• Title/Summary/Keyword: Requirement Analysis

Search Result 2,430, Processing Time 0.037 seconds

Requirement Analysis for Development of EVMS in Nuclear Power Plant (원전건설 성과관리시스템(EVMS) 개발을 위한 요건 분석)

  • Won, Seo-Kyung;Park, Weon-Seob;Chong, Young-Whan;Kim, Jae-Yong;Kim, Yun-Myung
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2013.05a
    • /
    • pp.271-272
    • /
    • 2013
  • The Korean nuclear industry acquired technology for each construction stage including engineering, procurement, construction and commissioning from advanced nuclear countries. While the levels of technology and quality have greatly improved, the same cannot be said for the level of project management. In particular, the level of project performance measurement and forecasting project risk still remain at the single project management level. Thus, this paper reviewed the concept of the EVMS method and requirement for the system. The adoption of the EVMS, an advanced project management method, can enable efficient management of project risks and promote an adequate environment for project implementation.

  • PDF

Analysis of the Formal Specification Application for Train Control Systems

  • Jo, Hyun-Jeong;Yoon, Yong-Ki;Hwang, Jong-Gyu
    • Journal of Electrical Engineering and Technology
    • /
    • v.4 no.1
    • /
    • pp.87-92
    • /
    • 2009
  • Many critical control systems are developed using formal methods. When software applied to such systems is developed, the employment of formal methods in the software requirements specification and verification will provide increased assurance for such applications. Earlier errors of overlooked requirement specification can be detected using the formal specification method. Also, the testing and full verification to examine all reachable states using model checking to undertake formal verification are able to be completed. In this paper, we proposed an eclectic approach to incorporate Z(Zed) formal language and 'Statemate MAGNUM', formal method tools using Statechart. Also we applied the proposed method to train control systems for the formal requirement specification and analyzed the specification results.

A New Method for Assessing Dynamic Reliability for the Mid-loop Operation (원전의 부분충수운전에 대한 동적 신뢰도평가)

  • 제무성;박군철
    • Journal of the Korean Society of Safety
    • /
    • v.11 no.2
    • /
    • pp.52-59
    • /
    • 1996
  • This paper presents a new approach for assessing the dynamic reliability in a complex system such as a nuclear power plant. The method is applied to a dynamic analysis of the potential accident sequences which may occur during mid-loop operation. Mid-loop operation is defined as an operation to make RCS water level below the top of the flow area of the hot legs at the junction with the reactor vessel for repairs and maintenance of steam generators and reactor coolant pumps for a specific time. The Idea behind this approach consists of both the use of the concept of the performance achievement/requirement correlation and of a dynamic event tree generation method. The assessment of the system reliability depends on the determination of both the required performance distribution and the achieved performance distribution. The quantified correlation between requirement and achievement represents a comparison between two competing variables. It is demonstrated that this method is easily applicable and flexible in that it can be applied to any kind of dynamic reliability problem.

  • PDF

Analysis FIPS 140-2 DTR(Derived Test Requirement of FIPS 140-2 of CMVP(Cryptographic Module Validation Program) (암호화 모듈 평가 프로그램(CMVP) 표준인 Derived Test Requirement(DTR) of FIPS 140-2 분석)

  • 이병석;정성민;박성근;김석우;박일환
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.311-316
    • /
    • 2003
  • 정보통신기술의 발달로 대부분 사회의 기반구조가 사이버 사회로 전환되었고 다양한 형태의 경제사회 활동을 수행키 위해 정보보호제품의 활용이 극대화되었으며 더욱 중요시되었다. 이러한 사회흐름에 기반하여 정보보호제품의 안전한 선택 및 사용을 위한 기본적 선택기준은 검증받은 암호화 모듈을 바탕으로 하는 정보보호제품에 대한 신뢰 기관의 안전성 평가 결과일 것이다. 암호화 모듈에 대한 안전성 평가로 가장 널리 참조되는 것은 미국의 NIST(National Institute of Standards and Technology)가 수행하는 CMVP(Cryptographic Module Validation Program)이며, 세계적으로 인정받고 있다. 본 논문에서는 암호 모듈의 평가체계에 대해 설명하였으며 그 기준인 FIPS 140-2 DTR을 분석하여 향후 개발 가능한 CMVP의 안전성 평가 툴 기준에 대해 제시하였다.

  • PDF

A New Dynamic HRA Method and Its Application

  • Jae, Moosung
    • International Journal of Reliability and Applications
    • /
    • v.2 no.1
    • /
    • pp.37-48
    • /
    • 2001
  • This paper presents a new dynamic human reliability analysis method and its application for quantifying the human error probabilities in implementing management action. For comparisons of current HRA methods with the new method, the characteristics of THERP, HCR, and SLIM-MAUD, which are most frequency used method in PSAs, are discussed. The action associated with implementation of the cavity flooding during a station blackout sequence is considered for its application. This method is based on the concepts of the quantified correlation between the performance requirement and performance achievement. The MAAP 3.0B code and Latin Hypercube sampling technique are used to determine the uncertainty of the performance achievement parameter. Meanwhile, the value of the performance requirement parameter is obtained from interviews. Based on these stochastic obtained, human error probabilities are calculated with respect to the various means and variances of the things. It is shown that this method is very flexible in that it can be applied to any kind of the operator actions, including the actions associated with the implementation of accident management strategies.

  • PDF

Information Security Activities of The Design Phase (설계단계의 정보보호 활동)

  • Shin, SY;Kim, DK;Lee, CW;Lee, HC;Lee, TW;Park, KH
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.745-746
    • /
    • 2016
  • The design phase is a process that is embodied to be interpreted and implemented in a requirement of the system information in the analysis phase. In the design phase, the design privacy, information security test plan is established, activities are carried out.

  • PDF