• Title/Summary/Keyword: 임계상황

Search Result 163, Processing Time 0.031 seconds

Quantitative Evaluation of Criticality According to the Major Influence of Applied with Burnup Credit on Dual-purpose Metal Cask (국내 금속겸용용기의 연소도 이득효과 적용 시 주요영향인자에 따른 정량적 핵임계 평가)

  • Dho, Ho-seog;Kim, Tae-man;Cho, Chun-Hyung
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.13 no.2
    • /
    • pp.141-154
    • /
    • 2015
  • In general, conventional criticality analysis for spent fuel transport/storage systems have been performed based on the assumption of fresh fuel concerning the potential uncertainties from number density calculations of actinide nuclides and fission products in spent fuel. However, these evaluation methods cause financial losses due to an excessive criticality margin. In order to overcome this disadvantage, many studies have recently been conducted to design and commercialize a transportation and storage cask applied to the Burnup Credit (BUC). This study conducted an assessment to ensure criticality safety for reactor operating parameters, axial burn-up profiles and misload accident conditions, which are the factors that are likely to affect criticality safety when the BUC is applied to the dual-purpose cask under development at the KOrea RADioactive waste agency (KORAD). As a result, it was found that criticality resulting from specific power, changed substantially and relied on conditions of low enrichment and high burn-up. Considering the end effect in the case of high burn-up produced a positive-definite result. In particular, the increment of maximum effective multiplication factors due to misloading was 0.18467, confirming that misload is a factor that must be taken into account when applying the BUC. The results of this study may therefore be utilized as references in developing technologies to apply the BUC to domestic models and operational procedures or preventing any misload accidents during the process of spent fuel loading.

A Flexible Multi-Threshold Based Control of Server Power Mode for Handling Rapidly Changing Loads in an Energy Aware Server Cluster (에너지 절감형 서버 클러스터에서 급변하는 부하 처리를 위한 유연한 다중 임계치 기반의 서버 전원 모드 제어)

  • Ahn, Taejune;Cho, Sungchoul;Kim, Seokkoo;Chun, Kyongho;Chung, Kyusik
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.9
    • /
    • pp.279-292
    • /
    • 2014
  • Energy aware server cluster aims to reduce power consumption at maximum while keeping QoS(quality of service) as much as energy non-aware server cluster. In the existing methods of energy aware server cluster, they calculate the minimum number of active servers needed to handle current user requests and control server power mode in a fixed time interval to make only the needed servers ON. When loads change rapidly, QoS of the existing methods become degraded because they cannot increase the number of active servers so quickly. To solve this QoS problem, we classify load change situations into five types of rapid growth, growth, normal, decline, and rapid decline, and apply five different thresholds respectively in calculating the number of active servers. Also, we use a flexible scheme to adjust the above classification criterion for multi threshold, considering not only load change but also the remaining capacity of servers to handle user requests. We performed experiments with a cluster of 15 servers. A special benchmarking tool called SPECweb was used to generate load patterns with rapid change. Experimental results showed that QoS of the proposed method is improved up to the level of energy non-aware server cluster and power consumption is reduced up to about 50 percent, depending on the load pattern.

Analysis of Problems in the Phase Diagram of the 2015 Revised Curriculum Chemistry II Textbook (2015 개정 교육과정 화학II 교과서의 상평형 그림에 대한 문제점 분석)

  • Youngha, Hwang;Seoung-Hey, Paik
    • Journal of the Korean Chemical Society
    • /
    • v.67 no.1
    • /
    • pp.54-63
    • /
    • 2023
  • In this study, six types of 2015 revised curriculum ChemistryII textbooks were analyzed for conditions, definitions, whether or not critical points were displayed, and real-life examples of phase diagram. In this study, it was confirmed that the problems pointed out in several previous studies were not reflected in the 2015 revised curriculum ChemistryII textbook. The same as the situation defining the phase diagram, the translation of the phase diagram into a phase equilibrium diagram, the distinction between phase and state being unclear, the critical point not being shown in the phase diagram, real life examples are very limited what is being presented as is suggested as a problem. Therefore, it is necessary to reflect the results of various previous studies in the revised curriculum ChemistryII textbook that will be made in the future, specify the conditions under which the phase diagram is drawn, newly model the situation defining the phase diagram, and translate the phase diagram as a 'phase diagram'. It is necessary to use the term, clarify the distinction between phase and state, mark the critical point in the phase diagram, and develop various real-life examples.

