• Title/Summary/Keyword: Informal Requirements

Search Result 11, Processing Time 0.022 seconds

Quality Improvement by enhancing Informal Requirements with Design Thinking Methods

  • Kim, Janghwan;Kim, R. Young Chul
    • International journal of advanced smart convergence
    • /
    • v.10 no.2
    • /
    • pp.130-137
    • /
    • 2021
  • In the current software project, it is still very difficult to extract and define clear requirements in the requirement engineering. Informal requirements documents based on natural language can be interpreted in different meanings depending on the degree of understanding or maturity level of the requirements analyst. Also, Furthermore, as the project progresses, requirements continue to change from the customer. This change in requirements is a catastrophic failure from a management perspective in software projects. In the situation of frequent requirements changes, a current issue of requirements engineering area is how to make clear requirements with unclear and ambigousrequirements. To solve this problem, we propose to extract and redefine clear requirements by incorporating Design Thinking methodologies into requirements engineering. We expect to have higher possibilities to improve software quality by redefining requirements that are ambiously and unclearly defined.

3D Object State Extraction Through Adjective Analysis from Informal Requirements Specs (비정형 요구사항 스펙에서 형용사 분석을 통한 3D 객체 상태 추출화)

  • Ye Jin Jin;Chae Yun Seo;Ji Hoon Kong;R. Young Chul Kim
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.10
    • /
    • pp.529-536
    • /
    • 2024
  • Recent advancements in AI technology have led to its application across various fields. However, the lack of transparency in AI operations makes it challenging to guarantee the quality of its outputs. Therefore, we integrate requirements engineering in software engineering with conversational AI technology to ensure procedural fairness. Traditional requirements engineering research uses grammar-centered analysis, which often fails to fully interpret the semantic aspects of natural language. To solve this, we suggest combining Noam Chomsky's syntactic structure analysis with Charles Fillmore's semantic role theory. Additionally, we extend our previous research by analyzing adjectives in informal requirement sentence structures. This enables precise emotional analysis of the main characters in comics. Based on the results of the analysis, we apply the emotional states of the objects to the states in the UML state diagram. Then, we create the 3D object with Three.js based on the object that reflects the emotional states in the state diagram. With this approach, we expect to represent the emotional state of a 3D object.

Requirements analysis for production of freeform concrete segments. (비정형 콘크리트 부재 생산을 위한 요구조건 분석)

  • Sung, Soojin;Lee, Donghoon;Kim, Sunkuk
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2014.05a
    • /
    • pp.68-69
    • /
    • 2014
  • Production of freeform concrete segments use various molds because of the unique shape of it unlike common concrete segments. As a result, the mold for freeform concrete segments cannot be reused. Therefor, cost overrun is occurred by needs of more time and manpower to produce the freeform concrete segments compared with common concrete segments. To prevent the cost overrun, a new production method for the freeform concrete segments is needed to develop and the requirements for it should be analyzed before. Therefor, the aim of this study is requirements analysis for production of freeform concrete segment. The requirements of production of freeform concrete segments and form for it is analyzed in this study. The result of this study would be used to suggest the new production method of freeform concrete segments.

  • PDF

The Bright and Dark Side of Pre-existing Social Ties and Relational Orientation in Research Collaborations in South Korea

  • HEMMMERT, Martin;KIM, Jae-Jin
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.1
    • /
    • pp.279-290
    • /
    • 2020
  • Informal networks between individuals are widely seen as important in East Asian business systems. However, while the performance implications of guanxi in China have been extensively studied, much less is known on how informal networks may influence business outcomes in other East Asian countries. We examine informal networks in inter-organizational research collaborations in South Korea by studying the role of pre-existing social ties and relational orientation in new product development (NPD) collaborations and university-industry research (UIR) collaborations. We conduct an interview-based, in-depth case analysis of five NPD collaborations and five UIR collaborations. Pre-existing social ties and relational orientation are prevalent in both types of research collaborations. However, they have different consequences for collaboration outcomes. Pre-existing social ties strongly vary in their types and strength, and negatively affect collaboration outcomes unless they result in the selection of competent and motivated partners. Relational orientation manifests itself in a task-related and social exchange between collaboration partners, which contributes to outcomes such as knowledge acquisition and business performance. Korean collaboration managers should rely only on pre-existing social ties that are well-aligned with task-related requirements when initiating and conducting research collaborations. However, the creation of strong relationships between collaboration team members of partnering organizations should be encouraged.

An Evaluation Method for Security Policy Model Based on Common Criteria (공통평가기준에 의한 보안정책모델 평가방법)

  • 김상호;임춘성
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.57-67
    • /
    • 2003
  • Security Policy Model is a structured representation using informal, semiformal or formal method of security policy to be enforced by TOE. It provides TOE to get an assurance to mitigate security flaws resulted from inconsistency between security functional requirements and functional specifications. Therefore, Security Policy Model has been required under an hish evaluation assurance level on an evaluation criteria such as ISO/IEC 15408(Common Criteria, CC). In this paper, we present an evaluation method for security policy model based on assurance requirements for security policy model in Common Criteria through an analysis of concepts, related researches and assurance requirements for security policy model.

