• 제목/요약/키워드: Pin Method

검색결과 686건 처리시간 0.029초

High performance 3D pin-by-pin neutron diffusion calculation based on 2D/1D decoupling method for accurate pin power estimation

  • Yoon, Jooil;Lee, Hyun Chul;Joo, Han Gyu;Kim, Hyeong Seog
    • Nuclear Engineering and Technology
    • /
    • 제53권11호
    • /
    • pp.3543-3562
    • /
    • 2021
  • The methods and performance of a 3D pin-by-pin neutronics code based on the 2D/1D decoupling method are presented. The code was newly developed as an effort to achieve enhanced accuracy and high calculation performance that are sufficient for the use in practical nuclear design analyses. From the 3D diffusion-based finite difference method (FDM) formulation, decoupled planar formulations are established by treating pre-determined axial leakage as a source term. The decoupled axial problems are formulated with the radial leakage source term. To accelerate the pin-by-pin calculation, the two-level coarse mesh finite difference (CMFD) formulation, which consists of the multigroup node-wise CMFD and the two-group assembly-wise CMFD is implemented. To enhance the accuracy, both the discontinuity factor method and the super-homogenization (SPH) factor method are examined for pin-wise cross-section homogenization. The parallelization is achieved with the OpenMP package. The accuracy and performance of the pin-by-pin calculations are assessed with the VERA and APR1400 benchmark problems. It is demonstrated that pin-by-pin 2D/1D alternating calculations within the two-level 3D CMFD framework yield accurate solutions in about 30 s for the typical commercial core problems, on a parallel platform employing 32 threads.

Development and verification of pin-by-pin homogenized simplified transport solver Tortin for PWR core analysis

  • Mala, Petra;Pautz, Andreas
    • Nuclear Engineering and Technology
    • /
    • 제52권11호
    • /
    • pp.2431-2441
    • /
    • 2020
  • Currently, the pin-by-pin homogenized solvers are a very active research field as they can, unlike the nodal codes, directly predict the local power, while requiring significantly less computational resources than the heterogeneous transport codes. This paper presents a recently developed pin-by-pin diffusion/SP3 solver Tortin, its spatial discretization method and the reflector treatment. Regarding the spatial discretization, it was observed that the finite difference method applied on pin-cell size mesh does not properly capture the big flux change between MOX and uranium fuel, while the nodal expansion method is more accurate but too slow. If the finite difference method is used with a finer mesh in the outer two pin rows of the fuel assembly, it increases the required computation time by only 50%, but decreases the pin power errors below 1% with respect to lattice code reference solutions. The paper further describes the coupling of Tortin with a microscopic depletion solver. Several verification tests show that the SP3 pin-by-pin solver can reproduce the heterogeneous transport solvers results with very good accuracy, even for fuel cycle depletion of very heterogeneous core employing MOX fuel or inserted control rods, while being two orders of magnitude faster.

Indirect PIN Entry Method for Mobile Banking Using Relative Location Information of Secret Code (비밀코드의 상대적 위치정보를 이용한 모바일 뱅킹용 간접 PIN 입력 기법)

  • Choi, Dongmin
    • Journal of Korea Multimedia Society
    • /
    • 제23권6호
    • /
    • pp.738-746
    • /
    • 2020
  • In this paper, we propose an indirect PIN entry method that provides enhanced security against smudge, recording, and thermal attacks. Conventional mobile PIN entry methods use on-screen numeric keypad for both use of display and entry. Thus These methods are vulnerable to aforementioned attacks. In our method, passcode is same as that of the conventional PIN entry methods, and that is user-friendly way for mobile device users. Therefore, our method does not reduce user convenience which is one of the advantages of the conventional methods. In addition, our method is not a method of directly touching the on-screen numeric keypad for entering passcode like the conventional PIN methods. Unlike the conventional methods, our method uses an indirect passcode entry method that applied a passcode indicating key. According to the performance comparison result, proposed method provides user convenience similar to the conventional methods, and also provides a higher level of security and safety against recording, smudge, and thermal attacks than the conventional methods.

