• Title/Summary/Keyword: Software Requirements Development

Search Result 554, Processing Time 0.026 seconds

Embedded Software Development Process and Systematic Technical Information Management (내장형 소프트웨어 개발 프로세스와 기술자료 관리)

  • Jeong, Chang-Min;Pyun, Jai-Jeong
    • Journal of Information Technology Services
    • /
    • v.2 no.1
    • /
    • pp.135-143
    • /
    • 2003
  • As the functional and nonfunctional requirements of defence systems become more complex and precise, concerning about the systematic development of software embedded into the defence systems has become surged up. In order to develop more reliable and correct software, and to extend the life cycle of the developing software, adoption of some engineering technologies such as development process, methodology, CASE tools and documentation is essentially required. This paper introduce an approach to technical information management in embedded software development process, with an instance, airborne ECM system development project. Particularly, we suggest and explain how to guide the software development according to process and methodology, and how to generate technical documents using CASE tool.

Formal Verification of Functional Properties of an SCR-style Software Requirements Specifications using PVS (PVS를 이용한 SCR 스타일의 소프트웨어 요구사항 명세에서 기능 요구 사항의 정형 검증)

  • Kim, Tae-Ho;Cha, Sung-Deok
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.1
    • /
    • pp.46-61
    • /
    • 2002
  • Among the many phases involved in software development, requirements analysis phase in generally considered to play a crucial role in determining the overall software quality. Therefore, many software development companies manages the phase as one of the important phase. Especially, safety assurance through requirements analysis for safety-critical systems is quite demanding, and national and international bodies routinely require safety demonstration. Among various approaches, inspection and formal methods are generally shown to be effective. In this paper, we propose a formal verification procedure for SCR(Software Cost Reduction)-style SRS(Software Requirements Specification) using the PVS specification and verification procedure and applied this procedure to an industrial system such that a shutdown system for Wolsung nuclear power plant. This system had been verified through inspection not formal verification. The application of formal methods is rare in Korea, so it is very important to experiment about formal verification to industrial systems.

A Method to Elicit Privacy Requirements and Build Privacy Assurance Cases for Privacy Friendly System (프라이버시 친화 시스템 개발을 위한 프라이버시 요구사항 도출 및 보증 사례 작성)

  • Cho, Ju Hye;Lee, Seok-Won
    • Journal of KIISE
    • /
    • v.44 no.9
    • /
    • pp.918-931
    • /
    • 2017
  • Recently, the spread of smartphones and various wearable devices has led to increases in the accumulation and usage of personal information. As a result, privacy protection has become an issue. Even though there have been studies and efforts to improve legal and technological security measures for protecting privacy, personal information leakage accidents still occur. Rather than privacy requirements, analysts mostly focus on the implementation of security technology within software development. Previous studies of security requirements strongly focused on supplementing the basic principles and laws for privacy protection and securing privacy requirements without understanding the relationship between privacy and security. As a result, personal information infringement occurs continuously despite the development of security technologies and the revision of the Personal Information Protection Act. Therefore, we need a method for eliciting privacy requirements based on related privacy protection laws that are applicable to software development. We also should clearly specify the relationship between privacy and security. This study aims to elicit privacy requirements and create privacy assurances cases for Privacy Friendly System development.

Design for ILS in Ammunition Development applying QFD Method (QFD를 활용한 탄약 ILS 효율화 방안 연구)

  • Lee, Seung-Mok;Park, Young-Won
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.5 no.2
    • /
    • pp.1-9
    • /
    • 2009
  • This paper proposes an effective method on the DFILS(Design for Integrated Logistics Support) in ammunition development applying QFD(Quality Function Deployment) method. The goal of this research is to define the Design for ILS approach at the start of the ammunition development and to yield a set of reusable requirements. Based on 000mm High-Explosive(Warship ammunition) development work, a QFD software tool, CUPID, was used to analyze and define the field force's requirements. Additionally, a set of reusable requirements are identified and defined for use during the Design for ILS development phase in the next-generation ammunition development process. These set of requirements that consider both the priority and importance of the VOC(Voice of Customer) will contribute to the early phase of the ammunition development to implement the Design for ILS specialty engineering effort.

  • PDF

Testing System for Automotive Software Using a General Purpose Development Board (범용 개발 보드를 이용한 차량용 소프트웨어 테스트 시스템 개발)

  • Kum, DaeHyun;Hong, JaeSeung;Jin, SungHo;Cho, JeongHun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.1
    • /
    • pp.17-24
    • /
    • 2012
  • Recently automotive software has been more complex and needs to be reduced its development time. Software testing of its functionalities and performance should be conducted in an early development phase to reduce time to market and the development cost. Software functional testing can be performed through simulating the hardware, but it is not guaranteed that evaluation of real-time performance using simulation has enough accuracy. Real-time performance can be precisely evaluated with hardware-in-the-loop simulation, but it costs time and effort to set up hardware for testing. In this paper, we suggest a testing system that can evaluate functional requirements and real time properties with a general-purpose development board in the early development phase. In addition, we improve reusability of the testing system through modularized and layered architecture. With the proposed testing system we can contribute to building reliable testing system at low cost without difficulty.

