• Title/Summary/Keyword: Leakage scenarios

Search Result 83, Processing Time 0.026 seconds

Numerical evaluation of buried composite and steel pipe structures under the effects of gravity

  • Toh, William;Tan, Long Bin;Tse, Kwong Ming;Raju, Karthikayen;Lee, Heow Pueh;Tan, Vincent Beng Chye
    • Steel and Composite Structures
    • /
    • v.26 no.1
    • /
    • pp.55-66
    • /
    • 2018
  • In this paper, the response of an underground fibreglass reinforced plastic (FRP) composite pipe system subjected to realistic loading scenarios that may be experienced by an actual buried pipeline is investigated. The model replicates an arbitrary site with a length of buried pipeline, passing through a $90^{\circ}$ bend and into a valve pit. Various loading conditions, which include effects of pipe pressurization, differences in response between stainless steel and fibreglass composite pipes and severe loss of bed-soil support are studied. In addition to pipe response, the resulting soil stresses and ground settlement are also analysed. Furthermore, the locations of potential leakage and burst have also been identified by evaluating the contact pressures at the joints and by comparing stresses to the pipe hoop and axial failure strengths.

An Integrated On-Line Diagnostic System for the NORS Process of Maiden Reactor Project: The Design Concept and Lessons Learned

  • Kim, Inn-Seock
    • Nuclear Engineering and Technology
    • /
    • v.32 no.3
    • /
    • pp.261-273
    • /
    • 2000
  • During an extensive review made as part of the Integrated Diagnosis System project of the Maiden Reactor Project, MOAS (Maryland Operator Advisory System) was identified as one of the most thorough systems developed thus far. MOAS is an integrated on-line diagnosis system that encompasses diverse functional aspects that are required for an effective process disturbance management: (1) intelligent process monitoring and alarming, (2) on-line sensor data validation and sensor failure diagnosis, (3) on-line hardware (besides sensors) failure diagnosis, and (4) real-time corrective measure synthesis. The MOAS methodology was used at the Maiden Man-Machine Laboratory HAMMLAB of the OECD Maiden Reactor Project. The performance of MOAS, developed in G2 real-time expert system shell for the high-pressure preheaters of the NORS process in the HAMMLAB, was tested against a variety of transient scenarios, including failures of the control valves and sensors, and tube leakage of the preheaters. These tests showed that MOAS successfully carried out its intended functions, i.e., quickly recognizing an occurring disturbance, correctly diagnosing its cause, and presenting advice on its control to the operator. The lessons learned and insights gained during the implementation and performance tests also are discussed.

  • PDF

Iris Ciphertext Authentication System Based on Fully Homomorphic Encryption

  • Song, Xinxia;Chen, Zhigang;Sun, Dechao
    • Journal of Information Processing Systems
    • /
    • v.16 no.3
    • /
    • pp.599-611
    • /
    • 2020
  • With the application and promotion of biometric technology, biometrics has become more and more important to identity authentication. In order to ensure the privacy of the user, the biometrics cannot be stored or manipulated in plaintext. Aiming at this problem, this paper analyzes and summarizes the scheme and performance of the existing biometric authentication system, and proposes an iris-based ciphertext authentication system based on fully homomorphic encryption using the FV scheme. The implementation of the system is partly powered by Microsoft's SEAL (Simple Encrypted Arithmetic Library). The entire system can complete iris authentication without decrypting the iris feature template, and the database stores the homomorphic ciphertext of the iris feature template. Thus, there is no need to worry about the leakage of the iris feature template. At the same time, the system does not require a trusted center for authentication, and the authentication is completed on the server side directly using the one-time MAC authentication method. Tests have shown that when the system adopts an iris algorithm with a low depth of calculation circuit such as the Hamming distance comparison algorithm, it has good performance, which basically meets the requirements of real application scenarios.

Safety Analysis of Potential Hazards at Hydrogen Refueling Station (수소충전소 잠재적 위험에 대한 안전성해석)

  • Park, Woo-Il;Kim, Dong-Hwan;Kang, Seung-Kyu
    • Journal of the Korean Institute of Gas
    • /
    • v.25 no.4
    • /
    • pp.43-48
    • /
    • 2021
  • This study was conducted using FLACS, a specialized gas accident analysis program. Hydrogen refueling stations subject of safety analysis, consist of compression facilities, storage tanks, and hydrogen piping. The safety analysis of potential risk factors was conducted after reflecting the design specifications of major facilities and components, environmental conditions around hydrogen refueling stations, etc. As of 2021, about 70 refueling stations in Korea are available, and 1,200 are scheduled to be introduced in the next 2040. To prepare for possible accidents caused by potential hazards for the safe distribution of hydrogen refueling stations, we intend to derive hydrogen leakage diffusion scenarios and review their safety.

