• Title/Summary/Keyword: Design Basis Event

Search Result 69, Processing Time 0.023 seconds

Thermal-hydraulic Analysis of Operator Action Time on Coping Strategy of LUHS Event for OPR1000 (OPR1000형 원전의 최종열제거원 상실사고 대처전략 및 운전원 조치 시간에 따른 열수력 거동 분석)

  • Song, Jun Kyu
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.5
    • /
    • pp.121-127
    • /
    • 2020
  • Since the Fukushima nuclear accident in 2011, the public were concerned about the safety of Nuclear Power Plants (NPPs) in extreme natural disaster situations, such as earthquakes, flooding, heavy rain and tsunami, have been increasing around the world. Accordingly, the Stress Test was conducted in Europe, Japan, Russia, and other countries by reassessing the safety and response capabilities of NPPs in extreme natural disaster situations that exceed the design basis. The extreme natural disaster can put the NPPs in beyond-design-basis conditions such as the loss of the power system and the ultimate heat sink. The behaviors and capabilities of NPPs with losing their essential safety functions should be measured to find and supplement weak areas in hardware, procedures and coping strategies. The Loss of Ultimate Heat Sink (LUHS) accident assumes impairment of the essential service water system accompanying the failure of the component cooling water system. In such conditions, residual heat removal and cooling of safety-relevant components are not possible for a long period of time. It is therefore very important to establish coping strategies considering all available equipment to mitigate the consequence of the LUHS accident and keep the NPPs safe. In this study, thermal hydraulic behavior of the LUHS event was analyzed using RELAP5/Mod3.3 code. We also performed the sensitivity analysis to identify the effects of the operator recovery actions and operation strategy for charging pumps on the results of the LUHS accident.

Design of Multiprocess Models for Parallel Protocol Implementation (병렬 프로토콜 구현을 위한 다중 프로세스 모델의 설계)

  • Choi, Sun-Wan;Chung, Kwang-Sue
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2544-2552
    • /
    • 1997
  • This paper presents three multiprocess models for parallel protocol implementation, that is, (1)channel communication model, (2)fork-join model, and (3)event polling model. For the specification of parallelism for each model, a parallel programming language, Par. C System, is used. to measure the performance of multiprocess models, we implemented the Internet Protocol Suite(IPS) Internet Protocol (IP) for each model by writing the parallel language on the Transputer. After decomposing the IP functions into two parts, that is, the sending side and the receiving side, the parallelism in both sides is exploited in the form of Multiple Instruction Single Data (MISD). Three models are evaluated and compared on the basis of various run-time overheads, such as an event sending via channels in the parallel channel communication model, process creating in the fork-join model and context switching in the event polling model, at the sending side and the receiving side. The event polling model has lower processing delays as about 77% and 9% in comparison with the channel communication model and the fork-join model at the sending side, respectively. At the receiving side, the fork-join model has lower processing delays as about 55% and 107% in comparison with the channel communication model and the event polling model, respectively.

  • PDF

Development of a bridge-specific fragility methodology to improve the seismic resilience of bridges

  • Dukes, Jazalyn;Mangalathu, Sujith;Padgett, Jamie E.;DesRoches, Reginald
    • Earthquakes and Structures
    • /
    • v.15 no.3
    • /
    • pp.253-261
    • /
    • 2018
  • This article details a bridge-specific fragility method developed to enhance the seismic design and resilience of bridges. Current seismic design processes provide guidance for the design of a bridge that will not collapse during a design hazard event. However, they do not provide performance information of the bridge at different hazard levels or due to design changes. Therefore, there is a need for a supplement to this design process that will provide statistical information on the performance of a bridge, beyond traditional emphases on collapse prevention. This article proposes a bridge-specific parameterized fragility method to enable efficient estimation of various levels of damage probability for alternative bridge design parameters. A multi-parameter demand model is developed to incorporate bridge design details directly in the fragility estimation. Monte Carlo simulation and Logistic regression are used to determine the fragility of the bridge or bridge component. The resulting parameterized fragility model offers a basis for a bridge-specific design tool to explore the influence of design parameter variation on the expected performance of a bridge. When used as part of the design process, these tools can help to transform a prescriptive approach into a more performance-based approach, efficiently providing probabilistic performance information about a new bridge design. An example of the method and resulting fragility estimation is presented.

