• Title/Summary/Keyword: 중요한 사항

Search Result 3,005, Processing Time 0.037 seconds

A Revised MintRoute Protocol for (m,k)-firm Streams in Wireless Sensor Networks (무선 센서 네트워크에서 (m,k)-firm 스트림을 위한 MintRoute 프로토콜의 확장)

  • Kim, Ki-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.2050-2055
    • /
    • 2012
  • Since the wireless sensor networks become pervasive, various application-specific requirement have been emerged and suggested. Among them, reliability and real-time service are ones of big research challenges since sensed information is useless if a packet is lost and delivered later than deadline. Even though many research works have been proposed, they was designed to meet one of both requirements. To solve above problem, in this paper, we propose how to extend current protocol to meet two requirements together. More detailed, Mint Route protocol is revised to meet specific real-time requirement, (m,k)-firm stream in wireless sensor networks. Since the main operations in MintRoute are very similar to definition of (m,k)-firm stream, extension is achieved by modifying some parts of procedure. Finally, the simulation results are given and analyzed to validate the its suitability for reliable and real-time requirement.

A Study of Matrix Model for Core Quality Measurement based on the Structure and Function Diagnosis of IoT Networks (구조 및 기능 진단을 토대로 한 IoT네트워크 핵심품질 매트릭스 모델 연구)

  • Noh, SiChoon;Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.45-51
    • /
    • 2014
  • The most important point in the QoS management system to ensure the quality of the IoT system design goal is quality measurement system and the quality evaluation system. This research study is a matrix model for the IoT based on key quality measures by diagnosis system structure and function. Developing for the quality metrics measured Internet of Things environment will provide the foundation for the Internet of Things quality measurement/analysis. IoT matrix system for quality evaluation is a method to describe the functional requirements and the quality requirements in a single unified table for quality estimation performed. Comprehensive functional requirements and quality requirements by assessing the association can improve the reliability and usability evaluation. When applying the proposed method IoT quality can be improved while reducing the QoS signaling, the processing, the basis for more efficient quality assurances as a whole.

Software Quality Assurance Activities of Automatic Train Control System to meet Requirements of the IEC 62279 Standard (IEC 62279 요구사항 충족을 위한 열차제어시스템의 소프트웨어 품질보증 활동에 관한 연구)

  • Shim, Kyu-Don;Lee, Jong-Woo
    • Journal of the Korean Society for Railway
    • /
    • v.13 no.4
    • /
    • pp.412-418
    • /
    • 2010
  • This paper presents the methods to acquire the Safety Certificate from Independent Safety Assessment based on the IEC standard62279 which is commonly applied to railway system for Automatic Train Control(ATC) system in accordance with Urban Maglev project. This also shows approach methods and relative activities for project life- cycle to accomplish and ensure the system requirements of ATC system, RAMS and S/W quality activities. Furthermore, the key tasks conducted with ISA are noted in detail. These kind of activities for software quality of ATC system to obtain S afety Certificate could be a CASE model to improve the quality of domestic railway system and products, and also contribute to the growth of railway business and toward the achievement of overseas' railway signaling markets.

A Development Technique for Application Software Based on Intrusion Tolerant Requirements (침입감내 요구사항을 수용한 응용 소프트웨어 개발)

  • Kim Chul Jin;Lee Sook Hee;Cho Eun Sook
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.2
    • /
    • pp.233-248
    • /
    • 2005
  • An intrusion tolerant technology has been introduced as a solution to prevent intrusion accident for unknown fragility or attack. However, a systematic modeling technique is not applied into a system design and development based on intrusion tolerant technology. Especially, elements such as availability, integrity, reliability, confidentiality, and so on are important requirements in intrusion tolerant system. Nevertheless, current most of UML-based modeling techniques pass over or don't provide design techniques reflecting those requirements. Therefore, we know these weaknesses and propose both profile and design technique reflecting and applying intrusion tolerant requirements systematically in the development of application software based on intrusion tolerance. We expect that proposed technique can extend not only current UML's limitations but also can improve the quality of application software based on intrusion tolerance.

  • PDF

The end-to-end ATM performance QoS requirements in CBR guaranteed real-time services (항등비트율 실시간 보장형 서비스에서의 종단간 ATM 성능 QoS 요구사항의 추출)

  • 정재일
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.12
    • /
    • pp.2798-2805
    • /
    • 1997
  • The paper studies the Quality of Service(QoS) concept in Broadband Integrated Services Digital Network (B-ISDN). Guaranteeing the QoS requirements indistributed multimedia systems and networks is fundamentally an end-to-end issus, that is, from application to application. An important issue in the QoS translation between the application-level QoS and network-level QoS is that the translation depends not only on the translation between system resources and network resources, but also on the translation between thelayered protocol and the access procedures. In this paepr, we propose a methodology for translating the AAL(ATM Adaptation Layer) QoS parameters into the ATM layer QoS parameters in end-systems. The QoS parameters in the ATM layer and AAL are defined, and we concentrate on the translation from the AAL to the ATM layer, because the AAL must be designed to be service dependent and specific. As an example, we concentrate on the constant bit rate(CBR) guaranteed real-time service using AAL1 protocol.

