• Title/Summary/Keyword: Requirements analysis

Search Result 4,367, Processing Time 0.031 seconds

Comparison of Distributed and Parallel NGS Data Analysis Methods based on Cloud Computing

  • Kang, Hyungil;Kim, Sangsoo
    • International Journal of Contents
    • /
    • v.14 no.1
    • /
    • pp.34-38
    • /
    • 2018
  • With the rapid growth of genomic data, new requirements have emerged that are difficult to handle with big data storage and analysis techniques. Regardless of the size of an organization performing genomic data analysis, it is becoming increasingly difficult for an institution to build a computing environment for storing and analyzing genomic data. Recently, cloud computing has emerged as a computing environment that meets these new requirements. In this paper, we analyze and compare existing distributed and parallel NGS (Next Generation Sequencing) analysis based on cloud computing environment for future research.

A Study on Critical Success Factor Analysis and its Usage : An Aplication Study to the Steel Industry in Korea (주요성과요인분석과 그 활용방안에 관한 연구 :한국 철강산업에의 적용사례)

  • 문태수;신영종
    • Korean Management Science Review
    • /
    • v.8 no.1
    • /
    • pp.13-25
    • /
    • 1991
  • Over the past few years, there has been a growing interest in using information technology for competitive advantage. A sustainable advantage is the key to the survival and growth of a firm. The successful implementation of information technology is dependent on efficient information systems planning. But the correct and complete information, requirements for effective information systems planning are frequently very difficult to obtain. In this paper the Critical Success Factors(CSF) method was employed as a means of managerial information requirements analysis for information systems planning in Korea's steel industry. CSFs are one of the few areas of activity that must go well to ensure the success of an organization. This paper addresses the concept and hierarchy of CSF analysis as a methodology in identifying corporate information needs and concludes with the use and benefit of results of CSF analysis.

  • PDF

CHANNEL ANALYSIS SYSTEM FOR DTV RECEPTION SIGNAL

  • Suh, Young-Woo;Lee, Jae-Kwon;Mok, Ha-Kyun;Choi, Jin-Yong;Seo, Jong-Soo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.337-340
    • /
    • 2009
  • In general, channel information of received DTV signal analyzed based on symbol timing clock with only In-phase information in DTV receiver. This paper presents technical requirements of channel analysis system for DTV reception signal. In order to meet such requirements and measure more accurate magnitude and phase of channel information, compensation method for the quadrature information from measured in-phase data is proposed. The proposed channel analysis system is implemented with a commercial DTV chipset and provides fast data analysis with good connectivity with field test vehicles. Computer simulation and laboratory test results are provided to figure out the performance of the proposed channel analysis system for DTV signal.

  • PDF

Functional analysis of Avionics system for an air transport mission (항공 수송 임무 수행을 위한 Avionics 시스템의 기능 분석)

  • Song, Yun-Sub
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.17 no.3
    • /
    • pp.40-50
    • /
    • 2009
  • Avionics system's function for an air transport mission is analysed. The starting point for designing a Avionics system is a clear understanding of the mission requirements and the requirement allocation by the top level aircraft system. Therefore, the analysis begins by making a top-down analysis to the aircraft missions. The baseline mission is divided into segments, and each segment is subjected to a detailed analysis to establish the requirements for the Avionics system. Special attention is given to capture the key aspects of interfaces, and to incorporate them into the design.

  • PDF

Information Security Activity of Analysis Phase in Information Security Model in Accordance with SDLC

  • Shin, Seong-Yoon;Lee, Tae-Wuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.11
    • /
    • pp.79-83
    • /
    • 2016
  • In this paper, we define four levels of analysis, design, implementation, and testing of the configuration of the development phase by S/W development life cycle. In particular, it dealt with the stage of the analysis phase to prepare an information system developed intensively. Details of the derivation of the information security requirements, it can be seen that comes from the perspective of confidentiality, integrity, availability and accountability, etc. It dealt with from the first manifestations of the projects planning to final planning to establish information security in activities of the Information Security requirements. As an example exhibited by assessing the information security analysis phase activities of S corporations, it can be seen that the improved sales rise in information security activities.

