• Title/Summary/Keyword: Software completeness

Search Result 58, Processing Time 0.026 seconds

A Study on the RTMD(Requirement Tracing Matrix Design) Base on UML (UML기반의 요구사항 추적 매트릭스 설계)

  • Heo, Kwae-Bum;Kim, Young-Gyu;Yang, Dong-Il
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.3
    • /
    • pp.419-431
    • /
    • 2011
  • Design traceability has been widely recognized as being an integral aspect of software development. Also many projects for software application development have failed because that the projects did not analyze user requirements sufficiently and reflected them in the projects adequately. This thesis proposes a specification and tracing technique for object-oriented analysis and design. The subject of this study is the artifacts of UML development methodology. Therefore, to improve the quality of the software development cycle, in short, the system requirement of customers will be able to respond quickly.

Improving Reuse of Test Strategy based on ISO/IEC Standards

  • Min, Kyeongsic;Lee, Jung-Won;Lee, Byungjeong
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.37-46
    • /
    • 2019
  • A test plan is a high level document detailing objectives, processes, schedules and so on for verifying a developed software. And a test strategy, a component of a test plan, is about how to test software products to guarantee its quality and find bugs in the software in advance. Therefore, establishing effective and suitable test strategies is important for elaborating test processes. However, these tasks are difficult for project managers who write a test plan if they were not trained well in software test processes. And mis-designed test strategies will also mislead entire testing behaviors that testers would do. As a result, there would be a low quality software product in the end. To solve this problem, we propose a new test strategy reuse technique in this paper. By utilizing test plans of already completed software development projects, we lead test planer to reuse suitable and effective test strategies which were used in previous projects. To do so, we evaluate existing test strategies by utilizing ISO/IEC 25010 quality model for evaluating the suitability of test strategies and also use effectiveness metrics for test strategies. And from these evaluations, we predict completeness of new test plan that is written by reused test strategies. It can help the project manager to write an appropriate test plan for the quality characteristics which are selected as objectives for testing and software product. We show the possibility of our approach by implementing a prototype into the existing framework in a case study.

Use Case Points Estimation for the Software Cost Appraisal (소프트웨어 개발비 감정을 위한 유스케이스 점수 추정)

  • Kwon, Ki-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.27-36
    • /
    • 2020
  • The software development cost appraisal is treated as a part of the program completion appraisal, and the software engineering methodology is applied. In particular, software cost estimation techniques have been actively applied. For more information about the software development costs calculation, we can refer to the "SW cost estimation guide". Although successful appraisal of a number of development costs based on the guide has been processed, but a number of cases requiring discussion of appraisal results have been discovered. In this study, we propose a use case-based size estimation method to maintain the accuracy and consistency of size estimation. As a result of performing performance evaluation of the proposed method in an environment similar to the development cost appraisal case, it was proved that the accuracy was improved over the existing function points method.

Safety Computer System, CPCS Design in Nuclear Power Plant (안전등급 컴퓨터, 노심보호계산기계통 설계)

  • Sohn, Se-Do;Young Suh;Kang, Byung-Heon;Shin, Ji-Tae;Chun, Chong-Son
    • Nuclear Engineering and Technology
    • /
    • v.26 no.4
    • /
    • pp.502-506
    • /
    • 1994
  • The design of safety computer system is described along with the case of software design and testing in the Core Protection Calculator System (CPCS). The application of computer system in safety system requires not only hardware qualification but thorough testing on software to verify its correctness and completeness. The testing on software for CPCS is performed by comparing the outputs of two versions of code. One is implemented in assembly language and the other is in Fortran. The testing is performed in sequencial and overlapping manner. Phase I test verifies that each software module is implemented correctly by executing every branch. Phase II test verifies that the integrated software is complete, meeting its requirements specification and also the integrated system meet its requirement and timing constraints. Through these testing, the Yonggwang Nuclear Power Plant Units (YGN) 3 and 4 CPCS software is verified to be correct and complete, and the integrated system is designed as in its requirements specification.

  • PDF

An Indirect Data Transfer Technique based on MIL-STD-1553B for the Software Upgrade of Embedded Equipments on a Missile Assembly with Booster (완성 유도탄 탑재장비의 소프트웨어 업그레이드를 위한 MIL-STD-1553B 기반 간접적 데이터 전송 기술)

  • Kim, Kipyo;Yu, Haesung;Lee, Heoncheol;Yun, Seokjae;Ahn, Keehyun;Woo, Deogyoung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.1
    • /
    • pp.43-49
    • /
    • 2016
  • This paper addresses the problem of the software update or upgrade of embedded equipments on a missile assembly with booster. Because the embedded equipments are assembled delicately and closely one another with various communication and power cables, they should be very carefully disassembled to directly upgrade the software of a certain embedded equipment. This may cause not only the costs for disassembly and reassembly but also additional tests to verify the completeness of the reassembled missile as a missile assembly with booster. This paper presents an indirect data transfer technique based on MIL-STD-1553B through Guidance Control Unit to easily upgrade the software of other equipments without any additional costs caused by disassembly and reassembly. The presented technique was successfully applied to the software upgrade of various equipments on real missile assembly with booster.

