• Title/Summary/Keyword: reuse system

Search Result 1,045, Processing Time 0.026 seconds

Analysis on Distribution Characteristics of Spent Fuel in Electrolytic Reduction Process (전해환원 공정에서의 사용후핵연료 분배 특성 분석)

  • Park, Byung Heung;Lee, Chul Soo
    • Korean Chemical Engineering Research
    • /
    • v.50 no.4
    • /
    • pp.696-701
    • /
    • 2012
  • Non-aqueous processes have been developed for stable management and reuse of spent fuels. Nowadays, a plan for the management of spent fuel is being sought focusing on a non-aqueous process in Korea. Named as pyroprocessing, it includes an electrolytic reduction process using molten salt at high temperature for the spent fuels, which provides metallic product for a following electro-refining process. The electrolytic reduction process utilizes electrochemical reaction producing Li to convert oxides into metals in high temperature LiCl medium. Various kinds of elements in the spent fuels would be distributed in the system according to their respective reactivity with the reductant, Li, and the medium, LiCl. This study elucidates the reactions of the elements to understand the behavior of composite elements on the spent fuels by thermodynamic calculations. Uranium and transuranic are reduced into their metallic forms while rare-earth oxides, except for Eu, are stable against the reaction at a process temperature. This study also covers the tendency of reactions with respect to the temperature and, finally, estimates radioactivity and heat load on the distributed phases based on the reference spent fuel characteristics.

Development of Reconfigurable Tactical Operation Display Framework by Battery and Battalion (포대/대대 별 재구성 가능한 전술작전화면 프레임워크 개발)

  • Lee, Sangtae;Lee, Seungyoung;Wi, SoungHyouk;Cho, Kyutae
    • Journal of KIISE
    • /
    • v.44 no.5
    • /
    • pp.476-485
    • /
    • 2017
  • The tactical operation centers of future anti-aircraft missile systems provide the environment for the research on future air threats, tactical information, integrated battlefield environment creation and management, engagement control and command and control algorithms. To develop the key functional elements of integrated battlefield situation creation and processing and tactical operation automation processing operations, battery/battalion tactical operation control and reconfiguration design software are required. Therefore, the algorithm software of each function and the tactical operation display software and link software for interworking between equipment were developed as reconfigurable through a data-centric design. In this paper, a tactical operation display framework that can be reconfigured on the operation display of the tactical operations according to the battery/battalion is introduced. This tactical operation display framework was used to develop a common data model design for the reconfigurable structure of multi-role tactical operations with battery / battalion and mission views, and a display configuration tool that provides a tactical operation display framework for view development was also developed using the MVC pattern. If the tactical operation display framework is used, it will be possible to reuse the view design through the common base structure, and a view that can be reconfigured easily and quickly will also be developed.

폐지 슬러지를 이용한 혐기성 메탄발효 특성 분석

  • Jo, Geon-Hyeong;Kim, Jung-Gon;Jeong, Hyo-Gi;Kim, Seong-Jun;Kim, Si-Uk
    • 한국생물공학회:학술대회논문집
    • /
    • 2003.04a
    • /
    • pp.367-370
    • /
    • 2003
  • This study was carried out to investigate the possibility for reuse of solid organic wastes such as saccharified newspapers and boxes by two-phase anaerobic fermentation system. When 15g of newspaper and box wastes were digested for 24 days by batch fermentation, tCOD removal rate were found to be 60.9 and 62.4%, respectively. During this period, the amounts of biogas produced were 6.95 and 6.43L. The removal efficiencies of total solid were 34.8 and 33.4%, and those of volatile solid were 40.0 and 39.2%, respectively. That pH was around 7.5 after 20-days operation means methane fermentation is well advanced. In case of semicontinuous reaction, tCOD removal efficiencies of newspaper and box wastes were 64.7 and 65.0%, respectively for 14-days operation. It has been shown that each of the average biogas amounts produced after 25 days operation (stabilization stage for methane fermentation) was 0.31 and 0.30L/g dry wt./day, respectively, and each methane contents was 57.3 and 56.2%, respectively. After the reaction continued for 25 days, pHs in the anaerobic acidogenic and methanogenic fermenters were shown to be 5.0 and 7.5, respectively.

