• Title/Summary/Keyword: Technical Requirements

Search Result 834, Processing Time 0.031 seconds

Consideration for Confirmity Assessment of Eco-friendly Public Transportation System based on the Wireless Power Transfer Technology (무선 전력전달 방식 친환경 대중교통 시스템의 적합성 평가에 대한 고찰)

  • Shin, Jung-Jin;Kim, Gi-Hyun;Lee, Kang-Hee;Kim, Han-Su
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.10
    • /
    • pp.1524-1528
    • /
    • 2012
  • According to the Article 4(Confirmity Assessment)of the Electrotechnical Regulation, Confirmity Assessment for the Electrotechnical Regulation decides confirmity of Electrotechnical Regulation; whether to satisfy performances and requirements(determined from Electrotechnical Regulation). It evaluates technical requirements, new technology and standards. However, it does not evaluate technical content stated from Electrotechnical Regulation & Conformity Criteria. From Confirmity Assessment, the technology will be decided whether to fulfill performances and technical requirements. Which is predetermined by contents related to Electrotechnical Regulation. Test standards and test conditions will be overlooked to determine its performances and technical requirements for safety. This paper will show that, studies have been done to determine the guideline for Confirmity Assessment, which is evaluated from performances and technical requirements associated with Confirmity Assessment of electrical installation for new technology of wireless power transfer.

Digital Transformation Requirements at Saudi Universities from Faculty Members' Perspectives

  • Taha Mansor Khawaji
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.8-20
    • /
    • 2023
  • The current study aims to determine digital transformation (organizational, technical, and human resources) requirements at Saudi universities from Umm Al-Qura University faculty members' perspectives. The researcher used a quantitative approach based on the descriptive analytical design. To answer the questions of the study, the researcher used the questionnaire as a data collection tool. The questionnaire was sent electronically to faculty members working in colleges and institutes affiliated with Umm Al-Qura University in Makkah Al-Mukarramah, Saudi Arabia. The questionnaire consisted of the three dimensions of digital transformation: organizational; technical; and human resources requirements. The results showed that requirements related to human resources came first with an average of 2.25 then the organizational requirements with an average of 1.95, and in the last, technical requirements came with an average of 1.64. In addition, some suggestions were given by the participants (faculty members) related to the mechanism that could contribute to implementing digital transformation at Saudi universities. Likewise, at the end of the study, the researcher has given some suggestions related to the implementation of digital transformation requirements at Saudi universities.

AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS

  • Song, Jae-Gu;Lee, Jung-Woon;Park, Gee-Yong;Kwon, Kee-Choon;Lee, Dong-Young;Lee, Cheol-Kwon
    • Nuclear Engineering and Technology
    • /
    • v.45 no.5
    • /
    • pp.637-652
    • /
    • 2013
  • Instrumentation and control systems in nuclear power plants have been digitalized for the purpose of maintenance and precise operation. This digitalization, however, brings out issues related to cyber security. In the most recent past, international standard organizations, regulatory institutes, and research institutes have performed a number of studies addressing these systems cyber security.. In order to provide information helpful to the system designers in their application of cyber security for the systems, this paper presents methods and considerations to define attack vectors in a target system, to review and select the requirements in the Regulatory Guide 5.71, and to integrate the results to identify applicable technical security control requirements. In this study, attack vectors are analyzed through the vulnerability analyses and penetration tests with a simplified safety system, and the elements of critical digital assets acting as attack vectors are identified. Among the security control requirements listed in Appendices B and C to Regulatory Guide 5.71, those that should be implemented into the systems are selected and classified in groups of technical security control requirements using the results of the attack vector analysis. For the attack vector elements of critical digital assets, all the technical security control requirements are evaluated to determine whether they are applicable and effective, and considerations in this evaluation are also discussed. The technical security control requirements in three important categories of access control, monitoring and logging, and encryption are derived and grouped according to the elements of attack vectors as results for the sample safety system.

Analytical Insights far Improving Technical Specifications from a Risk Perspective

  • Kim, Inn-Seock;Ryu, Yong-Ho;Do, Kyu-Sik;Shin, Won-Ky
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1995.05a
    • /
    • pp.568-573
    • /
    • 1995
  • Technical Specifications (TSs) for a nuclear power plant is an important licensing document which defines various operational requirements or conditions. Recently, many researchers have evaluated the risk impacts associated with the TS requirements, using probabilistic safety assessments becoming widely available. This paper presents insights gained km our review of recent risk-based analyses of TSs, focussing on surveillance requirements and AOT (allowed outage time) requirements.

  • PDF

Requirement Management through Connection between Regulatory Requirements and Technical Criteria for Dismantling of Nuclear Installations (원자력시설 해체 규제요건과 기술기준 연계를 통한 요구관리)

  • Park, Hee Seoung;Park, Jong Sun;Hong, Yun Jeong;Kim, Jeong Guk;Hong, Dae Seok
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.14 no.1
    • /
    • pp.63-71
    • /
    • 2018
  • This paper discusses decommissioning procedure requirements management using requirement engineering to systematically manage the technical requirements and criteria that are required in decontamination and decommissioning activities, and the regulatory requirements that should be complied with in a decommissioning strategy for research reactors and nuclear power plants. A schema was designed to establish the traceability and change management related to the linkage between the regulatory requirements and technical criteria after classifying the procedures into four groups during the full life-cycle of the decommissioning. The results confirmed that the designed schema was successfully traced in accordance with the regulatory requirements and technical criteria required by various fields in terms of decontamination and decommissioning activities. In addition, the changes before and after the revision of the Nuclear Safety Act were also determined. The dismantling procedure requirement management system secured through this study is expected to be a useful tool in the integrated management of radioactive waste, as well as in the dismantling of research reactor and nuclear facilities.

