• Title/Summary/Keyword: Shuffling

Search Result 96, Processing Time 0.021 seconds

Neutronics study on small power ADS loaded with recycled inert matrix fuel for transuranic elements transmutation using Serpent code

  • Vu, Thanh Mai;Hartanto, Donny;Ha, Pham Nhu Viet
    • Nuclear Engineering and Technology
    • /
    • v.53 no.7
    • /
    • pp.2095-2103
    • /
    • 2021
  • A small power ADS design using thorium oxide and diluent matrix reprocessed fuel is proposed for a high transmutation rate, small reactivity swing, and strong safety features. Two fuel matrices (CERCER and CERMET) and different recycled fuel compositions recovered from UO2 spent fuels with 45 GWd/tU and 60 GWd/tU burnup were investigated to determine the suitable fuel for the ADS. It was found that the transmutation of each isotope depends on TRU initial loading amount. After examining the cores, the results show that CERCER fueled ADS has a negative coolant void reactivity (CVR) and a smaller radiotoxicity at discharge compared to that of CERMET core. It implies that CERCER fuel has enhanced safety features and more flavor in terms of radiotoxicity management. To increase fuel utilization and core operation efficiency, a simple assembly shuffling pattern for the CERCER fueled ADS is also proposed. Eigenvalue and burnup calculations were conducted using Serpent 2 with ENDF/B-VII.0 library in both kcode and external source modes, and it indicates that the results of transmutation analyses obtained by kcode only is reliable to discuss the transmutation potential of ADS. Burnup calculation with the fixed-source mode is essential to be used for more practical results of the transmutation by ADS.

Comparison of Prediction Accuracy Between Regression Analysis and Deep Learning, and Empirical Analysis of The Importance of Techniques for Optimizing Deep Learning Models (회귀분석과 딥러닝의 예측 정확성에 대한 비교 그리고 딥러닝 모델 최적화를 위한 기법들의 중요성에 대한 실증적 분석)

  • Min-Ho Cho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.2
    • /
    • pp.299-304
    • /
    • 2023
  • Among artificial intelligence techniques, deep learning is a model that has been used in many places and has proven its effectiveness. However, deep learning models are not used effectively in everywhere. In this paper, we will show the limitations of deep learning models through comparison of regression analysis and deep learning models, and present a guide for effective use of deep learning models. In addition, among various techniques used for optimization of deep learning models, data normalization and data shuffling techniques, which are widely used, are compared and evaluated based on actual data to provide guidelines for increasing the accuracy and value of deep learning models.

Protecting Privacy of User Data in Intelligent Transportation Systems

  • Yazed Alsaawy;Ahmad Alkhodre;Adnan Abi Sen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.163-171
    • /
    • 2023
  • The intelligent transportation system has made a huge leap in the level of human services, which has had a positive impact on the quality of life of users. On the other hand, these services are becoming a new source of risk due to the use of data collected from vehicles, on which intelligent systems rely to create automatic contextual adaptation. Most of the popular privacy protection methods, such as Dummy and obfuscation, cannot be used with many services because of their impact on the accuracy of the service provided itself, they depend on changing the number of vehicles or their physical locations. This research presents a new approach based on the shuffling Nicknames of vehicles. It fully maintains the quality of the service and prevents tracking users permanently, penetrating their privacy, revealing their whereabouts, or discovering additional details about the nature of their behavior and movements. Our approach is based on creating a central Nicknames Pool in the cloud as well as distributed subpools in fog nodes to avoid intelligent delays and overloading of the central architecture. Finally, we will prove by simulation and discussion by examples the superiority of the proposed approach and its ability to adapt to new services and provide an effective level of protection. In the comparison, we will rely on the wellknown privacy criteria: Entropy, Ubiquity, and Performance.

