• Title/Summary/Keyword: 모델식별

Search Result 1,080, Processing Time 0.021 seconds

A Scenario-based Goal-oriented Approach for Use Case Modeling (유즈케이스 모델링을 위한 시나리오 근간의 목표(Goal)지향 분석 방안)

  • Lee, Jae-Ho;Kim, Jae-Seon;Park, Soo-Yong
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.4
    • /
    • pp.211-224
    • /
    • 2002
  • As system become larger and more complex, it is important to correctly analyze and specify user's requirements. Use case modeling is widely used in Object-Oriented Analysis and Design(OOAD) and Component-Based Development(CBD). It is useful to mitigate the complexity of the requirements analysis. However, use cases are difficult to be structured, to explicitly represent non-functional requirements, and to analyze what is affected by changes of use cases. To alleviate these problems, we propose scenario-based goal-oriented approach for use case modeling. The approach is to apply goal-oriented analysis method to use case model. Since goal-oriented analysis method is not systematic and heuristics is considerably involved, we adopted scenarios as the basis for the goal extraction. The proposed method is applied to City Bus Information Subsystem(CBIS) in Intelligent Transport Systems(ITS) domain. The proposed approach helps software engineer to analyze what is affected by use case's changes and represent non-functional requirements.

A Comparative Study on Similarity Measure Techniques for Cross-Project Defect Prediction (교차 프로젝트 결함 예측을 위한 유사도 측정 기법 비교 연구)

  • Ryu, Duksan;Baik, Jongmoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.6
    • /
    • pp.205-220
    • /
    • 2018
  • Software defect prediction is helpful for allocating valuable project resources effectively for software quality assurance activities thanks to focusing on the identified fault-prone modules. If historical data collected within a company is sufficient, a Within-Project Defect Prediction (WPDP) can be utilized for accurate fault-prone module prediction. In case a company does not maintain historical data, it may be helpful to build a classifier towards predicting comprehensible fault prediction based on Cross-Project Defect Prediction (CPDP). Since CPDP employs different project data collected from other organization to build a classifier, the main obstacle to build an accurate classifier is that distributions between source and target projects are not similar. To address the problem, because it is crucial to identify effective similarity measure techniques to obtain high performance for CPDP, In this paper, we aim to identify them. We compare various similarity measure techniques. The effectiveness of similarity weights calculated by those similarity measure techniques are evaluated. The results are verified using the statistical significance test and the effect size test. The results show k-Nearest Neighbor (k-NN), LOcal Correlation Integral (LOCI), and Range methods are the top three performers. The experimental results show that predictive performances using the three methods are comparable to those of WPDP.

Korea Coast Guard's Human Biological Materials Storage Project for Identifying Bodies Recovered from the Sea: A Model Suggestion (해양변사자 신원확인을 위한 해양경찰의 인체유래물 보관사업 모델제시)

  • Joo, Hyunjung;Choo, Minkyu;Baek, Yoongi;Kim, Namyul;Choi, A-jin;Im, Sonyoung;Lee, Jongnam;Kim, Hyungkyu;Lee, Hanseong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.2
    • /
    • pp.171-178
    • /
    • 2018
  • The ocean is a harsh environment and Korea Coast Guard officers often face the threat of death or going missing in the line of duty. In order to promptly identify unknown bodies during mishaps, Korea Coast Guard Research Center has established an identification system using the DNA of its officers. This collected DNA can also be entombed in National Cemeteries when the remains are not recovered. The storage, disposal and quality control of the materials are overseen by the Governing Committee according to the Enforcement Rules for the Human Biological Materials Storage Project for the Identification of Officers Killed or Gone Missing in Action. Approximately 700 bodies are found per year along the Korean coast. An alternative method should be put in place for when identification through fingerprints and teeth are not applicable due to severe decomposition or partial recovery. We believe it would greatly contribute to helping identify the unknown bodies if the storage project could expand its data to include marine industry workers, relevant researchers and those involved in marine leisure activities.

Three-dimensional Imaging with an Endoscopic Optical Coherence Tomography System for Detection of Airway Stenosis (기도협착 측정을 위한 내시경 광 결맞음 단층촬영법을 이용한 3차원 이미징)

  • Kwon, Daa young;Oak, Chulho;Ahn, Yeh-Chan
    • Korean Journal of Optics and Photonics
    • /
    • v.30 no.6
    • /
    • pp.243-248
    • /
    • 2019
  • The respiratory tract is an essential part of the respiratory system involved in the process of respiration. However, if stenosis occurs, it interferes with breathing and can even lead to death. Asthma is a typical example of a reversible cause of airway narrowing, and the number of patients suffering from acute exacerbation is steadily increasing. Therefore, it is important to detect airway narrowing early and prevent the patient's condition from worsening. Optical coherence tomography (OCT), which has high resolution, is suitable for observing the microstructure of tissues. In this study we developed an endoscopic OCT system. We combined a 1300-nm OCT system with a servo motor, which can rotate at a high speed. A catheter was pulled back using a linear stage while imaging with 360° rotation by the motor. The motor was selected considering various requirements, such as torque, rotational speed, and gear ratio of pulleys. An ex vivo rabbit tracheal model was used as a sample, and the sample and catheter were immobilized by acrylic structures. The OCT images provided information about the structures of the mucosa and submucosa. The difference between normal and stenosed parts in the trachea was confirmed by OCT. Furthermore, through a three-dimensional (3-D) reconstruction process, it was possible to identify and diagnose the stenosis in the 3-D image of the airway, as well as the cross-sectional image. This study would be useful not only for diagnosing airway stenosis, but also for realizing 3-D imaging.