Zero-Knowledge Realization of Software-Defined Gateway in Fog Computing

  • Lin, Te-Yuan;Fuh, Chiou-Shann
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5654-5668
    • /
    • 2018
  • Driven by security and real-time demands of Internet of Things (IoT), the timing of fog computing and edge computing have gradually come into place. Gateways bear more nearby computing, storage, analysis and as an intelligent broker of the whole computing lifecycle in between local devices and the remote cloud. In fog computing, the edge broker requires X-aware capabilities that combines software programmability, stream processing, hardware optimization and various connectivity to deal with such as security, data abstraction, network latency, service classification and workload allocation strategy. The prosperous of Field Programmable Gate Array (FPGA) pushes the possibility of gateway capabilities further landed. In this paper, we propose a software-defined gateway (SDG) scheme for fog computing paradigm termed as Fog Computing Zero-Knowledge Gateway that strengthens data protection and resilience merits designed for industrial internet of things or highly privacy concerned hybrid cloud scenarios. It is a proxy for fog nodes and able to integrate with existing commodity gateways. The contribution is that it converts Privacy-Enhancing Technologies rules into provable statements without knowing original sensitive data and guarantees privacy rules applied to the sensitive data before being propagated while preventing potential leakage threats. Some logical functions can be offloaded to any programmable micro-controller embedded to achieve higher computing efficiency.

Examination on Autonomous Recovery Algorithm of Piping System (배관 체계 자율 복구 알고리즘 비교, 분석 및 고찰)

  • Yang, Dae Won;Lee, Jeung-hoon;Shin, Yun-Ho
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.4
    • /
    • pp.1-11
    • /
    • 2021
  • Piping systems comprising pumps and valves are essential in the power plant, oil, and defense industry. Their purpose includes a stable supply of the working fluid or ensuring the target system's safe operation. However, piping system accidents due to leakage of toxic substances, explosions, and natural disasters are prevalent In addition, with the limited maintenance personnel, it becomes difficult to detect, isolate, and reconfigure the damage of the piping system and recover the unaffected area. An autonomous recovery piping system can play a vital role under such circumstances. The autonomous recovery algorithms for the piping system can be divided into low-pressure control algorithms, hydraulic resistance control algorithms, and flow inventory control algorithms. All three methods include autonomous opening/closing logic to isolate damaged areas and recovery the unaffected area of piping systems. However, because each algorithm has its strength and weakness, appropriate application considering the overall design, vital components, and operating conditions is crucial. In this regard, preliminary research on algorithm's working principle, its design procedures, and expected damage scenarios should be accomplished. This study examines the characteristics of algorithms, the design procedure, and working logic. Advantages and disadvantages are also analyzed through simulation results for a simplified piping system.

A Study on a Method for Detecting Leak Holes in Respirators Using IoT Sensors

  • Woochang Shin
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.378-385
    • /
    • 2023
  • The importance of wearing respiratory protective equipment has been highlighted even more during the COVID-19 pandemic. Even if the suitability of respiratory protection has been confirmed through testing in a laboratory environment, there remains the potential for leakage points in the respirators due to improper application by the wearer, damage to the equipment, or sudden movements in real working conditions. In this paper, we propose a method to detect the occurrence of leak holes by measuring the pressure changes inside the mask according to the wearer's breathing activity by attaching an IoT sensor to a full-face respirator. We designed 9 experimental scenarios by adjusting the degree of leak holes of the respirator and the breathing cycle time, and acquired respiratory data for the wearer of the respirator accordingly. Additionally, we analyzed the respiratory data to identify the duration and pressure change range for each breath, utilizing this data to train a neural network model for detecting leak holes in the respirator. The experimental results applying the developed neural network model showed a sensitivity of 100%, specificity of 94.29%, and accuracy of 97.53%. We conclude that the effective detection of leak holes can be achieved by incorporating affordable, small-sized IoT sensors into respiratory protective equipment.

