• Title/Summary/Keyword: 요구사항 분석 프로세스

Search Result 296, Processing Time 0.03 seconds

Design and Implementation of Flying-object Tracking Management System by using Radar Data (레이더 자료를 이용한 항적추적관리시스템 설계 및 구현)

  • Lee Moo-Eun;Ryu Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.13D no.2 s.105
    • /
    • pp.175-182
    • /
    • 2006
  • Radars are used to detect the motion of the low flying enemy planes in the military. Radar-detected raw data are first processed and then inserted into the ground tactical C4I system. Next, these data we analyzed and broadcasted to the Shooter system in real time. But the accuracy of information and time spent on the displaying and graphical computation are dependent on the operator's capability. In this paper, we propose the Flying Object Tracking Management System that allows the displaying of the objects' trails in real time by using data received from the radars. We apply the coordinate system translation algorithm, existing communication protocol improvements with communication equipment, and signal and information computation process. Especially, radar signal duplication computation and synchronization algorithm is developed to display the objects' coordinates and thus we can improve the Tactical Air control system's reliability, efficiency, and easy-of-usage.

A Study on Critical Success Factors for Enterprise Security Collaboration (전사적 보안협업을 위한 핵심성공요인에 관한 연구)

  • Do, Jung-Min;Kim, Jungduk
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.235-242
    • /
    • 2014
  • Although the requirement of enterprise security implementation has been raised, a few research on security collaboration, which is one of the methods for enterprise security has been performed. This paper approached information security from the collaboration-centric perspective and propose critical success factors for security collaboration. In this study, a model of security collaboration, which includes coordination and cooperation activities was devised. Based on the previous research on organizational collaboration literature, the eight success factors for collaboration were deduced and examined the significance of the eight factors using the PLS-SEM statistical method with data of 106 samples who are security and IT professionals who have worked for more than 7 years. The result of the hypothesis test supported that trust, expertise motivation, collaboration performance criteria, top manager support and collaboration tools are the prominent factors of security collaboration.

A Study on Design of Project Integrated Management Tool for Improving Communication Process (의사소통 개선을 위한 프로젝트 통합관리 도구의 설계에 관한 연구)

  • Moon, Sung-Gae;Kim, Ji-Hyeok;Rhew, Sung-Yul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.133-141
    • /
    • 2009
  • To have successful execution of a development project on large scale, it is the most important to improve communication problems between project stakeholder. In this study, we design and implement project integrated management tools that improve the problems. In order to design and implement the tools, we gathered and arranged requirements based on the ISP data from S corporation and the problems of 23 projects which was executed in recent 2 years in a communication perspective, and then we conceptually design and propose the tools. We defined major parts of the functions and the architecture related to communication among the proposed architecture model, and we proposed process and detail functions to execute major functions. This study shows the possibility through a qualitative valuation to improve validation of the architecture model and a quantitative analysis in a communication perspective.

Application of Software Product Line Engineering for Developing Web Application Families (웹 시스템 군의 개발을 위한 소프트웨어 제품라인 공학의 적용)

  • Hwang, ByungHan;Jin, YoungTaek
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.39-60
    • /
    • 2017
  • Software product line engineering is widely recognized as an effective way for systematic software reuse, and many studies have been conducted to convert existing software development practices and processes into software product line. In order to convert existing software development into product line, a lot of investments are required such as dedicated development units, appropriate process selection and adaptation, and tool support. In particular, small businesses need business cases and specific practices for applying software product line engineering before its full-scale adoption. In this paper, we present a practical case of applying software product line engineering to the development of web system families and a process of systematically building and reusing software assets. To do this, we analyzed a number of web development projects and presented the experiences and various considerations of small software companies adopting software product line.

Web crawler Improvement and Dynamic process Design and Implementation for Effective Data Collection (효과적인 데이터 수집을 위한 웹 크롤러 개선 및 동적 프로세스 설계 및 구현)

  • Wang, Tae-su;Song, JaeBaek;Son, Dayeon;Kim, Minyoung;Choi, Donggyu;Jang, Jongwook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.11
    • /
    • pp.1729-1740
    • /
    • 2022
  • Recently, a lot of data has been generated according to the diversity and utilization of information, and the importance of big data analysis to collect, store, process and predict data has increased, and the ability to collect only necessary information is required. More than half of the web space consists of text, and a lot of data is generated through the organic interaction of users. There is a crawling technique as a representative method for collecting text data, but many crawlers are being developed that do not consider web servers or administrators because they focus on methods that can obtain data. In this paper, we design and implement an improved dynamic web crawler that can efficiently fetch data by examining problems that may occur during the crawling process and precautions to be considered. The crawler, which improved the problems of the existing crawler, was designed as a multi-process, and the work time was reduced by 4 times on average.

Software Engineering Research Trends Meta Analyzing for Safety Software Development on IoT Environment (IoT 환경에서 안전한 소프트웨어 개발을 위한 소프트웨어공학 메타분석)

  • Kim, Yanghoon;Park, Wonhyung;Kim, Guk-boh
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.11-18
    • /
    • 2015
  • The new environments arrive such as ICT convergence, cloud computing, and big data, etc., how to take advanta ge of the existing software engineering technologies has become an important key. In addition, the importance of re quirement analysis for secure software and design phase has been shown in the IoT environment While the existing studies have focused on the utilization of the technique applied to IoT environment, the studies for enhancing analys is and design, the prerequisite steps for safely appling these techniques to the site, have been insufficient. So, we tr y to organize research trends based on software engineering and analyze their relationship in this paper. In detail, w e classify the research trends of software engineering to perform research trends meta-analysis, and analyze an ann ual development by years. The flow of the major research is identified by analyzing the correlation of the key word s. We propose the strategies for enhancing the utilization of software engineering techniques to develop high-quality software in the IoT environment.

