• Title/Summary/Keyword: 에너지코드

Search Result 413, Processing Time 0.023 seconds

Subcriticality Evaluation Using the Modified Neutron Source Multiplication Method (개선된 중성자 선원 증배법을 이용한 미임계도 평가)

  • Yoon, Seok-Kyun;Naing, Win;Kim, Myung-Hyun
    • Journal of Energy Engineering
    • /
    • v.16 no.4
    • /
    • pp.155-163
    • /
    • 2007
  • To insure nuclear reactor safety, the reactivity of control rods should be calculated by measuring the criticality of reactor core and it is regularly performed during the annual physics test period. Also, the core criticality should be monitored during the start-up operation to avoid reactivity induced accidents. Many research works on control rod reactivity measurement and subcriticality measurement have been accomplished throughout the world for decades and recently a new method named "Modified Neutron Source Multiplication Method (MNSM)" was proposed in Japan which is known to be improved overcoming limitations of traditional Neutron Source Multiplication Method (NSM). In this study, MNSM was tested in calculation of subcriticalities and in evaluation of application validity using the educational reactor in Kyung Hee University, AGN-201. For this study, a revised nuclear data library and a neutron transport code system TRANSX - PARTISN were established. Correction factors for various control rod positions were produced using the k-effective values and the corresponding flux distributions and adjoint flux distributions. Experimental values of the core criticality were obtained using the neutron count rates of the BF3 proportional counters. The results showed that the expected reactivity worth of control rods by MNSM agreed well with the theoretical values and the correction factors contributed much for this purpose.

The Study of Statistical Optimization of 1,4-dioxane Treatment Using E-beam Process (전자빔 공정을 이용한 1,4-Dioxane 처리의 통계적 최적화 연구)

  • Hwang, Haeyoung;Chang, Soonwoong
    • Journal of the Korean GEO-environmental Society
    • /
    • v.12 no.4
    • /
    • pp.25-31
    • /
    • 2011
  • In this study, the experimental design methodology was applied to optimize 1,4-dioxane treatment in E-beam process. Main factor was mathematically described as a function of parameters 1,4-dioxane removal efficiencies(%), TOC removal efficiencies(%) modeled by the use of the central composite design(CCD) method among the response surface methodology(RSM). Concentration of 1,4-dioxane is designated as "$x_1$" and Irradiation intensity is designated as "$x_2$". The regression equation in coded unit between the 1,4-dioxane concentration and removal efficiencies(%) was $y=71.00-10.85x_1+20.67x_2+{1.53x_1}^2-{7.92x_2}^2-1.23x_1x_2$. The regression equation in coded unit between the 1,4-dioxane concentration and TOC removal efficiencies(%) was $y=44.48-13.25x_1+9.54x_2+{5.43x_1}^2-{1.35x_2}^2+4.45x_1x_2$. The model predictions agreed well with the experimentally observed results $R^2$(Adj) over 90%. Toxicity test using algae Pseudokirchneriella Subcapitata showed that the inhibition was reduced according to increasing an E-beam irradiation.

A Monte Carlo Simulation Study of a Therapeutic Proton Beam Delivery System Using the Geant4 Code (Geant4 몬테카를로 코드를 이용한 양성자 치료기 노즐의 전산모사)

  • Shin, Jungwook;Shim, Hyunha;Kwak, Jungwon;Kim, Dongwook;Park, Sungyong;Cho, Kwan Ho;Lee, Se Byeong
    • Progress in Medical Physics
    • /
    • v.18 no.4
    • /
    • pp.226-232
    • /
    • 2007
  • We studied a Monte Carlo simulation of the proton beam delivery system at the National Cancer Center (NCC) using the Geant4 Monte Carlo toolkit and tested its feasibility as a dose verification framework. The Monte Carlo technique for dose calculation methodology has been recognized as the most accurate way for understanding the dose distribution in given materials. In order to take advantage of this methodology for application to external-beam radiotherapy, a precise modeling of the nozzle elements along with the beam delivery path and correct initial beam characteristics are mandatory. Among three different treatment modes, double/single-scattering, uniform scanning and pencil beam scanning, we have modeled and simulated the double-scattering mode for the nozzle elements, including all components and varying the time and space with the Geant4.8.2 Monte Carlo code. We have obtained simulation data that showed an excellent correlation to the measured dose distributions at a specific treatment depth. We successfully set up the Monte Carlo simulation platform for the NCC proton therapy facility. It can be adapted to the precise dosimetry for therapeutic proton beam use at the NCC. Additional Monte Carlo work for the full proton beam energy range can be performed.

