• Title/Summary/Keyword: Requirement Definition

Search Result 114, Processing Time 0.027 seconds

LOD Definition and Requirement Analysis for Bridge Information Model Delivery (성과납품을 위한 교량정보모델의 상세수준 정의 및 요구항목 분석)

  • Park, Kun-Young;Park, Sang-Il;Lee, Sang-Ho
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2011.04a
    • /
    • pp.235-238
    • /
    • 2011
  • 본 연구에서는 필요한 수준의 성과품 납품을 위해 교량정보모델의 상세수준을 분류하고 각 상세수준에서 요구되는 세부정보를 분석하였다. 이는 기본적으로 교량 설계 업무가 단계별로 이루어지며 각 단계마다 성과품을 납품하도록 규정 되어있다는 사실을 바탕으로 연구가 이루어졌다. 이를 위하여 본 연구에서는 우선, 국내의 교량 설계준공단계 성과품 납품 항목 중 교량정보모델에 요구되는 항목을 분류하였으며 분류한 요구항목에 맞춰 3D객체와 속성정보수준을 정하여 업무 프로세스 단계별 상세수준을 정의하였다. 또한, 정의한 상세수준을 기준으로 하여 각 상세수준에서 포함하도록 요구되는 세부정보 분석을 수행하였으며, 분석된 세부요구정보는 성과품 납품에 활용가능하다.

  • PDF

Condition Monitoring System Construction for Electrical Equipments of Metropolitan Rapid Transit (도시철도 전력설비 상태감시 시스템 구성)

  • Park, Hyun-Soo;Choi, Gwang-Bum;Uh, Soo-Young;Ryu, Ki-Seon;Im, Hyeong-Gil;Jung, Ho-Sung;Park, Young;Ko, Sung-Bum
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.447-451
    • /
    • 2009
  • Metropolitan rapid transit has been used by one of a main transport service for several decades, but there are no monitoring system for electrical equipment condition which can cause enormous economic loss and social problem if fault occurs. Recently, necessity of condition monitoring system for electrical equipment fault came to the fore, we became carrying out a research project for a design of electrical equipment lifetime estimation system for metropolitan rapid transit. In this paper, basic design result of condition monitoring system and specification of transformer partial discharge detection system are presented, which are part of entire lifetime estimation system. Definition of target apparatus and monitoring method determined by analysis of user requirement from each railway company and, each railway company's opinions and requests were collected sufficiently by surveys and discussion.

  • PDF

A Requirement Definition and Implementation Technique for Efficient Information Retrieval System (효율적인 웹 정보검색시스템을 위한 요구사항 정의 및 구현 기법)

  • 이범석;윤범렬;김수동;류성열
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10b
    • /
    • pp.617-619
    • /
    • 1998
  • 인터넷 상에서 끊임없이 증가하고 있는 방대한 양의 정보를 검색하기 위하여 많은 정보 검색 시스템들이 나타나게 되었다. 그러나 기존의 정보검색 시스템에서 사용자는 검색시스템이 검색한 수많은 문서들을 하나씩 받아오게 됨으로 정보검색 시간이 많이 걸리게 된다. 또 인터넷 사용자들의 사용시간이 특정 시간대에 집중되어 네트웍의 부하가 커지는 것 역시 정보검색의 시간이 늘어나는 원인이 된다. 또한 사용자는 단순히 키워드 입력 방식으로 검색하게 되므로 다양한 사용자의 검색요구를 적절히 만족시키지 못하게 된다. 본 논문은 이런 문제점들을 보완하는 좀 더 효율적인 정보 검색시스템을 구축하기 위해 필요한 요구사항을 크게 4가지로 정의해 보고 이 요구 사항을 만족시키기 위한 기법을 제시하고자 한다.

Trend of 5G NR Based Open Small Cell Technologies (5G NR 기반 개방형 스몰셀 기술 동향)

  • Moon, J.M.;Bahg, Y.J.;Hwang, H.Y.;Na, J.H.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.5
    • /
    • pp.33-41
    • /
    • 2018
  • The paradigm of mobile communication technology has changed from an increase in transmission capacity to service-based technologies satisfying various types of service requirements. One of the new paradigms is a service that provides users with a QoE (Quality Of Experience (QoE), at anytime and anywhere. 5G defines various technologies such as dense network structures and beam selection for increasing the transmission capacity and ensuring the quality of experience so as to satisfy this requirement, and related research is underway. In this paper, we describe the definition of a 5G small cell and 5G network structure as well as research trends of standardization and related technologies for constructing optimal solutions for mobile users in dense networks based on small cells.

