptions made by stack smashing attacks with only less than 2% performance penalty.

An Event-Driven Dynamic Monitor for Efficient Service Monitoring (효율적인 서비스 모니터링을 위한 이벤트 주도 동적 모니터)

  • Kum, Deuk-Kyu;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.12
    • /
    • pp.892-908
    • /
    • 2010
  • Services in SOA are typically perceived as black-box to service consumers, and can be dynamically evolved at runtime, and run on a number of unknown and heterogeneous environments. Because of these characteristics of the services, effective and efficient monitoring of various aspects on services is an essential functionality for autonomous management of service. But the problem with or limitation in conventional or existing approaches is, that they focus on services themselves, ignoring the effects by business processes. Consequently, there is a room for service monitoring which provides more useful information of business level by acquisition of only external monitoring data that depend on specific BPEL engine and middleware. Moreover, there is a strong demand to present effective methods to reduce monitoring overhead which can degrade quality of services. EDA can cope with such limitations in SOA by collecting and analyzing events efficiently. In this paper, we first describe EDA benefits in service monitoring, and classify monitorring target, and present an appropriate monitoring method for each monitoring target. Also to provide the applicability of our approach, an event meta-model is defined, and event processing model and architecture based on the meta-model are proposed. And, with the proposed architecture and method, we implement a prototype of an event-driven dynamic monitoring framework which can collect and process internal and external data at runtime. Finally, we present the result of a case study to demonstrate the effectiveness and applicability of the proposed approach.

Current status and future of insect smart factory farm using ICT technology (ICT기술을 활용한 곤충스마트팩토리팜의 현황과 미래)

  • Seok, Young-Seek
    • Food Science and Industry
    • /
    • v.55 no.2
    • /
    • pp.188-202
    • /
    • 2022
  • In the insect industry, as the scope of application of insects is expanded from pet insects and natural enemies to feed, edible and medicinal insects, the demand for quality control of insect raw materials is increasing, and interest in securing the safety of insect products is increasing. In the process of expanding the industrial scale, controlling the temperature and humidity and air quality in the insect breeding room and preventing the spread of pathogens and other pollutants are important success factors. It requires a controlled environment under the operating system. European commercial insect breeding facilities have attracted considerable investor interest, and insect companies are building large-scale production facilities, which became possible after the EU approved the use of insect protein as feedstock for fish farming in July 2017. Other fields, such as food and medicine, have also accelerated the application of cutting-edge technology. In the future, the global insect industry will purchase eggs or small larvae from suppliers and a system that focuses on the larval fattening, i.e., production raw material, until the insects mature, and a system that handles the entire production process from egg laying, harvesting, and initial pre-treatment of larvae., increasingly subdivided into large-scale production systems that cover all stages of insect larvae production and further processing steps such as milling, fat removal and protein or fat fractionation. In Korea, research and development of insect smart factory farms using artificial intelligence and ICT is accelerating, so insects can be used as carbon-free materials in secondary industries such as natural plastics or natural molding materials as well as existing feed and food. A Korean-style customized breeding system for shortening the breeding period or enhancing functionality is expected to be developed soon.