• Title/Summary/Keyword: Software Quality-in-use

Search Result 469, Processing Time 0.032 seconds

A Defect Prevention Model based on SW-FMEA (SW-FMEA 기반의 결함 예방 모델)

  • Kim Hyo-Young;Han Hyuk-Soo
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.7
    • /
    • pp.605-614
    • /
    • 2006
  • The success of a software development project can be determined by the use of QCD. And as a software's size and complexity increase, the importance of early quality assurance rises. Therefore, more effort should be given to prevention, as opposed to correction. In order to provide a framework for the prevention of defects, defect detection activities such as peer review and testing, along with analysis of previous defects, is required. This entails a systematization and use of quality data from previous development efforts. FMEA, which is utilized for system safety assurance, can be applied as a means of software defect prevention. SW-FMEA (Software Failure Mode Effect Analysis) attempts to prevent defects by predicting likely defects. Presently, it has been applied to requirement analysis and design. SW-FMEA utilizes measured data from development activities, and can be used for defect prevention on both the development and management sides, for example, in planning, analysis, design, peer reviews, testing, risk management, and so forth. This research discusses about related methodology and proposes defect prevention model based on SW-FMEA. Proposed model is extended SW-FMEA that focuses on system analysis and design. The model not only supports verification and validation effectively, but is useful for reducing defect detection.

A Study on the Apple Watch Satisfaction and Continuous Use Intention : Evidence from the Chinese Market (애플워치 만족도와 지속적 사용의도에 대한 실증연구 : 중국시장을 중심으로)

  • Ruan, Jing-kun;Song, Hyo-jung;Kim, Tae-ha
    • Journal of Venture Innovation
    • /
    • v.6 no.3
    • /
    • pp.73-93
    • /
    • 2023
  • This study provides a prospect for the fast growing the smartwatch market by investigating the relationship between the satisfaction and the continuous use intention of Apple watch users, as well as the factors influencing their satisfaction. Based on the TAM, this study uses system quality, information quality, and self-efficacy as independent variables, perceived usefulness, perceived ease of use, and satisfaction as mediators, and continuous use intention as the dependent variable. We analyze the data of 256 individuals who completed an online survey with SPSS 26.0 and AMOS 26.0 software. This study conducts several tests and analyses to empirically evaluate the data including reliability analysis, factor analysis, feasibility analysis, path analysis, hypothesis verification, and mediation analysis. Our results investigate which factors may influence consumers' intention to continuously using Apple Watch devices in the future. In summary, satisfaction has a positive effect on the intention to continuously use smartwatchs. Perceived usefulness and perceived ease of use have a positive effect on satisfaction. Among the three factors (system quality, information quality, and self-efficacy), only self-efficacy has no significant impact on perceived usefulness but had a positive effect on perceived ease of use. In addition, system quality and information quality positively affect perceived usefulness, perceived ease of use, satisfaction, and continuous intention to use an Apple Watch. Taking the Apple Watch as the subject of our research topic, this study provides theoretical value by exploring the impact of user's satisfaction with their smartwatch on their continuous usage intention. This study further explains the influence of system quality, information quality, and self-efficacy on user satisfaction. Additionally, this research offers valuable insight to practitioners by confirming that information quality, system quality, and self-efficacy are important features for enhancing satisfactory user experiences which in turn may increase users' intention to continued using smartwatches.

A Study on the impact of ChatGPT Quality and Satisfaction on Intention to Continuous Use (ChatGPT 품질과 활용만족이 지속적 이용의도에 미치는 영향)

  • Park Cheol Woo;Kang Gyung Lan
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.18 no.6
    • /
    • pp.191-199
    • /
    • 2023
  • The purpose of this study is to examine the impact of ChatGpt's quality on users' satisfaction and intention to continuous use it. For this purpose, a survey was conducted targeting college students in the Busan and Gyeongnam regions, and responses from a total of 155 people were verified using the SPSS 28.0 program. As a result of the study, reliability and stability among ChatGPT quality factors were found to have a positive effect on satisfaction with use and intention to continuous use. Satisfaction with the use of ChatGPT was found to have a positive effect on intention to continuous use.. Satisfaction with use was found to have a positive mediating effect between the reliability and stability of ChatGPT quality and intention to continous use it. As a result of this study, we aim to contribute to suggesting educational and policy directions necessary to promote the use of ChatGPT by presenting factors that affect users' intention to continuous use ChatGPT among the qualities of ChatGPT.

  • PDF

Design Patterns for Android Game Programming (안드로이드 게임 프로그래밍을 위한 설계 패턴)

  • Kim, Dong Kwan
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.8
    • /
    • pp.17-24
    • /
    • 2018
  • Design patterns can be classified as software reuse technique that might provide effective solutions to specific problems that occur repeatedly in software development. In particular, object-oriented design patterns are incorporated into various software platforms and frameworks to increase software productivity. This paper aims to support general guidelines relating to design patterns for Android-based game programming. The proper use of the design pattern could be effective in not only for software development productivity, but also for post-development software maintenance. This paper provides fundamental procedures and case studies for applying design patterns to game programming on the Android platform. Typical object-oriented design patterns such as MVP, Singleton, Observer, and State have been applied to the development of Android game programs.

