• Title/Summary/Keyword: non-functional attribute

Search Result 12, Processing Time 0.027 seconds

A Study on Quality Broker to Users Web Service Selection Based on Non-Functional Attributes

  • Sim, Sung-Ho;Song, Young-Jae
    • International Journal of Contents
    • /
    • v.5 no.3
    • /
    • pp.8-13
    • /
    • 2009
  • The recent Web service field emerges as the fastest growing IT paradigm as a result of the increasing interest in SOA (Services-Oriented Architecture) and the expansion of B2B market. With an increasing number of Web service that provide similar features, it becomes more important to provide the most appropriate service for the user's request. A service user in general requires the quality information of Web service when selecting a service among a number of similar Web services. Yet, finding a service through UDDI (Universal Description, Discovery and Integration) does not consider the non-functional aspects of users because it is only based on the functional aspects. That is, the quality, non-functional aspect will be an important factor for the mutual success of the user and provider. Using 3 factors in the Qos factors of the existing studies: the execution cost, reliability, and the quality level, the QoS of Web service is saved and the factors for the QoS are recorded in order to consider non-functional factors when selecting a Web service in this study. The Quality Broker determines the rank and shows the desired result of the service for users. The Quality Broker suggested in this thesis can be used to select a Web Service that considers the user-oriented and non-functional factors.

Performance-based Tracing Non-Functional Requirements of Embedded Software (내장형 소프트웨어의 비기능적 요구사항 성능 중심 추적)

  • Choi Jung-A;Chong Ki-Won
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.7
    • /
    • pp.615-623
    • /
    • 2006
  • A non-functional requirement is a property or quality that the proposed systems have to support the functional requirements. A non-functional requirement is reflected by quality attribute These non-functional requirements playa crucial role during system development, serving as selection criteria for choosing among decisions. It should be continuously considered through the software development process. In spite of the importance of the non-functional requirements, it received little attention because of ambiguousness and invisibility of non-functional requirements. Therefore non-functional model which is a process to analyze the non-functional requirement is proposed for improving the management efficiency of non-functional requirements. Also, this paper presents the trace among the UML diagrams to the conceptual model. According to the non-functional requirement development process, this paper achieved performance-based case study. After then, non-functional requirement should be traced using the UML diagrams.

A Non-Functional Requirements Analysis Method Using Quality Attribute Category (품질 속성 카테고리를 사용한 비기능 요구사항 분석방안)

  • 이은미;박수용
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10b
    • /
    • pp.460-462
    • /
    • 2004
  • 최근 시스템이 점차 대형화되고 복잡화되면서 시스템의 요구사항은 소프트웨어 프로젝트의 성패를 결정하는 중요한 문제로 인식되었다. 특히 소프트웨어 품질에 관심이 높아지면서 고품질의 소프트웨어 개발을 위해 노력이 활발히 이루어지고 있다. 이러한 노력의 일환으로 소프트웨어의 품질 속성을 나타내는 비기능 요구사항을 추출.분석을 위해 연구가 진행되고 있으나 극히 미진한 연구가 진행되고 있다. 본 논문은 이를 위해 소프트웨어 개발의 초기단계인 요구사항 단계에서 비기능 요구사항을 분석하고 이를 설계 단계에서 사용할 수 있도록 기술하는 방안을 제시한다.

  • PDF

MicroRNA Target Recognition: Insights from Transcriptome-Wide Non-Canonical Interactions

