• Title/Summary/Keyword: User Requirement Analysis

Search Result 202, Processing Time 0.023 seconds

A Methodology for Ontology-based Service Drawing for SOA (SOA를 위한 온톨로지 기반의 서비스 도출 방법론)

  • Jang, Ryo-Sun;Park, Sei-Kwon;Ryu, Seung-Wan;Shin, Dong-Cheon
    • Journal of Information Technology Services
    • /
    • v.10 no.2
    • /
    • pp.309-327
    • /
    • 2011
  • Even though several methodologies for SOA(Service Oriented Architecture) have been proposed, in practical aspects most of them have some problems since they fail to propose specific policies in definition and identification of a service. This paper proposes a service modeling methodology. SOMO(Service Oriented Modeling using Ontology), which draws proper services in the process of defining and identifying services. SOMO defines a service ontology based on service definition and characteristics in SOA. The service drawing process consists of 3 steps : requirement analysis, service identification, and service definition. SOMO is expected to increase the degree of reuse and facilitates the definition and search of services by using service ontology. In addition, it clearly allows the definition and identification of services, satisfying the user requirements.

A Feature-based Reconstruction Algorithm for Structural Optimization (구조 최적화를 위한 특징형상 재설계 알고리즘)

  • Park, Sangkun
    • Journal of Institute of Convergence Technology
    • /
    • v.4 no.2
    • /
    • pp.1-9
    • /
    • 2014
  • This paper examines feature-based reconstruction algorithm using feature-based modeling and based on topology optimization technology, which aims to achieve a minimal volume weight and to satisfy user-defined constraints such as stress, deformation related conditions. The finite element model after topology optimization allows us to remove some region of a solid model for predefined volume requirement. The stress or deformation distribution resulted from finite element analysis enables us to add some material to the solid model for a robust structure. For this purpose, we propose a feature-based redesign algorithm which inserts negative features to the solid model for material removal and positive features for material addition, and we introduce a bisection method which searches an optimal structure by iteratively applying the feature-based redesign algorithm. Several examples are considered to illustrate the proposed algorithms and to demonstrate the effectiveness of the present approach.

A study on the implementation of a CATV status monitoring system using HDLC protocol (HDLC 프로토콜을 채용한 CATV 망감시 시스템 구현에 관한 연구)

  • 김내진;김진태;박인갑
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.31A no.10
    • /
    • pp.10-20
    • /
    • 1994
  • This paper presents a CATV SMS (Status Monitoring System) using HDLC (High Level Data Link Contorl) protocol and the system implementation.The system specifications were derived from the analysis of technical status and requirement of the domestic CATV industry. For the interoperability with a global network management system in the future, HDLC protocol was adopted in the system. The system performance was improved by using the communication controller chip and the large data buffer. For reducting the communication problems induced by accumulated noise in up-stream data channels, the system was designed that the different communication channel can be assigned to each proper mass of terminal. The operating software was designed with menu driven user interface and have various functions for the convenience of users. The test result of the implemented system at the experimental network showed good performance and suitability for a coaxial CATV Status Monitoring System.

  • PDF

Ubiquitous Computing & Network Security Analysis (유비쿼터스 컴퓨팅 & 트워크 보안분석)

  • 정상일;송원덕;이원찬;윤동식
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.35-42
    • /
    • 2004
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this situation we must analytics that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.struction.

  • PDF

Design of cryostat for superconducting quadrupole magnets in In-Flight fragmentation separator

  • Choi, Y.S.;Chang, H.M.;Baudouy, B.;Kim, D.G.;Kim, J.W.
    • Progress in Superconductivity and Cryogenics
    • /
    • v.17 no.3
    • /
    • pp.62-66
    • /
    • 2015
  • The cryostat is designed for the superconducting quadrupole magnets to be used in a heavy-ion accelerator facility. The main accelerator is superconducting linac, which can accelerate a $^{238}U$ beam to 200 MeV/u (Mega electron voltage per nucleon). The cryostat for the magnet employs an innovative design primarily driven by the requirement of the compactness, user-friendliness and reliability. Also, several ancillary requirements such as background field, space restriction due to the beam line and cryostat structure need technical attentions. The development of the cryostat for three quadrupole magnets in the in-flight fragmentation separator is presented in the paper. The concept of cryogenic design is reported and the amount of cryogenic load is estimated by a relevant analysis. The structure of the cryostat to endure the heavy iron yoke including three quadrupole magnets is presented. In addition, the design as well as the performance test of the support link for the cold mass is described.

