• Title/Summary/Keyword: Abnormal operating state

Search Result 35, Processing Time 0.023 seconds

Development of Advanced Annunciator System for Nuclear Power Plants

  • Hong, Jin-Hyuk;Park, Seong-Soo;Chang, Soon-Heung
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1995.10a
    • /
    • pp.185-190
    • /
    • 1995
  • Conventional alarm system has many difficulties in the operator's identifying the plant status during special situations such as design basis accidents. To solve the shortcomings, an on-line alarm annunciator system, called dynamic alarm console (DAC), was developed. In the DAC, a signal is generated as alarm by the use of an adaptive setpoint check strategy based on operating mode, and time delay technique is used not to generate nuisance alarms. After alarm generation, if activated alarm is a level precursor alarm or a consequencial alarm, it would be suppressed, and the residual alarms go through dynamic prioritization which provide the alarms with pertinent priorities to the current operating mode. Dynamic prioritization is achieved by going through the system- and mode-oriented prioritization. The DAC has the alarm hierarchical structure based on the physical and functional importance of alarms. Therefore the operator can perceive alarm impacts on the safety or performance of the plant with the alarm propagation from equipment level to plant functional level. In order to provide the operator with the most possible cause of the event and quick cognition of the plant status even without recognizing the individual alarms, reactor trip status tree (RTST) was developed. The DAC and the RTST have been simulated with on-line data obtained from the full-scope simulator for several abnormal cases. The results indicated that the system can provide the operator with useful and compact information fur the earlier termination and mitigation of an abnormal state.

  • PDF

Condition Assessment for Wind Turbines with Doubly Fed Induction Generators Based on SCADA Data

  • Sun, Peng;Li, Jian;Wang, Caisheng;Yan, Yonglong
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.689-700
    • /
    • 2017
  • This paper presents an effective approach for wind turbine (WT) condition assessment based on the data collected from wind farm supervisory control and data acquisition (SCADA) system. Three types of assessment indices are determined based on the monitoring parameters obtained from the SCADA system. Neural Networks (NNs) are used to establish prediction models for the assessment indices that are dependent on environmental conditions such as ambient temperature and wind speed. An abnormal level index (ALI) is defined to quantify the abnormal level of the proposed indices. Prediction errors of the prediction models follow a normal distribution. Thus, the ALIs can be calculated based on the probability density function of normal distribution. For other assessment indices, the ALIs are calculated by the nonparametric estimation based cumulative probability density function. A Back-Propagation NN (BPNN) algorithm is used for the overall WT condition assessment. The inputs to the BPNN are the ALIs of the proposed indices. The network structure and the number of nodes in the hidden layer are carefully chosen when the BPNN model is being trained. The condition assessment method has been used for real 1.5 MW WTs with doubly fed induction generators. Results show that the proposed assessment method could effectively predict the change of operating conditions prior to fault occurrences and provide early alarming of the developing faults of WTs.

A Multi-level Perception Security Model Using Virtualization

  • Lou, Rui;Jiang, Liehui;Chang, Rui;Wang, Yisen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5588-5613
    • /
    • 2018
  • Virtualization technology has been widely applied in the area of computer security research that provides a new method for system protection. It has been a hotspot in system security research at present. Virtualization technology brings new risk as well as progress to computer operating system (OS). A multi-level perception security model using virtualization is proposed to deal with the problems of over-simplification of risk models, unreliable assumption of secure virtual machine monitor (VMM) and insufficient integration with virtualization technology in security design. Adopting the enhanced isolation mechanism of address space, the security perception units can be protected from risk environment. Based on parallel perceiving by the secure domain possessing with the same privilege level as VMM, a mechanism is established to ensure the security of VMM. In addition, a special pathway is set up to strengthen the ability of information interaction in the light of making reverse use of the method of covert channel. The evaluation results show that the proposed model is able to obtain the valuable risk information of system while ensuring the integrity of security perception units, and it can effectively identify the abnormal state of target system without significantly increasing the extra overhead.

A Study of Early Warning System for Gas Facilities (가스 시설의 조기 경보 시스템에 대한 연구)

  • Lee Jeong Woo;Yoo Jin Hwan;Ko Jae Wook
    • Journal of the Korean Institute of Gas
    • /
    • v.9 no.3 s.28
    • /
    • pp.38-43
    • /
    • 2005
  • There is monitored amount operation variables and controlled by operating conditions and loads at many facilities using gas also chemical plants. The process fault which can be indicated by operators, is occurred when the abnormal state was accumulated continuously owing to physical failure, external disturbance or human error. This is studied a Early Warning System which is to estimate process status by real-time monitoring operation variables and to early warning before it will be occurred process fault.

  • PDF

Analysis of Magnetic Resonance Characteristics and Images of Korean Red Ginseng (홍삼의 자기공명 특성과 영상 분석)

  • 김성민;임종국
    • Journal of Biosystems Engineering
    • /
    • v.28 no.3
    • /
    • pp.253-260
    • /
    • 2003
  • In this study, the feasibility of magnetic resonance techniques for nondestructive internal quality evaluation of Korean red ginseng was examined. Relaxation time constants were measured using various grades of red ginsengs. Solid state magnetic resonance imaging technique was applied to image dried red ginsengs which have low moisture contents (about 13%). A 7 tesla magnetic resonance imaging system operating at a proton resonant frequency of 300 ㎒ was used for acquiring MR images of dried Korean red ginseng. The comparison test of cross cut digital images and magnetic resonance images of heaven grade, good grade with cavity inside, and good grade with white part inside red ginseng suggested the feasibility of the internal quality evaluation of Korean red ginsengs using MRI techniques. A good grade red ginseng included abnormal tissues such as cavities or white parts inside was observed by the signal intensity of MR image based on magnetic resonance properties of proton nucleus. Analysis on an one dimensional profile of acquired MR image of Korean red ginseng showed easy discrimination of normal and abnormal tissues. MR techniques suggested ways to detect internal defects of red ginsengs effectively.

