• Title/Summary/Keyword: Fault Code

Search Result 123, Processing Time 0.022 seconds

Implementation of DYLAM-3 to Core Uncovery Frequency Estimation in Mid-Loop Operation

  • Kim, Dohyoung;Chang hyun Chung;Moosung Jae
    • Nuclear Engineering and Technology
    • /
    • v.30 no.6
    • /
    • pp.531-540
    • /
    • 1998
  • The DYLAM-3 code which overcomes the limitation of event tree/fault tree was applied to LOOP (Loss of Off-site Power) in the mid-loop operation employing HEPs (Human Error Probabilities) supplied by the ASEP (Accident Sequence Evaluation Program) and the SEPLOT (Systematic Evaluation Procedure for Low power/shutdown Operation Task) procedure in this study. Thus the time history of core uncovery frequency during the mid-loop operation was obtained. The sensitivity calculations in the operator's actions to prevent core uncovery under LOOP in the mid-loop operation were carried out. The analysis using the time dependent HEP was performed on the primary feed & bleed which has the most significant effect on core uncovery frequency. As the result, the increment of frequency is shown after 200 minutes duration of simulation conditions. This signifies the possibility of increment in risk after 200 minutes. The primary feed & bleed showed the greatest impact on core uncovery frequency and the recovery of the SCS (Shutdown Cooling System) showed the least impact. Therefore the efforts should be taken on the primary feed & bleed to reduce the core uncovery frequency in the mid-loop operation. And the capability of DYLAM-3 in applying to the time dependent concerns could be demonstrated.

  • PDF

Design Enhancements of Automatic Depressurization System in a Passive PWR (피동형 경수로 자동감압계통의 개선에 관한 연구)

  • Yu, Sung-Sik;Seong, Poong-Hyun
    • Nuclear Engineering and Technology
    • /
    • v.25 no.4
    • /
    • pp.515-528
    • /
    • 1993
  • In a Passive PWR, the successful actuation of Automatic Depressurization System (ADS) is essentially required so that no core damage is occurred following small LOCA. But it has been shown in the previous studies that Core Damage Frequency (CDF) from small LOCA is significantly caused by unavailability of ADS. In this study, the design vulnerabilities impacting the ADS unavailability have been identified and the design improvement items have been proposed through the system reliability assessment using the fault tree methodology The impacts on CDF according to the change of system unavailability have also been analyzed. In addition, small LOCA simulation using RELAP5/MOD3 code has been performed to show the thermal-hydraulic feasibility of the suggested design enhancements.

  • PDF

Analysis of Diagnosis Algorithm Implemented in TCU for High-Speed Tracked Vehicles (고속 무한궤도 차량용 변속제어기 진단 알고리즘 분석)

  • Jung, Gyuhong
    • Journal of Drive and Control
    • /
    • v.15 no.4
    • /
    • pp.30-38
    • /
    • 2018
  • Electronic control units (ECUs) are currently popular, and have evolved further towards the high-end application of autonomous vehicles in the automotive industry. Such digital technologies have also become widespread, in agriculture and construction equipment. Likewise, transmission control of high-speed tracked vehicles is based on the transmission control unit (TCU), performing complex gear change control functions, and diagnostic algorithms (a TCU's self-diagnostic and reporting capability of malfunction data through CAN communication). Since all functions of TCU are implemented by embedded-software, it is hardly possible to analyze specifications by reverse engineering. In this paper a real-time transmission simulator adaptable to TCU is presented, for analysis of diagnosis algorithm and standards. Signal simulation circuits are deliberately designed considering electrical characteristics of TCU inputs and various analysis tools, such as analog input auto scan function, and global output enable switch, are implemented in software. Test results from hardware-in-the-loop simulator verify tolerance time for each error, as well as cause of fault, error reset conditions.

