• Title/Summary/Keyword: Logic Tree

Search Result 130, Processing Time 0.027 seconds

Safety Assessments for the IS(Iodine Sulfur) Process in a Hydrogen Production Facility (수소생산시설에서의 요오드-황 공정에 대한 안전성 평가연구)

  • Lee, Hyon-Woo;Jae, Moo-Sung;Cho, Nam-Chul;Yang, Jon-Eon;Lee, Won-Jae
    • Journal of the Korean Society of Safety
    • /
    • v.24 no.3
    • /
    • pp.54-58
    • /
    • 2009
  • A substitute energy development has been required due to the exhaust of the fossil fuel and an environmental problem. Consequently, possible technologies producing hydrogen from water that does not release carbon is a very promising technology. Also, Iodine-Sulfur(IS) thermochemical water decomposition is one of the promising processes that are used to produce hydrogen efficiently using the high temperature gas-cooled reactor(HTGR) as an energy source that is possible to supply heat over 900$^{\circ}C$. In this study, to make a initiating events identification for the IS process, Master Logic Diagram(MLD) is used and 9 initiating events that cause a leakage of the chemical material are identified. Also, 6 events are identified among 9 initiating events above and are quantified using event tree.

Risk Assessment and Application in Chemical Plants Using Fault Tree Analysis (FTA를 이용한 화학공장의 위험성 평가 및 응용)

  • Kim Yun-Hwa;Kim Ky-Soo;Yoon Sung-Ryul;Um Sung-In;Ko Jae-Wook
    • Journal of the Korean Institute of Gas
    • /
    • v.1 no.1
    • /
    • pp.81-86
    • /
    • 1997
  • This study is to estimate the possibility of accident in chemical plants from the analysis of system component which affects the occurrence of top event. Among the various risk assessment techniques, the Fault Tree Analysis which approaches deductively on the route of accident development was used in this study. By gate-by-gate method and minimal cut set, the qualitative and quantitative risk assessment for hazards in plants was performed. The probability of occurrence and frequency of top event was calculated from failure or reliability data of system components at stage of the quantitative risk assessment. In conclusion, the probability of accident was estimated according to logic pattern based on the Fault Tree Analysis. And the failure path which mostly influences on the occurrence of top event was found from Importance Analysis.

  • PDF

Design of 32-bit Floating Point Multiplier for FPGA (FPGA를 위한 32비트 부동소수점 곱셈기 설계)

  • Xuhao Zhang;Dae-Ik Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.2
    • /
    • pp.409-416
    • /
    • 2024
  • With the expansion of floating-point operation requirements for fast high-speed data signal processing and logic operations, the speed of the floating-point operation unit is the key to affect system operation. This paper studies the performance characteristics of different floating-point multiplier schemes, completes partial product compression in the form of carry and sum, and then uses a carry look-ahead adder to obtain the result. Intel Quartus II CAD tool is used for describing Verilog HDL and evaluating performance results of the floating point multipliers. Floating point multipliers are analyzed and compared based on area, speed, and power consumption. The FMAX of modified Booth encoding with Wallace tree is 33.96 Mhz, which is 2.04 times faster than the booth encoding, 1.62 times faster than the modified booth encoding, 1.04 times faster than the booth encoding with wallace tree. Furthermore, compared to modified booth encoding, the area of modified booth encoding with wallace tree is reduced by 24.88%, and power consumption of that is reduced by 2.5%.

A Rule Generation Technique Utilizing a Parallel Expansion Method (병렬확장을 활용한 규칙생성 기법)

  • Lee, Kee-Cheol;Kim, Jin-Bong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.4
    • /
    • pp.942-950
    • /
    • 1998
  • Extraction of knowledge, especially in the form of rules, from raw data is very important in data mining, the aim of which is to help users who feel the lack of knowledge in spite of the abundance of data. Logic minimization tools are ones which derive optimized knowledge given ON set and DC set. First, the parallel expansion scheme of logic minimization is extracted and used to obtain intial knowledge to get final rules, which are successfully applicable to real world data. The prototype system based on this new approach has been experimented with real world data to show that it is as practical as conventional long studied decision tree methods like C4.5 system.

  • PDF

Reliability Centered Maintenance (보전에 중점을 둔 신뢰성)

  • 김환중
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2002.11a
    • /
    • pp.199-204
    • /
    • 2002
  • Reliability Centered Maintenance(RCM) was initially developed for the commercial aviation industry in the late 1960s and now is equally applicable to a variety of equipment other than aircraft. RCM is a method for establishing a preventive maintenance program which will efficiently and effectively allow the achivement of the required safety and availability levels of equipment and structures. RCM provides for the use of a decision logic tree to identify applicable and effective preventive maintenance requirements for equipment and structures. The end result of working through the decision logic is a judgement as to the necessity of performing a maintenance task. In this paper, we provide guiding principles based on IEC 60300-3-11 for RCM analysis methods and operational method of structure and equipment.