Analysis of Total Loss of Feedwater Event for the Determination of Safety Depressurization Bleed Capacity (안전감압계통의 방출유량을 결정하기 위한 완전급수상실사고 해석)

  • Kwon, Young-Min;Song, Jin-Ho;Ro, Tae-Sun
    • Nuclear Engineering and Technology
    • /
    • v.27 no.4
    • /
    • pp.470-482
    • /
    • 1995
  • The Ulchin 3&4, which are 2825 MWt PWRs, adopted Safety Depressurization System (SDS) to mitigate the beyond design basis event of Total Less of Feedwater(TLOFW). In this study the results and methodology of the analyses for the determination of SDS bleed capacity are discussed. The SDS design bleed capacity has been determined from the CEFLASH-4AS/REM simulation according to the following design criteria : 1) Each SDS flow path, in conjunction with one of two High Pressure Safety Injection (HPSI) pumps, is designed to have a sufficient capacity to prevent core uncovery if one SDS path is opened simultaneously with the opening of the Pressurizer Safety Valves (PSVs). 2) Both SDS bleed paths are designed to have sufficient total capacity with both HPSI pumps operating to prevent core uncovery if the Feed and Bleed (F&B) initiation is delayed up to thirty minutes from the time of the PSVs lift. To verify the results of CEFLASH-4AS/REM simulation a comparative analysis kas also been per-formed by more sophisticated computer code, RELAP5/MOD3. The TLOFW event without operator recovery and TLOFW event with F&B are analyzed. The predictions by the CEFLASH-4AS/REM of the transient too phase system behavior are in good qualitative and quantitative agreement with those by the RELAP5/MOD3 simulation. Both of the results of analyses by CEFLASH-4AS/REM and RELAP5/MOD3 have demonstrated that decay heat removal and core inventory make-up can be successfully accomplished by F&B operation during now event for the Ulchin 3&4.

  • PDF

A Study on Trend in Reinterpretation of Architectonic Programming as a Schematic Factor in Contemporary Architecture (현대건축디자인에서 개념요소로서 프로그래밍의 재해석 경향에 관한 연구)

  • 김능현
    • Korean Institute of Interior Design Journal
    • /
    • no.25
    • /
    • pp.272-279
    • /
    • 2000
  • It can be characterized that contemporary architects intend to establish architectonics which can make it possible to reinterpret the attribute of movement in space and its programming differed from the traditional perception in moving in and out any space through disjoining and reorganizing human behavior and event. This intends reflect new paradigm for subjugating the compelled fuctioning of modern Architecture. This Study review those intends focused on programming as a pre-disign schema. In those intends, it connotes the effort of establishing more systemic and logical approach through deconstruction and disprogramming the existing from, space, elements and human on the basis of his own schematic conception as substitution of function in modern architecture.

  • PDF

The Hierarchical Modeling Approach for Integrating the Enterprise Activity Model (기업 액티비티 모델 통합을 위한 계층적인 모델링 접근법)

  • Jun, H.B.;Suh, H.W.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.6 no.3
    • /
    • pp.157-168
    • /
    • 2001
  • The description of enterprise activities is the basis fur process improvement and information system building. To describe such activities, it is necessary to model the enterprise activities from the abstraction level to the implementation level in a stepwise and integrated form. For this reason, several modeling approaches have been proposed. However, most of them lacked the stepwise or integration aspects although some of them covered overall levels. This study proposes the hierarchical modeling approach for integrating the enterprise activity model from the abstraction level to the implementation level systematically. It is composed of five modeling levels such as function level, process level, task level, document workflow level, and event flow level. This study discusses the definition and characteristics of each level and compare our modeling frame with other modeling methodologies in case study.

  • PDF

The Collaborative Process;How Do We Deploy User Requirements to the Design of Component Models?

  • In, Joon-Hwan;Lim, Joa-Sang
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.356-365
    • /
    • 2005
  • Since their first inception a few decades ago, software components have received much attention mainly due to their alleged benefits of quality and productivity improvement. Despite this, it is yet to be agreed upon what and how components should be designed. This paper aimed to bridge the gap by proposing a collaborative process where the voice of the customer is captured and documented by employing the event and entity models. These requirement elements (WHAT) are cross-tabulated in three relation matrices in accordance with the weights provided by the business users. The requirements are fed into the algorithm invented by the authors to optimize the component grouping (HOW). This collaborative process has been successfully validated at an enterprise wide software development project. The process was effective to help the users more actively involved in the design of the system and made the whole process faster and more adaptive to the changes.

