• Title/Summary/Keyword: Scenario Based Design

Search Result 583, Processing Time 0.024 seconds

GUI test automation tool design of mobile application software based scenario and implementation (시나리오기반의 모바일 어플리케이션 소프트웨어의 GUI 테스트 자동화 도구 설계 및 구현)

  • Jung, Il-Jae;Hwang, Sun-Myung;Shin, GyuSang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.360-363
    • /
    • 2007
  • 모바일 어플리케이션 소프트웨어의 GUI는 눈으로 보고 교감하는 것에 끝나지 않고 나날이 발전하여 소프트웨어의 성공여부를 결정하는 경우로 많이 부각되고 있다. 소프트웨어의 성공에 중요한 요소로 자리 잡히고 있으므로 소프트웨어의 성공을 위한 GUI 테스트가 요구되나 GUI 테스트는 많은 노력과 시간이 투자되는 테스트 분야이다. 이러한 자원의 소비의 줄이기 위해서 GUI 테스트의 자동화가 필요하리라 본다.

Life Cycle Cost Analysis at Design Stage of Cable Stayed Bridges based on the Performance Degradation Models (성능저하모델에 기초한 사장교의 설계단계 생애주기비용 분석)

  • Koo, Bon Sung;Han, Sang Hoon;Cho, Choong Yuen
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.5
    • /
    • pp.2081-2091
    • /
    • 2013
  • Recently, the demand on the practical application of life-cycle cost effectiveness for design and rehabilitation of civil infrastructure is rapidly growing unprecedently in civil engineering practice. Accordingly, in the 21st century, it is almost obvious that life-cycle cost together with value engineering will become a new paradigm for all engineering decision problems in practice. However, in spite of impressive progress in the researches on the LCC, the most researches have only focused on the Deterministic or Probabilistic LCC analysis approach and general bridge at design stage. Thus, the goal of this study is to develop a practical and realistic methodology for the Life-Cycle Cost LCC-effective optimum decision-making based on reliability analysis of bridges at design stage. The proposed updated methodology is based on the concept of Life Cycle Performance(LCP) which is expressed as the sum of present value of expected direct/indirect maintenance costs with expected optimal maintenance scenario. The updated LCC methodology proposed in this study is applied to the optimum design problem of an actual highway bridge with Cable Stayed Bridges. In conclusion, based on the application of the proposed methods to an actual example bridge, it is demonstrated that a updated methodology for performance-based LCC analysis proposed in this thesis, shown applicably in practice as a efficient, practical, process LCC analysis method at design stage.

DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective

  • Kim, Jiyeon;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2186-2203
    • /
    • 2020
  • Security administrators of companies and organizations need to come up with proper countermeasures against cyber-attacks considering infrastructures and security policies in their possession. In order to develop and verify such countermeasures, the administrators should be able to reenact both cyber-attacks and defenses. Simulations can be useful for the reenactment by overcoming its limitations including high risk and cost. If the administrators are able to design various scenarios of cyber-attacks and to develop simulation models from their viewpoints, they can simulate desired situations and observe the results more easily. It is challenging to simulate cyber-security issues, because there is lack of theoretical basis for modeling a wide range of the security field as well as pre-defined basic components used to model cyber-attacks. In this paper, we propose a modeling method for cyber-security simulations by developing a basic component and a composite model, called Abstracted Cyber-Security Unit Model (ACSUM) and Abstracted Cyber-security SIMulation model (ACSIM), respectively. The proposed models are based on DEVS(Discrete Event systems Specification) formalism, a modeling theory for discrete event simulations. We develop attack scenarios by sequencing attack behaviors using ACSUMs and then model ACSIMs by combining and abstracting the ACSUMs from a security perspective. The concepts of ACSUM and ACSIM enable the security administrators to simulate numerous cyber-security issues from their viewpoints. As a case study, we model a worm scenario using ACSUM and simulate three types of simulation models based on ACSIM from a different security perspective.

Design of Face Recognition based Embedded Home Security System

  • Sahani, Mrutyunjanya;Subudhi, Subhashree;Mohanty, Mihir Narayan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1751-1767
    • /
    • 2016
  • Home security has become the prime concern for everyone in present scenario. In this work an attempt has been made to develop a home security system which is accessible, affordable and yet effective.The proposed system is based on 'Remote Embedded Control System' (RECS) which works both on the web and gsm platform for authentication and monitoring. This system is therefore cost effective as it relies on existing network infrastructure. As PCA is most popular and efficient algorithm for face recognition, it has been usedin this work. Next to it an interface has been developed for communication purpose in the embedded security system through the ZigBee module. Based on this embedded system, automated control of door movement has been implemented through electromagnetic door lock technology. This helps the users to monitor the real-time activities through web services/SMS. The web service consists of either web browser command or e-mail provision. The system establishes the communication between the system and authenticated user. The e-mail received by the system from the authorized person will monitor and control the real-time operation and door lock. The entire control system is reinforced using ARM1176JZF-S microcontroller and tested for actual use in the home environment. The result shows the experimental verification of the proposed system.

BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment

  • Zhang, Lejun;Zou, Yanfei;Yousuf, Muhammad Hassam;Wang, Weizheng;Jin, Zilong;Su, Yansen;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1634-1652
    • /
    • 2022
  • Due to the increasing need for data sharing in the age of big data, how to achieve data access control and implement user permission revocation in the blockchain environment becomes an urgent problem. To solve the above problems, we propose a novel blockchain-based data sharing scheme (BDSS) with fine-grained access control and permission revocation in this paper, which regards the medical environment as the application scenario. In this scheme, we separate the public part and private part of the electronic medical record (EMR). Then, we use symmetric searchable encryption (SSE) technology to encrypt these two parts separately, and use attribute-based encryption (ABE) technology to encrypt symmetric keys which used in SSE technology separately. This guarantees better fine-grained access control and makes patients to share data at ease. In addition, we design a mechanism for EMR permission grant and revocation so that hospital can verify attribute set to determine whether to grant and revoke access permission through blockchain, so it is no longer necessary for ciphertext re-encryption and key update. Finally, security analysis, security proof and performance evaluation demonstrate that the proposed scheme is safe and effective in practical applications.

A Study on Design Automation of Cooling Channels in Hot Form Press Die Based on CATIA CAD System (CATIA CAD 시스템 기반 핫폼금형의 냉각수로 설계 자동화에 관한 연구)

  • Kim, Gang-Yeon;Park, Si-Hwan;Kim, Sang-Kwon;Park, Doo-Seob
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.3
    • /
    • pp.147-154
    • /
    • 2018
  • This paper focuses on the development of a support system that can rapidly generate the design data of a hot-form die with cooling channels, commonly known as hot stamping technology. We propose a new process for designing hot-form dies based on our (automated) system, whose main features are derived from the analysis of the design requirements and design process in the current industry. Our design support system consists of two modules, which allow for the generation of a 3D geometry model and its 2D drawings. The module for 3D modeling automation is implemented as a type of CATIA template model based on CATIA V5 Knowledgeware. This module automatically creates a 3D model of a hot-form die, including the cooling channels, that depends on the shape of the forming surface and the number of STEELs (subsets of die product) and cooling channels. It also allows for both the editing of the positions and orientations of the cooling channels and testing for the purpose of satisfying the constraints on the distance between the forming surface and cooling channels. Another module for the auto-generation of the 2D drawings is being developed as a plug-in using CAA (CATIA SDK) and Visual C++. Our system was evaluated using the S/W test based on a user defined scenario. As a result, it was shown that it can generate a 3D model of a hot form die and its 2D drawings with hole tables about 29 times faster than the conventional manual method without any design errors.

Methodology of Developing Design Information IETM for Construction Project (건설공사 설계정보 전자매뉴얼 개발방법론 연구)

  • Kang Leen-Seok;Kwak Joong-Min;Moo Hyoun-Seok;Han Joo-A;Kim Hyun-Soo
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2004.11a
    • /
    • pp.358-361
    • /
    • 2004
  • The objective of establishing IETM (Interactive Electronic Technical Manual) is not the just making into on-1 me system of technical manuals such as specifications. It is to produce construction standard documents in an electronic manual system to turn technical contents such as construction methods in technical manuals into multimedia information. Also, it is to maximize real-time information delivery by using visual data of construction sites. IETM enables to check not only design standards in the design but also applied situation of a construction method based on proper design standards and historical construction data on a real time basis. This study suggests a modeling method of IETM applicable to design and construction phase. The study includes a framework and a scenario for developing design IETM for construction project.

