• Title/Summary/Keyword: IS요구도

Search Result 25,663, Processing Time 0.043 seconds

Web-based Requirements Elicitation Supporting System using Requirements Sentences Categorization (요구 사항 문장 범주화를 이용한 웹 기반의 요구 사항 추출 지원 시스템)

  • Ko, Young-Joong;Kang, Ki-Sun;Kim, Jae-Seon;Park, Soo-Yong;Seo, Jung-Yun
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.4
    • /
    • pp.384-392
    • /
    • 2000
  • As a software becomes more complicated and large-scaled, it is very important for a software engineer to analyze user's requirements precisely and apply them effectively in the development stage. Due to the growth of the internet, the necessity of requirements elicitation and analysis in distributed environments has also become larger. This paper proposes a requirements elicitation supporting system that offer the basis for effectively analyzing requirements collected in distributed environments. The proposed system automatically categorizes collected requirements sentences into selected subject fields by measuring their similarity using a similarity measurement technique. Therefore, it reduces the difficulties in the initial stage of requirements analysis and it supports rapid and correct requirements analysis. This paper verifies the efficiency of the proposed system in similarity measurement techniques through experiments, and presents a process for requirements specifications elicitation using the embodied system

  • PDF

A Study on Developing Systems for Managing Information on Owner's Requirements in the Design Phase (설계단계에서의 발주자 요구사항 관리를 위한 정보관리 시스템 개발에 관한 연구)

  • Yoo, Seung-Yeun;Lee, June-Seong;Park, Jung-Dae;Jun, Joon-Ki
    • Korean Journal of Construction Engineering and Management
    • /
    • v.9 no.3
    • /
    • pp.126-135
    • /
    • 2008
  • The purpose of this study is to develop the efficient information system for managing owner's requirement(O/R) throughout the design phases. In order to derive an improvement, current status of O/R management both in domestic and foreign design company has been analyzed. Through the literature reviews and interviews with experts, the Information on design process and detailed activities were investigated. Based on the basic research, inputs, outputs and participants were defined and information flow diagram was drawn. O/R's were categorized according to comprehensive interviews with specialists, and a prototype system was suggested. Conducting systematized O/R management will improve the confidence of owners' role on design, reduce re-work in design tasks, and finally elevate design quality.

An Efficient Dynamic Workload Balancing Strategy (PIECES 프레임워크 중심의 요구사항 정제와 우선순위 결정 전략)

  • Jeon, Hye-Young;Byun, Jung-Won;Rhew, Sung-Yul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.10
    • /
    • pp.117-127
    • /
    • 2012
  • Identifying user requirements efficiently and reflecting them on the existing system is very important in a rapidly changing web and mobile environments. This study proposes the strategies to refining requirements and to prioritizing those refined requirements for changing of web and mobile application based on user requirements (e.g. mobile application comments, Q&A, reported information as discomfort factors). In order to refining the user requirements, those requirements are grouped by using the advancement of the software business of the Forum of standardization and the existing configuration-based programs. Then, we mapped them onto the PIECES framework to identifying whether the refined requirements are correctly reflected to the system in a way of valid and pure. To determine the priority of refined requirements, first, relative weights are given to software structure, requirements and categories of PIECES. Second, integration points on each requirement are counted to obtain the relative value of partial and overall score of a set of software structural requirements. In order to verifying the possibility and proving the effectiveness of proposing technique in this study, survey was conducted on changing requirements of mobile application which have been serviced at S University by targeting 15 people of work-related stakeholders.

Failure Analysis of Aircraft Software Test Cases from a Perspective of Requirements Traceability (요구사항 추적성 관점에서 항공기 탑재 소프트웨어 시험 사례 실패 분석)

  • Kim, Sung-Sub;Cho, Hee-Tae;Lee, Seonah
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.11
    • /
    • pp.357-366
    • /
    • 2020
  • As the proportion and complexity of software embedded in aircraft increase, risk factors such as mission failure, function failure and performance failure due to software errors also increase. In the mission-critical software systems such as aircraft software, managing requirement traceability is essential to maintain the software systems with minimal period and cost. However, the development company is not accurately complying with the guideline for managing requirement traceability due to various reasons such as development cost and schedule. Therefore, it is not easy to systematically establish and maintain requirement traceability. In the paper, we analyze actual test cases of aviation software systems from the viewpoint of requirements traceability in order to learn if there are failure cases of test cases due to the absence of systematic traceability management activities. We also check the risks associated with the failure cases according to the type and severity of the cases. As a result of analyzing a total of 7 aircraft-mounted software, failure cases could be divided into three types: omission of requirements, lack of connection between requirements and test procedures, and omission of test procedures. There were a total of 18 failure cases, 6 for each type. The numbers of high, middle and low risks were 1, 13 and 4, respectively, where the number of middle risks is largest.

