• 제목/요약/키워드: Requirements Definition

검색결과 231건 처리시간 0.023초

차상ATC장치의 안전성 분석 (Safety Analysis of Onboard ATC System)

  • 김경식;이종성;강리택;임연수
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2007년도 추계학술대회 논문집
    • /
    • pp.601-611
    • /
    • 2007
  • Onboard ATC performs the train speed ristriction function by receiving the speed limit on sections of track from wayside ATC. Onboard ATC can protect passenger from collision and derailment, and so on. So, the high level of safety and reliability for Onboard ATC is required, and by this reason, it is also required to improve the safety of Onboard ATC by applying the result of safety analysis on the Onboard ATC into its design and developing from the concept definition to the detailed desing phase. The paper introduces, when developing Onboard ATC, the safety improvement of Onboard ATC can be accomplished by applying system requirements from Risk Analysis into software and hardware.

  • PDF

성능이 서서히 저하되는 시스템의 신뢰도 척도 (Performance-Based Reliability Measures for Gracely Degrading Systems: the Concept)

  • Kim, Yon-Soo;Park, Sang-Min
    • 산업경영시스템학회지
    • /
    • 제17권32호
    • /
    • pp.227-232
    • /
    • 1994
  • In the performance domain, physical performance is a measure that represents some degree of system, subsystem, component or device success in a continuous sense, as opposed to a classical binomial sense (success or failure). If applicable sensing and monitoring means exist, physical performance can be observed over time, along with explanatory variables or covariables. Performance-based reliability represents the probability that performance will remain satisfactory over a finite period of time or usage cycles in the future when a performance critical limit (which represents an appropriate definition of failure in terms of performance) is set at a fixed level, based on application requirements. In the case of inadequate knowledge of the failure mechanics, this physical based empirical modeling concept along with performance degradation knowledge can serve as an important analysis tool in reliability work in product and process improvement.

  • PDF

Efficient Identity-Based Generalized Ring Signcryption Scheme

  • Zhou, Caixue;Cui, Zongmin;Gao, Guangyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권12호
    • /
    • pp.5553-5571
    • /
    • 2016
  • In this paper, we introduce a new concept called generalized ring signcryption (GRSC), which can achieve ring signature and ring signcryption functions with only one key pair and one algorithm. It is very useful for a system which has a large number of users, or has limited storage space, or whose function requirements may be changed later. We give a formal definition and a security model of GRSC and propose a concrete scheme based on bilinear pairings. In the random oracle model, the scheme's confidentiality can be proved under the GBDH assumption, and its unforgeability can be proved under GDH' assumption, and what is more, this scheme also allows unconditional anonymity. Compared with other identity-based ring signcryption schemes that use bilinear pairings as well, our scheme is a highly efficient one.

모델링 기반의 경영정보학 교육 방안 (A Modeling Based MIS Education)

  • 강신철
    • Journal of Information Technology Applications and Management
    • /
    • 제19권4호
    • /
    • pp.153-169
    • /
    • 2012
  • In the rapidly changing field of Management Information Systems, the definition and educational programs must be continually reevaluated and revised. A study was conducted to find a way to which the modeling principle is applied for redefining the identity of Management Information Systems as an independent academic field and to develop a plausible MIS curriculum based on the modeling principle. Previous researches on the MIS frameworks, knowledge and technology requirements for IS professionals, and standard MIS curriculums were reviewed thoroughly. For this study, the Kantian cognitive model was adopted as a basis of modeling principle. The result shows that modeling ability has been the core competence of IS people in the field of MIS. The applicability of a modeling principle is also verified in establishing the identity of MIS and developing a normative MIS curriculum. For the MIS field to thrive as an independent academic field and research discipline, it is believed to be imperative for the discipline to have a unique educational goals distinguished from both other management areas, and sub-fields of computer science.

대량주문제품의 고객에 의한 설계에 관한 연구 (A Study on Design by Customers for Mass Customization Products)

  • 서광규;김형준;장형걸
    • 대한안전경영과학회지
    • /
    • 제2권3호
    • /
    • pp.47-59
    • /
    • 2000
  • Producing what customers need with near mass production efficiency, or mass customization, has been a major trend in industry. Effective definition of customer requirements is a pre-requisite for realizing mass customization. The new method, called "Design by Customers", is proposed. The proposed method is an approach for companies to communicate to customers about what the company can offer, to find out customer needs, to assist customers in making choices and to negotiate for agreements. In this paper, the design and manufacturing capabilities in making company are represented in a Product Family Architecture. Adaptive Conjoint Analysis is then applied help customers assert their needs, defined variations from base product, visualize their options and assess alternatives. A power supplier of a electronic appliance is shown as an example to demonstrated the suggested method.ed method.