  • PDF

Numerical Study on Towing Stability of LNG Bunkering Barge in Calm Water (LNG 벙커링 바지의 정수 중 예인안정성에 관한 수치연구)

  • Oh, Seung-Hoon;Jung, Dong-Ho;Jung, Jae-Hwan;Hwang, Sung-Chul;Cho, Seok-Kyu;Sung, Hong-Gun
    • Journal of Navigation and Port Research
    • /
    • v.43 no.3
    • /
    • pp.143-152
    • /
    • 2019
  • In this paper, the towing stability of the LNG bunker barge was estimated. Currently, LNG bunkering barge is being developed for the bunkering of LNG (Liquefied Natural Gas), an eco-friendly energy source. Since the LNG bunkering barge assumes the form of a towed ship connected to the tow line, the towing stability of the LNG bunker barge is crucial f not only for the safety of the LNG bunker barge but also the neighboring sailing vessels. In the initial stages, a numerical code for towing simulation was developed to estimate the towing stability of the LNG bunkering barge. The MMG (Maneuvering Mathematical modeling Group) model was applied to the equations of motion while the empirical formula was applied to the maneuvering coefficients for use in the initial design stage. To validate the developed numerical code, it was compared with published calculation and model test results. Towing simulations were done based on the changing skeg area and the towing position of the LNG bunkering barge using the developed numerical codes. As a result, the suitability of the designed stern skeg area was confirmed.

Numerical Study on Towing Stability of LNG Bunkering Barge in Calm Water (LNG 벙커링 바지의 정수 중 예인안정성에 관한 수치연구)

  • Oh, Seunghoon;Jung, Dongho;Jung, Jae-Hwan;Hwang, Sung-Chul;Cho, Seok-kyu;Sung, Hong Gun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.185-188
    • /
    • 2019
  • In this paper, the towing stability of the LNG bunker barge is estimated. Currently, LNG bunkering barge is being developed as an infrastructure for the bunkering of LNG (Liquefied Natural Gas), an eco-friendly energy source. Since the LNG bunker barge are in the form of towed ship connected to the tow line, the towing stability of the LNG bunker barge is very important for the safety of not only the LNG bunker barge but also the surrounding sailing vessels. The numerical code for towing simulation was developed to estimate the towing stability of the LNG bunker barge at the initial design stage. The MMG(Manoeuvring Mathematical Group) model was applied to the equations of motion and the empirical formula was applied to the maneuvering coefficients so that they could be used in the initial design stage. To validity of the developed numerical code, it was compared with published calculation and model test results. Towing simulations were carried out according to with and without stern skeg of the LNG bunker barge using the developed numerical code. Through the results of the simulations, the appropriateness of the stern skeg area designed was confirmed.

  • PDF

Modelling Gas Production Induced Seismicity Using 2D Hydro-Mechanical Coupled Particle Flow Code: Case Study of Seismicity in the Natural Gas Field in Groningen Netherlands (2차원 수리-역학적 연계 입자유동코드를 사용한 가스생산 유발지진 모델링: 네덜란드 그로닝엔 천연가스전에서의 지진 사례 연구)

  • Jeoung Seok Yoon;Anne Strader;Jian Zhou;Onno Dijkstra;Ramon Secanell;Ki-Bok Min
    • Tunnel and Underground Space
    • /
    • v.33 no.1
    • /
    • pp.57-69
    • /
    • 2023
  • In this study, we simulated induced seismicity in the Groningen natural gas reservoir using 2D hydro-mechanical coupled discrete element modelling (DEM). The code used is PFC2D (Particle Flow Code 2D), a commercial software developed by Itasca, and in order to apply to this study we further developed 1)initialization of inhomogeneous reservoir pressure distribution, 2)a non-linear pressure-time history boundary condition, 3)local stress field monitoring logic. We generated a 2D reservoir model with a size of 40 × 50 km2 and a complex fault system, and simulated years of pressure depletion with a time range between 1960 and 2020. We simulated fault system failure induced by pressure depletion and reproduced the spatiotemporal distribution of induced seismicity and assessed its failure mechanism. Also, we estimated the ground subsidence distribution and confirmed its similarity to the field measurements in the Groningen region. Through this study, we confirm the feasibility of the presented 2D hydro-mechanical coupled DEM in simulating the deformation of a complex fault system by hydro-mechanical coupled processes.

