• Title/Summary/Keyword: Software assessment

Search Result 1,062, Processing Time 0.032 seconds

A software tool for integrated risk assessment of spent fuel transportation and storage

  • Yun, Mirae;Christian, Robby;Kim, Bo Gyung;Almomani, Belal;Ham, Jaehyun;Lee, Sanghoon;Kang, Hyun Gook
    • Nuclear Engineering and Technology
    • /
    • v.49 no.4
    • /
    • pp.721-733
    • /
    • 2017
  • When temporary spent fuel storage pools at nuclear power plants reach their capacity limit, the spent fuel must be moved to an alternative storage facility. However, radioactive materials must be handled and stored carefully to avoid severe consequences to the environment. In this study, the risks of three potential accident scenarios (i.e., maritime transportation, an aircraft crashing into an interim storage facility, and on-site transportation) associated with the spent fuel transportation process were analyzed using a probabilistic approach. For each scenario, the probabilities and the consequences were calculated separately to assess the risks: the probabilities were calculated using existing data and statistical models, and the consequences were calculated using computation models. Risk assessment software was developed to conveniently integrate the three scenarios. The risks were analyzed using the developed software according to the shipment route, building characteristics, and spent fuel handling environment. As a result of the risk analysis with varying accident conditions, transportation and storage strategies with relatively low risk were developed for regulators and licensees. The focus of this study was the risk assessment methodology; however, the applied model and input data have some uncertainties. Further research to reduce these uncertainties will improve the accuracy of this model.

A Study on the Need for Separation of Software Completeness Appraisal and Software Ready-made Appraisal (소프트웨어 완성도 감정과 기성고 감정 분리 필요성에 대한 고찰)

  • Kim, DoWan
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.11-17
    • /
    • 2021
  • In this study, problems of software completeness appraisal are pointed out and their solutions are presented by analyzing appraisal cases and judicial precedents. Completeness appraisal, ready-made appraisal, defect appraisal, and cost appraisal have been classified as and have been evaluated with extant software completeness appraisals. From a legal point of view, and in judicial precedents, however, there is a big difference between the definition of completeness and the completion rate. This is because the degree of completeness is evaluated under the premise that the software's development is complete, whereas the ready-made appraisal inspects the development progress of unfinished software. Often, in cases involving software completion rate, the total completion level is calculated by weighting each step of the software development process. However, completeness evaluations use the software's realization-operation as its sole criterion. In addition, another issue not addressed in existing software completeness appraisal cases is that there is no mention of who is responsible for software defects, whereas in case law, the responsible party is determined by finding who caused the dispute. In this paper, we systematically classify these problems, and present a novel evaluation method that separates software completeness evaluations from software completion evaluations.

Extended Linear Vulnerability Discovery Process

  • Joh, HyunChul
    • Journal of Multimedia Information System
    • /
    • v.4 no.2
    • /
    • pp.57-64
    • /
    • 2017
  • Numerous software vulnerabilities have been found in the popular operating systems. And recently, robust linear behaviors in software vulnerability discovery process have been noticeably observed among the many popular systems having multi-versions released. Software users need to estimate how much their software systems are risk enough so that they need to take an action before it is too late. Security vulnerabilities are discovered throughout the life of a software system by both the developers, and normal end-users. So far there have been several vulnerability discovery models are proposed to describe the vulnerability discovery pattern for determining readiness for patch release, optimal resource allocations or evaluating the risk of vulnerability exploitation. Here, we apply a linear vulnerability discovery model into Windows operating systems to see the linear discovery trends currently observed often. The applicability of the observation form the paper show that linear discovery model fits very well with aggregate version rather than each version.

Multi-focus Image Fusion using Fully Convolutional Two-stream Network for Visual Sensors

  • Xu, Kaiping;Qin, Zheng;Wang, Guolong;Zhang, Huidi;Huang, Kai;Ye, Shuxiong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2253-2272
    • /
    • 2018
  • We propose a deep learning method for multi-focus image fusion. Unlike most existing pixel-level fusion methods, either in spatial domain or in transform domain, our method directly learns an end-to-end fully convolutional two-stream network. The framework maps a pair of different focus images to a clean version, with a chain of convolutional layers, fusion layer and deconvolutional layers. Our deep fusion model has advantages of efficiency and robustness, yet demonstrates state-of-art fusion quality. We explore different parameter settings to achieve trade-offs between performance and speed. Moreover, the experiment results on our training dataset show that our network can achieve good performance with subjective visual perception and objective assessment metrics.

Empirical Risk Assessment in Major Graphical Design Software Systems

  • Joh, HyunChul;Lee, JooYoung
    • Journal of Multimedia Information System
    • /
    • v.8 no.4
    • /
    • pp.259-266
    • /
    • 2021
  • Security vulnerabilities have been reported in major design software systems such as Adobe Photoshop and Illustrator, which are recognized as de facto standard design tools in most of the design industries. Companies need to evaluate and manage their risk levels posed by those vulnerabilities, so that they could mitigate the potential security bridges in advance. In general, security vulnerabilities are discovered throughout their life cycles repeatedly if software systems are continually used. Hence, in this study, we empirically analyze risk levels for the three major graphical design software systems, namely Photoshop, Illustrator and GIMP with respect to a software vulnerability discovery model. The analysis reveals that the Alhazmi-Malaiya Logistic model tends to describe the vulnerability discovery patterns significantly. This indicates that the vulnerability discovery model makes it possible to predict vulnerability discovery in advance for the software systems. Also, we found that none of the examined vulnerabilities requires even a single authentication step for successful attacks, which suggests that adding an authentication process in software systems dramatically reduce the probability of exploitations. The analysis also discloses that, for all the three software systems, the predictions with evenly distributed and daily based datasets perform better than the estimations with the datasets of vulnerability reporting dates only. The observed outcome from the analysis allows software development managers to prepare proactively for a hostile environment by deploying necessary resources before the expected time of vulnerability discovery. In addition, it can periodically remind designers who use the software systems to be aware of security risk, related to their digital work environments.

