• Title/Summary/Keyword: requirements analysis

Search Result 4,385, Processing Time 0.033 seconds

Requirements Analysis and Design of an HTML5 Based e-book Viewer System Supporting User Interaction (사용자 인터랙션을 지원하는 HTML5 기반 e-book 뷰어 시스템의 요구사항 분석 및 설계)

  • Choi, Jong Myung;Park, Kyung Woo;Oh, Soo Lyul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.2
    • /
    • pp.33-40
    • /
    • 2013
  • E-books have been popular and common in everyday life during past a decade, and the market is expected to grow much more because of the popularity of tablet computing devices such as iPad. With the helps from the devices, people want to read or experience more interactive, fun, and informative e-book contents. In order to meet those needs, we introduce requirements of an e-book viewer system that supports user interaction, 3D modeling view, and augmented reality. We also introduce some design issues of the system and its concept proof prototype system. We determine to adopt HTML5 for e-book content format because it already supports content rendering, multimedia, and user interaction. Furthermore, it is easy to implement e-book viewer because there is already Webkit component for HTML5. We also discuss design issues for integrating an Augmented Reality viewer with Webkit-based e-book viewer. This paper will give e-book viewer developers and contents developers some guidelines for new e-book systems.

Analysis of Mobility and Security Requirements for Mobile IPTV (모바일 IPTV의 이동성에 대한 침해 분석 및 대응방안)

  • Lee, Sun-Young
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.37-44
    • /
    • 2010
  • The mobility is one of the most important factor for mobile IPTV. However, mobility is highly vulnerable to eavesdropping and unauthorized access. Generally mobility of mobile services is based on handover techniques. But we showed that mobile IPTV must use other techniques to confirm mobility. In this paper, we analyzed security of wibro mobile IPTV from the viewpoint of mobility. We considered DCAS host must include new addresses of mobile devices. We analyzed total number of authentication for the proposed method. So we showed that proposed method was more efficient than wibro-mobile IPTV. We compared the security of our proposal to the security requirements of TTA.

A Decision-Supporting Model for Rehabilitation of Old Water Distribution Systems

  • Kim, Joong-Hoon;Geem, Zong-Woo;Lee, Hyun-dong;Kim, Seong-Han
    • Korean Journal of Hydrosciences
    • /
    • v.8
    • /
    • pp.31-40
    • /
    • 1997
  • Flow carrying capacity of water distribution systems is getting reduced by deterioration of pipes in the systems. The objective of this paper is to present a managerial decision-making model for the rehabilitation of water distribution systems with a mininum cost. The decisions made by the model also satisfy the requirements for discharge and pressure at demanding nodes in the systems. Replacement cost, pipe break repair cost, and pumping cost are considered in the economic evaluation of the decision along with the break rate and the interest rate to determine the optimal replacement time for each pipe. Then, the hydraulic integrity of the water distribution system is checked for the decision by a pipe network simulator, KYPIPE, if discharge and pressure requirements are satisfied. In case the system does not satisfy the hydraulic requirements, the decision made for the optimal replacement time is revised until the requirments are satisfied. The model is well applied to an existing water distribution system, the Seoul Metropolitan Water Supply System (1st Phase). The results show that the decisions for the replacement time determined by the economic analysis are accepted as optimal and hydraulic integrity of the system is in good condition.

  • PDF

Analysis of Threat Model and Requirements in Network-based Moving Target Defense

  • Kang, Koo-Hong;Park, Tae-Keun;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.10
    • /
    • pp.83-92
    • /
    • 2017
  • Reconnaissance is performed gathering information from a series of scanning probes where the objective is to identify attributes of target hosts. Network reconnaissance of IP addresses and ports is prerequisite to various cyber attacks. In order to increase the attacker's workload and to break the attack kill chain, a few proactive techniques based on the network-based moving target defense (NMTD) paradigm, referred to as IP address mutation/randomization, have been presented. However, there are no commercial or trial systems deployed in real networks. In this paper, we propose a threat model and the request for requirements for developing NMTD techniques. For this purpose, we first examine the challenging problems in the NMTD mechanisms that were proposed for the legacy TCP/IP network. Secondly, we present a threat model in terms of attacker's intelligence, the intended information scope, and the attacker's location. Lastly, we provide seven basic requirements to develop an NMTD mechanism for the legacy TCP/IP network: 1) end-host address mutation, 2) post tracking, 3) address mutation unit, 4) service transparency, 5) name and address access, 6) adaptive defense, and 7) controller operation. We believe that this paper gives some insight into how to design and implement a new NMTD mechanism that would be deployable in real network.