Mathematical Verification of a Nuclear Power Plant Protection System Function with Combined CPN and PVS

  • Koo, Seo-Ryong;Son, Han-Seong;Seong, Poong-Hyun
    • Nuclear Engineering and Technology
    • /
    • v.31 no.2
    • /
    • pp.157-171
    • /
    • 1999
  • In this work, an automatic software verification method for Nuclear Power Plant (NPP) protection system is developed. This method utilizes Colored Petri Net (CPN) for system modeling and Prototype Verification System (PVS) for mathematical verification. In order to help flow-through from modeling by CPN to mathematical proof by PVS, an information extractor from CPN models has been developed in this work. In order to convert the extracted information to the PVS specification language, a translator also has been developed. ML that is a higher-order functional language programs the information extractor and translator. This combined method has been applied to a protection system function of Wolsong NPP SDS2(Steam Generator Low Level Trip). As a result of this application, we could prove completeness and consistency of the requirement logically. Through this work, in short, an axiom or lemma based-analysis method for CPN models is newly suggested in order to complement CPN analysis methods and a guideline for the use of formal methods is proposed in order to apply them to NPP Software Verification and Validation.

  • PDF

An Executable File formal for Embedded Virtual Machine (임베디드 가상 기계를 위한 실행파일포맷)

  • Cheong, Hang-Jong;Oh, Se-Man
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.5
    • /
    • pp.721-728
    • /
    • 2005
  • A virtual machine is a conceptual computer with a logical system configuration, made of software unlike physical systems made of hardware. Virtual machine technology for embedded systems is a requisite software technology for download solutions such as mobile devices, digital TVs, etc. At present, a research of virtual machines for embedded systems named EVM(Embedded Virtual Machine) is in progress. As a part of the research, we define the EFF(Executable File Format) as a file format for embedded systems. We also prove completeness of EFF by structurally mapping class file widely used to EFF.

  • PDF

Detecting Errors and Checking Consistency in the Object-Oriented Design Models (객체지향 설계방법에서 오류 검출과 일관성 점검기법 연구)

  • Jeong, Gi-Won;Jo, Yong-Seon;Gwon, Seong-Gu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2072-2087
    • /
    • 1999
  • As software size ever increases and user's requirements become more and more sophisticated., the importance of software quality is more and more emphasized. However, we are not satisfied for the present techniques on detecting errors and checking consistency in the object-oriented design model. This paper proposes a systematic approach which produces implementable rules to detect errors and check consistency. At first, the meta-models for UML diagrams are constructed, generalized meta-rules are reduced from the meta-models, and then the meta-rules are applied to produce the implementable rules. This approach enables to pursue the completeness of the rules and the automation of rule application. An example of rule application shows the feasibility of the rule application.

  • PDF

Describing Activities to Verify Artifacts(Documents and Program) in Software R&D (소프트웨어 R&D에서 산출물(문서와 프로그램) 검증을 위한 활동)

  • Dashbalbar, Amarmend;Lee, Eun-Chul;Lee, Jung-Won;Lee, Byeongjeong
    • Journal of Internet Computing and Services
    • /
    • v.17 no.2
    • /
    • pp.39-47
    • /
    • 2016
  • In software R&D artifacts including documents and program code are produced. There are two kinds of software R&D artifacts: Research artifacts and development artifacts. Research artifacts include software R&D planning document, annual report, final report, research note and so on. Software development artifacts include software requirements, software design description, testing plan, test report, and program code. It is important to verify the documents and to test code to check the direction of the R&D. Moreover, we should check relationships as such completeness and consistency between research and development artifacts. The verification and testing help project manager and researchers understand what they do during software projects. Therefore, in this study, we present a process to verify documents and program in software R & D. In the process we check documents produced in software R&D and test program code. We describe the process by using Essence elements including alpha, activity, and competency. We present a case study to show the effectiveness of the process.

State Management of the Development of National Cybersecurity Systems

  • Kryshtanovych, Myroslav;Storozhev, Roman;Malyshev, Kostiantyn;Munko, Anna;Khokhba, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.11-16
    • /
    • 2022
  • The main purpose of the study is to determine the main elements of the state management of the development of national cybersecurity. Cybersecurity ensures the protection of the properties of information resources and the operability of technical and software users and is directed against relevant cyber incidents. Therefore, today it is impossible to ignore the importance of public administration of the processes taking place in it. The methodological support of our study is determined by its goals and objectives and is based on the use of a combination of general scientific and special methods of scientific knowledge, which ensured the completeness and reliability of the results obtained. The article has limitations and concerns the lack of practical implementation of the research results. The study is purely theoretical to reflect the main aspects of the modern system of state management of the development of national cybersecurity. Further research requires an analysis of the world experience of state management of the development of national cybersecurity.