  • PDF

Component Code Generation Using Feature Diagram and XML/XSLT (특성 다이어그램과 XML/XSLT 기술을 이용한 컴포넌트 코드 자동 생성)

  • 최승훈
    • Journal of Internet Computing and Services
    • /
    • v.3 no.4
    • /
    • pp.83-94
    • /
    • 2002
  • Recently for software development productivity a lot of researches in the field of software engineering hove focuses on the component-based software product lines which allows the reuse of forger-granularity software components Its purpose is to develop the specific software application of quality more rapidly by instantiating and assembling the components populated in software product line assets The essential part to build the component-based software product lines is the quality of components, and one of the most important features determining the quality of components is 'reconfigurability' Component reconfigurability means the extent to which the reusers can change the functions and architecture of the component according to their context and environment. This paper proposes the component code generation technique which provides the reconfigurability at the time of code generation using The feature diagram and XML/XSLT technologies The approach of this paper allows the component reusers to get automatically their own component source code by providing only the values of variabilities represented in the feature diagram of the component family. The real world example, the code generation system for o list container family, shows the applicability of the feature model and XML related technologies in the area of the generative programming. Our approach should be basis to build the component based software product lines and extensible to support the larger graularity components.

  • PDF

A Study on the Assessment of Source-term for PWR Primary System Using MonteCarlo Code (MonteCarlo 코드를 이용한 PWR 일차 계통 선원항 평가에 관한 연구)

  • Song, Jong Soon;Lee, Sang Heon;Shin, Seung Su
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.16 no.3
    • /
    • pp.331-337
    • /
    • 2018
  • The decommissioning of nuclear power plants is generally executed in five steps, including preparation, decontamination, cutting/demolition, waste disposal and environmental restoration. So, for efficient decommissioning of nuclear power plants, worker safety, effects compared to cost, minimization of waste, possibility of reuse, etc., shall be considered. Worker safety and measurement technology shall be secured to exert optimal efficiency of nuclear power plant decommissioning work, for which accurate measurement technology for systems and devices is necessary. Typical In-Situ methods for decommissioning of nuclear plants are CZT, Gamma Camera and ISOCS. This study used ISOCS, which can be applied during the decommissioning of a nuclear power plant site without collecting representative samples, to take measurements of the S/G Water Chamber. To validate the measurement values, Microshield and the GEANT4 code was used as the actual method were used for modeling, respectively. The comparison showed a difference of $1.0{\times}10^1Bq$, which indicates that it will be possible to reduce errors due to the influence of radiation in the natural environment and the precision of modeling. Based on the research results of this paper, accuracy and reliability of measurement values will be analyzed and the applicability of the direct measurement method during the decommissioning of NPPs will be assessed.

Implementation of UDP-Tunneling Based Multicast Connectivity Solution for Multi-Party Collaborative Environments (다자간 협업 환경을 위한 UDP 터널링 기반의 멀티캐스트 연결성 솔루션의 구현)

  • Kim, Nam-Gon;Kim, Jong-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.3
    • /
    • pp.153-164
    • /
    • 2007
  • The Access Grid (AG) provides collaboration environments over the IP multicast networks by enabling efficient exchange of multimedia contents among remote users; however, since lots of current networks are still multicast-disabled, it is not easy to deploy this multicast-based multi-party AG. For this problem, the AG provides multicast bridges as a solution by putting a relay server into the multicast networks. Multicast-disabled clients make UDP connections with this relay server and receive forwarded multicast traffics in unicast UDP packets. This solution is facing several limitations since it requires duplicate forwarding of the same packet for each unicast peer. Thus, in this paper, we propose an alternate solution for the multicast connectivity problem of the AG based on the UMTP (UDP multicast tunneling protocol). By taking advantage of flexibilities of UMTP, the proposed solution is designed to improve the efficiency of network and system utilization, to allow reuse of multicast-based AG applications without modification, and to partially address the NAT/firewall traversal issues. To verify the feasibility of proposed solution, we have implemented a prototype AG connectivity tool based on the UMTP, named as the AG Connector.

A Study on Big Data Based Non-Face-to-Face Identity Proofing Technology (빅데이터 기반 비대면 본인확인 기술에 대한 연구)

  • Jung, Kwansoo;Yeom, Hee Gyun;Choi, Daeseon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.10
    • /
    • pp.421-428
    • /
    • 2017
  • The need for various approaches to non-face-to-face identification technology for registering and authenticating users online is being required because of the growth of online financial services and the rapid development of financial technology. In general, non-face-to-face approaches can be exposed to a greater number of threats than face-to-face approaches. Therefore, identification policies and technologies to verify users by using various factors and channels are being studied in order to complement the risks and to be more reliable non-face-to-face identification methods. One of these new approaches is to collect and verify a large number of personal information of user. Therefore, we propose a big-data based non-face-to-face Identity Proofing method that verifies identity on online based on various and large amount of information of user. The proposed method also provides an identification information management scheme that collects and verifies only the user information required for the identity verification level required by the service. In addition, we propose an identity information sharing model that can provide the information to other service providers so that user can reuse verified identity information. Finally, we prove by implementing a system that verifies and manages only the identity assurance level required by the service through the enhanced user verification in the non-face-to-face identity proofing process.

