• Title/Summary/Keyword: Firewall

Search Result 373, Processing Time 0.026 seconds

Modeling and analysis of dynamic heat transfer in the cable penetration fire stop system by using a new hybrid algorithm (새로운 혼합알고리즘을 이용한 CPFS 내에서의 일어나는 동적 열전달의 수식화 및 해석)

  • Yoon En Sup;Yun Jongpil;Kwon Seong-Pil
    • Journal of the Korean Institute of Gas
    • /
    • v.7 no.4 s.21
    • /
    • pp.44-52
    • /
    • 2003
  • In this work dynamic heat transfer in a CPFS (cable penetration fire stop) system built in the firewall of nuclear power plants is three-dimensionally investigated to develop a test-simulator that can be used to verify effectiveness of the sealant. Dynamic heat transfer in the fire stop system is formulated in a parabolic PDE (partial differential equation) subjected to a set of initial and boundary conditions. First, the PDE model is divided into two parts; one corresponding to heat transfer in the axial direction and the other corresponding to heat transfer on the vertical planes. The first PDE is converted to a series of ODEs (ordinary differential equations) at finite discrete axial points for applying the numerical method of SOR (successive over-relaxation) to the problem. The ODEs are solved by using an ODE solver In such manner, the axial heat flux can be calculated at least at the finite discrete points. After that, all the planes are separated into finite elements, where the time and spatial functions are assumed to be of orthogonal collocation state at each element. The initial condition of each finite element can be obtained from the above solution. The heat fluxes on the vertical planes are calculated by the Galerkin FEM (finite element method). The CPFS system was modeled, simulated, and analyzed here. The simulation results were illustrated in three-dimensional graphics. Through simulation, it was shown clearly that the temperature distribution was influenced very much by the number, position, and temperature of the cable stream, and that dynamic heat transfer through the cable stream was one of the most dominant factors, and that the feature of heat conduction could be understood as an unsteady-state process.

  • PDF

Method for evaluating the safety performance and protection ability of the mobile steel protective wall during the high-explosive ammunition test (고폭탄 탄약시험 간 이동형 강재 방호벽의 안전성능 판단 및 유효 방호력 평가 방법)

  • Jeon, In-Beom
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.573-582
    • /
    • 2021
  • In this study, a series of processes for evaluating the effective protection against barriers that should be equipped in institutions that perform reliability tests on high-risk ammunition, such as high-explosive ammunition, were introduced. The impact that high-explosive bombs can have on personnel includes damage to the eardrum and lungs caused by explosion overpressure and penetrating wounds that can be received by fragments generated simultaneously with the explosion. Therefore, a high-explosive with COMP B explosives as its contents were set up, and an explosion protection theory investigation to calculate the degree of damage, numerical calculations and simulations were performed to verify the protection power. A numerical calculation revealed the maximum explosion overpressure on the protective wall when the high-explosive exploded and the penetration force of the fragment against a 50 mm-thick protective wall to be 77.74 kPa and 41.34 mm, respectively. In the simulation verification using AUTODYN, the maximum explosion overpressures affecting the firewall and personnel were 56.68 kPa and 18.175 kPa, respectively, and the penetration of fragments was 35.56 mm. This figure is lower than the human damage limit, and it was judged that the protective power of the barrier would be effective.

A Study on the Quality Model and Metrics for Evaluating the Quality of Information Security Products (정보보호제품 품질평가를 위한 품질 모델 및 메트릭에 관한 연구)

  • Yun, Yeo-Wung;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.131-142
    • /
    • 2009
  • While users of information security products require high-quality products that are secure and have high performance, there are neither examples for evaluating the quality of information security products nor studies on the quality model and metrics for the quality evaluation. In this paper, information security products are categorized into three different types and the security and performance of various information security products are analyzed. Through this process and after consideration of information security products' security and performance, a new quality model that possesses 7 characteristics and 24 sub-characteristics has been defined. In addition, metrics consisting of 62 common and 45 extended metrics that can be used to evaluate the quality of information security products are introduced, and a proposition for a method of generating the quality evaluation metrics for specific information security products is included. The method of generating metrics proposed in this paper can be extended in order to be applied to a variety of information security products, and by generating and verifying the quality evaluation metrics for firewall, intrusion detection systems and fingerprint systems it is shown that it applicable on a variety of information security products.