Knowledge and Beliefs About the Association Between Diet and Cancer Among Korean Immigrants in the U.S.A. (미국거주 한국인 이민자들의 암과 식품에 대한 지식과 신념)

  • Cho, Jae-Kyung;Kim, Katherine;Elena Yu
    • Korean Journal of Health Education and Promotion
    • /
    • v.15 no.1
    • /
    • pp.133-149
    • /
    • 1998
  • 본 연구는 미국에 사는 한국인 이민자들의 암예방과 식품에 대한 지식과 신념에 관하여 알아보는데 그 목적이 있다. 본 연구의 도구로는 미국 국민 건강연구조사 (NHIS)의 설문지를 한국어로 번역하였고, 연구의 대상자는 미국의 시카고에 거주하는 263명의 한국인 이민자들이다. 본 연구의 주된 연구결과는 다음과 같았다. (1) 대부분의 대상자(83.3%)들은 한국음식을 먹고 있다고 답하였다. (2) 대상자들의 47.5%가 영어를 전혀 못 읽거나 거의 못 읽는다고 답하였다. (3) 식생활 변화를 하지 않는 이유에 대해 현재 먹고 있는 음식을 즐기기 때문에 식생활을 바꾸고 싶지 않다는 답이 가장 많았다. (4) 우리가 먹고 마시는 음식과 관계 있는 주요질병에 대해서 25.4%의 응답자만이 암이라고 답하였다 (미국 NHIS 에서는 48%). (5) 응답자의 48.3%만이 섬유소에 대해 들어보았다고 응답하였다. (6) 7.1%의 응답자만이 섬유소가 많은 음식으로 corn flakes와 bran flakes를 고를 수 있었다. 이 결과로 보아 한국인 이민자들이 미국음식에 대해 잘 모르는 것으로 보인다. (7) 약 62%의 응답자들이 암예방에 관한 무료 보건강좌에 참석하고 싶다고 응답하였다. 보건강좌 장소에 대해 "교회'라고 답한 응답자가 가장 많았다. (8) 질병예방에 관한 정보를 어디에서 얻느냐는 질문에 대하여 "신문"이라고 답한 응답자가 가장 많았다. 본 연구에서 얻은 결과를 볼 때 대부분의 응답자들이 미국 정부에서 하고 있는 암예방 교육의 혜택을 받고 있지 않는 것으로 나타났다. 한국인 이민자들의 문화적 배경에 맞는 암교육이 필요하며, 영어를 잘 못하는 이민자들을 위해 한국말로 번역된 보건교육자료를 사용하여야 한다.교육자료를 사용하여야 한다.표현을 위하여 확장된 기본 모델을 중심으로 각 레벨의 구성 요소들의 형식적 의미(formal semantics)와 레벨 내 혹은 레벨 구성요소들간의 관계성(relationship), 그리고 제약조건의 표현과 질의 추론 규칙들을 식별하여 FOPL(First Order Predicate Logic)로 표현한다. 또한, 본 논문은 FOPL로 표현된 predicate들과 규칙들을 구현하기 위하여 Prolog로 변환하기 위한 이론적 방법론을 제시하고 정보자원 관리를 위한 기본 함수들과 스키마 진화(schema evolution)를 위한 방법론을 제안한다. 최저 잔류탁도를 나타내는 최적 응집제 주입량에서의 Zeta potential은 원수탁도가 5NTU일 경우 Alum, PAC 및 PACS 모두 -20mV∼-15mV사이였으며, 원수 탁도가 10NTU인 경우에는 0∼0.5mV 범위에 있는 것으로 나타나 응집제 종류 및 주입량이 상이하더라도 응집효율이 가장 양호한 상태에서의 Zeta potential은 일정한 범위내에 있는 것으로 나타났다.각 각 11.1, 10.2, 12.2 그리고 13.0%의 발달율을 보여 유의적인 차이를 보이지 않았다. 4. 수정 후 114 시간 개별배양된 수정란으로부터 분리된 small과 large의 할구를 공핵체로 사용한 처리구에서 핵이식 수정란의 세포융합율에 있어서 각각 71.0, 71.4, 69.9 및 77.1% 의 융합율올 보여 유의적인 차이를 나타내지 않았으며, 핵이식 수정란의 배반포기배로의 발달율에 있어서도 각각 11.4%, 8.0%, 17.2% 그리고 12.9% 의 발달율을 보여 유의적인 차이를 보이지 않았다. 이상의 결과로 보아 핵이식 수정란을 효율적으로 생산하기 위하여 수핵난자의 세포질에 ionomycin 과 DMAP 의

