• Title/Summary/Keyword: 완전일치

Search Result 269, Processing Time 0.026 seconds

The Loss of Coolant Flow Accident Analysis in Kori-1 (고리1호기 원자로 냉각재 유량상실사고 해석)

  • Kook Jong Lee;Un Chul Lee;Jin Soo Kim;Si Hwan Kim
    • Nuclear Engineering and Technology
    • /
    • v.17 no.4
    • /
    • pp.256-266
    • /
    • 1985
  • The loss of coolant flow accident is analyzed for the pressurized water reactor of Korea Nuclear Unit-1. The loss of coolant flow accident is classified into three types in accordance with its severity; partial loss of coolant flow, complete loss of coolant flow and pump locked rotor accident. Analysis has been carried out in three stages; system transient and average core analysis, DNBR calculation and hot spot analysis. The purpose of developing KTRAN is to simulate the transient fast. For the DNBR calculation, the thermal hydraulic codes, SCAN and COBRA IV-1, are adopted. And for the hot spot analysis, the fuel thermal transient code LTRAN is employed. This code system should be fast responding to the transient analysis. In case the transient occurs, severity comes within a couple of seconds. So response should be fast to accomodate the following sequence of the accident. Unfortunately this purpose could not be achieved by KTRAN. However, the calculated results are well comparable with FSAR results in range. Thereby, the effectiveness of KTRAN code analysis in this type of accident is proven.

  • PDF

A Simulation for the Stratified Thermal Storage System in Residential Solar Energy Application (주거용 태양열 성층축열시스템의 시뮬레이션)

  • Pak, Ee-Tong;Yoo, Ho-Seon
    • Solar Energy
    • /
    • v.11 no.3
    • /
    • pp.44-52
    • /
    • 1991
  • The benefits of thermal stratification in sensible heat storage systems has been considered and studying by several investigators. In this paper, the basic data which is hard to obtain normally through the experiment were obtainable through the computer simulation. The major objectives of the study were to assess the benefits of stratified storage in residential solar water heating application and to suggest the optimum design parameters. From the computer simulation, following results were obtained. 1. The solar load fraction increases with increasing the number of tank segments. In these simulation, the magnitude of the improvement was about 10%. 2. The solar load fraction increases when the ratio of diameter to height of the tank(H/D) increases to 3, but H/D exceed 3 then, the solar load fraction decreases. In these simulation, the magnitude of the improvement was about 3%. 3. Increasing the collector flow rate slightly improved the performance of the mixed storage system(Node=1). But, for the stratified storage system(Node=N), the solar load fraction increases with decreasing flow rate until the point is reached at which the collector outlet temperature reaches the boiloff limit of $100^{\circ}C$ over some portion of the simulation period.

  • PDF

An Improved Proton Recoil Telescope Detector for Fast Neutron Spectroscopy

  • Chung, Moon-Kyu;Kang, Hee-Dong;Park, Tong-Soo
    • Nuclear Engineering and Technology
    • /
    • v.5 no.3
    • /
    • pp.191-201
    • /
    • 1973
  • For fast neutron spectroscopy in MeV region, a recoil proton telescope detector was designed and constructed so as to increase in detection efficiency without appreciable deterioration in energy resolution by adopting a special type of recoil proton radiator which is a combination of a ring-shaped vertical radiator and a cone-shaped horizontal radiator at a certain geometry. A neutron stopper was built in the detector system to minimize the background due to direct exposure of the Si(Li) detectors to primary incident neutrons. The detection efficiency and the energy resolution calculated at various neutron energies and geometries are given and these characteristics of the detector system were tested by 14.1 MeV neutrons. As the calculation predicted, the relative detection efficiency in case of the combined radiator system is almost 2.2 times of that for a single, ring-shaped vertical radiator system. The calculated energy resolution is 3.7% FWHM, whereas the measured resolution was 3.9% which means resolution broadening of approximately. 30% was resulted by introducing a combined radiator system into the telescope. Increase in background less than 40% was also observed.

  • PDF

Case Report of Brain Metastsis of Primary Cardiac Chondrosarcoma without Primary Recurrence (원발성 심장 연골육종 증례보고)

  • 왕영필;연성모;조건현;곽문섭;김세화;문석환
    • Journal of Chest Surgery
    • /
    • v.29 no.11
    • /
    • pp.1276-1280
    • /
    • 1996
  • Because of paucity of primary cardiac tumors, primary cardiac tumors are of much interest to the pathologist, cardiologist and cardiac surgeon. A cardiac chondrosarcoma, which very rare, is presented as follows: This 37 year-old female patient was admitted under the diagnosis of a left atrial tumor(myxoma) on July 3, 1993. Using the CPB, she underwent complete removal of tumor including the atrial septum. And final pathology report was chondrosarcoma. The adjuvant irradiation with total dose of 5040 cGy(28 fractiations for 2 months) and chemotherapy(VP-16 and ifosfamide) was completed. She had no evidence of recurrence until May 2, 1995. when she was admitted due to brain metastasis, which was detected by MRI scan with a tumor free interval for 2 years. A tumor, located around the frontoparital cortex was removed neurosurgern on Sep. 13, 1995 and the final pathology report was also a chondrosarcoma on pathologic exam. The postoperative course was uneventful.