The Establishment of the GIS based Resource Map System for New and Renewable Energy (GIS 기반 신재생에너지 자원지도시스템 구축)

  • Yun, Chang-Yeol;Kim, Kwang-Deuk;Jeong, Jae-Hyuck
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2006.11a
    • /
    • pp.149-152
    • /
    • 2006
  • New and renewable energy information becomes one of the greatest issues because of serious environment problems and limited fossil resources However, There are few system to manage and utilize new and renewable energy information efficient. Therefore this study establish the GIS based Resource Map System to save and analyze new and renewable energy Informal ion about solar energy, wind power, small hydro, biomass, and geothermal. This Resource Map System is composed of the management system, practical system, field system and Web-service system. This System can Provide var ious spatial analysis tools such as data searching, treating thematic maps, evaluating location requirements for energy facilities.

  • PDF

A Study on Verification of Rail Signal Control Protocol specified in I/O FSM (I/O FSM으로 명세화된 철도 신호제어용 프로토콜 검정에 관한 연구)

  • Seo Mi-Seon;Hwang Jong-Gyu;Lee Jae-Ho;Kim Sung-Un
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.1241-1246
    • /
    • 2004
  • The verification confirms a correspondence between requirements and a specification before implementing. The problem in the formal method verifying a protocol specification using model checking is that the protocol behaviors must be always specified in L TS(Label Transition System). But if Region Automata is applied to the model checking, it is enable to verify whether properties are true on specification specified in I/O FSM(Input/Output Finite State Machine) as well as LTS. In this paper, we verify the correctness of rail signal control protocol type 1 specified in I/O FSM by using model checking method and region automata. This removes many errors and ambiguities of an informal method used in the past and saves down expenditures and times required in the protocol development. Therefore it is expected that there will be an increase in safety, reliability and efficiency in terms of the maintenance of the signaling system by using the proposed verification methods.

  • PDF

A Study on the Uniform Design for Postmen (집배원 유니폼 디자인 개발에 관한 연구 -2000년도 착용 유니폼을 중심으로-)

  • 신혜영
    • Journal of the Korean Society of Costume
    • /
    • v.50 no.7
    • /
    • pp.33-46
    • /
    • 2000
  • Uniform is the dress of distinctive design or fashion worn by members of a particular group or serving as a means of identification. The postman's uniform of Ministry of Communication should be distinctive or characteristic clothing to provide high functionality and symbolization of job characteristics, cost effectiveness and esthetic. In order to design the postman's new uniform available in 2000, there has been a satisfaction survey to 1,116 postmen. A thorough analysis of survey and informal and face-to-face discussion with postmen give the direction of design concept. One of the most important things in the design concept is to make the uniform high quality & refinement. The style is a refined jumper suit in consideration of form stability, wearing satisfaction, convenience in activity. The basic colors selected are navy and medium gray. The colors of jumper are MOC red ; C.I color Green : a representative color of youth, white : a symbolic color of bright future. All three colors are plaid on a basic nary color. In the selection of the textile, synthetic fiber (Polyester 65%, rayon 35%) equipped with UV cutting as well as water resistance etc. was recommended. In the uniform design process, the effective communication with user (postman) is critical to find the requirements and needs of uniform user (postman). Also. the uniform designer should reflect the above four key factors in design development. Therefore, the uniform should provide the user with high job performance and job pride in wearing the uniform.

  • PDF

Remote Login Authentication Scheme based on Bilinear Pairing and Fingerprint

  • Kumari, Shipra;Om, Hari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4987-5014
    • /
    • 2015
  • The bilinear pairing, also known as Weil pairing or Tate pairing, is widely used in cryptography and its properties help to construct cryptographic schemes for different applications in which the security of the transmitted data is a major concern. In remote login authentication schemes, there are two major requirements: i) proving the identity of a user and the server for legitimacy without exposing their private keys and ii) freedom for a user to choose and change his password (private key) efficiently. Most of the existing methods based on the bilinear property have some security breaches due to the lack of features and the design issues. In this paper, we develop a new scheme using the bilinear property of an elliptic point and the biometric characteristics. Our method provides many features along with three major goals. a) Checking the correctness of the password before sending the authentication message, which prevents the wastage of communication cost; b) Efficient password change phase in which the user is asked to give a new password after checking the correctness of the current password without involving the server; c) User anonymity - enforcing the suitability of our scheme for applications in which a user does not want to disclose his identity. We use BAN logic to ensure the mutual authentication and session key agreement properties. The paper provides informal security analysis to illustrate that our scheme resists all the security attacks. Furthermore, we use the AVISPA tool for formal security verification of our scheme.

A study on developments of learner-oriented e-Learning contents in convergence era (컨버전스 시대 학습자 중심의 e-Learning 컨텐츠 개발에 관한 연구)

  • Lee, Jong-Ki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.5
    • /
    • pp.181-189
    • /
    • 2006
  • The ubiquitous technology has requested many changes both to the way of learning and to the way of convergence learning content development. However, until now most of e-Learning contents can not meet the requirements of technology convergence and are not developed from the user's perspectives. In this paper, we focus a convergence learning model that is learner-oriented structure, active use of formal and informal learning. Furthermore, examine carefully importance about task analysis, storytelling, and feedback design strategy of learning management system for e-Learning content development. In this context, this paper suggests the effective e-Learning content development method in a convergence era.

  • PDF