  • PDF

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

A Selection of Building Registration Method to Construct the Three Dimensional Information Cadastral Map (3차원정보지적도 모형 구축을 위한 건물등록 방법 선정)

  • Yang In Tae;Oh Yi Kyun;Yu Young Geol;Chun Gi Sun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.22 no.3
    • /
    • pp.245-251
    • /
    • 2004
  • Recently, in a field of cadastre, a computerization of cadastral map is in progress with great growth of GSIS field. Also, the needs fer the integration of land and building information are widely increasing for integral-management and its application of various land related information. Through a revision of cadastral laws to replace the existing 2D-Cadastre with the 3D-Cadastre, a legal basis to register the position of buildings and facilities is prepared in the governmental or civil fields. This paper presented 3D-Cadastre theory that has been studied on Europe and surveyed building position directly with Totalstation at cadastral control point after choosing pilot test area, Also, the most efficient surveying method of registering building in a cadastral map is presented with comparing and analyzing building position after surveying digital orthophoto and digital map. And it is constructed a 3D information cadastral map model that can make the integral management of land, building, connecting land recorders, building management ledgers, building titles, building pictures, and related attribute information.

Detection Model of Malicious Nodes of Tactical Network for Korean-NCW Environment (한국형 NCW를 위한 전술네트워크에서의 악의적인 노드 검출 모델)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.71-77
    • /
    • 2011
  • NCW(Network Centric- Warfare) encompasses the concept to use computer data processing and network linkage communications techniques, share information and furthermore, enhance the effectiveness of computer-operating systems. As IT(Information & Technology) have become developed in the recent years, the existing warfare system-centered conventional protocol is not use any longer. Instead, network-based NCW is being widely-available, today. Under this changing computer environment, it becomes important to establish algorithm and build the stable communication systems. Tools to identify malign node factors through Wireless Ad-hoc network cause a tremendous error to analyze and use paths of even benign node factors misreported to prove false without testing or indentifying such factors to an adequate level. These things can become an obstacle in the process of creating the optimum network distribution environment. In this regard, this thesis is designed to test and identify paths of benign node factors and then, present techniques to transmit data through the most significant open short path, with the tool of MP-SAR Protocol, security path search provider, in Ad-hoc NCW environment. Such techniques functions to identify and test unnecessary paths of node factors, and thus, such technique users can give an easy access to benign paths of node factors.

A Defect Prevention Model based on SW-FMEA (SW-FMEA 기반의 결함 예방 모델)

  • Kim Hyo-Young;Han Hyuk-Soo
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.7
    • /
    • pp.605-614
    • /
    • 2006
  • The success of a software development project can be determined by the use of QCD. And as a software's size and complexity increase, the importance of early quality assurance rises. Therefore, more effort should be given to prevention, as opposed to correction. In order to provide a framework for the prevention of defects, defect detection activities such as peer review and testing, along with analysis of previous defects, is required. This entails a systematization and use of quality data from previous development efforts. FMEA, which is utilized for system safety assurance, can be applied as a means of software defect prevention. SW-FMEA (Software Failure Mode Effect Analysis) attempts to prevent defects by predicting likely defects. Presently, it has been applied to requirement analysis and design. SW-FMEA utilizes measured data from development activities, and can be used for defect prevention on both the development and management sides, for example, in planning, analysis, design, peer reviews, testing, risk management, and so forth. This research discusses about related methodology and proposes defect prevention model based on SW-FMEA. Proposed model is extended SW-FMEA that focuses on system analysis and design. The model not only supports verification and validation effectively, but is useful for reducing defect detection.

Memory Efficient Query Processing over Dynamic XML Fragment Stream (동적 XML 조각 스트림에 대한 메모리 효율적 질의 처리)

  • Lee, Sang-Wook;Kim, Jin;Kang, Hyun-Chul
    • The KIPS Transactions:PartD
    • /
    • v.15D no.1
    • /
    • pp.1-14
    • /
    • 2008
  • This paper is on query processing in the mobile devices where memory capacity is limited. In case that a query against a large volume of XML data is processed in such a mobile device, techniques of fragmenting the XML data into chunks and of streaming and processing them are required. Such techniques make it possible to process queries without materializing the XML data in its entirety. The previous schemes such as XFrag[4], XFPro[5], XFLab[6] are not scalable with respect to the increase of the size of the XML data because they lack proper memory management capability. After some information on XML fragments necessary for query processing is stored, it is not deleted even after it becomes of no use. As such, when the XML fragments are dynamically generated and infinitely streamed, there could be no guarantee of normal completion of query processing. In this paper, we address scalability of query processing over dynamic XML fragment stream, proposing techniques of deleting information on XML fragments accumulated during query processing in order to extend the previous schemes. The performance experiments through implementation showed that our extended schemes considerably outperformed the previous ones in memory efficiency and scalability with respect to the size of the XML data.