• Title/Summary/Keyword: Requirements analysis

Search Result 4,396, Processing Time 0.03 seconds

Analysis of ISO 9000 Quality Certification for Small and Medium Industrial Companies (중소제조기업의 ISO 9000 품질인증실태 및 개선방안에 관한 연구)

  • 유재권;정수일
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.23 no.54
    • /
    • pp.97-110
    • /
    • 2000
  • As more and more companies pursue ISO 9000 certification, one of the most misconceptions about ISO 9000 is that registration is necessary only for business. ISO 9000 is being driven by commercial requirements, not legal fiat. This registration can be used as evidence of compliance to the ISO 9000 to satisfy specific customer requirements. The primary objective of this research is to provide the efficient implementation process of ISO 9000 certification on the basis of total quality management concerning with ISO/CDl 9001:2000, ISO/CDl 9004:2000 and ISO/CD2 9001:2000. Based on the result of first paper in May 1999, this study has been conducted using the data collected from 312 manufacturing companies which registered ISO 9000 certification. This analysis can be applied to Korean small and medium industrial companies in establishing and maintaining the development of qualify systems. The companies should be able to benefit if they make continuous effort to improve the quality activities based on the factors suggested in this paper.

  • PDF

Analysis of the system requirements by EMU operating types (도시철도 운전형태별 시스템 구비요건 분석 연구)

  • Hong, Yong-Ki;Chung, Jong-Duk;Pyun, Jang-Sik
    • Proceedings of the KSR Conference
    • /
    • 2008.11b
    • /
    • pp.536-543
    • /
    • 2008
  • When the electric motor car was first introduced, an engineer, responsible for the work related to operation and a conductor for the announcement and management of entrances and the other services like as monitoring the passengers in the platforms used to take together the train for passengers' safe. As new technologies developed and the urban transit system had the automatic driving facilities, automatic door switch and broadcasting systems, to solve the financial problems, most subway systems introduced the one-man operation system. To curtail the operating expense through automatic control and operation for the economical efficiency, the crewless driving system was introduced abroad around 1970 on the light weight train and Japan started the crewless driving system in 2005, Germany started it in June 2008. We examine system requirements of the system and methods to construct safe systems that would be introduced, suitable for one-man operation system or crewless driving system through the surveys and analysis of driving state and the systems.

  • PDF

Design of safety critical and control systems of Nuclear Power Plants using Petri nets

  • Singh, Pooja;Singh, Lalit Kumar
    • Nuclear Engineering and Technology
    • /
    • v.51 no.5
    • /
    • pp.1289-1296
    • /
    • 2019
  • Non-functional requirements plays a critical role in designing variety of applications domain ranges from safety-critical systems to simple gaming applications. Performance is one of the crucial non-functional requirement, especially in control and safety systems, that validates the design. System risk can be quantified as a product of probability of system failure and severity of its impact. In this paper, we devise a technique to do the performance analysis of safety critical and control systems and to estimate performance based risk factor. The technique elaborates Petri nets to estimate performability to ensure system dependability requirements. We illustrate the technique on a case study of Nuclear Power Plant system. The technique has been validated on 17 safety critical and control systems of Nuclear Power Plant.

A Checklist and Manual Developed to Review Fire Safety Facilities' Compliance with Fire Safety Requirements for Apartment Buildings (공동주택 소방시설 적법성 검토를 위한 화재안전규정 체크리스트 및 매뉴얼 개발)

  • Jeong, Soo-jin;Park, Yoo-na;Kim, Jae-jun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.19 no.6
    • /
    • pp.94-102
    • /
    • 2018
  • Recently, there is a growing need to review compliance with legal requirements to ensure fire safety as the number of fires caused by noncompliant fire safety facilities in high-rise buildings has increased. While there are a large number of apartment buildings in Korea, there is a lack of review on fire safety facilities' compliance with fire safety requirements. The reason for this lack of review despite apartment buildings causing deaths due to their structural features in the event of a fire, lies in the misinterpretation of legal provisions as the Building Act and the Fire Services Act are mixed up; a final inspection when fire safety facilities are unnecessarily installed or missing could result in significant losses in terms of finances and time. Therefore, this study developed a checklist that makes it possible to review mixed-up legal requirements for fire safety facilities simultaneously, and examined the importance and current level of each item through IPA (Importance Performance Analysis). Based on these results, this study intends to develop a manual that considers its applicability to construction practices and contribute to reducing construction companies' fire safety inspection risks.

