• Title/Summary/Keyword: Service Requirement

Search Result 814, Processing Time 0.031 seconds

A Study on the Standard for Number portability (번호이동성 구현을 위한 규격 연구)

  • 정영식;박종봉;김영태
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.575-578
    • /
    • 2001
  • Number Portability means that one can use his original telephone number when he change telephone service provider, region and the kind of service. Number portability is not necessary when only one telephone service provider exist in korea. But it is necessary to guarantee pair competition among the service providers as new communication service provider comes. The law which is related number portability is established by government as number portability is considered a tool to guarantee pair competition between old service provider and new service provider. A national standard on number portability with which all service provider can agree is needed. We developed functional standard for that purpose. Functional standard includes call processing structure, network requirement. This paper handle functional standards.

  • PDF

A Framework For Web Service Evolution using UML and OWL-S (UML과 OWL-S를 사용한 웹 서비스 진화 프레임워크)

  • Kim, Jin-Han;Lee, Chang-Ho;Lee, Jae-Jeong;Lee, Byung-Jeong
    • Journal of Digital Contents Society
    • /
    • v.8 no.3
    • /
    • pp.269-277
    • /
    • 2007
  • Web service is an important technology to develop business to business e-commerce application. From a business perspective of time to market, dynamic evolution offers flexibility that software can adapt to unforeseen and fluctuating business requirements. OWL-S, based on OWL, is a service ontology language. The semantics provided by OWL support automation of service discovery, invocation, and service composition. In this paper we propose a framework to support dynamic evolution of service-oriented applications. We extend use-case analysis method to derive service description by defining requirements concept and mapping from requirement concept to activity diagram. A prototype is provided to show the validity of this framework.

  • PDF

The use Frequency and Amount of Food Sources of Sodium and Knowledge Requirement, and Job Satisfaction of Dietitians and Nutrition Teachers according to the School Types in Busan (부산지역 학교유형별 영양(교)사의 지식요구도, 직무만족도 및 나트륨 급원재료 사용량)

  • Yeon, Jee-Young;Lee, Soon-Kyu;Kang, Baeg-Won
    • Korean Journal of Community Nutrition
    • /
    • v.19 no.2
    • /
    • pp.198-211
    • /
    • 2014
  • Objectives: To investigate the use frequency and amount of food sources of sodium and knowledge requirement, and job satisfaction with school food services according to the school types in Busan. Methods: A total of 98 schools were surveyed and knowledge requirement and job satisfaction were assessed using a questionnaire. In addition, the use frequency and amount of food sources of sodium for 10 school days were examined. Results: The response rate of the most difficult area among dietitians' tasks was significantly high in 'nutrition education and counseling' for elementary schools and 'hygiene management' for high schools (p < .05). The response rate of the factors to be considered in meal planning was significantly high in 'energy and nutrients requirement' for elementary schools and 'menu/taste preference of students' for middle and high schools (p < .05). The response rate of whether school food services affect health and eating habits of students or not was significant high in 'very helpful' for elementary schools (p < .001). The average sodium contents in the meals of elementary, middle and high schools was 1981.4 mg/meal/person/day, 1867.3 mg/meal/person/day and 1,329.9 mg/meal/person/day, respectively. For foods in highest sodium, Kimchi, Oribulgogi, and Kare rice were ranked 1st, 2nd and 3rd respectively. The main reason for not providing the fruits was 'price' among all groups. The knowledge requirement such as 'nutrition and menu management', 'nutrition education', and 'nutrition counseling' was significantly higher in elementary school compared with middle and high school (p < .001, p < .01, and p < .01 respectively). The dietitians and nutrition teachers of elementary schools have a higher job satisfaction compared with those of middle schools (p < .01). The job satisfaction was positively correlated with knowledge requirement of dietitians and nutrition teachers of elementary and middle schools. Conclusions: The results suggest that developing dietitians' education program about knowledge requirement contribute to increasing the school food service and job satisfaction in elementary and middle schools.

