• Title/Summary/Keyword: Non-functional Requirements

Search Result 68, Processing Time 0.03 seconds

Non-Functional Requirements Analysis For Embedded Software By Use-Case Diagram (사용사례를 이용한 내장형 소프트웨어의 비기능 요구사항 추출 방안)

  • SEo Kwang-Ik;Choi Eunman
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07b
    • /
    • pp.385-387
    • /
    • 2005
  • 최근 정보통신 기술이 빠르게 발전하면서 생활 환경 안에서 내장형 소프트웨어를 탑재한 독립적인 장치들을 많이 볼 수 있다. 이러한 내장형 장치들은 하드웨어의 특성으로 인해 비기능적인 요구사항이 중요하다. 본 논문에서는 내장형 시스템의 비기능적 요구사항을 기능적 요구사항 중심으로 추출하는 방법을 제안한다.

  • PDF

Fault tolerant architecture for Module-based personal robot (모듈기반 퍼스널 로봇을 위한 Fault Tolerant 구조)

  • Baek, Bum-Hyun;Jee, Dong-Jun;Park, Chan-Jung;Han, Ki-Sung;Lee, Sun-Young;Kim, Kyeong-Tae;Hong, Sung-Won;Park, Hong-Seong
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.297-299
    • /
    • 2006
  • Many distributed applications is developed in various environment such as operating system, software platform. So, they exhibit different types of system behavior, status, during the course of their operation. Each such behavior may have different functional and non-functional requirements. Therefore, many distributed application need to fault-tolerance solution. Personal robot provide various service or application. Because personal robot has many application or service, it need to fault-tolerance architecture. A flexible architecture is required to provide dependability. In this paper, it is suggested a fault-tolerant architecture for module-based personal robot with module fault-tolerance, service fault-tolerance.

  • PDF

The Method for Cloud Service Recommendation Based on Requirements of Tenant (테넌트 요구사항 기반의 클라우드 서비스 추천 방법)

  • An, Young Min;Kang, Tae Jun;Park, Joon Seok;Yeom, Keun Hyuk
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.4
    • /
    • pp.161-168
    • /
    • 2015
  • It is difficult to provide proper cloud services for cloud users, because the number of cloud services are increasing and the type of cloud services are diversifying. To overcome this problem, the concept of cloud service broker is presented to mediate cloud services between cloud providers and tenant. The most important role of cloud service broker is to finding cloud services that fulfill requirements of tenant. However, current existing cloud service broker conduct passive requirements analysis process with cloud service expert's assistance. In addition, the systematic functional and non-functional requirement analysis is insufficient. Therefore, we need the new methods for requirement analysis to find nearest service that matches with requirement of tenant. In this paper, we apply pairwise comparison from AHP method to analyze requirement automatically and systematically. It calculates score of service by comparing requirement with service specification, calculating importance rate, and so on.

A Scenario-based Goal-oriented Approach for Use Case Modeling (유즈케이스 모델링을 위한 시나리오 근간의 목표(Goal)지향 분석 방안)

  • Lee, Jae-Ho;Kim, Jae-Seon;Park, Soo-Yong
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.4
    • /
    • pp.211-224
    • /
    • 2002
  • As system become larger and more complex, it is important to correctly analyze and specify user's requirements. Use case modeling is widely used in Object-Oriented Analysis and Design(OOAD) and Component-Based Development(CBD). It is useful to mitigate the complexity of the requirements analysis. However, use cases are difficult to be structured, to explicitly represent non-functional requirements, and to analyze what is affected by changes of use cases. To alleviate these problems, we propose scenario-based goal-oriented approach for use case modeling. The approach is to apply goal-oriented analysis method to use case model. Since goal-oriented analysis method is not systematic and heuristics is considerably involved, we adopted scenarios as the basis for the goal extraction. The proposed method is applied to City Bus Information Subsystem(CBIS) in Intelligent Transport Systems(ITS) domain. The proposed approach helps software engineer to analyze what is affected by use case's changes and represent non-functional requirements.

A Study on the Analytic Technique Combination and Evaluation of Development Process for Software Safety (S/W 안전성을 위한 분석기법 조합과 개발 프로세스 평가에 대한 연구)

  • Lee, Young-Soo;Ahn, Jin;Ha, Seung-Tea;Cho, Woo-Sik;Han, Chan-Hee
    • Proceedings of the KSR Conference
    • /
    • 2006.11b
    • /
    • pp.1468-1476
    • /
    • 2006
  • The goal of this thesis is to support safety and reliability characteristics of software intensive critical systems. The verification method developed is innovative from current state of the art in what concerns the verification viewpoint adopted: focusing on software faults, and not, like many other approaches purely on fulfilling functional requirements. As a first step and based on a number of well defined criteria a comparison was made of available literature in the area of static non formal non probabilistic software fault removal techniques. But, None of the techniques evaluated fulfilled all criteria set in isolation. Therefore a new technique was developed based on a combination of two existing techniques: the FMEA and FTA. These two techniques complement each other very well. It is possible to integrate both techniques with commonly used techniques at system level. The resulting new technique can be shown to combine nearly all aspects of existing fault removal techniques.

  • PDF

Adaptive undervoltage protection scheme for safety bus in nuclear power plants

  • Chang, Choong-koo
    • Nuclear Engineering and Technology
    • /
    • v.54 no.6
    • /
    • pp.2055-2061
    • /
    • 2022
  • In the event of a short-circuit accident on a 4.16 kV non-safety bus, the voltage is temporarily lowered as backflow occurs on the safety bus. In such cases, the undervoltage relay of the safety bus shall not pick up the undervoltage so as not to interfere with the operation of the safety motors. The aim of this study is to develop an adaptive undervoltage protection scheme for the 4.16 kV safety bus considering the faults on the 13.8 kV and 4.16 kV non-safety buses connected to secondary windings of the three winding transformers, UAT and SAT. The result of this study will be the adaptive undervoltage protection scheme for the safety bus of nuclear power plants satisfying functional requirements of the safety related medium voltage motors. The adaptive undervoltage protection scheme can be implemented into an integrated digital protective relay to make user friendly and reliable protection scheme.

