• 제목/요약/키워드: Software assessment

검색결과 1,062건 처리시간 0.022초

A software tool for integrated risk assessment of spent fuel transportation and storage

  • Yun, Mirae;Christian, Robby;Kim, Bo Gyung;Almomani, Belal;Ham, Jaehyun;Lee, Sanghoon;Kang, Hyun Gook
    • Nuclear Engineering and Technology
    • /
    • 제49권4호
    • /
    • pp.721-733
    • /
    • 2017
  • When temporary spent fuel storage pools at nuclear power plants reach their capacity limit, the spent fuel must be moved to an alternative storage facility. However, radioactive materials must be handled and stored carefully to avoid severe consequences to the environment. In this study, the risks of three potential accident scenarios (i.e., maritime transportation, an aircraft crashing into an interim storage facility, and on-site transportation) associated with the spent fuel transportation process were analyzed using a probabilistic approach. For each scenario, the probabilities and the consequences were calculated separately to assess the risks: the probabilities were calculated using existing data and statistical models, and the consequences were calculated using computation models. Risk assessment software was developed to conveniently integrate the three scenarios. The risks were analyzed using the developed software according to the shipment route, building characteristics, and spent fuel handling environment. As a result of the risk analysis with varying accident conditions, transportation and storage strategies with relatively low risk were developed for regulators and licensees. The focus of this study was the risk assessment methodology; however, the applied model and input data have some uncertainties. Further research to reduce these uncertainties will improve the accuracy of this model.

소프트웨어 완성도 감정과 기성고 감정 분리 필요성에 대한 고찰 (A Study on the Need for Separation of Software Completeness Appraisal and Software Ready-made Appraisal)

  • 김도완
    • 한국소프트웨어감정평가학회 논문지
    • /
    • 제17권2호
    • /
    • pp.11-17
    • /
    • 2021
  • 본 연구에서는 감정사례 및 판례를 분석하여, 기존 소프트웨어 완성도 감정으로 분류되어 수행된 완성도감정, 기성고감정, 하자감정 및 비용감정의 문제점을 적시하고, 그 해결 방안을 제시한다. 판례와 법률적 관점에서 완성도와 기성고율은 큰 차이를 가지고 있다. 완성도는 개발프로세스가 종료된 소프트웨어를 대상으로 전제하는 반면, 기성고율 감정은 미완성된 소프트웨어의 개발진척도를 평가하기 때문이다. 종종 소프트웨어 기성고와 관련된 판례에서는 소프트웨어 공학 개발 절차에 따른 단계별 가중치를 인정하여 전체 기성고 또는 완성도를 산정하는 것을 볼 수 있는데, 감정에서는 대부분 기능의 구현-작동여부 만을 완성도 비율 산정의 척도로 삼고 있는 문제도 존재한다. 또한 기존 소프트웨어 완성도 감정사례에서 다루지 않았던 문제 중 하나는 소프트웨어 하자에 대한 책임 소재 분석 및 감정이 언급되지 않고 있는데 반하여, 판례에서는 분쟁이 발생한 원인을 찾아 책임소재를 다투고 있다. 본 논문에서는 위 제기된 문제를 체계적으로 분류하여 소프트웨어 완성도감정과 소프트웨어 기성고감정을 분리할 것을 제안하고 감정 방안을 제시한다.

Extended Linear Vulnerability Discovery Process

  • Joh, HyunChul
    • Journal of Multimedia Information System
    • /
    • 제4권2호
    • /
    • pp.57-64
    • /
    • 2017
  • Numerous software vulnerabilities have been found in the popular operating systems. And recently, robust linear behaviors in software vulnerability discovery process have been noticeably observed among the many popular systems having multi-versions released. Software users need to estimate how much their software systems are risk enough so that they need to take an action before it is too late. Security vulnerabilities are discovered throughout the life of a software system by both the developers, and normal end-users. So far there have been several vulnerability discovery models are proposed to describe the vulnerability discovery pattern for determining readiness for patch release, optimal resource allocations or evaluating the risk of vulnerability exploitation. Here, we apply a linear vulnerability discovery model into Windows operating systems to see the linear discovery trends currently observed often. The applicability of the observation form the paper show that linear discovery model fits very well with aggregate version rather than each version.

