• Title/Summary/Keyword: Requirements Extraction

Search Result 143, Processing Time 0.029 seconds

Use Case Identification Method based on Goal oriented Requirements Engineering(GoRE) (Goal 지향 요구공학 기반의 유스케이스 식별 방법)

  • Park, Bokyung;Kim, R. Youngchul
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.7
    • /
    • pp.255-262
    • /
    • 2014
  • Our previous research[1] suggested object extraction and modeling method based on Fillmore's case grammar. This approach had not considered of use case extraction and method. To solve this problem, we adopt Fillmore's semantic method as linguistic approach into requirement engineering, which refine fillmore's case grammar for extracting and modeling use cases from customer requirements. This Refined mechanism includes the definition of a structured procedure and the representation of visual notations for 'case' modeling. This paper also proposes the use case decision matrix to identify use case size from extracted use cases based on goal oriented requirement engineering(GoRE), which related with the complexity of use case, and also prioritizes the use cases with this matrix. It demonstrates our proposal with the bank ATM system.

Design of Scenario-based Requirements Extraction Tool (시나리오 기반 요구사항 추출 도구의 설계)

  • Kim, Chi-Su;Kim, Young-Tae;Kong, Heon-Tag;Lim, Jae-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.7
    • /
    • pp.1568-1574
    • /
    • 2009
  • One of the most difficult problems in user requirement engineering is the communication gap that exists between different end-users, stakeholders, and software engineers. Since scenarios allow different stakeholders to describe and review the problem in their own language instead of some abstract model, they are also a solution to the problem. We propose a progressive, iterative and interleaved process of using scenario at different requirement engineering stages including elicitation, analysis and validation. This process model has been applied to our TRES System. In our proposed system, we combine prototype, scenarios and use cases in a single and comprehensive framework to avoid most of the shortcomings in other tools. Our system is an XML-based system for scenario-driven requirement engineering. Within the TRES system, scenarios are stories capture information about users and their tasks, including the context of use. In our TRES system, scenarios are stored in XML-based database and described using XML notation.

Framework for Information Integration and Customization Using Ontology and Case-based Reasoning (온톨로지 및 사례기반추론을 이용한 맞춤형 통합 정보 생성 프레임워크의 제안)

  • Lee, Hyun-Jung;Sohn, M-Ye
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.4
    • /
    • pp.141-158
    • /
    • 2009
  • The requirements of knowledge customization have increased as information resources have become more various and the numbers of the resources are increased. Even if the method for collecting the information has improved like Really Simple Syndication (RSS), information users are still struggling for extracting and customizing the required information through the Web. To reduce the burden, we offer the dynamic knowledge customization framework by using ontology-based CBR. The framework consisting of three phases is comprised of the conversion phase of web information as a machine-accessible case, the extraction phase to find a case appropriate for information users' requirements, and the case customization phase to create knowledge depending on information user's requirements. Newly, the dynamic and intensity-based similarity is adopted to support timely dynamic change of users' requirements. The framework has adopted to create traveler's knowledge to the level users wanted.

  • PDF

Investigation of Building Extraction Methodologies within the Framework of Sensory Data

  • Seo, Su-Young
    • Spatial Information Research
    • /
    • v.16 no.4
    • /
    • pp.479-488
    • /
    • 2008
  • This paper performs investigation of the state-of-the-art approaches to building extraction in terms of their sensory input data and methodologies. For the last decades, there have been many types of sensory input data introduced into the mapping science and engineering field, which are considerably diverse in aspects of spatial resolution and data processing. With the cutting-edge technology in this field, accordingly, one of the key issues in GIS is to reconstruct three -dimensional virtual models of the real world to meet the requirements occurring in spatial applications such as urban design, disaster management, and civil works. Thus, this study investigates the strengths and weaknesses of previous approaches to automating building extraction with two categories - building detection and modeling and with sensor types categorized. The findings in this study can be utilized in enhancing automation algorithms and choosing suitable sensors, so that they can be optimized for a specific purpose.

  • PDF

THE EFFECTIVENESS AND CHARACTERISTICS OF 3 POINT TASK ANALYSIS AS A NEW ERGONOMIC AND KANSEI DESIGN METHOD

  • Yamaoka, Toshiki;Matsunobe, Takuo
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2001.05a
    • /
    • pp.15-19
    • /
    • 2001
  • This paper describes effectiveness and characteristics of 3 P(point) task analysis as a new Ergonomic and Kansei design method for extracting user demand especially. The key point in 3 P task analysis is to describe the flow of tasks and extract any problems in each task. A solution of a problem means a user demand. 3 P task analysis cal eliminate an oversight of check items by examining the users' information processing level. The suers' information processing level was divided into the following three stages for problem extraction: acquirement of information ---> understanding and judgment ---> operation. Three stages has fourteenth cues such as difficulty of seeing, no emphasis, mapping for extracting problems. To link analysis results to the formulation of a product concept. I added a column on the right side of the table for writing the requirements (user demand) to resolve the problems extracted from each task. The requirements are extracted by using seventh cues. Finally 3 P task analysis was compared with group interview to make the characteristics of 3 P task analysis, especially extracting user demand, clear.