  • Seok, Heeyoung;Ham, Juyoung;Jang, Eun-Sook;Chi, Sung Wook
    • Molecules and Cells
    • /
    • v.39 no.5
    • /
    • pp.375-381
    • /
    • 2016
  • MicroRNAs (miRNAs) are small non-coding RNAs (~22 nucleotides) regulating gene expression at the post-transcriptional level. By directing the RNA-induced silencing complex (RISC) to bind specific target mRNAs, miRNA can repress target genes and affect various biological phenotypes. Functional miRNA target recognition is known to majorly attribute specificity to consecutive pairing with seed region (position 2-8) of miRNA. Recent advances in a transcriptome-wide method of mapping miRNA binding sites (Ago HITS-CLIP) elucidated that a large portion of miRNA-target interactions in vivo are mediated not only through the canonical "seed sites" but also via non-canonical sites (~15-80%), setting the stage to expand and determine their properties. Here we focus on recent findings from transcriptome-wide non-canonical miRNA-target interactions, specifically regarding "nucleation bulges" and "seed-like motifs". We also discuss insights from Ago HITS-CLIP data alongside structural and biochemical studies, which highlight putative mechanisms of miRNA target recognition, and the biological significance of these non-canonical sites mediating marginal repression.

A Study of Quality Metrics Process Design Methodology for Field Application Encryption under Network Security Environment (네트워크 보안 환경에서의 현장적용 중심 암호품질 만족도 평가 메트릭스 설계 프로세스)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.29-35
    • /
    • 2015
  • The network security encryption type is divided into two, one is point-to-point, second method is link type. The level of security quality attributes are a system security quality requirements in a networked environment. Quality attributes can be observed and should be able to be measured. If the quality requirements can be presented as exact figures, quality requirements are defined specifically setting quality objectives. Functional requirements in the quality attribute is a requirement for a service function which can be obtained through the encryption. Non-functional requirements are requirements of the service quality that can be obtained through the encryption. Encryption quality evaluation system proposed in this study is to derive functional requirements and non-functional requirements 2 groups. Of the calculating measure of the evaluation index in the same category, the associated indication of the quality measure of each surface should be created. The quality matrix uses 2-factor analysis of the evaluation for the associated surface quality measurements. The quality requirements are calculated based on two different functional requirements and non-functional requirements. The results are calculated by analyzing the trend of the average value assessment. When used this way, it is possible to configure the network security encryption based on quality management.

A Study on the Influence of Cable VOD Key Service Attributes on the Intention to Use Paid VOD (케이블VOD 주요 서비스 속성이 유료VOD 이용 의향에 미치는 영향 연구)

  • Lee, Jae Ho;Lee, Sang Un
    • Journal of Broadcast Engineering
    • /
    • v.24 no.3
    • /
    • pp.506-514
    • /
    • 2019
  • This study classified the different types of service attributes being provided through cable VOD services and looked at how the key service attribute types affect the willingness to use paid VOD for each group of paid and non-experienced users. Studies have shown that for a group of non-experienced people, 'content information-oriented attributes' have the greatest impact, and for a group of experienced people, 'convenience-oriented attributes' have the greatest impact. Thus, expanding users of paid VOD services requires setting up step-by-step strategies that match their respective collective characteristics. For a group of non-experienced people, it is necessary to take a direct persuasion strategy through the provision of relevant information and an indirect approach strategy through the expansion of promotion opportunities, and for an experienced group, a strategy to expand functional convenience.

Sensor Network Implementation of using Embedded Web Sever

  • Lee Jeong Gi;Shin Myung Souk;Park Do Joon;Lee Cheol Seung;Kim Choong Woon;Lee Joon
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.532-535
    • /
    • 2004
  • Architecture generation is the first step in the design of software systems. Most of the qualities that the final software system possesses are usually decided at the architecture development stage itself. Thus, if the final system should be usable, testable, secure, high performance, mobile and adaptable, then these qualities or non­functional requirements should be engineered into the architecture itself. In particular, adaptability is emerging as an important attribute required by almost all software systems. The machinery and tools in the remote site surveillance and connects intelligence information machinery and tools at Internet. We need the server which uses different embedded operating system to become private use. With the progress of information-oriented society, many device with advanced technologies invented by many companies. However, the current firmware technologies have many problems to meet such high level of new technologies. In this paper, we have successfully ported linux on an embedded system, which is based on intel StrongARM SA-1 1 10 processor, then written several network modules for internet-based network devices.