Effect of two way thermal hydraulic-fuel performance coupling on multicycle depletion

  • Awais Zahur;Muhammad Rizwan Ali;Deokjung Lee
    • Nuclear Engineering and Technology
    • /
    • v.55 no.12
    • /
    • pp.4431-4446
    • /
    • 2023
  • A Multiphysics coupling framework, MPCORE, has been developed to analyze safety parameters using the best estimate codes. The framework contains neutron kinetics (NK), thermal hydraulics (TH), and fuel performance (FP) codes to analyze fuel burnup, radial power distribution, and coolant temperature (Tbc). Shuffling and rotation capabilities have been verified on the Watts Bar reactor for three cycles. This study focuses on two coupling approaches for TH and FP modules. The one-way coupling approach involves coupling the FP code with the NK code, providing no data to the TH modules but getting Tbc as boundary condition from TH module. The two-way coupling approach exchanges information from FP to TH modules, so that the simplified heat conduction solver of the TH module is not used. The power profile in both approaches does not differ significantly, but there is an impact on coolant and cladding parameters. The one-way coupling approach tends to over-predict the cladding hydrogen concentration (CHC). This research highlights the difference between one-way and two-way coupling on critical boron concentration, Tbc, CHC, oxide surface temperature, and pellet centerline temperature. Overall, MPCORE framework with two-way coupling provides a more accurate and reliable analysis of safety parameters for nuclear reactors.

Multi-batch core design study for innovative small modular reactor based on centrally-shielded burnable absorber

  • Steven Wijaya;Xuan Ha Nguyen;Yunseok Jeong;Yonghee Kim
    • Nuclear Engineering and Technology
    • /
    • v.56 no.3
    • /
    • pp.907-915
    • /
    • 2024
  • Various core designs with multi-batch fuel management (FM) are proposed and optimized for an innovative small modular reactor (iSMR), focusing on enhancing the inherent safety and neutronic performance. To achieve soluble-boron-free (SBF) operation, cylindrical centrally-shielded burnable absorbers (CSBAs) are utilized, reducing the burnup reactivity swing in both two- and three-batch FMs. All 69 fuel assemblies (FAs) are loaded with 2-cylindrical CSBA. Furthermore, the neutron economy is improved by deploying a truly-optimized PWR (TOP) lattice with a smaller fuel radius, optimized for neutron moderation under the SBF condition. The fuel shuffling and CSBA loading patterns are proposed for both 2- and 3-batch FM with the aim to lower the core leakage and achieve favorable power profiles. Numerical results show that both FM configurations achieve a small reactivity swing of about 1000 pcm and the power distributions are within the design criteria. The average discharge burnup in the two-batch core is comparable to three-batch commercial PWR like APR-1400. The proposed checker-board CR pattern with extended fingers effectively assures cold shutdown in the two-batch FM scenario, while in the three-batch FM, three N-1 scenarios are failed. The whole evaluation process is conducted using Monte Carlo Serpent 2 code in conjunction with ENDF/B-VII.1 nuclear library.

Cross section generation for a conceptual horizontal, compact high temperature gas reactor

  • Junsu Kang;Volkan Seker;Andrew Ward;Daniel Jabaay;Brendan Kochunas;Thomas Downar
    • Nuclear Engineering and Technology
    • /
    • v.56 no.3
    • /
    • pp.933-940
    • /
    • 2024
  • A macroscopic cross section generation model was developed for the conceptual horizontal, compact high temperature gas reactor (HC-HTGR). Because there are many sources of spectral effects in the design and analysis of the core, conventional LWR methods have limitations for accurate simulation of the HC-HTGR using a neutron diffusion core neutronics simulator. Several super-cell model configurations were investigated to consider the spectral effect of neighboring cells. A new history variable was introduced for the existing library format to more accurately account for the history effect from neighboring nodes and reactivity control drums. The macroscopic cross section library was validated through comparison with cross sections generated using full core Monte Carlo models and single cell cross section for both 3D core steady-state problems and 2D and 3D depletion problems. Core calculations were then performed with the AGREE HTR neutronics and thermal-fluid core simulator using super-cell cross sections. With the new history variable, the super-cell cross sections were in good agreement with the full core cross sections even for problems with significant spectrum change during fuel shuffling and depletion.

