• Title/Summary/Keyword: 요구사항 기술서

Search Result 285, Processing Time 0.026 seconds

Quality Metrics of Cloud Service Based on Cross-cutting and SLA Specification Mechanism (Cross-cutting 기반의 클라우드 서비스 품질 메트릭 및 SLA 명세 기법)

  • An, Youngmin;Park, Joonseok;Yeom, Keunhyuk
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1361-1371
    • /
    • 2015
  • Depending on the increase amongst various cloud services, the technology of the Cloud Service Broker (CSB) to find the most appropriate services to meet the needs of cloud service consumers has emerged. In order to advance for cloud services to be used through the CSB, it is important to ensure the quality level that meets the demands of consumers through a negotiation process based on the Service Level Agreement (SLA). However, quality metrics of cloud services are different from each other based on the measurement scale, which represents the quality level, and the calculation for each type of cloud services. Therefore, it is necessary to analyze the variability of the quality of cloud services and establish a SLA model for ensuring and improving the level of quality. In this paper, we analyze the quality metrics for the specific type of cloud services by applying the cross-cutting concept and propose a Virtual SLA (VSLA) meta-model.

Validation Testing of Safety-critical Software (Safety-critical 소프트웨어의 검증시험)

  • Kim, Hang-Bae;Han, Jai-Bok
    • Nuclear Engineering and Technology
    • /
    • v.27 no.3
    • /
    • pp.385-392
    • /
    • 1995
  • A software engineering process has been developed for the design of safety critical software for Wolsong 2/3/4 project to satisfy the requirement of the regulatory body. Among the process, this paper described the detail process of validation testing peformed to ensure that the software with its hardware, developed by the design group, satisfies the requirements of the functional specification prepared by the independent functional group. To perform the test, test facility and test software ore developed and actual safety system computer was connected. Three kinds of test cases, i.e., functional test performance test and self-check test were programmed and run to verify each functional specifications. Test failures ore fedback to the design group to revise the software and test result were analyzed and documented in the report to submit to the regulatory body. The test methodology and procedure were very efficient and satisfactory to perform the systematic and automatic test. The test results were also acceptable and successful to verify the software acts as specified in the program functional specification. This methodology can be applied to the validation of other safety-critical software.

  • PDF

Personal Information Protection for Biometric Verification based TeleHealth Services (바이오인식을 이용한 원격의료에서의 개인정보보호)

  • Shin, Yong-Nyuo;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.5
    • /
    • pp.659-664
    • /
    • 2010
  • This paper provides an integrated framework for biometric data and private information protection in TeleHealth. Biometric technology is indispensable in providing identification and convenience in the TeleHealth environment. Once biometric information is exposed to mallicious attacker, he will suffer great loss from the illegferuse of his biometric data by someone else because of difficulty of change not like ID and password. We have to buil by someone esystem data bon the integrated framework for biometric data and private information protection in TeleHealth. First, we consider the structure of the biometric system and the security requirements of y someone esystem data bon the biometrics. And then, we define the TeleHealth system model and provide the vulnerabilities and countermeasures of the biometric-data by someone eintegrated model.byhe TeleHealth sse bec requires two-phata authentication for countermeasure. Finally, we made some functionferrequirements for main componenets of biometric-data bintegrated TeleHealth system framework to protect biometric data.

Determination of Design Basis for a Storage System for Spent Fuel in Korea (국내 사용후핵연료 저장시스템의 설계기준 설정 인자 고찰)

  • Yoon, Jeong-Hyoun;Lee, Eun-Yong;Woo, Sang-In;Kim, Tae-Man
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.9 no.2
    • /
    • pp.113-119
    • /
    • 2011
  • Safe operation and maintenance of engineered dry storage systems for spent fuel from nuclear power plants basically depends on adequately adopted design requirements. The most important design target of the system are those which provide the necessary assurances that spent fuel can be received, handled, stored and retrieved without undue risk to health and safety of workers and the public. To achieve these objectives, the design of the system incorporates features to remove spent fuel residual heat, to provide for radiation protection, and to maintain containment over the lifespan of the system as specified in the design specifications. The features also provide for all possible anticipated operational occurrences and design basis events in accordance with the design basis as guided by the designated regulations. The general performance requirements of a projected storage system are introduced in this paper. The storage system is designed to store fuel assemblies in associated with designated regulatory requirements. Small increases/decreases in maximum burnup can be adjusted with cooling time. These variations are compensated for by a corresponding small site-specific increase/decrease in the design basis-cooling period, as long as the maximum heat load and radioactivity of loaded fuel assemblies are met. Generic design basis events considered for the storage system are summarized. Shielding and radiological requirements along with mechanical and structural are derived in this study.