Multi-focus Image Fusion using Fully Convolutional Two-stream Network for Visual Sensors

  • Xu, Kaiping;Qin, Zheng;Wang, Guolong;Zhang, Huidi;Huang, Kai;Ye, Shuxiong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권5호
    • /
    • pp.2253-2272
    • /
    • 2018
  • We propose a deep learning method for multi-focus image fusion. Unlike most existing pixel-level fusion methods, either in spatial domain or in transform domain, our method directly learns an end-to-end fully convolutional two-stream network. The framework maps a pair of different focus images to a clean version, with a chain of convolutional layers, fusion layer and deconvolutional layers. Our deep fusion model has advantages of efficiency and robustness, yet demonstrates state-of-art fusion quality. We explore different parameter settings to achieve trade-offs between performance and speed. Moreover, the experiment results on our training dataset show that our network can achieve good performance with subjective visual perception and objective assessment metrics.

Empirical Risk Assessment in Major Graphical Design Software Systems

  • Joh, HyunChul;Lee, JooYoung
    • Journal of Multimedia Information System
    • /
    • 제8권4호
    • /
    • pp.259-266
    • /
    • 2021
  • Security vulnerabilities have been reported in major design software systems such as Adobe Photoshop and Illustrator, which are recognized as de facto standard design tools in most of the design industries. Companies need to evaluate and manage their risk levels posed by those vulnerabilities, so that they could mitigate the potential security bridges in advance. In general, security vulnerabilities are discovered throughout their life cycles repeatedly if software systems are continually used. Hence, in this study, we empirically analyze risk levels for the three major graphical design software systems, namely Photoshop, Illustrator and GIMP with respect to a software vulnerability discovery model. The analysis reveals that the Alhazmi-Malaiya Logistic model tends to describe the vulnerability discovery patterns significantly. This indicates that the vulnerability discovery model makes it possible to predict vulnerability discovery in advance for the software systems. Also, we found that none of the examined vulnerabilities requires even a single authentication step for successful attacks, which suggests that adding an authentication process in software systems dramatically reduce the probability of exploitations. The analysis also discloses that, for all the three software systems, the predictions with evenly distributed and daily based datasets perform better than the estimations with the datasets of vulnerability reporting dates only. The observed outcome from the analysis allows software development managers to prepare proactively for a hostile environment by deploying necessary resources before the expected time of vulnerability discovery. In addition, it can periodically remind designers who use the software systems to be aware of security risk, related to their digital work environments.

반 정량 식품빈도 조사법 (SQFFQ)과 24시간 회상법을 이용한 영양평가 Software 개발 (Software for Nutritional Assessment Using a Semi-Quantitative Food Frequency Questionnaire and the 24-hour Recall Method)

  • 이상아;이경신;김형숙;이해정;최혜미
    • 대한지역사회영양학회지
    • /
    • 제7권4호
    • /
    • pp.548-558
    • /
    • 2002
  • The purpose of this study was to develop a computer software program for nutritional assessment using a Semi-Quantitative Food Frequency Questionnaire (SQFFQs) and the 24-hour Recall Method. The software for the SQFFQ was divided into input, output, and database. For dietary analyses, recipe and food databases were used. The recipe database included 25 items and the food database was divided into 18 food groups. The food database was composed of 19 general nutrient items, 33 fatty acids, and 18 amino acids. The software developed in this study can be summarized as follows: 1) input items related to the individual s ages information, lifestyle, biological values, and dietary habits; 2) individualized data in percent of the Korean RDA, the energy ratios of carbohydrates, proteins and fats, the ratio of animal to plant source intakes, and the distribution of food group intakes; 3) Statistical data on the individual's information, lifestyle, biological values, and dietary intakes including the frequency of intake of cooked foods, the amounts of food, and the number of food groups, and nutrients. In the 24-hour Recall Method, the input and output consisted of the individual s information and cooked dish intakes. The individual s report included the amounts of nutrient intake according to number of meal and days, in comparison to the Korean RDA, the energy ratio for carbohydrates, proteins and fats, the ratio of animal to plant source intakes, and the distribution of food group intakes. The statistical report presented the number of food groups and foods, and the nutrient intakes. To evaluate the validity of the SQFFQ, the Spearman Rank Order Correlation and kappa values were used. As a result, correlation coefficients comparing the 24-hour Recall Method appeared to be more than 0.5, except for vitamin $B_1, B_2$, niacin, and vitamin E. The kappa values for energy and carbohydrate intakes were both 0.7, and protein, fat, vitamin C, folate, Ca, and iron intakes ranged from 0.3 to 0.7.

