• 제목/요약/키워드: Information Requirement Analysis

Search Result 657, Processing Time 0.029 seconds

Performance Analysis on Integrated Ship Area Network (선박 통합 네트워크 구조 성능 분석)

  • Lee, Sung-Hyung;Kim, Jae-Hyun;Moon, Kyoung-Deuk;Lee, Kwangil;Park, Jun Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.3
    • /
    • pp.247-253
    • /
    • 2013
  • This paper analyzes ship area network(SAN) with integrated gateway. For the analysis, this paper analyzes reference network architecture, end-to-end connection model, traffic model, and requirement of SAN. Also, the type of network element and minimum performance of integrated gateway is derived by ship area network simulator. The performance evaluation results show that a integrated gateway operating as network switch with performance over than 30,000 packets/sec can provides end-to-end connection with satisfaction of requirement of each end-to-end connection.

Implementation and Verification of TCP Congestion Control Algorithm using SDL (SDL을 이용한 TCP 혼잡제어 알고리즘의 구현 및 검증)

  • 이재훈;조성현;이태오;임재홍
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.2
    • /
    • pp.214-227
    • /
    • 2003
  • Developing an application, it is difficult to catch an exact requirement with the conventional text-based method. It has also problems in verification and analysis at each developing stage. Therefore, if an adjustment is required with an error and change of requirement, a bad effect happen in the whole system. In this case, it also affect adversely on the developing cost and period. Meanwhile, if an analysis or verification is performed, the possibility of an error frequency reduces. Thus, not only is it easier to correct the error but also add an new requirement. This thesis embody a TCP/IP congestion control algorithm with SDL which provides automatically graphic interface, verification and analysis to each developing stage. Using SDL gave a clear representation embodiment in each developing stage and easiness of adjustment due to changing requirements or correcting errors. In addition, the stages of protocol have been certified in a simulation by verification of MSC and the results showed a possibility of developing a better TCP/IP protocol.

A Study of the Cognition and the Requirement on the Key Competency of Dental Technology (치과기공분야에서의 직업기초능력수준과 요구도에 관한 연구)

  • Hwang, Jae Sun
    • Journal of Technologic Dentistry
    • /
    • v.34 no.4
    • /
    • pp.457-469
    • /
    • 2012
  • Purpose: The purpose of this study is analyzing how much students of dental technology possess core competencies and cognition between dental technicians and students. Methods: The subjects of this study were dental technicians, dental technology students and a self-administered structured questionnaire survey wax conducted for 428 selected people. Collected data were analyzed using SPSS Win 20.0 statistics program and analysis techniques include the frequency, t-test, One-way ANOVA. Results: The results of the survey are as follows. The cognition of key competency according to the gender in the students showed differences in interpersonal ability, information ability and the requirement of key competency according to the gender in the students showed differences in speaking ability, listening ability, problem solving ability. The cognition of key competency according to the grade in the students showed difference in speaking ability, listening ability and the requirement of key competency according to the grade in the students showed difference in comprehension of organization ability. The speaking ability is the lowest in the cognition of key competency according to the gender, grade, experience of clinical training in the students and the skill ability is the highest in the requirement of key competency according to the gender, experience of clinical training in the students. The cognition of key competency according to the career in the dental technicians showed difference in problem solving ability, self-regulation and self-development ability, skill ability and the requirement of key competency according to the career in the dental technicians showed difference in writing ability. The cognition of key competency according to the educational background in the dental technicians showed difference in comprehension of organization ability. The foreign language ability is the lowest in the cognition of key competency according to the career, job in the dental technicians and the skill ability is the highest and the math ability is th lowest in the requirement of key competency according to the career, place of employment in the dental technician. Conclusion: This study can be used as basic data for dental technology that are available not only to field-oriented disciplines but also to overall higher education fields which aim to strengthen key competency.

UML-based Quality Requirement Specifications and Design Traceability (UML 기반의 품질 요구 표현 및 설계 추적성 연구)

  • Seo, Dong-Su
    • Journal of Internet Computing and Services
    • /
    • v.10 no.1
    • /
    • pp.175-182
    • /
    • 2009
  • Less efforts has been made in developing specifications and verification techniques for quality requirements. This paper suggests specification and traceability methods supporting quality issues such as usability, performance, and understandability when developing information systems with UML notation. With traceability checking methods that augment quality extension to the use cases and sequence diagrams, developers can confirm the level of implementation for both functional and nonfunctional requirements beforehand.

  • PDF

A Study on Requirements Analysis for the Next Generation of Global e-trade (차세대 전자무역 시스템의 요건 분석)

  • Kim, Hag-Mim;Lee, Ho-Hyung
    • International Commerce and Information Review
    • /
    • v.9 no.4
    • /
    • pp.307-328
    • /
    • 2007
  • This paper discusses some requirement issues of future global e-trade. Korea has been making lots of efforts on e-trade promotions and many research results support that the performance of e-trade should be increased. There are still many unsolved issues as well as future demands in this area. In this paper, we propose some e-trade requirements for next generation and those are e-trade governance, collaboration enhancement among trading participants, the utilization of e-trade documents repository, the expansion of global e-trade network, and e-trade intelligence just to name a few. For each requirement, we propose some research topics as well as practical implications for improving the performance of global e-trades. One can find some useful thoughts for the future research based on the propositions made by this paper.

