• Title/Summary/Keyword: 정형화된 프로세스 모델

Search Result 40, Processing Time 0.027 seconds

Model-Based Quantitative Reengineering for Identifying Components from Object-Oriented Systems (객체지향 시스템으로부터 컴포넌트를 식별하기 위한 모델 기반의 정량적 재공학)

  • Lee, Eun-Joo
    • The KIPS Transactions:PartD
    • /
    • v.14D no.1 s.111
    • /
    • pp.67-82
    • /
    • 2007
  • Due to the classes in object-orientation, which are too detailed and specific, their reusability can be decreased. Components, considered to be more coarse-grained compared to objects, help maintain software complexity effectively and facilitate software reuse. Furthermore, component technology becomes essential by the appearance of the new frameworks, such as MDA, SOA, etc. Consequently, it is necessary to reengineer an existing object-oriented system into a component-based system suitable to those new environments. In this paper, we propose a model-based quantitative reengineering methodology to identify components from object-oriented systems. We expand system model and process, which are defined in our prior work, more formally and precisely. A system model, constructed from object-oriented system, is used to extract and refine components in quantitative ways. We develop a supporting tool and show effectiveness of the methodology through applying it to an existing object-oriented system.

ERD Representation using Auto-Generated Form and SQL (자동 생성 폼과 SQL을 이용한 ERD 표현)

  • Ra, Young-Gook
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.5
    • /
    • pp.61-75
    • /
    • 2009
  • Generally, the development of the database application includes the requirement analysis phase of creating ERD (Entity Relationship Diagram) and process models, coding, and testing. From the above phases, the analysis phase is not most formalized. It is usually hard task because (1) customers don't know the details of the desired system; (2) developers can't with ease understand the business logic of the customers; (3) the outcomes of the analysis, which are ERD and process models, are not easy to understand to the customers. This paper propose that the executional forms, which are better to understand the systems, should be presented to the customers instead of the ERD. These forms should accept the data input so that customers can review the various aspects of the outcome models. The developers should be able to instantly implement the business logic and also should be able to visually demonstrate the logic in order to get the details of it. For this goal, the customer supplied business logic should be able to be implemented by the references between forms, actions, constraints from the perspective of the data flow. The customers try to execute the forms implementing the business logic and review their supplied logic find new necessary business logic of their own. Iterating these processes for the requirement analysis would result in the success of the analysis which is sufficiently detailed without conflicts.

A Study on the Research Model for the Standardization of Software-Similarity-Appraisal Techniques (소프트웨어 복제도 감정기법의 표준화 모델에 관한 연구)

  • Bahng, Hyo-Keun;Cha, Tae-Own;Chung, Tai-Myoung
    • The KIPS Transactions:PartD
    • /
    • v.13D no.6 s.109
    • /
    • pp.823-832
    • /
    • 2006
  • The Purpose of Similarity(Reproduction) Degree Appraisal is to determine the equality or similarity between two programs and it is a system that presents the technical grounds of judgment which is necessary to support the resolution of software intellectual property rights through expert eyes. The most important things in proceeding software appraisal are not to make too much of expert's own subjective judgment and to acquire the accurate-appraisal results. However, up to now standard research and development for its systematic techniques are not properly made out and as different expert as each one could approach in a thousand different ways, even the techniques for software appraisal types have not exactly been presented yet. Moreover, in the analyzing results of all the appraisal cases finished before, through a practical way, we blow that there are some damages on objectivity and accuracy in some parts of the appraisal results owing to the problems of existing appraisal procedures and techniques or lack of expert's professional knowledge. In this paper we present the model for the standardization of software-similarity-appraisal techniques and objective-evaluation methods for decreasing a tolerance that could make different results according to each expert in the same-evaluation points. Especially, it analyzes and evaluates the techniques from various points of view concerning the standard appraisal process, setting a range of appraisal, setting appraisal domains and items in detail, based on unit processes, setting the weight of each object to be appraised, and the degree of logical and physical similarity, based on effective solutions to practical problems of existing appraisal techniques and their objective and quantitative standardization. Consequently, we believe that the model for the standardization of software-similarity-appraisal techniques will minimizes the possibility of mistakes due to an expert's subjective judgment as well as it will offer a tool for improving objectivity and reliability of the appraisal results.