  • PDF

Basic ]Requirements for Spectrum Analysis of Electroencephalographic Effects of Central Acting Drugs (중추성 작용 약물의 뇌파 효과의 정량화를 위한 스펙트럼 분석에 필요한 기본적 조건의 검토)

  • 임선희;권지숙;김기민;박상진;정성훈;이만기
    • Biomolecules & Therapeutics
    • /
    • v.8 no.1
    • /
    • pp.63-72
    • /
    • 2000
  • We intended to show some basic requirements for spectrum analysis of electroencephalogram (EEG) by visualizing the differences of the results according to different values of some parameters for analysis. Spectrum analysis is the most popular technique applied for the quantitative analysis of the electroen- cephalographic signals. Each step from signal acquisition through spectrum analysis to presentation of parameters was examined with providing some different values of parameters. The steps are:(1) signal acquisition; (2) spectrum analysis; (3) parameter extractions; and (4) presentation of results. In the step of signal acquisition, filtering and amplification of signal should be considered and sampling rate for analog-to-digital conversion is two-time faster than highest frequency component of signal. For the spectrum analysis, the length of signal or epoch size transformed to a function on frequency domain by courier transform is important. Win dowing method applied for the pre-processing before the analysis should be considered for reducing leakage problem. In the step of parameter extraction, data reduction has to be considered so that statistical comparison can be used in appropriate number of parameters. Generally, the log of power of all bands is derived from the spectrum. For good visualization and quantitative evaluation of time course of the parameters are presented in chronospectrogram.

  • PDF

Implementation and characterization of flash-based hardware security primitives for cryptographic key generation

  • Mi-Kyung Oh;Sangjae Lee;Yousung Kang;Dooho Choi
    • ETRI Journal
    • /
    • v.45 no.2
    • /
    • pp.346-357
    • /
    • 2023
  • Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off-the-shelf flash memory chip that is an intrinsic part of most commercial Internet of Things (IoT) devices. First, we define a hardware security source model to describe a hardware-based fixed random bit generator for use in security applications, such as cryptographic key generation. Then, we propose a hardware security primitive with flash memory by exploiting the variability of tunneling electrons in the floating gate. In accordance with the requirements for robustness against the environment, timing variations, and random errors, we developed an adaptive extraction algorithm for the flash PUF. Experimental results show that the proposed flash PUF successfully generates a fixed random response, where the uniqueness is 49.1%, steadiness is 3.8%, uniformity is 50.2%, and min-entropy per bit is 0.87. Thus, our approach can be applied to security applications with reliability and satisfy high-entropy requirements, such as cryptographic key generation for IoT devices.

Threat Diagnosis and Security Verification of Services Using Server-Side Browsers (서버 측 브라우저를 활용한 서비스들의 보안 위협 진단 및 안전성 검증)

  • Min-sang Lee;Hyoung-kee Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.693-706
    • /
    • 2024
  • The browser is utilized to render web pages in programs that perform tasks such as data extraction, format conversion, and development testing on web pages. Online services that utilize browsers can cause security issues if browser information is exposed or used in an unsafe manner. This paper presents security requirements for the safe use of browsers and explains the security threats that arise if these requirements are not met. Through evaluation, the security verification of commercial web applications is conducted, and the vulnerabilities that allow browsers to be exploited as attack tools are analyzed.

An Integration of Searching Area Extraction Scheme and Bi-directional Link Searching Algorithm for the Urban ATIS Application (도시부 ATIS 효율적 적용을 위한 탐색영역기법 및 양방향 링크탐색 알고리즘의 구현)

  • 이승환;최기주;김원길
    • Journal of Korean Society of Transportation
    • /
    • v.14 no.3
    • /
    • pp.45-59
    • /
    • 1996
  • The shortest path algorithm for route guidance is implicitly required not only to support geometrical variations of transportation network such as U-TURN or P-TURN but to efficiency search reasonable routes in searching mechanism. The purpose of this paper is to integrate such two requirements ; that is, to allow U-TURN and P-TURN possibilities and to cut down searching time in locating routes between two points (origin and destination) in networks. We also propose a new type of link searching algorithm which can solve the limitation of vine building algorithm at consecutively left-turn prohibited intersections. The test site is a block of Gangnam road network that has some left-turn prohibited and allowed U-TURN intersections. Four models have been identified to be comparatively analyzed in terms of searching efficiency. The Models are as follows : (i) Model 1 - Link Searching Dijkstra Algorithm without Searching Area Extraction (SAE) ; (ii) Model 2 - Link Searching Dijkstra Algorithm with SAE ; (iii) Model 3 - Link Searching Bidirectional Dijkstra Algorithm without SAE ; and (iv) Model 4 - Link Searching Bidirectional Dijkstra Algorithm with SAE. The results of comparative evaluation show that Model 4 can effectively find optimum path faster than any other models as expected. Some discussions and future research agenda have been presented in the light of dynamic route guidance application of the urban ATIS.

  • PDF

Digital Logic Extraction from Quantum-dot Cellular Automata Designs (Quantum-dot Cellular Automata 회로로부터 디지털 논리 추출)

  • Oh, Youn-Bo;Lee, Eun-Choul;Kim, Kyo-Sun
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.139-141
    • /
    • 2006
  • Quantum-dot Cellular Automata (QCA) is one of the most promising next generation nano-electronic devices which will inherit the throne of CMOS which is the domineering implementation technology of large scale low power digital systems. In late 1990s, the basic operations of the QCA cell were already demonstrated on a hardware implementation. Also, design tools and simulators were developed. Nevertheless, its design technology is not quite ready for ultra large scale designs. This paper proposes a new approach which enables the QCA designs to inherit the verification methodologies and tools of CMOS designs, as well. First, a set of disciplinary rules strictly restrict the cell arrangement not to deviate from the predefined structures but to guarantee the deterministic digital behaviors. After the gate and interconnect structures of the QCA design are identified, the signal integrity requirements including the input path balancing of majority gates, and the prevention of the noise amplification are checked. And then the digital logic is extracted and stored in the OpenAccess common engineering database which provides a connection to a large pool of CMOS design verification tools. Towards validating the proposed approach, we designed a 2-bit QCA adder. The digital logic is extracted, translated into the Verilog net list, and then simulated using a commercial software.

  • PDF