Secure Mobile Agents in eCommerce with Forward-Secure Undetachable Digital Signatures

  • Shi, Yang;Zhao, Qinpei;Liu, Qin
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.573-583
    • /
    • 2015
  • We introduce the idea of a forward-secure undetachable digital signature (FS-UDS) in this paper, which enables mobile agents to generate undetachable digital signatures with forward security of the original signer's signing key. The definition and security notion of an FS-UDS scheme are given. Then, the construction of a concrete FS-UDS scheme is proposed; and the proof of security for the proposed scheme is also provided. In the proposed scheme, mobile agents need not carry the signing key when they generate digital signatures on behalf of the original signer, so the signing key will not be compromised. At the same time, the encrypted function is combined with the original signer's requirement; therefore, misuse of the signing algorithm can be prevented. Furthermore, in the case where a hacker has accessed the signing key of the original signer, he/she is not able to forge a signature for any time period prior to when the key was obtained.

Design and Analysis of NCP Packaging Process for Fine-Pitch Flexible Printed Circuit Board (미세피치 연성인쇄회로기판 대응을 위한 NCP 패키징 공정설계 및 분석)

  • Shim, Jae-Hong;Cha, Dong-Hyuk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.2
    • /
    • pp.172-176
    • /
    • 2010
  • Recently, LCD (Liquid Crystal Display) requires various technical challenges; high definition, high quality, big size, and low price. These demands more pixels in the fixed area of the LCD and very fine lead pitch of the driving IC which controls the pixels. Therefore, a new packaging technology is needed to meet such technical requirement. NCP (Non Conductive Paste) is one of the new packaging methods and has excellent characteristics to overcome the problems of the ACF (Anisotropic Conductive Film). In this paper, we analyzed the process of the NCP for COF (Chip on FPCB) and proposed the key design parameters of the NCP process. Through a series of experiments, we obtained the stable values of the design parameters for successful NCP process.

A Study on Criteria of Selecting Heavy Lifting Service Provider Using QFD/AHP (QFD/AHP를 이용한 Heavy Lifting 서비스 업체 선정을 위한 평가지표 개발에 대한 연구)

  • Park, Se-Jung;Kim, Seung-Hee;Kim, Woo-Je
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.36 no.3
    • /
    • pp.51-62
    • /
    • 2013
  • We propose a method using QFD for design the hierarchical structure of AHP. This method provides definition for each area of House of Quality and design the hierarchical structure of the bottom-up QFD/AHP in which the upper hierarchy is designed through the classification of common characteristics with a focus on the lower hierarchy. Finally, we apply it to the development of an evaluation index for selecting heavy lifting service providers. This study has significance as the first instance of designing the archical structure of AHP after objectively verifying whether MECE condition, the basic requirement for AHP design, is satisfied.

Definition of Security Requirement in Steps of Identification and Authentication (식별 및 인증 단계 보안 요건의 정의)

  • Shin, Seong-Yoon;Kim, Chang-Ho;Jang, Dai-Hyun;Lee, Hyun Chang;Rhee, Yang-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.175-176
    • /
    • 2014
  • Identification and authentication of the security requirements of the application area. Individual ID for uniquely be identified. Standard length of the password is limited and should be applied in combination. And must be changed periodically. ID/PW authentication scheme non-reinforced must be provided. The authentication process is defined in the security requirements should be satisfied.

  • PDF

Definition of Security Requirement in Encryption (암호화에서 보안 요건 정의)

  • Shin, Seong-Yoon;Kim, Chang-Ho;Jang, Dai-Hyun;Lee, Hyun Chang;Rhee, Yang-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.187-188
    • /
    • 2014
  • Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption doesn't prevent hacking but it reduces the likelihood that the hacker will be able to read the data that is encrypted. Important information (data) information during transmission or storage of the confidentiality, integrity should be guaranteed. Encryption is one-way and two-way encryption is applied. The encryption key must be guaranteed safety.

  • PDF

Definition of Security Requirement in Access Control (접근 통제의 보안 요건 정의)

  • Shin, Seong-Yoon;Kim, Chang-Ho;Jang, Dai-Hyun;Lee, Hyun Chang;Rhee, Yang-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.192-193
    • /
    • 2014
  • Attendant services (user) roles (Role) and act on the data used should be based access control and permissions. Large amounts of important information to view and change the pre-approval must be acquired. Non-constant time for the session must control actions.

  • PDF