A Study of Modeling and Utilization for Software Enhancement Process Based on Business scenarios (업무 시나리오를 기반으로 한 소프트웨어 개선 프로세스의 모델링 및 활용에 관한 연구)

  • Kim, Hyung-Mok;Rhew, Sung-Yul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.8
    • /
    • pp.121-129
    • /
    • 2013
  • As more than 80 percent of tasks within corporations are performed through information systems, they have become large in scale and complicated, which make the range of the system users diverse and specialized. and as recent corporate strategies focus on the real-time environment in businesses, the organizational structure within companies tend to show frequent changes. In order to ensure the business continuity in this environment, the most important aspect is to prevent incompleteness of business by narrowing the gap of understanding of business process between the system users and the maintenance managers. In order to address this problem, this study suggests a modeling method that utilizes business scenarios reflecting actual business rules and procedures which ultimately transforms the optimized and standardized form of business scenarios into the actual software maintenance activities. This modeling method improves reusability and usability through the repeated feedback mechanism for modified software by leading to gradual fine-grained process. The feasibility of this is to be proven by applying the modeling method to the real business environment.

An Asset-Mission Dependency Model Adaptation and Optimized Implementation for Efficient Cyber Mission Impact Assessment (효율적인 임무 피해 평가를 위한 자산-임무 의존성 모델 적용 및 최적화된 구현)

  • Jeon, Youngbae;Jeong, Hyunsook;Han, In sung;Yoon, Jiwon
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.10
    • /
    • pp.579-587
    • /
    • 2017
  • Cyber Mission Impact Assessment is one of the essential tasks which many militaries and industrial major companies should perform to effectively achieve their mission. The unexpected damage to an organization's assets results in damage to the whole system's performance of the organizations. In order to minimize the damage, it is necessary to quantify the available capacity of the mission, which can be achieved only with the remaining assets, and to immediately prepare a new second best plan in a moment. We therefore need to estimate the exact cyber attack's impact to the mission when the unwanted damage occurs by modeling the relationship between the assets and the missions. In this paper, we propose a new model which deals with the dependencies between assets and missions for obtaining the exact impact of a cyber attack. The proposed model distinguishes task management from asset management for an efficient process, and it is implemented to be optimized using a vectorized operation for parallel processing and using a buffer to reduce the computation time.

COBie Document Prototype for supporting BIM based Smart Maintenance of Buildings (BIM 기반 건축물 스마트 유지관리 지원 COBie 문서 프로토타입)

  • Koo, Kyo-Jin;Park, Sang-Hun;Cho, Dong-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.60-68
    • /
    • 2019
  • For effective building maintenance, the collection and management of various maintenance date such as work history information and material information is required. Despite the introduction of information management technologies and systems to reduce the amount of maintenance work of buildings, which have become larger and more complex, the maintenance information is not being utilized properly. As an alternative, research on the introduction and utilization of BIM is being conducted continuously. However, the BIM models generated at the design phase are not utilized in practice due to a lack of architectural maintenance information. This study proposed a COBie document prototype to support BIM-based smart maintenance tasks performed by building managers. In order to formalize various types of maintenance work procedures, a BIM-based maintenance process model is presented in two categories: inspection and maintenance. Among the BIM attribute data of the BIM model generated at the design phase, the parameters corresponding to the maintenance necessary information for each basic process are derived. Based on this, we proposed a COBie document prototype consisting of seven spreadsheets. The results of a case study confirmed that the KBIMS library-based BIM model created at the design phase without the maintenance information can be used at the maintenance phase.