Extensional End-to-End Encryption Technologies to Enhance User's Financial Information Security and Considerable Security Issues (이용자의 금융거래정보 보호를 위한 확장 종단간(End-to-End) 암호화 기술과 보안고려사항)

  • Seung, Jae-Mo;Lee, Su-Mi;Noh, Bong-Nam;Ahn, Seung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.145-154
    • /
    • 2010
  • End-to-End(E2E) encryption is to encrypt private and important financial information such as user's secret access numbers and account numbers from user's terminal to financial institutions. There has been found significant security vulnerabilities by various hacking in early E2E encryption system since early E2E encryption is not satisfied the basic security requirement which is that there does not exist user's financial information on plaintext in user's terminal. Extensional E2E encryption which is to improve early E2E encryption provides confidentiality and integrity to protect user's financial information from vulnerabilities such as alteration, forgery and leakage of confidential information. In this paper, we explain the extensional E2E encryption technology and present considerable security issues when the extensional E2E encryption technology is applied to financial systems.

Verification Method to Detect the Fake Test Data in Military Supplies (군수업체 시험 데이터 및 시험 시스템 유효성 점검을 위한 제언)

  • Chung, Ilhan;Joo, Jinchun;Kim, Sunggon;Cho, Hyeonghwan;Ahn, Namsu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.3
    • /
    • pp.231-240
    • /
    • 2016
  • Recently, fake test data of power cables in nuclear power plants was a terrible shock to the citizens. Some cable companies manipulated the test data to make unfair profits. In addition, fake test data cases were found in military supplies. The fake test data cases focused on parts of army's tank, armored car. This paper propose a new method that can detect fake test data using known statistical methods. In addition, the method was implemented in Microsoft Excel to allow easy use. Lastly, a check sheet was proposed to check the validity of the test system of military suppliers. By detecting and checking the fake test data, it is expected that our new method will play an important role in quality assurance of military supplies.

차세대 나노 박막 다원계 모물질 설계, 합성 기술

  • Mun, Gyeong-Il;Sin, Seung-Yong
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2012.08a
    • /
    • pp.121-121
    • /
    • 2012
  • 산업이 고도화, 다원화, 세계화되고 있는 현대사회는 다기능성, 고물성, 극한 내구성을 가지며 환경 친화적이면서 에너지 효율을 극대화시킬 수 있는 다기능 소재의 개발을 요구하고 있다. 이러한 시점에서 다양한 물성을 동시에 발현이 가능한 코팅 소재는 향후 미래에 중요한 원천 소재로서 주목되고 있다. 특히, 환경에 의해 쉽게 물성 및 구조의 변화가 쉬운 종래의 코팅소재와는 달리, 다양한 외부환경에서도 미세 구조 및 물성을 안정적으로 유지할 수 있는 신개념의 코팅 소재의 개발이 절실히 요구되고 있다. 이를 위해서는 코팅소재의 다 성분화가 필수적이다. 최근의 코팅 기술은 2가지 이상의 물성, 특히 서로 상반되는 물성을 동시에 구현할 수 있는 소재의 개발을 요구하고 있다. 이러한 물성의 구현을 위하여 더 많은 성분으로 구성되며 더욱 복잡한 조직으로 구성된 코팅층에 대한 개발이 진행이 필요하다. 본 연구에서 목표로 하는 신 개념의 원천소재기술은 4성분계 이상의 원료 물질을 단일 타겟으로 제조하여, 단순한 공정으로서 단일 코팅층 내에 다양한 성분과 10 nm 미만 크기의 나노 결정립/나노 비정질로 구성된 나노 복합 구조의 형성이 가능하도록 하는 기술을 개발하고자 한다. 이를 통해 복합기능 3 이상의 다기능성 부여는 물론, 그림 1에 정리된 기존 코팅재에서 결여된 특성을 포함한 극한 기능성(광대역 윤활성, 전자 이동 제어에 의한 온도 저항 계수 및 전기 저항 조절, 고온 열적 안정성, 내산화성, 고열전도율, 초저마찰/내구성/초고경도성 등)의 구현이 가능한 복잡한 형태의 나노 복합 코팅층 소재 개발이 가능하도록 하는 기술이다. 또한 기존 코팅재의 구조적 결함을 통해 발생하는 내식성 문제를 방지할 수 있는 기술이다. 다성분계 모물질의 개발이 중요한 이유는 다수의 성분 원소를 합금 상태로 형성시킴으로서, 단일 소스에 의해 다양한 원소를 동시에 스퍼터링 및 증착이 가능하도록 할 수 있다는 장점을 가지기 때문이다. 특히, 타겟의 미세구조를 나노구조화 하는것을 통해, 스퍼터링 yield의 차이가 큰 원소일지라도 균일하게 증착시킬 수 있는 방법을 개발하고자한다. 또한 다수의 타겟을 이용하여 균일한 다성분 코팅층 형성하는 기존의 PVD 코팅방법으로는 다수의 성분타겟을 사용함으로서 장비의 복잡성, 코팅의 재현성, 대형화 등의 문제점을 본질적으로 갖고 있다. 이를 위한 해결방법으로 본 발표에서는 3가지 이상의 다기능성 구현을 위한 가장 중요한 원천기술이라 할 수 있는 다성분계 타겟 모물질 제조 기술의 개발 진행 사항에 대해 소개하고자 한다.