A Framework for Quality Dimensions Measurement of Context Information (상황정보의 품질요소 측정 프레임워크)

  • Kim, Young-Hee;Lee, Keum-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.201-210
    • /
    • 2006
  • This study proposed a framework to clarify a viewpoint of quality problems, and to consider reliance, of context information in ubiquitous computing environments. The framework is structured as a sequence of steps in measuring the quality of context information. The first step in measuring the qualify of context information is to determine users of the context information. This is important because the type of users or applications determines the type of context information and thus the methods of measuring the qualify dimensions and the thresholds for evaluating the quality of context information. The other steps include methods for measuring each quality dimensions to allow quantitative evaluation of quality, establishing acceptable quality targets. We selected accuracy, completeness, up-to-dateness, access security, and representation as quality dimensions and proposed their measurement methods and concrete procedures. We enabled objective evaluation of quality level through proposal of methods suitable to quality measurement of context information.

  • PDF

A Symmetric Key Management Scheme for Mobile Ad Hoc Networks (이동 Ad Hoc 네트워크를 위한 대칭키 관리 기법)

  • 송지은;왕기철;조기환
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.314-316
    • /
    • 2003
  • Ad Hoc 네트워크는 무선의 고유특성으로 인해 여러 가지 보안상 위협에 취약한 면을 지니고 있다. 이러한 위협들의 예로는 무선채널을 통한 엿돋기, 트래픽 모니터링과 같은 수동적인 공격과 악의적인 사용자로부터의 서비스 거부 공격(Denial Of Service), 그리고 신뢰성이 손상된 개체나 도난 당한 장치로부터의 공격등과 같은 능동적인 공격이 있다. 임의의 네트워크 환경에서 이러한 공격에 대한 안전한 통신을 보장하기 위해서 기밀성, 인증, 무결성 그리고 가용성등을 충족시켜야 한다. 이러한 보안상의 요구는 적절한 키 관리 방법을 필요로 한다. 하지만 기존의 방법들은 키의 일치를 위해 과도한 통신 오버헤드. 오랜 지연시간을 요구하거나 안전상 취약점을 노출한다. 본 논문에서는 호스트가 이동하는 상황에서, 빠르게 비밀키를 공유하도록 클러스터 구성을 이용하고 보다 안전한 키 관리를 위해 임계치 암호화 방식을 사용하는 방법을 제안한다. 더불어 제안하는 방법은 프로토콜에서 사용되는 임시키들과 부분키들을 주기적으로 update하여 안전성을 향상 시키며, 호스트들이 이동하는 상황에서도 안전하게 비밀키를 공유하도록 해준다. 따라서 본 논문에서 제안하는 방법은 이동 Ad Hoc 네트워크에서 높은 가용성을 보장하고 보다 안전하게 그룹키나 세션키를 공유하는 방법으로 이용될 수 있다.

  • PDF

A Scheme for Improvement of Positioning Accuracy Based on BSS in Jamming Environments (재밍 환경에서 BSS 기반 측위 정확도 향상 기법)

  • Cha, Gyeong Hyeon;Song, Yu Chan;Hwang, Yu Min;Sang, Lee Jae;Kim, Jin Young;Shin, Yoan
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.4
    • /
    • pp.58-63
    • /
    • 2015
  • Due to GPS signal's vulnerability of jamming attack, various enhancement techniques are needed. Among variety of techniques, we focused on GPS receiver's anti-jamming techniques. There are many anti-jamming methods at GPS receivers which include filtering methods in time domain, frequency domain and space domain. However, these methods are ineffective to signals, which include both jamming and noise. To solve the problem, this paper proposes a jamming separation scheme by using a BSS method in a jamming environment. As separated GPS signals include noise after the jamming separation method, it is difficult to receive accurate GPS signals. For this reason, this paper also proposes a wavelet de-noising method to effectively eliminate noise. Experimental results of this paper are based on a real field test data of an integrated GPS/QZSS/Wi-Fi positioning system. At the end, the simulation result demonstrates its superiority by showing improved positioning accuracy.

The Surface Sidelobe Clutter and the False Alarm Probability of Target Detection for the HPRF Waveform of the Microwave Seeker (마이크로파 탐색기의 HPRF 파형에 대한 지표면 부엽클러터와 표적탐지 오류 확률)

  • Kim, Tae-Hyung;Yi, Jae-Woong;Byun, Young-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4C
    • /
    • pp.476-483
    • /
    • 2009
  • Tracking and detecting targets by the microwave seeker is affected by the clutter reflecting from the earth's surface. In order to detect retreating targets in look-down scenario, which appear in the sidelobe clutter (SLC) region, in the microwave seeker of high pulse repetition frequency (HPRF) mode, it is necessary to understand statistical characteristics of the surface SLC. Statistical analysis of SLC has been conducted for several kinds of the surface using data obtained by the captive flight test of the microwave seeker in the HPRF mode. The probability density function (PDF) fitting is conducted for several kinds and conditions of the surface. PDFs and PDF parameters, which best describe statistical distribution of the SLC power, are estimated. By using the estimated PDFs and PDF parameters, analyses for setting the target-detection thresholds, which give a desired level of target-detection false alarm probability, are made. These analysis materials for statistical characteristics of SLC power and the target-detection threshold can be used in various fields, such as development of a target-detection method, the constant false alarm rate processing.

