• Title/Summary/Keyword: 검증 소프트웨어

Search Result 2,336, Processing Time 0.025 seconds

A Binary Decision Diagram-based Modeling Rule for Object-Relational Transformation Methodology (객체-관계 변환 방법론을 위한 이진 결정 다이어그램 기반의 모델링 규칙)

  • Cha, Sooyoung;Lee, Sukhoon;Baik, Doo-Kwon
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1410-1422
    • /
    • 2015
  • In order to design a system, software developers use an object model such as the UML class diagram. Object-Relational Transformation Methodology (ORTM) is a methodology to transform the relationships that are expressed in the object model into relational database tables, and it is applied for the implementation of the designed system. Previous ORTM studies have suggested a number of transformation methods to represent one relationship. However, there is an implementation problem that is difficult to apply because the usage criteria for each transformation method do not exist. Therefore, this paper proposes a binary decision diagram-based modeling rule for each relationship. Hence, we define the conditions for distinguishing the transformation methods. By measuring the query execution time, we also evaluate the modeling rules that are required for the verification. After evaluation, we re-define the final modeling rules which are represented by propositional logic, and show that our proposed modeling rules are useful for the implementation of the designed system through a case study.

Requirements analysis and Use-case realization using Macrostruktur (거시구조 개념을 이용한 요구사항 분석과 Use-case 도출 방법)

  • Cho, Yong-Kyun;Bak, Yong-Ik;Park, Young-Bom
    • The KIPS Transactions:PartD
    • /
    • v.18D no.6
    • /
    • pp.433-442
    • /
    • 2011
  • As software is varied and grew in size, the importance of clear understanding and representing customer's need, has been emphasized. It is not easy to drive and define critical system needs, since requirements in early stage of the development, is and conceptual. Technical perspective view, Several theoretical analysis methods and validation techniques are introduced, but in practice, it is hard to drive clear customer's requirement. In this paper, to drive clear customer's requirements, Macrostruktur concept of textlinguistics is used. First, Macrostruktur of textlinguistics is used to analysis descriptive requirements. Second, Macrostruktur-rule is applied to analyzed Macrostruktur data in order to derive Macrostruktur-propositions. Finally, it is proposed to generating Use-case model using derived Macrostruktur-propositions.

PHR Profiling System Based on FHIR (FHIR 기반 개인건강기록 프로파일링 시스템 개발방법)

  • Kim, Young Sik;Kim, Il Kon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.7
    • /
    • pp.277-282
    • /
    • 2015
  • HL7 released V3 CDA(Clinical Document Architecture) and V2.x message standards for medical information exchange. Currently, these standards are successfully adopted by a number of nations across the globe. However, substantial amount of time is required to develop and implement these standards. Moreover, developers need a lot of time to understand these standards. To solve these issues from 2011, the HL7 standard framework started to discuss Fast Healthcare Interoperability Resources(FHIR) as next generation standard of healthcare information exchange. People's interests toward personal health record and smartphone penetration rate are growing and increasing rapidly. Therefore, our research team believes it is necessary to develop a PHR profiling system which could be accessed by using a smartphone and we developed the system. Through a FHIR Profile editor tool developed in Furore, we found that improvements could be made in generating and changing the profile. In order to build the PHR Profiling system, an Open-API on FHIR is used for exchanging information between electronic medical record system and PHR Profiling system. In the PHR Profiling system, the transactions of information between two systems are provided by RESTful service. In this study, we verify the efficiency of development of the PHR Profiling system through FHIR.

Word Spell: Associative-Phonological Learning Method for Second Language Learners (Word Spell: 외국어 학습자를 위한 단어 학습 방안, 연상 및 연음 효과를 중심으로)

  • Hong, Woneui;Moon, Sungwon;Gweon, Gahgene
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.10
    • /
    • pp.457-464
    • /
    • 2014
  • Foreign language learners want to remember newly learned vocabularies for as long as possible. As demand for learning English as a second language grows, effective ways of memorizing English vocabularies also attract much interest so that various methods and apparatus are developed in order to support effective memorization. In this research, we introduce a new way of memorizing English vocabularies and evaluate the performance compared to an existing qualified method. Our study result shows that learners who memorize English words using our suggested method maintained a higher retention rate than those who studied using the existing method. From this research, we expect to gain new insights of effective way in learning English vocabularies.

Predicting Movie Success based on Machine Learning Using Twitter (트위터를 이용한 기계학습 기반의 영화흥행 예측)

  • Yim, Junyeob;Hwang, Byung-Yeon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.7
    • /
    • pp.263-270
    • /
    • 2014
  • This paper suggests a method for predicting a box-office success of the film. Lately, as the growth of the film industry, a variety of studies for the prediction of market demand is being performed. The product life cycle of film is relatively short cultural goods. Therefore, in order to produce stable profits, marketing costs before opening as well as the number of screen after opening need a plan. To fulfill this plan, the demand for the product and the calculation of economic profit scale should be preceded. The cases of existing researches, as a variable for predicting, primarily use the factors of competition of the market or the properties of the film. However, the proportion of the potential audiences who purchase the goods is relatively insufficient. Therefore, in this paper, in order to consider people's perception of a movie, Twitter was utilized as one of the survey samples. The existing variables and the information extracted from Twitter are defined as off-line and on-line element, and applied those two elements in machine learning by combining. Through the experiment, the proposed predictive techniques are validated, and the results of the experiment predicted the chance of successful film with about 95% of accuracy.