A Study on the effective computer usage in design education (디자인 교육에 있어서 컴퓨터의 효율적 활용방안 연구)

  • 김진용
    • Archives of design research
    • /
    • v.13 no.1
    • /
    • pp.219-225
    • /
    • 2000
  • Most of designers use applied software of computer programs instead of traditional tools such as brushes, poster colors, etc. for drawing and designing. For example applied software programs for design are applied the workings printing, presentation, movie, animation, character design as well as industrial design. Especially, quality of applied software programs in the field of visual communication design influence on the design results in future. Therefore, many college attempt to invest budget to inhrence the quality of software program in design education. However, effectiveness of investment is lowered due to the professional lack of software knowledge. This study tries to explore how the investment for software program in visual communication design becomes more effective, and to suggest how the order of software program, design curriculum through the affective computer usage in design education will be more useful than now. By comparing and contrasting the different cases in the computer environments of the colleges, this study was processing, the result of this study will contribute to the design education of visual communication.

  • PDF

Implementing Rule-based Healthcare Edits

  • Abdullah, Umair;Shaheen, Muhammad;Ujager, Farhan Sabir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.116-132
    • /
    • 2022
  • Automated medical claims processing and billing is a popular application domain of information technology. Managing medical related data is a tedious job for healthcare professionals, which distracts them from their main job of healthcare. The technology used in data management has a sound impact on the quality of healthcare data. Most of Information Technology (IT) organizations use conventional software development technology for the implementation of healthcare systems. The objective of this experimental study is to devise a mechanism for use of rule-based expert systems in medical related edits and compare it with the conventional software development technology. A sample of 100 medical edits is selected as a dataset to be tested for implementation using both technologies. Besides empirical analysis, paired t-test is also used to validate the statistical significance of the difference between the two techniques. The conventional software development technology took 254.5 working hours, while rule-based technology took 81 hours to process these edits. Rule-based technology outperformed the conventional systems by increasing the confidence value to 95% and reliability measure to 0.462 (which is < 0.5) which is three times more efficient than conventional software development technology.

Priority Analysis for Software Functions Using Social Network Analysis and DEA(Data Envelopment Analysis) (사회연결망 분석과 자료포락분석 기법을 이용한 소프트웨어 함수 우선순위 분석 연구)

  • Huh, Sang Moo;Kim, Woo Je
    • Journal of Information Technology Services
    • /
    • v.17 no.3
    • /
    • pp.171-189
    • /
    • 2018
  • To remove software defects and improve performance of software, many developers perform code inspections and use static analysis tools. A code inspection is an activity that is performed manually to detect software defects in the developed source. However, there is no clear criterion which source codes are inspected. A static analysis tool can automatically detect software defects by analyzing the source codes without running the source codes. However, it has disadvantage that analyzes only the codes in the functions without analyzing the relations among source functions. The functions in the source codes are interconnected and formed a social network. Functions that occupy critical locations in a network can be important enough to affect the overall quality. Whereas, a static analysis tool merely suggests which functions were called several times. In this study, the core functions will be elicited by using social network analysis and DEA (Data Envelopment Analysis) for CUBRID open database sources. In addition, we will suggest clear criteria for selecting the target sources for code inspection and will suggest ways to find core functions to minimize defects and improve performance.

Happy Work : A Software Architecture Design Environment (Happy Work : 소프트웨어 구조 설계 환경의 개발)

  • 강병도
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.5 no.3
    • /
    • pp.87-93
    • /
    • 2000
  • Recently Software Industry has tended to enhance the productivity and quality with using the software architecture in software development and administration. The research of software component technique and software development methodology are just doing and making many applications. The software architecture is considered as the essential element for analyzing and maintaining the entire structure with organizing the software into components and describing the relations with connectors. The software modeling methodology that we propose is generating Happy Work Language describing the software structure with the modeling tool as Happy Work. We can use System Context Diagram, Component Diagram, Component Sequence Diagram, and they are composed of four Elements as Users, Systems, Components, Connectors.

  • PDF

Software Quality Classification Model using Virtual Training Data (가상 훈련 데이터를 사용하는 소프트웨어 품질 분류 모델)

  • Hong, Euy-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.7
    • /
    • pp.66-74
    • /
    • 2008
  • Criticality prediction models to identify most fault-prone modules in the system early in the software development process help in allocation of resources and foster software quality improvement. Many models for identifying fault-prone modules using design complexity metrics have been suggested, but most of them are training models that need training data set. Most organizations cannot use these models because very few organizations have their own training data. This paper builds a prediction model based on a well-known supervised learning model, error backpropagation neural net, using design metrics quantifying SDL system specifications. To solve the problem of other models, this model is trained by generated virtual training data set. Some simulation studies have been performed to investigate feasibility of this model, and the results show that suggested model can be an alternative for the organizations without real training data to predict their software qualities.

Analysis of Detection Ability Impact of Clang Static Analysis Tool by Source Code Obfuscation Technique (소스 코드 난독화 기법에 의한 Clang 정적 분석 도구의 성능 영향 분석)

  • Jin, Hongjoo;Park, Moon Chan;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.605-615
    • /
    • 2018
  • Due to the rapid growth of the Internet of Things market, the use of the C/C++ language, which is the most widely used language in embedded systems, is also increasing. To improve the quality of code in the C/C++ language and reduce development costs, it is better to use static analysis, a software verification technique that can be performed in the first half of the software development life cycle. Many programs use static analysis to verify software safety and many static analysis tools are being used and studied. In this paper, we use Clang static analysis tool to check security weakness detection performance of verified test code. In addition, we compared the static analysis results of the test codes applied with the source obfuscation techniques, layout obfuscation, data obfuscation, and control flow obfuscation techniques, and the static analysis results of the original test codes, Analyze the detection ability impact of the Clang static analysis tool.