  • PDF

Analysis of the TE Scattering by a Resistive Strip Grating Over a Grounded Dielectric Plane (접지된 유전체 평면위의 저항띠 격자구조에 의한 TE 산란 해석)

  • Yoon, Uei-Joong
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.3
    • /
    • pp.198-204
    • /
    • 2006
  • In this paper, TE(transverse electric) scattering problems by a resistive strip grating on a grounded dielectric plane according to the strip width and grating period, the relative permittivity and thickness of dielectric layer, and incident angles of a TE plane wave are analyzed by applying the FGMM(Fourier-Galerkin Moment Method) known as a numerical procedure. The induced surface current density is simply expanded in a Fourier series by using the exponential function as a simple function. The reflected power gets increased according as the relative permittivity and thickness of dielectric multilayers gets increased, the sharp variations of the reflected power are due to resonance effects were previously called wood's anomallies[7]. To verify the validity of the proposed method, the numerical results of normalized reflected power for the uniform resistivity R = 0 as a conductive strip case show in good agreement with those in the existing paper.

  • PDF

Prediction and Evaluation of Progressive Failure Behavior of CFRP using Crack Band Model Based Damage Variable (Crack Band Model 기반 손상변수를 이용한 탄소섬유강화 복합재료 적층판의 점진적 파손 거동 예측 및 검증)

  • Yoon, Donghyun;Kim, Sangdeok;Kim, Jaehoon;Doh, Youngdae
    • Composites Research
    • /
    • v.32 no.5
    • /
    • pp.258-264
    • /
    • 2019
  • In this paper, a progressive failure analysis method was developed using the Hashin failure criterion and crack band model. Using the failure criterion, the failure initiation was evaluated. If the failure initiation is occurred, the damage variables at each failure modes (fiber tension & compression, matrix tension & compression) was calculated according to linear softening degradation behavior and the variables are used to derive the damaged stiffness matrix. The damaged stiffness matrix is reflected to damaged material and the progressive failure analysis is continued until the damage variables to be 1 that complete failure of material. A series of processes were performed using FE commercial code ABAQUS with user defined material subroutine (UMAT). To evaluate the proposed progressive failure model, the experimental results of open hole composite laminate tests was compared with numerical result. Using digital image correlation system, the strain behavior also was compared. The proposed numerical results were coincided well with the experimental results.

Development of a Formal Access Control Model in CORBA Security using the Z Language (Z 언어를 기반으로 CORBA 보안의 정형화된 접근 제어 모델 개발)

  • 김영균;김경범;인소란
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.79-94
    • /
    • 1997
  • OMG (Object Management Group) published a security service specification, called CORBA (Common Object Request Broker Architecture) security reference model because the integration of security and object-oriented techniques was critical for successful deployment of distributed object systems. The CORBA security reference model treats access control as an implementation independent semantic concept but has incomplete semantics of the access control function. Because of such imcompleteness it is difficult for the system administrator and the CORBA security implementor to have the same understanding for the meaning of access control in the CORBA security. We propose a formal model for access control the CORBA security using the formal description language, which is called Z language based on typed set theory. The proposed model provides concrete semantics of the access control function to both the system administrator and the implementor.

A Study on Domestic Password Reuse Reasoning by Analysing Four-digit Passcodes in the Second Survey (네 자리 숫자 비밀번호 2차 조사 자료에 의한 국내 패스워드 재사용 추론 연구)

  • Moon, Suk Kyung
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.52-59
    • /
    • 2020
  • This second survey, which collected 2392 disclosing grades data for 2012~ 2017, nearly twice the first survey, was conducted to supplement the result of the first survey on the reuse of 4-digit passcodes(PCs) data. In addition of second survey, we found that the more number of used PCs, the higher reuse rate, up to 4 numbers of PCs were used for reusing and there may be personal differences even on the single site. The results of this paper that were not available in the first survey were close to the those of foreign research on the reuse of passwords using a mixture of numbers, letters and special characters. This second survey provided an inference that an opportunity to indirectly approach the domestic situation of re-using password, where data collection is impossible and that domestic regulation such as periodic change of password may increase the re-using password.

Risk Assessment of Cut Slope by Gravity Field Interpretation and Modelling (비탈면 위험도 평가를 위한 중력장 해석 및 모델링)

  • Choi, Sungchan;Kim, Sung-Wook;Choi, Eun-Kyoung;Lee, Yeong-Jae;Jang, Hyun-Ick
    • The Journal of Engineering Geology
    • /
    • v.31 no.4
    • /
    • pp.533-540
    • /
    • 2021
  • Gravity field analysis and density modeling were performed to evaluate the internal state of the rock mass, which is the cause of cut slope collapse. The shape of the weathered zone and the depth of basement could be confirmed from the complete Bouguer anomaly and density model. The basement depth at the center of the cut slope calculated using the Euler deconvolution inverse method is 30 m, which is about 10 m deeper than the surrounding area. In addition, the depth of basement and the thickness of the weathered zone are similar to the boundary between low resistivity and high resistivity in dipole-dipole survey. From the study results, gravity field analysis and density modeling recognizes the internal state of the rock slope and can be used for slope safety analysis, and is particularly suitable as a method to determine the shape of weathered zones in interpreting the safety of cut slopes

Comparison procedure in evaluation analysis of source code comparison on Embedded system (정보기기 소스코드 유사성 분석에서 목적물 검증)

  • Nam, SangYep;Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.31-38
    • /
    • 2021
  • In order to analyze the similarity of the source code object material, the source code on both sides must be able to be compiled and executed. In particular, in the case of hardware-integrated software, it is necessary to check whether the hardware interface matches. However, currently, the source code is provided in an incomplete state which is not original of source code used in developing steps. The complainant confirms that the executing characteristics are similar to their own in the expression and function of the output, and request an evaluation. When a source code compilation error occurs during the evaluation process, the experts draw a flowchart of the source code and applies the method of tracing the code flow for each function as indirect method. However, this method is indirect and the subjective judgment is applied, so there is concern about the contention of objectivity in the similarity evaluation result. In this paper, the problems of unverified source code similarity analysis and improvement directions are dealt with, through the analysis cases of source code disputes applied to embedded systems.