Design and implementation of mathematical programming software-LinPro (수리계획 소프트웨어 LinPro의 설계 및 구현)

  • 양광민
    • Korean Management Science Review
    • /
    • v.12 no.1
    • /
    • pp.139-156
    • /
    • 1995
  • This study addresses basic requirements for mathematical programming software, discusses considerations in designing these software, implementation issues facing in these types of applications development, and shows some examples of codes being developed in the course. This type of projects requires long and ever-changing evolutionary phases. The experience is therefore, valuaable in suggesting some useful hints which may be salvaged for similar projects as well as providing reusable codes. In particular, scanning and parsing the free-format inputs, symbol table management, mixed-language programming, and data structures dealing with large sparse matrices are indispensable to many management science software development. Extensions to be made are also discussed.

  • PDF

Mobile Development Process based on the UML Components (UML 컴포넌트를 이용한 모바일 개발 프로세스)

  • Park, Jong-Mo;Cho, Kyung-San
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.171-177
    • /
    • 2008
  • CBD(Component-based Development), which refers to the method of treating software as parts of a larger whole and developing new information systems through the assembly and synthesis of existing software, has been popular among many methods for developing software. However, CBD has limitations in the mobile environment which requires frequent requirements change and flexible process. To overcome those limitations, we propose an improved mobile development process based on the UML(Unified Modeling Language) components. Our Proposal is the simple development process implemented as three phase of component diagrams for the mobile system having quickly evolving technology and small-size project. Through the implementation of a mobile banking service with the proposed development process, we show that our proposal works efficiently for the requirements change and flexible development.

  • PDF

A Study on Analytical Methods of u-Healthcare Services Software Architecture Requirements for Quality Assurance (유-헬스케어 서비스 소프트웨어아키텍쳐 품질확보를 위한 요구사항 분석방법에 관한 연구)

  • Noh, Si-Choon;Moon, Song-Chul
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.45-52
    • /
    • 2014
  • All medical information system stakeholders and the environment exists. Medical information systems for development in these environments and non-functional requirements, functional requirements and quality goals are to be met. In order to achieve these goals in a variety of ways currently being made to develop information systems and various applications are emerging. However, the process of developing these health information systems meet the basic requirements and does not consider that from the point of view should not be separate. This study of the development of health information systems related to quality measurement indicators for the analysis software architectures, and medical information, information quality evaluation of service quality information associated indicators evaluation are offered. This way of associated indicators for the quality of the output sum and analyze the trends in software architecture u-Healthcare should be available for assessment. Quality score compared with pre-set goals for achievement and satisfaction levels of analysis further support the cause excerpt field use in analysis and improvement is possible.

Implementation of an Efficient Requirements Analysis supporting System using Similarity Measure Techniques (유사도 측정 기법을 이용한 효율적인 요구 분석 지원 시스템의 구현)

  • Kim, Hark-Soo;Ko, Young-Joong;Park, Soo-Yong;Seo, Jung-Yun
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.1
    • /
    • pp.13-23
    • /
    • 2000
  • As software becomes more complicated and large-scaled, user's demands become more varied and his expectation levels about software products are raised. Therefore it is very important that a software engineer analyzes user's requirements precisely and applies it effectively in the development step. This paper presents a requirements analysis system that reduces and revises errors of requirements specifications analysis effectively. As this system measures the similarity among requirements documents and sentences, it assists users in analyzing the dependency among requirements specifications and finding the traceability, redundancy, inconsistency and incompleteness among requirements sentences. It also extracts sentences that contain ambiguous words. Indexing method for the similarity measurement combines sliding window model and dependency structure model. This method can complement each model's weeknesses. This paper verifies the efficiency of similarity measure techniques through experiments and presents a proccess of the requirements specifications analysis using the embodied system.

  • PDF

Identifying Security Requirement using Reusable State Transition Diagram at Security Threat Location (보안 위협위치에서 재사용 가능한 상태전이도를 이용한 보안요구사항 식별)

  • Seo Seong-Chae;You Jin-Ho;Kim Young-Dae;Kim Byung-Ki
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.67-74
    • /
    • 2006
  • The security requirements identification in the software development has received some attention recently. However, previous methods do not provide clear method and process of security requirements identification. We propose a process that software developers can build application specific security requirements from state transition diagrams at the security threat location. The proposed process consists of building model and identifying application specific security requirements. The state transition diagram is constructed through subprocesses i) the identification of security threat locations using security failure data based on the point that attackers exploit software vulnerabilities and attack system assets, ii) the construction of a state transition diagram which is usable to protect, mitigate, and remove vulnerabilities of security threat locations. The identification Process of application specific security requirements consist of i) the analysis of the functional requirements of the software, which are decomposed into a DFD(Data Flow Diagram; the identification of the security threat location; and the appliance of the corresponding state transition diagram into the security threat locations, ii) the construction of the application specific state transition diagram, iii) the construction of security requirements based on the rule of the identification of security requirements. The proposed method is helpful to identify the security requirements easily at an early phase of software development.