• Title/Summary/Keyword: Event sequence

Search Result 213, Processing Time 0.026 seconds

COMPARATIVE ANALYSIS OF STATION BLACKOUT ACCIDENT PROGRESSION IN TYPICAL PWR, BWR, AND PHWR

  • Park, Soo-Yong;Ahn, Kwang-Il
    • Nuclear Engineering and Technology
    • /
    • v.44 no.3
    • /
    • pp.311-322
    • /
    • 2012
  • Since the crisis at the Fukushima plants, severe accident progression during a station blackout accident in nuclear power plants is recognized as a very important area for accident management and emergency planning. The purpose of this study is to investigate the comparative characteristics of anticipated severe accident progression among the three typical types of nuclear reactors. A station blackout scenario, where all off-site power is lost and the diesel generators fail, is simulated as an initiating event of a severe accident sequence. In this study a comparative analysis was performed for typical pressurized water reactor (PWR), boiling water reactor (BWR), and pressurized heavy water reactor (PHWR). The study includes the summarization of design differences that would impact severe accident progressions, thermal hydraulic/severe accident phenomenological analysis during a station blackout initiated-severe accident; and an investigation of the core damage process, both within the reactor vessel before it fails and in the containment afterwards, and the resultant impact on the containment.

Enhancement of SCTP Throughput using Chunk Checksum

  • Lin Cui;Koh Seok J.;Hong Yong-Geun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1147-1150
    • /
    • 2006
  • Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted SCTP packet will be regarded as a lost packet and then discarded. This may result in degradation of SCTP's throughput performance over wireless networks. This paper proposes a new chunk checksum scheme for SCTP, in which each data chunk contains its own checksum field and SACK chunk carry corresponding Transmission Sequence Number (TSN) with timestamp for every corruption event. The proposed chunk checksum scheme is introduced with the following three purposes: 1) to distinguish the chunk corruptions from the chunk losses; 2) to avoid the unnecessary halving of the congestion window (cwnd) in the case of chunk corruption; 3) to avoid the unwanted timeouts which can be induced in conventional SCTP in the case that the retransmitted data chunks are corrupted again in wireless networks. Simulation results show that the proposed chunk checksum scheme could improve the SCTP throughput in the wireless environments with a high bit error rate.

  • PDF

A 40 Gb/s Clock and Data Recovery Module with Improved Phase-Locked Loop Circuits

  • Park, Hyun;Kim, Kang-Wook;Lim, Sang-Kyu;Ko, Je-Soo
    • ETRI Journal
    • /
    • v.30 no.2
    • /
    • pp.275-281
    • /
    • 2008
  • A 40 Gb/s clock and data recovery (CDR) module for a fiber-optic receiver with improved phase-locked loop (PLL) circuits has been successfully implemented. The PLL of the CDR module employs an improved D-type flip-flop frequency acquisition circuit, which helps to stabilize the CDR performance, to obtain faster frequency acquisition, and to reduce the time of recovering the lock state in the event of losing the lock state. The measured RMS jitter of the clock signal recovered from 40 Gb/s pseudo-random binary sequence ($2^{31}-1$) data by the improved PLL clock recovery module is 210 fs. The CDR module also integrates a 40 Gb/s D-FF decision circuit, demonstrating that it can produce clean retimed data using the recovered clock.

  • PDF

A Situation Semantic Account of English Embedded Tense (상황의미론에 기초한 영어 내포 시제 연구: 태도문을 중심으로)

  • 조영순
    • Language and Information
    • /
    • v.4 no.2
    • /
    • pp.27-40
    • /
    • 2000
  • The purpose of this paper is to propose a way of analyzing English embedded tense in terms of temporal per- spective time. To this end, the notion of temporal perspective time and Cooper and Ginzburg's(1996) attitude account are employed. Temporal perspective time is used to define the tense and to capture the anaphoric property of embedded tense,: the embedded temporal perspective time draws the embedding event time by anaphora. The ambiguity in the sequence of tense construction is described in terms of the attitude tense constraint reflecting the anaphoric property and two definitions of the past tense. The double access property in the present-under-past construction is described in terms of the constraint, the notion of eventuality, and the situation theoretic existential quantifier.

  • PDF

국내 원전 발전정지사례 분석정보 시스템 개발

  • 이정운;박근옥
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.04a
    • /
    • pp.658-661
    • /
    • 1996
  • Information that can be obtained from nuclear power plant trip cases is important for the efforts to reduce the trip occurrences. However, trip case reports, generally printed in documents, have shortcomings in using the contents. A database system called Information System of Trip Event Cases (INSTEC) is being developed to improve the use of trip information. INSTEC will provide the information obtained from the analysis of Korean nuclear power plant trips, such as component failures or human errors that induced the trips, problems contributed to the trips, and the sequence of unit events. In this study, in the process of INSTEC development, information analysis has been performed and a prototype of the system was developed. The prototype of INSTEC with user interface was presented to plant personnel to collect their opinion on INSTEC by using a questioninnaire. As results, it is confirmed that INSTEC would be helpful and useful for plant personnel to review the trip case information.