Flexible, Extensible, and Efficient VANET Authentication

  • Studer, Ahren;Bai, Fan;Bellur, Bhargav;Perrig, Adrian
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.574-588
    • /
    • 2009
  • Although much research has been conducted in the area of authentication in wireless networks, vehicular ad-hoc networks (VANETs) pose unique challenges, such as real-time constraints, processing limitations, memory constraints, frequently changing senders, requirements for interoperability with existing standards, extensibility and flexibility for future requirements, etc. No currently proposed technique addresses all of the requirements for message and entity authentication in VANETs. After analyzing the requirements for viable VANET message authentication, we propose a modified version of TESLA, TESLA++, which provides the same computationally efficient broadcast authentication as TESLA with reduced memory requirements. To address the range of needs within VANETs we propose a new hybrid authentication mechanism, VANET authentication using signatures and TESLA++ (VAST), that combines the advantages of ECDSA signatures and TESLA++. Elliptic curve digital signature algorithm (ECDSA) signatures provide fast authentication and non-repudiation, but are computationally expensive. TESLA++ prevents memory and computation-based denial of service attacks. We analyze the security of our mechanism and simulate VAST in realistic highway conditions under varying network and vehicular traffic scenarios. Simulation results show that VAST outperforms either signatures or TESLA on its own. Even under heavy loads VAST is able to authenticate 100% of the received messages within 107ms. VANETs use certificates to achieve entity authentication (i.e., validate senders). To reduce certificate bandwidth usage, we use Hu et al.'s strategy of broadcasting certificates at fixed intervals, independent of the arrival of new entities. We propose a new certificate verification strategy that prevents denial of service attacks while requiring zero additional sender overhead. Our analysis shows that these solutions introduce a small delay, but still allow drivers in a worst case scenario over 3 seconds to respond to a dangerous situation.

Evaluation of HACCP system implementation in meat packaging industry (식육포장처리업의 HACCP 운용실태 분석)

  • Kang, Cheon-Kun;Hong, Chong-Hae
    • Korean Journal of Veterinary Service
    • /
    • v.36 no.4
    • /
    • pp.291-296
    • /
    • 2013
  • The purpose of this study was to determine food safety practices and procedures based on Hazard Analysis Critical Control Point (HACCP) system and to suggest more effective method of HACCP implementation in meat packaging industry in Korea. We used the non-compliance rate of each evaluation item to compare the weak points of prerequisite requirements and HACCP. The prerequisite items related to facility, equipment, and tools showed inadequate level of requirements or unsanitary conditions for proper HACCP operation. A lack of understanding of sanitation standard operation procedures was identified as a fundamental barrier to HACCP implementation. High rate of non-compliance in HACCP items compared to prerequisite requirements signify that small businesses have potential difficulties of applying HACCP due to lack of technical expertise, financial resources for prerequisite requirements, and available personnel to prepare and operate HACCP plan. Also we suggest to revise and minimize current critical control points (CCPs). Time-temperature control of cold-storage rooms for carcasses and final products could be performed by control points of prerequisite requirements. As the occurrence frequency getting lower, metal detector should be replaced by intensified training of sanitary handling and safety procedure. This will be more effective and preventive measures against physical contaminants including metal particles. In conclusion, control point of prerequisite requirement may replace CCP in the plant with simple processing line and no heating process such as meat packaging industry.