A formal approach to support the identification of unsafe control actions of STPA for nuclear protection systems

  • Jung, Sejin;Heo, Yoona;Yoo, Junbeom
    • Nuclear Engineering and Technology
    • /
    • v.54 no.5
    • /
    • pp.1635-1643
    • /
    • 2022
  • STPA (System-Theoretic Process Analysis) is a widely used safety analysis technique to identify UCAs (Unsafe Control Actions) resulting in potential losses. It is totally dependent on the experience and ability of analysts to construct an information model called Control Structures, upon which analysts try to identify unsafe controls between system components. This paper proposes a formal approach to support the manual identification of UCAs, effectively and systematically. It allows analysts to mechanically extract Process Model, an important element that makes up the Control Structures, from a formal requirements specification for a software controller. It then concisely constructs the contents of Context Tables, from which analysts can identify all relevant UCAs effectively, using a software fault tree analysis technique. The case study with a preliminary version of a Korean nuclear reactor protections system shows the proposed approach's effectiveness and applicability.

Aircraft derivative design optimization considering global sensitivity and uncertainty of analysis models

  • Park, Hyeong-Uk;Chung, Joon;Lee, Jae-Woo
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.17 no.2
    • /
    • pp.268-283
    • /
    • 2016
  • Aircraft manufacturing companies have to consider multiple derivatives to satisfy various market requirements. They modify or extend an existing aircraft to meet new market demands while keeping the development time and cost to a minimum. Many researchers have studied the derivative design process, but these research efforts consider baseline and derivative designs together, while using the whole set of design variables. Therefore, an efficient process that can reduce cost and time for aircraft derivative design is needed. In this research, a more efficient design process is proposed which obtains global changes from local changes in aircraft design in order to develop aircraft derivatives efficiently. Sensitivity analysis was introduced to remove unnecessary design variables that have a low impact on the objective function. This prevented wasting computational effort and time on low priority variables for design requirements and objectives. Additionally, uncertainty from the fidelity of analysis tools was considered in design optimization to increase the probability of optimization results. The Reliability Based Design Optimization (RBDO) and Possibility Based Design Optimization (PBDO) methods were proposed to handle the uncertainty in aircraft conceptual design optimization. In this paper, Collaborative Optimization (CO) based framework with RBDO and PBDO was implemented to consider uncertainty. The proposed method was applied for civil jet aircraft derivative design that increases cruise range and the number of passengers. The proposed process provided deterministic design optimization, RBDO, and PBDO results for given requirements.

Regional Integrity Analysis using modernized GPS, Galileo and SBAS

  • Han, Sang-Sul;Shin, Dae-Sik;Cho, Jong-Chul;Park, Chan-Sik;Jun, Hyang-Sik;Nam, Gi-Wook;Lee, Sang-Jeong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.417-421
    • /
    • 2006
  • ICAO defines performance requirements of navigation system such as accuracy, integrity, continuity and availability. The integrity is most significant performance requirement in aviation where safety of life is crucial. Many researches on this topic anticipate that GPS with SBAS or Galileo can meet APV requirements and GPS with GBAS or Galileo with GBAS will meet CAT II and III requirements. These performance expectations are based on global analysis. In this paper regional integrity analysis in Korea using various combinations of modernized GPS, Galileo and SBAS is given. The simulation results show that CAT I requirement can be met using modernized GPS and Galileo alone, however, CAT II and III are not met even augmenting SBAS because of VPL. A more efficient augmentation such as GBAS which can reduce VPL dramatically is required to meet CAT II and III in Korean region.

  • PDF

Loss Analysis and Air-Cooled Design for a Cascaded Electrical Source Transmitter

  • Xue, Kai-Chang;Wang, Shuang;Lin, Jun;Li, Gang;Zhou, Feng-Dao
    • Journal of Power Electronics
    • /
    • v.15 no.2
    • /
    • pp.530-543
    • /
    • 2015
  • Air-cooling method is adopted on the basis of the requirements for the thermal stability and convenient field use of an electrical source transmitter. The power losses of the transmitter are determined after calculating the losses of the alternating current (AC)-direct current (DC) power supply, the constant-current circuit, and the output circuit. According to the analysis of the characteristics of a heat sink with striped fins and a fan, the engineering calculation expression of the Nusselt number and the design process for air-cooled dissipation are proposed. Experimental results verify that the error between calculated and measured values of the transmitter losses is 12.2%, which meets the error design requirements of less than 25%. Steady-state average temperature rise of the heat sink of the AC-DC power supply is $22^{\circ}C$, which meets the design requirements of a temperature rise between $20^{\circ}C$ and $40^{\circ}C$. The transmitter has favorable thermal stability with 40 kW output power.

A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication

  • DongGyun Chu;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.38-52
    • /
    • 2024
  • The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multi-access edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.