Software for Nutritional Assessment Using a Semi-Quantitative Food Frequency Questionnaire and the 24-hour Recall Method (반 정량 식품빈도 조사법 (SQFFQ)과 24시간 회상법을 이용한 영양평가 Software 개발)

  • 이상아;이경신;김형숙;이해정;최혜미
    • Korean Journal of Community Nutrition
    • /
    • v.7 no.4
    • /
    • pp.548-558
    • /
    • 2002
  • The purpose of this study was to develop a computer software program for nutritional assessment using a Semi-Quantitative Food Frequency Questionnaire (SQFFQs) and the 24-hour Recall Method. The software for the SQFFQ was divided into input, output, and database. For dietary analyses, recipe and food databases were used. The recipe database included 25 items and the food database was divided into 18 food groups. The food database was composed of 19 general nutrient items, 33 fatty acids, and 18 amino acids. The software developed in this study can be summarized as follows: 1) input items related to the individual s ages information, lifestyle, biological values, and dietary habits; 2) individualized data in percent of the Korean RDA, the energy ratios of carbohydrates, proteins and fats, the ratio of animal to plant source intakes, and the distribution of food group intakes; 3) Statistical data on the individual's information, lifestyle, biological values, and dietary intakes including the frequency of intake of cooked foods, the amounts of food, and the number of food groups, and nutrients. In the 24-hour Recall Method, the input and output consisted of the individual s information and cooked dish intakes. The individual s report included the amounts of nutrient intake according to number of meal and days, in comparison to the Korean RDA, the energy ratio for carbohydrates, proteins and fats, the ratio of animal to plant source intakes, and the distribution of food group intakes. The statistical report presented the number of food groups and foods, and the nutrient intakes. To evaluate the validity of the SQFFQ, the Spearman Rank Order Correlation and kappa values were used. As a result, correlation coefficients comparing the 24-hour Recall Method appeared to be more than 0.5, except for vitamin $B_1, B_2$, niacin, and vitamin E. The kappa values for energy and carbohydrate intakes were both 0.7, and protein, fat, vitamin C, folate, Ca, and iron intakes ranged from 0.3 to 0.7.

Appraisal Method for Similarity of Large File Transfer Software (대용량 파일 전송 소프트웨어의 동일성 감정 방법)

  • Chun, Byung-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.11-16
    • /
    • 2021
  • The importance of software is increasing due to the development of information and communication, and software copyright disputes are also increasing. In this paper, the source of the submitted programs and the files necessary for the execution of the program were taken as the scope of analysis. The large-capacity file transfer solution program to be analyzed provides additional functions such as confidentiality, integrity, user authentication, and non-repudiation functions through digital signature and encryption of data.In this paper, we analyze the program A, program B, and the program C. In order to calculate the program similarity rate, the following contents are analyzed. Analyze the similarity of the package structure, package name, source file name in each package, variable name in source file, function name, function implementation source code, and product environment variable information. It also calculates the overall similarity rate of the program. In order to check the degree of agreement between the package structure and the package name, the similarity was determined by comparing the folder structure. It also analyzes the extent to which the package structure and package name match and the extent to which the source file (class) name within each package matches.

A Study on the Development of Evacuation Safety Assessment System on Underground Space (지하공간의 피난안전성평가시스템 개발에 관한 연구)

  • 김진수;박종근;노삼규
    • Fire Science and Engineering
    • /
    • v.17 no.4
    • /
    • pp.57-63
    • /
    • 2003
  • In this study; the evaluation system models for evacuation safety assessment of underground malls were presented and related software program was developed. In addition, database was built integrating various data which were essential to evacuation safety assessment and enabling effective safety assessment with low cost and time. As a results of case study in local underground malls, the evacuation safety assessment system has examined in therms of field applicability and reliability.

A STUDY ON THE CONSTRUCTION OF BIM DATA INTEROPERABILITY FOR ENERGY PERFORMANCE ASSESSMENT BASED ON BIM

  • Jungsik Choi;Hyunjae Yoo;Inhan Kim
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.267-273
    • /
    • 2013
  • Early design phase energy modeling is used to provide the design team with first order of magnitude feedback about the impact of various building configurations. For better energy-conscious and sustainable building design and operation, the construction of BIM data interoperability for energy performance assessment in the early design phase is important. The purpose of this study is to suggest construction of BIM data interoperability for energy performance assessment based on BIM. To archive this purpose, the authors have investigated advantage of BIM-based energy performance assessment through comparison with traditional energy performance assessment and suggested requirement for construction of open BIM environment such as BIM data creation, BIM data software practical use, BIM data application and verification. In addition, the authors have suggested BIM data interoperability and BIM energy property mapping method focused on materials.

  • PDF