Solution of OECD/NEA PWR MOX/UO2 benchmark with a high-performance pin-by-pin core calculation code

  • Hyunsik Hong;Jooil Yoon
    • Nuclear Engineering and Technology
    • /
    • 제56권9호
    • /
    • pp.3654-3667
    • /
    • 2024
  • Expanding upon the framework of the steady-state pin-by-pin 2D/1D decoupling method, a novel and highperformance pin-by-pin transient calculation method has been introduced. This transient method, consistent to the steady-state formulation, is designed for time-dependent calculations utilizing a 3D diffusion-based finite difference method (FDM). The inherent complexity of the large 3D problem is effectively managed by decoupling it into a series of planar (2D) and axial (1D) problems. In addition, tens of thousands of pin-cells are grouped into hundreds of boxes to reduce the computing burden for the 1D calculations without essential loss of the accuracy. Two-level coarse mesh finite difference (CMFD) formulation comprising multigroup nodewise CMFD and twogroup assemblywise CMFD is employed as well to accelerate the convergence. Errors originating from the pinlevel homogenization, energy group condensation, and the use of lower order calculation methods are simultaneously corrected by the pinwise super homogenization (SPH) equivalence factor. The transient method is evaluated with OECD/NEA PWR MOX/UO2 benchmark. Code-to-code comparison with the nTRACER direct whole core calculation code yielded highly satisfactory results for the transient scenario as well as the steady-state problems. Furthermore, comparative analyses with conventional nodal calculations show superiority of the pin-by-pin calculation.

User authentication using touch positions in a touch-screen interface (터치스크린을 이용한 터치 위치기반 사용자 인증)

  • Kim, Jin-Bok;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제21권1호
    • /
    • pp.135-141
    • /
    • 2011
  • Recent advances in mobile devices and development of various mobile applications dealing with private information of users made user authentication in mobile devices a very important issue. This paper presents a new user authentication method based on touch screen interfaces. This method uses for authentication the PIN digits as well as the exact locations the user touches to input these digits. Our method is fully compatible with the regular PIN entry method which uses numeric keypads, and it provides better usability than the behavioral biometric schemes because its PIN registration process is much simpler. According to our experiments, our method guarantees EERs of 12.8%, 8.3%, and 9.3% for 4-digit PINs, 6-digit PINs, and 11-digit cell phone numbers, respectively, under the extremely conservative assumption that all users have the same PIN digits and cell phone numbers. Thus we can guarantee much higher performance in identification functionality by applying this result to a more practical situation where every user uses distinct PIN and sell phone number. Finally, our method is far more secure than the regular PIN entry method, which is verified by our experiments where attackers are required to recover a PIN after observing the PIN entry processes of the regular PIN and our method under the same level of security parameters.

One-node and two-node hybrid coarse-mesh finite difference algorithm for efficient pin-by-pin core calculation

  • Song, Seongho;Yu, Hwanyeal;Kim, Yonghee
    • Nuclear Engineering and Technology
    • /
    • 제50권3호
    • /
    • pp.327-339
    • /
    • 2018
  • This article presents a new global-local hybrid coarse-mesh finite difference (HCMFD) method for efficient parallel calculation of pin-by-pin heterogeneous core analysis. In the HCMFD method, the one-node coarse-mesh finite difference (CMFD) scheme is combined with a nodal expansion method (NEM)-based two-node CMFD method in a nonlinear way. In the global-local HCMFD algorithm, the global problem is a coarse-mesh eigenvalue problem, whereas the local problems are fixed source problems with boundary conditions of incoming partial current, and they can be solved in parallel. The global problem is formulated by one-node CMFD, in which two correction factors on an interface are introduced to preserve both the surface-average flux and the net current. Meanwhile, for accurate and efficient pin-wise core analysis, the local problem is solved by the conventional NEM-based two-node CMFD method. We investigated the numerical characteristics of the HCMFD method for a few benchmark problems and compared them with the conventional two-node NEM-based CMFD algorithm. In this study, the HCMFD algorithm was also parallelized with the OpenMP parallel interface, and its numerical performances were evaluated for several benchmarks.

