• Title/Summary/Keyword: Requirements analysis

Search Result 4,357, Processing Time 0.026 seconds

An Establishment of the Process System for Software Requirements Engineering (소프트웨어 요구공학에 대한 처리 시스템 정립)

  • Lee, Sang-Un;Choi, Myeong-Bok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.37-49
    • /
    • 2014
  • This paper proposes a optimal process after analyzing the existing papers of software requirements engineering process. In analyzing it examines requirement pursuit management and origin, and considers a variety of starting points that draw requirement documents. Also, this paper considers carefully the multiple methods of stakeholder needs, problem analysis, processing priority of business modeling. From the analyzed result this paper proposes the best method that draws systematically the requirement documents. The proposed method can minimize the requirement changes, draw the higher project success ratio, and satisfy the customer.

Use Case Elicitation Method Using "When" Sentences from User Reviews

  • Kim, Neung-Hoe;Hong, Chan-Ki
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.198-202
    • /
    • 2020
  • User review sites are spaces where users can freely post and share their opinions, which are trusted by many people and directly influence sales. In addition, they overcome the limitations arising from existing requirements collection and are able to gather the needs of large numbers of different people at a low cost. Therefore, such sites are attracting attention as new spaces for understanding user needs. In a previous study, a user review analysis was attempted using 5W and 1H, and we inferred that a sentence containing "when" has special information based on the user experience. In addition, the requirements of the derivative activities in a user review can identify more user needs than the general requirements of derivative activities. In this paper, we propose a systematic method of deriving "when" sentences contain meaningful information from user reviews and converting them into use cases, which is one of the requirements of a specification method. This method converts unstructured data into structured data such that it can be included as the user requirements during software development from user comments expressed in natural language. This method will reduce project failures and increase the likelihood of success by enabling an efficient collection and analysis of user needs from valuable user reviews.

Requirements and satisfaction with medical masks (보건용 마스크의 요구사항 및 만족도)

  • Younghee Park
    • The Research Journal of the Costume Culture
    • /
    • v.31 no.1
    • /
    • pp.1-17
    • /
    • 2023
  • This study analyzed requirements for medical masks and difference in satisfaction based on demographic characteristics and side effects experience caused by wearing medical masks. Three factors related to requirements for medical masks were identified: wearing comfort and usability, blocking function for harmfulness, and design. As a result of the difference analysis for requirements of medical masks based on demographic characteristics, all three factors showed a significant difference in gender and occupation. Design did in age and monthly income. As a result of the presence or absence of breathing difficulties experience, design factor was significant. As a result of the presence or absence of skin trouble experience, wearing comfort and usability showed a significant difference. As a result of the difference in satisfaction with medical masks based on demographic characteristics and side effect experience caused by wearing medical masks, breathing, ear string tightness, blocking harmful substances, price, and over all wearing comfort showed a significant difference by gender, marital status, age, occupation, and monthly income, and the presence of absence of breathing difficulty experience and skin trouble experience, respectively. As a result of the interaction effect analysis between demographic characteristics and side effects experience caused by wearing medical masks, it showed a significant interaction effect between gender and monthly income, between marital status and monthly income, between monthly income and breathing difficulties experience, and between monthly income and skin trouble experience.

Requirements Management Framework for Design Management and Information Characteristics (건설 발주자 설계 요건관리 체계화를 위한 개념적 틀 및 정보특성)

  • Jeong, Yeheun;Lee, Yunsub;Jung, Youngsoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.21 no.6
    • /
    • pp.3-15
    • /
    • 2020
  • For a successful construction project, the requirements of the client should be clearly defined and this should be reflected in the project based on the expertise of each project participant throughout the entire life-cycle. Therefore, it is necessary to establish the concept of Requirements Management to systematize and manage project requirements in terms of information management. This study aims to comprehensively define the concept of requirements management in the architecture industry and to provide a methodological basis for efficiently managing design requirements information by suggesting category of requirements information type and information analysis criteria. In addition, based on the case study, the requirements information was analyzed to propose a systemization methods of requirements management for PMO' design management and information management.

An Approach to Managing Requirements Change Systematically in Software Product Lines (소프트웨어 프로덕트 라인에서 체계적인 요구사항 변경 관리 방법)

  • Park, Ji-Hyeon;Moon, Mi-Kyeong;Yeom, Keun-Hyuk
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.12
    • /
    • pp.1164-1177
    • /
    • 2005
  • As the software development process becomes complicated, software requirements become complicated, too. Many efforts are needed in requirements management. It is impossible to define all requirements of software at first, and the development environment changes as project is gone. As the cost of requirements change management is much more than development cost, the changes should be controled immediately through systematic change management. In this paper, I suggest a method to manage requirements change systematically based on the change management process in software product lines. The requirements change at the application engineering process is analyzed and managed using the domain engineering process because the application requirements are customized from the domain requirements in software product lines. Such the consistent change management helps to make decisions about changes by change impact analysis and alternative solution design. Through this method, the potential change costs can be saved because same change requests are not repeated by controlling the change requests completely.