  • PDF

The Study of the Effect of Shopping Value on Customer Satisfaction, and Actual Purchase Behavior (쇼핑가치가 고객만족과 구매행동에 미치는 영향에 관한 연구 - 백화점 쇼핑행동을 중심으로 -)

  • Ahn, Kwangho;Lim, Byunghoon;Jung, Suntae
    • Asia Marketing Journal
    • /
    • v.10 no.2
    • /
    • pp.99-123
    • /
    • 2008
  • Consumer satisfaction/dissatisfaction is key determinant of brand loyalty and store patronage behavior. But the results of many customer satisfaction surveys implemented by department stores show that consumer satisfactions do not predict the actual patronage behaviors well. The main reason of these surprising results would be that the consumer satisfaction indexes do not include some important determinants of consumer satisfaction. Many customer satisfaction surveys mainly focus on the evaluation of functional benefits including product assortments, merchandise prices and locational convenience. Recent studies indicate that emotional/hedonic benefits strongly influence the consumer satisfaction, intention to repurchase and intention to revisit. Our study suggests that both functional values and hedonic values should be included in developing the index of consumer satisfactions. The purpose of our study is to investigate the relationship between shopping value and consumer satisfaction, and actual patronage behavior. Shopping values is defined as the difference between total benefits and total shopping costs. Total benefits include the dimensions of product quality, service quality, and hedonic benefits. Total costs are classified as the monetary costs and non-monetary cost. The conceptual framework developed for this empirical study is as follows.

  • PDF

A Study on the Integrated Performance Measurement Framework for R&D Organization (연구개발 조직의 통합적 성과평가 체계에 관한 연구)

  • Lee Yeong-Cha;Jeong Min-Yong;Jeong Seon-Ho
    • Proceedings of the Society of Korea Industrial and System Engineering Conference
    • /
    • 2002.05a
    • /
    • pp.113-118
    • /
    • 2002
  • Research and Development(R&D) was once considered to be a unique, creative and unstructured process that was difficult, if not impossible, to manage and control. R&D decisions impact the entire enterprise. Therefore, decisions must not be based solely on R&D's perception of what is important or worthwhile. R&D contributions are difficult to measure separately from other functional organizations such as manufacturing and marketing. While some firms are attempting to overcome perceived limitations in traditional accounting-based performance measures using ROI, EVA, others are embracing the use of non-financial measures for decision making and performance evaluation. In particular, many firms are implementing 'Balanced Scorecard(BSC)' systems that supplement traditional accounting measures with non-financial measures focused on at least three other perspectives-customers, internal business processes, and learning and growth. AHP is a popular multi-attribute decision making model that allows for the development of importance rankings. The AHP has been applied in a wide variety of practical settings to model complex decision problems. The former, determine Perspectives and the Key Performance indicator(KPI) through the former research, the latter compose the questionnaire for determine the weight of perspectives and KPIs. And then, make a survey with researchers about 4 perspectives and 18 KPIs. The results will be simulate with Expert Choice 2000 for determine the weights. This results helps establish the firm's business strategy and technology strategy The firm should establish the business strategy to consider market position, business growth potential, and technological capabilities.

  • PDF

Building Sensor P2P Network Design using Embedded System (임베디드 시스템을 이용한 빌딩 센서 P2P 네트워크 설계)

  • 이정기;이준
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1086-1090
    • /
    • 2004
  • Architecture generation is the first step in the design of software systems. Most of the qualities that the final software system possesses are usually decided at the architecture development stage itself. Thus, if the final system should be usable, testable, secure, high performance, mobile and adaptable, then these qualities or non-functional requirements should be engineered into the architecture itself. In particular, adaptability is emerging as an important attribute required by almost all software systems. The machinery and tools in the remote site surveillance and connects intelligence information machinery and tools at Internet. We need the server which uses different embedded operating system to become private use. With the progress of information-oriented society, many device with advanced technologies invented by many companies. However, the current firmware technologies have many problems to meet such high level of new technologies. In this paper, we have successfully ported linux on an embedded system, which is based on intel Strong ARM SA-1110 processor, then written several network modules for internet-based network devices.