Topology Control Scheme Providing Throughput Requirement of a Service in Wireless Sensor Networks (무선 센서 네트워크에서 서비스에 필요한 데이터 전송량을 확보하기 위한 토폴로지 관리 방법)

  • Youn, Myungjune;Kim, Seog-gyu;Lee, Jaiyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.9
    • /
    • pp.1767-1775
    • /
    • 2015
  • There are various kinds of applications for wireless sensor network, and each application has difference requirements such as throughput. Topology control is the key issue to minimize energy consumption by solving communication collision and radio interference. However, existing topology control algorithms cannot support application requirement because communication efficiency and network connectivity are the main issues of topology control. In this paper, we propose a topology control algorithm that support throughput requirement of an application.

Processes and Methods for Eliciting Software and System Requirements from Users' Opinions in Mobile App (모바일 앱의 사용자 의견으로부터 소프트웨어 및 시스템 요구사항을 추출하기 위한 프로세스와 방법)

  • Oh, Dong-Seok;Kim, Sun-Bin;Rhew, Sung-Yul
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.397-410
    • /
    • 2014
  • For mobile service organizations, it is one of the most important tasks to reflect users' opinions rapidly and accurately. In this study, the process is defined to elicit requirements of software/system improvement for mobile application by extracting and refining from users' opinion in mobile app, and detailed activities procession method in this processing are also proposed. The process consists of 3 activities to get requirements of software/system improvement for mobile app. First activity is to transform mobile app to software structure and define term dictionary. Second activity is to elicit simple sentences based on software from users' opinion and refine them. The last activity is to integrate and adjust refined requirements. To verify the usability and validity of the proposed process and the methods, the outputs of manual processing and semi-automated processing were compared. As a result, efficiency and improvement possibility of the process were confirmed through extraction ratio of requirements, comparison of execution time, and analysis of agreement ratio.

A Comparative Legal Study on the Electronic Transactions Act in Thailand (태국의 전자거래법에 대한 비교법적 고찰 - 전문 및 일반규정을 중심으로 -)

  • Shim, Chong-Seok;Oh, Hyon-Sok
    • International Commerce and Information Review
    • /
    • v.12 no.4
    • /
    • pp.405-427
    • /
    • 2010
  • This legal study is to compare the Electronic Transactions Act in Thailand(hereinafter 'ETA') with mainly other countries electronic transactions acts, such as UNCITRAL MLEC, UECIC, VETA, UCITA and Korea' Electronic Transactions Act The ETA is consisted of 6 chapters which included preamble and definitions. Each chapter's main point as follows. Preamble is related to the name, time of legal effect, scope and definitions. Chapter 1 is not only general principles of electronic transactions, required restriction in addition to specify the limit of application, documentation, evidential weight in reference to the data message, but also the conditions of offer and acceptance through data message, time and place of dispatch and receipt of data message, certification between origination and addressee. According to media-neutrality and the effectiveness security requirement of data message under the information system, legal certification is related to the exchange's declaration of intention, define about origination-addressee of data message. Chapter 2 is composed to provide expressly about the effectiveness security in electronic signature. Those contents are to compare the MLEC, UECIC and Electronic Transactions Act in Korea. Chapter 3 is related to legal definitions that present legal requirement about service relating electronic transaction which contents accept domestic law, the adequate requirement as eligibility, satisfied matter, self-reliance ratio of finance and other detail standard Chapter 4 is deal with the transaction which are public sector and those application requirements. And also this chapter are composed regulations about direct-indirect purpose of Thailand domestic electronic government.

  • PDF

Design on Fixed Quantity Analytical Model for Information System Audit based on Requirements (요구사항 기반 정보시스템 감리의 정량화 분석 모델 설계)

  • Kim, Hee-Wan;Kim, Hun-Kyeom;Koh, Chan;Kim, Dong-Soo
    • Journal of Digital Convergence
    • /
    • v.9 no.5
    • /
    • pp.141-156
    • /
    • 2011
  • Auditors' subjective opinions m audit activities weaken reliability in audit judgments. This paper suggests fixed quantity models through requirement priority for improving objective evaluation and priorities of requirements in information system audit. The value of requirements was evaluated based on customers' requirements with a premise that they are not in the same level. Furthermore, the audit objective judgments were enhanced to enable fixed quantity of subjective audit by subdividing detailed evaluation index of requirement priority standards into importance of service and function on orderers' perspective, and sectioning cost and schedule on contractors' perspective.

