• Title/Summary/Keyword: Nuclear Software Development

Search Result 190, Processing Time 0.025 seconds

A preliminary study on the development of human error analysis and application technology in Korean nuclear power plants (원자력발전소의 인적오류분석 및 응용기술개발 방향 정립에 관한 연구)

  • 이정운;박근욱
    • Proceedings of the ESK Conference
    • /
    • 1993.10a
    • /
    • pp.89-99
    • /
    • 1993
  • 원자력발전소 고장 및 불시정지 사례의 상당수가 시스템과 연계되어 인간에 의해 수행되는 운전, 유지보수, 관리와 관련된 인적오류에 기인하는 것으로 알려져 있다. 이러한 인적오류는 원자력발전소의 안전성과 효율성의 유지에 중요한 변수로 작용하며 불시정지에 의한 경제적 손실과 사회적 충격을 초래 하게 된다. 특히, 국내 원자력발전소가 외국설계라는 점과 인적요인에 대한 체계적인 평가가 이루어 지 지 않은 상태에서 운영중인 것을 감안하면, 인적요인의 국가별 차이에서 발생가능한 인적오류 유발요인 이 상존하고 있다고 할 수 있다. 이러한 인적오류의 중요성에 비해 국내 원자력 발전소의 인적오류에 대 한 연구는 지금까지 활발히 이루어지지 않고 있다. 본 연구에서는, 국내 원자력발전소에서 발생하는 인적 오류의 분석과 그 분석결과를 응용하기 위한 기술개발의 첫단계로, 기존 국외의 인적오류연구방법론 비교 분석, 국내 원전의 인적오류 발생현황 및 관련보고체계 분석, 등을 수행하여 국내 원자력발전소의 인적오류 분석 및 응용기술개발을 위한 연구개발 방향을 정립하였다. 기존 국외의 인적오류연구방법론 비교분석에서는, 인적오류에 대한 연구를 그 접근 방식에 따라 관리적 접근방식, 정량적 접근방식, 정성적 접근방식의 세가지로 분류하여, 각 접근방식에 대한 분석대상, 분석방식, 수행목적 등, 각 접근방식의 특징과 이에따른 실효성을 분석하였다. 그리고, 국내 원전의 인적오류 발생현황 및 관련보고체계분석에서는, 국내 원자력발전소에서 발생한 고장/정지 사건이 내포하고 있는 인적오류의 주요 형태를 파악하였으며, 또한, 인적오류연구 수행에 필수적인 인적오류사례원으로서 국내 원전에서의 인적오류 관련 보고체계에 대한 운용현황을 파악하고 그 유용성을 조사하였다. 이러한 연구를 통하여, 국내에 적용가능한 인적오류 분석기술개발 추진을 위한 제약 조건과 이러한 제약조건을 극복하고 인적오류 분석기술 수준을 향상시키기 위한 필요충분조건을 파악하였으며, 이 필요충분조건을 고려하여 인적오류 분석기법개발, 인적 오류 사례전파 및 자료관리 기술개발, 인적오류 사례수집 기술개발, 등을 주요 골자로 하는 인적오류 분석기술개발의 기본 방향을 설정하였다. 이와 아울러, 오류사례의 수집, 상세분석, 자료의 저장 및 응용을 위한 hardware 및 software 환경을 체계화하였다.

  • PDF

Development of X-Ray Array Detector Signal Processing System (X-Ray 어레이 검출 모듈 신호처리 시스템 개발)

  • Lim, Ik-Chan;Park, Jong-Won;Kim, Young-Kil;Sung, So-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1298-1304
    • /
    • 2019
  • Since the 9·11 terror attack in 2001, the Maritime Logistics Security System has been strengthened and required X-ray image for every imported cargos from manufacturing countries to United States. For scanning cargos, the container inspection systems use high energy X-rays for examination of contents of a container to check the nuclear, explosive, dangerous and illegal materials. Nowadays, the X-ray cargo scanners are established and used by global technologies for inspection of suspected cargos in the customs agency but these technologies have not been localized and developed sufficiently. In this paper, we propose the X-ray array detector system which is a core component of the container scanning system. For implementation of X-ray array detector, the analog and digital signal processing units are fabricated with integrated hardware, FPGA logics and GUI software for real-time X-ray images. The implemented system is superior in terms of resolution and power consumption compared to the existing products currently used in ports.