A Study on Traffic Flow Diagrams to Classify Traffic States of Incident Detection (돌발상황 검지를 위한 교통류 영역 구분에 관한 연구)

  • Kim, Sang-Gu;Kim, Yeong-Chun
    • Journal of Korean Society of Transportation
    • /
    • v.24 no.3 s.89
    • /
    • pp.39-50
    • /
    • 2006
  • This study aims to introduce a basic principle to improve the incident detection algorithm using traffic flow diagrams that can classify traffic states with a high reliability on the basis of the analysis of traffic flow characteristics under the recurrent or incident congestions. It is tried to newly classify the traffic states with the speed-flow and speed-occupancy diagrams. This is because McMaster algorithm has a tendancy on not identifying the traffic states exactly using the flow-occupancy diagram. In this study it shows that the classification of traffic states is applicable to use speed-occupancy relationship Therefore, it is necessary to determine some parameters to correctly classify the areas representing the traffic states and it may be possible to develop a new algorithm to detect the incident with a high reliability.

MXTM-CFAR Processor and Its Performance Analysis (MXTM-CFAR 처리기와 그 성능분석)

  • 김재곤;김응태;송익호;김형명
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.7
    • /
    • pp.719-729
    • /
    • 1992
  • An improved MXTM (maximum trimmed mean) -CFAR (constant false alarm rate) processor is proposed to reduce false alarm rates In detecting radar targets and Its performance character is ticsare analyzed to be compared with those of other CFAR processors. The proposed MXTM-CFAR processor is obtained by combining the GO (greatest of ) -CFAR processor reducing excessive falsealarm rate at riutter edges with the TM-CFAR processor showing good performances In homo-geneous Jnonhornog eneous background. Performance analyses have been done by computing detection probability, constant false alarm rate and detection thresholds under the homogeneous or multiple target environments and at the clutter edges. Analysis results how that the proposed CFAR processor maintains its performance as good as those of,05(order statistics) and TM-CFAR inhomogeneous and multiple target environments and Can reduce the false alarm rate at clutter edges. Overall computing time hfs been also reduced.

  • PDF

Numerical Analysis of Flow near River-Crossing Structure (하천횡단구조물 주변 흐름 수치해석)

  • Kim, Hyung-Jun;Bae, Deok-Won;Ryu, Yong-Uk;Yoon, Kwang-Seok
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2011.05a
    • /
    • pp.175-175
    • /
    • 2011
  • 하천을 횡단하는 구조물은 흐름을 지체시켜 상 하류에 급격한 수위차를 발생시키며, 이에 동반되는 국부유속의 증가는 제방 및 하상을 세굴시킨다. 제방 및 하상 세굴은 하천횡단구조물의 구조적 안정성에 영향을 주어 불안정한 상태에 이르게 할 수 있다. 이와 같은 현상을 방지하기 위하여 하상유지시설 및 제방 보호공 등의 대책을 하천설계기준에 제시하고 있다. 하천설계기준에는 하천횡단구조물 보호시설의 종류, 설치길이 등이 명시되어 있으나, 보호공 제원 선정에 대한 구체적인 설계공식을 제시하지 않아 보완이 필요한 상황이다. 보호공 제원 선정 설계기준은 설계유속을 1차원 단면평균 유속으로 활용하는 국외의 설계공식을 활용할 수 있다. 그러나, 하천횡단구조물 주변의 흐름은 매우 복잡하므로 국외 설계공식을 그대로 적용하기에 앞서서 이에 대한 검토가 필요하다. 본 연구에서는 하천횡단구조물 주변의 흐름을 2차원 수치모형으로 재현하고 그 결과를 1차원 수치모의 결과 및 수리실험 관측결과와 비교하였다. 실험수로에 각기 다른 제원의 보호공을 설치하고 관측한 임계상태의 수리상황을 1, 2차원 수치모형으로 재현하였다. 각각의 모형에서 도출된 수리상황 결과를 비교 분석하여 보호공 제원 결정 공식을 검토하였다. 또한, 실제 하천구간에 임의의 보와 수제를 설치하고, 계획홍수량에서의 흐름특성을 비교하였다. 1, 2차원 모형에 의하여 도출된 관계를 분석함으로써, 하천횡단구조물 설계시 적용할 수 있는 보호공 제원 결정 설계공식을 제안하였다.

  • PDF