  • PDF

Development of Domestic Standard of VoIP for Inter-Domain Interoperability based on H.323 (국내 H.323 기반 도메인간 상호운용 표준개발)

  • 이일진;이종화;강신각
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.430-433
    • /
    • 2001
  • Voice of IP(VoIP) technology Provides voice service as well as data service via Internet. It has been a promising technology as Internet grows fast and the requirements are increasing. Among the standardized protocols for VoIP, H.323 has been one of the most developed technologies and widely used. Recently, the requirements for standardization of inter-domain interoperability is raised, since it has been developed by focusing on intra-domain service. To meet such requirements, IMTC(International Multimedia Telecommunications Consortium. Inc.) and VoIP Forum have elaborated on interoperability standard based on H.323, respectively in international and domestic markets. In this paper, we describe the call model and specify required functionalities of inter-domain interoperability based on H.323.

  • PDF

The DSTM TEP for IPv4 and IPv6 Interoperability (IPv4/IPv6의 연동을 위한 DSTM TEP의 기능)

  • 진재경;최영지;민상원
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.5
    • /
    • pp.578-587
    • /
    • 2003
  • The DSTM (Dual Stack Transition Mechanism), one of tunneling mechanism, is considered as the best solution in IPv4/IPv6 transition recently. The DSTM provides a method to assure IPv4/v6 connectivity based on 4over6 (IPv4-over-IPv6) tunneling and temporal allocation of a global IPv4 address to a host requiring such communication. A TEP (Tunnel End Point) operates as a border router between IPv6 domain and IPv4 Internet, which performs encapsulation and decapsulation of 4over6 tunneling packets to assure hi-directional forwarding between both networks. In this paper, we analyze basic standards of the IPv6 protocol. And, we design and implement a DSTM TEP daemon block. The TEP daemon analyzes a fevers tunneling packet that is forwarded by the DSTM node, establishes the TEP's 4over6 interface, and supplies communication between a DSTM and a IPv4-only node. Finally, we construct a DSTM testbed and measure performance of the DSTM TEP. Our observation results show that performance of TEP supports the DSTM service.

A Study on the Test Load Simulation Technique for T-50 Full Scale Durability Test (T-50 전기체 내구성시험 시험하중 설계기술 연구)

  • Jung, Jae-Kwon;Lee, Kee-Bhum;Yang, Myung-Seog;Shul, Chang-Won
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.32 no.3
    • /
    • pp.82-87
    • /
    • 2004
  • The general requirements to achieve the structural integrity of the airframe are described in the military specification, MIL-HDBK-1530. One of these requirements is the durability and damage tolerance of the airframe, which should be shown through the analysis and test based on the related specifications. This paper describes the full scale durability test load simulation to evaluate the structural safety and durability of the advanced trainer, T-50. The test load simulation was performed according to the procedure in the military specification and the KAF contract requirements. The durability test design technique which involve the floating test set-up, the optimal test load simulation method, and the 6-DOF test article balance method to secure the real flight conditions as many as possible. It was confirmed that this method will be available in a similar full-scale airframe structural test in future.