• Title/Summary/Keyword: 재사용 프로세스

Search Result 344, Processing Time 0.026 seconds

Transformation from Data Flow Diagram to SysML Diagram (데이터흐름도(DFD)의 SysML 다이어그램으로의 변환에 관한 연구)

  • Yoon, Seok-In;Wang, Ji-Nam
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.11
    • /
    • pp.5827-5833
    • /
    • 2013
  • Due to science and technology evolutions, modern systems are becoming larger and more complex. In developing complex systems, Model-Based Systems Engineering (MBSE), which is approach to reduce complexity, is being introduced and applied to various system domains. However, because of the modeling being made through a variety of languages, there is a problem with communication within the stakeholders and a lack of consistency in the models. In this paper, by investigating the rule explaining the transformation of one of the only traditional diagrams, DFD, to SysML and reusing the formerly built models, we attempt to implement by SysML. Analyzing each diagram's Metamodel and validating the connection of each component through bipartite graph especially suggest an effective transformation rule. Also, by applying to naval-combat system, we confirm efficiency of this study. Establishing the results of this study as basis for conducting further study, we will be able to transform other previous models gained from formerly built system to SysML. In this way, the stakeholder's communication can be improved and we anticipate that the application of SysML will be beneficial to the much efficient MBSE.

A Use-case based Component Mining Approach for the Modernization of Legacy Systems (레거시 시스템을 현대화하기 위한 유스케이스 기반의 컴포넌트 추출 방법)

  • Kim, Hyeon-Soo;Chae, Heung-Seok;Kim, Chul-Hong
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.7
    • /
    • pp.601-611
    • /
    • 2005
  • Due to not only proven stability and reliability but a significant investment and years of accumulated -experience and knowledge, legacy systems have supported the core business applications of a number of organizations over many years. While the emergence of Web-based e-business environments requires externalizing core business processes to the Web. This is a competitive advantage in the new economy. Consequently, organizations now need to mine the business value buried in the legacy systems for reuse in new e-business applications. In this paper we suggest a systematic approach to mining components that perform specific business services and that consist of the legacy system's assets to be leveraged on the modem platform. The proposed activities are divided into several tasks. First, use cases that realize the business processes are captured. Secondly, a design model is constructed for each identified use case in order to integrate the use cases with the similar functionalities. Thirdly, we identify component candidates from the design model and then adjust the component candidates by considering common elements among the candidate components. And also business components are divided into three more fine-grained components to deploy them onto J2EE/EJB environments. finally, we define the interfaces of components which provide functionalities of the components as operations.

Token-Based IoT Access Control Using Distributed Ledger (분산 원장을 이용한 토큰 기반 사물 인터넷 접근 제어 기술)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.377-391
    • /
    • 2019
  • Recently, system studies using tokens and block chains for authentication, access control, etc in IoT environment have been going on at home and abroad. However, existing token-based systems are not suitable for IoT environments in terms of security, reliability, and scalability because they have centralized characteristics. In addition, the system using the block chain has to overload the IoT device because it has to repeatedly perform the calculation of the hash et to hold the block chain and store all the blocks. In this paper, we intend to manage the access rights through tokens for proper access control in the IoT. In addition, we apply the Tangle to configure the P2P distributed ledger network environment to solve the problem of the centralized structure and to manage the token. The authentication process and the access right grant process are performed to issue a token and share a transaction for issuing the token so that all the nodes can verify the validity of the token. And we intent to reduce the access control process by reducing the repeated authentication process and the access authorization process by reusing the already issued token.

Development of Individual Temporary Equipment Material/Quality/Delivery Management Standards(Guide) for Temporary Equipment Rental Company (가설기자재 임대업체를 위한 개별 가설기자재 자재/품질/납품관리 기준(Guide) 개발)

  • Lee, Junho;Kim, Junsang;Yoou, Geonhee;Cho, Sehyun;Kim, JungYeol;Kim, Youngsuk
    • Korean Journal of Construction Engineering and Management
    • /
    • v.25 no.1
    • /
    • pp.62-72
    • /
    • 2024
  • Due to the distribution structure of domestic temporary equipment, quality control of temporary equipment is essential because more than 80% of temporary equipment is repeated and reused. Due to this importance, the Ministry of Land, Infrastructure and Transport has proposed quality management standards for temporary equipment for 10types of temporary equipments, including steel pipe support, but the overall quality of temporary eqipment cannot be confirmed because the quality is managed through sampling quality tests. In addition, although quality control standards exist for temporary material rental company, practical utilization was investigated and analyzed to be very low as they are mainly presented based on qualitative inspection standards by visual inspection. Therefore, the purpose of this study is to develop individual temporary material/quality/delivery management standards (Guides) for temporary equipment rental company to preemptively secure the quality of temporary equipment before bringing them into the construction site. If the standards developed through this study are applied to domestic temporary equipment rental companies, it is expected that high-quality temporary equipment with secured quality will be brought into the construction site as the quality of temporary equipment quality of domestic medium and small temporary equipment rental companies is improved safety accidents related to temporary structures.