Characteristics of Tsunami Propagation through the Korean Straits and Statistical Description of Tsunami Wave Height (대한해협에서의 지진해일 전파특성과 지진해일고의 확률적 기술)

  • Cho, Yong-Jun;Lee, Jae-Il
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.18 no.4
    • /
    • pp.269-282
    • /
    • 2006
  • We numerically studied tsunami propagation characteristics through Korean Straits based on nonlinear shallow water equation, a robust wave driver of the near field tsunamis. Tsunamis are presumed to be generated by the earthquake in Tsuhima-Koto fault line. The magnitude of earthquake is chosen to be 7.5 on Richter scale, which corresponds to most plausible one around Korean peninsula. It turns out that it takes only 60 minutes for leading waves to cross Korean straits, which supports recently raised concerns at warning system might be malfunctioned due to the lack of evacuation time. We also numerically obtained the probability of tsunami inundation of various levels, usually referred as tsunami hazard, along southern coastal area of Korean Peninsula based on simple seismological and Kajiura (1963)'s hydrodynamic model due to tsunami-generative earthquake in Tsuhima-Koto fault line. Using observed data at Akita and Fukaura during Okushiri tsunami in 1993, we verified probabilistic model of tsunami height proposed in this study. We believe this inundation probability of various levels to give valuable information for the amendment of current building code of coastal disaster prevention system to tame tsunami attack.

Worst Case Response Time Analysis for Demand Paging on Flash Memory (플래시 메모리를 사용하는 demand paging 환경에서의 태스크 최악 응답 시간 분석)

  • Lee, Young-Ho;Lim, Sung-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.113-123
    • /
    • 2006
  • Flash memory has been increasingly used in handhold devices not only for data storage, but also for code storage. Because NAND flash memory only provides sequential access feature, a traditionally accepted solution to execute the program from NAND flash memory is shadowing. But, shadowing has significant drawbacks increasing a booting time of the system and consuming severe DRAM space. Demand paging has obtained significant attention for program execution from NAND flash memory. But. one of the issues is that there has been no effort to bound demand paging cost in flash memory and to analyze the worst case performance of demand paging. For the worst case timing analysis of programs running from NAND flash memory. the worst case demand paging costs should be estimated. In this paper, we propose two different WCRT analysis methods considering demand paging costs, DP-Pessimistic and DP-Accurate, depending on the accuracy and the complexity of analysis. Also, we compare the accuracy butween DP-Pessimistic and DP-Accurate by using the simulation.

  • PDF

A comparison of three performance-based seismic design methods for plane steel braced frames

  • Kalapodis, Nicos A.;Papagiannopoulos, George A.;Beskos, Dimitri E.
    • Earthquakes and Structures
    • /
    • v.18 no.1
    • /
    • pp.27-44
    • /
    • 2020
  • This work presents a comparison of three performance-based seismic design methods (PBSD) as applied to plane steel frames having eccentric braces (EBFs) and buckling restrained braces (BRBFs). The first method uses equivalent modal damping ratios (ξk), referring to an equivalent multi-degree-of-freedom (MDOF) linear system, which retains the mass, the elastic stiffness and responds in the same way as the original non-linear MDOF system. The second method employs modal strength reduction factors (${\bar{q}}_k$) resulting from the corresponding modal damping ratios. Contrary to the behavior factors of code based design methods, both ξk and ${\bar{q}}_k$ account for the first few modes of significance and incorporate target deformation metrics like inter-storey drift ratio (IDR) and local ductility as well as structural characteristics like structural natural period, and soil types. Explicit empirical expressions of ξk and ${\bar{q}}_k$, recently presented by the present authors elsewhere, are also provided here for reasons of completeness and easy reference. The third method, developed here by the authors, is based on a hybrid force/displacement (HFD) seismic design scheme, since it combines the force-base design (FBD) method with the displacement-based design (DBD) method. According to this method, seismic design is accomplished by using a behavior factor (qh), empirically expressed in terms of the global ductility of the frame, which takes into account both non-structural and structural deformation metrics. These expressions for qh are obtained through extensive parametric studies involving non-linear dynamic analysis (NLDA) of 98 frames, subjected to 100 far-fault ground motions that correspond to four soil types of Eurocode 8. Furthermore, these factors can be used in conjunction with an elastic acceleration design spectrum for seismic design purposes. Finally, a comparison among the above three seismic design methods and the Eurocode 8 method is conducted with the aid of non-linear dynamic analyses via representative numerical examples, involving plane steel EBFs and BRBFs.