QFD and AHP Studies for Technical and System Requirements of RFID Military Applications (QFD와 AHP를 이용한 RFID의 군 요구기술 분석과 향후 적용분야 선정에 관한 연구)

  • Lee, Chul-Ung;Kim, Jin-Tae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.4
    • /
    • pp.105-115
    • /
    • 2007
  • This study identifies technical barriers and trends on Radio Frequency Identification(RFID) applications for military force, and investigates technical requirements for the RFID implementation on military information systems, based on the preliminary research results from the introductory RFID applications on Ammunition Information System(AIS). We first obtain technical requirements using the Quality Function Deployment(QFD) methods, and identify the areas for research and developments. Furthermore, based on the survey results from military experts and users, we provide the potential application areas for military RFID implementation. Conversely, a technology and research roadmap for RFID in the military system is developed.

An Effective Analysis and Management of Technical Risk to Turn-key based Plant Construction Contracts using Systems Engineering (시스템엔지니어링을 이용한 턴키방식 플랜트 건설계약의 기술적 위험요인 효과적 분석 및 관리)

  • Hong, Dae Geun;Byun, Hee Chul;Suh, Suk-Hwan
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.10 no.2
    • /
    • pp.59-69
    • /
    • 2014
  • In the bidding stage of turn-key based plant construction contracts, owners provide design and performance basis for contractors instead of giving design drawing. To win the bid for a plant construction, the contractors should be obliged to satisfy and ensure owners'requirements such as design and performance basis in a plant construction project, In other words, owners imposes technical risk of the design to the contractors by specifying responsibility for the analysis and verification of the plant construction. Thus, it is very important that contracters make accurate and realistic basic design plan in a short period of time. To deal with such a situation, we propose a systems engineering approach for the analysis and management of the technical risk. Specifically, we first: 1) Analyzes technical risk related with the plant design information for the bidders, followed by 2) Developing stakeholder requirements for the basic engineering design, and 3) System requirements for dealing with technical risk. Also, in this paper, we proposed converting method from MOE(Measure of Effectiveness) to MOP(Measure of Performance) in the risk analysis. To show the effectiveness of the proposed method, we carried out a case study.

A Study on Technical Trends in Telecom Rectifier Plant (통신용 정류시설의 기술적 동향에 관한 연구)

  • 김만고
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.21 no.3
    • /
    • pp.278-283
    • /
    • 1997
  • The rectifier is the main element in the telecom DC power system. This paper investigates the advantages and disadvantages of three rectifier techniques ; thyristor, ferro - resonant, and switched - mode. Compared with other techniques, the switched - mode rectifier tech¬nique offers several advantages such as higher efficiency, smaller size and weight, and lower audible noise. Technical requirements in telecom rectifier plant are also described. Finally, the future trends in telecom powering are discussed in connection with the advance oftelecom net¬works.

  • PDF

Functional Requirements of Data Repository for DMP Support and CoreTrustSeal Authentication

  • Kim, Sun-Tae
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.10 no.1
    • /
    • pp.7-20
    • /
    • 2020
  • For research data to be shared without legal, financial and technical barriers in the Open Science era, data repositories must have the functional requirements asked by DMP and CoreTrustSeal. In order to derive functional requirements for the data repository, this study analyzed the Data Management Plan (DMP) and CoreTrustSeal, the criteria for certification of research data repositories. Deposit, Ethics, License, Discovery, Identification, Reuse, Security, Preservation, Accessibility, Availability, and (Meta) Data Quality, commonly required by DMP and CoreTrustSeal, were derived as functional requirements that should be implemented first in implementing data repositories. Confidentiality, Integrity, Reliability, Archiving, Technical Infrastructure, Documented Storage Procedure, Organizational Infrastructure, (Meta) Data Evaluation, and Policy functions were further derived from CoreTrustSeal. The functional requirements of the data repository derived from this study may be required as a key function when developing the repository. It is also believed that it could be used as a key item to introduce repository functions to researchers for depositing data.

Methodology for Deriving Technical Information Based on Stakeholder Requirements - Focused on 4th Industry Nanosensor Case (이해관계자 요구사항 기반 기술정보 도출 방법론 - 나노 센서 사례)

  • Gi, Wan Wook;Kim, Kwang Soo;Hong, Dae Geun
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.14 no.1
    • /
    • pp.19-27
    • /
    • 2018
  • For the purpose of technology planning and R&D strategy, this research developed a methodology for deriving technical information based on stakeholder requirements using natural language processing technology. The requirements are decomposed into semantic information based on grammar rules, and then the requirement information based technology information can be derived by linking with the three technical information extracted from the patent.