Year
2023
File Attachment
finalpaper_203_0511114655.pdf787.48 KB
Abstract
In this study, specific requirements for the development of a regulatory verification
support program for supporting the implementation of the national inspection of bulk facilities
were established and a conceptual design was derived. Since the system to be built has a strong
character of a database system that stores and manages data and provides information when
necessary, it is desirable to first identify the database to be managed within the system, and
configure the data output method of the regulatory body and other interface functions.
In order to design a regulatory verification support program to support the implementation of the
national inspection of bulk facilities, first of all, a database must be created by reconstructing
various information from the List of Inventory Items (LII) of bulk facilities to create a small and
well-organized relationships.
The user group of the regulatory verification support program to support the
implementation of the national inspection of bulk facilities is the government and regulatory
agencies. Next, key entities must be selected through identified tasks, data types, uses, processing
types, flows and restrictions, requirement collection, and input/output data analysis. Analysis of
requirements for system design is based on user groups.
Objects and properties were organized to structure the data related to the national
inspection of bulk facilities, and a system screen configuration plan was configured and detailed
menus were configured.
Government and regulatory agencies are supposed to input data provided by business
operators, but they may have to enter values directly due to unexpected errors, so it is necessary
to define the shape and size of data. In addition, it can be designed to find errors by computerizing
the nuclear material inventory variation and total inventory verification work by inputting the data
provided by the operator. This is expected to prevent human errors and prevent data errors.
When building a system, institutional constraints such as operational policies and security
regulations must be considered. In particular, requirements such as user authentication, authority,
and personal information protection must be reviewed in advance to clarify the requirements for
system development and to create a stable development environment.