Kernel Level Power Management Solution for Multi-Core (멀티코어 환경에서 커널 수준의 전력 관리 솔루션)

  • Ahn, Youngho;Hwang, Young-Si;Chung, Ki-Seok
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.4 no.2
    • /
    • pp.50-54
    • /
    • 2009
  • In this paper, we address a novel system-level power management technique which is specifically targeted for an ARM 11 MPCore system. Our proposed solution is a DPM technique which includes process monitoring, real time power analysis, and policy application to reduce the power consumption while meeting the performance requirement. One of the main contributions of this paper is that we systematically infer QoS requirements of processes without getting any additional information from the application. When multiple processes are running under various user level policies, priorities of the policy application are determined in such a way that the overall system performance is maintained while power consumption is effectively managed. Experimental results show that our DPM technique is very effective in reducing power consumption without violating system's QoS requirements.

  • PDF

Condition Monitoring System Construction for Electrical Equipments of Metropolitan Rapid Transit (도시철도 전력설비 상태감시 시스템 구성)

  • Park, Hyun-Soo;Choi, Gwang-Bum;Uh, Soo-Young;Ryu, Ki-Seon;Im, Hyeong-Gil;Jung, Ho-Sung;Park, Young;Ko, Sung-Bum
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.447-451
    • /
    • 2009
  • Metropolitan rapid transit has been used by one of a main transport service for several decades, but there are no monitoring system for electrical equipment condition which can cause enormous economic loss and social problem if fault occurs. Recently, necessity of condition monitoring system for electrical equipment fault came to the fore, we became carrying out a research project for a design of electrical equipment lifetime estimation system for metropolitan rapid transit. In this paper, basic design result of condition monitoring system and specification of transformer partial discharge detection system are presented, which are part of entire lifetime estimation system. Definition of target apparatus and monitoring method determined by analysis of user requirement from each railway company and, each railway company's opinions and requests were collected sufficiently by surveys and discussion.

  • PDF

Development of Requirements Tracking and Verification System for the Software Design of Distributed Control System

  • Jung, Chul-Hwan;Kim, Jang-Yeol;Kim, Jung-Tack;Lee, Jang-Soo;Ham, Chang-Shik
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1998.05a
    • /
    • pp.335-340
    • /
    • 1998
  • In this paper a prototype of Requirement Tracking and Verification System(RTVS) for a Distributed Control System was implemented and tested. The RTVS is a software design and verification tool. The main functions required by the RTVS are managing, tracking and verification of the software requirements listed in the documentation of the DCS. The analysis of DCS software design procedures and inter(aces with documents were performed to define the user of the RTVS, and the design requirements for RTVS were developed.

  • PDF

A Study of the Ubiquitous Computing and Network Security (유비쿼터스 컴퓨팅 및 네트워크의 보안연구)

  • Lee, Dae-Sik;Yun, Dong-Sic
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this paper we must analysis that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.

  • PDF

Performance Analysis of Amplify and Forward (AF)-based Cooperative Spectrum Sensing in Cognitive Radio Networks

  • Khan, Muhammad Sajjad;Koo, Insoo
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.4
    • /
    • pp.223-228
    • /
    • 2013
  • Cognitive radio has been recently considered a promising technology to improve spectrum utilization by enabling secondary access to licensed bands that are not used by primary users temporarily or spatially. A prerequisite to this secondary access is the lack of interference to the primary system. This requirement makes spectrum sensing a key process for cognitive radio. In this study, we consider amplify and forward (AF)-based cooperative spectrum sensing for cognitive radio networks where multiple relay nodes are utilized to amplify and forward the primary user signal for better spectrum sensing, and maximum ratio combining is used for fusion detection by a cognitive coordinator. Further, the detection probability and the bit error rate of AF-based cooperative spectrum sensing are analyzed in fading multiple cognitive relay channels. The simulation results show that the AF-based cooperative spectrum sensing scheme outperforms the conventional scheme.