Comparative Analysis of Self-supervised Deephashing Models for Efficient Image Retrieval System (효율적인 이미지 검색 시스템을 위한 자기 감독 딥해싱 모델의 비교 분석)

  • Kim Soo In;Jeon Young Jin;Lee Sang Bum;Kim Won Gyum
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.12
    • /
    • pp.519-524
    • /
    • 2023
  • In hashing-based image retrieval, the hash code of a manipulated image is different from the original image, making it difficult to search for the same image. This paper proposes and evaluates a self-supervised deephashing model that generates perceptual hash codes from feature information such as texture, shape, and color of images. The comparison models are autoencoder-based variational inference models, but the encoder is designed with a fully connected layer, convolutional neural network, and transformer modules. The proposed model is a variational inference model that includes a SimAM module of extracting geometric patterns and positional relationships within images. The SimAM module can learn latent vectors highlighting objects or local regions through an energy function using the activation values of neurons and surrounding neurons. The proposed method is a representation learning model that can generate low-dimensional latent vectors from high-dimensional input images, and the latent vectors are binarized into distinguishable hash code. From the experimental results on public datasets such as CIFAR-10, ImageNet, and NUS-WIDE, the proposed model is superior to the comparative model and analyzed to have equivalent performance to the supervised learning-based deephashing model. The proposed model can be used in application systems that require low-dimensional representation of images, such as image search or copyright image determination.

A Theoretical Calculation for Angular Dependence of X-ray Beams on Extremity Phantom (말단팬텀에서 X-선 빔의 방향의존성에 관한 이론적 계산)

  • Kim, Jong-Soo;Yoon, Suk-Chul;Kim, Jang-Lyul;Kim, Kwang-Pyo
    • Journal of Radiation Protection and Research
    • /
    • v.21 no.4
    • /
    • pp.263-271
    • /
    • 1996
  • The ANSI N13.32 recommends that a study of the angular response of a dosimeter be carried out once, although no pass/fail criterion is given for angular response. Gamma dose equivalent conversion and angular dependence factors were calculated by using MCNP code for the case of ANSI N13.32 extremity phantoms(finger and arm) at the depth of $7mg/cm^2$. Those extremity dosimeters were assumed to be irradiated from both monoenergitic photons and ISO X-ray narrow beams. These calculated gamma dose equivalent conversion and angular dependence factors were compared to B. Grosswendt's result calculated by using X-ray beams. The result showed that the dose equivalent conversion factors of this study agreed well with that of B. Grosswendt for all energies within 2% except 7% in the case of the low energies. In the case of angular dependence factors comparison, they agreed within 3%. It was shown that angular dependence factors of the finger phantom decreased as the horizontal angle of the phantom increased for the ISO X-ray beams less than 60keV. For the higher energy X-ray beams range they decreased slightly around 40 degree, but then increased from this energy to 90 degree.

  • PDF

Determination Method of Security Threshold using Fuzzy Logic for Statistical Filtering based Sensor Networks (통계적 여과 기법기반의 센서 네트워크를 위한 퍼지로직을 사용한 보안 경계 값 결정 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.2
    • /
    • pp.27-35
    • /
    • 2007
  • When sensor networks are deployed in open environments, all the sensor nodes are vulnerable to physical threat. An attacker can physically capture a sensor node and obtain the security information including the keys used for data authentication. An attacker can easily inject false reports into the sensor network through the compromised node. False report can lead to not only false alarms but also the depletion of limited energy resource in battery powered sensor networks. To overcome this threat, Fan Ye et al. proposed that statistical on-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and energy, where security threshold value is the number of message authentication code for verification of false report. In this paper, we propose a fuzzy rule-based system for security threshold determination that can conserve energy, while it provides sufficient detection power in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the probability of a node having non-compromised keys, the number of compromised partitions, and the remaining energy of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.

  • PDF

Energy Efficient Distributed Intrusion Detection Architecture using mHEED on Sensor Networks (센서 네트워크에서 mHEED를 이용한 에너지 효율적인 분산 침입탐지 구조)

  • Kim, Mi-Hui;Kim, Ji-Sun;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.151-164
    • /
    • 2009
  • The importance of sensor networks as a base of ubiquitous computing realization is being highlighted, and espicially the security is recognized as an important research isuue, because of their characteristics.Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop security Intrusion Detection System (IDS) that can survive malicious attacks from "insiders" who have access to keying materials or the full control of some nodes, taking their charateristics into consideration. In this perper, we design a distributed and adaptive IDS architecture on sensor networks, respecting both of energy efficiency and IDS efficiency. Utilizing a modified HEED algorithm, a clustering algorithm, distributed IDS nodes (dIDS) are selected according to node's residual energy and degree. Then the monitoring results of dIDSswith detection codes are transferred to dIDSs in next round, in order to perform consecutive and integrated IDS process and urgent report are sent through high priority messages. With the simulation we show that the superiorities of our architecture in the the efficiency, overhead, and detection capability view, in comparison with a recent existent research, adaptive IDS.