On-Line music score recognition by DPmatching (DP매칭에 의한 On-Line 악보인식)

  • 구상훈;이병선;김수경;이은주
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.11a
    • /
    • pp.502-511
    • /
    • 2002
  • 컴퓨터의 기술적 발전은 사회 여러 분야에 막대한 영향을 끼쳤다. 그중 악보인식분야에도 커다란 영향을 주었다. 그러나, On-line 상에서 그린 악보를 실시간으로 정형화된 악보형태로 변환하는 처리에 대한 연구가 미흡하여 이에 대한 연구가 필요하다. 본 논문에서는 실시간으로 악보를 인식하고, 사용자의 편의를 도모하기 위해 DP(Dynamic Programming) 매칭 법을 이용한 On-Line 악보인식에 관한 방법을 제안하였다. 본 연구에서는 실시간으로 입력되는 악상기호를 인식하기 위해, 가장 유효한 정보인 악상 기호내의 방향, x, y 좌표를 이용하여 벡터형태로 추출한 후 음표와 비음 표(쉼표, 기타기호)의 두개의 그룹으로 나누어진 표준패턴과의 DP매칭을 통해 인식한다. 먼저 tablet을 통해 실시간으로 악상 기호를 입력할 때 생기는 x, y좌표를 이용하여, 펜의 움직임에 대한 16방향 부호화를 수행한다. 음표와 비 음표를 구분하기 위한 시간을 줄이고자 16방향 부호화를 적용하지 않고 사사분면부호화를 적용한다. 음표를 약식으로 그릴 경우 음표 머리에 해당하는 부분의 좌표는 삼사분면에 분포하고, 폐곡선의 음표일 경우에는 좌표가 사사분면에 고르게 나타난다. 폐곡선을 제외한 음표의 머리는 폐곡선과 같은 조건이면서 입력받은 y좌표 값들 중에서 최소 값과 최대 값을 구한 다음 2로 나눈 값을 지나는 y좌표의 개수가 임의의 임계값 이상이면 음표로 판단한다. 위 조건을 만족하지 않을 경우 비 음표로 취급한다. 음표와 비 음표를 결정한 다음, 입력패턴과 표준패턴과의 DP매칭을 통하여 벌점을 구한다. 그리고 경로탐색을 통해 벌점에 대한 각각의 합계를 구해 최소 값을 악상기호로 인식하였다. 실험결과, 표준패턴을 음표와 비음표의 두개의 그룹으로 나누어 인식함으로써 DP 매칭의 처리 속도를 개선시켰고, 국소적인 변형이 있는 패턴과 특징의 수가 다른 패턴의 경우에도 좋은 인식률을 얻었다.리되고 이원화된 코드체계와 데이터 형태의 이질화를 통일하는 방법으로 데이터웨어하우스 시스템을 제시하였다. 결국 병원에서 데이터웨어하우스 시스템의 구축은 임상, 연구, 교육의 유기적 순환관계를 정립하여 지식의 순환적 고리인 수집, 공유, 확산, 재창출을 지속적 유지할 수 있는 인프라를 구축해 준다. 반면 상이한 정보들간의 충돌과 이에 따른 해석의 오류로 잘못된 의사결정을 위한 정보를 제공할 수 있고 기초정보의 접근 및 추출의 유용성에 의해서 정보유출에 대한 문제가 한계점으로 나타났다.로세스 개선을 위해서 무엇을 정말로 필요로 하는지를 밝힘으로써, 한국 소프트웨어 산업의 현실적인 특수성을 고려한 소프트웨어 프로세스 평가와 개선 모델의 개발을 위한 기초적인 자료를 제공할 것으로 예상된다. 또한, 본 연구 결과는, 우리나라 소프트웨어 조직들이 실제로 무엇을 필요로 하는지를 밝힘으로써, 우리나라의 소프트웨어 산업을 육성하기 위한 실효성 있는 정책 입안을 위한 기초 자료를 제공할 것으로 예상된다.를 검증하려고 한다. 협력체계 확립, ${\circled}3$ 전문인력 확보 및 인력구성 조정, 그리고 ${\circled}4$ 방문보건사업의 강화 등이다., 대사(代謝)와 관계(關係)있음을 시사(示唆)해 주고 있다.ble nutrient (TDN) was highest in booting stage (59.7%); however no significant difference was found among other stages. The concentrations of Ca and P were not different among mature stages. According to these results, the yellow ripe period is appropriate to harvest the whole crop rice for forage considering

