• Title/Summary/Keyword: System Requirements

Search Result 6,408, Processing Time 0.035 seconds

A Study on the Test and Evaluation Process Development for Korea Next Generation Highspeed Electric Multiple Unit (차세대 고속열차 시험평가 프로세스에 관한 연구)

  • Lee, Tae-Hyung;Kim, Sang-Soo;Kim, Seog-Won;Kim, Ki-Hwan;Chung, Heung-Chai
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.7 no.2
    • /
    • pp.7-11
    • /
    • 2011
  • A high-speed railway system represents a typical example of large-scale multi-disciplinary system, consisting of subsystems such as rolling-stock, electrical hardware, electronics, control, information, communication, civil technology etc. The system design and acquisition data of the large-scale system must be the subject under strict configuration control and management. Systems engineering technology development project for Korea next generation High-speed Electric Multiple Unit (HEMU) system in progress is a national large system development project that is not only a large-size and complex but also multi-disciplinary in nature. Therefore, all stakeholders must understand and share the functional and performance requirements of HEMU throughout its life-cycle phases. Also in the test and evaluation phase, all systems requirements must be verified. In 2011, the prototype train manufacturing will be completed. It will do test run on the commercial line and all systems requirements are verified until 2012. For the system verification, the test and evaluation process have to be established before the test trial run. Using a systems engineering tool, the system design database(SDD) with requirements traceability and development process management in the course of the development have to be established. This paper represents the test and evaluation process development based on the SEMP(Systems Engineering Management Plan) developed in the design stage. The test and evaluation process is refined and updated in comparison to the design stage one. The test and evaluation process consists of procedure, test and evaluation method and schedule. So through this process, it is defined that each systems requirements is verified on which test and about what time.

Deriving and Applying on SW Quality Characteristics of AIS based on ISO/IEC 25023 (ISO/IEC 25023 기반 AIS 품질특성별 SW 평가항목 도출 및 적용 연구)

  • Kim, Min-Woo;Park, Ji-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1956-1959
    • /
    • 2021
  • AIS(Automatic Identification System) provides navigational information including identification, position, a ship's course and status to ground and other vessels. To obtain AIS Marine Equipment Approval Service, various requirements are required and meet the requirements International Standards. However, most of the requirements are to identify essential functions, response time, hardware requirements, and communication protocols of AIS. The requirements for the quality of SW are not sufficient or detailed, and the weight is relatively low. As role of SW grows and types become more diverse, AIS SW quality inspection is essential. In this paper, We apply eight-quality characteristics of ISO/IEC 25023 standard to improve SW coverage quality of AIS. Suggest additional AIS SW requirements based on the eight quality characteristics of ISO/IEC 25023 standard.

Implementation of an Efficient Requirements Analysis supporting System using Similarity Measure Techniques (유사도 측정 기법을 이용한 효율적인 요구 분석 지원 시스템의 구현)

  • Kim, Hark-Soo;Ko, Young-Joong;Park, Soo-Yong;Seo, Jung-Yun
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.1
    • /
    • pp.13-23
    • /
    • 2000
  • As software becomes more complicated and large-scaled, user's demands become more varied and his expectation levels about software products are raised. Therefore it is very important that a software engineer analyzes user's requirements precisely and applies it effectively in the development step. This paper presents a requirements analysis system that reduces and revises errors of requirements specifications analysis effectively. As this system measures the similarity among requirements documents and sentences, it assists users in analyzing the dependency among requirements specifications and finding the traceability, redundancy, inconsistency and incompleteness among requirements sentences. It also extracts sentences that contain ambiguous words. Indexing method for the similarity measurement combines sliding window model and dependency structure model. This method can complement each model's weeknesses. This paper verifies the efficiency of similarity measure techniques through experiments and presents a proccess of the requirements specifications analysis using the embodied system.

  • PDF

Research on Deriving Requirements through Operational Scenarios and Interface Analysis of Future Logistics Transportation System based on Underground Tunnels (지하터널기반 미래물류 운송체계의 운영 시나리오 및 인터페이스 분석을 통한 요구사항 도출 연구)

  • Myung Sung Kim; Sung Jin Lee;Young Min Kim;Na Hyun Yi
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.20 no.spc1
    • /
    • pp.65-75
    • /
    • 2024
  • As the demand for logistics services increases rapidly in modern society, the existing freight delivery system through road transportation is caused various problems such as traffic congestion and greenhouse gas emissions. To solve that, the development of an 'underground logistics tunnel-based cargo transportation system' is currently being considered in Korea. In order to build a new concept stable and safe logistics system, derive system design requirements and functional specifications, and reflect them at the development of target system. In this study, to make foundation for development of an "underground logistics tunnel-based cargo transportation system," define system components through analysis from a hierarchical perspective, and the functions of each component were analyzed and defined. We identified what interfaces the components have at each stage of the operating process. Lastly, we defined a detailed operation scenario based on the previously derived results, deriving target system functional requirements.

Three-Phase Database Design for a Geographic Information System (지리(地理) 정보(情報) 시스템을 위한 삼단계(三段階) 데이터베이스 설계(設計))

  • Ock, Han-Suk;Kim, Gap-Youl;Kim, Chang-Hwan;Kim, Sang-Wook;Shin, Jae-Ho;Yang, Jae-Ung
    • Journal of Industrial Technology
    • /
    • v.18
    • /
    • pp.343-353
    • /
    • 1998
  • Effective design of a database is essential for operating application systems efficiently. This paper discusses database design for a geographic information system. This goals of database design are multiple: to satisfy the information content requirements of the specified users and applications; to provide a natural and easy-to-understand structuring of the information; and to support processing requirements and any performance objectives such as response time, processing time, and storage space. Database design is a very complex process and is decomposed in three phases: conceptual, logical, and physical design. In this paper, we first collect and analyze the requirements for a geographic information system. We also perform database design for these requirements through the three design phases systematically. Our results would contribute to the effective construction of a database for a geographic information system.