Formal Software Requirements Specification for Digital Reactor Protection Systems (디지털 원자로 보호 시스템을 위한 정형 소프트웨어 요구사항 명세)

  • 유준범;차성덕;김창회;오윤주
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.6
    • /
    • pp.750-759
    • /
    • 2004
  • The software of the nuclear power plant digital control system is a safety-critical system where many techniques must be applied to it in order to preserve safety in the whole system. Formal specifications especially allow the system to be clearly and completely specified in the early requirements specification phase therefore making it a trusted method for increasing safety. In this paper, we discuss the NuSCR, which is a qualified formal specification method for specifying nuclear power plant digital control system software requirements. To investigate the application of NuSCR, we introduce the experience of using NuSCR in formally specifying the plant protection system's software requirements, which is presently being developed at KNICS. Case study that shows that the formal specification approach NuSCR is very much qualified and specialized for the nuclear domain is also shown.

Deriving Essential Security Requirements of IVN through Case Analysis (사례 분석을 통한 IVN의 필수 보안 요구사항 도출)

  • Song, Yun keun;Woo, Samuel;Lee, Jungho;Lee, You sik
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.2
    • /
    • pp.144-155
    • /
    • 2019
  • One of the issues of the automotive industry today is autonomous driving vehicles. In order to achieve level 3 or higher as defined by SAE International, harmonization of autonomous driving technology and connected technology is essential. Current vehicles have new features such as autonomous driving, which not only increases the number of electrical components, but also the amount and complexity of software. As a result, the attack surface, which is the access point of attack, is widening, and software security vulnerabilities are also increasing. However, the reality is that the essential security requirements for vehicles are not defined. In this paper, based on real attacks and vulnerability cases and trends, we identify the assets in the in-vehicle network and derive the threats. We also defined the security requirements and derived essential security requirements that should be applied at least to the safety of the vehicle occupant through risk analysis.

Software Formal Verification Methodology using Aspect DEVS Verification Framework (Aspect DEVS 검증 틀을 이용한 소프트웨어 정형 검증 방법론)

  • Choi, Chang-Beom;Kim, Tag-Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.113-122
    • /
    • 2009
  • Software is getting more complex due to a variety of requirements that include desired functions and properties. Therefore, verifying and testing the software are complicated problems. Moreover, if the software is already implemented, inserting and deleting tracing/logging code into the source code may cause several problems, such as the code tangling and the code scattering problems. This paper proposes the Aspect DEVS Verification Framework which supports the verification and testing process. The Aspect DEVS Verification Framework utilizes Aspect Oriented Programming features to handle the code tangling and the code scattering problems. By applying aspect oriented features, a user can find and fix the inconsistency between requirement and implementation of a software without suffering the problems. The first step of the verification process is the building aspect code to make a software act as a generator. The second step is developing a requirement specification using DEVS diagrams and implementing it using the DEVSIM++. The final step is comparing the event traces from the software with the possible execution sequences from DEVS model.

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

Analysis of Radar Performance Requirements for VTS System Based on IALA Guidelines (IALA 가이드라인에 기반한 VTS 시스템을 위한 레이더 성능 요구사항 분석)

  • Kim, Byung-Doo;Lee, Byung-Gil
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.10a
    • /
    • pp.27-29
    • /
    • 2015
  • Based on IALA guidelines, the fundamental requirements of radar system for vessel traffic services are analyzed in this paper. target separation, target position accuracy, target track accuracy of X-band radar and recommended test conditions are analyzed. Also, in order to check if it satisfies the requirement of target position accuracy from IALA guideline, the test is carried out through processing of radar raw image acquired at VTS center.

  • PDF

Analysis of Media Literacy Evaluation Items in Early Childhood Animation (유아동 교육 애니메이션의 미디어 리터러시 평가항목 요구도 분석)

  • Jang, Eunyoung
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.365-373
    • /
    • 2021
  • This work aims to derive data-based requirements by analyzing the importance and performance of media literacy in early childhood animations. For this, a survey was conducted on parents with young children after drawing questions of assessment items through expert focus group interviews (FGI). The analytical instruments, Borich Needs Formula formulation and The Locus for Focus Model were used together to improve accuracy. Based on the results, it is meaningful in that it recognized the demand of the inmates for children's education animation and prepared systematic indicators for it.