  • PDF

Reliability Centered Maintenance (보전에 중점을 둔 신뢰성)

  • 김환중
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.11a
    • /
    • pp.199-204
    • /
    • 2002
  • Reliability Centered Maintenance(RCM) was initially developed for the commercial aviation industry in the late 1960s and now is equally applicable to a variety of equipment other than aircraft. RCM is a method for establishing a preventive maintenance program which will efficiently and effectively allow the achivement of the required safety and availability levels of equipment and structures. RCM provides for the use of a decision logic tree to identify applicable and effective preventive maintenance requirements for equipment and structures. The end result of working through the decision logic is a judgement as to the necessity of performing a maintenance task. In this paper, we provide guiding principles based on IEC 60300-3-11 for RCM analysis methods and operational method of structure and equipment.

  • PDF

Sensitivity Analysis According to Fault Parameters for Probabilistic Tsunami Hazard Curves (단층 파라미터에 따른 확률론적 지진해일 재해곡선의 민감도 분석)

  • Jho, Myeong Hwan;Kim, Gun Hyeong;Yoon, Sung Bum
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.31 no.6
    • /
    • pp.368-378
    • /
    • 2019
  • Logic trees for probabilistic tsunami hazard assessment include numerous variables to take various uncertainty on earthquake generation into consideration. Results from the hazard assessment vary in different way as more variables are considered in the logic tree. This study is conducted to estimate the effects of various scaling laws and fault parameters on tsunami hazard at the nearshore of Busan. Active fault parameters, such as strike angle, dip angle and asperity, are adjusted in the modelling of tsunami propagation, and the numerical results are used in the sensitivity analysis. The influence of strike angle to tsunami hazard is not as much significant as it is expected, instead, dip angle and asperity show a considerable impact to tsunami hazard assessment. It is shown that the dip angle and the asperity which determine the initial wave form are more important than the strike angle for the assessment of tsunami hazard in the East Sea.

Machine Learning Based Automatic Categorization Model for Text Lines in Invoice Documents

  • Shin, Hyun-Kyung
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.12
    • /
    • pp.1786-1797
    • /
    • 2010
  • Automatic understanding of contents in document image is a very hard problem due to involvement with mathematically challenging problems originated mainly from the over-determined system induced by document segmentation process. In both academic and industrial areas, there have been incessant and various efforts to improve core parts of content retrieval technologies by the means of separating out segmentation related issues using semi-structured document, e.g., invoice,. In this paper we proposed classification models for text lines on invoice document in which text lines were clustered into the five categories in accordance with their contents: purchase order header, invoice header, summary header, surcharge header, purchase items. Our investigation was concentrated on the performance of machine learning based models in aspect of linear-discriminant-analysis (LDA) and non-LDA (logic based). In the group of LDA, na$\"{\i}$ve baysian, k-nearest neighbor, and SVM were used, in the group of non LDA, decision tree, random forest, and boost were used. We described the details of feature vector construction and the selection processes of the model and the parameter including training and validation. We also presented the experimental results of comparison on training/classification error levels for the models employed.

Development of a Computer Code, CONPAS, for an Integrated Level 2 PSA

  • Ahn, Kwang-Il;Kim, See-Darl;Song, Yong-Mann;Jin, Young-Ho;Park, Chung K.
    • Nuclear Engineering and Technology
    • /
    • v.30 no.1
    • /
    • pp.58-74
    • /
    • 1998
  • A PC window-based computer code, CONPAS (CONtainment Performance Analysis System), has been developed to integrate the numerical, graphical, and results-operation aspects of Level 2 probabilistic safety assessments (PSA) for nuclear power plants automatically. As a main logic for accident progression analysis, it employs a concept of the small containment phenomenological event tree (CPET) helpful to trace out visually individual accident progressions and of the detailed supporting event tree (DSET) for its detailed quantification. For the integrated analysis of Level 2 PSA, the code utilizes five distinct, but closely related modules. Its computational feasibility to real PSAs has been assessed through an application to the UCN 3&4 full scope Level 2 PSA. Compared with other existing computer codes for Level 2 PSA, the CONPAS code provides several advanced features: (1) systematic uncertainty analysis / importance analysis / sensitivity analysis, (2) table / graphical display & print, (3) employment of the recent Level 2 PSA technologies, and (4) highly effective user interface. The main purpose of this paper is to introduce the key features of CONPAS code and results of its feasibility study.

  • PDF

Improvement Strategy of System Unavailability by Review of Logical Structure and Reliability Importance of Reliability Block Diagram (RED) and Fault Tree Analysis (FTA) (RBD와 FTA의 논리구조와 신뢰성 중요도의 고찰에 의한 시스템 비시간가동률 개선방안)

  • Choi, Sung-Woon
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.3
    • /
    • pp.45-53
    • /
    • 2011
  • The research proposes seven elimination rules of redundant gates and blocks in Fault Tree Analysis (FTA) and Reliability Block Diagram (RBD). The computational complexity of cut sets and path sets is NP-hard. In order to reduce the complexity of Minimal Cut Set (MCS) and Minimal Path Set (MPS), the paper classifies generation algorithms. Moreover, the study develops six implementation steps which reflect structural importance (SI) and reliability importance (RI) from Reliability Centered Maintenance (RCM) that a priority of using the functional logic among components is to reduce (improve) the system unavailability (or availability). The proposed steps include efficient generation of state structure function by Rare Event Enumeration (REA). Effective use of importance measures, such as SI and ill measures, is presented based on the number and the size of MCS and MPS which is generated from the reference[5] of this paper. In addition, numerical examples are presented for practitioners to obtain the comprehensive understanding of six steps that is proposed in this research.