An Investigation on the Periodical Transition of News related to North Korea using Text Mining (텍스트마이닝을 활용한 북한 관련 뉴스의 기간별 변화과정 고찰)

  • Park, Chul-Soo
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.63-88
    • /
    • 2019
  • The goal of this paper is to investigate changes in North Korea's domestic and foreign policies through automated text analysis over North Korea represented in South Korean mass media. Based on that data, we then analyze the status of text mining research, using a text mining technique to find the topics, methods, and trends of text mining research. We also investigate the characteristics and method of analysis of the text mining techniques, confirmed by analysis of the data. In this study, R program was used to apply the text mining technique. R program is free software for statistical computing and graphics. Also, Text mining methods allow to highlight the most frequently used keywords in a paragraph of texts. One can create a word cloud, also referred as text cloud or tag cloud. This study proposes a procedure to find meaningful tendencies based on a combination of word cloud, and co-occurrence networks. This study aims to more objectively explore the images of North Korea represented in South Korean newspapers by quantitatively reviewing the patterns of language use related to North Korea from 2016. 11. 1 to 2019. 5. 23 newspaper big data. In this study, we divided into three periods considering recent inter - Korean relations. Before January 1, 2018, it was set as a Before Phase of Peace Building. From January 1, 2018 to February 24, 2019, we have set up a Peace Building Phase. The New Year's message of Kim Jong-un and the Olympics of Pyeong Chang formed an atmosphere of peace on the Korean peninsula. After the Hanoi Pease summit, the third period was the silence of the relationship between North Korea and the United States. Therefore, it was called Depression Phase of Peace Building. This study analyzes news articles related to North Korea of the Korea Press Foundation database(www.bigkinds.or.kr) through text mining, to investigate characteristics of the Kim Jong-un regime's South Korea policy and unification discourse. The main results of this study show that trends in the North Korean national policy agenda can be discovered based on clustering and visualization algorithms. In particular, it examines the changes in the international circumstances, domestic conflicts, the living conditions of North Korea, the South's Aid project for the North, the conflicts of the two Koreas, North Korean nuclear issue, and the North Korean refugee problem through the co-occurrence word analysis. It also offers an analysis of South Korean mentality toward North Korea in terms of the semantic prosody. In the Before Phase of Peace Building, the results of the analysis showed the order of 'Missiles', 'North Korea Nuclear', 'Diplomacy', 'Unification', and ' South-North Korean'. The results of Peace Building Phase are extracted the order of 'Panmunjom', 'Unification', 'North Korea Nuclear', 'Diplomacy', and 'Military'. The results of Depression Phase of Peace Building derived the order of 'North Korea Nuclear', 'North and South Korea', 'Missile', 'State Department', and 'International'. There are 16 words adopted in all three periods. The order is as follows: 'missile', 'North Korea Nuclear', 'Diplomacy', 'Unification', 'North and South Korea', 'Military', 'Kaesong Industrial Complex', 'Defense', 'Sanctions', 'Denuclearization', 'Peace', 'Exchange and Cooperation', and 'South Korea'. We expect that the results of this study will contribute to analyze the trends of news content of North Korea associated with North Korea's provocations. And future research on North Korean trends will be conducted based on the results of this study. We will continue to study the model development for North Korea risk measurement that can anticipate and respond to North Korea's behavior in advance. We expect that the text mining analysis method and the scientific data analysis technique will be applied to North Korea and unification research field. Through these academic studies, I hope to see a lot of studies that make important contributions to the nation.

A Study on the Sediment Transport using Radioisotope Tracer (방사성동위원소 추적자를 이용한 표사이동 추적실험)

  • Choi Byung-Jong;Jung Sung-Hee;Kim Jong-Bum;Lee Jong-Sup
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.16 no.3
    • /
    • pp.162-170
    • /
    • 2004
  • On the basis of the radiotracer technology and the related equipments which have been developed for its industrial application through the nuclear long-term research project, a radiotracer study on sediment transport was carried out as a part of the development of the radiotracer technology for a coastal environment. The crystalline material doped with iridium having a similar composition and specific gravity as those of the bedload sand collected from the research area was produced by the oxide-route method. A radioisotope container was specially designed to inject the radiotracer from 1 m above the sea bedload without radioactive contamination during the transport from the nuclear reactor at KAERI. The position data from the DGPS and the radiation measurement data were collected concurrently and stored by means of the application software programmed with the LabVIEW of the National Instrument. The position data was reprocessed to represent the real position of the radiation probe under water and not that of the DGPS antenna on board. The time dependency of the spatial distribution of the sediment was studied in the area through three tracking measurements after the iridium glass was injected. This trial application showed the potential of the radiotracer technology as an important role for maintaining and developing the coastal environment in the future.

