• Title/Summary/Keyword: Technology Assessment System

Search Result 1,969, Processing Time 0.031 seconds

Development of a Computer Code for Low-and Intermediate-Level Radioactive Waste Disposal Safety Assessment

  • Park, J.W.;Kim, C.L.;Lee, E.Y.;Lee, Y.M.;Kang, C.H.;Zhou, W.;Kozak, M.W.
    • Journal of Radiation Protection and Research
    • /
    • v.29 no.1
    • /
    • pp.41-48
    • /
    • 2004
  • A safety assessment code, called SAGE (Safety Assessment Groundwater Evaluation), has been developed to describe post-closure radionuclide releases and potential radiological doses for low- and intermediate-level radioactive waste (LILW) disposal in an engineered vault facility in Korea. The conceptual model implemented in the code is focused on the release of radionuclide from a gradually degrading engineered barrier system to an underlying unsaturated zone, thence to a saturated groundwater zone. The radionuclide transport equations are solved by spatially discretizing the disposal system into a series of compartments. Mass transfer between compartments is by diffusion/dispersion and advection. In all compartments, radionuclides ate decayed either as a single-member chain or as multi-member chains. The biosphere is represented as a set of steady-state, radionuclide-specific pathway dose conversion factors that are multiplied by the appropriate release rate from the far field for each pathway. The code has the capability to treat input parameters either deterministically or probabilistically. Parameter input is achieved through a user-friendly Graphical User Interface. An application is presented, which is compared against safety assessment results from the other computer codes, to benchmark the reliability of system-level conceptual modeling of the code.

Proposal for Government Quality Assurance Risk Assessment System for Military Supplies (군수품 정부품질보증 위험성 평가제도 개선을 위한 제언)

  • Namsu Ahn
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.2
    • /
    • pp.155-170
    • /
    • 2023
  • Purpose: Nowadays, the risk assessment system is widely used in many industrial and public areas to reduce the possible risks. The system is used to determine the priorities of the government quality assurance works in Defense Agency for Technology and Quality. However, as the risk assessment system is used for other purposes, there are some items that need improvement, and in this study, we propose improvement plans by benchmarking the risk assessment systems of other institutions. Methods: In this paper, first, the procedures of risk assessment system used in many industrial sites were reviewed, and how each institution specialized and applied the system. Afterwards, by benchmarking various risk assessment systems, an improvement plan on how to operate the risk assessment system in the case of government quality assurance for centrally procured military supplies was presented, and practical application cases were presented to prove the usefulness of the improvement plan. Results: The proposed risk assessment system differs from the existing system in five major aspects. First, inputs, outputs, and key performance indicators were specified from the systematic point of view. Second, risk analysis was analyzed in four dimensions: probability of occurrence, impact, detection difficulty. Third, risk mitigation measures were classified, control, transfer, and sharing. Fourth, the risk mitigation measures were realized through document verification, product verification, process verification, and quality system evaluation. Finally, risk mitigation measures were implemented and the effectiveness of the risk mitigation measures was evaluated through effectiveness evaluation. Conclusions: In order for the risk assessment procedure proposed in this study to be applied to actual work, it is necessary to obtain the consent of the person involved in the work due to the increased time for risk identification and preparation of the government quality assurance log, and a change in the information system that performs the actual work is required. Therefore, the authors of this study plan to actively perform internal seminar presentations and work improvement suggestions to apply these research outputs to actual work.

A Method for Operational Safety Assessment of a Deep Geological Repository for Spent Fuels

  • Jeong, Jongtae;Cho, Dong-Keun
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.18 no.spc
    • /
    • pp.63-74
    • /
    • 2020
  • The operational safety assessment is an important part of a safety case for the deep geological repository of spent fuels. It consists of different stages such as the identification of initiating events, event tree analysis, fault tree analysis, and evaluation of exposure doses to the public and radiation workers. This study develops a probabilistic safety assessment method for the operational safety assessment and establishes an assessment framework. For the event and fault tree analyses, we propose the advanced information management system for probabilistic safety assessment (AIMS-PSA Manager). In addition, we propose the Radiological Safety Analysis Computer (RSAC) program to evaluate exposure doses to the public and radiation workers. Furthermore, we check the applicability of the assessment framework with respect to drop accidents of a spent fuel assembly arising out of crane failure, at the surface facility of the KRS+ (KAERI Reference disposal System for SNFs). The methods and tools established through this study can be used for the development of a safety case for the KRS+ system as well as for the design modification and the operational safety assessment of the KRS+ system.