A Study on Measures in the Tourism Service Sector of WTO Service Negotiations (관광서비스 부문 WTO 서비스 협상 동향과 우리나라의 대응방안)

  • Shin, Jai-Gi
    • The Journal of Information Technology
    • /
    • v.8 no.2
    • /
    • pp.121-133
    • /
    • 2005
  • The WTO(World Trade Organization) meetings for service negotiations started in February in 2000. Since then, the member countries have discussed the tourism sector and their expectations and methods of liberalization, based on the proposals they have submitted. The Republic of Korea had already opened hotels and restaurants, travel agencies and tour operator services, and tourist guide services, preceding of WTO service negotiations. However, to comply with the terms of the negotiations, the domestic laws and systems related to tourism should be analyzed according to their adherence to the principles of GATS(General Agreement on Trade in Services), which include market access and national treatment. Thus, the purposes of this study were two-fold: first, regarding the two basic principles of GATS(market access and national treatment), the articles of the administrative laws relating to tourism were examined. Second, proposals from the tourism sectors in the US, Canada, Dominique, EC, Switzerland, and Japan were also summarized and reviewed. Proper responses to service negotiations were proposed based on the results of this analysis. As a result, I can support the GATS classification(w/120) of tourism and the liberalization of tourism in other WTO member countries. I can also support the elimination of obstacles such as economic need tests and nationality requirement. 'Others' category should be considered more carefully according to the competitiveness of the given industry.

  • PDF

IEEE 802.15.4 MAC-based Location-ID Exchange Protocol for Realizing Micro-Cell Connectionless Location- Awareness Services

  • Kim, Baek-Gyu;Kang, Soon-Ju
    • Journal of Computing Science and Engineering
    • /
    • v.2 no.4
    • /
    • pp.412-427
    • /
    • 2008
  • We propose ID-exchange protocol for Connectionless Location-Awareness Service (CLAS) to locate mobile nodes in indoor sensor network. When adapting location-awareness service to sensor network, the target system must be designed in accordance with various metrics which reflect the system requirement. We especially consider sustainability of the existing service which has been provided for its original purpose, such as environmental monitoring. The detailed meaning of sustainability here is that, even if location-awareness service is newly added to the existing service, the system must be assured to retain a stable network condition, and to deal with newly caused traffic properly. The CLAS ID-exchange protocol is especially designed for fixture and mobile nodes communication to achieve these properties. The protocol operates on 802.15.4 MAC layer to make mobile node work independently of the procedure to build routing table of fixture node, so a stable routing condition can be achieved even if there are many mobile nodes. Moreover, the dedicated frequency channel is assigned only for this protocol, so that traffic caused by location-awareness service can be distributed to another channel. A real system adapting the protocol was implemented to monitor fire and authorities' positions. We verified the overhead and elapsed time for location-awareness. The result shows the proposed protocol has a high performance in detecting speed, traffic distribution, and stability of overall network.

CAS-based Security System for IPTV (CAS기반 IPTV 보안 시스템)

  • Kim, Dae-Youb;Ju, Hak-Soo
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.221-226
    • /
    • 2008
  • IPTV is well known services of TPS (Triple play service). Since TPS supplies the bundle service, service providers can supply low-priced services for their subscribers. To supply high quality contents stably, it is an essential requirement to make payment for the services. According to the type of services, either CAS or DRM is used to protect the pay-contents service. Also IPTV uses or will use these security systems to protect the service. In this paper, we will describe security problems when a IPTV service provider chooses either CAS or DRM, and then propose a new security system to solve the problems.