A Study of Web Application Security Quality Architecture Management Process referenced ISO/IEC9000 Model (ISO/IEC9000모델을 참조한 웹 애플리케이션 보안품질 관리체계 설계)

  • Kim, Jeom-Goo;Noh, Si-Choon;Lee, Do-Hyeon
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.11-17
    • /
    • 2012
  • According to ISO/IEC 9000, quality to satisfy users' requirements when using the product or service is defined as the characteristics of the synthesized concept. Secure web application coding information systems with the reliability and quality of service is one of the determining factor. Secure coding in order to achieve the quality based on the model is necessary. The reason is that the security is in quality properties in the range of non-functional requirements that necessitates. Secure coding for the design of quality systems based on the quality of the definition of quality attributes, quality requirements, quality attribute scenarios are defined, and must be set. To this end, referring to IEEE 1061 quality model for web application, quality model structure is developed. Secure web application architecture design is composed of coding quality of the model systems, web applications draw interest to stakeholders, decision drivers secure coding architecture, quality attributes, eliciting quality requirements of the security settings, creating web application architecture descriptions and security framework.

Nonlinear response of stiffened triceratops under impact and non-impact waves

  • Chandrasekaran, Srinivasan;Nassery, Jamshed
    • Ocean Systems Engineering
    • /
    • v.7 no.3
    • /
    • pp.179-193
    • /
    • 2017
  • Dynamic response analysis of offshore triceratops with stiffened buoyant legs under impact and non-impact waves is presented. Triceratops is relatively new-generation complaint platform being explored in the recent past for its suitability in ultra-deep waters. Buoyant legs support the deck through ball joints, which partially isolate the deck by not transferring rotation from legs to the deck. Buoyant legs are interconnected using equally spaced stiffeners, inducing more integral action in dispersing the encountered wave loads. Two typical nonlinear waves under very high sea state are used to simulate impact and non-impact waves. Parameters of JONSWAP spectrum are chosen to produce waves with high vertical and horizontal asymmetries. Impact waves are simulated by steep, front asymmetric waves while non-impact waves are simulated using Stokes nonlinear irregular waves. Based on the numerical analyses presented, it is seen that the platform experiences both steady state (springing) and transient response (ringing) of high amplitudes. Response of the deck shows significant reduction in rotational degrees-of-freedom due to isolation offered by ball joints. Weak-asymmetric waves, resulting in non-impact waves cause steady state response. Beat phenomenon is noticed in almost all degrees-of-freedom but values in sway, roll and yaw are considerably low as angle of incidence is zero degrees. Impact waves cause response in higher frequencies; bursting nature of pitch response is a clear manifestation of the effect of impact waves on buoyant legs. Non-impact waves cause response similar to that of a beating phenomenon in all active degrees-of-freedom, which otherwise would not be present under normal loading. Power spectral density plots show energy content of response for a wide bandwidth of frequencies, indicating an alarming behaviour apart from being highly nonlinear. Heave, being one of the stiff degrees-of-freedom is triggered under non-impact waves, which resulted in tether tension variation under non-impact waves as well. Reduced deck response aids functional requirements of triceratops even under impact and non-impact waves. Stiffened group of buoyant legs enable a monolithic behaviour, enhancing stiffness in vertical plane.

Content-based Configuration Management System for Software Research and Development Document Artifacts

  • Baek, Dusan;Lee, Byungjeong;Lee, Jung-Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1404-1415
    • /
    • 2016
  • Because of the properties of software such as invisibility, complexity, and changeability, software configuration management (SCM) for software artifacts generated during software life-cycle has been used for guarantee of the quality of the software. However, the existing SCM system has only focused on code artifacts and software development document artifacts such as Software Requirements Specification (SRS), Software Design Description (SDD), and Software Test Description (STD). Moreover, software research-oriented project comes out late the code artifacts and the software development document artifacts. Therefore, there is a need for trace and management of software research document artifacts composed of highly abstracted non-functional requirements like 'the purpose of the project', 'the objectives', and 'the progress' before generation of the code artifacts and the software development document artifacts for a long time. Nevertheless, the existing SCM system cannot trace and manage them. In this paper, we propose content-based configuration management system comprised of the relevance link generation phase and content-based testing phase to trace and manage them. The preliminary application results show applicability and feasibility of the proposed system.

Architectural Approach Identification and Evaluation of Message System Using Design Pattern (설계 패턴을 활용한 라시지 시스템의 소프트웨어 아키텍처 접근법 식별 및 평가)

  • Koh, Hyon-Hee;Kung, Sang-Hwan;Park, Tae-Nyon
    • Journal of Internet Computing and Services
    • /
    • v.6 no.4
    • /
    • pp.9-20
    • /
    • 2005
  • To design a software system in success, architectural approaches which are in basis of architectural design, must be primarily selected. What to chose among various architecture styles as specific as architectural approaches, varies along with the system status of what kind of functional or non-functional quality requirements should satisfy. In this study, we propose the evaluation model for making a selection of architectural approaches, and select an architectural approach for message system actively using in diversified internet utilization and enterprise application integration, In other words, if there may be possibly existed several architectural approaches, we present the most suitable method of architectural approach out of them through an evaluation of analyzing the system requirements satisfaction level. In addition, when it performs specific design and implementation utilizing design patterns based on thread, developers would be able to link up the architecture design directly.

  • PDF