Improving Imaging Quality Assessment of Cabinet X-Ray Security Systems (캐비닛 엑스선 검색장비 이미지품질평가 고도화 방안 연구)

  • Yoon, Yeon Ah;Jung, Jin Hyeong;Kim, Yong Soo
    • Journal of Korean Society for Quality Management
    • /
    • v.49 no.1
    • /
    • pp.47-60
    • /
    • 2021
  • Purpose: This study proposes methods and procedures for evaluating imaging security systems quality of cabinet x-ray screening system to enhance performance certification technology. Also, conducted a comparative analysis of the literature of test-kit for imaging security quality evaluation. Methods: Comparative analysis of the test-kits and related documents for image quality assessment of cabinet x-ray screening equipment. This allows assessment items were selected and the methods for each assessment item were proposed. In addition, the configuration method of the assessment team was established by applying the technology readiness assessment(TRA). Results: Four of the assessment items were selected when estimate image quality by a comparative analysis of literature. For each assessment item, the evaluation method and minimum level of availability were determined. Finally, this paper proposes an imaging quality assessment of cabinet X-ray imaging security systems. Conclusion: Development of imaging security systems evaluation procedures for cabinet X-ray screening systems can be help improve performance certification of aviation security equipment.

Prioritisation of Medical Procedure for Health Technology Assessment (전문의 대상 설문조사를 이용한 보건의료 기술평가 대상 시술의 우선 순위 선정 - 이비인후과와 흉부외과를 중심으로 -)

  • 안형식;김선민;신영수;김차엽;김선미;이순형
    • Health Policy and Management
    • /
    • v.7 no.2
    • /
    • pp.46-64
    • /
    • 1997
  • Background & Objectives : Korea is face with the social need for health care technology assessment so that it is urgently needed to found principles and methodology in technology assessment in health care. As a groundwork for health care technology assessment, we tried to prioritize medical technology for assessment. Among medical technologies, procedure is somewhat difficult to assess, compared to drug or equipment. In this study, we aimed at the prioritisation of medical procedure to be assessed, in terms of efficay, safety, and adequacy. Method : For the standardized classification of medical procedure, ICD-9-CM(International Classification of Diseases 9th edition - Clinical Modification) was used. Among the list the procedures coming under otorhinolaringjology and thoracic surgery were selected by three family physicians. The list of procedure was mailed to the board certified surgeons of both disciplines, with the question asking about the necessity for assessment in terms of efficay, safety, and adequacy. Replied questionnaires were analyzed in each procedure. Results : Of 560 otorhinolaryngologist and 480 thoracic surgeon, 114 surgeons replied. Of otorhinolaryngological procedure, incision, excision, and destruction of inner ear : fenestration of inner ear : stapedectomy and its revision were the most urgent technology to assess in the aspect of safety. For adequacy, operations on Eustachian tube: fenestration of inner ear: incision, excision, and destruction of inner ear were highly ranked in necessity, and for efficary, operations on Eustachian tube; external maxillary antrotomy; fenestration of inner ear. Thoracic surgeons replied thoracic procedures, lung transplantation; heart transplantation; implantation of heart assist system [pump] are most important for evaluation in terms of safety; and heart transplantation; Lung transplantation; Implantation of heart assist system [pump] in terms of adequacy, and surgical collapse of lung [Artificia니 pnemothorax or pnuexoperitoeum]; lung transplantation; periarterial sympathectomy in terms of efficacy. As a whole, surgeons regard safety evaluation is more urgent than adequacy or efficary. In addition, otorhinolaryngological surgeons regard evaluation of their procedures more urgent than thoracic surgeons regard theirs. Conclusion : By the questionnaire to board certified physicians, we get some preliminary data for prioritisation of technologies to assess. Through the questionnaire like this, much information would be gathered for technology assessment, especially for medical procedure, if not enough. In the near future, well structured expert opinion gathering research, such as modified Delphi or nominal group technique, should be done succeedingly.