Toxic Concentration(T-LOC) Endpoint Distance Study for Fire Brigade Protection in Response to Chemical Accidents (화학사고 초기대응 소방대 보호를 위한 독성농도(T-LOC) 끝점거리 연구)

  • Jong Chan Yun;Chul Hee Cho;Jeong Hun Won
    • Journal of the Korean Society of Safety
    • /
    • v.38 no.6
    • /
    • pp.60-71
    • /
    • 2023
  • The purpose of this study is to propose a quantitative toxicity endpoint distance suitable for the initial response of firefighters by comparing and analyzing the commonly applied toxic level of concern (T-LOC), specifically emergency response planning guidelines (ERPG), acute exposure guideline levels (AEGL), and immediately dangerous to life or health (IDLH). This is to protect the fire brigade, which responds to toxic chemical accidents first during the golden time. Using areal locations of hazardous atmospheres, a damage prediction program, the amount of leakage for both acidic and basic substances, along with the endpoint distance, were analyzed for alternative accident and worst-case accident scenarios. The results showed that the toxicity endpoint distance, serving as a compromise between Level-3 and Level-2 of T-LOC, was longer than ERPG-3 and shorter than ERPG-2 with IDLH, while its values were analyzed in the order of ERPG-2, AEGL-2, IDLH, AEGL-3, and ERPG-3. It is suggested that the application of IDLH in an emergency (red card) and ERPG-2 endpoint distance in a non-emergency (non-red card) can be utilized for the initial response of the fire brigade.

Multi-batch core design study for innovative small modular reactor based on centrally-shielded burnable absorber

  • Steven Wijaya;Xuan Ha Nguyen;Yunseok Jeong;Yonghee Kim
    • Nuclear Engineering and Technology
    • /
    • v.56 no.3
    • /
    • pp.907-915
    • /
    • 2024
  • Various core designs with multi-batch fuel management (FM) are proposed and optimized for an innovative small modular reactor (iSMR), focusing on enhancing the inherent safety and neutronic performance. To achieve soluble-boron-free (SBF) operation, cylindrical centrally-shielded burnable absorbers (CSBAs) are utilized, reducing the burnup reactivity swing in both two- and three-batch FMs. All 69 fuel assemblies (FAs) are loaded with 2-cylindrical CSBA. Furthermore, the neutron economy is improved by deploying a truly-optimized PWR (TOP) lattice with a smaller fuel radius, optimized for neutron moderation under the SBF condition. The fuel shuffling and CSBA loading patterns are proposed for both 2- and 3-batch FM with the aim to lower the core leakage and achieve favorable power profiles. Numerical results show that both FM configurations achieve a small reactivity swing of about 1000 pcm and the power distributions are within the design criteria. The average discharge burnup in the two-batch core is comparable to three-batch commercial PWR like APR-1400. The proposed checker-board CR pattern with extended fingers effectively assures cold shutdown in the two-batch FM scenario, while in the three-batch FM, three N-1 scenarios are failed. The whole evaluation process is conducted using Monte Carlo Serpent 2 code in conjunction with ENDF/B-VII.1 nuclear library.

Swelling and hydraulic characteristics of two grade bentonites under varying conditions for low-level radioactive waste repository design

  • Chih-Chung Chung;Guo-Liang Ren;I-Ting Chen;Che-Ju, Cuo;Hao-Chun Chang
    • Nuclear Engineering and Technology
    • /
    • v.56 no.4
    • /
    • pp.1385-1397
    • /
    • 2024
  • Bentonite is a recommended material for the multiple barriers in the final disposal of low-level radioactive waste (LLW) to prevent groundwater intrusion and nuclear species migration. However, after drying-wetting cycling during the repository construction stage and ion exchange with the concrete barrier in the long-term repository, the bentonite mechanical behaviors, including swelling capacity and hydraulic conductivity, would be further influenced by the groundwater intrusion, resulting in radioactive leakage. To comprehensively examine the factors on the mechanical characteristics of bentonite, this study presented scenarios involving MX-80 and KV-1 bentonites subjected to drying-wetting cycling and accelerated ion migration. The experiments subsequently measured free swelling, swelling pressure, and hydraulic conductivity of bentonites with intrusions of seawater, high pH, and low pH solutions. The results indicated that the solutions caused a reduction in swelling volume and pressure, and an increase in hydraulic conductivity. Specifically, the swelling capability of bentonite with drying-wetting cycling in the seawater decreased significantly by 60%, while hydraulic conductivity increased by more than three times. Therefore, the study suggested minimizing drying-wetting cycling and preventing seawater intrusion, ensuring a long service life of the multiple barriers in the LLW repository.