  • PDF

Agent Oriented Methodology Based on Design Pattern (디자인패턴 기반의 에이전트 지향 개발방법론)

  • Lee, Hak-Jin;Youn, Hyun-Sang;Lee, Eun-Seok
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.374-380
    • /
    • 2006
  • 최근 에이전트 기반 시스템을 만들기 위한 기술로서, 에이전트 지향 개발방법론 (Agent Oriented Methodology)이라는 영역이 출현하여, 여러 연구 기관에서 에이전트 시스템을 만드는데 이를 적용한 성공 사례가 늘고 있다. 그러나, 이들을 가지고 복잡한 다중 에이전트 시스템을 개발하는 일은 여전히 경험이 많지 않은 개발자들에게 있어서 어려운 일에 해당된다. 본 논문에서는 개발자에게 에이전트 설계 시 부과되는 이러한 어려운 점을 대한 해결책으로서, 개발자들에게 기능에 따라 분류된 디자인 패턴을 지원하여 다중 에이전트 시스템 설계 및 개발을 지원하는 개발방법론을 제안한다. 또한, 우리는 요구사항 분석부터 코드 생성까지 개발 프로세스에 반영하는 지원 도구를 제안한다. 이 CASE 도구는 단계별 자동화 기능뿐만 아니라, 설계 과정에서 개발자들에게 디자인 패턴을 고려할 수 있는 기능을 제공한다. 이를 통해, 우리는 에이전트 시스템 개발자 및 에이전트에 대한 지식이 부족한 이들에게 멀티에이전트 시스템 설계와 개발을 보다 쉽고 빠르게 해결할 수 있도록 돕는다. 본 논문에서는 여행 도우미 시나리오(Travel Assistant Scenario)을 제안 개발 방법에 따라 적용시켰다. 최종적으로, 보다 쉬운 방식으로 에이전트 소스 코드를 생성해냈으며, 이를 통해 제안 개발방법론이 개발자들의 다중 에이전트 기반 시스템의 개발에 대한 부하를 줄여 줄 수 있다는 결론을 내렸다.

  • PDF

Study for Using VR Techniques Performance Evaluation of the Elevator Evacuation (VR기법을 활용한 엘리베이터 피난 성능평가에 관한 연구)

  • Ro, Se-Ho;Yoon, Sung-Wook;Rie, Dong-Ho
    • Fire Science and Engineering
    • /
    • v.25 no.1
    • /
    • pp.13-18
    • /
    • 2011
  • In the disaster prevention design, it is important point to secure escape way at event of fire which makes people away from the fire more quickly and safely. Development of construction techniques leads to build many skyscrapers, and skyscrapers contains various dangers and increase levels of disaster. At basic design stage for skyscrapers, evacuation scenario is considered that occupants are escape using escape stairs and emergency elevators simultaneously at fire, but there is no evacuation program to simulate using escape stairs and emergency elevators at the same time. In this study, evacuation simulation is performed using method of VR which is based on Virtools of 3DVIA Co., and Simulex of IES Co. for safety and effectiveness where occupants are escape using escape stairs and emergency elevators simultaneously at the fire.

A User Centered Framework to Evaluate Design Concepts of New Product Using Scenario-Based Analysis (시나리오 기반 분석을 이용한 사용자 중심의 신제품 컨셉 평가 방법론)

  • Suh, Young-Bo;Song, Joo-Bong;Lee, Cheol;Yun, Myung-Hwan
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02b
    • /
    • pp.105-111
    • /
    • 2007
  • 본 연구는 신제품 개발 과정에서 이루어지는 개념 설계(conceptual design) 단계에서의 효과적인 평가 방법론 제안을 목적으로 한다. 특히, 현재 사용자가 경험하지 못한 미래형 제품설계를 위한 개념 설계 내용이, 사용자의 잠재적 요구사항을 반영하고 사용자가 수행해야 하는 과업을 효과적으로 지원할 수 있는 지의 여부를 평가하고자 한다. 본 연구에서 제안하는 디자인 컨셉 평가 프레임웍은 3단계로 구성되어 있다. Phase 1에서는 제품의 미래 사용환경을 예측한 시나리오를 작성하여 사용 사례를 도출하고 사용 사례에 대한 과업 분석을 수행, 사용자의 수행 과업을 파악한다. Phase 2에서는 이러한 사용자의 수행 과업을 지원하기 위해 필요한 기능적 요구사항을 구현할 수 있는 기술을 체계적으로 파악하여, 기술 지도(Technology Roadmap)로서 전개한다. 이를 통해 디자인 컨셉을 구현하기 위해 현재 활용 가능한 기술 대안을 파악한다. Phase 3에서는 기술 지도를 통해 파악한 현재의 요소 기술 및 미래의 기술 대안과 사용자 요구사항간의 연관관계를 분석, 제품 개념 설계에 반영되어야 할 설계 요구사항을 도출하여 평가항목을 구성한다. 본 연구의 디자인 컨셉 평가 방법은 CSCW(Computer Supported Cooperative Work)기반 시스템의 실감 사용자 인터페이스(tangible user interface) 개발 사례를 통해 검증하였다.

  • PDF