  • PDF

The Analysis of Mobile Agent System for the Wide Distributed Processing (광역 분산 처리 환경에서의 모바일 에이전트 시스템 분석)

  • 방정원
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.4
    • /
    • pp.132-137
    • /
    • 2003
  • Due to the advances of the Internet technologies and web-based applications, the demand for wide distributed processing is increased. Mobile Agents have been proposed as a model to meet with the requirement for such environment. But current mobile agent system has the technical restriction. The requirement of mobile agent for the wide distributed processing is analysed in mobile agent system architecture, programming paradigm and technologies.

  • PDF

Analysis FIPS 140-2 DTR(Derived Test Requirement of FIPS 140-2 of CMVP(Cryptographic Module Validation Program) (암호화 모듈 평가 프로그램(CMVP) 표준인 Derived Test Requirement(DTR) of FIPS 140-2 분석)

  • 이병석;정성민;박성근;김석우;박일환
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.311-316
    • /
    • 2003
  • 정보통신기술의 발달로 대부분 사회의 기반구조가 사이버 사회로 전환되었고 다양한 형태의 경제사회 활동을 수행키 위해 정보보호제품의 활용이 극대화되었으며 더욱 중요시되었다. 이러한 사회흐름에 기반하여 정보보호제품의 안전한 선택 및 사용을 위한 기본적 선택기준은 검증받은 암호화 모듈을 바탕으로 하는 정보보호제품에 대한 신뢰 기관의 안전성 평가 결과일 것이다. 암호화 모듈에 대한 안전성 평가로 가장 널리 참조되는 것은 미국의 NIST(National Institute of Standards and Technology)가 수행하는 CMVP(Cryptographic Module Validation Program)이며, 세계적으로 인정받고 있다. 본 논문에서는 암호 모듈의 평가체계에 대해 설명하였으며 그 기준인 FIPS 140-2 DTR을 분석하여 향후 개발 가능한 CMVP의 안전성 평가 툴 기준에 대해 제시하였다.

  • PDF

A Requirement Analysis Method of Smart-Phone Users by Using Contents Analysis of SNS (SNS의 스마트폰 게시글 내용 분석을 통한 사용자의 요구특성 분석)

  • Kim, Tae Woo;Baek, Dong Hyun
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.197-208
    • /
    • 2012
  • Recently, the development of smart devices such as smart phones and tablet PCs, with mobility, convenience and real-time computing, promotes proliferation and activation of social media. It also causes innovative changes in communication methods. Since 2010, researches in SNS (Social Networking Services) have focused on developing marketing strategies using SNS. On the other hand, the main purpose of this study is to provide a requirement analysis method of smart phone users by using content analysis of SNS. An information systems developed in this study in order to analyze content of SNS automatically because it is very difficult and time consuming to analyze it manually. In addition, this study compares the result of content analysis with that of Kano survey in order to examine consistency between the two results.

An Experimental Study on the Effects of Risk Cognition of Personal Information and Self-Expression Information on Conation of Privacy Protection (SNS의 개인정보와 자기표현정보의 중요도 인지가 정보보호 행동의지에 미치는 영향에 관한 실험연구)

  • Lim, Jung-Ho;Kwon, Sun-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.681-694
    • /
    • 2018
  • This paper studied the effects of risk cognition of personal information and self-expression information on conation of privacy protection. In the first study, 88 college students who volunteered for this research were surveyed about risk cognition of personal information and conation to protect it. In the second study, after an information-seeking expert collected and organized the self-expression information that 88 volunteers had expressed on SNS, and then showed the organized self-expression information to 88 volunteers, and then 88 volunteers were surveyed about risk cognition of self-expression information and conation to protect it. As results of the first data analysis, the risk cognition of personal information had the greatest influence on non-disclosure of personal information, followed by reduction of the disclosure scope and law institutionalization requirement. As results of the second data analysis, SNS users openly expressed their opinion or life-style, but when they realized that self-expression information can be accumulated and become sensitive information, they had conation to protect their self-expression information such as non-disclosure, reduction of disclosure scope, and law institutionalization requirement. The implication of this study is that we have overcome the limitations of existing researches that can not explain information protection behavior on SNS.

Design and Requirement Analysis for Vehicle operating computer of Bimodal Tram (바이모달트램용 차량운영컴퓨터의 요구사항 분석 및 설계)

  • Lee, Kang-Won;Yoon, Hee-Taek;Kim, Gun-Kuk;Hwang, Wi-Kyung
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1930-1935
    • /
    • 2008
  • Bimodal tram is able to run both general and special road. It has also the advantages of both public bus and subway which have the charateristics of easiness to approach and punctuality respectively. These advantages are accomplished by the cooperative communication between the control center and bimodal tram which is running with the fleet. This paper have investigated the requirement analysis and designing of the car operating computer system which have the functions of communication, broadcasting and display. car operating computer system communicates between bimodal tram and control center with wireless antenna. It can also transmit the location and status information of bimodal tram to control center for managing the bimodal tram fleet on road efficiently and economically.

  • PDF