Development of Pre-Service and In-Service Information Management System (iSIMS) (원전 가동전/중 검사정보관리 시스템 개발)

  • Yoo, H.J.;Choi, S.N.;Kim, H.N.;Kim, Y.H.;Yang, S.H.
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.24 no.4
    • /
    • pp.390-395
    • /
    • 2004
  • The iSTMS is a web-based integrated information system supporting Pre-Service and In-Service Inspection(PSI/ISI) processes for the nuclear power plants of KHNP(Korea Hydro & Nuclear Power Co. Ltd.). The system provides a full spectrum coverage of the inspection processes from the planning stage to the final report of examination in accordance with applicable codes, standards, and regulatory requirements. The major functions of the system includes the inspection planning, examination, reporting, project control and status reporting, resource management as well as objects search and navigation. The system also provides two dimensional or three dimensional visualization interface to identify the location and geometry of components and weld areas subject to examination in collaboration with database applications. The iSIMS is implemented with commercial software packages such as database management system, 2-D and 3-D visualization tool, etc., which provide open, updated and verified foundations. This paper describes the key functions and the technologies for the implementation of the iSIMS.

Development of a Software to Evaluate the CPES(Cable Penetration Fire Stop) System in Nuclear Power Plane I (원자력발전소 케이블관통부 충전시스템 평가용 소프트웨어 개발 I)

  • 윤종필;권성필;조재규;윤인섭
    • Fire Science and Engineering
    • /
    • v.18 no.1
    • /
    • pp.24-30
    • /
    • 2004
  • In this work the dynamic heat transfer occurring in a cable penetration fire stop system built in the firewall of nuclear power plants is three-dimensionally investigated to develop a test-simulator that can be used to verify effectiveness of the sealants. Here was carried out an experiment to observe the heat transfer in the cable penetration fire stop system made of DOW CORNING products. The dynamic heat transfer occurring in the fire stop system is formulated in a parabolic partial differential equation subjected to a set of initial and boundary conditions. And it was modeled, simulated, and analyzed. The simulation results were illustrated in three-dimensional graphics and were compared with experimental data. Through the simulations, it was shown clearly that the temperature distribution was influenced very much by the number, position, and temperature of the cable streams. It also was found that the dynamic heat transfer through the cable streams was one of the most dominant factors, and the feature of heat conduction could be understood as an unsteady-state process. It is certain that these numerical results are useful for making a performance-based design for the cable penetration fire stop system.

Multi-tracer Imaging of a Compton Camera (다중 추적자 영상을 위한 컴프턴 카메라)

  • Kim, Soo Mee
    • Progress in Medical Physics
    • /
    • v.26 no.1
    • /
    • pp.18-27
    • /
    • 2015
  • Since a Compton camera has high detection sensitivity due to electronic collimation and a good energy resolution, it is a potential imaging system for nuclear medicine. In this study, we investigated the feasibility of a Compton camera for multi-tracer imaging and proposed a rotating Compton camera to satisfy Orlov's condition for 3D imaging. Two software phantoms of 140 and 511 keV radiation sources were used for Monte-Carlo simulation and then the simulation data were reconstructed by listmode ordered subset expectation maximization to evaluate the capability of multi-tracer imaging in a Compton camera. And the Compton camera rotating around the object was proposed and tested with different rotation angle steps for improving the limited coverage of the fixed conventional Compton camera over the field-of-view in terms of histogram of angles in spherical coordinates. The simulation data showed the separate 140 and 511 keV images from simultaneous multi-tracer detection in both 2D and 3D imaging and the number of valid projection lines on the conical surfaces was inversely proportional to the decrease of rotation angle. Considering computation load and proper number of projection lines on the conical surface, the rotation angle of 30 degree was sufficient for 3D imaging of the Compton camera in terms of 26 min of computation time and 5 million of detected event number and the increased detection time can be solved with multiple Compton camera system. The Compton camera proposed in this study can be effective system for multi-tracer imaging and is a potential system for development of various disease diagnosis and therapy approaches.

A Study on Implications of the naval Strategy in West Germany and Future Direction of Korean Navy (냉전기 서독해군 전략의 시사점과 향후 대한민국 해군의 방향성에 관한 연구)