  • PDF

A Study on the Product Planning Model based on Word2Vec using On-offline Comment Analysis: Focused on the Noiseless Vertical Mouse User (온·오프라인 댓글 분석이 활용된 Word2Vec 기반 상품기획 모델연구: 버티컬 무소음마우스 사용자를 중심으로)

  • Ahn, Yeong-Hwi
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.221-227
    • /
    • 2021
  • In this paper, we conducted word-to-word similarity analysis of standardized datasets collected through web crawling for 10,000 Vertical Noise Mouses using Word2Vec, and made 92 students of computer engineering use the products presented for 5 days, and conducted self-report questionnaire analysis. The questionnaire analysis was conducted by collecting the words in the form of a narrative form and presenting and selecting the top 50 words extracted from the word frequency analysis and the word similarity analysis. As a result of analyzing the similarity of e-commerce user's product review, pain (.985) and design (.963) were analyzed as the advantages of click keywords, and the disadvantages were vertical (.985) and adaptation (.948). In the descriptive frequency analysis, the most frequently selected items were Vertical (123) and Pain (118). Vertical (83) and Pain (75) were selected for the advantages of selecting the long/demerit similar words, and adaptation (89) and buttons (72) were selected for the disadvantages. Therefore, it is expected that decision makers and product planners of medium and small enterprises can be used as important data for decision making when the method applied in this study is reflected as a new product development process and a review strategy of existing products.

COBie-based Building Information Exchange System Framework for Building Facility Management (건축물 유지관리를 위한 COBie기반 건축정보교환체계 프레임웍 연구)

  • Kang, Tae-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.370-378
    • /
    • 2020
  • The Construction Operations Building Information Exchange (COBie) collects and documents a large amount of information from different paths in one place during design and construction projects. This documented information is readily available as a means of continuously transferring data to the facility management systems used by building engineers. In this process, the COBie Worksheet, an open standard form, is used to input the information by simplifying the list required by the user. As a result, COBie was developed to improve dramatically how relevant information is obtained and updated to support operations, maintenance, and asset management at the design and construction stages. On the other hand, to use COBie, a great deal of manual work is required for information linkage and quality inspection with heterogeneous data models. These issues become obstacles to COBie-based facility management system development. This study analyzed the COBie information system and defined the framework for simpler operating maintenance information from BIM (Building Information Modeling). Moreover, the rules for facility management information submission, quality inspection, role definition of framework components, and information linkage were derived. COBie DB schema and support data linkages could be generated effectively based on the proposed framework in prototype development.

The Study of Response Model & Mechanism Against Windows Kernel Compromises (Windows 커널 공격기법의 대응 모델 및 메커니즘에 관한 연구)

  • Kim, Jae-Myong;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.1-12
    • /
    • 2006
  • Malicious codes have been widely documented and detected in information security breach occurrences of Microsoft Windows platform. Legacy information security systems are particularly vulnerable to breaches, due to Window kernel-based malicious codes, that penetrate existing protection and remain undetected. To date there has not been enough quality study into and information sharing about Windows kernel and inner code mechanisms, and this is the core reason for the success of these codes into entering systems and remaining undetected. This paper focus on classification and formalization of type target and mechanism of various Windows kernel-based attacks, and will present suggestions for effective response methodologies in the categories of, "Kernel memory protection", "Process & driver protection" and "File system & registry protection". An effective Windows kernel protection system will be presented through the collection and analysis of Windows kernel and inside mechanisms, and through suggestions for the implementation methodologies of unreleased and new Windows kernel protection skill. Results presented in this paper will explain that the suggested system be highly effective and has more accurate for intrusion detection ratios, then the current legacy security systems (i.e., virus vaccines and Windows IPS, etc) intrusion detection ratios. So, It is expected that the suggested system provides a good solution to prevent IT infrastructure from complicated and intelligent Windows kernel attacks.

  • PDF