• Title/Summary/Keyword: completeness requirements

Search Result 37, Processing Time 0.028 seconds

A design of a tool to verify completeness and consistency of object - oriented analysis (객체지향 분석의 완전성과 일관성 검증을 위한 툴의설계)

  • Kim, Chi-Su;Jin, Young-Jin
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2453-2460
    • /
    • 1997
  • Among the method of developing software there are many object-oriented analysis(OOA) techniques, and the new ones are being introduced continuously. The present OOA techniques, however, have difficulty in the identification and the verification of the objects and tend to ignore high-level control aspects of the problem due to the initial partitioning of them on the basis of the data. As a result, it brings inaccurate understanding and faults in the software which is required by users. Therefore the purpose of this paper is to design the TOVERC to verify completeness and consistency through cross-reference between the state transition diagram and the methods of object model in order to reflect the requirements of users in the analysis of software considering this problem.

  • PDF

Using Requirements Engineering to support Non-Functional Requirements Elicitation for DAQ System

  • Kim, Kyung-Sik;Lee, Seok-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.99-109
    • /
    • 2021
  • In recent machine learning studies, in order to consider the quality and completeness of data, derivation of non-functional requirements for data has been proposed from the viewpoint of requirements engineering. In particular, requirements engineers have defined data requirements in machine learning. In this study, data requirements were derived at the data acquisition (DAQ) stage, where data is collected and stored before data preprocessing. Through this, it is possible to express the requirements of all data required in the existing DAQ system, the presence of tasks (functions) satisfying them, and the relationship between the requirements and functions. In addition, it is possible to elicit requirements and to define the relationship, so that a software design document can be produced, and a systematic approach and direction can be established in terms of software design and maintenance. This research using existing DAQ system cases, scenarios and use cases for requirements engineering approach are created, and data requirements for each case are extracted based on them, and the relationship between requirements, functions, and goals is illustrated through goal modeling. Through the research results, it was possible to extract the non-functional requirements of the system, especially the data requirements, from the DAQ system using requirements engineering.

A Study on Proficiency Comparison Testing Between Testers Using ISO/IEC 25023 Software Quality Characteristics Evaluation (ISO/IEC 25023 소프트웨어 품질 특성 평가를 이용한 시험자간 비교시험에 관한 연구)

  • Lee, Chang-Hee;Kim, Myung-Sup;Kim, Yoon-Sook;Noh, A-Reum;Yang, Jung-Sim;Song, Sung-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.6
    • /
    • pp.18-27
    • /
    • 2020
  • This study compared and analyzed the results of proficiency testing between testers based on the international standard ISO/IEC 17043 proficiency testing requirements using ISO/IEC 25023 software quality characteristics evaluation. Application of the test was submitted to the KASTO as a software test in the electric test field defined by KOLAS. Among ISO/IEC 25023, the evaluation items for proficiency testing between testers were selected as functional completeness and time behavior. The comparison test between testers was carried out on May 28, 2019 at the accredited LG Electronics SW Laboratory in Seoul and attended by KOLAS assessors. The test evaluation method was measured once per tester with functional completeness, and measurement was repeated 10 times per tester according to time behavior. As a result, in the case of functional completeness, all 12 test steps were passed, and the satisfaction was evaluated. Time behavior was repeated 10 times, and the mean was 9.45 ± 0.01 seconds for testers 1 and 3 and 9.52 ± 0.0 seconds for tester 2, but there was no statistically significant difference. In conclusion, the proficiency of the testers was equal, and the reliability of the test results of the test institute was confirmed.

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

A Classification Technique for Configuration Requirements Elicitation of SaaS (SaaS의 설정 요구사항 추출을 위한 분류 기법)

  • Han, Jong-Dae;Shim, Jae-Kun;Lee, Byung-Jeong;Oh, Jae-Won;Wu, Chi-Su
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.12
    • /
    • pp.1259-1263
    • /
    • 2010
  • SaaS is an emerging paradigm for software development and deployment, expected to able to reduce cost. SaaS is also considered as a crucial technology for implementation of cutting-edge technology, such as distributed computing, green computing, and cloud computing. SaaS is requested to be configurable software to satisfy various customers, therefore it is very important to consider every configurability requirement during requirement elicitation. Our research suggests a classification technique to secure completeness of configuration requirement.