  • PDF

A Study on the Vulnerability Assessment Model for National Defense Intelligence System Using SNA (사회연결망분석 개념을 적용한 국방정보체계 취약점 분석·평가 모형 연구)

  • Jang, Youngcheon;Kang, Kyongran;Choi, Bongwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.3
    • /
    • pp.421-430
    • /
    • 2017
  • In this research, we propose a methodology for assessing security vulnerability of the national defense intelligence system, considering not only target elements but also the interconnection relationship of the whole system. Existing approaches decide the security vulnerability of the whole system by assessing only target elements. However, those approaches have an issue with potentially showing the same outcome for the systems that have identical target elements but the different types of interconnection relationships. We propose a more practical assessment method which takes the interconnection relationship of a whole system into consideration based on the concept of SNA(Social Network Analysis).

A Study on the Hazard Identification for the Implementation of A-SMGCS (A-SMGCS 구현을 위한 위험요소 식별에 대한 연구)

  • Hong, Seung-Beom;Choi, Seung-Hoon;Choi, Youn-Chul
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.1
    • /
    • pp.41-47
    • /
    • 2015
  • Recently, it is actively under study for the implementation of advance surface movement ground control systems (A-SMGCS) level IV in Korea. To ensure the safety of the A-SMGCS system needs the safety assessment, and Eurocontrol is encouraged to perform the functional hazard assessment, preliminary system safety assessment, and system safety assessment to the safety assessment of A-SMGCS. In this paper, we identify the hazard of A-SMGCS through a functional hazard assessment. Therefore, we will identify 29 types of hazard for the A-SMGCS level IV and serve as important data to evaluate the severity of each hazard.

Design and Implementation of an LLM system to Improve Response Time for SMEs Technology Credit Evaluation

  • Sungwook Yoon
    • International journal of advanced smart convergence
    • /
    • v.12 no.3
    • /
    • pp.51-60
    • /
    • 2023
  • This study focuses on the design of a GPT-based system for relatively rapid technology credit assessment of SMEs. This system addresses the limitations of traditional time-consuming evaluation methods and proposes a GPT-based model to comprehensively evaluate the technological capabilities of SMEs. This model fine-tunes the GPT model to perform fast technical credit assessment on SME-specific text data. Also, It presents a system that automates technical credit evaluation of SMEs using GPT and LLM-based chatbot technology. This system relatively shortens the time required for technology credit evaluation of small and medium-sized enterprises compared to existing methods. This model quickly assesses the reliability of the technology in terms of usability of the base model.

Vulnerability Assessment of a Large Sized Power System Using Neural Network Considering Various Feature Extraction Methods

  • Haidar, Ahmed M. A;Mohamed, Azah;Hussian, Aini
    • Journal of Electrical Engineering and Technology
    • /
    • v.3 no.2
    • /
    • pp.167-176
    • /
    • 2008
  • Vulnerability assessment of power systems is important so as to determine their ability to continue to provide service in case of any unforeseen catastrophic contingency such as power system component failures, communication system failures, human operator error, and natural calamity. An approach towards the development of on-line power system vulnerability assessment is by means of using an artificial neural network(ANN), which is being used successfully in many areas of power systems because of its ability to handle the fusion of multiple sources of data and information. An important consideration when applying ANN in power system vulnerability assessment is the proper selection and dimension reduction of training features. This paper aims to investigate the effect of using various feature extraction methods on the performance of ANN as well as to evaluate and compare the efficiency of the proposed feature extraction method named as neural network weight extraction. For assessing vulnerability of power systems, a vulnerability index based on power system loss is used and considered as the ANN output. To illustrate the effectiveness of ANN considering various feature extraction methods for vulnerability assessment on a large sized power system, it is verified on the IEEE 300-bus test system.

Flood Monitoring and Assessment by Remote Sensing and GIS in China

  • Jiren, Li;Silong, Zhang;Sun, Chun-Peng
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.175-182
    • /
    • 2002
  • The paper introduces the application of flood monitoring and assessment by remote sensing and GIS in china and describes the frame of operational system for practical performance of flood disaster mitigation. In addition, The operational system for flood monitoring and assessment in RSTAC/ MWR and its application in the floods of 1998,1999 in china are introduced.

  • PDF