The DeveloDment of PaDain which is Extremely Stable to Negative Ionic Environment by Directed Molecular Evolution (방향성 분자진화에 의한 음이온에 안정한 Papain 개발)

  • Kang, Whan-Koo;Hwang, Sun-Duk;Kim, Hyoung-Sik;Jeung, Jong-Sik;Lee, Bheong-Uk
    • KSBB Journal
    • /
    • v.21 no.5
    • /
    • pp.394-400
    • /
    • 2006
  • When the papain, which is a sort of Cystein protease, is applied to the outer skin, it decomposes the protein which forms the peeled outer skin and speeds up metabolism. Therefore, it is one of the most important cosmetics compositic which keeps the function of skin normal. When the papain is used in cosmetics with surfactant, the activity of papain is reduced rapidly. In this study, the modified papain with extreme stability negative ionic environment was developed by directed evolution

Fault Tolerant Encryption and Data Compression under Ubiquitous Environment (Ubiquitous 환경 하에서 고장 극복 암호 및 데이터 압축)

  • You, Young-Gap;Kim, Han-Byeo-Ri;Park, Kyung-Chang;Lee, Sang-Jin;Kim, Seung-Youl;Hong, Yoon-Ki
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.91-98
    • /
    • 2009
  • This paper presents a solution to error avalanche of deciphering where radio noise brings random bit errors in encrypted image data under ubiquitous environment. The image capturing module is to be made comprising data compression and encryption features to reduce data traffic volume and to protect privacy. Block cipher algorithms may experience error avalanche: multiple pixel defects due to single bit error in an encrypted message. The new fault tolerant scheme addresses error avalanche effect exploiting a three-dimensional data shuffling process, which disperses error bits on many frames resulting in sparsely isolated errors. Averaging or majority voting with neighboring pixels can tolerate prominent pixel defects without increase in data volume due to error correction. This scheme has 33% lower data traffic load with respect to the conventional Hamming code based approach.

Pseudonym Management in Autonomous Driving Environment (자율주행환경에서 가명성 관리)

  • Hong, Jin Keun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.10
    • /
    • pp.29-35
    • /
    • 2017
  • In this paper, we describe certificate policy and characteristics in cooperation condition with Cooperative intelligent transport system and autonomous driving vehicle. Among the authentication functions of the vehicle, there is a pseudonym authentication function. This pseudonymity is provided for the purpose of protecting the privacy of information that identifies the vehicle driver, passenger or vehicle. Therefore, the purpose of the pseudonym certificate is to be used for reporting on BSM authentication or misbehavior. However, this pseudonym certificate is used in the OBE of the vehicle and does not have a cryptographic key. In this paper, we consider a method for managing a pseudonym authentication function, which is a key feature of the pseudonym certificate, such as location privacy protection, pseudonym function, disposition of linkage value or CRL, request shuffling processing by registry, butterfly key processing, The authentication policy and its characteristics are examined in detail. In connection with the management of pseudonymes of the vehicle, the attacker must record the BSM transmission and trace the driver or vehicle. In this respect, the results of this study are contributing.

Design and Fabrication of a Processing Element for 2-D Systolic FFT Array (고속 퓨리어변환용 2차원 시스토릭 어레이를 위한 처리요소의 설계 및 제작)

  • Lee, Moon-Key;Shin, Kyung-Wook;Choi, Byeong-Yoon;,
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.27 no.3
    • /
    • pp.108-115
    • /
    • 1990
  • This paper describes the design and fabrication of a processing element that will be used as a component in the construction of a two dimensional systolic for FFT. The chip performs data shuffling and radix-2 decimation-in-time (DIT) butterfly arithmetic. It consists of a data routing unit, internal control logic and HBA unit which computes butterfly arithmetic. The 6.5K transistors processing element designed with standard cells has been fabricated with a 2u'm double metal CMOS process, and evaluated by wafer probing measurements. The measured characteristics show that a HBA can be computed in 0.5 usec with a 20MHz clok, and it is estimated that the FFT of length 1024 can be transformed in 11.2 usec.

  • PDF