  • PDF

A Business Operating System Architecture based on Semantic Web and Web Service (시맨틱 웹과 웹 서비스 기반의 비즈니스운영체계 아키텍처)

  • Choe, Mi-Yeong;Bang, Chan-Seok;Gwon, Jeong-Min;Choe, In-Jun
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.05a
    • /
    • pp.429-435
    • /
    • 2005
  • True process collaboration can be accomplished through seamless integration of business processes and enterprise knowledge. Therefore, it is natural that the concept of Business Operating System (BOS), proposed by Delphi Group in 1994, is currently considered as a next evolutionary step for Business Process Management System (BPMS). Literature reports very little work, however, especially, on a comprehensive architecture of the system. This paper proposes an architecture of BOS with the following definition: ' BOS is an intelligent activity supporting system that provides a comprehensive and personalized work environment to each knowledge-intensive worker. ' To propose an architecture of BOS, the paper first identifies and classifies functional requirements for Business Operating System. Then, it proposes a data model and an architecture of the system to satisfy the functional requirements. The proposed architecture focuses on two essential technical requirements. First, the system should provide an effective means to integrate data and processes and to standardize distributed component systems. Secondly, the system should also be intelligent enough to assist workers to perform their knowledge-intensive work. The paper shows how these requirements can be achieved by using Semantic Web and Web Service.

  • PDF

A Study on Security Requirements of Shipboard Combat System based on Threat Modelling (위협 모델링 기반 함정 전투체계 보안 요구사항에 관한 연구)

  • Seong-cheol Yun;Tae-shik Shon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.3
    • /
    • pp.281-301
    • /
    • 2023
  • The shipboard combat system is a key system for naval combat that supports a command and control process cycle consisting of Detect - Control - Engage in real time to ensure ship viability and conduct combat missions. Modern combat systems were developed on the basis of Open Architecture(OA) to maximize acceptance of latest technology and interoperability between systems, and actively introduced the COTS(Commercial-of-the-shelf). However, as a result of that, vulnerabilities inherent in COTS SW and HW also occurred in the combat system. The importance of combat system cybersecurity is being emphasized but cybersecurity research reflecting the characteristics of the combat system is still lacking in Korea. Therefore, in this paper, we systematically identify combat system threats by applying Data Flow Diagram, Microsoft STRIDE threat modelling methodology. The threats were analyzed using the Attack Tree & Misuse case. Finally we derived the applicable security requirements which can be used at stages of planning and designing combat system and verified security requirements through NIST 800-53 security control items.

Development of the Formal Requirements Specification of the Safety-critical Railway Systems (안전 필수 철도 시스템 개발을 위한 요구 사항의 정형 명세 작성)

  • Lee, Jean-Ho;Hwang, Dae-Yon;Kim, Jin-Hyun;Park, Jun-Kil;Choi, Jin-Young;Hwang, Jong-Gyu;Yoon, Yong-Ki;Jo, Hyun-Jeong
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.12
    • /
    • pp.731-740
    • /
    • 2008
  • A railway control system is one of the typical safety-critical systems. It is required to use formal methods for the requirements specification and verification in order to develop the global-standard railway control systems based on the computer systems. In this paper, we develop a guideline for requirements specification using formal methods, and present a case study of the development of a computer-based railway control system through the application of the proposed guideline. We use the Statechart and the Z method for the formal requirements specifications and verify the consistency and completeness of the formal specifications of the requirements.

On the Development of Systems Safety Requirements Using Hazard Analysis Results (위험원 분석 결과를 반영한 시스템 안전 요구사항 생성에 관한 연구)

  • Kim, Jae-Chul;Lee, Jae-Chon
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.4
    • /
    • pp.9-16
    • /
    • 2011
  • Modern systems become more complex and the demand for systems safety goes up sharply. Thus, the proper handling of the safety requirements in the systems design is getting greatly increased attention these days. Hazard analysis has been one of the active areas of research in connection with systems safety. In this paper, we study a subject on how the hazard analysis results can be incorporated in the systems design. To this end we set up a goal on how to systematically generate safety requirements that should reflect hazard analysis results and be implemented in the systems design and development. To do so, we first review the process for systems design and suggest the associated Model. Then the process and results of hazard analysis are analyzed and Modeled particularly with emphasis on the safety data. The resulting data Model incorporating both the hazard analysis and system life cycle is used in the generation of safety requirements. Based on the developed data Model, the generation of the requirements, the construction of requirements DB, and the change management later on is demonstrated through the use of a computer-aided software tool.

(A Process Model to Improve the Requirements Change Management for the Development Methodologies) (개발 방법론의 요구 사항 변경 관리를 개선하기 위한 프로세스 모델)

  • 정규장;신종철;구연설
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.5_6
    • /
    • pp.503-514
    • /
    • 2003
  • In conventional development methodologies, requirements are considered to be not changing after analysis phase, and requirements specifications are used for the next step system design purpose. But in the real world, requirements can be changed and modified throughout the development life cycle according to end-user's more understanding about the target system, new IT technologies, changes of customer environment and market situation, and so on. So there needs a requirements change management process that can extend requirements management over the entire development life cycle and can support managing changes to the requirements after design phase. In this paper, a requirements change management process that can be integrated into conventional development methodologies is proposed to support the extension of requirements life cycle and managing changes to the requirements after design phase. This process was evaluated through an verification test with a widely used development methodology‘MaRMI’.