• Title/Summary/Keyword: 절차모델

Search Result 1,251, Processing Time 0.024 seconds

무기체계의 체계적인 S/W 개발비용 산정 발전방안(4)

  • Kim, Hwa-Su
    • Defense and Technology
    • /
    • no.8 s.282
    • /
    • pp.46-55
    • /
    • 2002
  • 지난 7월호에서는 COCOMO 모델, 기능점수모델, PRICE-S모델, 일반 COSDES 모델 등의 무기체계 S/W 개발비용 산정모델들을 조사 및 분석하여 제시하였다. 이번 8월호에서는 무기체계 소프트웨어 개발비용산저에 영향을 미치는 요소를 기존의 '한소협' 모델, PRICE-S 모델, 기능점수 모델, COCOMO 모델 등 여러 소프트웨어 개발비용 산정모델을 참고 후 무기체계의 특성을 고려하여 식별하였다. 또한 식별된 요소들을 '한소협' 모델의 절차와 방법에 따라 무기체계 소프트웨어의 스텝 수 산정 영향요소, 환경요인 보정계수 영향요소, 제경비 및 기술료 산정 영향요소들을 식별하여 제시하였다.

  • PDF

가속모델 개발방법 소개

  • Jeong, Dong-Su
    • Journal of the KSME
    • /
    • v.49 no.12
    • /
    • pp.32-35
    • /
    • 2009
  • 가속시험은 사용조건보다 가혹한 시험조건을 사용하여 짧은 시간에 제품의 수명을 평가한다. 이 글에서는 가속시험에 활용되는 가속모델에 대한 개발절차와 유효성 검증방법을 간단하게 소개하고자 한다.

  • PDF

Realistic Rendering of Woven Surface using Procedural Bump Mapping (절차적 범프 매핑을 이용한 직물표면의 사실적 렌더링)

  • Kang, Young-Min
    • Journal of Korea Game Society
    • /
    • v.10 no.3
    • /
    • pp.103-111
    • /
    • 2010
  • In this paper, an procedural approach to photorealistic rendering of woven fabric material is proposed. Previously proposed procedural approaches to fabric rendering have the disadvantage that the rendering result is not sufficiently realistic. In order to enhance the realism, researchers employed example-based approaches. However, those methods have serious disadvantage that they require huge amount of storage for the various reflectance properties of diverse materials. The proposed method can express the reflectance on weft and warp yarns by alternating the anisotropic reflectance on yarns. In addition, we propose the proposed method procedurally models the bumpy yarn structure of woven fabric to obtain plausible rendering results. The proposed method can efficiently reproduce realistic virtual fabric without any reflectance data sets.

Modeling Scheme for Calculating Encounter Probability Versus Minefleld Density (지뢰지대 밀도별 접촉확률 산정 모델링 방안)

  • Baek, Doo-Hyeon;Lee, Sang-Heon
    • Journal of the military operations research society of Korea
    • /
    • v.35 no.2
    • /
    • pp.77-86
    • /
    • 2009
  • The encounter probability graph is measured by the chance(in percent) that a vehicle, blindly moving through a minefield, will detonate a mine. The encounter probability graph versus minefield density is presented in ROK and US Army field manual but this graph is baseless because these data had not been presented as those of live mobility or wargame. In this paper, we verified this graph building procedure model as using computer program. The result values of program are almost like those of graph. Therefore this model for our to suggest have validation, verification that a modeling demand and we convince that this model will be useful for calculating encounter probability of multiple vehicles.

Designing SCA-Based Component Framework for Dynamic Deployment of SDR Components (SDR 컴포넌트의 동적 배치를 위한 SCA 기반 컴포넌트 프레임워크의 설계)

  • 김세화;홍성수;장래혁
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.241-253
    • /
    • 2003
  • SCA (Software Communication Architecture), which has been adopted as a SDR(Software Defined Radio) Forum standard, provides a framework that successfully exploits common design patterns of embedded systems software. However, the SCA is inadequate as a component framework since it does not explicitly specify (1) a component model that defines how to express a component interface and how to implement it, (2) a package model that defines what and how to package in deployment units, and (3) a deployment model that defines the deployment environment and deployment process. In this paper, we propose a SCA-based component framework for SDR. Specifically, we present (1) a component model that defines a component as a specialized CORBA object that implements object management functionality, (2) a package model exploiting the existing XML descriptors of the SCA, and (3) a deployment model that defines a SCA-based deployment environment, a boot-up process that restores the deployment state, and a deployment process that supports lazy application instantiation and dynamic component replacement.