A Study on Securing the Quality of Trusted Digital Records as Evidence: Focusing on Analysis of Quality Concept and Requirements for Records and Evidence Respectively Covered in Records Management and Judicial Domain (증거로서 신뢰할 수 있는 전자기록의 품질 확보방안 연구 - 기록관리영역과 사법영역에서 다루는 기록과 증거의 품질 개념과 요건 분석을 중심으로 -)

  • Lee, Gemma;Oh, Kyung-Mook
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.3
    • /
    • pp.217-246
    • /
    • 2021
  • This study aimed to analyze the quality concepts and requirements of digital records as evidence and to find an implication to develop requirements for trusted digital records with securing authoritative qualities. To this end, this study compared requirements of records domain linking records process, records metadata and records systems with judicial domain on digital evidence, and identified the records requirements to secure the legal admissibility linking records and judicial domain. This study analyzed the relationship of quality concepts between digital records and digital evidence, found the legal admissibility is highly related to the reliability, and derived that it needs the measure to secure the reliability at the stage of records creation and capture. To prove authenticity of digital evidence, this study identified importance of records process, records metadata and records system, and proposed the necessity of measurement to secure records' evidence.

Analysis of Security Requirements for Secure Update of IVI(In-Vehicle-Infotainment) Using Threat Modeling and Common Criteria (위협모델링과 공통평가기준을 활용한 인포테인먼트의 안전한 업데이트 보안요구사항 분석)

  • Kang, Soo-young;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.613-628
    • /
    • 2019
  • In-Vehicle Infotainment provides navigation and various functions through the installation of the application. And infotainment is very important to control the entire vehicle by sending commands to the ECU. Infotainment supports a variety of wireless communication protocols to install and update applications. So Infotainment is becoming an attack surface through wireless communcation protocol for hacker's access. If malicious software is installed in infotainment, it can gain control of the vehicle and send a malicious purpose command to the ECU, affecting the life of the driver. Therefore, measures are needed to verify the security and reliability of infotainment software updates, and security requirements must be derived and verified. It must be developed in accordance with SDL to provide security and reliability, and systematic security requirements must be derived by applying threat modeling. Therefore, this paper conducts threat modeling to derive infotainment update security requirements. Also, the security requirements are mapped to the Common Criteria to provide criteria for updating infotainment software.

A Study on Analysis of Security Functional Requirements for Virtualization Products through Comparison with Foreign Countries' Cases (해외 사례 비교를 통한 가상화 제품의 보안기능 요구사항 분석에 관한 연구)

  • Lee, Ji-Yeon
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.221-228
    • /
    • 2019
  • The importance of security for virtualization products has been increased with the activation policy of cloud computing and it is necessary to analyze cyber security threats and develop security requirements for virtualization products to provide with more secure cloud environments. This paper is a preliminary study with the purpose of developing security functional requirements through analyzing security features and cyber security threats as well as comparison of foreign countries' cases for virtualization products. To do this, the paper compares evaluation schemes for virtualization products in US and UK foreign countries, and analyzes the cyber security threats, security objectives and security requirements in both countries. Furthermore, it proposes the essential checking items and processes for developing security functional requirements about security features of virtualization products to contribute to its more secure development and the establishment of related security evaluation standards.

Analysis of Communication Performance Requirements for Initial-Phase UAM Services (UAM 초기 운영을 위한 통신 성능 요구도 도출)

  • Young-Ho Jung;HyangSig Jun
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.1
    • /
    • pp.109-115
    • /
    • 2024
  • The Concept of Operations (ConOps) document issued by the Korean Government (K-UAM ConOps) for urban air mobility (UAM) services takes into account not only aviation voice communication but also the use of 4G and 5G mobile communication to support the initial phase of UAM services. This paper studies a methodology to establish communication performance requirements for UAM traffic management and presents the analyzed results for communication performance requirements. To accomplish this, the operational scenarios of UAM developmental stages outlined in the K-UAM ConOps and FAA ConOps are scrutinized, and the diverse messages that must be communicated among various stakeholders for effective UAM operations are identified. A draft of communication performance requirements is also calculated by considering packet sizes, transmission frequencies, acceptable latencies, and availability. The outcomes of this study are expected to stand as a pioneering effort in defining communication requirements for UAM services, providing a crucial foundation for future initiatives such as the design of dedicated communication networks for UAM and the determination of required frequency bandwidth.