대용량 파일 전송 소프트웨어의 동일성 감정 방법 (Appraisal Method for Similarity of Large File Transfer Software)

  • 전병태
    • 한국소프트웨어감정평가학회 논문지
    • /
    • 제17권1호
    • /
    • pp.11-16
    • /
    • 2021
  • 정보통신의 발달로 인하여 소프트웨어의 중요성이 증대되고 있으며, 이에 따른 소프트웨어 저작권 분쟁도 증가하는 추세에 있다. 본 논문은 제출된 프로그램들의 소스와 관련하여 프로그램 수행에 필요한 파일들을 감정범위로 하였다. 분석 대상인 대용량 파일 전송 솔루션 프로그램은 데이터에 대한 전자서명 및 암호화를 통하여 기밀성, 무결성, 사용자 인증, 부인방지 기능 등의 부가 기능을 제공하고 있다. 본 논문에서는 프로그램 A, 프로그램 B, 프로그램 C 3개에 대하여 분석을 수행한다. 프로그램 유사율을 산출하기 위하여 다음과 같은 내용을 분석한다. 패키지의 구조, 패키지 이름, 각 패키지 내 소스파일 이름, 소스파일 내 변수명, 함수명, 함수구현 소스코드, 제품의 환경변수 정보에 대하여 유사 여부를 분석하고 프로그램의 전체 유사율을 산출한다. 패키지 구조 및 패키지 이름이 일치되는 정도를 확인하기 위해, 폴더 구조를 비교하여 유사도 판단을 하였다. 또한 패키지 구조 및 패키지 이름이 어느 정도 일치하는지와 각 패키지 내 소스 파일(클래스) 이름이 어느 정도 일치하는지에 대한 분석을 하였다.

지하공간의 피난안전성평가시스템 개발에 관한 연구 (A Study on the Development of Evacuation Safety Assessment System on Underground Space)

  • 김진수;박종근;노삼규
    • 한국화재소방학회논문지
    • /
    • 제17권4호
    • /
    • pp.57-63
    • /
    • 2003
  • 본 연구에서는 지하가의 피난 안전성 평가 모델의 기반을 제시하고 그에 따른 프로그램을 개발하였다. 또한, 피난 안전성 평가에 필수적인 각종 자료들을 통합형 데이터베이스 기반으로 구축하여 적은 시간과 인력으로 효율적인 피난 안전성 평가를 수행할 수 있는 모델 제시 및 시스템을 구축하였고, 국내 지하가의 사례연구를 토대로 피난안전성평가시스템의 현장 적용성 및 신뢰성을 검증하였다.

A STUDY ON THE CONSTRUCTION OF BIM DATA INTEROPERABILITY FOR ENERGY PERFORMANCE ASSESSMENT BASED ON BIM

  • Jungsik Choi;Hyunjae Yoo;Inhan Kim
    • 국제학술발표논문집
    • /
    • The 5th International Conference on Construction Engineering and Project Management
    • /
    • pp.267-273
    • /
    • 2013
  • Early design phase energy modeling is used to provide the design team with first order of magnitude feedback about the impact of various building configurations. For better energy-conscious and sustainable building design and operation, the construction of BIM data interoperability for energy performance assessment in the early design phase is important. The purpose of this study is to suggest construction of BIM data interoperability for energy performance assessment based on BIM. To archive this purpose, the authors have investigated advantage of BIM-based energy performance assessment through comparison with traditional energy performance assessment and suggested requirement for construction of open BIM environment such as BIM data creation, BIM data software practical use, BIM data application and verification. In addition, the authors have suggested BIM data interoperability and BIM energy property mapping method focused on materials.

  • PDF