  • PDF

건설CALS/EC에서의 전자문서 표준 적용방안 연구 (The Study on the Application of Electronic Document Standards tn construction CALS/EC)

  • 정성윤;최원식;옥현;김성진
    • 한국전자거래학회:학술대회논문집
    • /
    • 한국전자거래학회 2003년도 종합학술대회 논문집
    • /
    • pp.90-96
    • /
    • 2003
  • 건설사업을 수행하면서 생성되는 각종 문서를 발주자, 설계자, 시공자 등 사업참여주체간에 보다 효율적으로 교환 및 공유하기 위해 XML 기반의 전자문서 표준 체계를 정립하는데 필요한 사항을 규정하였다. 이를 바탕으로 현업에서 일관되게 XML 전자문서를 개발하기 위해 적용 방안을 마련하였다.

  • PDF

5G NR 기반 개방형 스몰셀 기술 동향 (Trend of 5G NR Based Open Small Cell Technologies)

  • 문정모;박용직;황현용;나지현
    • 전자통신동향분석
    • /
    • 제33권5호
    • /
    • pp.33-41
    • /
    • 2018
  • The paradigm of mobile communication technology has changed from an increase in transmission capacity to service-based technologies satisfying various types of service requirements. One of the new paradigms is a service that provides users with a QoE (Quality Of Experience (QoE), at anytime and anywhere. 5G defines various technologies such as dense network structures and beam selection for increasing the transmission capacity and ensuring the quality of experience so as to satisfy this requirement, and related research is underway. In this paper, we describe the definition of a 5G small cell and 5G network structure as well as research trends of standardization and related technologies for constructing optimal solutions for mobile users in dense networks based on small cells.

Authorization Model with Provisions and Obligations in XML

  • Kim Suhee;Park Jongjin
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 ICEIC The International Conference on Electronics Informations and Communications
    • /
    • pp.355-360
    • /
    • 2004
  • With the growing acceptance of XML technologies, XML will be the most common tool for all data manipulation and data transmission. Meeting security requirements for privacy, confidentiality and integrity is essential in order to move business online and it is important for security to be integrated with XML solutions. Many policies require certain conditions to be satisfied and actions to be performed before or after a decision is made. Binary yes/no decision to an access request is not enough for many applications. These issues were addressed and formalized as provisions and obligations by Betti et Al. In this paper, we propose an authorization model with provisions and obligations in XML. We introduce a formal definition of authorization policy and the issues involving obligation discussed by Betti et Al. We use the formal model as a basis to develop an authorization model in XML. We develop DTDs in XML for main components such as authorization request, authorization policy and authorization decision. We plan to develop an authorization system using the model proposed.

  • PDF

Development of data analysis tool for combat system integration

  • Shin, Seung-Chun;Shin, Jong-Gye;Oh, Dae-Kyun
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • 제5권1호
    • /
    • pp.147-160
    • /
    • 2013
  • System integration is an important element for the construction of naval combat ships. In particular, because impeccable combat system integration together with the sensors and weapons can ensure the combat capability and survivability of the ship, the integrated performance of the combat system should be verified and validated whether or not it fulfills the requirements of the end user. In order to conduct systematic verification and validation, a data analysis tool is requisite. This paper suggests the Data Extraction, Recording and Analysis Tool (DERAT) for the data analysis of the integrated performance of the combat system, including the functional definition, architecture and effectiveness of the DERAT by presenting the test results.

네트워크 제품에 대한 보안요구사항 정의 방법론 연구 (A Study on Requirements Definition Methodology for Network Products)

  • 성윤기;김태훈;이은경;노병규
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2003년도 봄 학술발표논문집 Vol.30 No.1 (A)
    • /
    • pp.248-250
    • /
    • 2003
  • 국제표준인 Common Criteria가 2002년에 국내표준으로 제정됨으로써, 앞으로 국내에서도 정보보호시스템에 대한 공통평가기준의 활용이 기대된다. 특히 국내는 조직의 내부 인프라 보호를 위해 네트워크 제품의 수요가 증가하고 있어 침입차단시스템, 침입탐지시스템 등 네트워크 솔루션에 대한 개발이 많이 진행되고 있으나 이러한 제품을 소비하는 대부분의 기업 및 조직에서 제품 구매 시 활용될 수 있는 자신들의 요구 사항을 정의한 보호프로파일을 개발한 경험이 없다. 앞으로는 공통평가기준을 활용하여 자체 보안요구사항을 정의할 경우가 많이 발생할 것으로 기대되지만 공통평가기준은 운영체제와 같은 단일 호스트 및 시스템 중심으로 기술되었으므로 네트워크 제품에 대한 보호프로파일을 개발 시 새로운 접근방법 필요하다. 따라서 본 논문에서는 기업이나 조직에서 네트워크 제품에 대한 보호프로파일 및 보안목표명세서를 개발시, 공통평가기준과 보호프로파일 및 보안목표명세서 작성법을 이용하여 요구사항을 정의하는 방법에 대해서 기술하고자 한다.

  • PDF