• Title/Summary/Keyword: 요구사항추적

Search Result 195, Processing Time 0.037 seconds

Development of Simulated signal generator for Small Millimeter-wave Tracking Radar (소형 밀리미터파 추적 레이다용 모의신호 발생장치 개발)

  • Kim, Hong-Rak;Park, Seung-Wook;Woo, Seon-Keol;Kim, Youn-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.157-163
    • /
    • 2019
  • A small millimeter-wave tracking radar is a pulse radar that searches, detects, and tracks a target in real time through a TWS (Track While Scan) method on a sea-going traps target with a large RCS running at low speed. This paper describes the development of a simulated signal generator to verify the performance of a small millimeter wave tracking radar in laboratory anechoic chamber environment. We describe a GUI program for testing and performance analysis in conjunction with hardware configuration and tracking radar, and verified the simulated signal generator implemented through performance test.

A Study on the DB establishment and traceable management of the Urban transit standardization project (도시철도 표준화사업의 데이터베이스 구축 및 추적성 관리에 관한 연구)

  • Lee, Woo-Dong;Chung, Jong-Duck
    • Journal of the Korean Society for Railway
    • /
    • v.14 no.6
    • /
    • pp.501-506
    • /
    • 2011
  • The study and techniques of system engineering have been applied to various fields including space-air, national defense division in advanced countries. Korea is currently in the early stages of introducing system engineering scheme in railway system and national defense division restrictedly. As theory and application of system engineering covers a wide scope, documents management and requirement analysis technology applied to establishment of standard and core unit development of the research target. The techniques which are historical management and trace among standards for establishment of standard are introduced using SE tools and participating agencies shared the information by constructing of database from all documents which are generated from the project. Through the functional analysis of the requirements for the intelligent station monitoring system in basic design stage, established requirements are verified and will be made official announcement as standard of the intelligent station monitoring system.

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

A study of the functional requirements to management tool for software development projects (소프트웨어 개발 프로젝트를 위한 요구관리도구의 기능요건 연구)

  • Park, Koo-Rack
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.113-120
    • /
    • 2011
  • Information system gradually increases the complexity and scale of the project, while if the project fails to occur. To analyze the causes of failure of the project a lack of understanding of your project, unclear requirements and requirements change, etc. of the software development life cycle from requirements analysis phase is to find the source of most. In this paper, a software development project needs analysis derived from the traceability between features and functionality, and development needs throughout the life cycle requirements during the ongoing change management tool was designed to allow. And among those related to the project through consultation with a sufficient consensus to build a common understanding of effective communication will discuss the features required to support.

Analysis of Radar Performance Requirements for VTS System Based on IALA Guidelines (IALA 가이드라인에 기반한 VTS 시스템을 위한 레이더 성능 요구사항 분석)

  • Kim, Byung-Doo;Lee, Byung-Gil
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.10a
    • /
    • pp.27-29
    • /
    • 2015
  • Based on IALA guidelines, the fundamental requirements of radar system for vessel traffic services are analyzed in this paper. target separation, target position accuracy, target track accuracy of X-band radar and recommended test conditions are analyzed. Also, in order to check if it satisfies the requirement of target position accuracy from IALA guideline, the test is carried out through processing of radar raw image acquired at VTS center.

  • PDF

Fair Tracing based on VSS and Blind Signature (VSS와 은닉서명에 기반한 공정한 추적 방식)

  • 김병곤;김광조
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.53-56
    • /
    • 2003
  • 전자현금에 대한 암호학적 요구사항 중의 하나가 추적성이다. 전자 현금에 대한 무조건적인 익명성은 돈 세탁, 협박등의 완전범죄가 가능하게 하며, 반대로 익명성이 보장되지 않는다면 전자현금 사용에 따른 사생활 보호 문제가 대두되게 된다. 이를 해결하고자 등장한 것이 합법적인 추적성을 보장하는 공정한 추적 방식이며, 본 논문에서는 제3의 신뢰기관, 은닉서명, VSS(verifiable secre sharing)을 결합한 새로운 공정한 추적방식을 제안한다.