Analysis of the User Requirements for Development of Integrated Livestock Excretion Management System applied with the Ubiquitous Technology (유비쿼터스 기술을 활용한 가축분뇨 통합관리 시스템 개발을 위한 사용자요구사항 분석)

  • Koo, Jee-Hee;Jo, Jin-Hyun;Ahn, Ji-Yeon;Jung, Tae-Woong;Lee, Sae-Min;Lee, Sang-Rak
    • Journal of Animal Environmental Science
    • /
    • v.19 no.2
    • /
    • pp.95-100
    • /
    • 2013
  • Although the livestock excretion is a significant resource in providing nutrients to the crops as it is recycled, it has been perceived as the cause of environmental pollutions for its inappropriate treatment and quality control issues. The study is aimed to develop an integrated management system for efficient management of livestock excretion using the Ubiquitous technology, and the user requirements are analyzed for development of such system. As the result of analysis on the requirements, it has been proved that such system is perceived to be necessary and the demand for several main functions can be seen as well.

Creative Resolution for Requirement Conflict Using Conflict Resolution Theory of TRIZ (TRIZ의 모순 해결 이론을 이용한 창의적 요구사항 충돌 해결)

  • Jung, Ji-Young;Kim, Jin-Tae;Park, Soo-Yong
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.5
    • /
    • pp.411-415
    • /
    • 2010
  • The Conflicts between requirements may cause a failure of functions or even project. Currently, most of researches have focused on identifying requirements and some researchers have tried to resolve requirements conflicts but it was only based on requirement priority. This paper proposes the Creative Requirements Conflict Resolution (CRRC) to resolve requirement conflicts in a creative way using TRIZ methodology. TRIZ, which means the theory of solving inventor's problems, is made based on the analysis of over 2 million patent cases and helpful for developing a creative solution to resolve conflicts. CRRC classifies requirement conflicts into groups and then apply TRIZ theory related to each group. At the result of control experiment, CRRC provides the various kinds of creative solution for requirement conflicts.

AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS

  • Song, Jae-Gu;Lee, Jung-Woon;Park, Gee-Yong;Kwon, Kee-Choon;Lee, Dong-Young;Lee, Cheol-Kwon
    • Nuclear Engineering and Technology
    • /
    • v.45 no.5
    • /
    • pp.637-652
    • /
    • 2013
  • Instrumentation and control systems in nuclear power plants have been digitalized for the purpose of maintenance and precise operation. This digitalization, however, brings out issues related to cyber security. In the most recent past, international standard organizations, regulatory institutes, and research institutes have performed a number of studies addressing these systems cyber security.. In order to provide information helpful to the system designers in their application of cyber security for the systems, this paper presents methods and considerations to define attack vectors in a target system, to review and select the requirements in the Regulatory Guide 5.71, and to integrate the results to identify applicable technical security control requirements. In this study, attack vectors are analyzed through the vulnerability analyses and penetration tests with a simplified safety system, and the elements of critical digital assets acting as attack vectors are identified. Among the security control requirements listed in Appendices B and C to Regulatory Guide 5.71, those that should be implemented into the systems are selected and classified in groups of technical security control requirements using the results of the attack vector analysis. For the attack vector elements of critical digital assets, all the technical security control requirements are evaluated to determine whether they are applicable and effective, and considerations in this evaluation are also discussed. The technical security control requirements in three important categories of access control, monitoring and logging, and encryption are derived and grouped according to the elements of attack vectors as results for the sample safety system.

A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis (분석단계 보안에서 식별 및 인증의 보안 요건 정의에 대한 연구)

  • Shin, Seong-Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.7
    • /
    • pp.87-93
    • /
    • 2014
  • TIn analysis as the first step of S/W development, security requirements of identification and authentication, ID and password management, authentication process, authentication method, ete. should be defined. Identification is to uniquely identify certain users and applications running on a certain system. Authentication means the function to determine true or false users and applications in some cases. This paper is to suggest the security requirements for identification and authentication in analysis step. Firstly, individual ID should be uniquely identified. The second element is to apply the length limitations, combination and periodic changes of passwords. The third should require the more reinforced authentication methods besides ID and passwords and satisfy the defined security elements on authentication process. In this paper, the security requirements for the step of identification and authentication have been explained through several practical implementation methods.

A Study on Analytical Methods of u-Healthcare Services Software Architecture Requirements for Quality Assurance (유-헬스케어 서비스 소프트웨어아키텍쳐 품질확보를 위한 요구사항 분석방법에 관한 연구)

  • Noh, Si-Choon;Moon, Song-Chul
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.45-52
    • /
    • 2014
  • All medical information system stakeholders and the environment exists. Medical information systems for development in these environments and non-functional requirements, functional requirements and quality goals are to be met. In order to achieve these goals in a variety of ways currently being made to develop information systems and various applications are emerging. However, the process of developing these health information systems meet the basic requirements and does not consider that from the point of view should not be separate. This study of the development of health information systems related to quality measurement indicators for the analysis software architectures, and medical information, information quality evaluation of service quality information associated indicators evaluation are offered. This way of associated indicators for the quality of the output sum and analyze the trends in software architecture u-Healthcare should be available for assessment. Quality score compared with pre-set goals for achievement and satisfaction levels of analysis further support the cause excerpt field use in analysis and improvement is possible.