Connector for Dynamic Composition of Aspects Based on AOSD (AOSD기반에서 Aspect의 동적결합을 위한 Connector)

  • Kim Tae-Woong;Kim Tae-Gong
    • The KIPS Transactions:PartD
    • /
    • v.13D no.2 s.105
    • /
    • pp.251-258
    • /
    • 2006
  • Aspect-Oriented Software Development is new software development method. It has many advantages related to software performance, maintenance and repair. Also it offers modularization method to a existing programming language for secondary function such as security and fault tolerance. But the present problem is that we have to use new aspect-oriented programming language. Further more when we apply Aspect to legacy system, we have to recompile the source code in order to build software system based on AOSD. In this paper, we propose and design Connector that can be composed with Aspect in legacy system dynamically. To elaborate this work, we use the information of operations about Core and Aspect, and the information of pointcut described with XML. We validate that the proposed Connector has features such as no need of new compiler, no recompilation and no modification of legacy system through case study.

INHERENT SAFETY ANALYSIS OF THE KALIMER UNDER A LOFA WITH A REDUCED PRIMARY PUMP HALVING TIME

  • Chang, W.P.;Kwon, Y.M.;Jeong, H.Y.;Suk, S.D.;Lee, Y.B.
    • Nuclear Engineering and Technology
    • /
    • v.43 no.1
    • /
    • pp.63-74
    • /
    • 2011
  • The 600 MWe, pool-type, sodium-cooled, metallic fuel loaded KALIMER-600 (Korea Advanced LiquId MEtal Reactor, 600 MWe) has been conceptually designed with an emphasis on safety by self-regulating (inherent/intrinsic) negative reactivity feedback in the core. Its inherent safety under the ATWS (Anticipated Transient Without Scram) events was demonstrated in an earlier study. Initiating events of an HCDA (Hypothetical Core Disruptive Accident), however, also need to be analyzed for assessment of the margins in the current design. In this study, a hypothetical triple-fault accident, ULOF (Unprotected Loss Of Flow) with a reduced pump halving time, is investigated as an initiator of a core disruptive accident. A ULOF with insufficient primary pump inertia may cause core sodium boiling due to a power-to-flow mismatch. If the positive sodium reactivity resulting from this boiling is not compensated for by other intrinsic negative reactivity feedbacks, the resulting core power burst would challenge the fuel integrity. The present study focuses on determination of the limit of the pump inertia for assuring inherent reactivity feedback and behavior of the core after sodium boiling as well. Transient analyses are performed with the safety analysis code SSC-K, which now incorporates a new sodium boiling model. The results show that a halving time of more than 6.0 s does not allow sodium boiling even with very conservative assumptions. Boiling takes place for a halving time of 1.8 s, and its behavior can be predicted reasonably by the SSC-K.

Abnormal System Operation Detection by Comparing QR Code-Encoded Power Consumption Patterns in Software Execution Control Flow (QR 코드로 인코딩된 소프트웨어 실행 제어 흐름 전력 소비 패턴 기반 시스템 이상 동작 감지)

  • Kang, Myeong-jin;Park, Daejin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.11
    • /
    • pp.1581-1587
    • /
    • 2021
  • As embedded system are used widely and variously, multi-edge system, which multiple edges gather and perform complex operations together, is actively operating. In a multi-edge system, it often occurs that an abnormal operation at one edge is transferred to another edge or the entire system goes down. It is necessary to determine and control edge anomalies in order to prevent system down, but this can be a heavy burden on the resource-limited edge. As a solution to this, we use power consumption data to check the state of the edge device and transmit it based on a QRcode to check and control errors at the server. The architecture proposed in this paper is implemented using 'chip-whisperer' to measure the power consumption of the edge and 'Raspberry Pi 3' to implement the server. As a result, the proposed architecture server showed successful data transmission and error determination without additional load appearing at the edge.

A Study on Similarity Analysis of SNMP MIB File (SNMP MIB 파일의 유사도 분석에 관한 연구)

  • Chun, Byung-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.37-42
    • /
    • 2019
  • Many similarity analysis methods, one of the dispute resolution methods for computer programs, have been studied. This paper is about quantitative similarity analysis of MIB (Management Information Base) file. Quantitative similarity means that the source codes of two computers are analyzed and the results are compared with a certain standard. The source code to analyze is a program that provides network device management functions such as configuration management, fault management, and performance management using SNMP protocol for WiMAX CPE devices. Here, WiMAX refers to the IEEE 802.16 wireless network standard protocol and can be classified into fixed WiMAX and mobile WiMAX. WiMAX CPE is a wireless Internet terminal that is fixedly used in a customer's home or office. In this paper, we analyze the similarity between MIB file of company A and company B. We will analyze whether the MIB file leaked from the damaged company is not just a list to describe the product specifications, but whether the property value can be recognized.