A Policy-Based Meta-Planning for General Task Management for Multi-Domain Services (다중 도메인 서비스를 위한 정책 모델 주도 메타-플래닝 기반 범용적 작업관리)

  • Choi, Byunggi;Yu, Insik;Lee, Jaeho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.12
    • /
    • pp.499-506
    • /
    • 2019
  • An intelligent robot should decide its behavior accordingly to the dynamic changes in the environment and user's requirements by evaluating options to choose the best one for the current situation. Many intelligent robot systems that use the Procedural Reasoning System (PRS) accomplishes such task management functions by defining the priority functions in the task model and evaluating the priority functions of the applicable tasks in the current situation. The priority functions, however, are defined locally inside of the plan, which exhibits limitation for the tasks for multi-domain services because global contexts for overall prioritization are hard to be expressed in the local priority functions. Furthermore, since the prioritization functions are not defined as an explicit module, reuse or extension of the them for general context is limited. In order to remove such limitations, we propose a policy-based meta-planning for general task management for multi-domain services, which provides the ability to explicitly define the utility of a task in the meta-planning process and thus the ability to evaluate task priorities for general context combining the modular priority functions. The ontological specification of the model also enhances the scalability of the policy model. In the experiments, adaptive behavior of a robot according to the policy model are confirmed by observing the appropriate tasks are selected in dynamic service environments.

CFI Approach to Defend against GOT Overwrite Attacks (CFI(Control Flow Integrity) 적용을 통한 GOT(Global Offset Table) 변조 공격 방지 방안 연구)

  • Jeong, Seunghoon;Hwang, Jaejoon;Kwon, Hyukjin;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.179-190
    • /
    • 2020
  • In the Unix-like system environment, the GOT overwrite attack is one of the traditional control flow hijacking techniques for exploiting software privileges. Several techniques have been proposed to defend against the GOT overwrite attack, and among them, the Full Relro(Relocation Read only) technique, which blocks GOT overwrites at runtime by arranging the GOT section as read-only in the program startup, has been known as the most effective defense technique. However, it entails loading delay, which limits its application to a program sensitive to startup performance, and it is not currently applied to the library due to problems including a chain loading delay problem caused by nested library dependency. Also, many compilers, including LLVM, do not apply the Full Relro technique by default, so runtime programs are still vulnerable to GOT attacks. In this paper, we propose a GOT protection scheme using the Control Flow Integrity(CFI) technique, which is currently recognized as the most suitable technique for defense against code reuse attacks. We implemented this scheme based on LLVM and applied it to the binutils-gdb program group to evaluate security, performance and compatibility. The GOT protection scheme with CFI is difficult to bypass, fast, and compatible with existing library programs.

Effect of Recycled Fine Aggregates and Fly Ash on the Mechanical Properties of PVA Fiber-Reinforced Cement Composites (순환잔골재 및 플라이애시가 PVA 섬유보강 시멘트 복합체의 역학적 특성에 미치는 영향)

  • Nam, Yi-Hyun;Park, Wan-Shin;Jang, Young-Il;Yun, Hyun-Do;Kim, Sun-Woo
    • Journal of the Korea Concrete Institute
    • /
    • v.29 no.2
    • /
    • pp.149-157
    • /
    • 2017
  • As the amount of construction wastes increase, reuse of recycled materials is being considered in research areas. While there are many experimental investigations focusing on development of mortar and concrete using the recycled materials, the studies regarding the fiber-reinforced cement composites (FRCCs) using recycled materials are still limited. In this paper, an experimental attempt has been made to investigate the effect of recycled fine aggregates and fly ash on the mechanical properties of PVA FRCCs. The cement and natural sand were respectively replaced by fly ash and recycled fine aggregates at two content levels, 25% and 50%. Ten types of PVA FRCCs mixes were fabricated and tested to investigate the flexural, compressive and direct tensile behaviors. The test results show that flexural, compressive and direct tensile strength were decreased with increase in fly ash content at all ages. In particular, flexural, compressive and direct tensile strengths of specimens, containing 50% recycled fine aggregates and 50% fly ash, showed the lowest values. The modulus of elasticity of specimens showed similar trend to the 28-day compressive strength. Poisson's ratio was increased with increase in fly ash and recycled fine aggregates content.