  • PDF

Practical Software Architecture Design Methods for Non-Conventional Quality Requirements (비전형적인 품질 요구사항을 고려한 실용적 소프트웨어 아키텍처 설계 기법)

  • La, Hyun Jung;Kim, Soo Dong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.8
    • /
    • pp.391-400
    • /
    • 2017
  • Software architecture plays a key role in satisfying non-functional requirement (NFR), i.e. quality requirements and constraints. Architecture design methods and tactics for conventional NFR are largely available in literatures. However, the methods for the target system-specific non-conventional NFRs are not readily available; rather architects should invent the design methods from their experiences and intuitions. Hence, the hardship to design architectures for non-conventional NFRs is quite high. In this paper, we provide a systematic architecture design methodology for non-conventional NFRs. We provide a five-step process, and detailed instructions for the steps. In the process, we treat the traceability among artifacts and seamlessness as essential values for supporting effective architecture design. We apply the methodology on designing architectures for a platform software system. We believe that the proposed methodology can be effectively utilized in designing high quality architectures for non-conventional NFRs.

Information Security Activity(Analysis Phase) (정보보호 활동 (분석단계))

  • Shin, Seong-Yoon;Lee, Hyun-Chang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.203-204
    • /
    • 2017
  • SDLC 중에서 분석단계는 정보시스템의 개발을 준비하는 단계로서 정보기술 체계의 분석과 사용자의 요구 사항 도출 및 예측되는 위험 요소에 대한 평가도 함께 수행하였다. 정보보호의 요구사항은 도출은 기밀성, 무결성, 가용성, 그리고 책임 추적성 등의 관점에서 하였다.

  • PDF

Design and Implementation of a Scenario Composition Supporting Tool for Object-Oriented Integration Testing Using the Requirement Trace Table (요구사항 추적테이블을 이용한 객체지향 통합 테스트 시나리오 작성지원 도구의 설계 및 구현)

  • Choe, Sin-Hyeong;Han, Pan-Am
    • The KIPS Transactions:PartD
    • /
    • v.9D no.4
    • /
    • pp.651-658
    • /
    • 2002
  • This paper suggests the scenario composition supporting method, which can be used to perform integration test based on specification, and implemented a scenario composition supporting tool. To compose scenario for object-oriented integration testing, requirement specification, Process definition table and program to table relation diagram are used. In addition, requirement trace table is created. It can check user's requirements, quickly and exactly, dividing former three fables into the stages of requirement analysis, design, and test. The output of scenario composition supporting tool plays a guide part in composing scenario. This tool can reduce scenario composition effort of quality for the checking team and prevent an omission of requirement and input of errors during the test.

한국천문연구원 궤도 전파 및 추정 소프트웨어 개발 현황

  • Jo, Jung-Hyeon;Choe, Jin;Kim, Jae-Hyeok
    • Bulletin of the Korean Space Science Society
    • /
    • 2011.04a
    • /
    • pp.24.1-24.1
    • /
    • 2011
  • 2006년도부터 개발을 시작한 한국천문연구원 궤도 전파 및 추정(KASI Orbit Propagator and Estimator: KASIOPEA)소프트웨어는 다양한 과제와 연관되어 개발을 추진했다. 초기 이 소프트웨어는 GNSS 자료처리를 염두에 두고 개발을 시작하였으나, 현재 한국천문연구원 우주측지연구그룹에서 추진하는 GNSS 자료처리와 별도로 한국천문연구원에서 1986년도부터 개발을 시작한 우주물체 궤도 추적, 전파 및 추정을 새로운 개발 목표로 재추진하게 되었다. 이 소프트웨어의 개발 요구사항은 광학감시 체계의 운영을 전제로 하고 있어 전파 및 레이저 위성 추적 시스템과 별도로 정의되어 있다, 이 요구사항 분석이 완료되면 이 소프트웨어의 최종 성능에 대한 예비 결정이 이뤄질 것으로 사료된다.

  • PDF