  • PDF

A Study on Flame and Smoke Detection Method of a Tunnel Fire (터널 화재의 화염 및 연기 검출 기법 연구)

  • Lee, Jeong-Hun;Lee, Byoung-Moo;Han, Dong-Il
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.1027-1028
    • /
    • 2008
  • In this paper, we proposed image-processing technique for automatic real-time fire and smoke detection in tunnel fire environment. To minimize false detection of fire in tunnel we used motion information of video sequence. And this makes it possible to detect exact position of event in early stage with detection, test, and verification procedures. In addition, by comparing false detection elimination results of each step, we have proved the validity and efficiency of proposed algorithm.

  • PDF

A Macro Parametric Data Representation far CAD Model Exchange using XML (CAD 모델 교환을 위한 매크로 파라메트릭 정보의 XML 표현)

  • 양정삼;한순흥;김병철;박찬국
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.27 no.12
    • /
    • pp.2061-2071
    • /
    • 2003
  • The macro-parametric approach, which is a method of CAD model exchange, has recently been proposed. CAD models can be exchanged in the form of a macro file, which is a sequence of modeling commands. As an event-driven commands set, the standard macro file can transfer design intents such as parameters, features and constraints. Moreover it is suitable for the network environment because the standard macro commands are open, explicit, and the data size is small. This paper introduces the concept of the macro-parametric method and proposes its representation using XML technology. Representing the macro-parametric data using XML allows managing vast amount of dynamic contents, Web-enabled distributed applications, and inherent characteristic of structure and validation.

Introduction to Coagulation System (혈액응고 기전에 대한 고찰)

  • Lyu, Chuhl-Joo
    • Neonatal Medicine
    • /
    • v.18 no.1
    • /
    • pp.1-5
    • /
    • 2011
  • Coagulation involves the regulated sequence of proteolytic activation of a series of proteins to achieve appropriate and timely hemostasis in an injured vessel. In the non-pathological state, the inciting event involves exposure of circulating factor VIIa to extravascularly expressed tissue factor, which brings into motion the series of steps which results in cell based model of coagulation. In the new concepts of coagulation system, initiation, amplification and propagation steps are involved to converse of fibrinogen to fibrin. The precisely synchronized cascade of events is counter-balanced by a system of anticoagulant mechanisms. Developmental hemostasis refers to the age-related changes in the coagulation system that are most marked during neonate and childhood. An understanding of these changes in crucial to the accurate diagnosis of hemostatic abnormalities in neonate and children. This review aims to elucidate the main events within the coagulation cascade as it is currently understood to operate in vivo, and also a short review of the anticoagulants as they relate to this model. Also this paper describes the common pitfalls observed in the clinical data related to the coagulation system in neonate to children.

A GTS-based Sensor Data Gathering under a Powerful Beam Structure (파워 빔 구조에서 GTS 기반 센서 데이터 수집 방안)

  • Lee, Kil Hung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.39-45
    • /
    • 2014
  • This paper proposes an architecture of a sensor network for gathering data under a powerful beam cluster tree architecture. This architecture is used when there is a need to gather data from sensor node where there is no sink node connected to an existing network, or it is required to get a series of data specific to an event or time. The transmit distance of the beam signal is longer than that of the usual sensor node. The nodes of the network make a tree network when receiving a beam message transmitting from the powerful root node. All sensor nodes in a sink tree network synchronize to the superframe and know exactly the sequence value of the current superframe. When there is data to send to the sink node, the sensor node sends data at the corresponding allocated channel. Data sending schemes under the guaranteed time slot are tested and the delay and jitter performance is explained.

Reconfiguration method for Supervisor Control in Deadlock status Using FSSTP(Forbidden Sequence of State Transition Problem) (순차상태전이금지(FSSTP)를 이용한 교착상태 관리제어를 위한 재구성 방법)

  • Song, Yu-Jin;Lee, Eun-Joo;Lee, Jong-Kun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.3
    • /
    • pp.213-220
    • /
    • 2008
  • The object of this paper is to propose a method to deal with the problem of modeling user specifications in approaches based on supervisory control and Petri nets. However, most of Petri Net approaches are based on forbidden states specifications, and these specifications are suitable the use of tool such as the reachability graph. But these methods were not able to show the user specification easily and these formalisms are generally limited by the combinatorial explosion that occurs when attempting to model complex systems. Herein, we propose a new efficient method using FSSTP (Forbidden Sequences of State-Transitions Problem) and theory of region. Also, to detect and avoid the deadlock problem in control process, we use DAPN method (Deadlock Avoidance Petri nets) for solving this problem in control model.