  • Shin, Hong-Jung
    • Strategy21
    • /
    • s.46
    • /
    • pp.159-204
    • /
    • 2020
  • This study is written to bring the proposal forward for the direction of south korean naval force. The political situation and the circumstance of the world, especially in the area of Pacific Ocean, are changing very rapidly. North Korea has been always the conventional existing intimidator for South Korea since the 6·25-War. Additionally, the strengthening movements of the national defense, which is easily noticed from China and Russia, is also an other part of intimidating countries against South Korea. Those three mentioned countries are continually developing the asymmetrical warfare systems, for example a strategic nuclear weapon. Since the Obama Administration, the Asia-Pacific Rebalancing-Strategy has been changed as an East Asian foreign policy. Nowadays, Trump Administration renamed the 'United States Pacific-Command' to 'United States Indo-Pacific Command'. The purpose of this is not only letting India to participate in american alliance, but also reducing an economic burden, which is often mentioned in USA. West Germany was located in the very similar geopolitical position during the Cold War just like South Korea these days. And that's why the strategy of West German Navy is worthy of notice for south korean naval force to decide its suitable strategy. Most of all, the two most important things to refer to this study are the plan to expand naval air force and the realistic political stand for us to take it. In conclusion, I laid an emphasis on maintenance of 'green-water-navy'. instead of selecting the strategy as a 'blue-water-navy'. The reason I would like to say, is that south korean navy is not available to hold the unnecessary war potential, just like Aircraft-Carrier. However, this is not meaning to let the expansion of naval force carelessly. We must search the best solution in order to maintain the firm peace within the situation. To fulfill this concept, it is mostly very important to maintain the stream of laying down a keel of destroyers, submarines and air-defense-missile, as well as the hight-tech software system, taking a survey of 4th industrial revolution. Research and development for the best solution of future aircraft by south korean navy is likewise necessary. Besides, we must also set the international diplomatic flexibly. As well as maintaining the relationship with US Forces, it is also very important to improve the relationship with other potential allied nation.

Development of Movement Analysis Program and its Feasibility Test in Streotactic Body Radiation Threrapy (복부부위의 체부정위방사선치료시 호흡에 의한 움직임분석 프로그램 개발 및 유용성 평가)

  • Shin, Eun-Hyuk;Han, Young-Yih;Kim, Jin-Sung;Park, Hee-Chul;Shin, Jung-Suk;Ju, Sang-Gyu;Lee, Ji-Hea;Ahn, Jong-Ho;Lee, Jai-Ki;Choi, Doo-Ho
    • Progress in Medical Physics
    • /
    • v.22 no.3
    • /
    • pp.107-116
    • /
    • 2011
  • Respiratory gated radiation therapy and stereotactic body radiation therapy require identical tumor motions during each treatment with the motion detected in treatment planning CT. Therefore, this study developed a tumor motion monitoring and analysis system during the treatments employing RPM data, gated setup OBI images and a data analysis software. A respiratory training and guiding program which improves the regularity of breathing was used to patients. The breathing signal was obtained by RPM and the recorded data in the 4D console was read after treatment. The setup OBI images obtained gated at 0% and 50% of breathing phases were used to detect the tumor motion range in crenio-caudal direction. By matching the RPM data recorded at the OBI imaging time, a factor which converts the RPM motion to the tumor motion was computed. RPM data was entered to the institute developed data analysis software and the maximum, minimum, average of the breathing motion as well as the standard deviation of motion amplitude and period was computed. The computed result is exported in an excel file. The conversion factor was applied to the analyzed data to estimate the tumor motion. The accuracy of the developed method was tested by using a moving phantom, and the efficacy was evaluated for 10 stereotactic body radiation therapy patients. For the sine wave motion of the phantom with 4 sec of period and 2 cm of peak-to-peak amplitude, the measurement was slightly larger (4.052 sec) and the amplitude was smaller (1.952 cm). For patient treatment, one patient was evaluated not to qualified to SBRT due to the usability of the breathing, and in one patient case, the treatment was changed to respiratory gated treatment due the larger motion range of the tumor than treatment planed motion. The developed method and data analysis program was useful to estimate the tumor motion during treatment.

A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain (사이버 킬체인 기반 사이버 지휘통제체계 방어 및 공격 모델 연구)

  • Lee, Jung-Sik;Cho, Sung-Young;Oh, Heang-Rok;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Cyber Kill Chain is derived from Kill chain of traditional military terms. Kill chain means "a continuous and cyclical process from detection to destruction of military targets requiring destruction, or dividing it into several distinct actions." The kill chain has evolved the existing operational procedures to effectively deal with time-limited emergency targets that require immediate response due to changes in location and increased risk, such as nuclear weapons and missiles. It began with the military concept of incapacitating the attacker's intended purpose by preventing it from functioning at any one stage of the process of reaching it. Thus the basic concept of the cyber kill chain is that the attack performed by a cyber attacker consists of each stage, and the cyber attacker can achieve the attack goal only when each stage is successfully performed, and from a defense point of view, each stage is detailed. It is believed that if a response procedure is prepared and responded, the chain of attacks is broken, and the attack of the attacker can be neutralized or delayed. Also, from the point of view of an attack, if a specific response procedure is prepared at each stage, the chain of attacks can be successful and the target of the attack can be neutralized. The cyber command and control system is a system that is applied to both defense and attack, and should present defensive countermeasures and offensive countermeasures to neutralize the enemy's kill chain during defense, and each step-by-step procedure to neutralize the enemy when attacking. Therefore, thist paper proposed a cyber kill chain model from the perspective of defense and attack of the cyber command and control system, and also researched and presented the threat classification/analysis/prediction framework of the cyber command and control system from the defense aspect