  • PDF

Requirments Analysis and AAS Design for Energy Digital Twin (에너지 디지털 트윈을 위한 요구사항 분석 및 AAS 설계)

  • Park, Kishik;Oh, Seongjin;Kang, Changku;Sung, Inmo;Sakar, Aranya
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.109-117
    • /
    • 2020
  • Recently, with the advent of the 4th industrial revolution, digital twins are emerging as an important technology that connects and integrates physical systems and cyber systems. In this article, we analyzed the major requirements of digital twins required for the construction of digital twins of power equipments in the energy field, focusing on the industry 4.0-based Asset Administration Shell(AAS). However, since not so many studies have been conducted yet on a common platform or demonstration model for implementing digital twins both domestically and internationally, digital twin requirements are analyzed with the consideration of digital twinning of power equipment in the energy field. Also, we suggested necessary procedures and specific functions of AAS to establish a smart energy digital twin in the future by analyzing the core requirements necessary for the construction and designing the AAS design for specific power equipment.

A Strategy for Validation in Preliminary Design Stage using The Simulation of Model Behavior (모델 행동 양식의 시뮬레이션을 이용한 초기 디자인 검증 방법)

  • Shin, Seung-Hun;Park, Seung-Kyu;Choi, Kyung-Hee
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.153-160
    • /
    • 2010
  • Most part of errors in software development process are included during the stage of requirements definition and design. And correction or elimination of errors from those stages requires much more efforts and costs than those from the later part of software development process. However, despite of the importance of the validation of requirement definition and design stages, several kinds of problem have made it hard to be done successfully. Therefore, in this paper, we introduce a novel validation process for the preliminary design stage. The validation process is based on simulations of model and it can be used to validate requirements and model simultaneously. Models in the validation process will take only the behavior of software and be built on Ptolemy framework. The usability of our validation process is confirmed with a case study over DNS system environment. And the result of simulation shows well-known errors or vulnerabilities can be found with simulations of model which has the behavior of software. This means our validation process can be used as a process to validate requirements and models during the early stage of software development process.

Information System Audit Improvement Plan in Requirements Engineering-based Quality Assurance and Project Management (요구공학 기반 품질보증 및 프로젝트 관리에서의 정보시스템 감리 개선 방안)

  • Jung Chul, Shin;Dong Soo, Kim;Hee Wan, Kim
    • Journal of Service Research and Studies
    • /
    • v.11 no.1
    • /
    • pp.45-58
    • /
    • 2021
  • Requirements engineering can be seen as proceeding with various processes and activities such as extraction, analysis, specification, management, and verification without temporal and spatial constraints in the development environment of information systems that are becoming large and decentralized. Developing requirements well and conducting continuous evaluation and management is the shortcut to success in project management, and it is recognized as a very important matter in relation to requirements in the information system audit. When we conduct information system audit and conducting projects subject to audit, we need to improve the required engineering aspect. Therefore, this study derives inspection items suitable for the target project by referring to the audit inspection manual and audit inspection guide when conducting the current audit, and relates to the required engineering aspect among the contents of the inspection guide for each business type that is the basis for deriving the inspection items were derived for each audit point/audit area for the project management and quality assurance project type corresponding to the inspection items. The suitability of the extracted occupation items was verified through a questionnaire survey by experts.

A Study for Comparing the Legal Importance of Digital Forensics Issues in Korea (국내 디지털 포렌식 분야에서 법률적 이슈사항의 중요도 인식에 따른 우선순위 비교 연구)

  • Jae Bin Lee;Won Kyung Sung;Choong C. Lee
    • Information Systems Review
    • /
    • v.19 no.2
    • /
    • pp.185-209
    • /
    • 2017
  • In modern society, crime records have been digitized. Digital information is difficult to distinguish from original information, but the former is easy to modulate. This situation explains the increasing importance of digital forensics. However, digital forensic has several inefficiencies because of the rapid development of technology, unclear jurisdiction, and tool errors. This study surveyed digital forensic specialists and derived the priority of domestic digital forensic issues by redefining 17 issues in digital forensics from Brungs-Jamieson study in Australia. The present study was divided into four groups, namely, police, government and public corporations, private companies, and legal groups. The study could compare and analyze comparative analysis of existing studies in Australia and the US. This study can also examine differences in the results of each group in Korea. Thus, the key issues in Korea were derived as "Requirements to 'Fire Up' Original." The differences of the three groups in terms of legal issues were then identified. This finding enables us to understand differences in priorities and importance between groups and countries.

An Efficient Dynamic Workload Balancing Strategy (PIECES 프레임워크 중심의 요구사항 정제와 우선순위 결정 전략)

  • Jeon, Hye-Young;Byun, Jung-Won;Rhew, Sung-Yul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.10
    • /
    • pp.117-127
    • /
    • 2012
  • Identifying user requirements efficiently and reflecting them on the existing system is very important in a rapidly changing web and mobile environments. This study proposes the strategies to refining requirements and to prioritizing those refined requirements for changing of web and mobile application based on user requirements (e.g. mobile application comments, Q&A, reported information as discomfort factors). In order to refining the user requirements, those requirements are grouped by using the advancement of the software business of the Forum of standardization and the existing configuration-based programs. Then, we mapped them onto the PIECES framework to identifying whether the refined requirements are correctly reflected to the system in a way of valid and pure. To determine the priority of refined requirements, first, relative weights are given to software structure, requirements and categories of PIECES. Second, integration points on each requirement are counted to obtain the relative value of partial and overall score of a set of software structural requirements. In order to verifying the possibility and proving the effectiveness of proposing technique in this study, survey was conducted on changing requirements of mobile application which have been serviced at S University by targeting 15 people of work-related stakeholders.