Development of Misfire Detection Using Spark-plug (스파크플러그를 이용한 실화감지에 관한 연구)

  • 채재우;이상만;정영식;최동천
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.5 no.1
    • /
    • pp.27-37
    • /
    • 1997
  • Internal combustion engine is the main source of environmental pollutants and therefore better technology is required to reduce harmful elements from the exhaust gases all over the world. Especially, harmful elements from the exhaust gases are caused by incomplete combustion of mixture inside the engine cylinder and this abnormal combustion like misfire or partial burning is the direct cause of the air pollution and engine performance degradation. the object of this research is to detect abnormal combustion like misfire and to keep the engine performance in the optimal operating state. Development of a new system therefore could be applied to a real car. To realize this, the spark-plug in a conventional ignition system is used as a misfire detection sensor and breakdown voltage is analyzed. In this research, bias voltage(about 3kV) was applied to the electrodes of spark-plug and breakdown voltage signal is obtained. This breakdown voltage signal is analyzed and found that a combustion phenomena in engine cylinder has close relationship with harmonic coefficient K which was introduced in this research. Newly developed combustion diagnostic method( breakdown voltage signal analysis) from this research can be used for the combustion diagnostic and combustion control system in an real car.

  • PDF

Separation of Kernel Space and User Space in Zephyr Kernel (Zephyr 커널에서 커널 공간과 사용자 공간의 분리 구현)

  • Kim, Eunyoung;Shin, Dongha
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.13 no.4
    • /
    • pp.187-194
    • /
    • 2018
  • The operating system for IoT should have a small memory footprint and provide low power state, real-time, multitasking, various network protocols, and security. Although the Zephyr kernel, an operating system for IoT, released by the Linux Foundation in February 2016, has these features but errors generated by the user code can generate fatal problems in the system because the Zephyr kernel adopts a single-space method that both the user code and kernel code execute in the same space. In this research, we propose a space separation method, which separates kernel space and user space, to solve this problem. The space separation that we propose consists of three modifications in Zephyr kernel. The first is the code separation that kernel code and user code execute in each space while using different stacks. The second is the kernel space protection that generates an exception by using the MPU (Memory Protection Unit) when the user code accesses the kernel space. The third is the SVC based system call that executes the system call using the SVC instruction that generates the exception. In this research, we implemented the space separation in Zephyr v1.8.0 and evaluated safety through abnormal execution of the user code. As the result, the kernel was not crashed by the errors generated by the user code and was normally executed.

An Expert system On Local load shedding With priority (우선도를 고려한 지역 부하차단에 관한 전문가 시스템)

  • You, Mi-Bog;Kim, Jae-Chul;Kim, Eung-Sang
    • Proceedings of the KIEE Conference
    • /
    • 1992.07a
    • /
    • pp.161-164
    • /
    • 1992
  • In operation of power systems, operators must solve overloads in abnormal conditions instantaneously for restoring the power system to normal state. Earlier works proposed the power flow distribution and the load shedding decision, developed by the expert system, for settling overloads. This paper presents a method for solving special conditions in the earlier works which requires less amount of loads than that of the load shedding, in particular, of the load shedding considering the priority. This paper uses the effort system to improve the ability of a beginner as well as of trained operators for operating the power system during emergency operation. To prove efficiency of the proposed method, this paper has adopted the model system with 13 bus for obtaining simulation results and used the prolog language to implement the system.

  • PDF

A Study on Loss of Excitation Algorithm for Generator Field Protection (발전기 계자보호를 위한 계자상실 알고리즘에 관한 연구)

  • Park, Yu-Yeong;Park, Chul-Won
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.63 no.4
    • /
    • pp.368-372
    • /
    • 2014
  • The most widely used scheme for detecting loss of excitation on generator is used to sense apparent impedance from generator terminals. This paper presents loss of excitation algorithm using DFT filter based negative offset mho elements for generator field protection. It's algorithm includes two negative mho characteristics looking in the generator. The generator control system was modeled by PSCAD/EMTDC software, and then the proposed algorithm was tested by the collecting relaying signals from selected the generator model. From simulation results, the loss of excitation algorithm can be used to field protection for generator.

Implementation of a Refusable Human-Robot Interaction Task with Humanoid Robot by Connecting Soar and ROS (Soar (State Operator and Result)와 ROS 연계를 통해 거절가능 HRI 태스크의 휴머노이드로봇 구현)

  • Dang, Chien Van;Tran, Tin Trung;Pham, Trung Xuan;Gil, Ki-Jong;Shin, Yong-Bin;Kim, Jong-Wook
    • The Journal of Korea Robotics Society
    • /
    • v.12 no.1
    • /
    • pp.55-64
    • /
    • 2017
  • This paper proposes combination of a cognitive agent architecture named Soar (State, operator, and result) and ROS (Robot Operating System), which can be a basic framework for a robot agent to interact and cope with its environment more intelligently and appropriately. The proposed Soar-ROS human-robot interaction (HRI) agent understands a set of human's commands by voice recognition and chooses to properly react to the command according to the symbol detected by image recognition, implemented on a humanoid robot. The robotic agent is allowed to refuse to follow an inappropriate command like "go" after it has seen the symbol 'X' which represents that an abnormal or immoral situation has occurred. This simple but meaningful HRI task is successfully experimented on the proposed Soar-ROS platform with a small humanoid robot, which implies that extending the present hybrid platform to artificial moral agent is possible.