Reconfigurable Test Execution Machine for Embedded System (재구성이 가능한 임베디드 시스템 테스트 실행기)

  • Kim, Kyoung Jin;Chung, Ki Hyun;Choi, Kyung Hee
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.7
    • /
    • pp.243-254
    • /
    • 2014
  • When building a testing environment with a testing platform, the configuration of test executor and its interface should be built to be appropriate for the system under test (SUT). That is, it is necessary to build the test executor and interface environment that can properly handle the input and output signals of SUT. If the testing platform is not extendable, it should be modified significantly whenever new SUTs and models are tested. It is a serious drawback that the test executor and interface configuration need to be modified depending on testing targets. To overcome the drawback, this paper proposes TEM(test Execution Machine), which allows for test executor to reconfigure its environment suitable to new SUTs by modifying the configuration file. The proposed TEM is verified through testing two real systems.

Destructive Test of a BLDC Motor Controller Utilizing a Modified Classification Tree Method (변형된 Classification Tree Method를 이용한 BLDC 모터제어기 파괴 시험)

  • Shin, Jae Hyuk;Chung, Ki Hyun;Choi, Kyung Hee
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.6
    • /
    • pp.201-214
    • /
    • 2014
  • In this paper, we propose a test case generation method adequate to destructive test of the BLDC(Brush Less Direct Current) motor controller used for the MDPS(Motor Driven Power Steering) system embedded in an automobile. The proposed method is a modified CTM(Classification Tree Method). CTM generates test cases assuming that all inputs are equally important. Therefore, it is very hard to generate test cases for extreme situations. To overcome the drawback and generate test cases specialized for destructive test. a modified CTM that compensates the limitation of traditional CTM is proposed. The proposed method has an advantage that it can intensively generate the test scenarios adequate to extreme situations by combining the test cases generated by the transitional CTM the while keeping the merit of the traditional CTM. The test scenarios for destructive test for the MDPS system embedded in a commercial automobile are generated utilizing the proposed method. The effectiveness of the proposed algorithm is verified through the test.

A Framework for Effectively Managing Dynamism of IoT Devices (IoT 디바이스의 동적 특성의 효과적 관리를 위한 프레임워크)

  • La, Hyun Jung;Park, Chun Woo;Kim, Soo Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.41 no.8
    • /
    • pp.545-556
    • /
    • 2014
  • Internet of Things (IoT), one of the emerging research areas, is the computing paradigm where various things connect to the network and cooperate with their neighbors to reach common goals. Computing with IoT devices opens up a new array of opportunities for providing value-added smart services and applications to end users. That is, IoT devices play an important role of providing useful services to the users. However, the states of IoT devices are dynamically changed at runtime, which come from their mobility, network connectivity, and a battery drain problem. This dynamism results in difficulties in managing these IoT devices. In this paper, we propose a framework to manage those IoT devices with dynamism. Hence, we first derive issues from IoT devices' dynamism. And, we define a set of requirements to manage the IoT devices and present a framework to manage the device dynamism. The framework is equipped by a device discovery method, a device status monitoring method, a device selection and connection method, and a device replacement method. Finally, we verify the feasibility and effectiveness of the framework through experiments.

Development of Variable Selection Technique using Stepwise Regression and Data Envelopment Analysis (단계적 회귀법과 자료봉합분석을 이용한 변수선택기법의 개발)

  • Jeong, Min-Eui;Yu, Song-Jin
    • Journal of KIISE:Software and Applications
    • /
    • v.41 no.8
    • /
    • pp.598-604
    • /
    • 2014
  • In this paper, we develop stepwise regression data envelopment model to select important variables. We formulate null hypothesis to understand the importance of each variable and use Kruskal-Wallis test for this purpose. If the Kruskal-Wallis test does reject the null hypothesis this will imply there is significant fluctuation in the efficiency score relative to base model. And therefore we have to further check the pair of variables that causes the fluctuation in order to determine its importance using Conover-Inman test. The proposed models helps understand the extent of misclassification decision making units as efficient/inefficient when variables are retained or discarded alongside provides useful managerial prescription to make improvement strategies.

A Plagiarism Detection Technique for Java Program Using Bytecode Analysis (바이트코드 분석을 이용한 자바 프로그램 표절검사기법)

  • Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.7
    • /
    • pp.442-451
    • /
    • 2008
  • Most plagiarism detection systems evaluate the similarity of source codes and detect plagiarized program pairs. If we use the source codes in plagiarism detection, the source code security can be a significant problem. Plagiarism detection based on target code can be used for protecting the security of source codes. In this paper, we propose a new plagiarism detection technique for Java programs using bytecodes without referring their source codes. The plagiarism detection procedure using bytecode consists of two major steps. First, we generate the token sequences from the Java class file by analyzing the code area of methods. Then, we evaluate the similarity between token sequences using the adaptive local alignment. According to the experimental results, we can find the distributions of similarities of the source codes and that of bytecodes are very similar. Also, the correlation between the similarities of source code pairs and those of bytecode pairs is high enough for typical test data. The plagiarism detection system using bytecode can be used as a preliminary verifying tool before detecting the plagiarism by source code comparison.