Service Quality and Consumer Satisfaction: An Empirical Study in Indonesia

  • LUKMAN, Lukman;SUJIANTO, Agus Eko;WALUYO, Agus;YAHYA, Muchlis
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.5
    • /
    • pp.971-977
    • /
    • 2021
  • The purpose of this research paper is: (1) to describe the service quality index; (2) describe the data quality index; and (3) describe the anti-corruption index of BPS Trenggalek, Indonesia. The approach chosen is quantitative with the type of survey research. The primary data collection technique was mainly based on a questionnaire distributed to 40 respondents, namely BPS service users in 5 (five) categories: the private sector, the banking industry, academics, offices, or agencies in Trenggalek Regency and universities. The results showed that the quality of BPS services was good and the data quality index where the respondents were satisfied with the data presented by BPS. Meanwhile, testing the anti-corruption index shows that BPS Trenggalek is very anti-corruption in providing services to consumers. The findings of this study suggested that to improve service quality, it is necessary to pay attention to several aspects, including published service requirements, easy requirements to be fulfilled, published procedure information, clear service process flow, published service times, and costs/tariffs are communicated. This study suggests updating data, data relevance, data accessibility, and data completeness to improve data quality. Furthermore, to maintain the very anti-corruption predicate, this study suggests maintaining service by upholding the prevailing ethics and norms.

An Adjustable Process of Requirements Prioritizing for Release Plan (릴리즈 플랜의 적응적 요구사항 우선순위 프로세스)

  • Seong, Jae-Seok;Kang, Dong-Su;Song, Chee-Yang;Baik, Doo-Kwon
    • The KIPS Transactions:PartD
    • /
    • v.15D no.6
    • /
    • pp.841-856
    • /
    • 2008
  • The priority of requirement is important because the priority is a critical activity of release plan especially in software development which has an open market customer. Also, it is important for stakeholders to select a method and aspects to prioritize requirements. The selection is based on the organizational experience of a priority process, the process model of the product, goals and a type of products, and dependencies between requirements. But, the current researches considered only static dependency between requirements and did not suggest a systematic priority process. In addition, the current researches only suggest limited aspects to prioritize requirements, such as cost and value. Therefore, this paper proposes an adjustable priority process based on a priority model to select a method and aspects for the suitable priority for product and organization. Especially, this paper enhances the completeness of a release plan by a definition of static and dynamic dependency types between requirements. This paper suggests a priority model, which considers the dependencies between requirement and various viewpoint of software development. Based on the priority model, the paper suggests a systematic priority process to promote reasonable decisions to the priority and release plan of requirement.

Relational Data Extraction and Transformation: A Study to Enhance Information Systems Performance

  • Forat Falih, Hasan;Muhamad Shahbani Abu, Bakar
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.4
    • /
    • pp.265-272
    • /
    • 2022
  • The most effective method to improve information system capabilities is to enable instant access to several relational database sources and transform data with a logical structure into multiple target relational databases. There are numerous data transformation tools available; however, they typically contain fixed procedures that cannot be changed by the user, making it impossible to fulfill the near-real-time data transformation requirements. Furthermore, some tools cannot build object references or alter attribute constraints. There are various situations in which tool changes in data type cause conflicts and difficulties with data quality while transforming between the two systems. The R-programming language was extensively used throughout this study, and several different relational database structures were utilized to complete the proposed study. Experiments showed that the developed study can improve the performance of information systems by interacting with and exchanging data with various relational databases. The study addresses data quality issues, particularly the completeness and integrity dimensions of the data transformation processes.

Development of Functional Suitability Evaluation Measure of DRM Software (DRM 소프트웨어의 기능적합성 평가 척도의 개발)

  • Lee, Ha-Young;Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.293-300
    • /
    • 2016
  • DRM software should conform completeness, correctness and appropriateness for the related function to protect digital right properly. Therefore, the systematization of functionality evaluation method based on the related standard is essentially required. In this paper, based on the software quality standard, I intended to construct a model to measure the quality about functionality including suitability, accuracy and interoperability of DRM software. To this, we developed functional suitability evaluation model by analyzing infra-technology of DRM software and quality requirements about functional suitability. I think that through this study, functionality criteria to enhance the quality level of DRM software. Through the accumulation of future evaluation practices, it is necessary to improve the suitability and validity of the DRM software functional suitability evaluation model.

Derivation of Security Requirements of Smart TV Based on STRIDE Threat Modeling (STRIDE 위협 모델링에 기반한 스마트 TV 보안 요구사항 도출)

  • Oh, In-Kyung;Seo, Jae-Wan;Lee, Min-Kyu;Lee, Tae-Hoon;Han, Yu-Na;Park, Ui-Seong;Ji, Han-Byeol;Lee, Jong-Ho;Cho, Kyu-Hyung;Kim, Kyounggon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.213-230
    • /
    • 2020
  • As smart TVs have recently emerged as the center of the IoT ecosystem, their importance is increasing. If a vulnerability occurs within a smart TV, there is a possibility that it will cause financial damage, not just in terms of privacy invasion and personal information leakage due to sniffing and theft. Therefore, in this paper, to enhance the completeness of smart TV vulnerability analysis, STRIDE threat classification are used to systematically identify threats. In addition, through the manufacture of the Attack Tree and the actual vulnerability analysis, the effectiveness of the checklist was verified and security requirements were derived for the safe smart TV use environment.