  • PDF

Posttraumatic Growth, Dyadic Adjustment, and Quality of Life in Breast Cancer Survivors and Their Husbands (유방암 생존자 부부의 외상 후 성장과 부부적응, 삶의 질)

  • Song, Seunghee;Ryu, Eunjung
    • Journal of Korean Academy of Nursing
    • /
    • v.44 no.5
    • /
    • pp.515-524
    • /
    • 2014
  • Purpose: The purpose of this study was to identify whether the couple perceived breast cancer as a traumatic event, to evaluate the association among posttraumatic growth, dyadic adjustment, and quality of life and to explore the predictors affecting quality of life of the couple. Methods: A cross-sectional comparative survey design was utilized. Participants were 57 couples recruited from a national cancer center in Korea. Data were analyzed using paired t-test, McNemar test and independent t-test. On the basis of variables found to be significantly associated with quality of life, multiple regression was used to examine the simultaneous influence of multiple predictors. Results: Breast cancers survivors and spouses perceived breast cancer as a traumatic event (43.9% and 24.6%, respectively). The global quality of life was explained by perception as trauma (${\beta}$= -19.79) and posttraumatic growth (${\beta}$=0.46) in survivors, and perception as trauma (${\beta}$= -18.81) and dyadic adjustment (${\beta}$=0.53) in spouses. Conclusion: Results suggest that future research should use qualitative methods to evaluate why contemplating reasons for cancer contributed to posttraumatic growth, examine other potential predictors of quality of life such as dyadic adjustment and intimacy, and identify links between posttraumatic growth and other psychological outcomes such as distress and well-being, using prospective analyses.

DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective

  • Kim, Jiyeon;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2186-2203
    • /
    • 2020
  • Security administrators of companies and organizations need to come up with proper countermeasures against cyber-attacks considering infrastructures and security policies in their possession. In order to develop and verify such countermeasures, the administrators should be able to reenact both cyber-attacks and defenses. Simulations can be useful for the reenactment by overcoming its limitations including high risk and cost. If the administrators are able to design various scenarios of cyber-attacks and to develop simulation models from their viewpoints, they can simulate desired situations and observe the results more easily. It is challenging to simulate cyber-security issues, because there is lack of theoretical basis for modeling a wide range of the security field as well as pre-defined basic components used to model cyber-attacks. In this paper, we propose a modeling method for cyber-security simulations by developing a basic component and a composite model, called Abstracted Cyber-Security Unit Model (ACSUM) and Abstracted Cyber-security SIMulation model (ACSIM), respectively. The proposed models are based on DEVS(Discrete Event systems Specification) formalism, a modeling theory for discrete event simulations. We develop attack scenarios by sequencing attack behaviors using ACSUMs and then model ACSIMs by combining and abstracting the ACSUMs from a security perspective. The concepts of ACSUM and ACSIM enable the security administrators to simulate numerous cyber-security issues from their viewpoints. As a case study, we model a worm scenario using ACSUM and simulate three types of simulation models based on ACSIM from a different security perspective.

THE APPLICATION OF PSA TECHNIQUES TO THE VITAL AREA IDENTIFICATION OF NUCLEAR POWER PLANTS

  • HA JAEJOO;JUNG WOO SIK;PARK CHANG-KUE
    • Nuclear Engineering and Technology
    • /
    • v.37 no.3
    • /
    • pp.259-264
    • /
    • 2005
  • This paper presents a vital area identification (VAI) method based on the current fault tree analysis (FTA) and probabilistic safety assessment (PSA) techniques for the physical protection of nuclear power plants. A structured framework of a top event prevention set analysis (TEPA) application to the VAI of nuclear power plants is also delineated. One of the important processes for physical protection in a nuclear power plant is VAI that is a process for identifying areas containing nuclear materials, structures, systems or components (SSCs) to be protected from sabotage, which could directly or indirectly lead to core damage and unacceptable radiological consequences. A software VIP (Vital area Identification Package based on the PSA method) is being developed by KAERI for the VAI of nuclear power plants. Furthermore, the KAERI fault tree solver FTREX (Fault Tree Reliability Evaluation eXpert) is specialized for the VIP to generate the candidates of the vital areas. FTREX can generate numerous MCSs for a huge fault tree with the lowest truncation limit and all possible prevention sets.