A Study of the Improvement Method of I-pin Mass Illegal Issue Accident (아이핀 대량 부정발급 사고에 대한 개선방법 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • 제11권2호
    • /
    • pp.11-22
    • /
    • 2015
  • The almost of Web page has been gathered the personal information(Korean resident registration number, name, cell-phone number, home telephone number, E-mail address, home address, etc.) using the membership and log-in. The all most user of Web page are concerned for gathering of the personal information. I-pin is the alternative means of resident registration number and has been used during the last ten-year period in the internet. The accident of I-pin mass illegal issue was happened by hacker at February, 2015. In this paper, we analysis the problems of I-pin system about I-pin mass illegal issue accident and propose a improvement method of it. First, I-pin issue must be processed by the off-line of face certification in spite of user's inconvenience. Second, I-pin use must be made up through second certification of password or OTP. The third, the notification of I-pin use must be sent to the user by the text messaging service of cell-phone or the E-mail. The forth, I-pin must be used an alternative means of Korean resident registration number in Internet. The methods can reduce the problems of I-pin system.

PWR core calculation based on pin-cell homogenization in three-dimensional pin-by-pin geometry

  • Bin Zhang;Yunzhao Li;Hongchun Wu;Wenbo Zhao;Chao Fang;Zhaohu Gong;Qing Li;Xiaoming Chai;Junchong Yu
    • Nuclear Engineering and Technology
    • /
    • 제56권6호
    • /
    • pp.1950-1958
    • /
    • 2024
  • For the pressurized water reactor two-step calculation, the traditional assembly homogenization and two-group neutron diffusion calculation have been widely used. When it comes to the core pin-by-pin simulation, many models and techniques are different and unsettled. In this paper, the homogenization methods based on the pin discontinuity factors and super homogenization factors are used to get the pin-cell homogenized parameters. The heterogeneous leakage model is applied to modify the infinite flux spectrum of the single assembly with reflective boundary condition and to determine the diffusion coefficients for the SP3 solver which is used in the core simulation. To reduce the environment effect of the single-assembly reflective boundary condition, the online method for the SPH factors updating is applied in this paper, and the functionalization of SPH factors based on the least-squares method will be pre-made alone with the table of the group constants. The fitting function will be used to update the thermal-group SPH factors with a whole-core pin-by-pin homogeneous solution online. The three-dimensional Watts Bar Nuclear Unit 1 (WBN1) problem was utilized to test the performance of pin-by-pin calculation. And numerical results have demonstrated that PWR pin-by-pin core calculation has more accurate results compared with the traditional assembly-homogenization scheme.

Voltage-Controlled PH Diode Attenuator and Temperature Compensation Circuit for Ku-band Satellite Payload (Ku-대역 위성중계기용 전압제어형 PIN 다이오드 감쇄기 및 온도보상회로 설계)

  • 장병준;염인복;이성팔
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • 제13권5호
    • /
    • pp.484-491
    • /
    • 2002
  • This paper presents the results of a study of voltage-controlled PIN diode attenuators for Ku-band satellite payload and suggests the temperature-compensation method of these attenuators. The PIN diode attenuators are designed using thin-film hybrid techniques. The load resistance for maximum linear characteristics is determined by simulation and measurements. In the case of APD0805, load resistance of 150 $\Omega$ gives attenuator up to 10 dB linear attenuation range per a PIN diode. Also, measurements over temperature of these PIN diode attenuators were performed. From these measurements, designed PIN diode attenuators shows the severe temperature dependency due to forward voltage variation. A temperature compensation method using thermistor is now suggested to compensate the temperature variation of these PIN diode attenuators. This circuit shows good linear characteristics over wide temperature range

Secure PIN Authentication Technique in Door-Lock Method to Prevent Illegal Intrusion into Private Areas (사적 영역에 불법 침입 방지를 위한 도어락 방식의 안전한 PIN 인증 기법)

  • Hyung-Jin Mun
    • Journal of Practical Engineering Education
    • /
    • 제16권3_spc호
    • /
    • pp.327-332
    • /
    • 2024
  • The spread of smart phones provides users with a variety of services, making their lives more convenient. In particular, financial transactions can be easily made online after user authentication using a smart phone. Users easily access the service by authenticating using a PIN, but this makes them vulnerable to social engineering attacks such as spying or recording. We aim to increase security against social engineering attacks by applying the authentication method including imaginary numbers when entering a password at the door lock to smart phones. Door locks perform PIN authentication within the terminal, but in smart phones, PIN authentication is handled by the server, so there is a problem in transmitting PIN information safely. Through the proposed technique, multiple PINs containing imaginary numbers are generated and transmitted as processed values such as hash values, thereby ensuring the stability of transmission and enabling safe user authentication through a technique that allows the PIN to be entered without exposure.