• Title/Summary/Keyword: 요구사항추적

Search Result 195, Processing Time 0.026 seconds

A Study on the Systems Engineering based Verification of a Systems Engineering Application Model for a LRT Project (경량전철사업 시스템엔지니어링 전산모델 검증에 관한 연구)

  • Han, Seok-Youn;Kim, Joo-Uk;Choi, Myung-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.425-433
    • /
    • 2016
  • The construction of a light rail transit (LRT) system is a large and complex infrastructure project involving hundreds of billions of won in construction costs for a single route, and it is very important to carry out such a project from a life-cycle perspective because of its long-term operation. Systems engineering is a means and methodology to successfully implement customers' needs, and it is useful in large projects such as light rail transit. An application model called Systems Engineering for Light Rail Transit (SELRT) was developed to support systems engineering activities in light rail transit projects. In order to utilize SELRT, it is necessary to ensure that system requirements are met. As such, in this paper, we present a verification procedure and architecture based on a systems engineering-based methodology, thereby identifying the system requirements and deriving the verification requirements to confirm the SELRT model for the proposed method. The results show that the traceability of the system requirements and verification requirements, the verification method for each requirement, and the demonstration results for computerized tools are mutually connected, and that the initial requirements are clearly implemented in the SELRT. The proposed method is valid for verifying the SELRT, which can also be utilized in a LRT project.

A Study on Design Pattern Applied Message Monitoring System for Open Source Software based ESB (Enterprise Service Bus) (오픈 소스 기반 ESB의 패턴 적용 메시지 모니터링 시스템 구축 사례)

  • Lee, Sung-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.1290-1293
    • /
    • 2012
  • 오픈 소스 기반 ESB 모니터링 시스템 설계에 EIP(Enterprise Integration Pattern)을 적용하여 비즈니스 요구사항을 처리하는 통합 로직과 메시지 추적 관리를 위한 관리 로직을 분리하여, 메시지 관리 로직 처리에 따른 성능 저하 및 오류에 의한 영향도를 최소화하며 메시지 데이터를 중앙 저장 장치에 저장하여 메시지 추적 관리를 용이한 모니터링 시스템 구축 사례.

Verification Methods for the Implementation of Non-functional Requirements in Web-based Learning Systems (웹 기반 학습 시스템의 비기능 요구에 대한 구현 검증 기법 연구)

  • Seo, Dongsu;Lee, Heyli
    • The Journal of Korean Association of Computer Education
    • /
    • v.9 no.4
    • /
    • pp.43-54
    • /
    • 2006
  • In general, user requirements in web-based learning systems are divided into functional and non-functional requirements. Developers are responsible for the verification of quality related requirements, which is known to be difficult to perform. This paper suggests a verification method that can be applied in the area where the conformance of implementation for non-functional requirements is required. The paper performs tests for non-functional requirements by using the information extracted from quality related features that have imposed constraints on design activities.

  • PDF

Efficient Management of FA-50 Development Requirements Through Traceability Implementation (FA-50 개발요구도의 효율적 관리를 위한 추적성 구현)

  • Kim, Do Hyun;Kim, Seong Jun;Ahn, Sang Seok;Lee, Kang Hoon;Jang, Min Young
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.6 no.2
    • /
    • pp.7-14
    • /
    • 2010
  • Systematic and efficient Management of Development requirements will lead to success of project such as aircraft system development consisting of complex subsystem. For such reason, Requirements management tools have been used in most of project. In the case of FA-50 development project, requirements management tools have been used for systematic and efficient management of FA-50 Requirements. Especially FA-50 system was designed on the basis of the TA-50 configuration. Therefore, it needs traceability of requirements about functions, which have been already developed and will be newly developed. This paper was described about the implementation method of FA-50 development requirements traceability management.

  • PDF

Development of a Server-independent System to Identify and Communicate Fire Information and Location Tracking of Evacuees (화재정보 확인과 대피자 위치추적을 위한 서버 독립형 시스템 개발)

  • Lee, Chijoo;Lee, Taekwan
    • Journal of the Korea Institute of Building Construction
    • /
    • v.21 no.6
    • /
    • pp.677-687
    • /
    • 2021
  • If a fire breaks out in a building, occupants can evacuate more rapidly if they are able to identify the location of the fire, the exits, and themselves. This study derives the requirements of system development, such as distance non-limitation, a non-additional device, a non-centralized server system, and low power for an emergency, to identify information about the fire and the location of evacuees. The objective is to receive and transmit information and reduce the time and effort of the database for location tracking. Accordingly, this study develops a server-independent system that collects information related to a building fire and an evacuee's location and provides information to the evacuee on their mobile device. The system is composed of a transmitting unit to disseminate fire location information and a mobile device application to determine the locations of the fire and the evacuee. The developed system can contribute to reducing the damage to humans because evacuees can identify the location of the fire, exits, and themselves regardless of the impaired server system by fire, the interruption of power source, and the evacuee's location. Furthermore, this study proposes a theoretical basis for reducing the effort required for database construction of the k-nearest neighbor fingerprint.

