Life-Cycle Cost is defined as a sum of the cost related to the purchase, possession, and use of products, system and service in a specific period. This means that life-cycle cost is a cost needed to possess and manage the facilities, production system and the products. Life-Cycle Cost analysis reflects the present and future cost of the official period. So, it becomes a tool that is used to evaluate and compare the alternatives. The fact that life-cycle cost analysis is a general tool that can express the many aspects of the cost and time in the standards of equivalent capital. This paper proposes the software life-cycle cost analysis methods by adapting the general analysis techniques to the software projects.
IT device is a hardware system which has special processor and interface modules for it's own function and performance upgrade. On property right verification of these system, there could be a mis-result when they have open source and general known program code by a interface module company. Therefore this paper shows the guideline to keep the property right of owner on the module interface and communication interface, IO interface whether it has open source or not.
The development of software cost estimation guidelines has difficulties in recognizing the pace of technology development of the software industry, and the software cost estimation guidelines don't reflect many software cost estimation methods. This led MKE and NIPA to declare the abolition of the current software cost estimation guidelines on February 2012. This paper examines the alternatives in the order of scope definition, size estimation, effort estimation, cost estimation and evaluates the applicability of each other. Specifically, it derives the best method by evaluating the priorities of the alternatives from AHP.
To evaluate the quality of clone detection tools, we should know how many clones the tool misses.
Hence we need to have the standard code-clone reference corpus for a carefully chosen set of sample source codes. The reference corpus available so far has been built by manually collecting clones from the results of various existing tools. This paper presents a tree-pattern-based clone detection tool that can be used for automatic generation of reference corpus. Our tool is compared with CloneDR for precision and Bellon's reference corpus for recall. Our tool finds no false positives and 2 to 3 times more clones than CloneDR. Compared to Bellon's reference corpus, our tools shows the 93%-to-100% recall rate and detects far more clones.
In this paper, overview of current ISO/IEC 9126 and 14598 series are introduced and some problems in those series for the improvement are identified. Then the concept and architecture of SQuaRE which is the next generation of the standard on software product quality is discussed. In addition, we consider the present state and the confronted problem of standard on software product quality in Korea.
As the Unified Modeling Language (UML) becomes an industrial standard for object-oriented software development, many system models have been specified in UML notation. For example, a system can be described in terms of the functional view through the use case model, the static view through the class model, and the dynamic view through activity or sequence model. In particular, activity model has more to do with the subject of the modeling and the experience of the modeler; for business modeling, for modeling the logic captured by a single use case or for modeling the detailed logic of a business rule. In this paper we propose mapping rules and a transformation algorithm to translate a UML activity diagram into a Colored Petri Nets (CPNs).
ZigBee is targeted at wireless applications that require a low data rate, long operation life, and low implementation cost. ZigBee protocol is simpler and less expensive than other wireless protocols such as WLAN and Bluetooth. The low cost allows the ZigBee technology to be widely deployed in wireless control and monitoring applications and the low power-usage allows longer life with smaller batteries. But advantages of simplicity and low cost in ZigBee cause security problems. For example, ZigBee offers no protection against replay attacks, in which an attacker simply resends recorded packets to the network.
In this paper, simulation node models of the attacker are developed for implementing environments of study on security of ZigBee networks. The developed node models have the attack functions such as ZBdump, ZBreplay, and ZBassocFlooding. In order to verify the developed models, we designed and constructed several simulation scenarios. The simulation results show that the developed simulation node models are useful for ZigBee security studies in various environments.