Dynamic Reliability Analysis (시스템다이내믹스 기법의 공학적 응용)

  • 곽상만
    • Proceedings of the Korean System Dynamics Society
    • /
    • 2003.02a
    • /
    • pp.65-71
    • /
    • 2003
  • 장점 각종 Dynamic 특성을 모델화, Recovery action등 Hardware뿐만 아니라 다양한 민감도 분석이 가능, 절차서 개선, 조직 특성 등 모듈 개념을 활용할 시에 모델화 시간이 절약 기존 방법에 비해 1/2-1/10 정도의 노력, 다른 전략 모델과의 연계가 가능, 단점 정성적 Insight를 얻기 어려움, 평가 시간이 매우 김.(중략)

  • PDF

Design on Fixed Quantity Analytical Model for Information System Audit (정보시스템 감리의 정량화 분석 모델 설계)

  • Kim, Hee-Wan;Lee, Hae-Man;Kim, Dong-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.88-100
    • /
    • 2011
  • This thesis suggests fixed quantity model and detailed performance procedures of an information system audit. In addition, an identification of the check-items with high operating risk and factors that might lead to serious effects on the business are made. Then, this thesis proposes the information system audit model that can grant priorities. By using this model, the orderer can evaluate objectively with digitized mark. The model can improve the effectiveness, reliability, and objectivity of the audit by minimizing the discrepancies of different opinions about audit evaluation results between auditee and the orderer. The proposed model is adapted to an application system and audit projects of the database construction. As a result, the model has received an equal mark from the result of the general reviews, thus the propriety of the proposed model was verified.

An Efficient Software Reliability Testing Method for the Model based Embedded Software (모델 기반 내장형 소프트웨어의 효율적 신뢰성 시험 기법)

  • Park, Jang-Seong;Cho, Sung-Bong;Park, Hyun-Yong;Kim, Do-Wan;Kim, Seong-Gyun
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.1
    • /
    • pp.25-32
    • /
    • 2018
  • This paper presents an efficient software reliability testing method for the model based auto-generated code and reify a dynamic test procedure. The benefits of executing the model-based each static/dynamic reliability test before the code-based static/dynamic reliability test are described. Also, The correlations of code/model based reliability test are demonstrated by using model testing tool, Model Advisor and Verification and Validation, and the code testing tool, PolySpace and LDRA. The result of reliability test is indicated in this paper.

A New Design Method for the GBAM (General Bidirectional Associative Memory) Model (GBAM 모델을 위한 새로운 설계방법)

  • 박주영;임채환;김혜연
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.4
    • /
    • pp.340-346
    • /
    • 2001
  • This paper proposes a new design method for the GBAM: (general bidirectional associative memory) model. Based on theoretical investigations on the GBAM: model, it is shown that the design of the GBAM:-based bidirectional associative memeories can be formulated as optimization problems called GEVPs (generalized eigenvalue problems). Since the GEVPs arising in the procedure can be efficiently solved within a given tolerance by the recently developed interior point methods, the design procedure established in this paper is very useful in practice. The applicability of the proposed design procedure is demonstrated by simple design examples considered in related studies.

  • PDF

프라이버시 참조 구조 국제표준화 동향

  • Shin, Yong-Nyuo;Kim, Hak-Il;Chun, Myung-Geun
    • Review of KIISC
    • /
    • v.22 no.2
    • /
    • pp.52-57
    • /
    • 2012
  • 프라이버시 참조구조(privacy reference architecture)는 구현 및 배치 상황을 바탕으로 해야 하며, 독립적으로 존재할 수 없다. 구조 설치는 프라이버시 인지 및 가능 ICT 시스템을 배치할 구조와 조화를 이루어 운영되며 정책을 반영하는 업무 관리 기능, 프로세스 및 절차를 종합적으로 고려하여 이루어진다. 업무 및 데이터 처리 모델 또는 인벤토리의 공식적인 구축 및 유지는 해당 조직에 적용되는 모든 프라이버시 및 정보 보호 요건에 부합해야 한다. 업무 프로세스 모델이 구축되고 데이터 처리 모델과의 비교가 완료되면 동의 취득 기능, 개인식별정보 범주화 및 태깅 기능, 감사 및 기록 절차, 보존 일정, 고지 및 보안 경보와 같은 프라이버시 통제수단을 정하고 필수적인 프라이버시 보호 요건과 비교할 수 있다. ISO/IEC JTC1 SC27 WG5의 프라이버시 표준화는 프라이버시 프레임워크, 프레임워크 기반 구현을 위한 프라이버시 레퍼런스 아키텍쳐를 중심으로 이루어지고 있다. 본 논문에서는 프라이버시 표준화를 위한 국외 표준화 동향을 소개하고, 향후 추진해야할 중점 표준화 항목을 도출한다.