Functional Requirements about Modeling Methodology for CALS (CALS 구현을 위한 모델링 방법론의 기능조건)

  • 김철한;우훈식;김중인;임동순
    • The Journal of Society for e-Business Studies
    • /
    • v.2 no.2
    • /
    • pp.89-113
    • /
    • 1997
  • Modeling methodology has been widely used for analysis and design of a information system. Specially, under the CALS environments, modeling approach is more important because the enterprise functions are inter-related and information sharing speeds up the business. In this paper, we suggest functional requirements about modeling methodology for CALS by surveying the IDEF0 and ARIS. The former is FIPS 183 and the latter is basic methodology of SAP/R3 which is world-wide ERP system. The proposed functional requirements include all semantics of IDEF0 and adds some features. The first is adding modeling components which are semantic representations. In addition to ICOMs, we add the time and cost component which is required to execute the function. The second is tracing mechanism. When we need some information, we drive the functions related with the information by reverse tracing of the function which produces the information as a output and input. Through the tracing, we find out the bottleneck process or high cost process. This approach guarantees the integrity of data by designating the data ownership. Finally, we suggest the final decomposition level. We call the final decomposed function into unit function which has only one output data. We can combine and reconstruct some of functions such as 'lego block' combination.

  • PDF

Development of Social Map Prototype for Intelligent Crime Prevention based on Geospatial Information

  • Kwon, Hoe-Yun;Song, Ki-Sung;Seok, Sang-Muk;Jang, Hyun-Jin;Hwang, Jung-Rae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.8
    • /
    • pp.49-55
    • /
    • 2016
  • In this study, we proposed the social map system prototype for intelligent crime prevention. For developing the social map system prototype, functional requirements were derived through the analysis of related cases and preceding studies. Derived requirements are providing a variety of map-based safety information, using crowdsourcing data such as SNS, connecting to intelligent CCTV. To satisfy these requirements, the prototype is developed with four main menus: the integrated search menu including social media data, the safety map menu providing a variety of safety and danger information, the community map menu to collect safety and danger information from users, and the CCTV menu providing the link to intelligent CCTV. The social map for intelligent crime prevention in this study is expected to greatly enhance the safety of local community with the provision of prompt response to risk information, safe route, etc. through actual service and user participation.

Analysis of requirements for Automatic Identification System (국내 AIS 서비스 실시를 위한 요구사항 분석)

  • Shim Woo Seong;Suh Sang Hyun
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.3 no.1
    • /
    • pp.45-51
    • /
    • 2000
  • The more larger and heavier the ship, the more accidents happen in the ocean and coastal area. The IMO, IALA and ITU finalized the technical standardization process regrading performance standard and technical characteristic of Universal Ship-borne AIS. Korean government are going to setup AIS system in the coastal area in three years. To construct AIS service efficiently in Korean water, The authority should consider requirements about several things. This paper presents the consideration of our domestic AIS in view of investigation of international standard and requirements of ours.

  • PDF

How Have Indian Banks Adjusted Their Capital Ratios to Meet the Regulatory Requirements? An Empirical Analysis

  • NAVAS, Jalaludeen;DHANAVANTHAN, Periyasamy;LAZAR, Daniel
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.11
    • /
    • pp.1113-1122
    • /
    • 2020
  • The purpose of this study is to examine how the Indian banks have adjusted their risk-based capital ratios during 2009-2018 to meet the regulatory requirements. Banks can, in principle, increase their risk-based regulatory capital ratio, either by increasing their levels of regulatory capital or by shrinking their risk-weighted assets by adjusting asset growth or risk in the portfolio. We investigate banks' capital behavior by decomposing the change in the capital ratio into the contribution of its components and analyzing their variance across regulatory regimes and banks' ownerships. We further investigate how each component of the capital ratio is adjusted by the banks by breaking down them into balance sheet items. We find that the banks' capital behavior significantly differed between public and private sector banks and between the two regulatory regimes. During Basel II, banks, in general, followed a strategy of aggressive asset growth with increased risk-taking. The decline in the CRAR because of such an expansionary strategy was adjusted by augmenting additional capital. However, during Basel III, due to higher capital requirements, both in terms of quantity and quality, banks followed a strategy of cutting back their asset growth and reducing the risk in their portfolio to maintain their CRAR.

A Study on the Train Composition Requirements for Safety Operation of Urban-Transit (도시철도 안전운행을 위한 열차 구성요건에 관한 연구)

  • Jeon, Young-Seok;Lee, Hi-Sung;Wang, Jong-Bae
    • Journal of the Korean Society for Railway
    • /
    • v.14 no.1
    • /
    • pp.66-72
    • /
    • 2011
  • In order to assure the safety of train operation, a safety function analysis corresponding hazardous events of railway accidents and a safety requirement review on operation & management of trains have been performed. The preconditions and train composition requirements such as safety principles and functions that should be essentially considered to enable the safety operation of Urban-Transit trains are clearly presented. On the basis of presented train composition requirements, a rational revise of Urban Railway Operation Rule is proposed. It will be helpful in accident prevention and safety improvement for railway operation.

Analysis of Radar Performance Requirements for VTS System Based on IALA Guidelines (IALA 가이드라인에 기반한 VTS 시스템을 위한 레이더 성능 요구사항 분석)

  • Kim, Byung-Doo;Lee, Byung-Gil
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.10a
    • /
    • pp.27-29
    • /
    • 2015
  • Based on IALA guidelines, the fundamental requirements of radar system for vessel traffic services are analyzed in this paper. target separation, target position accuracy, target track accuracy of X-band radar and recommended test conditions are analyzed. Also, in order to check if it satisfies the requirement of target position accuracy from IALA guideline, the test is carried out through processing of radar raw image acquired at VTS center.

  • PDF