Research On Development of Usability Evaluation Contents and Weight of Importance for the Fire Detector Product (화재감지기 제품디자인 사용성 평가항목 개발 및 이해관계자 가중치평가 연구)

  • Jung, Ji-Yoon;Lee, Sang-Ki;Kim, Ji-Hyang;Yun, Su-Ji;Jang, Gi-Yong;Lee, Sung-Pil
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.1
    • /
    • pp.404-412
    • /
    • 2019
  • The purpose of this study is to develop the usability evaluation contents based on the needs of different stakeholder's related to the usability of the product, and to derive the design direction and apply it as the evaluation standard by applying the product design based on the results. I created a stakeholder map for a fire detector product and identified stakeholders related to usability. Based on 3 factors(Physical, cognitive, emotional) of the usability evaluation, I conducted survey on the building users and the building managers who have different requirements. There are 12 directions (ease of installation, durability, maintainability, additional functionality, effectiveness, attractiveness, visibility, consistency of information, environmental harmony, consistency, Image suitability, reliability). Through weighted analysis of three usability evaluation factors, I found factors were ranked in the same order of importance, but they were different in importance figure. Based on the results of the survey, overall product usability aspects were improved but effectiveness and environmental coordination aspects needed to be improved.

Designing an evaluation model for cyber security management system implementation for companies participating in the automobile supply chain (based on ISO/SAE 21434 standard and TISAX assessment requirements) (자동차 공급망 참여기업 대상 사이버보안 관리체계 구현 평가모델설계 (ISO/SAE 21434 표준 및 TISAX 평가 요구사항을 기반으로))

  • Baek Eun Ho
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.49-59
    • /
    • 2022
  • Cyber security in the automobile sector is a key factor in the life cycle of automobiles, and cyber security evaluation standards are being strengthened worldwide. In addition, not only manufacturers who design and produce automobiles, but also due to the nature of automobiles consisting of complex components and various parts, the safety of cybersecurity can be secured only when the implementation level of the cybersecurity management system of companies participating in the entire supply chain is evaluated and managed. In this study, I analyzed the requirements of ISO/SAE 21434 and TISAX, which are representative standards for evaluating automotive cybersecurity. Through a survey conducted on domestic/overseas company security officers and related experts, suitability and feasibility were reviewed according to priorities and industries, so 6 areas and 45 evaluation criteria were derived and presented as final evaluation items. This study is meaningful as a study in that it presented a model that allows companies participating in the automotive supply chain to evaluate the current cybersecurity management level of the company by first applying ISO/SAE 21434 and TISAX overall control processes before uniformly introducing them.

A Method for Migration of Legacy System into Web Service (레거시 시스템의 웹서비스화를 위한 마이그레이션 기법)

  • Park, Oak-Cha;Choi, Si-Won;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.16D no.4
    • /
    • pp.583-594
    • /
    • 2009
  • Most of the SOA solutions applicable to businesses and organizations are taking a top-down methodology. It starts with an analysis of an organization's requirements, followed by definition of business models and identification of candidate services and ends with finding or developing required services. Challenges in adopting SOA while abandoning legacy systems involve time and cost required during the process. Many businesses and organizations want to gradually migrate into SOA while making the most of the existing system. In this paper, we propose A Method for Migration of Legacy System into Web Service(M-LSWS); it allows legacy system to be migrated into web service accessible by SOA and be used as data repositories. M-LSWS defines procedures for migration into reusable web services through analysis of business processes and identification of candidate services based on design specification and code of legacy system. M-LSWS aims to migrate of legacy system into web service appropriate for SOA. The proposed method consists of four steps: analysis of legacy system, elicitation of reusable service and its specification, service wrapping and service registration. Each step has its own process and guideline. The eligibility of the proposed method will be tested by applying the method to book management system.

An Approach to Generation Monitoring Module using UML Model (UML모델을 이용한 모니터링 모듈 생성 방법)

  • Park, Jeong-Min;Jeong, Ok-Ran
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.9
    • /
    • pp.57-68
    • /
    • 2011
  • Self-healing is an approach to evaluating constraints defined in target system and to applying an appropriate strategy when violating the constrains. Today, the computing environment is very complex, so researches that endow a system with the self-healing's ability that recognizes problem arising in a target system are being an important issues. However, most of the existing researches are that self-healing developers need much effort and time to analyze and model constraints. Thus, in order to improve these problems, this paper proposes the method that automatically generates monitoring module by using UML models for self-healing. The approach proposes: 1) defining system knowledge required for self-healing from UML model, 2) process for generating monitor, by using monitor generated, and process for monitoring the problems. Through these, we can reduce the efforts of self-healing developers to analyze target system, and secure monitoring scope based on information of system knowledge. Also we can minimize the efforts to develop the monitoring environment automatically. to evaluate the proposed approach, we apply proposed approach to ATM prototype system for qualitative result, and perform quantitative evaluation through video conference system in our existing research.