Technical Trends of the Cyber Targeted Attack Traceback-Connection Chain & Traceback (사이버 표적공격 역추적기술 동향 -연결체인 및 역추적)

  • Kim, J.T.;Kim, I.K.;Kang, K.H.
    • Electronics and Telecommunications Trends
    • /
    • v.30 no.4
    • /
    • pp.120-128
    • /
    • 2015
  • 최근 인터넷의 거대화와 더불어 기본적으로 ISP의 오버헤드를 최소화하는 요구사항을 만족시켜 줄 수 있는 역추적기술 보장에 큰 비중을 두고 있으며, 현재 또는 차세대 인터넷에서 적용 가능한 역추적기술이 필요하다. 본 논문은 사이버 표적공격(Advanced Persistent Threats: APT)에 적용 가능한 역추적(Traceback)기술에 대한 동향을 살펴본다. 특히 기존 IP 및 TCP Connection 기반 역추적방법 중 Network 기반 Connection 추적기술인 Timing-based Approach에 대해서 상세히 살펴보며 아울러 본 논문에서 제안하는 Netflow 기반의 ON-OFF 모델 확장을 통한 Timing-based Connection Traceback Approach의 기술적 적용을 통하여 공격 시스템의 위치와 실제 해킹을 시도하는 해커의 위치가 서로 다르다 하더라도 실제 해커의 위치인 공격 근원지를 추적할 수 있는 기술적 가능성 및 전망을 소개한다.

  • PDF

Guidelines for Applying Traceability in RUP (Rational Unified Process(RUP)의 추적성 적용 지침)

  • 소동섭;김수동
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.583-585
    • /
    • 2001
  • RUP의 Unified Process Model 에는 Use-Case Model, Analysis Model, Design Model, Deployment Model, Implementation Model, Test Model의 6가지 모델이 있다. 이 모델들은 모두 일관성이 있다. 한 모델에서 나오는 요소들은 전, 후 단계에서 다른 모델들과 Trace Dependencies를 갖는다. 예를 들면, Use-Case Model에서는 한 Use Case는 Design Model에서 Use-Case Realization으로 Test Model에서는 Test Case로 Trace Dependencies를 갖는다. 소프트웨어 개발에서 추적성은 Understandability와 Change Propagation 과 같은 이유로 매우 중요하다. 그러나 RUP에서는 각 모델들간의 추적성에 대한 지침이 충분히 제시되어 있지 않아, 개발 과정중에 요구사항의 변경이나 에러 수정 또는 향후 관리 시에 어려움을 겪고 있다. 본 논문에서는 이 점에 중점을 두고 RUP에서 제시하고 있는 모델들 간의 추적성 중 설계모델에서 분석모델로의 추적성 적용지침을 제시한다.

  • PDF

대함 유도탄 방어의 현재와 미래(3)

  • Kim, Gyeong-Gi
    • Defense and Technology
    • /
    • no.2 s.168
    • /
    • pp.26-35
    • /
    • 1993
  • 대함유도탄을 요격하기 위해서는 운동 성능이 뛰어나며 속도가 빠른 유도탄을 단시간에 발사할수 있어야 합니다. 이러한 요구 사항에 의거, 사정 거리는 비록 짧으나 대함유도탄과 같은 소형의 유도탄을 추적 및 격파할수 있는 유도탄이 필요하게 되어 단거리 지대공유도탄이 출현하여 점방어를 담당하게 되었습니다. 단거리 지대공유도탄은 경량, 소형인 유도탄으로부터 대형의 유도탄들로 형태면에서 천태만상이며, 대함유도탄의 위협이 각국 해군에 어떻게 투명되었는가를 엿볼수 있습니다

  • PDF

Technical Trends of the Cyber Attack Traceback (사이버공격 역추적기술 동향)

  • Kim, J.T.;Han, M.H.;Lee, J.H.;Kim, J.H.;Kim, I.K.
    • Electronics and Telecommunications Trends
    • /
    • v.29 no.1
    • /
    • pp.93-103
    • /
    • 2014
  • 본 논문은 인터넷을 통해 급격히 확산되고 있는 해킹, 바이러스 및 DDoS(Distributed Denial-of-Service) 공격과 같은 사이버 보안 공격(Cyber Security Attack) 등이 발생하였을 경우 각 공격에 효과적으로 대비하기 위한 방향 및 그 방법을 제시하기 위해서 실제적인 공격 근원지 정보 역추적을 위하여 관련 추적 기술의 의미, 세부기술 분류, 관련 연구 및 동향 등을 통하여 기존 역추적기술의 제약사항을 극복하고 현재 또는 차세대 인터넷에서 적용가능한 역추적기술에 대한 요구사항 및 향후 전망을 기술하였다.

  • PDF

Offline Object Tracking for Private Information Masking in CCTV Data (CCTV 개인영상 정보보호를 위한 오프라인 객체추적)

  • Lee, Suk-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2961-2967
    • /
    • 2014
  • Nowadays, a private protection act has come into effect which demands for the protection of personal image information obtained by the CCTV. According to this act, the object out of interest has to be mosaicked such that it can not be identified before the image is sent to the investigation office. Meanwhile, the demand for digital videos obtained by CCTV is also increasing for digital forensic. Therefore, due to the two conflicting demands, the demand for a solution which can automatically mask an object in the CCTV video is increasing and related IT industry is expected to grow. The core technology in developing a target masking solution is the object tracking technique. In this paper, we propose an object tracking technique which suits for the application of CCTV video object masking as a postprocess. The proposed method simultaneously uses the motion and the color information to produce a stable tracking result. Furthermore, the proposed method is based on the centroid shifting method, which is a fast color based tracking method, and thus the overall tracking becomes fast.